Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
08/05/2024, 10:40
Static task
static1
Behavioral task
behavioral1
Sample
2477a5eccbfc14124a426fc8f45a8882_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2477a5eccbfc14124a426fc8f45a8882_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
2477a5eccbfc14124a426fc8f45a8882_JaffaCakes118.html
-
Size
26KB
-
MD5
2477a5eccbfc14124a426fc8f45a8882
-
SHA1
0d604bd12253b42d62901840cd562ed63db6647f
-
SHA256
ade8204fd9c192fca4aaa6862df50c973c3e4b32158909174c1a516bb9da29dd
-
SHA512
3414f8ef03d503ed0790ba4eaef686deccd70df81cd5a603f6e3576409152fe4542e22b67dc0962054586c3f6f28ba1b075dee1413804e64131124ba907587d6
-
SSDEEP
192:uq7zLrb5n1ynQjxn5Q/MnQievNn1nQOkEntUenQTbnFnQ7CJVevo7Nt6Fo+NzQ48:nHQ/7ygcFd1Z
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 636 msedge.exe 636 msedge.exe 2808 msedge.exe 2808 msedge.exe 3564 identity_helper.exe 3564 identity_helper.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2808 msedge.exe 2808 msedge.exe 2808 msedge.exe 2808 msedge.exe 2808 msedge.exe 2808 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2808 msedge.exe 2808 msedge.exe 2808 msedge.exe 2808 msedge.exe 2808 msedge.exe 2808 msedge.exe 2808 msedge.exe 2808 msedge.exe 2808 msedge.exe 2808 msedge.exe 2808 msedge.exe 2808 msedge.exe 2808 msedge.exe 2808 msedge.exe 2808 msedge.exe 2808 msedge.exe 2808 msedge.exe 2808 msedge.exe 2808 msedge.exe 2808 msedge.exe 2808 msedge.exe 2808 msedge.exe 2808 msedge.exe 2808 msedge.exe 2808 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2808 msedge.exe 2808 msedge.exe 2808 msedge.exe 2808 msedge.exe 2808 msedge.exe 2808 msedge.exe 2808 msedge.exe 2808 msedge.exe 2808 msedge.exe 2808 msedge.exe 2808 msedge.exe 2808 msedge.exe 2808 msedge.exe 2808 msedge.exe 2808 msedge.exe 2808 msedge.exe 2808 msedge.exe 2808 msedge.exe 2808 msedge.exe 2808 msedge.exe 2808 msedge.exe 2808 msedge.exe 2808 msedge.exe 2808 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2808 wrote to memory of 3820 2808 msedge.exe 82 PID 2808 wrote to memory of 3820 2808 msedge.exe 82 PID 2808 wrote to memory of 1456 2808 msedge.exe 83 PID 2808 wrote to memory of 1456 2808 msedge.exe 83 PID 2808 wrote to memory of 1456 2808 msedge.exe 83 PID 2808 wrote to memory of 1456 2808 msedge.exe 83 PID 2808 wrote to memory of 1456 2808 msedge.exe 83 PID 2808 wrote to memory of 1456 2808 msedge.exe 83 PID 2808 wrote to memory of 1456 2808 msedge.exe 83 PID 2808 wrote to memory of 1456 2808 msedge.exe 83 PID 2808 wrote to memory of 1456 2808 msedge.exe 83 PID 2808 wrote to memory of 1456 2808 msedge.exe 83 PID 2808 wrote to memory of 1456 2808 msedge.exe 83 PID 2808 wrote to memory of 1456 2808 msedge.exe 83 PID 2808 wrote to memory of 1456 2808 msedge.exe 83 PID 2808 wrote to memory of 1456 2808 msedge.exe 83 PID 2808 wrote to memory of 1456 2808 msedge.exe 83 PID 2808 wrote to memory of 1456 2808 msedge.exe 83 PID 2808 wrote to memory of 1456 2808 msedge.exe 83 PID 2808 wrote to memory of 1456 2808 msedge.exe 83 PID 2808 wrote to memory of 1456 2808 msedge.exe 83 PID 2808 wrote to memory of 1456 2808 msedge.exe 83 PID 2808 wrote to memory of 1456 2808 msedge.exe 83 PID 2808 wrote to memory of 1456 2808 msedge.exe 83 PID 2808 wrote to memory of 1456 2808 msedge.exe 83 PID 2808 wrote to memory of 1456 2808 msedge.exe 83 PID 2808 wrote to memory of 1456 2808 msedge.exe 83 PID 2808 wrote to memory of 1456 2808 msedge.exe 83 PID 2808 wrote to memory of 1456 2808 msedge.exe 83 PID 2808 wrote to memory of 1456 2808 msedge.exe 83 PID 2808 wrote to memory of 1456 2808 msedge.exe 83 PID 2808 wrote to memory of 1456 2808 msedge.exe 83 PID 2808 wrote to memory of 1456 2808 msedge.exe 83 PID 2808 wrote to memory of 1456 2808 msedge.exe 83 PID 2808 wrote to memory of 1456 2808 msedge.exe 83 PID 2808 wrote to memory of 1456 2808 msedge.exe 83 PID 2808 wrote to memory of 1456 2808 msedge.exe 83 PID 2808 wrote to memory of 1456 2808 msedge.exe 83 PID 2808 wrote to memory of 1456 2808 msedge.exe 83 PID 2808 wrote to memory of 1456 2808 msedge.exe 83 PID 2808 wrote to memory of 1456 2808 msedge.exe 83 PID 2808 wrote to memory of 1456 2808 msedge.exe 83 PID 2808 wrote to memory of 636 2808 msedge.exe 84 PID 2808 wrote to memory of 636 2808 msedge.exe 84 PID 2808 wrote to memory of 4120 2808 msedge.exe 85 PID 2808 wrote to memory of 4120 2808 msedge.exe 85 PID 2808 wrote to memory of 4120 2808 msedge.exe 85 PID 2808 wrote to memory of 4120 2808 msedge.exe 85 PID 2808 wrote to memory of 4120 2808 msedge.exe 85 PID 2808 wrote to memory of 4120 2808 msedge.exe 85 PID 2808 wrote