Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
25/04/2024, 21:45
Static task
static1
Behavioral task
behavioral1
Sample
002411399638c5331c824d4da0166b08_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
002411399638c5331c824d4da0166b08_JaffaCakes118.html
Resource
win10v2004-20240412-en
General
-
Target
002411399638c5331c824d4da0166b08_JaffaCakes118.html
-
Size
76KB
-
MD5
002411399638c5331c824d4da0166b08
-
SHA1
9d5fade6694c96bc50f997dbc593de1c37c0db42
-
SHA256
7c76dcca3e40f46a4ead469720c10d752c08278ea7c9bd5c74713b743ce22222
-
SHA512
b761426f2308de5e62ad3fc11cd3b7234bd2a618ed69b29abb8a9106423be772999dae13543224626095bf5155995ece3d59451a2e1f6e033f58aac4c5047678
-
SSDEEP
1536:D2uw3eVMf/stMf/ESuqIL16/pXSRUSgyFvTzrrBNWSfE:Cuij9IIRfSBFbzrrPWUE
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2056 msedge.exe 2056 msedge.exe 2908 msedge.exe 2908 msedge.exe 3916 identity_helper.exe 3916 identity_helper.exe 6100 msedge.exe 6100 msedge.exe 6100 msedge.exe 6100 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2908 wrote to memory of 2400 2908 msedge.exe 87 PID 2908 wrote to memory of 2400 2908 msedge.exe 87 PID 2908 wrote to memory of 4532 2908 msedge.exe 88 PID 2908 wrote to memory of 4532 2908 msedge.exe 88 PID 2908 wrote to memory of 4532 2908 msedge.exe 88 PID 2908 wrote to memory of 4532 2908 msedge.exe 88 PID 2908 wrote to memory of 4532 2908 msedge.exe 88 PID 2908 wrote to memory of 4532 2908 msedge.exe 88 PID 2908 wrote to memory of 4532 2908 msedge.exe 88 PID 2908 wrote to memory of 4532 2908 msedge.exe 88 PID 2908 wrote to memory of 4532 2908 msedge.exe 88 PID 2908 wrote to memory of 4532 2908 msedge.exe 88 PID 2908 wrote to memory of 4532 2908 msedge.exe 88 PID 2908 wrote to memory of 4532 2908 msedge.exe 88 PID 2908 wrote to memory of 4532 2908 msedge.exe 88 PID 2908 wrote to memory of 4532 2908 msedge.exe 88 PID 2908 wrote to memory of 4532 2908 msedge.exe 88 PID 2908 wrote to memory of 4532 2908 msedge.exe 88 PID 2908 wrote to memory of 4532 2908 msedge.exe 88 PID 2908 wrote to memory of 4532 2908 msedge.exe 88 PID 2908 wrote to memory of 4532 2908 msedge.exe 88 PID 2908 wrote to memory of 4532 2908 msedge.exe 88 PID 2908 wrote to memory of 4532 2908 msedge.exe 88 PID 2908 wrote to memory of 4532 2908 msedge.exe 88 PID 2908 wrote to memory of 4532 2908 msedge.exe 88 PID 2908 wrote to memory of 4532 2908 msedge.exe 88 PID 2908 wrote to memory of 4532 2908 msedge.exe 88 PID 2908 wrote to memory of 4532 2908 msedge.exe 88 PID 2908 wrote to memory of 4532 2908 msedge.exe 88 PID 2908 wrote to memory of 4532 2908 msedge.exe 88 PID 2908 wrote to memory of 4532 2908 msedge.exe 88 PID 2908 wrote to memory of 4532 2908 msedge.exe 88 PID 2908 wrote to memory of 4532 2908 msedge.exe 88 PID 2908 wrote to memory of 4532 2908 msedge.exe 88 PID 2908 wrote to memory of 4532 2908 msedge.exe 88 PID 2908 wrote to memory of 4532 2908 msedge.exe 88 PID 2908 wrote to memory of 4532 2908 msedge.exe 88 PID 2908 wrote to memory of 4532 2908 msedge.exe 88 PID 2908 wrote to memory of 4532 2908 msedge.exe 88 PID 2908 wrote to memory of 4532 2908 msedge.exe 88 PID 2908 wrote to memory of 4532 2908 msedge.exe 88 PID 2908 wrote to memory of 4532 2908 msedge.exe 88 PID 2908 wrote to memory of 2056 2908 msedge.exe 89 PID 2908 wrote to memory of 2056 2908 msedge.exe 89 PID 2908 wrote to memory of 4852 2908 msedge.exe 90 PID 2908 wrote to memory of 4852 2908 msedge.exe 90 PID 2908 wrote to memory of 4852 2908 msedge.exe 90 PID 2908 wrote to memory of 4852 2908 msedge.exe 90 PID 2908 wrote to memory of 4852 2908 msedge.exe 90 PID 2908 wrote to memory of 4852 2908 msedge.exe 90 PID 2908 wrote to memory of 4852 2908 msedge.exe 90 PID 2908 wrote to memory of 4852 2908 msedge.exe 90 PID 2908 wrote to memory of 4852 2908 msedge.exe 90 PID 2908 wrote to memory of 4852 2908 msedge.exe 90 PID 2908 wrote to memory of 4852 2908 msedge.exe 90 PID 2908 wrote to memory of 4852 2908 msedge.exe 90 PID 2908 wrote to memory of 4852 2908 msedge.exe 90 PID 2908 wrote to memory of 4852 2908 msedge.exe 90 PID 2908 wrote to memory of 4852 2908 msedge.exe 90 PID 2908 wrote to memory of 4852 2908 msedge.exe 90 PID 2908 wrote to memory of 4852 2908 msedge.exe 90 PID 2908 wrote to memory of 4852 2908 msedge.exe 90 PID 2908 wrote to memory of 4852 2908 msedge.exe 90 PID 2908 wrote to memory of 4852 2908 msedge.exe 90
