Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
03-10-2024 01:39
Static task
static1
Behavioral task
behavioral1
Sample
0d55181c3e6f8d0938f266ddc32d222a_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0d55181c3e6f8d0938f266ddc32d222a_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
0d55181c3e6f8d0938f266ddc32d222a_JaffaCakes118.html
-
Size
138KB
-
MD5
0d55181c3e6f8d0938f266ddc32d222a
-
SHA1
35fa1b8309801b56239a63cbe05506ceb1582957
-
SHA256
d01da7f4a695b4b665b0a58b8c936c34638d489668fdf79820f9ef1be471442e
-
SHA512
8460bcb7d2ba5396e6a5712db46f4977538f761593abbf874152a0a729021b3974b362f0c427ab89034b3d7f1f8f40214a6b96cb69d0343a74bf3eb66a8f4f2a
-
SSDEEP
1536:SWDgnnCjleyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTs:SWDoyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2956 msedge.exe 2956 msedge.exe 4132 msedge.exe 4132 msedge.exe 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe 4720 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4132 msedge.exe 4132 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4132 wrote to memory of 540 4132 msedge.exe 82 PID 4132 wrote to memory of 540 4132 msedge.exe 82 PID 4132 wrote to memory of 3968 4132 msedge.exe 83 PID 4132 wrote to memory of 3968 4132 msedge.exe 83 PID 4132 wrote to memory of 3968 4132 msedge.exe 83 PID 4132 wrote to memory of 3968 4132 msedge.exe 83 PID 4132 wrote to memory of 3968 4132 msedge.exe 83 PID 4132 wrote to memory of 3968 4132 msedge.exe 83 PID 4132 wrote to memory of 3968 4132 msedge.exe 83 PID 4132 wrote to memory of 3968 4132 msedge.exe 83 PID 4132 wrote to memory of 3968 4132 msedge.exe 83 PID 4132 wrote to memory of 3968 4132 msedge.exe 83 PID 4132 wrote to memory of 3968 4132 msedge.exe 83 PID 4132 wrote to memory of 3968 4132 msedge.exe 83 PID 4132 wrote to memory of 3968 4132 msedge.exe 83 PID 4132 wrote to memory of 3968 4132 msedge.exe 83 PID 4132 wrote to memory of 3968 4132 msedge.exe 83 PID 4132 wrote to memory of 3968 4132 msedge.exe 83 PID 4132 wrote to memory of 3968 4132 msedge.exe 83 PID 4132 wrote to memory of 3968 4132 msedge.exe 83 PID 4132 wrote to memory of 3968 4132 msedge.exe 83 PID 4132 wrote to memory of 3968 4132 msedge.exe 83 PID 4132 wrote to memory of 3968 4132 msedge.exe 83 PID 4132 wrote to memory of 3968 4132 msedge.exe 83 PID 4132 wrote to memory of 3968 4132 msedge.exe 83 PID 4132 wrote to memory of 3968 4132 msedge.exe 83 PID 4132 wrote to memory of 3968 4132 msedge.exe 83 PID 4132 wrote to memory of 3968 4132 msedge.exe 83 PID 4132 wrote to memory of 3968 4132 msedge.exe 83 PID 4132 wrote to memory of 3968 4132 msedge.exe 83 PID 4132 wrote to memory of 3968 4132 msedge.exe 83 PID 4132 wrote to memory of 3968 4132 msedge.exe 83 PID 4132 wrote to memory of 3968 4132 msedge.exe 83 PID 4132 wrote to memory of 3968 4132 msedge.exe 83 PID 4132 wrote to memory of 3968 4132 msedge.exe 83 PID 4132 wrote to memory of 3968 4132 msedge.exe 83 PID 4132 wrote to memory of 3968 4132 msedge.exe 83 PID 4132 wrote to memory of 3968 4132 msedge.exe 83 PID 4132 wrote to memory of 3968 4132 msedge.exe 83 PID 4132 wrote to memory of 3968 4132 msedge.exe 83 PID 4132 wrote to memory of 3968 4132 msedge.exe 83 PID 4132 wrote to memory of 3968 4132 msedge.exe 83 PID 4132 wrote to memory of 2956 4132 msedge.exe 84 PID 4132 wrote to memory of 2956 4132 msedge.exe 84 PID 4132 wrote to memory of 4076 4132 msedge.exe 85 PID 4132 wrote to memory of 4076 4132 msedge.exe 85 PID 4132 wrote to memory of 4076 4132 msedge.exe 85 PID 4132 wrote to memory of 4076 4132 msedge.exe 85 PID 4132 wrote to memory of 4076 4132 msedge.exe 85 PID 4132 wrote to memory of 4076 4132 msedge.exe 85 