Analysis
-
max time kernel
146s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
06-04-2024 14:29
Static task
static1
Behavioral task
behavioral1
Sample
e2be974af9adf766dd530585a62f8a63_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e2be974af9adf766dd530585a62f8a63_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
e2be974af9adf766dd530585a62f8a63_JaffaCakes118.html
-
Size
16KB
-
MD5
e2be974af9adf766dd530585a62f8a63
-
SHA1
03c6a051463cc047bebcefab6beea5de864e1c34
-
SHA256
e045400f1deffbca923e3075b0d2d3cfaf1cc09d0c1ef09b4d1d76937139e1cc
-
SHA512
013986c517e230e23de5205286fba5514672b3b85a2c2628805f9fe8dbbfbd0e657d8b277be94774add2c6b5f5417667ace59aca9a531c7f84a57487d32eb6be
-
SSDEEP
192:A0VQKmxtWM05LJGbCTfdoPOePWgYLPsO2lQ1yhQw6d6+g5xA6k82ja:DbJGwQOrg53lB
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4552 msedge.exe 4552 msedge.exe 2188 msedge.exe 2188 msedge.exe 3508 identity_helper.exe 3508 identity_helper.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2188 wrote to memory of 4544 2188 msedge.exe 85 PID 2188 wrote to memory of 4544 2188 msedge.exe 85 PID 2188 wrote to memory of 4604 2188 msedge.exe 86 PID 2188 wrote to memory of 4604 2188 msedge.exe 86 PID 2188 wrote to memory of 4604 2188 msedge.exe 86 PID 2188 wrote to memory of 4604 2188 msedge.exe 86 PID 2188 wrote to memory of 4604 2188 msedge.exe 86 PID 2188 wrote to memory of 4604 2188 msedge.exe 86 PID 2188 wrote to memory of 4604 2188 msedge.exe 86 PID 2188 wrote to memory of 4604 2188 msedge.exe 86 PID 2188 wrote to memory of 4604 2188 msedge.exe 86 PID 2188 wrote to memory of 4604 2188 msedge.exe 86 PID 2188 wrote to memory of 4604 2188 msedge.exe 86 PID 2188 wrote to memory of 4604 2188 msedge.exe 86 PID 2188 wrote to memory of 4604 2188 msedge.exe 86 PID 2188 wrote to memory of 4604 2188 msedge.exe 86 PID 2188 wrote to memory of 4604 2188 msedge.exe 86 PID 2188 wrote to memory of 4604 2188 msedge.exe 86 PID 2188 wrote to memory of 4604 2188 msedge.exe 86 PID 2188 wrote to memory of 4604 2188 msedge.exe 86 PID 2188 wrote to memory of 4604 2188 msedge.exe 86 PID 2188 wrote to memory of 4604 2188 msedge.exe 86 PID 2188 wrote to memory of 4604 2188 msedge.exe 86 PID 2188 wrote to memory of 4604 2188 msedge.exe 86 PID 2188 wrote to memory of 4604 2188 msedge.exe 86 PID 2188 wrote to memory of 4604 2188 msedge.exe 86 PID 2188 wrote to memory of 4604 2188 msedge.exe 86 PID 2188 wrote to memory of 4604 2188 msedge.exe 86 PID 2188 wrote to memory of 4604 2188 msedge.exe 86 PID 2188 wrote to memory of 4604 2188 msedge.exe 86 PID 2188 wrote to memory of 4604 2188 msedge.exe 86 PID 2188 wrote to memory of 4604 2188 msedge.exe 86 PID 2188 wrote to memory of 4604 2188 msedge.exe 86 PID 2188 wrote to memory of 4604 2188 msedge.exe 86 PID 2188 wrote to memory of 4604 2188 msedge.exe 86 PID 2188 wrote to memory of 4604 2188 msedge.exe 86 PID 2188 wrote to memory of 4604 2188 msedge.exe 86 PID 2188 wrote to memory of 4604 2188 msedge.exe 86 PID 2188 wrote to memory of 4604 2188 msedge.exe 86 PID 2188 wrote to memory of 4604 2188 msedge.exe 86 PID 2188 wrote to memory of 4604 2188 msedge.exe 86 PID 2188 wrote to memory of 4604 2188 msedge.exe 86 PID 2188 wrote to memory of 4552 2188 msedge.exe 87 PID 2188 wrote to memory of 4552 2188 msedge.exe 87 PID 2188 wrote to memory of 3476 2188 msedge.exe 88 PID 2188 wrote to memory of 3476 2188 msedge.exe 88 PID 2188 wrote to memory of 3476 2188 msedge.exe 88 PID 2188 wrote to memory of 3476 2188 msedge.exe 88 PID 2188 wrote to memory of 3476 2188 msedge.exe 88 PID 2188 wrote to memory of 3476 2188 msedge.exe 88 PID 2188 wrote to memory of 3476 2188 msedge.exe 88 PID 2188 wrote to memory of 3476 2188 msedge.exe 88 PID 2188 wrote to memory of 3476 2188 msedge.exe 88 PID 2188 wrote to memory of 3476 2188 msedge.exe 88 PID 2188 wrote to memory of 3476 2188 msedge.exe 88 PID 2188 wrote to memory of 3476 2188 msedge.exe 88 PID 2188 wrote to memory of 3476 2188 msedge.exe 88 PID 2188 wrote to memory of 3476 2188 msedge.exe 88 PID 2188 wrote to memory of 3476 2188 msedge.exe 88 PID 2188 wrote to memory of 3476 2188 msedge.exe 88 PID 2188 wrote to memory of 3476 2188 msedge.exe 88 PID 2188 wrote to memory of 3476 2188 msedge.exe 88 PID 2188 wrote to memory of 3476 2188 msedge.exe 88 PID 2188 wrote to memory of 