Analysis
-
max time kernel
145s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
09/05/2024, 14:41
Static task
static1
Behavioral task
behavioral1
Sample
2a71c71d6f48ca72805325c51ad3836f_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2a71c71d6f48ca72805325c51ad3836f_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
2a71c71d6f48ca72805325c51ad3836f_JaffaCakes118.html
-
Size
27KB
-
MD5
2a71c71d6f48ca72805325c51ad3836f
-
SHA1
a86550dc87511906523a5fcad3aaae2ca9977ea9
-
SHA256
02a3ec6fae898e6f7a13ad04430610569e55dec76f16cc3847d04ef3292f8583
-
SHA512
2711f9f4a5d014323e99e21762053192f014bff4703c63850ec4d390106a333bd0f3043edc444ea1c5e09efdc83d748f16984540c672f0533bcf23e61665c999
-
SSDEEP
192:uwjkb5ndKnQjxn5Q/snQieXNn9nQOkEntM2nQTbn1nQ9evbm6MnpLQl7MB3qnYnT:UQ/tCtkpSSF3
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4664 msedge.exe 4664 msedge.exe 2824 msedge.exe 2824 msedge.exe 4892 identity_helper.exe 4892 identity_helper.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe 2824 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2824 wrote to memory of 744 2824 msedge.exe 84 PID 2824 wrote to memory of 744 2824 msedge.exe 84 PID 2824 wrote to memory of 1964 2824 msedge.exe 85 PID 2824 wrote to memory of 1964 2824 msedge.exe 85 PID 2824 wrote to memory of 1964 2824 msedge.exe 85 PID 2824 wrote to memory of 1964 2824 msedge.exe 85 PID 2824 wrote to memory of 1964 2824 msedge.exe 85 PID 2824 wrote to memory of 1964 2824 msedge.exe 85 PID 2824 wrote to memory of 1964 2824 msedge.exe 85 PID 2824 wrote to memory of 1964 2824 msedge.exe 85 PID 2824 wrote to memory of 1964 2824 msedge.exe 85 PID 2824 wrote to memory of 1964 2824 msedge.exe 85 PID 2824 wrote to memory of 1964 2824 msedge.exe 85 PID 2824 wrote to memory of 1964 2824 msedge.exe 85 PID 2824 wrote to memory of 1964 2824 msedge.exe 85 PID 2824 wrote to memory of 1964 2824 msedge.exe 85 PID 2824 wrote to memory of 1964 2824 msedge.exe 85 PID 2824 wrote to memory of 1964 2824 msedge.exe 85 PID 2824 wrote to memory of 1964 2824 msedge.exe 85 PID 2824 wrote to memory of 1964 2824 msedge.exe 85 PID 2824 wrote to memory of 1964 2824 msedge.exe 85 PID 2824 wrote to memory of 1964 2824 msedge.exe 85 PID 2824 wrote to memory of 1964 2824 msedge.exe 85 PID 2824 wrote to memory of 1964 2824 msedge.exe 85 PID 2824 wrote to memory of 1964 2824 msedge.exe 85 PID 2824 wrote to memory of 1964 2824 msedge.exe 85 PID 2824 wrote to memory of 1964 2824 msedge.exe 85 PID 2824 wrote to memory of 1964 2824 msedge.exe 85 PID 2824 wrote to memory of 1964 2824 msedge.exe 85 PID 2824 wrote to memory of 1964 2824 msedge.exe 85 PID 2824 wrote to memory of 1964 2824 msedge.exe 85 PID 2824 wrote to memory of 1964 2824 msedge.exe 85 PID 2824 wrote to memory of 1964 2824 msedge.exe 85 PID 2824 wrote to memory of 1964 2824 msedge.exe 85 PID 2824 wrote to memory of 1964 2824 msedge.exe 85 PID 2824 wrote to memory of 1964 2824 msedge.exe 85 PID 2824 wrote to memory of 1964 2824 msedge.exe 85 PID 2824 wrote to memory of 1964 2824 msedge.exe 85 PID 2824 wrote to memory of 1964 2824 msedge.exe 85 PID 2824 wrote to memory of 1964 2824 msedge.exe 85 PID 2824 wrote to memory of 1964 2824 msedge.exe 85 PID 2824 wrote to memory of 1964 2824 msedge.exe 85 PID 2824 wrote to memory of 4664 2824 msedge.exe 86 PID 2824 wrote to memory of 4664 2824 msedge.exe 86 PID 2824 wrote to memory of 2984 2824 msedge.exe 87 PID 2824 wrote to memory of 2984 2824 msedge.exe 87 PID 2824 wrote to memory of 2984 2824 msedge.exe 87 PID 2824 wrote to memory of 2984 2824 msedge.exe 87 PID 2824 wrote to memory of 2984 2824 msedge.exe 87 PID 2824 wrote to memory of 2984 2824 msedge.exe 87 PID 2824 wrote to memory of 2984 2824 msedge.exe 87 PID 2824 wrote to memory of 2984 2824 msedge.exe 87 PID 2824 wrote to memory of 2984 2824 msedge.exe 87 PID 2824 wrote to memory of 2984 2824 msedge.exe 87 PID 2824 wrote to memory of 2984 2824 msedge.exe 87 PID 2824 wrote to memory of 2984 2824 msedge.exe 87 PID 2824 wrote to memory of 2984 2824 msedge.exe 87 PID 2824 wrote to memory of 2984 2824 msedge.exe 87 PID 2824 wrote to memory of 2984 2824 msedge.exe 87 PID 2824 wrote to memory of 2984 