Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
09/05/2024, 22:08
Static task
static1
Behavioral task
behavioral1
Sample
2bf2ecc8455893a55267608b5f1aae25_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2bf2ecc8455893a55267608b5f1aae25_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
2bf2ecc8455893a55267608b5f1aae25_JaffaCakes118.html
-
Size
18KB
-
MD5
2bf2ecc8455893a55267608b5f1aae25
-
SHA1
bb29cfd7f2415ec7fbf09e6cc08e28ce5122a11d
-
SHA256
2765aabefa3b4b3947ab6ec0bbd336a2616ee2e985ac0d0dd379304888cf84fb
-
SHA512
644ea75e270dd35d66988b6d8c34fe400573ab8f40a0511fd509c07a1f36689099c416f17eb497bcb4dba6b3afc1501b65ed10f3360eff69ad803d62f0e2b1d1
-
SSDEEP
192:SIM3t0I5fo9cKivXQWxZxdkVSoAI/titi4titiUtitiEtitiWtitic4ytitiutiG:SIMd0I5nvH5svuDxDB8
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4600 msedge.exe 4600 msedge.exe 1416 msedge.exe 1416 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1416 msedge.exe 1416 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1416 wrote to memory of 4808 1416 msedge.exe 83 PID 1416 wrote to memory of 4808 1416 msedge.exe 83 PID 1416 wrote to memory of 4484 1416 msedge.exe 85 PID 1416 wrote to memory of 4484 1416 msedge.exe 85 PID 1416 wrote to memory of 4484 1416 msedge.exe 85 PID 1416 wrote to memory of 4484 1416 msedge.exe 85 PID 1416 wrote to memory of 4484 1416 msedge.exe 85 PID 1416 wrote to memory of 4484 1416 msedge.exe 85 PID 1416 wrote to memory of 4484 1416 msedge.exe 85 PID 1416 wrote to memory of 4484 1416 msedge.exe 85 PID 1416 wrote to memory of 4484 1416 msedge.exe 85 PID 1416 wrote to memory of 4484 1416 msedge.exe 85 PID 1416 wrote to memory of 4484 1416 msedge.exe 85 PID 1416 wrote to memory of 4484 1416 msedge.exe 85 PID 1416 wrote to memory of 4484 1416 msedge.exe 85 PID 1416 wrote to memory of 4484 1416 msedge.exe 85 PID 1416 wrote to memory of 4484 1416 msedge.exe 85 PID 1416 wrote to memory of 4484 1416 msedge.exe 85 PID 1416 wrote to memory of 4484 1416 msedge.exe 85 PID 1416 wrote to memory of 4484 1416 msedge.exe 85 PID 1416 wrote to memory of 4484 1416 msedge.exe 85 PID 1416 wrote to memory of 4484 1416 msedge.exe 85 PID 1416 wrote to memory of 4484 1416 msedge.exe 85 PID 1416 wrote to memory of 4484 1416 msedge.exe 85 PID 1416 wrote to memory of 4484 1416 msedge.exe 85 PID 1416 wrote to memory of 4484 1416 msedge.exe 85 PID 1416 wrote to memory of 4484 1416 msedge.exe 85 PID 1416 wrote to memory of 4484 1416 msedge.exe 85 PID 1416 wrote to memory of 4484 1416 msedge.exe 85 PID 1416 wrote to memory of 4484 1416 msedge.exe 85 PID 1416 wrote to memory of 4484 1416 msedge.exe 85 PID 1416 wrote to memory of 4484 1416 msedge.exe 85 PID 1416 wrote to memory of 4484 1416 msedge.exe 85 PID 1416 wrote to memory of 4484 1416 msedge.exe 85 PID 1416 wrote to memory of 4484 1416 msedge.exe 85 PID 1416 wrote to memory of 4484 1416 msedge.exe 85 PID 1416 wrote to memory of 4484 1416 msedge.exe 85 PID 1416 wrote to memory of 4484 1416 msedge.exe 85 PID 1416 wrote to memory of 4484 1416 msedge.exe 85 PID 1416 wrote to memory of 4484 1416 msedge.exe 85 PID 1416 wrote to memory of 4484 1416 msedge.exe 85 PID 1416 wrote to memory of 4484 1416 msedge.exe 85 PID 1416 wrote to memory of 4600 1416 msedge.exe 86 PID 1416 wrote to memory of 4600 1416 msedge.exe 86 PID 1416 wrote to memory of 4520 1416 msedge.exe 87 PID 1416 wrote to memory of 4520 1416 msedge.exe 87 PID 1416 wrote to memory of 4520 1416 msedge.exe 87 PID 1416 wrote to memory of 4520 1416 