Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
09/05/2024, 15:01
Static task
static1
Behavioral task
behavioral1
Sample
2a85e181a146311c2db3c51dee63a82d_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2a85e181a146311c2db3c51dee63a82d_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
2a85e181a146311c2db3c51dee63a82d_JaffaCakes118.html
-
Size
20KB
-
MD5
2a85e181a146311c2db3c51dee63a82d
-
SHA1
bd5c84fb65c4157f4898fd89f6c2259679edd895
-
SHA256
80c47f6f367ccfdb3d5fa71a19c8b69b2c0b11a8a7984b62450675faa0239b4a
-
SHA512
545a8d00414165a37e89d94fae3fa48500b9809ad5f7810c6a12c061b388b6e126fc951cf21870f67e271cb7006a69dfb5ea030ebb5addaddcb4608fc4419b90
-
SSDEEP
384:SIMd0I5nO9H/rXnN7l1dfZc3StsvpxBYxDB8:SEHLA
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2356 msedge.exe 2356 msedge.exe 1020 msedge.exe 1020 msedge.exe 2100 msedge.exe 2100 msedge.exe 2100 msedge.exe 2100 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1020 msedge.exe 1020 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1020 wrote to memory of 4748 1020 msedge.exe 82 PID 1020 wrote to memory of 4748 1020 msedge.exe 82 PID 1020 wrote to memory of 1292 1020 msedge.exe 84 PID 1020 wrote to memory of 1292 1020 msedge.exe 84 PID 1020 wrote to memory of 1292 1020 msedge.exe 84 PID 1020 wrote to memory of 1292 1020 msedge.exe 84 PID 1020 wrote to memory of 1292 1020 msedge.exe 84 PID 1020 wrote to memory of 1292 1020 msedge.exe 84 PID 1020 wrote to memory of 1292 1020 msedge.exe 84 PID 1020 wrote to memory of 1292 1020 msedge.exe 84 PID 1020 wrote to memory of 1292 1020 msedge.exe 84 PID 1020 wrote to memory of 1292 1020 msedge.exe 84 PID 1020 wrote to memory of 1292 1020 msedge.exe 84 PID 1020 wrote to memory of 1292 1020 msedge.exe 84 PID 1020 wrote to memory of 1292 1020 msedge.exe 84 PID 1020 wrote to memory of 1292 1020 msedge.exe 84 PID 1020 wrote to memory of 1292 1020 msedge.exe 84 PID 1020 wrote to memory of 1292 1020 msedge.exe 84 PID 1020 wrote to memory of 1292 1020 msedge.exe 84 PID 1020 wrote to memory of 1292 1020 msedge.exe 84 PID 1020 wrote to memory of 1292 1020 msedge.exe 84 PID 1020 wrote to memory of 1292 1020 msedge.exe 84 PID 1020 wrote to memory of 1292 1020 msedge.exe 84 PID 1020 wrote to memory of 1292 1020 msedge.exe 84 PID 1020 wrote to memory of 1292 1020 msedge.exe 84 PID 1020 wrote to memory of 1292 1020 msedge.exe 84 PID 1020 wrote to memory of 1292 1020 msedge.exe 84 PID 1020 wrote to memory of 1292 1020 msedge.exe 84 PID 1020 wrote to memory of 1292 1020 msedge.exe 84 PID 1020 wrote to memory of 1292 1020 msedge.exe 84 PID 1020 wrote to memory of 1292 1020 msedge.exe 84 PID 1020 wrote to memory of 1292 1020 msedge.exe 84 PID 1020 wrote to memory of 1292 1020 msedge.exe 84 PID 1020 wrote to memory of 1292 1020 msedge.exe 84 PID 1020 wrote to memory of 1292 1020 msedge.exe 84 PID 1020 wrote to memory of 1292 1020 msedge.exe 84 PID 1020 wrote to memory of 1292 1020 msedge.exe 84 PID 1020 wrote to memory of 1292 1020 msedge.exe 84 PID 1020 wrote to memory of 1292 1020 msedge.exe 84 PID 1020 wrote to memory of 1292 1020 msedge.exe 84 PID 1020 wrote to memory of 1292 1020 msedge.exe 84 PID 1020 wrote to memory of 1292 1020 msedge.exe 84 PID 1020 wrote to memory of 2356 1020 msedge.exe 85 PID 1020 wrote to memory of 2356 1020 msedge.exe 85 PID 1020 wrote to memory of 1536 1020 msedge.exe 86 PID 1020 wrote to memory of 1536 1020 msedge.exe 86 PID 1020 wrote to memory of 1536 1020 msedge.exe 86 