Analysis
-
max time kernel
148s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
09/05/2024, 22:25
Static task
static1
Behavioral task
behavioral1
Sample
2c0288fe8e0532865fb79e9171159c1b_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2c0288fe8e0532865fb79e9171159c1b_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
2c0288fe8e0532865fb79e9171159c1b_JaffaCakes118.html
-
Size
70KB
-
MD5
2c0288fe8e0532865fb79e9171159c1b
-
SHA1
bfde4484419ce5967e92deb0d0839d5c9f85d84d
-
SHA256
04e8ab42a5e87cb2bee1c1a686289b3f5e0486c67e4951f79da2faafc14060c2
-
SHA512
cecae9b25aecc9dc37d7c63149ada655e249ff3f5ab097a2235add198321c8a2d1017cd84d00b68327b3ebed9f0fc4140343c34bba7e4580b3b078a90df6eeac
-
SSDEEP
768:JiugcMiR3sI2PDDnX0g6s/m6fPlzhQMXoTyS1wCZkoTyMdtbBnfBgN8/lboi2hcc:JqTLNljYTzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3568 msedge.exe 3568 msedge.exe 4784 msedge.exe 4784 msedge.exe 2848 identity_helper.exe 2848 identity_helper.exe 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4784 wrote to memory of 4404 4784 msedge.exe 84 PID 4784 wrote to memory of 4404 4784 msedge.exe 84 PID 4784 wrote to memory of 632 4784 msedge.exe 85 PID 4784 wrote to memory of 632 4784 msedge.exe 85 PID 4784 wrote to memory of 632 4784 msedge.exe 85 PID 4784 wrote to memory of 632 4784 msedge.exe 85 PID 4784 wrote to memory of 632 4784 msedge.exe 85 PID 4784 wrote to memory of 632 4784 msedge.exe 85 PID 4784 wrote to memory of 632 4784 msedge.exe 85 PID 4784 wrote to memory of 632 4784 msedge.exe 85 PID 4784 wrote to memory of 632 4784 msedge.exe 85 PID 4784 wrote to memory of 632 4784 msedge.exe 85 PID 4784 wrote to memory of 632 4784 msedge.exe 85 PID 4784 wrote to memory of 632 4784 msedge.exe 85 PID 4784 wrote to memory of 632 4784 msedge.exe 85 PID 4784 wrote to memory of 632 4784 msedge.exe 85 PID 4784 wrote to memory of 632 4784 msedge.exe 85 PID 4784 wrote to memory of 632 4784 msedge.exe 85 PID 4784 wrote to memory of 632 4784 msedge.exe 85 PID 4784 wrote to memory of 632 4784 msedge.exe 85 PID 4784 wrote to memory of 632 4784 msedge.exe 85 PID 4784 wrote to memory of 632 4784 msedge.exe 85 PID 4784 wrote to memory of 632 4784 msedge.exe 85 PID 4784 wrote to memory of 632 4784 msedge.exe 85 PID 4784 wrote to memory of 632 4784 msedge.exe 85 PID 4784 wrote to memory of 632 4784 msedge.exe 85 PID 4784 wrote to memory of 632 4784 msedge.exe 85 PID 4784 wrote to memory of 632 4784 msedge.exe 85 PID 4784 wrote to memory of 632 4784 msedge.exe 85 PID 4784 wrote to memory of 632 4784 msedge.exe 85 PID 4784 wrote to memory of 632 4784 msedge.exe 85 PID 4784 wrote to memory of 632 4784 msedge.exe 85 PID 4784 wrote to memory of 632 4784 msedge.exe 85 PID 4784 wrote to memory of 632 4784 msedge.exe 85 PID 4784 wrote to memory of 632 4784 msedge.exe 85 PID 4784 wrote to memory of 632 4784 msedge.exe 85 PID 4784 wrote to memory of 632 4784 msedge.exe 85 PID 4784 wrote to memory of 632 4784 msedge.exe 85 PID 4784 wrote to memory of 632 4784 msedge.exe 85 PID 4784 wrote to memory of 632 4784 msedge.exe 85 PID 4784 wrote to memory of 632 4784 msedge.exe 85 PID 4784 wrote to memory of 632 4784 msedge.exe 85 PID 4784 wrote to memory of 3568 4784 msedge.exe 86 PID 4784 wrote to memory of 3568 4784 msedge.exe 86 PID 4784 wrote to memory of 4544 4784 msedge.exe 87 PID 4784 wrote to memory of 4544 4784 msedge.exe 87 PID 4784 wrote to memory of 4544 4784 msedge.exe 87 PID 4784 wrote to memory of 4544 4784 msedge.exe 87 PID 4784 wrote to memory of 4544 4784 msedge.exe 87 PID 4784 wrote to memory of 4544 4784 msedge.exe 87 PID 4784 wrote to memory of 4544 4784 msedge.exe 87 PID 4784 wrote to memory of 4544 4784 msedge.exe 87 PID 4784 wrote to memory of 4544 4784 msedge.exe 87 PID 4784 wrote to memory of 4544 4784 msedge.exe 87 PID 4784 wrote to memory of 4544 4784 msedge.exe 87 PID 4784 wrote to memory of 4544 4784 msedge.exe 87 PID 4784 wrote to memory of 4544 4784 msedge.exe 87 PID 4784 wrote to memory of 4544 4784 msedge.exe 87 PID 4784 wrote to memory of 4544 4784 msedge.exe 87 PID 4784 wrote to memory of 4544 4784 msedge.exe 87 PID 4784 wrote to memory of 4544 4784 msedge.exe 87 PID 4784 