Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
21/04/2024, 15:22
Static task
static1
Behavioral task
behavioral1
Sample
ff955243325ac4268da593c217c986c8_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
ff955243325ac4268da593c217c986c8_JaffaCakes118.html
Resource
win10v2004-20240412-en
General
-
Target
ff955243325ac4268da593c217c986c8_JaffaCakes118.html
-
Size
3KB
-
MD5
ff955243325ac4268da593c217c986c8
-
SHA1
504c87df48915a43eab4c03527d59ddc677af2c2
-
SHA256
57906755023877b44ecc4f3cf88f7e53e9b698e506d00167dd1e855428488196
-
SHA512
9ad14dd1e648f38f7d6b5a628fc0ea7620b502b39ae24a2b5879edf17637d0622a55bddf70144080bba44d85dfdf9ab4488bce9bbcf81512dfb63b7240e9a456
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2952 msedge.exe 2952 msedge.exe 2580 msedge.exe 2580 msedge.exe 2584 identity_helper.exe 2584 identity_helper.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2580 msedge.exe 2580 msedge.exe 2580 msedge.exe 2580 msedge.exe 2580 msedge.exe 2580 msedge.exe 2580 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2580 msedge.exe 2580 msedge.exe 2580 msedge.exe 2580 msedge.exe 2580 msedge.exe 2580 msedge.exe 2580 msedge.exe 2580 msedge.exe 2580 msedge.exe 2580 msedge.exe 2580 msedge.exe 2580 msedge.exe 2580 msedge.exe 2580 msedge.exe 2580 msedge.exe 2580 msedge.exe 2580 msedge.exe 2580 msedge.exe 2580 msedge.exe 2580 msedge.exe 2580 msedge.exe 2580 msedge.exe 2580 msedge.exe 2580 msedge.exe 2580 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2580 msedge.exe 2580 msedge.exe 2580 msedge.exe 2580 msedge.exe 2580 msedge.exe 2580 msedge.exe 2580 msedge.exe 2580 msedge.exe 2580 msedge.exe 2580 msedge.exe 2580 msedge.exe 2580 msedge.exe 2580 msedge.exe 2580 msedge.exe 2580 msedge.exe 2580 msedge.exe 2580 msedge.exe 2580 msedge.exe 2580 msedge.exe 2580 msedge.exe 2580 msedge.exe 2580 msedge.exe 2580 msedge.exe 2580 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2580 wrote to memory of 4360 2580 msedge.exe 89 PID 2580 wrote to memory of 4360 2580 msedge.exe 89 PID 2580 wrote to memory of 2700 2580 msedge.exe 90 PID 2580 wrote to memory of 2700 2580 msedge.exe 90 PID 2580 wrote to memory of 2700 2580 msedge.exe 90 PID 2580 wrote to memory of 2700 2580 msedge.exe 90 PID 2580 wrote to memory of 2700 2580 msedge.exe 90 PID 2580 wrote to memory of 2700 2580 msedge.exe 90 PID 2580 wrote to memory of 2700 2580 msedge.exe 90 PID 2580 wrote to memory of 2700 2580 msedge.exe 90 PID 2580 wrote to memory of 2700 2580 msedge.exe 90 PID 2580 wrote to memory of 2700 2580 msedge.exe 90 PID 2580 wrote to memory of 2700 2580 msedge.exe 90 PID 2580 wrote to memory of 2700 2580 msedge.exe 90 PID 2580 wrote to memory of 2700 2580 msedge.exe 90 PID 2580 wrote to memory of 2700 2580 msedge.exe 90 PID 2580 wrote to memory of 2700 2580 msedge.exe 90 PID 2580 wrote to memory of 2700 2580 msedge.exe 90 PID 2580 wrote to memory of 2700 2580 msedge.exe 90 PID 2580 wrote to memory of 2700 2580 msedge.exe 90 PID 2580 wrote to memory of 2700 2580 msedge.exe 90 PID 2580 wrote to memory of 2700 2580 msedge.exe 90 PID 2580 wrote to memory of 2700 2580 msedge.exe 90 PID 2580 wrote to memory of 2700 2580 msedge.exe 90 PID 2580 wrote to memory of 2700 2580 msedge.exe 90 PID 2580 wrote to memory of 2700 2580 msedge.exe 90 PID 2580 wrote to memory of 