Analysis
-
max time kernel
145s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
27/04/2024, 08:06
Static task
static1
Behavioral task
behavioral1
Sample
02ca7822030adaf98dfc68f2256edd09_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
02ca7822030adaf98dfc68f2256edd09_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
02ca7822030adaf98dfc68f2256edd09_JaffaCakes118.html
-
Size
133KB
-
MD5
02ca7822030adaf98dfc68f2256edd09
-
SHA1
f0405c82f14a09408a5b3a8ffe02954aef340471
-
SHA256
49a6a65f4b5f9d4c7432863c4087b7d2827e3397dbb81ca8e354f55ba8ac3a50
-
SHA512
552b04373bfa70630a7de172d391ac448818bf79908a00e4ee2ecef7b508f293978cd3b270c36c4c9201bbf952821999d9eddd36bcbd3ec9e422fd2e1fcdf241
-
SSDEEP
3072:SYrBeGJyoMRUgyfkMY+BES09JXAnyrZalI+YQ:SYrwGJyoMRUdsMYod+X3oI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2360 msedge.exe 2360 msedge.exe 2776 msedge.exe 2776 msedge.exe 3112 identity_helper.exe 3112 identity_helper.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe 4136 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2776 wrote to memory of 564 2776 msedge.exe 84 PID 2776 wrote to memory of 564 2776 msedge.exe 84 PID 2776 wrote to memory of 2036 2776 msedge.exe 85 PID 2776 wrote to memory of 2036 2776 msedge.exe 85 PID 2776 wrote to memory of 2036 2776 msedge.exe 85 PID 2776 wrote to memory of 2036 2776 msedge.exe 85 PID 2776 wrote to memory of 2036 2776 msedge.exe 85 PID 2776 wrote to memory of 2036 2776 msedge.exe 85 PID 2776 wrote to memory of 2036 2776 msedge.exe 85 PID 2776 wrote to memory of 2036 2776 msedge.exe 85 PID 2776 wrote to memory of 2036 2776 msedge.exe 85 PID 2776 wrote to memory of 2036 2776 msedge.exe 85 PID 2776 wrote to memory of 2036 2776 msedge.exe 85 PID 2776 wrote to memory of 2036 2776 msedge.exe 85 PID 2776 wrote to memory of 2036 2776 msedge.exe 85 PID 2776 wrote to memory of 2036 2776 msedge.exe 85 PID 2776 wrote to memory of 2036 2776 msedge.exe 85 PID 2776 wrote to memory of 2036 2776 msedge.exe 85 PID 2776 wrote to memory of 2036 2776 msedge.exe 85 PID 2776 wrote to memory of 2036 2776 msedge.exe 85 PID 2776 wrote to memory of 2036 2776 msedge.exe 85 PID 2776 wrote to memory of 2036 2776 msedge.exe 85 PID 2776 wrote to memory of 2036 2776 msedge.exe 85 PID 2776 wrote to memory of 2036 2776 msedge.exe 85 PID 2776 wrote to memory of 2036 2776 msedge.exe 85 PID 2776 wrote to memory of 2036 2776 msedge.exe 85 PID 2776 wrote to memory of 2036 2776 msedge.exe 85 PID 2776 wrote to memory of 2036 2776 msedge.exe 85 PID 2776 wrote to memory of 2036 2776 msedge.exe 85 PID 2776 wrote to memory of 2036 2776 msedge.exe 85 PID 2776 wrote to memory of 2036 2776 msedge.exe 85 PID 2776 wrote to memory of 2036 2776 msedge.exe 85 PID 2776 wrote to memory of 2036 2776 msedge.exe 85 PID 2776 wrote to memory of 2036 2776 msedge.exe 85 PID 2776 wrote to memory of 2036 2776 msedge.exe 85 PID 2776 wrote to memory of 2036 2776 msedge.exe 85 PID 2776 wrote to memory of 2036 2776 msedge.exe 85 PID 2776 wrote to memory of 2036 2776 msedge.exe 85 PID 2776 wrote to memory of 2036 2776 msedge.exe 85 PID 2776 wrote to memory of 2036 2776 msedge.exe 85 PID 2776 wrote to memory of 2036 2776 msedge.exe 85 PID 2776 wrote to memory of 2036 2776 msedge.exe 85 PID 2776 wrote to memory of 2360 2776 msedge.exe 86 PID 2776 wrote to memory of 2360 2776 msedge.exe 86 PID 2776 wrote to memory of 2684 2776 msedge.exe 87 PID 2776 wrote to memory of 2684 2776 msedge.exe 87 PID 2776 wrote to memory of 2684 2776 msedge.exe 87 PID 2776 wrote to memory of 2684 2776 msedge.exe 87 PID 2776 wrote to memory of 2684 2776 msedge.exe 87 PID 2776 wrote to memory of 2684 2776 msedge.exe 87 PID 2776 wrote to memory of 2684 2776 msedge.exe 87 PID 2776 wrote to memory of 2684 2776 msedge.exe 87 PID 2776 wrote to memory of 2684 2776 msedge.exe 87 PID 2776 wrote to memory of 2684 2776 msedge.exe 87 PID 2776 wrote to memory of 2684 2776 msedge.exe 87 PID 2776 wrote to memory of 2684 2776 msedge.exe 87 PID 2776 wrote to memory of 2684 2776 msedge.exe 87 PID 2776 wrote to memory of 2684 2776 msedge.exe 87 PID 2776 wrote to memory of 2684 2776 msedge.exe 87 PID 2776 wrote to memory of 2684 2776 