Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02/10/2024, 01:19
Static task
static1
Behavioral task
behavioral1
Sample
0838923dc852b4de67023f0f3c0c577c_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0838923dc852b4de67023f0f3c0c577c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
0838923dc852b4de67023f0f3c0c577c_JaffaCakes118.html
-
Size
141KB
-
MD5
0838923dc852b4de67023f0f3c0c577c
-
SHA1
609d7d24dd5c179e9bbd11cc2d6e1ab60bd29c6d
-
SHA256
31a8b786fe05742f654ada82bc2c05f1abf2a4a0d689e2b7e85f16f498fb457e
-
SHA512
4f71fef80b1cab470f4aeae834498fc75044b4a2669aa4dc9bf54a3e7bd14c4b4af8df69e7f231a1986fb8087e73e76901394214a7fb0d4331e5b0b9bdd2704b
-
SSDEEP
1536:SyPXyRVLelx76vuyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJA:SfVEx7dyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4816 msedge.exe 4816 msedge.exe 5028 msedge.exe 5028 msedge.exe 3608 msedge.exe 3608 msedge.exe 3608 msedge.exe 3608 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 5028 msedge.exe 5028 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe 5028 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5028 wrote to memory of 1852 5028 msedge.exe 82 PID 5028 wrote to memory of 1852 5028 msedge.exe 82 PID 5028 wrote to memory of 2612 5028 msedge.exe 83 PID 5028 wrote to memory of 2612 5028 msedge.exe 83 PID 5028 wrote to memory of 2612 5028 msedge.exe 83 PID 5028 wrote to memory of 2612 5028 msedge.exe 83 PID 5028 wrote to memory of 2612 5028 msedge.exe 83 PID 5028 wrote to memory of 2612 5028 msedge.exe 83 PID 5028 wrote to memory of 2612 5028 msedge.exe 83 PID 5028 wrote to memory of 2612 5028 msedge.exe 83 PID 5028 wrote to memory of 2612 5028 msedge.exe 83 PID 5028 wrote to memory of 2612 5028 msedge.exe 83 PID 5028 wrote to memory of 2612 5028 msedge.exe 83 PID 5028 wrote to memory of 2612 5028 msedge.exe 83 PID 5028 wrote to memory of 2612 5028 msedge.exe 83 PID 5028 wrote to memory of 2612 5028 msedge.exe 83 PID 5028 wrote to memory of 2612 5028 msedge.exe 83 PID 5028 wrote to memory of 2612 5028 msedge.exe 83 PID 5028 wrote to memory of 2612 5028 msedge.exe 83 PID 5028 wrote to memory of 2612 5028 msedge.exe 83 PID 5028 wrote to memory of 2612 5028 msedge.exe 83 PID 5028 wrote to memory of 2612 5028 msedge.exe 83 PID 5028 wrote to memory of 2612 5028 msedge.exe 83 PID 5028 wrote to memory of 2612 5028 msedge.exe 83 PID 5028 wrote to memory of 2612 5028 msedge.exe 83 PID 5028 wrote to memory of 2612 5028 msedge.exe 83 PID 5028 wrote to memory of 2612 5028 msedge.exe 83 PID 5028 wrote to memory of 2612 5028 msedge.exe 83 PID 5028 wrote to memory of 2612 5028 msedge.exe 83 PID 5028 wrote to memory of 2612 5028 msedge.exe 83 PID 5028 wrote to memory of 2612 5028 msedge.exe 83 PID 5028 wrote to memory of 2612 5028 msedge.exe 83 PID 5028 wrote to memory of 2612 5028 msedge.exe 83 PID 5028 wrote to memory of 2612 5028 msedge.exe 83 PID 5028 wrote to memory of 2612 5028 msedge.exe 83 PID 5028 wrote to memory of 2612 5028 msedge.exe 83 PID 5028 wrote to memory of 2612 5028 msedge.exe 83 PID 5028 wrote to memory of 2612 5028 msedge.exe 83 PID 5028 wrote to memory of 2612 5028 msedge.exe 83 PID 5028 wrote to memory of 2612 5028 msedge.exe 83 PID 5028 wrote to memory of 2612 5028 msedge.exe 83 PID 5028 wrote to memory of 2612 5028 msedge.exe 83 PID 5028 wrote to memory of 4816 5028 msedge.exe 84 PID 5028 wrote to memory of 4816 5028 msedge.exe 84 PID 5028 wrote to memory of 3596 5028 msedge.exe 85 PID 5028 wrote to memory of 3596 5028 msedge.exe 85 PID 5028 wrote to memory of 3596 5028 msedge.exe 85 PID 5028 wrote to memory of 3596 5028 msedge.exe 85 PID 5028 wrote to memory of 3596 5028 msedge.exe 85 PID 5028 wrote to