Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04-10-2024 07:56
Static task
static1
Behavioral task
behavioral1
Sample
127b3c51c6a399bb3cfa843d77a4abaf_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
127b3c51c6a399bb3cfa843d77a4abaf_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
127b3c51c6a399bb3cfa843d77a4abaf_JaffaCakes118.html
-
Size
139KB
-
MD5
127b3c51c6a399bb3cfa843d77a4abaf
-
SHA1
afe5b968c79e27c0e908233d5538491b38fe5d2d
-
SHA256
32045424fd952dda4560885410ce83de2e6555aaaa724f50773dd7f65d53ea92
-
SHA512
d229e6f53ee250fd3a1ce9befbf935c2e9e5dbd2c0ae8109e1986079cb3958902ef327f97533910c009742bd4d9cd27cffbfb7f1c0bad363974c4fec6d72a0ab
-
SSDEEP
1536:S82vmFOvOxXCbAulUyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3p:S82+J7FyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4008 msedge.exe 4008 msedge.exe 2212 msedge.exe 2212 msedge.exe 1556 msedge.exe 1556 msedge.exe 1556 msedge.exe 1556 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2212 msedge.exe 2212 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2212 msedge.exe 2212 msedge.exe 2212 msedge.exe 2212 msedge.exe 2212 msedge.exe 2212 msedge.exe 2212 msedge.exe 2212 msedge.exe 2212 msedge.exe 2212 msedge.exe 2212 msedge.exe 2212 msedge.exe 2212 msedge.exe 2212 msedge.exe 2212 msedge.exe 2212 msedge.exe 2212 msedge.exe 2212 msedge.exe 2212 msedge.exe 2212 msedge.exe 2212 msedge.exe 2212 msedge.exe 2212 msedge.exe 2212 msedge.exe 2212 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2212 msedge.exe 2212 msedge.exe 2212 msedge.exe 2212 msedge.exe 2212 msedge.exe 2212 msedge.exe 2212 msedge.exe 2212 msedge.exe 2212 msedge.exe 2212 msedge.exe 2212 msedge.exe 2212 msedge.exe 2212 msedge.exe 2212 msedge.exe 2212 msedge.exe 2212 msedge.exe 2212 msedge.exe 2212 msedge.exe 2212 msedge.exe 2212 msedge.exe 2212 msedge.exe 2212 msedge.exe 2212 msedge.exe 2212 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2212 wrote to memory of 2540 2212 msedge.exe 81 PID 2212 wrote to memory of 2540 2212 msedge.exe 81 PID 2212 wrote to memory of 668 2212 msedge.exe 82 PID 2212 wrote to memory of 668 2212 msedge.exe 82 PID 2212 wrote to memory of 668 2212 msedge.exe 82 PID 2212 wrote to memory of 668 2212 msedge.exe 82 PID 2212 wrote to memory of 668 2212 msedge.exe 82 PID 2212 wrote to memory of 668 2212 msedge.exe 82 PID 2212 wrote to memory of 668 2212 msedge.exe 82 PID 2212 wrote to memory of 668 2212 msedge.exe 82 PID 2212 wrote to memory of 668 2212 msedge.exe 82 PID 2212 wrote to memory of 668 2212 msedge.exe 82 PID 2212 wrote to memory of 668 2212 msedge.exe 82 PID 2212 wrote to memory of 668 2212 msedge.exe 82 PID 2212 wrote to memory of 668 2212 msedge.exe 82 PID 2212 wrote to memory of 668 2212 msedge.exe 82 PID 2212 wrote to memory of 668 2212 msedge.exe 82 PID 2212 wrote to memory of 668 2212 msedge.exe 82 PID 2212 wrote to memory of 668 2212 msedge.exe 82 PID 2212 wrote to memory of 668 2212 msedge.exe 82 PID 2212 wrote to memory of 668 2212 msedge.exe 82 PID 2212 wrote to memory of 668 2212 msedge.exe 82 PID 2212 wrote to memory of 668 2212 msedge.exe 82 PID 2212 wrote to memory of 668 2212 msedge.exe 82 PID 2212 wrote to memory of 668 2212 msedge.exe 82 PID 2212 wrote to memory of 668 2212 msedge.exe 82 PID 2212 wrote to memory of 668 2212 msedge.exe 82 PID 2212 wrote to memory of 668 2212 msedge.exe 82 PID 2212 wrote to memory of 668 2212 msedge.exe 82 PID 2212 wrote to memory of 668 2212 msedge.exe 82 PID 2212 wrote to memory of 668 2212 msedge.exe 82 PID 2212 wrote to memory of 668 2212 msedge.exe 82 PID 2212 wrote to memory of 668 2212 msedge.exe 82 PID 2212 wrote to memory of 668 2212 msedge.exe 82 PID 2212 wrote to memory of 668 2212 msedge.exe 82 PID 2212 wrote to memory of 668 2212 msedge.exe 82 PID 2212 wrote to memory of 668 2212 msedge.exe 82 PID 2212 wrote to memory of 668 2212 msedge.exe 82 PID 2212 wrote to memory of 668 2212 msedge.exe 82 PID 2212 wrote to memory of 668 2212 msedge.exe 82 PID 2212 wrote to memory of 668 2212 msedge.exe 82 PID 2212 wrote to memory of 668 2212 msedge.exe 82 PID 2212 wrote to memory of 4008 2212 msedge.exe 83 PID 2212 wrote to memory of 4008 2212 msedge.exe 83 PID 2212 wrote to memory of 