2700 2580 msedge.exe 90 PID 2580 wrote to memory of 2700 2580 msedge.exe 90 PID 2580 wrote to memory of 2700 2580 msedge.exe 90 PID 2580 wrote to memory of 2700 2580 msedge.exe 90 PID 2580 wrote to memory of 2700 2580 msedge.exe 90 PID 2580 wrote to memory of 2700 2580 msedge.exe 90 PID 2580 wrote to memory of 2700 2580 msedge.exe 90 PID 2580 wrote to memory of 2700 2580 msedge.exe 90 PID 2580 wrote to memory of 2700 2580 msedge.exe 90 PID 2580 wrote to memory of 2700 2580 msedge.exe 90 PID 2580 wrote to memory of 2700 2580 msedge.exe 90 PID 2580 wrote to memory of 2700 2580 msedge.exe 90 PID 2580 wrote to memory of 2700 2580 msedge.exe 90 PID 2580 wrote to memory of 2700 2580 msedge.exe 90 PID 2580 wrote to memory of 2700 2580 msedge.exe 90 PID 2580 wrote to memory of 2700 2580 msedge.exe 90 PID 2580 wrote to memory of 2952 2580 msedge.exe 91 PID 2580 wrote to memory of 2952 2580 msedge.exe 91 PID 2580 wrote to memory of 3732 2580 msedge.exe 92 PID 2580 wrote to memory of 3732 2580 msedge.exe 92 PID 2580 wrote to memory of 3732 2580 msedge.exe 92 PID 2580 wrote to memory of 3732 2580 msedge.exe 92 PID 2580 wrote to memory of 3732 2580 msedge.exe 92 PID 2580 wrote to memory of 3732 2580 msedge.exe 92 PID 2580 wrote to memory of 3732 2580 msedge.exe 92 PID 2580 wrote to memory of 3732 2580 msedge.exe 92 PID 2580 wrote to memory of 3732 2580 msedge.exe 92 PID 2580 wrote to memory of 3732 2580 msedge.exe 92 PID 2580 wrote to memory of 3732 2580 msedge.exe 92 PID 2580 wrote to memory of 3732 2580 msedge.exe 92 PID 2580 wrote to memory of 3732 2580 msedge.exe 92 PID 2580 wrote to memory of 3732 2580 msedge.exe 92 PID 2580 wrote to memory of 3732 2580 msedge.exe 92 PID 2580 wrote to memory of 3732 2580 msedge.exe 92 PID 2580 wrote to memory of 3732 2580 msedge.exe 92 PID 2580 wrote to memory of 3732 2580 msedge.exe 92 PID 2580 wrote to memory of 3732 2580 msedge.exe 92 PID 2580 wrote to memory of 3732 2580 msedge.exe 92
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\ff955243325ac4268da593c217c986c8_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffef73e46f8,0x7ffef73e4708,0x7ffef73e47182⤵PID:4360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2036,11827140634173593555,14944583528170454248,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2056 /prefetch:22⤵PID:2700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2036,11827140634173593555,14944583528170454248,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2128 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2036,11827140634173593555,14944583528170454248,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2784 /prefetch:82⤵PID:3732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,11827140634173593555,14944583528170454248,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,11827140634173593555,14944583528170454248,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,11827140634173593555,14944583528170454248,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4832 /prefetch:12⤵PID:4076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2036,11827140634173593555,14944583528170454248,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5476 /prefetch:82⤵PID:3036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2036,11827140634173593555,14944583528170454248,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5476 