Analysis
-
max time kernel
148s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
25-04-2024 22:01
Static task
static1
Behavioral task
behavioral1
Sample
002a9ee2e83b117607d84180f63e21dd_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
002a9ee2e83b117607d84180f63e21dd_JaffaCakes118.html
Resource
win10v2004-20240412-en
General
-
Target
002a9ee2e83b117607d84180f63e21dd_JaffaCakes118.html
-
Size
159KB
-
MD5
002a9ee2e83b117607d84180f63e21dd
-
SHA1
25122a7b2407fa595c83d4216bae2b3980cd5160
-
SHA256
d52d09ff762be9c6d95a34c6a3ae40e6cddf3a72a714c22f30c38601ec46a7d4
-
SHA512
4e4a9d6e954f4f14134e9c698314f1bb9fe8e4e3ee9591ef68d01ec4b2f97184ffb1ef47ecb201ad6daec3cdf8df84d6890183ae41ff98997abb1144d8a8ca62
-
SSDEEP
1536:iTRT+cy70KuyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBw:i9guyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
Processes:
msedge.exemsedge.exemsedge.exeidentity_helper.exepid process 5044 msedge.exe 5044 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1912 msedge.exe 1912 msedge.exe 1912 msedge.exe 1912 msedge.exe 3108 identity_helper.exe 3108 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
Processes:
msedge.exepid process 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 1480 wrote to memory of 1676 1480 msedge.exe msedge.exe PID 1480 wrote to memory of 1676 1480 msedge.exe msedge.exe PID 1480 wrote to memory of 2656 1480 msedge.exe msedge.exe PID 1480 wrote to memory of 2656 1480 msedge.exe msedge.exe PID 1480 wrote to memory of 2656 1480 msedge.exe msedge.exe PID 1480 wrote to memory of 2656 1480 msedge.exe msedge.exe PID 1480 wrote to memory of 2656 1480 msedge.exe msedge.exe PID 1480 wrote to memory of 2656 1480 msedge.exe msedge.exe PID 1480 wrote to memory of 2656 1480 msedge.exe msedge.exe PID 1480 wrote to memory of 2656 1480 msedge.exe msedge.exe PID 1480 wrote to memory of 2656 1480 msedge.exe msedge.exe PID 1480 wrote to memory of 2656 1480 msedge.exe msedge.exe PID 1480 wrote to memory of 2656 1480 msedge.exe msedge.exe PID 1480 wrote to memory of 2656 1480 msedge.exe msedge.exe PID 1480 wrote to memory of 2656 1480 msedge.exe msedge.exe PID 1480 wrote to memory of 2656 1480 msedge.exe msedge.exe PID 1480 wrote to memory of 2656 1480 msedge.exe msedge.exe PID 1480 wrote to memory of 2656 1480 msedge.exe msedge.exe PID 1480 wrote to memory of 2656 1480 msedge.exe msedge.exe PID 1480 wrote to memory of 2656 1480 msedge.exe msedge.exe PID 1480 wrote to memory of 2656 1480 msedge.exe msedge.exe PID 1480 wrote to memory of 2656 1480 msedge.exe msedge.exe PID 1480 wrote to memory of 2656 1480 msedge.exe msedge.exe PID 1480 wrote to memory of 2656 1480 msedge.exe msedge.exe PID 1480 wrote to memory of 2656 1480 msedge.exe msedge.exe PID 1480 wrote to memory of 2656 1480 msedge.exe msedge.exe PID 1480 wrote to memory of 2656 1480 msedge.exe msedge.exe PID 1480 wrote to memory of 2656 1480 msedge.exe msedge.exe PID 1480 wrote to memory of 2656 1480 msedge.exe msedge.exe PID 1480 wrote to memory of 2656 1480 msedge.exe msedge.exe PID 1480 wrote to memory of 2656 1480 msedge.exe msedge.exe PID 1480 wrote to memory of 2656 1480 msedge.exe msedge.exe PID 1480 wrote to memory of 2656 1480 msedge.exe msedge.exe PID 1480 wrote to memory of 2656 1480 msedge.exe msedge.exe PID 1480 wrote to memory of 2656 1480 msedge.exe msedge.exe PID 1480 wrote to memory of 2656 1480 msedge.exe msedge.exe PID 1480 wrote to memory of 2656 1480 msedge.exe msedge.exe PID 1480 wrote to memory of 2656 1480 msedge.exe msedge.exe PID 1480 wrote to memory of 2656 1480 msedge.exe msedge.exe PID 1480 wrote to memory of 2656 1480 msedge.exe msedge.exe PID 1480 wrote to memory of 2656 1480 msedge.exe msedge.exe PID 1480 wrote to memory of 2656 1480 msedge.exe msedge.exe PID 1480 wrote to memory of 5044 1480 msedge.exe msedge.exe PID 1480 wrote to memory of 5044 1480 msedge.exe msedge.exe PID 1480 wrote to memory of 4856 1480 msedge.exe msedge.exe PID 1480 wrote to memory of 4856 1480 msedge.exe msedge.exe PID 1480 wrote to memory of 4856 1480 msedge.exe msedge.exe PID 1480 wrote to memory of 4856 1480 msedge.exe msedge.exe PID 1480 wrote to memory of 4856 1480 msedge.exe msedge.exe PID 1480 wrote to memory of 4856 1480 msedge.exe msedge.exe PID 1480 wrote to memory of 4856 1480 msedge.exe msedge.exe PID 1480 wrote to memory of 4856 1480 msedge.exe msedge.exe PID 1480 wrote to memory of 4856 1480 msedge.exe msedge.exe PID 1480 wrote to memory of 4856 1480 msedge.exe msedge.exe PID 1480 wrote to memory of 4856 1480 