2824 msedge.exe 87 PID 2824 wrote to memory of 2984 2824 msedge.exe 87 PID 2824 wrote to memory of 2984 2824 msedge.exe 87 PID 2824 wrote to memory of 2984 2824 msedge.exe 87 PID 2824 wrote to memory of 2984 2824 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2a71c71d6f48ca72805325c51ad3836f_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa1e4f46f8,0x7ffa1e4f4708,0x7ffa1e4f47182⤵PID:744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,11439865574808577336,11343864634146312565,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵PID:1964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,11439865574808577336,11343864634146312565,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2228 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2080,11439865574808577336,11343864634146312565,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2788 /prefetch:82⤵PID:2984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,11439865574808577336,11343864634146312565,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:4312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,11439865574808577336,11343864634146312565,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3444 /prefetch:12⤵PID:4708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,11439865574808577336,11343864634146312565,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5268 /prefetch:82⤵PID:3912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,11439865574808577336,11343864634146312565,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5268 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,11439865574808577336,11343864634146312565,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4816 /prefetch:12⤵PID:3576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,11439865574808577336,11343864634146312565,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5368 /prefetch:12⤵PID:4932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,11439865574808577336,11343864634146312565,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5656 /prefetch:12⤵PID:1992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,11439865574808577336,11343864634146312565,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5684 /prefetch:12⤵PID:1776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,11439865574808577336,11343864634146312565,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3056 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3468
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1848
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1196
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52daa93382bba07cbc40af372d30ec576
SHA1c5e709dc3e2e4df2ff841fbde3e30170e7428a94
SHA2561826d2a57b1938c148bf212a47d947ed1bfb26cfc55868931f843ee438117f30
SHA51265635cb59c81548a9ef8fdb0942331e7f3cd0c30ce1d4dba48aed72dbb27b06511a55d2aeaadfadbbb4b7cb4b2e2772bbabba9603b3f7d9c8b9e4a7fbf3d6b6b
-
Filesize
152B
MD5ecdc2754d7d2ae862272153aa9b9ca6e
SHA1c19bed1c6e1c998b9fa93298639ad7961339147d
SHA256a13d791473f836edcab0e93451ce7b7182efbbc54261b2b5644d319e047a00a7
SHA512cd4fb81317d540f8b15f1495a381bb6f0f129b8923a7c06e4b5cf777d2625c30304aee6cc68aa20479e08d84e5030b43fbe93e479602400334dfdd7297f702f2
-
Filesize
5KB
MD5d7526145e92bdd7b10961068217db9ed
SHA1f7d409c88e797d9a31f28f64950357fce62a95b8
SHA256be1ae87704e1a8ee47e59dd8fc97527e9c1382df8ec8a64c8236cd153fa6f817
SHA512188c3c634d6dfc8baebf3170c455cb630a3ac8ff9b70d402e0325bdb8c3dbfd8ba8aadf7d4550f36f89e2c2c208b1af6e5a5df4b86e484c6fcf1172b32536402
-
Filesize
6KB
MD5df7c2c81a4aa6e06699bb7301a9e8fc7
SHA1a1c63c5401f8a6ad404f5b602ff3d97697e9ce41
SHA256b9eb1f487b3d16906850d1f51dd106a8aa6e0b8c4d4229386e1ad402203df802
SHA51243d87124eed406b244713c8464205d4c7691a88cdda5553e20debd301912535455284342849e739503d92919251f7bc0b8bab6762ef878b62df03aede0087ba1
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD591c07c5cf48e198072239d3cea32d09d
SHA182022fd64bed013a3b0a7d8b282c934dec571cbc
SHA256867a58e7c2ca6789bfa4e2f6c868666e47740b2f366af094c2bd1e4ce181299d
SHA512d007f09793fd138d7d5c525834c1711d746d3c4d956c5137817a3b6713e9e5a1b0227f5f3093cd65a279dae5ded0f27a646e52af285159bce3e298b413e6140b