PID 4132 wrote to memory of 4076 4132 msedge.exe 85 PID 4132 wrote to memory of 4076 4132 msedge.exe 85 PID 4132 wrote to memory of 4076 4132 msedge.exe 85 PID 4132 wrote to memory of 4076 4132 msedge.exe 85 PID 4132 wrote to memory of 4076 4132 msedge.exe 85 PID 4132 wrote to memory of 4076 4132 msedge.exe 85 PID 4132 wrote to memory of 4076 4132 msedge.exe 85 PID 4132 wrote to memory of 4076 4132 msedge.exe 85 PID 4132 wrote to memory of 4076 4132 msedge.exe 85 PID 4132 wrote to memory of 4076 4132 msedge.exe 85 PID 4132 wrote to memory of 4076 4132 msedge.exe 85 PID 4132 wrote to memory of 4076 4132 msedge.exe 85 PID 4132 wrote to memory of 4076 4132 msedge.exe 85 PID 4132 wrote to memory of 4076 4132 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\0d55181c3e6f8d0938f266ddc32d222a_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4132 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9a02a46f8,0x7ff9a02a4708,0x7ff9a02a47182⤵PID:540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,14541498578130735068,2988656195808741697,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2080 /prefetch:22⤵PID:3968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2068,14541498578130735068,2988656195808741697,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2348 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2068,14541498578130735068,2988656195808741697,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2700 /prefetch:82⤵PID:4076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,14541498578130735068,2988656195808741697,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:1664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,14541498578130735068,2988656195808741697,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:3328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,14541498578130735068,2988656195808741697,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4796 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4720
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4396
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2056
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d7114a6cd851f9bf56cf771c37d664a2
SHA1769c5d04fd83e583f15ab1ef659de8f883ecab8a
SHA256d2c75c7d68c474d4b8847b4ba6cfd09fe90717f46dd398c86483d825a66e977e
SHA51233bdae2305ae98e7c0de576de5a6600bd70a425e7b891d745cba9de992036df1b3d1df9572edb0f89f320e50962d06532dae9491985b6b57fd37d5f46f7a2ff8
-
Filesize
152B
MD5719923124ee00fb57378e0ebcbe894f7
SHA1cc356a7d27b8b27dc33f21bd4990f286ee13a9f9
SHA256aa22ab845fa08c786bd3366ec39f733d5be80e9ac933ed115ff048ff30090808
SHA512a207b6646500d0d504cf70ee10f57948e58dab7f214ad2e7c4af0e7ca23ce1d37c8c745873137e6c55bdcf0f527031a66d9cc54805a0eac3678be6dd497a5bbc
-
Filesize
5KB
MD50f458f64995c1e4e1d1cf0c9e2f3fdb5
SHA1ce2697a6de41af1a1f622911548431dc6a7d65ed
SHA256608d05ddbdb1284027ef752c1e02c090e483bdad0622c6c467c8db4f8eee9fdf
SHA51222efda46475a30e4fd56040d7b283fc8a855769a62e6dc19841e472d821f4407e8675bfe245b71b4b8dafb97a4cd090a7ea661a6e3978d7974bc87254411a188
-
Filesize
6KB
MD5ee909ef15b2f678ad400e078698f54a2
SHA13173bb83912f6c246c9941eae9f0c8d42440e0af
SHA256809832a8224803b3d3ab99b37a110d92df73dee1eb24734be27d08707fdeadc2
SHA512b63f52985088b306a63af301a3779373a6a99fafa18ff3436a2bae58fd45a244fda4fa924c81ad5cd4317f28891f0477dc2512e5818125e536935ff8133a53e3
-
Filesize
10KB
MD59dcf6dd34110ef84a5a77f30e1b603f2
SHA17c9cac96ea7eff5796544dc1e9a108d5800a71c3
SHA256d370d3f5ad16b70bb3e7046debebdba38caee8a73745de4d521a014a57eb8d22
SHA512490b3f32bf51a194d9cbde5c46cb682b06ea996a569d3856cdf5a13c0fbdb92278cd380080a4c0315fe47574326bcbd32158630da4dba27d94214654f2e272ea