Analysis
-
max time kernel
145s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
07-05-2024 09:19
Static task
static1
Behavioral task
behavioral1
Sample
2028595de1664134416f84d00170ff3f_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2028595de1664134416f84d00170ff3f_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
2028595de1664134416f84d00170ff3f_JaffaCakes118.html
-
Size
14KB
-
MD5
2028595de1664134416f84d00170ff3f
-
SHA1
8f6ddb8dd01b12a2e56ab22445f1d37bc5aa0373
-
SHA256
ee786662819b9ea419c370cd1fdcdf171f4b74e559ff72e432bbcc8eb7fc4e19
-
SHA512
17f91f467abff1a68621b607d3674019f1879d6ad6f87f6c4c4e6506cd7e6e2e6be2493a55fabb8877b60018a8feae51df98ca3c97d5927289b0e0259b93108c
-
SSDEEP
384:kzBqtZRsVuEc+6fkuOENbopul0LgIssbQbDwiTkBFV1aG/a1B7rl9H:kItZRsV2+6fkPENbQJZYDN4n+Gy1JlV
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2376 msedge.exe 2376 msedge.exe 368 msedge.exe 368 msedge.exe 4092 identity_helper.exe 4092 identity_helper.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 368 wrote to memory of 1680 368 msedge.exe 85 PID 368 wrote to memory of 1680 368 msedge.exe 85 PID 368 wrote to memory of 3168 368 msedge.exe 86 PID 368 wrote to memory of 3168 368 msedge.exe 86 PID 368 wrote to memory of 3168 368 msedge.exe 86 PID 368 wrote to memory of 3168 368 msedge.exe 86 PID 368 wrote to memory of 3168 368 msedge.exe 86 PID 368 wrote to memory of 3168 368 msedge.exe 86 PID 368 wrote to memory of 3168 368 msedge.exe 86 PID 368 wrote to memory of 3168 368 msedge.exe 86 PID 368 wrote to memory of 3168 368 msedge.exe 86 PID 368 wrote to memory of 3168 368 msedge.exe 86 PID 368 wrote to memory of 3168 368 msedge.exe 86 PID 368 wrote to memory of 3168 368 msedge.exe 86 PID 368 wrote to memory of 3168 368 msedge.exe 86 PID 368 wrote to memory of 3168 368 msedge.exe 86 PID 368 wrote to memory of 3168 368 msedge.exe 86 PID 368 wrote to memory of 3168 368 msedge.exe 86 PID 368 wrote to memory of 3168 368 msedge.exe 86 PID 368 wrote to memory of 3168 368 msedge.exe 86 PID 368 wrote to memory of 3168 368 msedge.exe 86 PID 368 wrote to memory of 3168 368 msedge.exe 86 PID 368 wrote to memory of 3168 368 msedge.exe 86 PID 368 wrote to memory of 3168 368 msedge.exe 86 PID 368 wrote to memory of 3168 368 msedge.exe 86 PID 368 wrote to memory of 3168 368 msedge.exe 86 PID 368 wrote to memory of 3168 368 msedge.exe 86 PID 368 wrote to memory of 3168 368 msedge.exe 86 PID 368 wrote to memory of 3168 368 msedge.exe 86 PID 368 wrote to memory of 3168 368 msedge.exe 86 PID 368 wrote to memory of 3168 368 msedge.exe 86 PID 368 wrote to memory of 3168 368 msedge.exe 86 PID 368 wrote to memory of 3168 368 msedge.exe 86 PID 368 wrote to memory of 3168 368 msedge.exe 86 PID 368 wrote to memory of 3168 368 msedge.exe 86 PID 368 wrote to memory of 3168 368 msedge.exe 86 PID 368 wrote to memory of 3168 368 msedge.exe 86 PID 368 wrote to memory of 3168 368 msedge.exe 86 PID 368 wrote to memory of 3168 368 msedge.exe 86 PID 368 wrote to memory of 3168 368 msedge.exe 86 PID 368 wrote to memory of 3168 368 msedge.exe 86 PID 368 wrote to memory of 3168 368 msedge.exe 86 PID 368 wrote to memory of 2376 368 msedge.exe 87 PID 368 wrote to memory of 2376 368 msedge.exe 87 PID 368 wrote to memory of 2236 368 msedge.exe 88 PID 368 wrote to memory of 2236 368 msedge.exe 88 PID 368 wrote to memory of 2236 368 msedge.exe 88 PID 368 wrote to memory of 2236 368 msedge.exe 88 PID 368 wrote to memory of 2236 368 msedge.exe 88 PID 368 wrote to memory of 2236 368 msedge.exe 88 PID 368 wrote to memory of 2236 368 msedge.exe 88 PID 368 wrote to memory of 2236 368 msedge.exe 88 PID 368 wrote to memory of 2236 368 msedge.exe 88 PID 368 wrote to memory of 2236 368 msedge.exe 88 PID 368 wrote to memory of 2236 368 msedge.exe 88 PID 368 wrote to memory of 2236 368 msedge.exe 88 PID 368 wrote to memory of 2236 368 msedge.exe 88 PID 368 wrote to memory of 2236 368 msedge.exe 88 PID 368 wrote to memory of 2236 368 msedge.exe 88 PID 368 wrote to memory of 2236 368 msedge.exe 88 PID 368 wrote to memory of 2236 368 msedge.exe 88 PID 368 wrote to memory of 2236 368 msedge.exe 88 