Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
09-05-2024 16:00
Static task
static1
Behavioral task
behavioral1
Sample
2abe56ced03092cce20c799260d04bd2_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2abe56ced03092cce20c799260d04bd2_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
2abe56ced03092cce20c799260d04bd2_JaffaCakes118.html
-
Size
46KB
-
MD5
2abe56ced03092cce20c799260d04bd2
-
SHA1
84e103ddb06604984e6bbe972a1d1901331e4ee8
-
SHA256
fb9e1924167c39bff9b65b2efd02c80802acc0dd243667eee1a0704b586ca64c
-
SHA512
67e520e24993c4786250b4232f46ebab948d6d358a6be74084ee24e6ea779c26bcb1801353bdcc04932cff0bcd84d0664faf7c3a12d8568cc73f10b54d2c0780
-
SSDEEP
768:NJS6S7B8ROZOrggBbvFICSCfC1C1C+C+CQCQC+C+CtCtCECECQCQC8oY3o+61IpE:u62BkOZOrggBbvFIzCAA99xxllAAppxA
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1488 msedge.exe 1488 msedge.exe 1072 msedge.exe 1072 msedge.exe 3776 identity_helper.exe 3776 identity_helper.exe 1084 msedge.exe 1084 msedge.exe 1084 msedge.exe 1084 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1072 wrote to memory of 3872 1072 msedge.exe 81 PID 1072 wrote to memory of 3872 1072 msedge.exe 81 PID 1072 wrote to memory of 3544 1072 msedge.exe 82 PID 1072 wrote to memory of 3544 1072 msedge.exe 82 PID 1072 wrote to memory of 3544 1072 msedge.exe 82 PID 1072 wrote to memory of 3544 1072 msedge.exe 82 PID 1072 wrote to memory of 3544 1072 msedge.exe 82 PID 1072 wrote to memory of 3544 1072 msedge.exe 82 PID 1072 wrote to memory of 3544 1072 msedge.exe 82 PID 1072 wrote to memory of 3544 1072 msedge.exe 82 PID 1072 wrote to memory of 3544 1072 msedge.exe 82 PID 1072 wrote to memory of 3544 1072 msedge.exe 82 PID 1072 wrote to memory of 3544 1072 msedge.exe 82 PID 1072 wrote to memory of 3544 1072 msedge.exe 82 PID 1072 wrote to memory of 3544 1072 msedge.exe 82 PID 1072 wrote to memory of 3544 1072 msedge.exe 82 PID 1072 wrote to memory of 3544 1072 msedge.exe 82 PID 1072 wrote to memory of 3544 1072 msedge.exe 82 PID 1072 wrote to memory of 3544 1072 msedge.exe 82 PID 1072 wrote to memory of 3544 1072 msedge.exe 82 PID 1072 wrote to memory of 3544 1072 msedge.exe 82 PID 1072 wrote to memory of 3544 1072 msedge.exe 82 PID 1072 wrote to memory of 3544 1072 msedge.exe 82 PID 1072 wrote to memory of 3544 1072 msedge.exe 82 PID 1072 wrote to memory of 3544 1072 msedge.exe 82 PID 1072 wrote to memory of 3544 1072 msedge.exe 82 PID 1072 wrote to memory of 3544 1072 msedge.exe 82 PID 1072 wrote to memory of 3544 1072 msedge.exe 82 PID 1072 wrote to memory of 3544 1072 msedge.exe 82 PID 1072 wrote to memory of 3544 1072 msedge.exe 82 PID 1072 wrote to memory of 3544 1072 msedge.exe 82 PID 1072 wrote to memory of 3544 1072 msedge.exe 82 PID 1072 wrote to memory of 3544 1072 msedge.exe 82 PID 1072 wrote to memory of 3544 1072 msedge.exe 82 PID 1072 wrote to memory of 3544 1072 msedge.exe 82 PID 1072 wrote to memory of 3544 1072 msedge.exe 82 PID 1072 wrote to memory of 3544 1072 msedge.exe 82 PID 1072 wrote to memory of 3544 1072 msedge.exe 82 PID 1072 wrote to memory of 3544 1072 msedge.exe 82 PID 1072 wrote to memory of 3544 1072 msedge.exe 82 PID 1072 wrote to memory of 3544 1072 msedge.exe 82 PID 1072 wrote to memory of 3544 1072 msedge.exe 82 PID 1072 wrote to memory of 1488 1072 msedge.exe 83 PID 1072 wrote to memory of 1488 1072 msedge.exe 83 PID 1072 wrote to memory of 4496 1072 msedge.exe 84 PID 1072 wrote to memory of 4496 1072 msedge.exe 84 PID 1072 wrote to memory of 4496 1072 msedge.exe 84 PID 1072 wrote to memory of 4496 1072 msedge.exe 84 PID 1072 wrote to memory of 4496 1072 msedge.exe 84 PID 1072 wrote to memory of 4496 1072 msedge.exe 84 PID 1072 wrote to memory of 4496 1072 msedge.exe 84 PID 1072 wrote to memory of 4496 1072 msedge.exe 84 PID 1072 wrote to memory of 4496 1072 msedge.exe 84 PID 1072 wrote to memory of 4496 1072 msedge.exe 84 PID 1072 wrote to memory of 4496 1072 msedge.exe 