Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
19/07/2024, 12:20
Static task
static1
Behavioral task
behavioral1
Sample
5beb1e6eef791bd0d2602b78e7c473e3_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
5beb1e6eef791bd0d2602b78e7c473e3_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
5beb1e6eef791bd0d2602b78e7c473e3_JaffaCakes118.html
-
Size
50KB
-
MD5
5beb1e6eef791bd0d2602b78e7c473e3
-
SHA1
c007a35b565ea9368ce355a45c92f98b075b2133
-
SHA256
c2efadcc1f475b04fc9ca5c84938f963700fb5ea58ef9381bcda1e8054ee0d34
-
SHA512
cabdf8d9494159155bb6e86149de9320f2428f14ebdcf9191ce242f62ce65f3bfcc186230806650d2294b8eb1209ba0800d11e6157ed670417a9846d115d76df
-
SSDEEP
768:ToZxvsncvsnfXDWmXSQOk0xKYVByIvXUWor:ToQjfXCBk0x74Iv4r
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1772 msedge.exe 1772 msedge.exe 2992 msedge.exe 2992 msedge.exe 3544 msedge.exe 3544 msedge.exe 3544 msedge.exe 3544 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2992 msedge.exe 2992 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2992 wrote to memory of 3656 2992 msedge.exe 84 PID 2992 wrote to memory of 3656 2992 msedge.exe 84 PID 2992 wrote to memory of 1708 2992 msedge.exe 85 PID 2992 wrote to memory of 1708 2992 msedge.exe 85 PID 2992 wrote to memory of 1708 2992 msedge.exe 85 PID 2992 wrote to memory of 1708 2992 msedge.exe 85 PID 2992 wrote to memory of 1708 2992 msedge.exe 85 PID 2992 wrote to memory of 1708 2992 msedge.exe 85 PID 2992 wrote to memory of 1708 2992 msedge.exe 85 PID 2992 wrote to memory of 1708 2992 msedge.exe 85 PID 2992 wrote to memory of 1708 2992 msedge.exe 85 PID 2992 wrote to memory of 1708 2992 msedge.exe 85 PID 2992 wrote to memory of 1708 2992 msedge.exe 85 PID 2992 wrote to memory of 1708 2992 msedge.exe 85 PID 2992 wrote to memory of 1708 2992 msedge.exe 85 PID 2992 wrote to memory of 1708 2992 msedge.exe 85 PID 2992 wrote to memory of 1708 2992 msedge.exe 85 PID 2992 wrote to memory of 1708 2992 msedge.exe 85 PID 2992 wrote to memory of 1708 2992 msedge.exe 85 PID 2992 wrote to memory of 1708 2992 msedge.exe 85 PID 2992 wrote to memory of 1708 2992 msedge.exe 85 PID 2992 wrote to memory of 1708 2992 msedge.exe 85 PID 2992 wrote to memory of 1708 2992 msedge.exe 85 PID 2992 wrote to memory of 1708 2992 msedge.exe 85 PID 2992 wrote to memory of 1708 2992 msedge.exe 85 PID 2992 wrote to memory of 1708 2992 msedge.exe 85 PID 2992 wrote to memory of 1708 2992 msedge.exe 85 PID 2992 wrote to memory of 1708 2992 msedge.exe 85 PID 2992 wrote to memory of 1708 2992 msedge.exe 85 PID 2992 wrote to memory of 1708 2992 msedge.exe 85 PID 2992 wrote to memory of 1708 2992 msedge.exe 85 PID 2992 wrote to memory of 1708 2992 msedge.exe 85 PID 2992 wrote to memory of 1708 2992 msedge.exe 85 PID 2992 wrote to memory of 1708 2992 msedge.exe 85 PID 2992 wrote to memory of 1708 2992 msedge.exe 85 PID 2992 wrote to memory of 1708 2992 msedge.exe 85 PID 2992 wrote to memory of 1708 2992 msedge.exe 85 PID 2992 wrote to memory of 1708 2992 msedge.exe 85 PID 2992 wrote to memory of 1708 2992 msedge.exe 85 PID 2992 wrote to memory of 1708 2992 msedge.exe 85 PID 2992 wrote to memory of 1708 2992 msedge.exe 85 PID 2992 wrote to memory of 1708 2992 msedge.exe 85 PID 2992 wrote to memory of 1772 2992 msedge.exe 86 PID 2992 wrote to memory of 1772 2992 msedge.exe 86 PID 2992 wrote to memory of 3624 2992 msedge.exe 87 PID 2992 wrote to memory of 3624 2992 msedge.exe 87 PID 2992 wrote to memory of 3624 2992 msedge.exe 87 PID 2992 wrote to memory of 3624 2992 msedge.exe 87 PID 2992 wrote to memory of 3624 2992 msedge.exe 87 PID 2992 wrote to memory of 3624 2992 msedge.exe 87 PID 2992 wrote to memory of 3624 2992 msedge.exe 87 PID 2992 wrote to memory of 3624 2992 msedge.exe 87 PID 2992 wrote to