PID 368 wrote to memory of 2236 368 msedge.exe 88 PID 368 wrote to memory of 2236 368 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2028595de1664134416f84d00170ff3f_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:368 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe141d46f8,0x7ffe141d4708,0x7ffe141d47182⤵PID:1680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2004,16135381673631865967,14925509341979203013,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2028 /prefetch:22⤵PID:3168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2004,16135381673631865967,14925509341979203013,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2396 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2004,16135381673631865967,14925509341979203013,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2848 /prefetch:82⤵PID:2236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,16135381673631865967,14925509341979203013,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:2360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,16135381673631865967,14925509341979203013,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:5096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2004,16135381673631865967,14925509341979203013,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5228 /prefetch:82⤵PID:872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2004,16135381673631865967,14925509341979203013,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5228 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,16135381673631865967,14925509341979203013,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5300 /prefetch:12⤵PID:1884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,16135381673631865967,14925509341979203013,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5316 /prefetch:12⤵PID:5116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,16135381673631865967,14925509341979203013,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5380 /prefetch:12⤵PID:4448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,16135381673631865967,14925509341979203013,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3500 /prefetch:12⤵PID:4528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2004,16135381673631865967,14925509341979203013,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2168 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3092
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2680
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2044
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59dc60aef38e7832217e7fa02d6f0d9f6
SHA14f8539dc7d5739b36fe976a932338f459d066db6
SHA2568a0ee0b6fafabb256571b691c2faf77c7244945faa749c72124d5eb43a197a32
SHA51218371541811910992c2b84a8eae7e997e8627640bdb60b9e82751389e50931db9b3e206d31f4d9d2dc3ca25ea3a82c0be413ecb0ef3ac227a14e54f406eaa7e7
-
Filesize
152B
MD57ac03b15b68af2d5cb5c8063057cc83e
SHA19b2d4db737f57322ff5c4bbddd765b3177f930ab
SHA256b90d7596301470b389842eecb46bd3a8e614260b0d374d5c35a36afb9c71a700
SHA512a5e9f40dd9040803046b0218fab6b058d49e5e2a3ada315e161fe9fc80ebb8d6d4442ccc1c98d19e561fc7c61bcf43d662fe2231cacacb447876a2113c2e3732
-
Filesize
5KB
MD5a68339b2d964e6190eabe9eaca7a5956
SHA188cc0e58a71b543f2c5056eb2884158e1e154ff8
SHA256ceaf41f46576ae508da6cc9861f80235dcdef4544e7cdbb9145d27c1f53ef327
SHA512ca8b2b744e4cbd2e041355c1d64c63fe263e6d519867ffb0afb1a117abdd7b2ca51ad16b9bb3541402ffe1be0fca36982141419638e4573f034b7267dfad37e5
-
Filesize
6KB
MD5599a7b47645d39b9433ba8beeed403dd
SHA1f3baf4b211ccbe421d6a3957473ff54fa4654d63
SHA256b6baa449ad7e0fc862e62585464b1a291fdd4d4cf7d3cae5ffeeb2ef8c0cc3f0
SHA512a7cb9626bbc595d9bd82cb75878c700ad809ef2204697e6786f8c1849c183635c6ad57c447f04dcdd9e2ca58499318b8518b5611681534ff0b8358c1d8bd739b
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5a00ed786348bb696b20a72e0696d45ad
SHA1d9bc69e060bbfe054ecbc2918d648879d3b3a1db
SHA256a2f8d86f0d4d6f788e893475f5367a1204631b4a102723e12efbd250241281ec
SHA5126c8f44fc871b91dbf8b56611971b9d686915408b66806ba38cce82e9fd513bf98be03bc85e85483be306ff56d17df1a8ce855411c4b5e9f4f4bfaad2b5e8885d