Analysis
-
max time kernel
145s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
09/05/2024, 12:24
Static task
static1
Behavioral task
behavioral1
Sample
29f4d101ad76ae8a6204940e11992e85_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
29f4d101ad76ae8a6204940e11992e85_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
29f4d101ad76ae8a6204940e11992e85_JaffaCakes118.html
-
Size
2KB
-
MD5
29f4d101ad76ae8a6204940e11992e85
-
SHA1
4ad8846672c9d57b4509659442a8146db2cba4e3
-
SHA256
f88b301632268a62b79e6db2d050b152e6d76c11747c90ab43aad7884be44a9a
-
SHA512
c63ae958d8e3109e27b9d2876d4925aba614879e552b0610698bb3519a6f956e516cff98be2c5bd1cabfe3eef28daaf50b09585d9b809e77803f544c12b62d6d
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3476 msedge.exe 3476 msedge.exe 3188 msedge.exe 3188 msedge.exe 4584 identity_helper.exe 4584 identity_helper.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe 3188 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3188 wrote to memory of 4860 3188 msedge.exe 83 PID 3188 wrote to memory of 4860 3188 msedge.exe 83 PID 3188 wrote to memory of 1124 3188 msedge.exe 84 PID 3188 wrote to memory of 1124 3188 msedge.exe 84 PID 3188 wrote to memory of 1124 3188 msedge.exe 84 PID 3188 wrote to memory of 1124 3188 msedge.exe 84 PID 3188 wrote to memory of 1124 3188 msedge.exe 84 PID 3188 wrote to memory of 1124 3188 msedge.exe 84 PID 3188 wrote to memory of 1124 3188 msedge.exe 84 PID 3188 wrote to memory of 1124 3188 msedge.exe 84 PID 3188 wrote to memory of 1124 3188 msedge.exe 84 PID 3188 wrote to memory of 1124 3188 msedge.exe 84 PID 3188 wrote to memory of 1124 3188 msedge.exe 84 PID 3188 wrote to memory of 1124 3188 msedge.exe 84 PID 3188 wrote to memory of 1124 3188 msedge.exe 84 PID 3188 wrote to memory of 1124 3188 msedge.exe 84 PID 3188 wrote to memory of 1124 3188 msedge.exe 84 PID 3188 wrote to memory of 1124 3188 msedge.exe 84 PID 3188 wrote to memory of 1124 3188 msedge.exe 84 PID 3188 wrote to memory of 1124 3188 msedge.exe 84 PID 3188 wrote to memory of 1124 3188 msedge.exe 84 PID 3188 wrote to memory of 1124 3188 msedge.exe 84 PID 3188 wrote to memory of 1124 3188 msedge.exe 84 PID 3188 wrote to memory of 1124 3188 msedge.exe 84 PID 3188 wrote to memory of 1124 3188 msedge.exe 84 PID 3188 wrote to memory of 1124 3188 msedge.exe 84 PID 3188 wrote to memory of 1124 3188 msedge.exe 84 PID 3188 wrote to memory of 1124 3188 msedge.exe 84 PID 3188 wrote to memory of 1124 3188 msedge.exe 84 PID 3188 wrote to memory of 1124 3188 msedge.exe 84 PID 3188 wrote to memory of 1124 3188 msedge.exe 84 PID 3188 wrote to memory of 1124 3188 msedge.exe 84 PID 3188 wrote to memory of 1124 3188 msedge.exe 84 PID 3188 wrote to memory of 1124 3188 msedge.exe 84 PID 3188 wrote to memory of 1124 3188 msedge.exe 84 PID 3188 wrote to memory of 1124 3188 msedge.exe 84 PID 3188 wrote to memory of 1124 3188 msedge.exe 84 PID 3188 wrote to memory of 1124 3188 msedge.exe 84 PID 3188 wrote to memory of 1124 3188 msedge.exe 84 PID 3188 wrote to memory of 1124 3188 msedge.exe 84 PID 3188 wrote to memory of 1124 3188 msedge.exe 84 PID 3188 wrote to memory of 1124 3188 msedge.exe 84 PID 3188 wrote to memory of 3476 3188 msedge.exe 85 PID 3188 wrote to memory of 3476 3188 msedge.exe 85 PID 3188 wrote to memory of 4736 3188 msedge.exe 86 PID 3188 wrote to memory of 4736 3188 msedge.exe 86 PID 3188 wrote to memory of 4736 3188 msedge.exe 86 PID 3188 wrote to memory of 4736 3188 msedge.exe 86 PID 3188 wrote to memory of 4736 3188 msedge.exe 86 PID 3188 wrote to memory of 4736 3188 msedge.exe 86 PID 3188 wrote to memory of 4736 3188 msedge.exe 86 PID 3188 wrote to memory of 4736 3188 msedge.exe 86 PID 3188 wrote to memory of 4736 3188 msedge.exe 86 PID 3188 wrote to memory of 4736 3188 msedge.exe 86 PID 3188 wrote to memory of 4736 3188 msedge.exe 86 PID 3188 wrote to memory of 4736 3188 msedge.exe 86 PID 3188 wrote to memory of 4736 3188 msedge.exe 86 PID 3188 wrote to memory of 4736 3188 msedge.exe 86 PID 3188 wrote to memory of 4736 3188 msedge.exe 86 PID 3188 wrote to memory of 4736 3188 msedge.exe 86 PID 3188 wrote to memory of 4736 3188 msedge.exe 86 PID 3188 wrote to memory of 4736 3188 msedge.exe 86 PID 3188 wrote to memory of 4736 3188 msedge.exe 86 PID 3188 wrote to memory of 4736 3188 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\29f4d101ad76ae8a6204940e11992e85_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3188 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdadfc46f8,0x7ffdadfc4708,0x7ffdadfc47182⤵PID:4860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,6607241902973111512,6777639720334663040,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2096 /prefetch:22⤵PID:1124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2056,6607241902973111512,6777639720334663040,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2156 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2056,6607241902973111512,6777639720334663040,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2644 /prefetch:82⤵PID:4736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,6607241902973111512,6777639720334663040,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:1180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,6607241902973111512,6777639720334663040,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2064 /prefetch:12⤵PID:464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,6607241902973111512,6777639720334663040,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4184 /prefetch:12⤵PID:1360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,6607241902973111512,6777639720334663040,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4844 /prefetch:12⤵PID:5020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,6607241902973111512,6777639720334663040,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3672 /prefetch:12⤵PID:5072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,6607241902973111512,6777639720334663040,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4828 /prefetch:82⤵PID:4396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,6607241902973111512,6777639720334663040,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4828 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,6607241902973111512,6777639720334663040,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2348 /prefetch:12⤵PID:1548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,6607241902973111512,6777639720334663040,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5400 /prefetch:12⤵PID:2500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,6607241902973111512,6777639720334663040,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3372 /prefetch:12⤵PID:5056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,6607241902973111512,6777639720334663040,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5712 /prefetch:12⤵PID:3408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,6607241902973111512,6777639720334663040,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3120 /prefetch:12⤵PID:364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,6607241902973111512,6777639720334663040,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4888 /prefetch:12⤵PID:1456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,6607241902973111512,6777639720334663040,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1944 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3460
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3800
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2448
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c9c4c494f8fba32d95ba2125f00586a3
SHA18a600205528aef7953144f1cf6f7a5115e3611de
SHA256a0ca609205813c307df9122c0c5b0967c5472755700f615b0033129cf7d6b35b
SHA5129d30cea6cfc259e97b0305f8b5cd19774044fb78feedfcef2014b2947f2e6a101273bc4ad30db9cc1724e62eb441266d7df376e28ac58693f128b9cce2c7d20d
-
Filesize
152B
MD54dc6fc5e708279a3310fe55d9c44743d
SHA1a42e8bdf9d1c25ef3e223d59f6b1d16b095f46d2
SHA256a1c5f48659d4b3af960971b3a0f433a95fee5bfafe5680a34110c68b342377d8
SHA5125874b2310187f242b852fa6dcded244cc860abb2be4f6f5a6a1db8322e12e1fef8f825edc0aae75adbb7284a2cd64730650d0643b1e2bb7ead9350e50e1d8c13
-
Filesize
5KB
MD5b63dd3add94d5d06cdc503d72384b57b
SHA123ce03d65d6e8ec6a2a9ab59fb0abc41b8556b01
SHA2566315397cb6cec54a8c4058d3088b0365ce23398d98ed37ca3b0a630908057ab1
SHA5120b976c3b1cff731725ae3a2041d5459157372bf46c84a68636e8a59289901e016a07c5eeacf1610d4f283dc7eaddbf3a74739997768363de191d01005cd3005e
-
Filesize
6KB
MD5cde6fddf96e40eb2a0ffb277449d0e4e
SHA12096c193bff6f5ce0a81cdcc2d29a571d84ccdfc
SHA2564224945e92c3c1c4d8c2479bbe4de056868034c8a78eb99fed3a018fd990872a
SHA512466c21c538265e651322fd07905d91aef3ea7c94607edceb93218b3564f0dfd745e64479c663ec304566e4fc10efdd1e6b1457e6853525a1dd9bfaf23f1f9f02
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD52e85fa9ee4416babba50f0c3b029157a
SHA13da3ab849d4bfbb999a35e7e715f0d12b43868ef
SHA256390072a0811c50313c826626e677702fa76f96b0c6a10467af3fcd1db8ecc2cb
SHA512e0e615cb893b7b5f3f276eeac2ee887c6f80dc3b0abd47f25481ef3d25578a198043566cc319ec531f951f31f95ee5d411ef98287ac1f93510187888b1a9bb50