Analysis
-
max time kernel
149s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
09-05-2024 22:18
Static task
static1
Behavioral task
behavioral1
Sample
2bfbd8cbc5deec8a4bc026d88a8eda30_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2bfbd8cbc5deec8a4bc026d88a8eda30_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
2bfbd8cbc5deec8a4bc026d88a8eda30_JaffaCakes118.html
-
Size
279KB
-
MD5
2bfbd8cbc5deec8a4bc026d88a8eda30
-
SHA1
d4aead91bb5791a82fcfd3008456b45272862215
-
SHA256
1c013a21318d757167808e58cf0b6c782bd9506cd63d5fdc06daf49af3cb506c
-
SHA512
e0926a8455c48b61b67d0e214eb5cbf45b88f8ef24f4975fbd91f4dd272b1c3e80d495e097b320e6088e212b9ad90320b684a3c47a505d9711901ad1b9f42d96
-
SSDEEP
3072:yOiXm4ncNvdo+zz0zxdI0nbyc2Sop8tksbCnrbo3dR:SZq0z2S6JG
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2580 msedge.exe 2580 msedge.exe 2604 msedge.exe 2604 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2788 identity_helper.exe 2788 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2604 msedge.exe 2604 msedge.exe 2604 msedge.exe 2604 msedge.exe 2604 msedge.exe 2604 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2604 msedge.exe 2604 msedge.exe 2604 msedge.exe 2604 msedge.exe 2604 msedge.exe 2604 msedge.exe 2604 msedge.exe 2604 msedge.exe 2604 msedge.exe 2604 msedge.exe 2604 msedge.exe 2604 msedge.exe 2604 msedge.exe 2604 msedge.exe 2604 msedge.exe 2604 msedge.exe 2604 msedge.exe 2604 msedge.exe 2604 msedge.exe 2604 msedge.exe 2604 msedge.exe 2604 msedge.exe 2604 msedge.exe 2604 msedge.exe 2604 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2604 msedge.exe 2604 msedge.exe 2604 msedge.exe 2604 msedge.exe 2604 msedge.exe 2604 msedge.exe 2604 msedge.exe 2604 msedge.exe 2604 msedge.exe 2604 msedge.exe 2604 msedge.exe 2604 msedge.exe 2604 msedge.exe 2604 msedge.exe 2604 msedge.exe 2604 msedge.exe 2604 msedge.exe 2604 msedge.exe 2604 msedge.exe 2604 msedge.exe 2604 msedge.exe 2604 msedge.exe 2604 msedge.exe 2604 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2604 wrote to memory of 2320 2604 msedge.exe 82 PID 2604 wrote to memory of 2320 2604 msedge.exe 82 PID 2604 wrote to memory of 4564 2604 msedge.exe 83 PID 2604 wrote to memory of 4564 2604 msedge.exe 83 PID 2604 wrote to memory of 4564 2604 msedge.exe 83 PID 2604 wrote to memory of 4564 2604 msedge.exe 83 PID 2604 wrote to memory of 4564 2604 msedge.exe 83 PID 2604 wrote to memory of 4564 2604 msedge.exe 83 PID 2604 wrote to memory of 4564 2604 msedge.exe 83 PID 2604 wrote to memory of 4564 2604 msedge.exe 83 PID 2604 wrote to memory of 4564 2604 msedge.exe 83 PID 2604 wrote to memory of 4564 2604 msedge.exe 83 PID 2604 wrote to memory of 4564 2604 msedge.exe 83 PID 2604 wrote to memory of 4564 2604 msedge.exe 83 PID 2604 wrote to memory of 4564 2604 msedge.exe 83 PID 2604 wrote to memory of 4564 2604 msedge.exe 83 PID 2604 wrote to memory of 4564 2604 msedge.exe 83 PID 2604 wrote to memory of 4564 2604 msedge.exe 83 PID 2604 wrote to memory of 4564 2604 msedge.exe 83 PID 2604 wrote to memory of 4564 2604 msedge.exe 83 PID 2604 wrote to memory of 4564 2604 msedge.exe 83 PID 2604 wrote to memory of 4564 2604 msedge.exe 83 PID 2604 wrote to memory of 4564 2604 msedge.exe 83 PID 2604 wrote to memory of 4564 2604 msedge.exe 83 PID 2604 wrote to memory of 4564 2604 msedge.exe 83 PID 2604 wrote to memory of 4564 2604 msedge.exe 83 PID 2604 wrote to memory of 4564 2604 msedge.exe 83 PID 2604 wrote to memory of 4564 2604 msedge.exe 83 PID 2604 wrote to memory of 4564 2604 msedge.exe 83 PID 2604 wrote to memory of 4564 2604 msedge.exe 83 PID 2604 wrote to memory of 4564 2604 msedge.exe 83 PID 2604 wrote to memory of 4564 2604 msedge.exe 83 PID 2604 wrote to memory of 4564 2604 msedge.exe 83 PID 2604 wrote to memory of 4564 2604 msedge.exe 83 PID 2604 wrote to memory of 4564 2604 msedge.exe 83 PID 2604 wrote to memory of 4564 2604 msedge.exe 83 PID 2604 wrote to memory of 4564 2604 msedge.exe 83 PID 2604 wrote to memory of 4564 2604 msedge.exe 83 PID 2604 wrote to memory of 4564 2604 msedge.exe 83 PID 2604 wrote to memory of 4564 2604 msedge.exe 83 PID 2604 wrote to memory of 4564 2604 msedge.exe 83 PID 2604 wrote to memory of 4564 2604 msedge.exe 83 PID 2604 wrote to memory of 2580 2604 msedge.exe 84 PID 2604 wrote to memory of 2580 2604 msedge.exe 84 PID 2604 wrote to memory of 3376 2604 msedge.exe 85 PID 2604 wrote to memory of 3376 2604 msedge.exe 85 PID 2604 wrote to memory of 3376 2604 msedge.exe 85 PID 2604 wrote to memory