Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
09/05/2024, 15:04
Static task
static1
Behavioral task
behavioral1
Sample
2a888a0d43f3719193041eda81438950_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2a888a0d43f3719193041eda81438950_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
2a888a0d43f3719193041eda81438950_JaffaCakes118.html
-
Size
110KB
-
MD5
2a888a0d43f3719193041eda81438950
-
SHA1
7d8b3e0f0393ffa9118dff4c651738d594daf3ba
-
SHA256
1515ac4f0bb50610d38680377b6cc8673f954a8f41bd000d76bf763d318111e3
-
SHA512
a7f135ffdfbc9451be6334a60b1a157eb1c41c5a9f627c26708ac3a8c753e73bbc47e38feae265ff89524534cd721b885317087ea250ecfabdfd2eff03661447
-
SSDEEP
3072:rwfymYgtGvWMiJMUqcTiWpt8aNUpaphDINPId8zpa:rviJMUqcTiWpt8aNUpaphB
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2172 msedge.exe 2172 msedge.exe 3892 msedge.exe 3892 msedge.exe 2080 identity_helper.exe 2080 identity_helper.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe 4412 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3892 wrote to memory of 4992 3892 msedge.exe 82 PID 3892 wrote to memory of 4992 3892 msedge.exe 82 PID 3892 wrote to memory of 4536 3892 msedge.exe 84 PID 3892 wrote to memory of 4536 3892 msedge.exe 84 PID 3892 wrote to memory of 4536 3892 msedge.exe 84 PID 3892 wrote to memory of 4536 3892 msedge.exe 84 PID 3892 wrote to memory of 4536 3892 msedge.exe 84 PID 3892 wrote to memory of 4536 3892 msedge.exe 84 PID 3892 wrote to memory of 4536 3892 msedge.exe 84 PID 3892 wrote to memory of 4536 3892 msedge.exe 84 PID 3892 wrote to memory of 4536 3892 msedge.exe 84 PID 3892 wrote to memory of 4536 3892 msedge.exe 84 PID 3892 wrote to memory of 4536 3892 msedge.exe 84 PID 3892 wrote to memory of 4536 3892 msedge.exe 84 PID 3892 wrote to memory of 4536 3892 msedge.exe 84 PID 3892 wrote to memory of 4536 3892 msedge.exe 84 PID 3892 wrote to memory of 4536 3892 msedge.exe 84 PID 3892 wrote to memory of 4536 3892 msedge.exe 84 PID 3892 wrote to memory of 4536 3892 msedge.exe 84 PID 3892 wrote to memory of 4536 3892 msedge.exe 84 PID 3892 wrote to memory of 4536 3892 msedge.exe 84 PID 3892 wrote to memory of 4536 3892 msedge.exe 84 PID 3892 wrote to memory of 4536 3892 msedge.exe 84 PID 3892 wrote to memory of 4536 3892 msedge.exe 84 PID 3892 wrote to memory of 4536 3892 msedge.exe 84 PID 3892 wrote to memory of 4536 3892 msedge.exe 84 PID 3892 wrote to memory of 4536 3892 msedge.exe 84 PID 3892 wrote to memory of 4536 3892 msedge.exe 84 PID 3892 wrote to memory of 4536 3892 msedge.exe 84 PID 3892 wrote to memory of 4536 3892 msedge.exe 84 PID 3892 wrote to memory of 4536 3892 msedge.exe 84 PID 3892 wrote to memory of 4536 3892 msedge.exe 84 PID 3892 wrote to memory of 4536 3892 msedge.exe 84 PID 3892 wrote to memory of 4536 3892 msedge.exe 84 PID 3892 wrote to memory of 4536 3892 msedge.exe 84 PID 3892 wrote to memory of 4536 3892 msedge.exe 84 PID 3892 wrote to memory of 4536 3892 msedge.exe 84 PID 3892 wrote to memory of 4536 3892 msedge.exe 84 PID 3892 wrote to memory of 4536 3892 msedge.exe 84 PID 3892 wrote to memory of 4536 3892 msedge.exe 84 PID 3892 wrote to memory of 4536 3892 msedge.exe 84 PID 3892 wrote to memory of 4536 3892 msedge.exe 84 PID 3892 wrote to memory of 2172 3892 msedge.exe 85 PID 3892 wrote to memory of 2172 3892 msedge.exe 85 PID 3892 wrote to memory of 5100 3892 msedge.exe 86 PID 3892 wrote to memory of 5100 3892 msedge.exe 86 PID 3892 wrote to memory of 5100 3892 msedge.exe 86 PID 3892 wrote to memory of 5100 3892 msedge.exe 86 PID 3892 wrote to memory of 5100 3892 msedge.exe 86 PID 3892 wrote to memory of 5100 3892 msedge.exe 86 PID 3892 wrote to memory of 5100 3892 msedge.exe 86 PID 3892 wrote to memory of 5100 3892 msedge.exe 86 PID 3892 wrote to memory of 5100 3892 msedge.exe 86 PID 3892 wrote to memory of 5100 3892 msedge.exe 86 PID 3892 wrote to memory of 5100 3892 msedge.exe 86 PID 3892 wrote to memory of 5100 3892 msedge.exe 86 PID 3892 wrote to memory of 5100 3892 msedge.exe 86 PID 3892 wrote to memory of 5100 3892 msedge.exe 86 PID 3892 wrote to memory of 5100 3892 msedge.exe 86 PID 3892 wrote to memory of 5100 3892 msedge.exe 86 PID 3892 wrote to memory of 5100 3892 msedge.exe 86 PID 3892 wrote to memory of 5100 3892 msedge.exe 86 PID 3892 wrote to memory of 5100 3892 msedge.exe 86 PID 3892 wrote to memory of 5100 3892 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2a888a0d43f3719193041eda81438950_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3892 