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\002411399638c5331c824d4da0166b08_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff999c546f8,0x7ff999c54708,0x7ff999c547182⤵PID:2400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,15562756242802150549,2064933878578847993,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:22⤵PID:4532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,15562756242802150549,2064933878578847993,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2312 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2080,15562756242802150549,2064933878578847993,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2684 /prefetch:82⤵PID:4852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,15562756242802150549,2064933878578847993,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3156 /prefetch:12⤵PID:1208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,15562756242802150549,2064933878578847993,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3168 /prefetch:12⤵PID:3932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,15562756242802150549,2064933878578847993,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5408 /prefetch:82⤵PID:1544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,15562756242802150549,2064933878578847993,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5408 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,15562756242802150549,2064933878578847993,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4976 /prefetch:12⤵PID:2736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,15562756242802150549,2064933878578847993,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5136 /prefetch:12⤵PID:4196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,15562756242802150549,2064933878578847993,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:12⤵PID:2028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,15562756242802150549,2064933878578847993,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3396 /prefetch:12⤵PID:2412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,15562756242802150549,2064933878578847993,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1740 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:6100
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3916
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1360
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5120a75f233314ba1fe34e9d6c09f30b9
SHA1a9f92f2d3f111eaadd9bcf8fceb3c9553753539c
SHA256e04101215c3534dbc77c0b5df2e1d1ff74c277d2946f391f939c9a7948a22dd0
SHA5123c4eb93e425b50e8bcc1712f4cc2be11888a0273c3a619fc6bf72ccab876a427158f661bfc80d0c1e47ef4116febf76a3aaa31a60ec662eae0e51c7f1d3d89b3
-
Filesize
152B
MD5bc2edd0741d97ae237e9f00bf3244144
SHA17c1e5d324f5c7137a3c4ec85146659f026c11782
SHA256dbce3287c7ae69ccbd1d780c39f3ffa3c98bd4609a939fff8ee9c99f14265041
SHA51200f505a0b4ea0df626175bf9d39a205f18f9754b62e4dba6fbb5b4a716b3539e7809723e1596bcfe1ba3041e22342e3a9cbaad88e84ce9c8c6531331bbc25093
-
Filesize
181B
MD563b28243cbdd2d7bff997522b94f13ee
SHA195eb9ed4558d2fd3012bf35c1ae07c569f5703cc
SHA2569b6b38f4becb7a7e060354d5b71842faa31df83e58bde152804c2a80c65083cd
SHA51282893a5dc8c332ca05624bcb3bf2bec2b3331785661413608df9ef822205da7b3d515b73d2612f6b500c44488fa85522f27eba52ef568bf4b2408095981b1670
-
Filesize
6KB
MD53dd0440cd44406539ed649411a2045d9
SHA1a178e007054cf0fbfbb5e6421726546531f7f2c3
SHA2565f7a3444a5bbe70afb6c2586ec8b821fe4b68c28060215190e5034acaed2dc98
SHA512cacec3f3e415df9f04088a0fdf771104a38916ca244df0d089ad5b2ecab7867e41779d0e0f56a81f9a4030ee0081b2a0ad66978277f10e1c1c1218e0121f31f4
-
Filesize
6KB
MD5555fa970fb3a0dc9d69c5b20353eaccf
SHA199c12fb99ffe72585f87e1eecdd8b85b609a906e
SHA2567da3fa419e1c9130e559c9d6319a1bf894c8c071b661c13cded66f694268cf20
SHA5120196a3616f16d1c9de59d50cc2b09392f6ddc0d33b1c75afa9883b10f30b013b7ee02d7aa88a4bcc9dc288e846cf1de2471e3ff6333a908edcf27f07e5525737
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5e2b878868955a842163db360a4790b83
SHA1e77add42d39ec18cb21be8c99c04fb9ff3b698bf
SHA25600334f135e31723bee16d000e951eed0c49aef4821d9b873328f04eaec17ceb4
SHA512b7e1814ca1685b7728a0d4d08b4157a7714cb2a4df0c6965bf3216291fca0702e77c0cff0e94b7eab6cf27890cee91844abed6b5a6c67d897b4ec7058b8e359b