Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
09-05-2024 08:00
Static task
static1
Behavioral task
behavioral1
Sample
2907375ca25817d22bffc0098b7a9cb8_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2907375ca25817d22bffc0098b7a9cb8_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
2907375ca25817d22bffc0098b7a9cb8_JaffaCakes118.html
-
Size
897B
-
MD5
2907375ca25817d22bffc0098b7a9cb8
-
SHA1
80e8a52215ae073e4c75b2e37367448a6c025eeb
-
SHA256
81ef074419de92f4ef06a02d17728ff65b9abae7f558d6f8ba558f158583d7a7
-
SHA512
9e4f3a96cc736a41c1be30f67b638dc8ce2fb807a95a8f078407214f5a6fa7ebfa027cfbeb1f3af506418ed5fd36c7332217cd21bb7ede25de7fdb78c6aebbe2
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2208 msedge.exe 2208 msedge.exe 548 msedge.exe 548 msedge.exe 3724 identity_helper.exe 3724 identity_helper.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 548 wrote to memory of 392 548 msedge.exe 80 PID 548 wrote to memory of 392 548 msedge.exe 80 PID 548 wrote to memory of 5012 548 msedge.exe 81 PID 548 wrote to memory of 5012 548 msedge.exe 81 PID 548 wrote to memory of 5012 548 msedge.exe 81 PID 548 wrote to memory of 5012 548 msedge.exe 81 PID 548 wrote to memory of 5012 548 msedge.exe 81 PID 548 wrote to memory of 5012 548 msedge.exe 81 PID 548 wrote to memory of 5012 548 msedge.exe 81 PID 548 wrote to memory of 5012 548 msedge.exe 81 PID 548 wrote to memory of 5012 548 msedge.exe 81 PID 548 wrote to memory of 5012 548 msedge.exe 81 PID 548 wrote to memory of 5012 548 msedge.exe 81 PID 548 wrote to memory of 5012 548 msedge.exe 81 PID 548 wrote to memory of 5012 548 msedge.exe 81 PID 548 wrote to memory of 5012 548 msedge.exe 81 PID 548 wrote to memory of 5012 548 msedge.exe 81 PID 548 wrote to memory of 5012 548 msedge.exe 81 PID 548 wrote to memory of 5012 548 msedge.exe 81 PID 548 wrote to memory of 5012 548 msedge.exe 81 PID 548 wrote to memory of 5012 548 msedge.exe 81 PID 548 wrote to memory of 5012 548 msedge.exe 81 PID 548 wrote to memory of 5012 548 msedge.exe 81 PID 548 wrote to memory of 5012 548 msedge.exe 81 PID 548 wrote to memory of 5012 548 msedge.exe 81 PID 548 wrote to memory of 5012 548 msedge.exe 81 PID 548 wrote to memory of 5012 548 msedge.exe 81 PID 548 wrote to memory of 5012 548 msedge.exe 81 PID 548 wrote to memory of 5012 548 msedge.exe 81 PID 548 wrote to memory of 5012 548 msedge.exe 81 PID 548 wrote to memory of 5012 548 msedge.exe 81 PID 548 wrote to memory of 5012 548 msedge.exe 81 PID 548 wrote to memory of 5012 548 msedge.exe 81 PID 548 wrote to memory of 5012 548 msedge.exe 81 PID 548 wrote to memory of 5012 548 msedge.exe 81 PID 548 wrote to memory of 5012 548 msedge.exe 81 PID 548 wrote to memory of 5012 548 msedge.exe 81 PID 548 wrote to memory of 5012 548 msedge.exe 81 PID 548 wrote to memory of 5012 548 msedge.exe 81 PID 548 wrote to memory of 5012 548 msedge.exe 81 PID 548 wrote to memory of 5012 548 msedge.exe 81 PID 548 wrote to memory of 5012 548 msedge.exe 81 PID 548 wrote to memory of 2208 548 msedge.exe 82 PID 548 wrote to memory of 2208 548 msedge.exe 82 PID 548 wrote to memory of 1012 548 msedge.exe 83 PID 548 wrote to memory of 1012 548 msedge.exe 83 PID 548 wrote to memory of 1012 548 msedge.exe 83 PID 548 wrote to memory of 1012 548 msedge.exe 83 PID 548 wrote to memory of 1012 548 msedge.exe 83 PID 548 wrote to memory of 1012 548 msedge.exe 83 PID 548 wrote to memory of 1012 548 msedge.exe 83 PID 548 wrote to memory of 1012 548 msedge.exe 83 PID 548 wrote to memory of 1012 548 msedge.exe 83 PID 548 wrote to memory of 1012 548 msedge.exe 83 PID 548 wrote to memory of 1012 548 msedge.exe 83 PID 548 wrote to memory of 1012 548 msedge.exe 83 PID 548 wrote to memory of 1012 548 msedge.exe 83 PID 548 wrote to memory of 1012 548 msedge.exe 83 PID 548 wrote to memory of 1012 548 msedge.exe 83 PID 548 wrote to memory of 1012 548 msedge.exe 83 PID 548 wrote to memory of 1012 548 msedge.exe 83 PID 548 wrote to memory of 1012 548 msedge.exe 83 PID 548 wrote to memory of 1012 548 msedge.exe 83 PID 548 wrote to memory of 1012 548 msedge.exe 83
