Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
09/05/2024, 03:22
Static task
static1
Behavioral task
behavioral1
Sample
28113fc69c5152c5c6a046c5413e9981_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
28113fc69c5152c5c6a046c5413e9981_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
28113fc69c5152c5c6a046c5413e9981_JaffaCakes118.html
-
Size
216KB
-
MD5
28113fc69c5152c5c6a046c5413e9981
-
SHA1
ad6112e3638ccc0b70d3d17c4d92d7f906b89f3c
-
SHA256
f21acf60954951bab685dbc774b503a79af2800049a3b47002a493e5aa9c347c
-
SHA512
20ccbd4dd93ab49bcd31b3adced437b59ca7a335f3ddae60090b24c5c140e79fd4f6a6c6b396d969234d7144a0599fa6d54bbf33ef4bab6d7fb5f7171cbaea69
-
SSDEEP
6144:4Ppp2x8+pbpWJpDNSpLEp1ahpapfGp5pRs:upp2x8+pbpWJpD0pYp1ahpapfGp5pq
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3572 msedge.exe 3572 msedge.exe 1388 msedge.exe 1388 msedge.exe 4492 identity_helper.exe 4492 identity_helper.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1388 msedge.exe 1388 msedge.exe 1388 msedge.exe 1388 msedge.exe 1388 msedge.exe 1388 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1388 msedge.exe 1388 msedge.exe 1388 msedge.exe 1388 msedge.exe 1388 msedge.exe 1388 msedge.exe 1388 msedge.exe 1388 msedge.exe 1388 msedge.exe 1388 msedge.exe 1388 msedge.exe 1388 msedge.exe 1388 msedge.exe 1388 msedge.exe 1388 msedge.exe 1388 msedge.exe 1388 msedge.exe 1388 msedge.exe 1388 msedge.exe 1388 msedge.exe 1388 msedge.exe 1388 msedge.exe 1388 msedge.exe 1388 msedge.exe 1388 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1388 msedge.exe 1388 msedge.exe 1388 msedge.exe 1388 msedge.exe 1388 msedge.exe 1388 msedge.exe 1388 msedge.exe 1388 msedge.exe 1388 msedge.exe 1388 msedge.exe 1388 msedge.exe 1388 msedge.exe 1388 msedge.exe 1388 msedge.exe 1388 msedge.exe 1388 msedge.exe 1388 msedge.exe 1388 msedge.exe 1388 msedge.exe 1388 msedge.exe 1388 msedge.exe 1388 msedge.exe 1388 msedge.exe 1388 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1388 wrote to memory of 2964 1388 msedge.exe 80 PID 1388 wrote to memory of 2964 1388 msedge.exe 80 PID 1388 wrote to memory of 4080 1388 msedge.exe 82 PID 1388 wrote to memory of 4080 1388 msedge.exe 82 PID 1388 wrote to memory of 4080 1388 msedge.exe 82 PID 1388 wrote to memory of 4080 1388 msedge.exe 82 PID 1388 wrote to memory of 4080 1388 msedge.exe 82 PID 1388 wrote to memory of 4080 1388 msedge.exe 82 PID 1388 wrote to memory of 4080 1388 msedge.exe 82 PID 1388 wrote to memory of 4080 1388 msedge.exe 82 PID 1388 wrote to memory of 4080 1388 msedge.exe 82 PID 1388 wrote to memory of 4080 1388 msedge.exe 82 PID 1388 wrote to memory of 4080 1388 msedge.exe 82 PID 1388 wrote to memory of 4080 1388 msedge.exe 82 PID 1388 wrote to memory of 4080 1388 msedge.exe 82 PID 1388 wrote to memory of 4080 1388 msedge.exe 82 PID 1388 wrote to memory of 4080 1388 msedge.exe 82 PID 1388 wrote to memory of 4080 1388 msedge.exe 82 PID 1388 wrote to memory of 4080 1388 msedge.exe 82 PID 1388 wrote to memory of 4080 1388 msedge.exe 82 PID 1388 wrote to memory of 4080 1388 msedge.exe 82 PID 1388 wrote to memory of 4080 1388 msedge.exe 82 PID 1388 wrote to memory of 4080 1388 msedge.exe 82 PID 1388 wrote to memory of 4080 1388 msedge.exe 82 PID 1388 wrote to memory of 4080 1388 msedge.exe 82 PID 1388 wrote to memory of 4080 