msedge.exe 87 PID 2776 wrote to memory of 2684 2776 msedge.exe 87 PID 2776 wrote to memory of 2684 2776 msedge.exe 87 PID 2776 wrote to memory of 2684 2776 msedge.exe 87 PID 2776 wrote to memory of 2684 2776 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\02ca7822030adaf98dfc68f2256edd09_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffabc546f8,0x7fffabc54708,0x7fffabc547182⤵PID:564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,14167527883959334428,16896832011432833394,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:22⤵PID:2036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,14167527883959334428,16896832011432833394,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2184 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,14167527883959334428,16896832011432833394,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2700 /prefetch:82⤵PID:2684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,14167527883959334428,16896832011432833394,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:3848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,14167527883959334428,16896832011432833394,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:3068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,14167527883959334428,16896832011432833394,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4964 /prefetch:82⤵PID:1940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,14167527883959334428,16896832011432833394,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4964 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,14167527883959334428,16896832011432833394,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4660 /prefetch:12⤵PID:4996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,14167527883959334428,16896832011432833394,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4680 /prefetch:12⤵PID:3056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,14167527883959334428,16896832011432833394,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5096 /prefetch:12⤵PID:1104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,14167527883959334428,16896832011432833394,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3908 /prefetch:12⤵PID:2040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,14167527883959334428,16896832011432833394,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4596 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4136
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4108
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3764
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD562c02dda2bf22d702a9b3a1c547c5f6a
SHA18f42966df96bd2e8c1f6b31b37c9a19beb6394d6
SHA256cb8a0964605551ed5a0668c08ab888044bbd845c9225ffee5a28e0b847ede62b
SHA512a7ce2c0946382188e1d8480cfb096b29bd0dcb260ccdc74167cc351160a1884d04d57a2517eb700b3eef30eaf4a01bfbf31858365b1e624d4b0960ffd0032fa9
-
Filesize
152B
MD5850f27f857369bf7fe83c613d2ec35cb
SHA17677a061c6fd2a030b44841bfb32da0abc1dbefb
SHA256a7db700e067222e55e323a9ffc71a92f59829e81021e2607cec0d2ec6faf602a
SHA5127b1efa002b7a1a23973bff0618fb4a82cd0c5193df55cd960c7516caa63509587fd8b36f3aea6db01ece368065865af6472365b820fadce720b64b561ab5f401
-
Filesize
6KB
MD5fc73ea22d60a8164138b113fb7dc9c21
SHA143b028953a59d2b4a68f1adc773788945edfb4c0
SHA2569454bd8907641549a09f5052639cb23cdacb43fa86fa445cfe3ec949f34b8847
SHA51245d204b30ceb839a73b58d357580c0dc42a1bb6e38439ac5be7a7cd5dc0f9d27e93ebbedb639e9fce53a4a5334b374561b6d00bc7cbaa7d74f94385381d612d3
-
Filesize
6KB
MD5606bea4bd86eb8f36196bc0fa536aeb1
SHA1d13436ca5cff62cc6ed72a3af7018e3f6d5de204
SHA256e3e4a750dc2626f4ff1b5e806c710ecab6e0d6fe6349da53fbb3f7ff6cb2bc2d
SHA51216f2dd2b59b3c9960ca7a23b058331749737a2637dd2fdb6b245adea070a20f9f827766152457b990524a789f63d50f63b849b15fd39507415f54bada54beac3
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
8KB
MD54ebeead7068f0b485b675929a6174b45
SHA1a148d04bcb9bc6c9813ac7f75aad4af0bb2f1a16
SHA25643e883848c189fcba76d77bee6b0c2a2ed406cfe91694d363e16fe06aba53e54
SHA512a1be7c9869109d55f5a549abf0bf0b6ea2b8cb0e554fc7111bbc3ee64d43011cdbd5bfd1ab6d937e698a1615d4230fc8dd90dfffd6ef1798e9a0086f5f6de8e5