Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
09/05/2024, 09:09
Static task
static1
Behavioral task
behavioral1
Sample
2940fb41f716f67f1f83f630bdc85fab_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2940fb41f716f67f1f83f630bdc85fab_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
2940fb41f716f67f1f83f630bdc85fab_JaffaCakes118.html
-
Size
502KB
-
MD5
2940fb41f716f67f1f83f630bdc85fab
-
SHA1
36cd96eef52aafffeaad0c1257b7cb3522ee6c12
-
SHA256
61f36e7b45f98b52a4a8c612917ab293f6280aca3a1ca9d4e2b706314ab7a81e
-
SHA512
a2514c12a6f121892efaa8c7e3ede65e26c46e85c94a422cc9061cf0c584e96cb62cc918edd49c401bcb305177e6359b665e0931e60894054ae53c707dea1f46
-
SSDEEP
12288:eAEuIZ15e/EeaJmOrYNzNupfljsbBO1c/MB:PU15q4pr
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4116 msedge.exe 4116 msedge.exe 2196 msedge.exe 2196 msedge.exe 4356 identity_helper.exe 4356 identity_helper.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe 2196 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2196 wrote to memory of 1276 2196 msedge.exe 82 PID 2196 wrote to memory of 1276 2196 msedge.exe 82 PID 2196 wrote to memory of 4544 2196 msedge.exe 84 PID 2196 wrote to memory of 4544 2196 msedge.exe 84 PID 2196 wrote to memory of 4544 2196 msedge.exe 84 PID 2196 wrote to memory of 4544 2196 msedge.exe 84 PID 2196 wrote to memory of 4544 2196 msedge.exe 84 PID 2196 wrote to memory of 4544 2196 msedge.exe 84 PID 2196 wrote to memory of 4544 2196 msedge.exe 84 PID 2196 wrote to memory of 4544 2196 msedge.exe 84 PID 2196 wrote to memory of 4544 2196 msedge.exe 84 PID 2196 wrote to memory of 4544 2196 msedge.exe 84 PID 2196 wrote to memory of 4544 2196 msedge.exe 84 PID 2196 wrote to memory of 4544 2196 msedge.exe 84 PID 2196 wrote to memory of 4544 2196 msedge.exe 84 PID 2196 wrote to memory of 4544 2196 msedge.exe 84 PID 2196 wrote to memory of 4544 2196 msedge.exe 84 PID 2196 wrote to memory of 4544 2196 msedge.exe 84 PID 2196 wrote to memory of 4544 2196 msedge.exe 84 PID 2196 wrote to memory of 4544 2196 msedge.exe 84 PID 2196 wrote to memory of 4544 2196 msedge.exe 84 PID 2196 wrote to memory of 4544 2196 msedge.exe 84 PID 2196 wrote to memory of 4544 2196 msedge.exe 84 PID 2196 wrote to memory of 4544 2196 msedge.exe 84 PID 2196 wrote to memory of 4544 2196 msedge.exe 84 PID 2196 wrote to memory of 4544 2196 msedge.exe 84 PID 2196 wrote to memory of 4544 2196 msedge.exe 84 PID 2196 wrote to memory of 4544 2196 msedge.exe 84 PID 2196 wrote to memory of 4544 2196 msedge.exe 84 PID 2196 wrote to memory of 4544 2196 msedge.exe 84 PID 2196 wrote to memory of 4544 2196 msedge.exe 84 PID 2196 wrote to memory of 4544 2196 msedge.exe 84 PID 2196 wrote to memory of 4544 2196 msedge.exe 84 PID 2196 wrote to memory of 4544 2196 msedge.exe 84 PID 2196 wrote to memory of 4544 2196 msedge.exe 84 PID 2196 wrote to memory of 4544 2196 msedge.exe 84 PID 2196 wrote to memory of 4544 2196 msedge.exe 84 PID 2196 wrote to memory of 4544 2196 msedge.exe 84 PID 2196 wrote to memory of 4544 2196 msedge.exe 84 PID 2196 wrote to memory of 4544 2196 msedge.exe 84 PID 2196 wrote to memory of 4544 2196 msedge.exe 84 PID 2196 wrote to memory of 4544 2196 msedge.exe 84 PID 2196 wrote to memory of 4116 2196 msedge.exe 85 PID 2196 wrote to memory of 4116 2196 msedge.exe 85 PID 2196 wrote to memory of 560 2196 msedge.exe 86 PID 2196 wrote to memory of 560 2196 msedge.exe 86 PID 2196 wrote to memory of 560 2196 msedge.exe 86 PID 2196 wrote to memory of 560 2196 msedge.exe 86 PID 2196 wrote to memory of 560 2196 msedge.exe 86 PID 2196 wrote to memory of 560 2196 msedge.exe 86 PID 2196 wrote to memory of 560 2196 msedge.exe 86 PID 2196 wrote to memory of 560 2196 msedge.exe 86 PID 2196 wrote to memory of 560 2196 msedge.exe 86 PID 2196 wrote to memory of 560 2196 msedge.exe 86 PID 2196 wrote to memory of 560 2196 msedge.exe 86 PID 2196 wrote to memory of 560 2196 msedge.exe 86 PID 2196 wrote to memory of 560 2196 msedge.exe 86 PID 2196 wrote to memory of 560 2196 msedge.exe 86 PID 2196 wrote to memory of 560 2196 msedge.exe 86 PID 2196 wrote to memory of 560 2196 msedge.exe 86 PID 2196 wrote to memory of 560 2196 msedge.exe 86 PID 2196 wrote to memory of 560 2196 msedge.exe 86 PID 2196 wrote to memory of 560 2196 msedge.exe 86 PID 2196 wrote