msedge.exe msedge.exe PID 1480 wrote to memory of 4856 1480 msedge.exe msedge.exe PID 1480 wrote to memory of 4856 1480 msedge.exe msedge.exe PID 1480 wrote to memory of 4856 1480 msedge.exe msedge.exe PID 1480 wrote to memory of 4856 1480 msedge.exe msedge.exe PID 1480 wrote to memory of 4856 1480 msedge.exe msedge.exe PID 1480 wrote to memory of 4856 1480 msedge.exe msedge.exe PID 1480 wrote to memory of 4856 1480 msedge.exe msedge.exe PID 1480 wrote to memory of 4856 1480 msedge.exe msedge.exe PID 1480 wrote to memory of 4856 1480 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\002a9ee2e83b117607d84180f63e21dd_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffffb9046f8,0x7ffffb904708,0x7ffffb9047182⤵PID:1676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1880,282973177413407611,14198840561332701008,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2068 /prefetch:22⤵PID:2656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1880,282973177413407611,14198840561332701008,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2108 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1880,282973177413407611,14198840561332701008,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2788 /prefetch:82⤵PID:4856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1880,282973177413407611,14198840561332701008,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:4780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1880,282973177413407611,14198840561332701008,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:2932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1880,282973177413407611,14198840561332701008,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3044 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1880,282973177413407611,14198840561332701008,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5916 /prefetch:82⤵PID:2416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1880,282973177413407611,14198840561332701008,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5916 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1880,282973177413407611,14198840561332701008,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4528 /prefetch:12⤵PID:4220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1880,282973177413407611,14198840561332701008,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4396 /prefetch:12⤵PID:812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1880,282973177413407611,14198840561332701008,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4980 /prefetch:12⤵PID:216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1880,282973177413407611,14198840561332701008,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5684 /prefetch:12⤵PID:2188
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2428
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2596
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD57b56675b54840d86d49bde5a1ff8af6a
SHA1fe70a1b85f88d60f3ba9fc7bb5f81fc41e150811
SHA25686af7213f410df65d0937f4331f783160f30eaeb088e28a9eef461713b9a3929
SHA51211fc61b83365391efee8084de5c2af7e064f0182b943a0db08d95a0f450d3877bde5b5e6a6b9f008e58b709bb1a34f7b50085c41927f091df1eea78f039402e9
-
Filesize
152B
MD548cff1baabb24706967de3b0d6869906
SHA1b0cd54f587cd4c88e60556347930cb76991e6734
SHA256f6b5fbc610a71b3914753feb2bd4475a7c77d0d785cc36255bf93b3fe3ccb775
SHA512fd0c848f3f9de81aca81af999262f96ea4c1cd1d1f32d304f56c7382f3b1bb604e5fbe9f209ad6e4b38988d92357ef82e9668806d0727f2856c7dc1f07aae2b6
-
Filesize
5KB
MD55844c0cee105f0b8489260bde2254fa9
SHA114621ac10552c9547ae01bd60d2a729cc4f12e73
SHA256a82acafe989712c96e819395a4adc1de5dcbd6d761563ef000a92104dfee4c45
SHA512e599b6cee468a25fa5119a58f01fed077b16ab73b9bcab9ab4ad6e5a5e82b9cda24a2ee95f87e59d23d02389624d35cc076c1889a1ca32647482b82e454a5de0
-
Filesize
6KB
MD56cb44aa727bf7a8b44db3a3b2366208d
SHA1c1544b4e98a0c117bdcc5a10725ddde11ca51bb6
SHA2565fb0813e84a95a99695cb58a33f25066af9d8a251616068c3c03ba4b4f205a12
SHA51219eeaea2a38f5e013c45e7782f2714f204721ae80ae5acb265532dee60640818502a5ca6deba733c80ea71ce3aae0a5b9956971b6846a168b37b95ab24722e2c
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5f104b55b4bb5b4c067d2d796f245d3bc
SHA1cba9e48fde7f2cedc7b9260e8ae18ce2a311ebb8
SHA256abf545d26263d5f70f18a08a0be87ad888845b02b3ca8689823e2a9e04f4e2bf
SHA512bd01b980af721100a6d475d9bd2825dfa81b3820442b991cfa111fa869088bfca23b594102106b49f7aaffb348eff9defd5cb12acfe5d6a08d33237f5f216052
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e