wrote to memory of 4544 4784 msedge.exe 87 PID 4784 wrote to memory of 4544 4784 msedge.exe 87 PID 4784 wrote to memory of 4544 4784 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2c0288fe8e0532865fb79e9171159c1b_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4784 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8c93a46f8,0x7ff8c93a4708,0x7ff8c93a47182⤵PID:4404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,8224083601078982282,2244094951392437804,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵PID:632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2064,8224083601078982282,2244094951392437804,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2144 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2064,8224083601078982282,2244094951392437804,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2656 /prefetch:82⤵PID:4544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,8224083601078982282,2244094951392437804,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3180 /prefetch:12⤵PID:420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,8224083601078982282,2244094951392437804,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3204 /prefetch:12⤵PID:3624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,8224083601078982282,2244094951392437804,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5208 /prefetch:82⤵PID:4252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,8224083601078982282,2244094951392437804,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5208 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,8224083601078982282,2244094951392437804,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5284 /prefetch:12⤵PID:4888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,8224083601078982282,2244094951392437804,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5304 /prefetch:12⤵PID:4960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,8224083601078982282,2244094951392437804,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3428 /prefetch:12⤵PID:2396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,8224083601078982282,2244094951392437804,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5600 /prefetch:12⤵PID:2600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,8224083601078982282,2244094951392437804,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4820 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3208
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:396
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3636
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54f7152bc5a1a715ef481e37d1c791959
SHA1c8a1ed674c62ae4f45519f90a8cc5a81eff3a6d7
SHA256704dd4f98d8ca34ec421f23ba1891b178c23c14b3301e4655efc5c02d356c2bc
SHA5122e6b02ca35d76a655a17a5f3e9dbd8d7517c7dae24f0095c7350eb9e7bdf9e1256a7009aa8878f96c89d1ea4fe5323a41f72b8c551806dda62880d7ff231ff5c
-
Filesize
152B
MD5ea98e583ad99df195d29aa066204ab56
SHA1f89398664af0179641aa0138b337097b617cb2db
SHA256a7abb51435909fa2d75c6f2ff5c69a93d4a0ab276ed579e7d8733b2a63ffbee6
SHA512e109be3466e653e5d310b3e402e1626298b09205d223722a82344dd78504f3c33e1e24e8402a02f38cd2c9c50d96a303ce4846bea5a583423937ab018cd5782f
-
Filesize
5KB
MD576dc6b36426e6943e497110af6e4b05f
SHA18324c727ed6d1620f4acf8681d22f4767aa2fbf3
SHA25644f113e51edcedaf6d21b09ca643639ffea5eeb177e15f39de0dd944ef9af715
SHA512c5c636c39645e7c8372b0f2e3212561ee4c901c0dc90f28bb648b71b59134eacd6b09e03ccb002e145aaf892236ce3c719e3d85ab752aa3c3a6c6a83968a9765
-
Filesize
6KB
MD55d1221f0d8e1945ae8b1091f1d7bbb83
SHA11b91cca17aa78116b0435adb2ec75cc5d7d65fab
SHA256296a582ec3baa60dfb432a48b461779d47dc912e3d5a9ab73f24b6c882e02d1f
SHA512363f4fc313ea3d6d6ec1775821fab5093aa37a34dcedcc7911303eaa2352e5bf9ec6c33db45276ca7c2be7147a6c635fe66f2d6565b03887a64b23cb2b3f280e
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5b3ac674e51eb9598af4b37a846e6fe13
SHA1d6bc28452c452861c752888df2eebfa77bb3949a
SHA2568e9cd1e16e1a02fd30328f083c5cff9789cb1286f011129833624c1fc4e7314c
SHA51227a5ba9a6b4d9fbd8d358186452e4279a48502a365cc6102485f74a6b1a20bad8c71742fba4756aeab8b382f443ca9c54a76a42c7c59de3662fd8be9f06c9fb7