Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
09/05/2024, 03:11
Static task
static1
Behavioral task
behavioral1
Sample
280517093a1da90e8dc5939b82b86556_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
280517093a1da90e8dc5939b82b86556_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
280517093a1da90e8dc5939b82b86556_JaffaCakes118.html
-
Size
93KB
-
MD5
280517093a1da90e8dc5939b82b86556
-
SHA1
125a7704d213e5db8db4f1ba712f925a300fd194
-
SHA256
588cfd258e3a07e66a0c2d8bee80cfd37c9af16e286e02cc802c91cb87431d1a
-
SHA512
16f09de605d223b98c5c57202b603e072561800b55c0ddda29d89d0d7b1f481b59e5baf3c478f0babbb1c46491fcddacc719cde6c41eb120ff641195dcad5ae0
-
SSDEEP
1536:G7a6zzuO4AzFNOf7tS+sMKkTQjOZoAhm5DR/imnn84ew10+ntVfpJ:8OfpdKoQjO2AhmOmn5Z1rntV7
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2332 msedge.exe 2332 msedge.exe 2136 msedge.exe 2136 msedge.exe 2308 identity_helper.exe 2308 identity_helper.exe 2952 msedge.exe 2952 msedge.exe 2952 msedge.exe 2952 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe 2136 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2136 wrote to memory of 1028 2136 msedge.exe 84 PID 2136 wrote to memory of 1028 2136 msedge.exe 84 PID 2136 wrote to memory of 228 2136 msedge.exe 85 PID 2136 wrote to memory of 228 2136 msedge.exe 85 PID 2136 wrote to memory of 228 2136 msedge.exe 85 PID 2136 wrote to memory of 228 2136 msedge.exe 85 PID 2136 wrote to memory of 228 2136 msedge.exe 85 PID 2136 wrote to memory of 228 2136 msedge.exe 85 PID 2136 wrote to memory of 228 2136 msedge.exe 85 PID 2136 wrote to memory of 228 2136 msedge.exe 85 PID 2136 wrote to memory of 228 2136 msedge.exe 85 PID 2136 wrote to memory of 228 2136 msedge.exe 85 PID 2136 wrote to memory of 228 2136 msedge.exe 85 PID 2136 wrote to memory of 228 2136 msedge.exe 85 PID 2136 wrote to memory of 228 2136 msedge.exe 85 PID 2136 wrote to memory of 228 2136 msedge.exe 85 PID 2136 wrote to memory of 228 2136 msedge.exe 85 PID 2136 wrote to memory of 228 2136 msedge.exe 85 PID 2136 wrote to memory of 228 2136 msedge.exe 85 PID 2136 wrote to memory of 228 2136 msedge.exe 85 PID 2136 wrote to memory of 228 2136 msedge.exe 85 PID 2136 wrote to memory of 228 2136 msedge.exe 85 PID 2136 wrote to memory of 228 2136 msedge.exe 85 PID 2136 wrote to memory of 228 2136 msedge.exe 85 PID 2136 wrote to memory of 228 2136 msedge.exe 85 PID 2136 wrote to memory of 228 2136 msedge.exe 85 PID 2136 wrote to memory of 228 2136 msedge.exe 85 PID 2136 wrote to memory of 228 2136 msedge.exe 85 PID 2136 wrote to memory of 228 2136 msedge.exe 85 PID 2136 wrote to memory of 228 2136 msedge.exe 85 PID 2136 wrote to memory of 228 2136 msedge.exe 85 PID 2136 wrote to memory of 228 2136 msedge.exe 85 PID 2136 wrote to memory of 228 2136 msedge.exe 85 PID 2136 wrote to memory of 228 2136 msedge.exe 85 PID 2136 wrote to memory of 228 2136 msedge.exe 85 PID 2136 wrote to memory of 228 2136 msedge.exe 85 PID 2136 wrote to memory of 228 2136 msedge.exe 85 PID 2136 wrote to memory of 228 2136 msedge.exe 85 PID 2136 wrote to memory of 228 2136 msedge.exe 85 PID 2136 wrote to memory of 228 2136 msedge.exe 85 PID 2136 wrote to memory of 228 2136 msedge.exe 85 PID 2136 wrote to memory of 228 2136 msedge.exe 85 PID 2136 wrote to memory of 2332 2136 msedge.exe 86 PID 2136 wrote to memory of 2332 2136 msedge.exe 