3476 2188 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\e2be974af9adf766dd530585a62f8a63_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdf52a46f8,0x7ffdf52a4708,0x7ffdf52a47182⤵PID:4544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,11082237716611784257,2589503547049229137,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2088 /prefetch:22⤵PID:4604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2068,11082237716611784257,2589503547049229137,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2300 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2068,11082237716611784257,2589503547049229137,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2864 /prefetch:82⤵PID:3476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,11082237716611784257,2589503547049229137,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:3432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,11082237716611784257,2589503547049229137,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:4112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,11082237716611784257,2589503547049229137,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2212 /prefetch:82⤵PID:5000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,11082237716611784257,2589503547049229137,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2212 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,11082237716611784257,2589503547049229137,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5152 /prefetch:12⤵PID:1616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,11082237716611784257,2589503547049229137,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5172 /prefetch:12⤵PID:3928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,11082237716611784257,2589503547049229137,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3504 /prefetch:12⤵PID:1436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,11082237716611784257,2589503547049229137,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5548 /prefetch:12⤵PID:4428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,11082237716611784257,2589503547049229137,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3096 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1560
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4728
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:980
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD57c6136bc98a5aedca2ea3004e9fbe67d
SHA174318d997f4c9c351eef86d040bc9b085ce1ad4f
SHA25650c3bd40caf7e9a82496a710f58804aa3536b44d57e2ee5e2af028cbebc6c2f2
SHA5122d2fb839321c56e4cb80562e9a1daa4baf48924d635729dc5504a26462796919906f0097dd1fc7fd053394c0eea13c25219dec54ffe6e9abb6e8cb9afa66bada
-
Filesize
152B
MD55c6aef82e50d05ffc0cf52a6c6d69c91
SHA1c203efe5b45b0630fee7bd364fe7d63b769e2351
SHA256d9068cf3d04d62a9fb1cdd4c3cf7c263920159171d1b84cb49eff7cf4ed5bc32
SHA51277ad48936e8c3ee107a121e0b2d1216723407f76872e85c36413237ca1c47b8c40038b8a6349b072bbcc6a29e27ddda77cf686fa97569f4d86531e6b2ac485ed
-
Filesize
182B
MD53881714a6b39fbd2368ecf1de7b3f37c
SHA14e2df7d1b68d308e672ca2e983a464a86788d524
SHA256ca4b0088b6ca8a89455d63a8a0e6ea243eac1002e47ca75128e7683c16df863c
SHA512bc96296482af6bcf7cc7f498805957d17985e5635e5fb12a99270da4652e026ac088ebc1fe248a027bc16b05004ce04a47ee8f7a8d13145fd77c7ca81e76d350
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
6KB
MD59edf5cf10655372d675386903b97b57c
SHA1d59816d5d93fa6e07bf58243f8fea2a25e3b460d
SHA256aebb01e58e90d13d385a9cbaa0b45984b31a34b6fb0c94eadb990a6ef89a1dd4
SHA5122472cfaadff59ca495e3108856298206bd66c10d3d68093046183660cfe9a2b107af2b74f7f8f3324d7e8058f4430c4bc2eecf035d8138d41411ae0116cb8c26
-
Filesize
6KB
MD53af72915e1ddab1d771a7d6ae6d4bfca
SHA1e3483bbbca92e6a910f7b7c3d131570daa0b3a40
SHA256ae635d3beca95c1a987a765505debc452a1d20759f95fc0091b64384704407ea
SHA51288bcbdd76b927017ef581bc02c8362133c04767d378b6cb48fa9603b1889e048d5fe3a346c4c72cf9277fd54617495a43315c29937165d1d7580b809dc6bceb1
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5fb0765d725651b03f33fd3616c175f6e
SHA19d4694c9e7694fc26b5b4f2ded75032dc5bd8c20
SHA2567af65b1a47764bd2be079a87029811b150439bc1ba600b047042fccb3a864e15
SHA51224177312e24b5cf726259f681893e8f35d51628bc4500e3288433e4aada66e7af402041c262e81d347f86212316c78bdc5b8bd21d4320f676f90c9d1ed837299