memory of 3596 5028 msedge.exe 85 PID 5028 wrote to memory of 3596 5028 msedge.exe 85 PID 5028 wrote to memory of 3596 5028 msedge.exe 85 PID 5028 wrote to memory of 3596 5028 msedge.exe 85 PID 5028 wrote to memory of 3596 5028 msedge.exe 85 PID 5028 wrote to memory of 3596 5028 msedge.exe 85 PID 5028 wrote to memory of 3596 5028 msedge.exe 85 PID 5028 wrote to memory of 3596 5028 msedge.exe 85 PID 5028 wrote to memory of 3596 5028 msedge.exe 85 PID 5028 wrote to memory of 3596 5028 msedge.exe 85 PID 5028 wrote to memory of 3596 5028 msedge.exe 85 PID 5028 wrote to memory of 3596 5028 msedge.exe 85 PID 5028 wrote to memory of 3596 5028 msedge.exe 85 PID 5028 wrote to memory of 3596 5028 msedge.exe 85 PID 5028 wrote to memory of 3596 5028 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\0838923dc852b4de67023f0f3c0c577c_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5028 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9c68146f8,0x7ff9c6814708,0x7ff9c68147182⤵PID:1852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,5718704997995879198,17302804187044789692,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 /prefetch:22⤵PID:2612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2084,5718704997995879198,17302804187044789692,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2184 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2084,5718704997995879198,17302804187044789692,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2664 /prefetch:82⤵PID:3596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,5718704997995879198,17302804187044789692,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:1808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,5718704997995879198,17302804187044789692,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:2032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,5718704997995879198,17302804187044789692,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2256 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3608
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2072
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4920
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ecf7ca53c80b5245e35839009d12f866
SHA1a7af77cf31d410708ebd35a232a80bddfb0615bb
SHA256882a513b71b26210ff251769b82b2c5d59a932f96d9ce606ca2fab6530a13687
SHA512706722bd22ce27d854036b1b16e6a3cdb36284b66edc76238a79c2e11cee7d1307b121c898ad832eb1af73e4f08d991d64dc0bff529896ffb4ebe9b3dc381696
-
Filesize
152B
MD54dd2754d1bea40445984d65abee82b21
SHA14b6a5658bae9a784a370a115fbb4a12e92bd3390
SHA256183b8e82a0deaa83d04736553671cedb738adc909f483b3c5f822a0e6be7477d
SHA51292d44ee372ad33f892b921efa6cabc78e91025e89f05a22830763217826fa98d51d55711f85c8970ac58abf9adc6c85cc40878032cd6d2589ab226cd099f99e1
-
Filesize
5KB
MD5a8b63609018fdd297e82cea42dbd5df4
SHA14cc9d494d709a5a18c0d913a2c3a62a2e97f632a
SHA2569ed6444f85a18b4bd4365fe54d901b06ec202375988fb2a14adb001f0ae2c3f1
SHA512465f9e429cd806aeb086bf797c21ade171c184b4f713a65e46cbd4eb96ea34a3a131980a4d068273fe8a109a113806c8a4fe89e9d92dea2975c7e0edacce3fe9
-
Filesize
6KB
MD54ba616be30105501af8678e7ed8323db
SHA16210c473e8cbd62222c22f96a06bc604220c9b8d
SHA256ec5c9ce05996153125cb5f7531a4b21042a782da41ac18fb10674237f6c06f72
SHA5121c51fa160a1ad6a1a86eb8451f5b6c1f60089ead5cf9c565b09cc9d7cc3359e1881c8f7a4d9463e9472d6f16affb80450a643623b2668417e71c7fcfd6dfe361
-
Filesize
10KB
MD504c08934d91e0e0418ae4b4e93486764
SHA17a7e481a1261e940798dd00c1498b234f62229b3
SHA25635547cb75013fd837849126949d83d71c14cbcfa7d2572911ec061ab4ab3482c
SHA512b5b7f8379e28e311308d566e083a32845b3772945a9742083685ff7ac9438df953ed9e7c4e6cf289d908f39864277cf1bf0009b70f22831de83e9bb418c71b6e