Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
23-08-2024 03:21
Static task
static1
Behavioral task
behavioral1
Sample
ba27d2b1bd2d840fc8f68ae3b192c92d_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ba27d2b1bd2d840fc8f68ae3b192c92d_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ba27d2b1bd2d840fc8f68ae3b192c92d_JaffaCakes118.html
-
Size
18KB
-
MD5
ba27d2b1bd2d840fc8f68ae3b192c92d
-
SHA1
0a2f8703047de114e039dfbb3b27ec428d1d7ea0
-
SHA256
62bc64b3f7ac5a9267e153da4490c4e35241f476ed8c7134ba90d86f3e63c518
-
SHA512
68e6c33c2b5285c9638431c8a1371f5afa4037fd83aac56b13672bbca6f7dfa29ffba18ec0a00f1efd7a6cf11898464617effc2fe519fd7ae569b7e24d6b7ca3
-
SSDEEP
192:SIM3t0I5fo9cKivXQWxZxdkVSoAIe4uzUnjBhCE82qDB8:SIMd0I5nvHNsvCHxDB8
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1532 msedge.exe 1532 msedge.exe 100 msedge.exe 100 msedge.exe 2388 msedge.exe 2388 msedge.exe 2388 msedge.exe 2388 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 100 msedge.exe 100 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 100 msedge.exe 100 msedge.exe 100 msedge.exe 100 msedge.exe 100 msedge.exe 100 msedge.exe 100 msedge.exe 100 msedge.exe 100 msedge.exe 100 msedge.exe 100 msedge.exe 100 msedge.exe 100 msedge.exe 100 msedge.exe 100 msedge.exe 100 msedge.exe 100 msedge.exe 100 msedge.exe 100 msedge.exe 100 msedge.exe 100 msedge.exe 100 msedge.exe 100 msedge.exe 100 msedge.exe 100 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 100 msedge.exe 100 msedge.exe 100 msedge.exe 100 msedge.exe 100 msedge.exe 100 msedge.exe 100 msedge.exe 100 msedge.exe 100 msedge.exe 100 msedge.exe 100 msedge.exe 100 msedge.exe 100 msedge.exe 100 msedge.exe 100 msedge.exe 100 msedge.exe 100 msedge.exe 100 msedge.exe 100 msedge.exe 100 msedge.exe 100 msedge.exe 100 msedge.exe 100 msedge.exe 100 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 100 wrote to memory of 1060 100 msedge.exe 84 PID 100 wrote to memory of 1060 100 msedge.exe 84 PID 100 wrote to memory of 3844 100 msedge.exe 85 PID 100 wrote to memory of 3844 100 msedge.exe 85 PID 100 wrote to memory of 3844 100 msedge.exe 85 PID 100 wrote to memory of 3844 100 msedge.exe 85 PID 100 wrote to memory of 3844 100 msedge.exe 85 PID 100 wrote to memory of 3844 100 msedge.exe 85 PID 100 wrote to memory of 3844 100 msedge.exe 85 PID 100 wrote to memory of 3844 100 msedge.exe 85 PID 100 wrote to memory of 3844 100 msedge.exe 85 PID 100 wrote to memory of 3844 100 msedge.exe 85 PID 100 wrote to memory of 3844 100 msedge.exe 85 PID 100 wrote to memory of 3844 100 msedge.exe 85 PID 100 wrote to memory of 3844 100 msedge.exe 85 PID 100 wrote to memory of 3844 100 msedge.exe 85 PID 100 wrote to memory of 3844 100 msedge.exe 85 PID 100 wrote to memory of 3844 100 msedge.exe 85 PID 100 wrote to memory of 3844 100 msedge.exe 85 PID 100 wrote to memory of 3844 100 msedge.exe 85 PID 100 wrote to memory of 3844 100 msedge.exe 85 PID 100 wrote to memory of 3844 100 msedge.exe 85 PID 100 wrote to memory of 3844 100 msedge.exe 85 PID 100 wrote to memory of 3844 100 msedge.exe 85 PID 100 wrote to memory of 3844 100 msedge.exe 85 PID 100 wrote to memory of 3844 100 msedge.exe 85 PID 100 wrote to memory of 3844 100 msedge.exe 85 PID 100 wrote to memory of 3844 100 msedge.exe 85 PID 100 wrote to memory of 3844 100 msedge.exe 85 PID 100 wrote to memory of 3844 100 msedge.exe 85 PID 100 wrote to memory of 3844 100 msedge.exe 85 PID 100 wrote to memory of 3844 100 msedge.exe 85 PID 100 wrote to memory of 3844 100 msedge.exe 85 PID 100 wrote to memory of 3844 100 msedge.exe 85 PID 100 wrote to memory of 3844 100 msedge.exe 85 PID 100 wrote to memory of 3844 100 msedge.exe 85 PID 100 wrote to memory of 3844 100 msedge.exe 85 PID 100 wrote to memory of 3844 100 msedge.exe 85 PID 100 wrote to memory of 3844 100 msedge.exe 85 PID 100 wrote to memory of 3844 100 msedge.exe 85 PID 100 wrote to memory of 3844 100 msedge.exe 85 PID 100 wrote to memory of 3844 100 msedge.exe 85 PID 100 wrote to memory of 1532 100 msedge.exe 86 PID 100 wrote to memory of 1532 100 msedge.exe 86 PID 100 wrote to memory of 3612 100 msedge.exe 87 PID 100 