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdc2ac46f8,0x7ffdc2ac4708,0x7ffdc2ac47182⤵PID:4992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,11281684229605123198,10359882654718489368,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:22⤵PID:4536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2140,11281684229605123198,10359882654718489368,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2140,11281684229605123198,10359882654718489368,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2728 /prefetch:82⤵PID:5100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,11281684229605123198,10359882654718489368,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,11281684229605123198,10359882654718489368,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,11281684229605123198,10359882654718489368,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4976 /prefetch:12⤵PID:832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,11281684229605123198,10359882654718489368,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3992 /prefetch:12⤵PID:5036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,11281684229605123198,10359882654718489368,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5848 /prefetch:82⤵PID:4228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,11281684229605123198,10359882654718489368,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5848 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,11281684229605123198,10359882654718489368,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5760 /prefetch:12⤵PID:3664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,11281684229605123198,10359882654718489368,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5788 /prefetch:12⤵PID:4336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,11281684229605123198,10359882654718489368,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5360 /prefetch:12⤵PID:3436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,11281684229605123198,10359882654718489368,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4624 /prefetch:12⤵PID:2712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,11281684229605123198,10359882654718489368,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4648 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4412
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:452
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3108
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize168B
MD5bd60ab3d70560b0b43d9ea8f65e409c6
SHA19d92f9beb746e5503002923a6f8f6495bfa3507c
SHA25615cf48ef7629c0ce17b1f4e9987e971bb6a1ffc12abac76adc05b9701358279d
SHA512c1b3176d8f7b8fa235253e470e09768096abae5226e774895f8878021ec86278b408e3d8b9d599d0bb64a6b65cf15e6e89731c3fc5b578274f0bc7a5e3bfd799
-
Filesize
1KB
MD5e78aac6745c8868a2752eb8cb3dea919
SHA1093056e89cb7a465502fae2fdaada0dbe3e7de67
SHA256819ea327e480109332e18c5d60451569eac2bd896efc0132347d54a88c6c5558
SHA5124b64b77ee1a89bb38d9e98e021fd3ed9013245b9898aab171710f682e5c3aed975954e4d008d5e9ab4e0dd0293cb44d9aa97a4d2b057b89a9e7a00199933149d
-
Filesize
7KB
MD5ee484d363d2923d64ed11a36e72cc75c
SHA1605e18aa1f64cdecaf2ed6871862528ae9b7f22e
SHA2560615558b74dce4c88d99f7d28c687ac0afdc0739d8615a53d05f63d5f7a1e446
SHA512b05a90ca9ab209e0abcb4404291ca0dab8c849beb37c5b062684fc5b7cde1bf3681cdfbd8e4dc913d53b8cf46ada24ee4211e74863d75c90afab8b60a2402403
-
Filesize
6KB
MD5b93def57ce1ff320348e7bf378cd4e35
SHA17c429bad1abcde8a583ba23dc090ef1e8e41a50b
SHA2565710de448ae54e23d2e0dd4eeebccd3815585870b4bbf7b242f04cee55fcfe49
SHA512024244af550fcf42b58e777ce280f90086c4dcfe6a51403ea3839d6344d81b7b38bd3d87db8fee40af501c7c29fc16bd947cf1a90b229daa06aa30934670d8c7
-
Filesize
7KB
MD59376ae6d005299f1ba4fbe4318fedef7
SHA15f5a4135088f51cbf9af06844bc934182b851866
SHA2567182e15d7d1c3ee967b89c7acd50f2768daeb6e2f38109067858e1b920dc77a6
SHA51264a60f8e78f89a160bb8e0e2235de338d69acd132107052397c4a8b2c058023fd81f9a09999e4fa19fe4c06fa0e76e0f8f84edd08c7ff86f0938bcaaff50784c
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD59db41ef9d76bb8f34a49dc64fa9281e8
SHA11869a51f240ba01f59dc2d02225a1040a01a06c3
SHA256e1299ae51f6b39aa965257c9bc8c62731f5bcbe3a91c29c2461ba17550086800
SHA5120b7c5ecd4b03f977ac94778671da5d3c31ed109987c04ef1594763a14fb35262a6fdc143992682cba2cf2a96de49b245efd374cb073194828626cd7abf6a7eba