86 PID 2136 wrote to memory of 4032 2136 msedge.exe 87 PID 2136 wrote to memory of 4032 2136 msedge.exe 87 PID 2136 wrote to memory of 4032 2136 msedge.exe 87 PID 2136 wrote to memory of 4032 2136 msedge.exe 87 PID 2136 wrote to memory of 4032 2136 msedge.exe 87 PID 2136 wrote to memory of 4032 2136 msedge.exe 87 PID 2136 wrote to memory of 4032 2136 msedge.exe 87 PID 2136 wrote to memory of 4032 2136 msedge.exe 87 PID 2136 wrote to memory of 4032 2136 msedge.exe 87 PID 2136 wrote to memory of 4032 2136 msedge.exe 87 PID 2136 wrote to memory of 4032 2136 msedge.exe 87 PID 2136 wrote to memory of 4032 2136 msedge.exe 87 PID 2136 wrote to memory of 4032 2136 msedge.exe 87 PID 2136 wrote to memory of 4032 2136 msedge.exe 87 PID 2136 wrote to memory of 4032 2136 msedge.exe 87 PID 2136 wrote to memory of 4032 2136 msedge.exe 87 PID 2136 wrote to memory of 4032 2136 msedge.exe 87 PID 2136 wrote to memory of 4032 2136 msedge.exe 87 PID 2136 wrote to memory of 4032 2136 msedge.exe 87 PID 2136 wrote to memory of 4032 2136 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\280517093a1da90e8dc5939b82b86556_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9603346f8,0x7ff960334708,0x7ff9603347182⤵PID:1028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,5691804727225897243,13805154991841915713,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2096 /prefetch:22⤵PID:228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,5691804727225897243,13805154991841915713,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,5691804727225897243,13805154991841915713,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2892 /prefetch:82⤵PID:4032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,5691804727225897243,13805154991841915713,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:5104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,5691804727225897243,13805154991841915713,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:2240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,5691804727225897243,13805154991841915713,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5164 /prefetch:12⤵PID:4632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,5691804727225897243,13805154991841915713,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:3872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,5691804727225897243,13805154991841915713,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5436 /prefetch:12⤵PID:5024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,5691804727225897243,13805154991841915713,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6116 /prefetch:82⤵PID:432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,5691804727225897243,13805154991841915713,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6116 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,5691804727225897243,13805154991841915713,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5308 /prefetch:12⤵PID:2912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,5691804727225897243,13805154991841915713,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5180 /prefetch:12⤵PID:5036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,5691804727225897243,13805154991841915713,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3528 /prefetch:12⤵PID:2868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,5691804727225897243,13805154991841915713,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3524 /prefetch:12⤵PID:4572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,5691804727225897243,13805154991841915713,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4976 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2952