to memory of 4120 2808 msedge.exe 85 PID 2808 wrote to memory of 4120 2808 msedge.exe 85 PID 2808 wrote to memory of 4120 2808 msedge.exe 85 PID 2808 wrote to memory of 4120 2808 msedge.exe 85 PID 2808 wrote to memory of 4120 2808 msedge.exe 85 PID 2808 wrote to memory of 4120 2808 msedge.exe 85 PID 2808 wrote to memory of 4120 2808 msedge.exe 85 PID 2808 wrote to memory of 4120 2808 msedge.exe 85 PID 2808 wrote to memory of 4120 2808 msedge.exe 85 PID 2808 wrote to memory of 4120 2808 msedge.exe 85 PID 2808 wrote to memory of 4120 2808 msedge.exe 85 PID 2808 wrote to memory of 4120 2808 msedge.exe 85 PID 2808 wrote to memory of 4120 2808 msedge.exe 85 PID 2808 wrote to memory of 4120 2808 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2477a5eccbfc14124a426fc8f45a8882_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xdc,0x108,0x7ff8f93d46f8,0x7ff8f93d4708,0x7ff8f93d47182⤵PID:3820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,16870398567397427839,10629750809830990059,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2204 /prefetch:22⤵PID:1456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2148,16870398567397427839,10629750809830990059,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2256 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2148,16870398567397427839,10629750809830990059,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2900 /prefetch:82⤵PID:4120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,16870398567397427839,10629750809830990059,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:3836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,16870398567397427839,10629750809830990059,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,16870398567397427839,10629750809830990059,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5152 /prefetch:82⤵PID:3912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,16870398567397427839,10629750809830990059,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5152 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,16870398567397427839,10629750809830990059,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5148 /prefetch:12⤵PID:368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,16870398567397427839,10629750809830990059,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5248 /prefetch:12⤵PID:4844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,16870398567397427839,10629750809830990059,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:3912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,16870398567397427839,10629750809830990059,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5660 /prefetch:12⤵PID:2556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,16870398567397427839,10629750809830990059,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5332 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4808
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4040
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4812
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ae54e9db2e89f2c54da8cc0bfcbd26bd
SHA1a88af6c673609ecbc51a1a60dfbc8577830d2b5d
SHA2565009d3c953de63cfd14a7d911156c514e179ff07d2b94382d9caac6040cb72af
SHA512e3b70e5eb7321b9deca6f6a17424a15b9fd5c4008bd3789bd01099fd13cb2f4a2f37fe4b920fb51c50517745b576c1f94df83efd1a7e75949551163985599998
-
Filesize
152B
MD5f53207a5ca2ef5c7e976cbb3cb26d870
SHA149a8cc44f53da77bb3dfb36fc7676ed54675db43
SHA25619ab4e3c9da6d9cedda7461efdba9a2085e743513ab89f1dd0fd5a8f9486ad23
SHA512be734c7e8afda19f445912aef0d78f9941add29baebd4a812bff27f10a1d78b52aeb11c551468c8644443c86e1a2a6b2e4aead3d7f81d39925e3c20406ac1499
-
Filesize
6KB
MD5d952de4f73d92673c295f6c1eef7f270
SHA15aacc5d9cbb732e8599bfc9861b09164109a4013
SHA256b8d51720ae93437ec9d9dcd9c535936fd35453a28a3b01d501fc0dd0e8b55d8c
SHA5125d50f5cbb3277a4fb4133c6918842a6eb42bce3e34b377620705cc19f924f5ffc47456c0d1a91210a3482260b01dde029ba2e31def74a555a6882760acf128db
-
Filesize
6KB
MD57ce7c4cfd77e005e9662d74824d804db
SHA11e624c633f86c5b24a7f580b3d6e7a2d704cf855
SHA256fa3dd5d1090c93bab60ace48df4ec29c8776e57b840cdf5734c4364947ab8d98
SHA512c93742519d306c7e1145e81287dffba249c18097d93f583e0f305d4f3523df3dc0fea08fb3655858ee0931f93b1b4b90229a72922f6470228995c181cce67bb5
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD502e2c5588cba899a2883252f79d0687f
SHA11f352f05fa8a59fab588a2558f7be78a6f977a9f
SHA256b6d9f860d00ffaf1a68daa679dbc4c1cfc306cd67675f6dd42cd50552b90c46b
SHA512ce42e3132789735c6bb3b2841b7e76aea80d1e7ca71651b4b43e1c3d05f20595140ffab6535a8105aa862e8f0299706e2ef0d932f26a07027f44e42e11cba81a