Analysis
-
max time kernel
145s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04-10-2024 03:02
Static task
static1
Behavioral task
behavioral1
Sample
1190f10bcffd6a63c9c49b1f4b3d38cc_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1190f10bcffd6a63c9c49b1f4b3d38cc_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
1190f10bcffd6a63c9c49b1f4b3d38cc_JaffaCakes118.html
-
Size
139KB
-
MD5
1190f10bcffd6a63c9c49b1f4b3d38cc
-
SHA1
ebec76374f35d4d207e5eccc7844bba2ac8833da
-
SHA256
db818fbded0b754205b978c67ddae2df3daa72a498f741950dcd22567b717cf9
-
SHA512
3a0d665b7aa8b38de1c2c0eb4fb7a30826bc50177bad569a221d4e351fe48f1e59b9ee4218c3519800da191a0deb88c32ac82b32508a876f064b7c90173235d5
-
SSDEEP
1536:SL9Wg3P2Szn6BlO/yLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3om:SLv/yfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4404 msedge.exe 4404 msedge.exe 1228 msedge.exe 1228 msedge.exe 2532 msedge.exe 2532 msedge.exe 2532 msedge.exe 2532 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1228 msedge.exe 1228 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1228 msedge.exe 1228 msedge.exe 1228 msedge.exe 1228 msedge.exe 1228 msedge.exe 1228 msedge.exe 1228 msedge.exe 1228 msedge.exe 1228 msedge.exe 1228 msedge.exe 1228 msedge.exe 1228 msedge.exe 1228 msedge.exe 1228 msedge.exe 1228 msedge.exe 1228 msedge.exe 1228 msedge.exe 1228 msedge.exe 1228 msedge.exe 1228 msedge.exe 1228 msedge.exe 1228 msedge.exe 1228 msedge.exe 1228 msedge.exe 1228 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1228 msedge.exe 1228 msedge.exe 1228 msedge.exe 1228 msedge.exe 1228 msedge.exe 1228 msedge.exe 1228 msedge.exe 1228 msedge.exe 1228 msedge.exe 1228 msedge.exe 1228 msedge.exe 1228 msedge.exe 1228 msedge.exe 1228 msedge.exe 1228 msedge.exe 1228 msedge.exe 1228 msedge.exe 1228 msedge.exe 1228 msedge.exe 1228 msedge.exe 1228 msedge.exe 1228 msedge.exe 1228 msedge.exe 1228 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1228 wrote to memory of 1224 1228 msedge.exe 82 PID 1228 wrote to memory of 1224 1228 msedge.exe 82 PID 1228 wrote to memory of 3516 1228 msedge.exe 83 PID 1228 wrote to memory of 3516 1228 msedge.exe 83 PID 1228 wrote to memory of 3516 1228 msedge.exe 83 PID 1228 wrote to memory of 3516 1228 msedge.exe 83 PID 1228 wrote to memory of 3516 1228 msedge.exe 83 PID 1228 wrote to memory of 3516 1228 msedge.exe 83 PID 1228 wrote to memory of 3516 1228 msedge.exe 83 PID 1228 wrote to memory of 3516 1228 msedge.exe 83 PID 1228 wrote to memory of 3516 1228 msedge.exe 83 PID 1228 wrote to memory of 3516 1228 msedge.exe 83 PID 1228 wrote to memory of 3516 1228 msedge.exe 83 PID 1228 wrote to memory of 3516 1228 msedge.exe 83 PID 1228 wrote to memory of 3516 1228 msedge.exe 83 PID 1228 wrote to memory of 3516 1228 msedge.exe 83 PID 1228 wrote to memory of 3516 1228 msedge.exe 83 PID 1228 wrote to memory of 3516 1228 msedge.exe 83 PID 1228 wrote to memory of 3516 1228 msedge.exe 83 PID 1228 wrote to memory of 3516 1228 msedge.exe 83 PID 1228 wrote to memory of 3516 1228 msedge.exe 83 PID 1228 wrote to memory of 3516 1228 msedge.exe 83 PID 1228 wrote to memory of 3516 1228 msedge.exe 83 PID 1228 wrote to memory of 3516 1228 msedge.exe 83 PID 1228 wrote to memory of 3516 1228 msedge.exe 83 PID 1228 wrote to memory of 3516 1228 msedge.exe 83 PID 1228 wrote to memory of 3516 1228 msedge.exe 83 PID 1228 wrote to memory of 3516 1228 msedge.exe 83 PID 1228 wrote to memory of 3516 1228 msedge.exe 83 PID 1228 wrote to memory of 3516 1228 msedge.exe 83 PID 1228 wrote to memory of 3516 1228 msedge.exe 83 PID 1228 wrote to memory of 3516 1228 msedge.exe 83 PID 1228 wrote to memory of 3516 1228 msedge.exe 83 PID 1228 wrote to memory of 3516 1228 msedge.exe 83 PID 1228 wrote to memory of 3516 1228 msedge.exe 83 PID 1228 wrote to memory of 3516 1228 msedge.exe 83 PID 1228 wrote to memory of 3516 1228 msedge.exe 83 PID 1228 wrote to memory of 3516 1228 msedge.exe 83 PID 1228 wrote to memory of 3516 1228 msedge.exe 83 PID 1228 wrote to memory of 3516 1228 msedge.exe 83 PID 1228 wrote to memory of 3516 