wrote to memory of 3612 100 msedge.exe 87 PID 100 wrote to memory of 3612 100 msedge.exe 87 PID 100 wrote to memory of 3612 100 msedge.exe 87 PID 100 wrote to memory of 3612 100 msedge.exe 87 PID 100 wrote to memory of 3612 100 msedge.exe 87 PID 100 wrote to memory of 3612 100 msedge.exe 87 PID 100 wrote to memory of 3612 100 msedge.exe 87 PID 100 wrote to memory of 3612 100 msedge.exe 87 PID 100 wrote to memory of 3612 100 msedge.exe 87 PID 100 wrote to memory of 3612 100 msedge.exe 87 PID 100 wrote to memory of 3612 100 msedge.exe 87 PID 100 wrote to memory of 3612 100 msedge.exe 87 PID 100 wrote to memory of 3612 100 msedge.exe 87 PID 100 wrote to memory of 3612 100 msedge.exe 87 PID 100 wrote to memory of 3612 100 msedge.exe 87 PID 100 wrote to memory of 3612 100 msedge.exe 87 PID 100 wrote to memory of 3612 100 msedge.exe 87 PID 100 wrote to memory of 3612 100 msedge.exe 87 PID 100 wrote to memory of 3612 100 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\ba27d2b1bd2d840fc8f68ae3b192c92d_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:100 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd4a0046f8,0x7ffd4a004708,0x7ffd4a0047182⤵PID:1060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,1540860038125419016,1159831612092901947,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2084 /prefetch:22⤵PID:3844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2072,1540860038125419016,1159831612092901947,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2072,1540860038125419016,1159831612092901947,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2892 /prefetch:82⤵PID:3612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,1540860038125419016,1159831612092901947,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:3412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,1540860038125419016,1159831612092901947,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:12⤵PID:5028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,1540860038125419016,1159831612092901947,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1120 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2388
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4372
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2036
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5111c361619c017b5d09a13a56938bd54
SHA1e02b363a8ceb95751623f25025a9299a2c931e07
SHA256d7be4042a1e3511b0dbf0ab5c493245e4ac314440a4ae0732813db01a21ef8bc
SHA512fc16a4ad0b56899b82d05114d7b0ca8ee610cdba6ff0b6a67dea44faf17b3105109335359b78c0a59c9011a13152744a7f5d4f6a5b66ea519df750ef03f622b2
-
Filesize
152B
MD5983cbc1f706a155d63496ebc4d66515e
SHA1223d0071718b80cad9239e58c5e8e64df6e2a2fe
SHA256cc34b8f8e3f4bfe4c9a227d88f56ea2dd276ca3ac81df622ff5e9a8ec46b951c
SHA512d9cf2ca46d9379902730c81e615a3eb694873ffd535c6bb3ded2dc97cdbbfb71051ab11a07754ed6f610f04285605b702b5a48a6cfda3ee3287230c41c9c45cd
-
Filesize
5KB
MD5758be534aab6fb6038ec3d7802328e8f
SHA120aee7bfd231e54d1922af4b44fa9270b52c48fd
SHA25680cd6ee2676e1c273dda2de4a3f9cf8c3dd39cf366658f6c275cbb04cab6e273
SHA512331d0c8348ed956512c6f712a844494a0bb6ee0f25ad46df3d11e96de20e7b84975839dbe4e116a6190b4e1d0a40d04534214a0917485ee120ade30b7e311aff
-
Filesize
6KB
MD52a1d2f5e715c94d635eaeb321731bf6f
SHA14c25aad59288541465380192f33fb228c023815e
SHA2568f29391beed1b690fe8f38ba14688c8f158db68e2962e4abcb4c865c45e18f14
SHA512f792d3b3985190487f3012a64f6c7e37c8c5d8aaa25adea91e3c35c10de67d4a432cd4ec896facd4240248d0741000fc4643464b543a59018cc329ddd6b1282b
-
Filesize
6KB
MD5badf910eaf0de8f5aad50364c0bdbb93
SHA1d4706983869fca151c48796b951f7a2b409ba010
SHA256a0dd0f11b79d27d5c281900b7a3a76b3c564e9dcdb50d941ffb262b3d89864ac
SHA51295abd60baacce6e001a3b391bee9465a85560079bea3cfae347a8993bcd1e62c2d4e526ef0aaca8b63a331b8fae31545876ddf3169660c529a37dcb915db39de
-
Filesize
10KB
MD5555d3bfcbdad41c84792ffa2cf589cf8
SHA1a0c80473ca32903a34e7dab08d70e96efd903000
SHA256a0afcab2be027f017383089996e37e25e2279d6b600f77ce6eebbf5b6b305a39
SHA512d1b887c00fdc896b49383b73e8c146d295d07d91ebecdeb3e7c88ba8bebcc3f00b62123cde965e61eeadd9fd5ea07fd59f540aa5e40cf56edce260db147f60fa