1388 msedge.exe 82 PID 1388 wrote to memory of 4080 1388 msedge.exe 82 PID 1388 wrote to memory of 4080 1388 msedge.exe 82 PID 1388 wrote to memory of 4080 1388 msedge.exe 82 PID 1388 wrote to memory of 4080 1388 msedge.exe 82 PID 1388 wrote to memory of 4080 1388 msedge.exe 82 PID 1388 wrote to memory of 4080 1388 msedge.exe 82 PID 1388 wrote to memory of 4080 1388 msedge.exe 82 PID 1388 wrote to memory of 4080 1388 msedge.exe 82 PID 1388 wrote to memory of 4080 1388 msedge.exe 82 PID 1388 wrote to memory of 4080 1388 msedge.exe 82 PID 1388 wrote to memory of 4080 1388 msedge.exe 82 PID 1388 wrote to memory of 4080 1388 msedge.exe 82 PID 1388 wrote to memory of 4080 1388 msedge.exe 82 PID 1388 wrote to memory of 4080 1388 msedge.exe 82 PID 1388 wrote to memory of 4080 1388 msedge.exe 82 PID 1388 wrote to memory of 4080 1388 msedge.exe 82 PID 1388 wrote to memory of 3572 1388 msedge.exe 83 PID 1388 wrote to memory of 3572 1388 msedge.exe 83 PID 1388 wrote to memory of 224 1388 msedge.exe 84 PID 1388 wrote to memory of 224 1388 msedge.exe 84 PID 1388 wrote to memory of 224 1388 msedge.exe 84 PID 1388 wrote to memory of 224 1388 msedge.exe 84 PID 1388 wrote to memory of 224 1388 msedge.exe 84 PID 1388 wrote to memory of 224 1388 msedge.exe 84 PID 1388 wrote to memory of 224 1388 msedge.exe 84 PID 1388 wrote to memory of 224 1388 msedge.exe 84 PID 1388 wrote to memory of 224 1388 msedge.exe 84 PID 1388 wrote to memory of 224 1388 msedge.exe 84 PID 1388 wrote to memory of 224 1388 msedge.exe 84 PID 1388 wrote to memory of 224 1388 msedge.exe 84 PID 1388 wrote to memory of 224 1388 msedge.exe 84 PID 1388 wrote to memory of 224 1388 msedge.exe 84 PID 1388 wrote to memory of 224 1388 msedge.exe 84 PID 1388 wrote to memory of 224 1388 msedge.exe 84 PID 1388 wrote to memory of 224 1388 msedge.exe 84 PID 1388 wrote to memory of 224 1388 msedge.exe 84 PID 1388 wrote to memory of 224 1388 msedge.exe 84 PID 1388 wrote to memory of 224 1388 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\28113fc69c5152c5c6a046c5413e9981_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1388 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffffe346f8,0x7fffffe34708,0x7fffffe347182⤵PID:2964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,16136056546945653371,5137569807841890468,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:22⤵PID:4080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,16136056546945653371,5137569807841890468,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2112 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,16136056546945653371,5137569807841890468,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2852 /prefetch:82⤵PID:224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,16136056546945653371,5137569807841890468,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:2428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,16136056546945653371,5137569807841890468,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:1624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,16136056546945653371,5137569807841890468,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5352 /prefetch:82⤵PID:2116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,16136056546945653371,5137569807841890468,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5352 