1228 msedge.exe 83 PID 1228 wrote to memory of 3516 1228 msedge.exe 83 PID 1228 wrote to memory of 4404 1228 msedge.exe 84 PID 1228 wrote to memory of 4404 1228 msedge.exe 84 PID 1228 wrote to memory of 2120 1228 msedge.exe 85 PID 1228 wrote to memory of 2120 1228 msedge.exe 85 PID 1228 wrote to memory of 2120 1228 msedge.exe 85 PID 1228 wrote to memory of 2120 1228 msedge.exe 85 PID 1228 wrote to memory of 2120 1228 msedge.exe 85 PID 1228 wrote to memory of 2120 1228 msedge.exe 85 PID 1228 wrote to memory of 2120 1228 msedge.exe 85 PID 1228 wrote to memory of 2120 1228 msedge.exe 85 PID 1228 wrote to memory of 2120 1228 msedge.exe 85 PID 1228 wrote to memory of 2120 1228 msedge.exe 85 PID 1228 wrote to memory of 2120 1228 msedge.exe 85 PID 1228 wrote to memory of 2120 1228 msedge.exe 85 PID 1228 wrote to memory of 2120 1228 msedge.exe 85 PID 1228 wrote to memory of 2120 1228 msedge.exe 85 PID 1228 wrote to memory of 2120 1228 msedge.exe 85 PID 1228 wrote to memory of 2120 1228 msedge.exe 85 PID 1228 wrote to memory of 2120 1228 msedge.exe 85 PID 1228 wrote to memory of 2120 1228 msedge.exe 85 PID 1228 wrote to memory of 2120 1228 msedge.exe 85 PID 1228 wrote to memory of 2120 1228 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\1190f10bcffd6a63c9c49b1f4b3d38cc_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1228 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa1fdd46f8,0x7ffa1fdd4708,0x7ffa1fdd47182⤵PID:1224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,18208610705874496947,5811706344532830771,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:22⤵PID:3516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2076,18208610705874496947,5811706344532830771,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2076,18208610705874496947,5811706344532830771,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2780 /prefetch:82⤵PID:2120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,18208610705874496947,5811706344532830771,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:3068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,18208610705874496947,5811706344532830771,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:5096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,18208610705874496947,5811706344532830771,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5016 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2532
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3304
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4684
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d7114a6cd851f9bf56cf771c37d664a2
SHA1769c5d04fd83e583f15ab1ef659de8f883ecab8a
SHA256d2c75c7d68c474d4b8847b4ba6cfd09fe90717f46dd398c86483d825a66e977e
SHA51233bdae2305ae98e7c0de576de5a6600bd70a425e7b891d745cba9de992036df1b3d1df9572edb0f89f320e50962d06532dae9491985b6b57fd37d5f46f7a2ff8
-
Filesize
152B
MD5719923124ee00fb57378e0ebcbe894f7
SHA1cc356a7d27b8b27dc33f21bd4990f286ee13a9f9
SHA256aa22ab845fa08c786bd3366ec39f733d5be80e9ac933ed115ff048ff30090808
SHA512a207b6646500d0d504cf70ee10f57948e58dab7f214ad2e7c4af0e7ca23ce1d37c8c745873137e6c55bdcf0f527031a66d9cc54805a0eac3678be6dd497a5bbc
-
Filesize
5KB
MD55875e31fcfc34f391e2cf1b22ca129a2
SHA133196a119c973fb19c7314e356ec02e43529b1bf
SHA2569334c6b07b1c7454fcdd4bd2e758d906dafc74289d6920e84999583b1096a0c6
SHA512ce3a88ff32854d04a0fee9b74d51ee0d970b47bed3bbaa738381216497aae5887453e29ed04a7a7677b7d4c7f437d034dcadbe98636a19d7aedd4ccc41576876
-
Filesize
6KB
MD550b8e19b1e3cbc084ca7499555171c38
SHA189c30f45f2b6b56ccac74bc119be5d71b75bff02
SHA2562eba8b306fc63e315bb59437b549a5ab7c2115d520e8e7333fa54e9cc428bdef
SHA512bff1830743dc0404eb784ade8ae06b717426aa3e3ed1e0185435dbd295a0ebfa2bee30107cd7b84723409edc45933dc6b8dc18962a7beedea3e9396a220b80ce
-
Filesize
10KB
MD56c0004641470ac96221e509eb068eb14
SHA178d43f8d6551df19b769754e0a966365e9b040d5
SHA256da70ebda5f0c023624be32cacd05183aa05970d46c5922c08ab1dd93d47e3d6d
SHA512c6c3b2726fffac7bf3cb2680ef9cbaa738cc74a4705e1706ade13a241c7799db6106316d55ed2e8c3c7a0cea79db2a3bb6f14f41cae3e61c9dc21073101b710e