of 3376 2604 msedge.exe 85 PID 2604 wrote to memory of 3376 2604 msedge.exe 85 PID 2604 wrote to memory of 3376 2604 msedge.exe 85 PID 2604 wrote to memory of 3376 2604 msedge.exe 85 PID 2604 wrote to memory of 3376 2604 msedge.exe 85 PID 2604 wrote to memory of 3376 2604 msedge.exe 85 PID 2604 wrote to memory of 3376 2604 msedge.exe 85 PID 2604 wrote to memory of 3376 2604 msedge.exe 85 PID 2604 wrote to memory of 3376 2604 msedge.exe 85 PID 2604 wrote to memory of 3376 2604 msedge.exe 85 PID 2604 wrote to memory of 3376 2604 msedge.exe 85 PID 2604 wrote to memory of 3376 2604 msedge.exe 85 PID 2604 wrote to memory of 3376 2604 msedge.exe 85 PID 2604 wrote to memory of 3376 2604 msedge.exe 85 PID 2604 wrote to memory of 3376 2604 msedge.exe 85 PID 2604 wrote to memory of 3376 2604 msedge.exe 85 PID 2604 wrote to memory of 3376 2604 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2bfbd8cbc5deec8a4bc026d88a8eda30_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0x40,0x108,0x7ff810c446f8,0x7ff810c44708,0x7ff810c447182⤵PID:2320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1936,13602009039035715877,10768623107349322993,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2268 /prefetch:22⤵PID:4564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1936,13602009039035715877,10768623107349322993,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2352 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1936,13602009039035715877,10768623107349322993,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2840 /prefetch:82⤵PID:3376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1936,13602009039035715877,10768623107349322993,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:2436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1936,13602009039035715877,10768623107349322993,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:3720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1936,13602009039035715877,10768623107349322993,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2368 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1936,13602009039035715877,10768623107349322993,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2460 /prefetch:12⤵PID:3620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1936,13602009039035715877,10768623107349322993,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4088 /prefetch:12⤵PID:4572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1936,13602009039035715877,10768623107349322993,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5588 /prefetch:82⤵PID:3612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1936,13602009039035715877,10768623107349322993,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5588 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1936,13602009039035715877,10768623107349322993,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:1540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1936,13602009039035715877,10768623107349322993,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3880 /prefetch:12⤵PID:3596
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5032
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3224
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
6KB
MD5744c585b0738fbeee6e2dcada7a31f00
SHA13eedcb3834e223c73428262fe176da1c7e43b905
SHA256019353b08a86d16a72868aaa92a18735e7425c0e4a4a7b2070ddcf03947af33d
SHA512a1a85319011b786b287813d7fade32660c71edf7d0f93fdc51c5469f0c9a46c61888e7fcb3f827bb1c970abb593fc097d4020b3ba431b45c6987f2d17c01fe1e
-
Filesize
6KB
MD5d9acc1658282d4f63d037a4a4e89b32d
SHA1ae4f40a819a10a9d08a38f44dcc69ad41dc1195e
SHA256d2464b6194e3bd7db6387d07718986ceb3bc4d0f14683b8c06b1bd77d43ba699
SHA512979a6102dc8d335280bc29d4368b8c59c09b6b5e3ce85a6f3e764a3c286a340f3e5515325c9636c3c7c02303c6043e2a78480337e271ab61b36259e8ca468176
-
Filesize
6KB
MD5103d487d90dd5173014cf61927b336e6
SHA19dbbb65b6ac642710b4404c8bdc80a56692a210e
SHA2567c439aabf4231d5a7b01c8398de82344c59c899978cf473006ce1fdd85b891fd
SHA5127430d7d642ca33efd4711df24351dcbf6fb4eceb94ec6d841fcda0d9bba0a2b2df6f15d0499bd8150c1c7810a15367dd260f216e623b082715c1efe5a04d664d
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD57b29c51d05c6cd12d4f513430d60f243
SHA1c79dafec5a46c12b8ccc9e77741bae372ce29a12
SHA2565398bd78813f210399e1f8c087244f1729107f3d050f5296c1b47790bd1894be
SHA5123f5b93613839886db389a576539487b2903a78b07ddaba9915c980157d889ce22bba90ad3d1f805b279c3a39c237df0f337cb461ad56b059442543f5e912f5c8