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,16136056546945653371,5137569807841890468,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4972 /prefetch:12⤵PID:4436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,16136056546945653371,5137569807841890468,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3916 /prefetch:12⤵PID:4168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,16136056546945653371,5137569807841890468,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4076 /prefetch:12⤵PID:3172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,16136056546945653371,5137569807841890468,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5484 /prefetch:12⤵PID:2276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,16136056546945653371,5137569807841890468,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1048 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4660
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4272
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2172
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\776692b5-9c3f-413f-9367-64c21e352bb5.tmp
Filesize6KB
MD5071278f69930ed99825f8b9a754d03a5
SHA11f61f00bb813500e1c8df0b960215cce28388892
SHA25678c4f4bd07ee64a9a0a74581d137d3282209d704bf0b4ac4ff37abe21ccaf1ad
SHA512e1a6dc539fc42ab241e6b0967ccafb111eab823fdfdbff34b687f3729e3c12c4121944072e81271fadfb4b34b6193210ebc76e877da189b07ca24572846bb5bc
-
Filesize
245B
MD5c339c650ff7df4c374b206d0ee6d3a2a
SHA1742ac917076fdcc0c393e177b26b6ee200f903bb
SHA2565c51dbd49fd6ab9ca2fc2f7f244c5ad55650ae686feda46c8512a09c9128c037
SHA512c59bbf82e02a0ebd1d0dd46d693fc9c3a1b76d7409fc55a38c38a97f94381662e80c72c562da50ad56d33255e139abb6d24a2635d996f11862136ebbc9c746a9
-
Filesize
6KB
MD5625e5d0fc2879f0916eab372e4f13921
SHA19d7cfbb8fa209e6264378a7656b8b78c193693c7
SHA256a5c9ad1d1de54e09cb84fdbf4ec0240e07781d10bda4720a63f44f4857207fa1
SHA512060c0f328e157ede99c970032ce7257034fa6e5e393e46c1c4dee2d6650d23eb39be999da4ee6d611b1ecfc5e1a755cc38344dd09e9dfaa4d4f5ed302e3fc426
-
Filesize
6KB
MD5bd248199ff147cc2dfc2a05d4d4f4c9c
SHA191f92cf7a3118401b2c11c4a899156dddd0b3f05
SHA25613309ea1efeb8a79ffbaa67880a613c209732cd93a2ed1e13f9e47487026daf0
SHA512afaff04bcc18d8e67fde63efa505d26df77455350a86fc0263b749cb83fe495fc7c7ebc293ec6fdf5d724d414b90a7406403517d4435dad2c076922d26e1daa0
-
Filesize
372B
MD5555d0518f52e25bfa7381af22ddded11
SHA152958f03b53bf68edf94ef0042dab9105cb5b450
SHA2569c0e03fdddaac6459de8c9f0563f6dae366f8cb82fff3a906ec2ad1ec8616c05
SHA512a1c6250161ea56597c091bbe9f4a63af41e68ba5558226ed8bf77d5f6226e4a8666525157e3e61d39d999042d6af55083b916ef7a0c64214f42a4d57dd15f3a5
-
Filesize
372B
MD5de433f102e2422e2111ae25fb0bdcad9
SHA1757e517b735b0e7364430b0887282b9bb3053112
SHA25653fe7286f7eaf19af0ac06a8d70f35e17d4a3d5c2449248a771929e0e4721507
SHA512c71977d0d986a241ee76c723fcf8d32a0994b8d33ff1f470dda85f18a5955e9d3836b0dde943d5104f12287e645c550a3756e5843578a247588ea207d64c122b
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD558634560c6e35bc838caa18a5b4e6770
SHA11b23b48b2bd130820fdc8d131053d75489c3d62c
SHA256684cf76c92c97e736ed7a24ce28bc3d2b3df88452ee478ae188b14aad15030fc
SHA512fb09def0c7cf87832174c751b10b2fbaf125df0fa62331ad576d667ab6d555166a389a8a7468ef72661d620334b827701502ce8df32be74cca7d7d64c2b1b3f2