PID 1020 wrote to memory of 1536 1020 msedge.exe 86 PID 1020 wrote to memory of 1536 1020 msedge.exe 86 PID 1020 wrote to memory of 1536 1020 msedge.exe 86 PID 1020 wrote to memory of 1536 1020 msedge.exe 86 PID 1020 wrote to memory of 1536 1020 msedge.exe 86 PID 1020 wrote to memory of 1536 1020 msedge.exe 86 PID 1020 wrote to memory of 1536 1020 msedge.exe 86 PID 1020 wrote to memory of 1536 1020 msedge.exe 86 PID 1020 wrote to memory of 1536 1020 msedge.exe 86 PID 1020 wrote to memory of 1536 1020 msedge.exe 86 PID 1020 wrote to memory of 1536 1020 msedge.exe 86 PID 1020 wrote to memory of 1536 1020 msedge.exe 86 PID 1020 wrote to memory of 1536 1020 msedge.exe 86 PID 1020 wrote to memory of 1536 1020 msedge.exe 86 PID 1020 wrote to memory of 1536 1020 msedge.exe 86 PID 1020 wrote to memory of 1536 1020 msedge.exe 86 PID 1020 wrote to memory of 1536 1020 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2a85e181a146311c2db3c51dee63a82d_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1020 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdc22f46f8,0x7ffdc22f4708,0x7ffdc22f47182⤵PID:4748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,5314192447476860509,13641108955975274154,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 /prefetch:22⤵PID:1292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2132,5314192447476860509,13641108955975274154,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2132,5314192447476860509,13641108955975274154,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2704 /prefetch:82⤵PID:1536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,5314192447476860509,13641108955975274154,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:1420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,5314192447476860509,13641108955975274154,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:3240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,5314192447476860509,13641108955975274154,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4868 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2100
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:564
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4520
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
Filesize
6KB
MD5b2953e07c71b2346b840bd7a8b0800b4
SHA13dd99de1b5912e434f87f2c81ee20233e7ad3c9f
SHA25621deccb234304dad47b13c6507af7e472da41f35e3b9a1a7ec1ae62f8e3d60a2
SHA5125a48145ed2faf1c2f1b48c7e94728423474e707acc6a5f27308357ec39a019b0b56ef7d0a39aacb1145f68ee8bf1d808b106277104561804d44685af2b3e8d7e
-
Filesize
6KB
MD550535606a6b75f20fc5221b81c014ffb
SHA178c87f7362ab2ff83b54470e0d27db500bf77f38
SHA2569c5d9df77bfa1db9c912ddfce1005fc0a94b9934659cd1d0fc9f0abc6847dc52
SHA51252ad4f9a532a2098f9e540227ff02ad8680d3da6a9d26e448ccbf02938ad029bd6a703623998ff4d6ac46dabff7ae72f0e78f96f484f1d6c55878dcb0d468c44
-
Filesize
6KB
MD598f592c462062f5c845ccd73fae10eae
SHA1f8cf1cbc77698313d0963ab017e5a7de61f3efaf
SHA256cf6d36f86f4908116a418d1416885f2af5f2c32b770b1539701ae1761bffa58c
SHA51218956277304c6450accfdf04e1e11ea0b180ff711825f6cb630e5f4b64252d555775cd772f813bfe957da5d3008055dd3210a676120cd53fc0351a918b7f92ee
-
Filesize
11KB
MD5e46afede42c2231beda0822c6e11f54f
SHA16f485b44b5e177f5750c55e30a0c9438a45f8a80
SHA2563305106dbf28f301f7dde3527f8220aefb3c370e0151ba29056895d698fd0feb
SHA512f0d701cba27804df6e2a5c14c28a470bb9f715a70e3bb8f80cb046c2318bcc61401e59fa72bdb93dc9333042502b7fd19b15117b4533ac3fa77a61616221cb1a