5076 2212 msedge.exe 84 PID 2212 wrote to memory of 5076 2212 msedge.exe 84 PID 2212 wrote to memory of 5076 2212 msedge.exe 84 PID 2212 wrote to memory of 5076 2212 msedge.exe 84 PID 2212 wrote to memory of 5076 2212 msedge.exe 84 PID 2212 wrote to memory of 5076 2212 msedge.exe 84 PID 2212 wrote to memory of 5076 2212 msedge.exe 84 PID 2212 wrote to memory of 5076 2212 msedge.exe 84 PID 2212 wrote to memory of 5076 2212 msedge.exe 84 PID 2212 wrote to memory of 5076 2212 msedge.exe 84 PID 2212 wrote to memory of 5076 2212 msedge.exe 84 PID 2212 wrote to memory of 5076 2212 msedge.exe 84 PID 2212 wrote to memory of 5076 2212 msedge.exe 84 PID 2212 wrote to memory of 5076 2212 msedge.exe 84 PID 2212 wrote to memory of 5076 2212 msedge.exe 84 PID 2212 wrote to memory of 5076 2212 msedge.exe 84 PID 2212 wrote to memory of 5076 2212 msedge.exe 84 PID 2212 wrote to memory of 5076 2212 msedge.exe 84 PID 2212 wrote to memory of 5076 2212 msedge.exe 84 PID 2212 wrote to memory of 5076 2212 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\127b3c51c6a399bb3cfa843d77a4abaf_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff6b6646f8,0x7fff6b664708,0x7fff6b6647182⤵PID:2540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,1729303481079721454,9139253150841259075,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2156 /prefetch:22⤵PID:668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,1729303481079721454,9139253150841259075,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2136,1729303481079721454,9139253150841259075,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2648 /prefetch:82⤵PID:5076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,1729303481079721454,9139253150841259075,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:1328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,1729303481079721454,9139253150841259075,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:1792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,1729303481079721454,9139253150841259075,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1744 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1556
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1728
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3260
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ab8ce148cb7d44f709fb1c460d03e1b0
SHA144d15744015155f3e74580c93317e12d2cc0f859
SHA256014006a90e43ea9a1903b08b843a5aab8ad3823d22e26e5b113fad5f9fa620ff
SHA512f685423b1eaee18a2a06030b4b2977335f62499c0041c142a92f6e6f846c2b9ce54324b6ae94efbbb303282dcda70e2b1597c748fddc251c0b3122a412c2d7c4
-
Filesize
152B
MD538f59a47b777f2fc52088e96ffb2baaf
SHA1267224482588b41a96d813f6d9e9d924867062db
SHA25613569c5681c71dc42ab57d34879f5a567d7b94afe0e8f6d7c6f6c1314fb0087b
SHA5124657d13e1bb7cdd7e83f5f2562f5598cca12edf839626ae96da43e943b5550fab46a14b9018f1bec90de88cc714f637605531ccda99deb9e537908ddb826113b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\986dc58f-d68e-4187-b4ae-247b95949613.tmp
Filesize477B
MD533a0e77b06522cf728e0e8d02d7434f5
SHA11c947959863bd6734c890cf62feee9cf0a1c9ed7
SHA256e9d2dd8d9210f351fdce33eee111d1065710c9c538f47a1fd7086efcbc896951
SHA512b71165fdc1ed17b3427484f83a4e70b7d9a290234ce60102423afb8dcaf0a03e09980cf8ee1c78c5744e566ba67df1775a3d398af4c112d83f8957481415f653
-
Filesize
6KB
MD50b9f01bc9767fb42f3aa9840cda2d0fa
SHA126a83b28ccacd3ecb25f5e5b512a6c9253ede42d
SHA256a8bb898b6e9b62174b647a5d43952488acd30dd8c27d82d17b2bbbeea724bdb0
SHA51258369ae45eaa30b7af3c98d00ca5a7e65071940060a5c8402fbe55cd0a65828d02ee0fb8cf5ecb49ea9ea5be353125081cc93f3014b6e8d06c9b3d72223ef357
-
Filesize
5KB
MD5d3ba15ef9f0142151558bc2a220e2040
SHA130d6dc277b26f86a5aee5a86ec0cea330dfb6833
SHA256c8b9485645124a050fc2eb2accc4651b579d64134f7c7fd3d4dbc3a519b661c8
SHA512bd42a456cb608caee97869446866e121ee894d6bea1e3d76e76e63793e2dcbbe772fc85e9ff38007360e3d2129309fd97456972eec2105f4e68a2c4e6852ca0d
-
Filesize
10KB
MD550ad19eccfac79a70cfa2a3cd825402c
SHA1e7e706a720e9b81889a1b227ca21ff4be315bc1a
SHA256524a43264133f2b1f640a96257a8ffd303ed78fe2af1988ad988d046e547b922
SHA5122a2d3e6d175ed06f6916c7cef4b22e892849660d17886069f8830878128b471d7c0b9a073f2582e6d46522c8ebae9f9be957c0f928353cbaf902a1bb188f1e75