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,11827140634173593555,14944583528170454248,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5492 /prefetch:12⤵PID:3708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,11827140634173593555,14944583528170454248,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5568 /prefetch:12⤵PID:1168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,11827140634173593555,14944583528170454248,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4256 /prefetch:12⤵PID:672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,11827140634173593555,14944583528170454248,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4960 /prefetch:12⤵PID:776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2036,11827140634173593555,14944583528170454248,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3960 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4856
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:208
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1792
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD58f38951143ede15b2f00d3352e458d47
SHA11130065985230474657d5f744e99312f22c69485
SHA2563a559763ad1634ef40108700025a909cc76ca8c66d6c77f41a07e2ced4c9ff65
SHA5125376e21235d1b828a0d04e35d26154a1e52db3fe02690fa272ba982da55b88bb0ab7473e6b2031fe8d19798abefec072e22542132b175912b31279cda6f15f57
-
Filesize
152B
MD5b533661b945a612876de1e58ce73d065
SHA1d93286945efeb7f33b49f8e594cdb264884c827e
SHA256e5480b47432d7b0ca972afe477fac49f5fc1e8e82aaeab6401de99045949bd65
SHA512672bc0f694e763a8597eebcce7728716a09515ad17854fae58d1f8df8aefca152eaabfd637bbaf8acae8e7936309809525a9f058a990148964a58c831d96dc4a
-
Filesize
276B
MD563e94862b42530f86676ad4d8dad984d
SHA13fd2230f79711e641c7d8bc1fc8f6d671319aec8
SHA25602bd271fbf1d8f8cfeb229ec24d7bfb1c261116853c2e66a3f5d0b3536f59a25
SHA5128f57ba1d96f3a97a7867f7eb43efd22baea3a78766fd88e87affcbc1e2e1699de833cbe9d78d22fa784ebf9602bd2006ee315ea13aebbcb79b56ec137c7a5aff
-
Filesize
5KB
MD5f99958b41b48a13d5803a4f1662780f7
SHA1c14f4443d998b3d7ce62aa224e796f18d0c0d082
SHA25697150e0547bede0b653f689c1a04e34b4345338be2a122a81fd8065bb447ab6d
SHA51249baf456f2afcece8c203179a729c3c84a444cbd6824a4f61af339941f251a4422b6a43012c0d4d56cf9f95feb5836f6c1ad25dfd2642860e6c7fc476e0d74b8
-
Filesize
6KB
MD570231c77e632d9722062972bf75e8e9c
SHA1c0781f79e5bb360552505b4be45b1fca4911675a
SHA25621b98cb6996a1975d28be137861492923d293f85abd4e923ffc1400c0626d4b4
SHA5125d55ebbfa9beb8f7a97f629774c92d0062092cdd1f12d5c472440e4b02e0eba07333b97d4d10d74d3589ec371d86cbe122826636af362941addb1b276a7c5a7f
-
Filesize
24KB
MD5eba8517f3652641367e901d3a54f7581
SHA1fea9f4fd8d38fa53f21cebbc148d48fb07fe13c6
SHA2562d7c268095e786a3e6c729a4503a10709df851a8899197637e6d42aa11fce388
SHA512da857ea24ab0a1f4e1eae0a23c1b50e86c5e4c5781f9cff94eaa20127671ed5b1ed681c9b626366f155ec89e767ca11554a77f0f4c3a42c44cf821654b483517
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD52206eb2407f4ee41d789fc316896532e
SHA1acd640d3aea2d0b89e8b14b4c44abdab2feb4ddf
SHA256e9785eb8a9d963b2694b2157b299c8026bfbf864e857902d3fcecd96317ce208
SHA5120812a6cb00017f3ba3afcaf3e2a843b345120da31249ee353e67162966c538fb56bf10738009386b60137bee5a71bdc0d337da7f0de38f40f6e7bf0791821b82