Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
07-05-2024 10:56
Static task
static1
Behavioral task
behavioral1
Sample
2061050ddac18968440f8e384d9875d6_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
2061050ddac18968440f8e384d9875d6_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
2061050ddac18968440f8e384d9875d6_JaffaCakes118.html
-
Size
11KB
-
MD5
2061050ddac18968440f8e384d9875d6
-
SHA1
2abf3e5064e4aa45466e6543634e7365b83d2afe
-
SHA256
b26ee272096be3cfa41fd4ac0edab2a4610d49a895ea175414e335c568e33bad
-
SHA512
a996998b2c81f61cdc59dc5feda6aa78d0096ec4f8b9e4a4e6a97fcb9db5049acf85bdef63f326a476804a48ef7a5c1c535d6b6445f2ba059ef57b5bd9a5ec94
-
SSDEEP
192:SzDSgZ7AM2AMMEAMdAM5AMkdZFZp+jd3oEheIaiN//nxEcjwXZQD//8UcMKWLsgj:Siky1R1QRZQR3peIai9hcJAH8UcMKmdZ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1552 msedge.exe 1552 msedge.exe 4540 msedge.exe 4540 msedge.exe 3424 identity_helper.exe 3424 identity_helper.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe 3412 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4540 wrote to memory of 4920 4540 msedge.exe 84 PID 4540 wrote to memory of 4920 4540 msedge.exe 84 PID 4540 wrote to memory of 736 4540 msedge.exe 85 PID 4540 wrote to memory of 736 4540 msedge.exe 85 PID 4540 wrote to memory of 736 4540 msedge.exe 85 PID 4540 wrote to memory of 736 4540 msedge.exe 85 PID 4540 wrote to memory of 736 4540 msedge.exe 85 PID 4540 wrote to memory of 736 4540 msedge.exe 85 PID 4540 wrote to memory of 736 4540 msedge.exe 85 PID 4540 wrote to memory of 736 4540 msedge.exe 85 PID 4540 wrote to memory of 736 4540 msedge.exe 85 PID 4540 wrote to memory of 736 4540 msedge.exe 85 PID 4540 wrote to memory of 736 4540 msedge.exe 85 PID 4540 wrote to memory of 736 4540 msedge.exe 85 PID 4540 wrote to memory of 736 4540 msedge.exe 85 PID 4540 wrote to memory of 736 4540 msedge.exe 85 PID 4540 wrote to memory of 736 4540 msedge.exe 85 PID 4540 wrote to memory of 736 4540 msedge.exe 85 PID 4540 wrote to memory of 736 4540 msedge.exe 85 PID 4540 wrote to memory of 736 4540 msedge.exe 85 PID 4540 wrote to memory of 736 4540 msedge.exe 85 PID 4540 wrote to memory of 736 4540 msedge.exe 85 PID 4540 wrote to memory of 736 4540 msedge.exe 85 PID 4540 wrote to memory of 736 4540 msedge.exe 85 PID 4540 wrote to memory of 736 4540 msedge.exe 85 PID 4540 wrote to memory of 736 4540 msedge.exe 85 PID 4540 wrote to memory of 736 4540 msedge.exe 85 PID 4540 wrote to memory of 736 4540 msedge.exe 85 PID 4540 wrote to memory of 736 4540 msedge.exe 85 PID 4540 wrote to memory of 736 4540 msedge.exe 85 PID 4540 wrote to memory of 736 4540 msedge.exe 85 PID 4540 wrote to memory of 736 4540 msedge.exe 85 PID 4540 wrote to memory of 736 4540 msedge.exe 85 PID 4540 wrote to memory of 736 4540 msedge.exe 85 PID 4540 wrote to memory of 736 4540 msedge.exe 85 PID 4540 wrote to memory of 736 4540 msedge.exe 85 PID 4540 wrote to memory of 736 4540 msedge.exe 85 PID 4540 wrote to memory of 736 4540 msedge.exe 85 PID 4540 wrote to memory of 736 4540 msedge.exe 85 PID 4540 wrote to memory of 736 4540 msedge.exe 85 PID 4540 wrote to memory of 736 4540 msedge.exe 85 PID 4540 wrote to memory of 736 4540 msedge.exe 85 PID 4540 wrote to memory of 1552 4540 msedge.exe 86 PID 4540 wrote to memory of 1552 4540 msedge.exe 86 PID 4540 wrote to memory of 3948 4540 msedge.exe 87 PID 4540 wrote to memory of 3948 4540 msedge.exe 87 PID 4540 wrote to memory of 3948 4540 msedge.exe 87 PID 4540 wrote to memory of 3948 4540 msedge.exe 87 PID 4540 wrote to memory of 3948 4540 msedge.exe 87 PID 4540 wrote to memory of 3948 4540 msedge.exe 87 PID 4540 wrote to memory of 3948 4540 msedge.exe 87 PID 4540 wrote to memory of 3948 4540 msedge.exe 87 PID 4540 wrote to memory of 3948 4540 msedge.exe 87 PID 4540 wrote to memory of 3948 4540 msedge.exe 87 PID 4540 wrote to memory of 3948 4540 msedge.exe 87 PID 4540 wrote to memory of 3948 4540 msedge.exe 87 PID 4540 wrote to memory of 3948 4540 msedge.exe 87 PID 4540 wrote to memory of 3948 4540 msedge.exe 87 PID 4540 wrote to memory of 3948 4540 msedge.exe 87 PID 4540 wrote to memory of 3948 4540 msedge.exe 87 PID 4540 wrote to memory of 3948 4540 msedge.exe 87 PID 4540 wrote to memory