memory of 3624 2992 msedge.exe 87 PID 2992 wrote to memory of 3624 2992 msedge.exe 87 PID 2992 wrote to memory of 3624 2992 msedge.exe 87 PID 2992 wrote to memory of 3624 2992 msedge.exe 87 PID 2992 wrote to memory of 3624 2992 msedge.exe 87 PID 2992 wrote to memory of 3624 2992 msedge.exe 87 PID 2992 wrote to memory of 3624 2992 msedge.exe 87 PID 2992 wrote to memory of 3624 2992 msedge.exe 87 PID 2992 wrote to memory of 3624 2992 msedge.exe 87 PID 2992 wrote to memory of 3624 2992 msedge.exe 87 PID 2992 wrote to memory of 3624 2992 msedge.exe 87 PID 2992 wrote to memory of 3624 2992 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\5beb1e6eef791bd0d2602b78e7c473e3_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffaef6246f8,0x7ffaef624708,0x7ffaef6247182⤵PID:3656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,123606860818733704,8538807420535209603,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:22⤵PID:1708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2140,123606860818733704,8538807420535209603,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2472 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2140,123606860818733704,8538807420535209603,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2884 /prefetch:82⤵PID:3624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,123606860818733704,8538807420535209603,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:1112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,123606860818733704,8538807420535209603,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:1804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,123606860818733704,8538807420535209603,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1940 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3544
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3480
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3964
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d406f3135e11b0a0829109c1090a41dc
SHA1810f00e803c17274f9af074fc6c47849ad6e873e
SHA25691f57909a10174b06c862089a9c1f3b3aeafea74a70ee1942ce11bb80d9eace4
SHA5122b9f0f94b1e8a1b62ab38af8df2add0ec9e4c6dfa94d9c84cc24fe86d2d57d4fc0d9ec8a9775cf42a859ddfd130260128185a0e2588992bca8fd4ebf5ee6d409
-
Filesize
152B
MD57f37f119665df6beaa925337bbff0e84
SHA1c2601d11f8aa77e12ab3508479cbf20c27cbd865
SHA2561073dbff3ec315ac85361c35c8ba791cc4198149b097c7b287dda1d791925027
SHA5128e180e41dd27c51e81788564b19b8ff411028890da506fbf767d394b1e73ec53e046c8d07235b2ec7c1c593c976bbf74ed9b7d442d68b526a0a77a9b5b0ab817
-
Filesize
5KB
MD5c600d3933230006f683732e66555d036
SHA18351db3511868caa49dc4bd9be9479b02c45e816
SHA256b7446a9997f9ae52ce1bc244f88cf88de374f77c7f7f0d29eb5a6728ec39b4be
SHA512108861f7c3593c4caa97b4ab176f17ac379b1d3af435e43006ba0cb9daa22a49bbb3c69844b4a88bcc500cbeeff68c26e73eec1ac1f798d68fa4cf3d53d662e7
-
Filesize
6KB
MD57534935ce92018c7eff5a10e9c42a2ab
SHA13754e6b6e7f5b986568ba075f9bdb22e4593709b
SHA25619834b4eacf3f4918040bf4e92b1454912d919b7a018783c9c046cda1cc609eb
SHA512659fa0b3facbb4ac956325cff283ebce044b6b26b6b36125f3136d87ae39c6b240a8d688e73ee93eb04e610a09b9c508f3a579a5669debdaf55931be5442e271
-
Filesize
6KB
MD5feeee4e8297f96ec659eee8ef55d6728
SHA1dd9be407c8f7458fc8d82d45ee54ab4e5fc27d42
SHA256c85f7b1b73da53efec2175365e9417fa07ad12196aa78054f56878aa185b8af3
SHA51200402dec1336c955675021d3ccdfc0399ee095b2397d9f0e75ce7a98ae4ac4febaf84b64768d81aff92e49d482de73df8b94c8d362bdb50be0a7f44278bc3e2c
-
Filesize
10KB
MD5be0194fd99c3bb2aa68d5b1845be747a
SHA18a60968b5dc925aa1da5f16ab18e48b13a48744b
SHA256fb40393f94744606a128ba1e754409274534af24699b35379c89386612b22f47
SHA5121ea35ba81cd744d92176d0cdd0b89000395620d12fe0a37a2ea015e3b640689e0323511f016c675838a46edd5bbada6ae0a21365d90f0865115ca1173e59c889