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2364
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3504
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51ac52e2503cc26baee4322f02f5b8d9c
SHA138e0cee911f5f2a24888a64780ffdf6fa72207c8
SHA256f65058c6f1a745b37a64d4c97a8e8ee940210273130cec97a67f568088b5d4d4
SHA5127670d606bc5197ecb7db3ddaecd6f74a80e6decae92b94e0e8145a7f463fa099058e89f9dfa1c45b9197c36e5e21994698186a2ec970bbdb0937fe28ca46a834
-
Filesize
152B
MD5b2a1398f937474c51a48b347387ee36a
SHA1922a8567f09e68a04233e84e5919043034635949
SHA2562dc0bf08246ddd5a32288c895d676017578d792349ca437b1b36e7b2f0ade6d6
SHA5124a660c0549f7a850e07d8d36dab33121af02a7bd7e9b2f0137930b4c8cd89b6c5630e408f882684e6935dcb0d5cb5e01a854950eeda252a4881458cafcc7ef7c
-
Filesize
5KB
MD5222aaef48618dc82839b282171c8dae9
SHA171dbae3f68ef9ef86ed454d64c26c2c4b118e775
SHA256e35c855e1201beb6e80632a9b6a623c5d046e9b9ec770bac041ef51a23bf3180
SHA51252da0cf2b37f640c68c1859bb2242c766b2f1e3cc342b80628c8b9caadd8f81c8b4566cfa09da9810cd666c7f7b174d647beaa41e43506469503d23aca554183
-
Filesize
6KB
MD562b79709eb1b44440f3b9148abd62486
SHA16841208447c1f48fc45d2ccdd5cc99126b851caf
SHA256865d174d8e046c70325bcbe1f2cee8248ba44e504bbb2e4a6926e3310abbc3bf
SHA512773bea3e882ecf7afb8ff84079c65217fbeb61023ef78d9b03d7924a0a5d186837a2253ab94e1ea89063be596b667396bc151e63ff07e19e9b3bc54ff354dbdd
-
Filesize
6KB
MD5d85d1ee2af53dad53431bcd13daa01e7
SHA18068d02c051d241ae4893eb29a6b7f265c8b06b0
SHA256823c4bd5c52f65f8f8dbda48babad51d9b0f73bbefdc6dc0b69bef7d50409e88
SHA51267615c568f103d8f930137010f853da14d026aedbfec70f1724ff47944898c805ebfd3b3e2d8d1e3110abd184dadfad764e90db1e692eceec43be1c9a28a0e88
-
Filesize
370B
MD514e932da5f85f1566924f960172075bf
SHA148103272daedf678651d00a5c859c04b42402de9
SHA2565d95a3089a57e8dc2ea065f15c0d450dd84847a930ccc33c55e5e3332b618b20
SHA512c27aa55b3b49a9abd7410e0658908ffd8daf3b88017af8006269b2fb821148340810854d157782217afaa47e1cae46c937e7410ece60d61bc960a9e48248ab47
-
Filesize
370B
MD5d53dc63bbb66b53d7e726b98968a4b98
SHA1478f2d6b22222a3121d40107467838d2876f02c4
SHA256227cb4ffee612d4564a4fd97321845750f20e0b48fe9176c3e6421c2c8a6795c
SHA51284b52a0577eef563887cebf5b84235668522db20f63c137efe3ec45ba707729f42521b6a885dc9f30003efa0377130281a7d93f43742d015fd0feb3006bf42c2
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\e6af8705-4eb9-4c7d-9eab-0aac02991b30.tmp
Filesize1KB
MD55f409fc0cab4da9dfde041b2a4a42c27
SHA13b52746ffe1e1d640bdfa31d1d1b67e9db599543
SHA256c69670c457b1f7ae68dbcead819ce24e41100fa6a491311874a53fd1c085da95
SHA512ade6cdf12b16826d68bcd32ec99b9ee2100bbc4344a0413bed5b99958b415bc2052b35259629c0dfbf61fcd5cb44d473762e1cd714040ff74ff3c93bdea27216
-
Filesize
11KB
MD57b09cdb60810572b8487d9b675db17df
SHA102483d57f76b6422e82bdad17fa93d0062824fe8
SHA256f90b967c7b98f749efc7d16a9135dc3186f79b8f9894fb492d38ac9b04690672
SHA51228689abe8a6dd7d6cee85f4d428231af7ef4b5931d16c79b21f8ba2cb50e355d01cac3f347cc77cf637b007744c147c1bb234fb5bbd1a028335563c52a287bbd