msedge.exe 87 PID 1416 wrote to memory of 4520 1416 msedge.exe 87 PID 1416 wrote to memory of 4520 1416 msedge.exe 87 PID 1416 wrote to memory of 4520 1416 msedge.exe 87 PID 1416 wrote to memory of 4520 1416 msedge.exe 87 PID 1416 wrote to memory of 4520 1416 msedge.exe 87 PID 1416 wrote to memory of 4520 1416 msedge.exe 87 PID 1416 wrote to memory of 4520 1416 msedge.exe 87 PID 1416 wrote to memory of 4520 1416 msedge.exe 87 PID 1416 wrote to memory of 4520 1416 msedge.exe 87 PID 1416 wrote to memory of 4520 1416 msedge.exe 87 PID 1416 wrote to memory of 4520 1416 msedge.exe 87 PID 1416 wrote to memory of 4520 1416 msedge.exe 87 PID 1416 wrote to memory of 4520 1416 msedge.exe 87 PID 1416 wrote to memory of 4520 1416 msedge.exe 87 PID 1416 wrote to memory of 4520 1416 msedge.exe 87 PID 1416 wrote to memory of 4520 1416 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2bf2ecc8455893a55267608b5f1aae25_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1416 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa5c0e46f8,0x7ffa5c0e4708,0x7ffa5c0e47182⤵PID:4808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2028,4005182418819742474,6311976371736995148,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2072 /prefetch:22⤵PID:4484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2028,4005182418819742474,6311976371736995148,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2332 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2028,4005182418819742474,6311976371736995148,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2916 /prefetch:82⤵PID:4520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,4005182418819742474,6311976371736995148,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:1432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,4005182418819742474,6311976371736995148,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:2300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2028,4005182418819742474,6311976371736995148,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3160 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4400
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3020
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4576
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
Filesize
6KB
MD5266a29649fed3b5d691fff5801407289
SHA1c4a1ee7eeb0556875b5b52390fae56ca3df7617d
SHA256f3bc761bcdd07323724f430b914e64712521f19bc44dd53ff83e61d20ff2f8d0
SHA5121d16a565db4feeff26f26989cb2574eea123c08db1f20940dabd843949e822327e8b2752557d5e1d626e82c9a3a469f09a753f7961b19fad11d0046b0617b3c8
-
Filesize
6KB
MD5b461e91b6d1d50deff11dd29be8dbbf4
SHA1f4da692e56174968825dd132ecd159ac3ec73dc2
SHA256d59eac647618711b06625429484a67df793b184f5911bdcab1ecefff04c2fe6e
SHA5128f8e4a81fc43090602c4ae637471a4592995bca189615d4d64a20d75153e864f223c6798d7163e8cb74228fb25a506cf0f951a59642b297eae0c224016802bd8
-
Filesize
6KB
MD57055643198b556e92b4ca8d6c7e01232
SHA1022733948b11f2e20ed20ffc25caf439e0baa27d
SHA256531a24394b9e835eeb6861c03ced37e2f078d0bb1dbc198aa1eef5812178a01f
SHA5125a33677631c686923602ee8d6cb36cd1da2c6cc6f9bcdc88bc4cb87ff7f6060dc48390ff0a78d58cec3912a70e227d7603cb9e9dc2ed9891976d523bf13cf24d
-
Filesize
11KB
MD5007569c3b485631f298f87decfcbcd8e
SHA1961a80e88ccc3964d4b38c6ffba634948838cffc
SHA256379595097da12721c22276875f67e03d79f6517746264da56c250958155356e9
SHA51290d004f14dbc68595a6c0afe011fefab9f4b3b63b83f8e4411683cf26293c2f9fcc5d95507f474715169454c080350825c255d6e9d03e0c5d8ef2c79021b4fc6