of 3948 4540 msedge.exe 87 PID 4540 wrote to memory of 3948 4540 msedge.exe 87 PID 4540 wrote to memory of 3948 4540 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2061050ddac18968440f8e384d9875d6_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4540 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff728346f8,0x7fff72834708,0x7fff728347182⤵PID:4920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,15139954420753027366,4332689474954257086,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2068 /prefetch:22⤵PID:736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2060,15139954420753027366,4332689474954257086,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2192 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2060,15139954420753027366,4332689474954257086,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2692 /prefetch:82⤵PID:3948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,15139954420753027366,4332689474954257086,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:3832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,15139954420753027366,4332689474954257086,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:4800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,15139954420753027366,4332689474954257086,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5172 /prefetch:82⤵PID:4452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,15139954420753027366,4332689474954257086,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5172 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,15139954420753027366,4332689474954257086,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4740 /prefetch:12⤵PID:3420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,15139954420753027366,4332689474954257086,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4724 /prefetch:12⤵PID:1080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,15139954420753027366,4332689474954257086,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3552 /prefetch:12⤵PID:5064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,15139954420753027366,4332689474954257086,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5576 /prefetch:12⤵PID:3832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,15139954420753027366,4332689474954257086,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1976 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3412
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:688
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5064
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD562c02dda2bf22d702a9b3a1c547c5f6a
SHA18f42966df96bd2e8c1f6b31b37c9a19beb6394d6
SHA256cb8a0964605551ed5a0668c08ab888044bbd845c9225ffee5a28e0b847ede62b
SHA512a7ce2c0946382188e1d8480cfb096b29bd0dcb260ccdc74167cc351160a1884d04d57a2517eb700b3eef30eaf4a01bfbf31858365b1e624d4b0960ffd0032fa9
-
Filesize
152B
MD5850f27f857369bf7fe83c613d2ec35cb
SHA17677a061c6fd2a030b44841bfb32da0abc1dbefb
SHA256a7db700e067222e55e323a9ffc71a92f59829e81021e2607cec0d2ec6faf602a
SHA5127b1efa002b7a1a23973bff0618fb4a82cd0c5193df55cd960c7516caa63509587fd8b36f3aea6db01ece368065865af6472365b820fadce720b64b561ab5f401
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\3dbb1439-b90a-4591-9131-880d5467c90b.tmp
Filesize5KB
MD54ba407f7a354bfaf96b52e80432d42b2
SHA10396b4e30afd3b57a62d3b022f6fe5c9a7f9545f
SHA256d8a300296be7d722f71e7675840b8a309a4b1ad73488ce6babbbdd9de2563414
SHA5125df71712a987defaeac60eff328a9659a9291f330b8eca53b83f6c23b46b464dee7cbe12e2924290dc5fb1a8ae5a0c3b745dcaa523d366f06fb951bafb76b9e1
-
Filesize
6KB
MD5c2d60ea366664e80463dc12ddfd75a2b
SHA11e85d802f8ef76d0737518431b4c26bd6eb7d25a
SHA256984550348038242f6d483e1a233c643409bacd66e11df1af8d04d5c4c917b2f6
SHA512afe0d2e025eebd2b681d8aa0feeafbf63876f802a80ae839742039192a3225270ab5b12c1907afbe125e4e1fd82c68e0d7789780b1e04b2c650c930260a38b9b
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD54153e1e2206163ee6bac0cf72bf36fdf
SHA1ba4b035ce81419176b596d4802de015f1abe3277
SHA256a673c1a5f125023b9902d959b18c0eb23057d26a8ae5bd7fbb9766df72e3a919
SHA512164e0503e71816968ebc678df14c461ca2b23d138eff24d63d4faf3fc04f4a68d36cd04d566a66c38e9eee8aa66f6bb71baff5bcfe25c11bb81f4aed1e32d994