Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
09/05/2024, 23:40
Static task
static1
Behavioral task
behavioral1
Sample
2c46ee267b1bb26a48c0d3dd6b2dc224_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
2c46ee267b1bb26a48c0d3dd6b2dc224_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
2c46ee267b1bb26a48c0d3dd6b2dc224_JaffaCakes118.html
-
Size
2KB
-
MD5
2c46ee267b1bb26a48c0d3dd6b2dc224
-
SHA1
c4e52a01076d257a4f719e4b628c651d8d70298a
-
SHA256
3950a98bd1f39f5786d180197d11c3ab65004cb0db8cc4eba447e5b6dc7fb18b
-
SHA512
f70e1d057c5d5bd67bc919796517ce6081f61f34088d6b8c237b8719e1f17c563418343ad08e8d5bda7a040b2f5251b0ffcedac93223ead9fce9a83e69a6290f
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1432 msedge.exe 1432 msedge.exe 3288 msedge.exe 3288 msedge.exe 2272 identity_helper.exe 2272 identity_helper.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3288 wrote to memory of 4412 3288 msedge.exe 81 PID 3288 wrote to memory of 4412 3288 msedge.exe 81 PID 3288 wrote to memory of 1428 3288 msedge.exe 82 PID 3288 wrote to memory of 1428 3288 msedge.exe 82 PID 3288 wrote to memory of 1428 3288 msedge.exe 82 PID 3288 wrote to memory of 1428 3288 msedge.exe 82 PID 3288 wrote to memory of 1428 3288 msedge.exe 82 PID 3288 wrote to memory of 1428 3288 msedge.exe 82 PID 3288 wrote to memory of 1428 3288 msedge.exe 82 PID 3288 wrote to memory of 1428 3288 msedge.exe 82 PID 3288 wrote to memory of 1428 3288 msedge.exe 82 PID 3288 wrote to memory of 1428 3288 msedge.exe 82 PID 3288 wrote to memory of 1428 3288 msedge.exe 82 PID 3288 wrote to memory of 1428 3288 msedge.exe 82 PID 3288 wrote to memory of 1428 3288 msedge.exe 82 PID 3288 wrote to memory of 1428 3288 msedge.exe 82 PID 3288 wrote to memory of 1428 3288 msedge.exe 82 PID 3288 wrote to memory of 1428 3288 msedge.exe 82 PID 3288 wrote to memory of 1428 3288 msedge.exe 82 PID 3288 wrote to memory of 1428 3288 msedge.exe 82 PID 3288 wrote to memory of 1428 3288 msedge.exe 82 PID 3288 wrote to memory of 1428 3288 msedge.exe 82 PID 3288 wrote to memory of 1428 3288 msedge.exe 82 PID 3288 wrote to memory of 1428 3288 msedge.exe 82 PID 3288 wrote to memory of 1428 3288 msedge.exe 82 PID 3288 wrote to memory of 1428 3288 msedge.exe 82 PID 3288 wrote to memory of 1428 3288 msedge.exe 82 PID 3288 wrote to memory of 1428 3288 msedge.exe 82 PID 3288 wrote to memory of 1428 3288 msedge.exe 82 PID 3288 wrote to memory of 1428 3288 msedge.exe 82 PID 3288 wrote to memory of 1428 3288 msedge.exe 82 PID 3288 wrote to memory of 1428 3288 msedge.exe 82 PID 3288 wrote to memory of 1428 3288 msedge.exe 82 PID 3288 wrote to memory of 1428 3288 msedge.exe 82 PID 3288 wrote to memory of 1428 3288 msedge.exe 82 PID 3288 wrote to memory of 1428 3288 msedge.exe 82 PID 3288 wrote to memory of 1428 3288 msedge.exe 82 PID 3288 wrote to memory of 1428 3288 msedge.exe 82 PID 3288 wrote to memory of 1428 3288 msedge.exe 82 PID 3288 wrote to memory of 1428 3288 msedge.exe 82 PID 3288 wrote to memory of 1428 3288 msedge.exe 82 PID 3288 wrote to memory of 1428 3288 msedge.exe 82 PID 3288 wrote to memory of 1432 3288 msedge.exe 83 PID 3288 wrote to memory of 1432 3288 msedge.exe 83 PID 3288 wrote to memory of 3588 3288 msedge.exe 84 PID 3288 wrote to memory of 3588 3288 msedge.exe 84 PID 3288 wrote to memory of 3588 3288 msedge.exe 84 PID 3288 wrote to memory of 3588 3288 msedge.exe 84 PID 3288 wrote to memory of 3588 3288 msedge.exe 84 PID 3288 wrote to memory of 3588 3288 msedge.exe 84 PID 3288 wrote to memory of 3588 3288 msedge.exe 84 PID 3288 wrote to memory of 3588 3288 msedge.exe 84 PID 3288 wrote to memory of 3588 3288 msedge.exe 84 PID 3288 wrote to memory of 3588 3288 msedge.exe 84 PID 3288 wrote to memory of 3588 3288 msedge.exe 84 PID 3288 wrote to memory of 3588 3288 msedge.exe 84 PID 3288 wrote to memory of 3588 3288 msedge.exe 84 PID 3288 wrote to memory of 3588 3288 msedge.exe 84 PID 3288 wrote to memory of 3588 3288 msedge.exe 84 PID 3288 wrote to memory of 3588 3288 msedge.exe 84 PID 3288 wrote to memory of 3588 3288 msedge.exe 84 PID 3288 wrote to memory of 3588 3288 msedge.exe 84 PID 