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2907375ca25817d22bffc0098b7a9cb8_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:548 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd6a4b46f8,0x7ffd6a4b4708,0x7ffd6a4b47182⤵PID:392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1992,5642535892568173943,7314231060240731426,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2084 /prefetch:22⤵PID:5012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1992,5642535892568173943,7314231060240731426,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1992,5642535892568173943,7314231060240731426,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2732 /prefetch:82⤵PID:1012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1992,5642535892568173943,7314231060240731426,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:1792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1992,5642535892568173943,7314231060240731426,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:2444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1992,5642535892568173943,7314231060240731426,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4224 /prefetch:12⤵PID:3608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1992,5642535892568173943,7314231060240731426,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5164 /prefetch:82⤵PID:844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1992,5642535892568173943,7314231060240731426,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5164 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1992,5642535892568173943,7314231060240731426,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4936 /prefetch:12⤵PID:5068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1992,5642535892568173943,7314231060240731426,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4920 /prefetch:12⤵PID:372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1992,5642535892568173943,7314231060240731426,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4184 /prefetch:12⤵PID:3060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1992,5642535892568173943,7314231060240731426,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5012 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1860
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3592
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4744
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556641592f6e69f5f5fb06f2319384490
SHA16a86be42e2c6d26b7830ad9f4e2627995fd91069
SHA25602d4984e590e947265474d592e64edde840fdca7eb881eebde3e220a1d883455
SHA512c75e689b2bbbe07ebf72baf75c56f19c39f45d5593cf47535eb722f95002b3ee418027047c0ee8d63800f499038db5e2c24aff9705d830c7b6eaa290d9adc868
-
Filesize
152B
MD5612a6c4247ef652299b376221c984213
SHA1d306f3b16bde39708aa862aee372345feb559750
SHA2569d8e24c91cff338e56b518a533cb2e49a2803356bbf6e04892fb168a7ce2844a
SHA51234a14d63abb1e3fe0f9927a94393043d458fe0624843e108d290266f554018e6379cba924cb5388735abdd6c5f1e2e318478a673f3f9b762815a758866d10973
-
Filesize
6KB
MD53386d60c76d9a1761479a73fb48e61b0
SHA14210f9533bfb72adeab21c8d81ef33e90b0e67c2
SHA2561418f07f9f1f06b81fc952fa1322460bd0961bf2e0c42164acb3bdd74d91296b
SHA512d8257714d3dcb025ec38004c160d1e9eb9060573e5d112bbc0383701a2fe479d37665f6d4ab9ab721c1780c63f8516f390bf3526d15beb1eafb06542c60decab
-
Filesize
6KB
MD5b13ca86c7d11996d1c5b5b6fd1dff283
SHA1230d8c371441100bb4ef01ad446a3201b4eca27c
SHA256195c954e240dd462d9f53ee5e614357c6acb27a814bc536b3a3570a5c0bbdca9
SHA512c6b6e5f090afd190d0b2ea324f4f8c64c902a1400e1f11afa440f8d1770560c18c28bb935a00532ba5edf062f4918b3f4ec90f7844a205cea02c1fe828ed0e90
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5ef7c63f2facaf8d4d7bf3d3e1fe4707a
SHA1b0f3b2d911aee87823a5834ad0d98d307b6dd60b
SHA256adec72262cbb5d3c14af11b1b2a8811ca16812e07cb12c2e757f6bb2bb02462b
SHA512290fe5861030e1eba64f73d9dc7246632e40df261c5f22baeb3e519f03997d427869e48b0e73ad25e964f6c94cc0f133314c9492cd7776cb0925d8a8093e5464