to memory of 560 2196 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2940fb41f716f67f1f83f630bdc85fab_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffec5a346f8,0x7ffec5a34708,0x7ffec5a347182⤵PID:1276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,14181789352049008726,11332648779655192754,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2156 /prefetch:22⤵PID:4544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,14181789352049008726,11332648779655192754,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2212 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,14181789352049008726,11332648779655192754,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2772 /prefetch:82⤵PID:560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,14181789352049008726,11332648779655192754,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:2016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,14181789352049008726,11332648779655192754,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:5004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,14181789352049008726,11332648779655192754,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5068 /prefetch:82⤵PID:2532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,14181789352049008726,11332648779655192754,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5068 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,14181789352049008726,11332648779655192754,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5064 /prefetch:12⤵PID:636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,14181789352049008726,11332648779655192754,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5184 /prefetch:12⤵PID:3168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,14181789352049008726,11332648779655192754,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5576 /prefetch:12⤵PID:3004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,14181789352049008726,11332648779655192754,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5600 /prefetch:12⤵PID:2464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,14181789352049008726,11332648779655192754,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1708 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4364
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4512
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:828
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51ac52e2503cc26baee4322f02f5b8d9c
SHA138e0cee911f5f2a24888a64780ffdf6fa72207c8
SHA256f65058c6f1a745b37a64d4c97a8e8ee940210273130cec97a67f568088b5d4d4
SHA5127670d606bc5197ecb7db3ddaecd6f74a80e6decae92b94e0e8145a7f463fa099058e89f9dfa1c45b9197c36e5e21994698186a2ec970bbdb0937fe28ca46a834
-
Filesize
152B
MD5b2a1398f937474c51a48b347387ee36a
SHA1922a8567f09e68a04233e84e5919043034635949
SHA2562dc0bf08246ddd5a32288c895d676017578d792349ca437b1b36e7b2f0ade6d6
SHA5124a660c0549f7a850e07d8d36dab33121af02a7bd7e9b2f0137930b4c8cd89b6c5630e408f882684e6935dcb0d5cb5e01a854950eeda252a4881458cafcc7ef7c
-
Filesize
326B
MD51aac375b60827b9859d42965b9701704
SHA19147ba7c2472942aadc3808fa6e108fd02db0161
SHA2564458d711bd3329b93eef1f32fd1d8dc86b204d0dc4d25e298c84a9d4029f4645
SHA512f1252f9318554833230d72fea3a846693f025c5c75b4bca736f092c0106348c86f37c6bca3085fc8dcb4eaf74baeda59952e415f255820d70a8764030b2795d4
-
Filesize
5KB
MD506d40b77688fbecdb7313099f040528b
SHA123de965472a487831661b442d6302d8a5c0ea7ab
SHA256494cefd403963358ad0989e44d0cac0b68b002bcad0dcf5f311e7e850865df07
SHA5122712952f5704e611e9582a7d01ee1b490660e0bd05ac331ddd64c9283151da5663c509c6953fd400a306f850367cfd0f2f0411826cdd1439e8cc6c17a1bbd789
-
Filesize
6KB
MD56905dd60db710349dce4e1925c320b3d
SHA16ca3918bd4d026c8eb0a071baaae6c1878b61f21
SHA256e12f34692cdab2b409f282d5f365d06ea184affef89c340607414b65f7c862bb
SHA5128ea78b16b5d59b2429a9989ba9869718fe33ab09fb8832b3527e46032ae3359e4ff8982d96e03de1e270096e9c55a0bfa6001cff2367e1a144dbca1eb6634425
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5d23797191079bc9ef986c778cee617c3
SHA1e1cb8301fcb54d714ff3deb62e2b90298864c114
SHA256511cbaa077a6bec51afcde710853c6841480259a6e55854d7435ac9ddb32e9c4
SHA512d2b3478f2aaee4a0bef3ca78315fe2b0466e603da700105db9f9e4857dcde79d107cd44e41e6c69350cc8a167ba6810343070364a833d4f7b005cf9353954318