3288 wrote to memory of 3588 3288 msedge.exe 84 PID 3288 wrote to memory of 3588 3288 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2c46ee267b1bb26a48c0d3dd6b2dc224_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3288 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa088046f8,0x7ffa08804708,0x7ffa088047182⤵PID:4412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2168,12364965405159198498,2210587222752234004,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2176 /prefetch:22⤵PID:1428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2168,12364965405159198498,2210587222752234004,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2232 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2168,12364965405159198498,2210587222752234004,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2720 /prefetch:82⤵PID:3588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,12364965405159198498,2210587222752234004,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:4608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,12364965405159198498,2210587222752234004,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:12⤵PID:3560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2168,12364965405159198498,2210587222752234004,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5176 /prefetch:82⤵PID:692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2168,12364965405159198498,2210587222752234004,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5176 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,12364965405159198498,2210587222752234004,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5268 /prefetch:12⤵PID:1080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,12364965405159198498,2210587222752234004,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5284 /prefetch:12⤵PID:1508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,12364965405159198498,2210587222752234004,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2568 /prefetch:12⤵PID:4960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,12364965405159198498,2210587222752234004,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5456 /prefetch:12⤵PID:3160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2168,12364965405159198498,2210587222752234004,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3060 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4364
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:876
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1908
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556641592f6e69f5f5fb06f2319384490
SHA16a86be42e2c6d26b7830ad9f4e2627995fd91069
SHA25602d4984e590e947265474d592e64edde840fdca7eb881eebde3e220a1d883455
SHA512c75e689b2bbbe07ebf72baf75c56f19c39f45d5593cf47535eb722f95002b3ee418027047c0ee8d63800f499038db5e2c24aff9705d830c7b6eaa290d9adc868
-
Filesize
152B
MD5612a6c4247ef652299b376221c984213
SHA1d306f3b16bde39708aa862aee372345feb559750
SHA2569d8e24c91cff338e56b518a533cb2e49a2803356bbf6e04892fb168a7ce2844a
SHA51234a14d63abb1e3fe0f9927a94393043d458fe0624843e108d290266f554018e6379cba924cb5388735abdd6c5f1e2e318478a673f3f9b762815a758866d10973
-
Filesize
6KB
MD51c954686a82e7a5000f0785208cfbede
SHA129b2b8e08bc74b33b9d637b1104b088203f5c6c3
SHA256fcc28e485f3456e1e4df8864a6ddc84186bfd2dbad410876440ea140467660bd
SHA512a659a5494db506b79afb0b79286018b81ee0c332990b8f8613283b668caac783f1e4d713661fe22b855cab16d0fe8bfb693605d0e9ee66a80b4057f6993b8d4d
-
Filesize
6KB
MD5c831da1819b9c5ed20fce1c8b06921b9
SHA1bf4cb6bba4c47202bd77ba96d526489417da4e14
SHA25654846f7dbadc71f15a43bac9fd4bc6d067e61036bee2e8dbf114ac926580085f
SHA512d4b3a256541ef9045d0fa910345bbc874150aa548a9c5caaa9005bb17b86a91ef8ea783ef220b9eb42109a9395c3bbfe876d9fd32856af2e7d8b4b6f975695c6
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD505090534f8698d29e09cc97b939dc2c5
SHA1bad745ccbfaf2d812e8b295053401f8dcd9a047b
SHA2563b70ec1fd56dbd663be405c2d007b1c3fdf4e839e05631735899f0bb40078c24
SHA5122bff93992e5e077d2a8226c1c1b62ee4358106e992ea0b3153ee51a9dfdeffb7ba8f0d839e8eb1549966b33096436732ba3a8db59633169366439ba44e559952