84 PID 1072 wrote to memory of 4496 1072 msedge.exe 84 PID 1072 wrote to memory of 4496 1072 msedge.exe 84 PID 1072 wrote to memory of 4496 1072 msedge.exe 84 PID 1072 wrote to memory of 4496 1072 msedge.exe 84 PID 1072 wrote to memory of 4496 1072 msedge.exe 84 PID 1072 wrote to memory of 4496 1072 msedge.exe 84 PID 1072 wrote to memory of 4496 1072 msedge.exe 84 PID 1072 wrote to memory of 4496 1072 msedge.exe 84 PID 1072 wrote to memory of 4496 1072 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2abe56ced03092cce20c799260d04bd2_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1072 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xdc,0x108,0x7ffb923946f8,0x7ffb92394708,0x7ffb923947182⤵PID:3872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,5042064113030286638,5430651077985496108,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:22⤵PID:3544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,5042064113030286638,5430651077985496108,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2236 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,5042064113030286638,5430651077985496108,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2768 /prefetch:82⤵PID:4496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,5042064113030286638,5430651077985496108,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,5042064113030286638,5430651077985496108,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:12⤵PID:1260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,5042064113030286638,5430651077985496108,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2776 /prefetch:12⤵PID:2548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,5042064113030286638,5430651077985496108,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2640 /prefetch:12⤵PID:3800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,5042064113030286638,5430651077985496108,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5632 /prefetch:82⤵PID:4948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,5042064113030286638,5430651077985496108,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5632 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,5042064113030286638,5430651077985496108,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5628 /prefetch:12⤵PID:3380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,5042064113030286638,5430651077985496108,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3420 /prefetch:12⤵PID:4460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,5042064113030286638,5430651077985496108,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2740 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1084
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3792
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4548
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
Filesize
6KB
MD5582bd0477685ead4f9edee45513ec3ee
SHA179f95b74660d4ca1ba15b390fc0d29bd734a99b0
SHA256d5e1d65fd0fdae5ef2e9faf0e12800a2d61f87185209b140c238b3cb8eb6effc
SHA512ae527449b647150aca08e28d82fbda92049dbc426ea22144b10b59b1ae6d9c71c87c93390a8d3fa42d008840e02928694283a783c290286c3e481bd1d3fda99a
-
Filesize
6KB
MD59cd38da1227bf6187ad454452aad3538
SHA1c1ec0a03b74827264b412c7af8169fe531974436
SHA256cca12df04df4851139edb68319f7d858581987460727b1b582eb2d60cc9b15c9
SHA512d17861a20134d1e20d08677d68d6bd51d03f078ffe2485017867f7d365b27ff7ee20c19ce3fe256a6d7d360b8e5ec611e9fdeb080c3f53c067b70c97a4c4f9eb
-
Filesize
6KB
MD56d1d9df23aac613627ec5affec3678a0
SHA109800faa66e0748cca9045b876a8b70e565ed1bf
SHA2567ae6b921fd1c0fbcd280c8e8f5818380b531403d03efa6b2b682e420edbc3208
SHA51255aa0d4d3d32b1c396907a23ecb00760f1f0a58a883870cec091dccfd8d114351e3e06766220c6bf9623154a206052ce10927abc41a82ee68f2460f1733770b5
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5d209e1f056405d3fc60a7c483f13553c
SHA14c9c7e8f4cb3c4f8db3337971401a3c3fd5872dd
SHA256f363a7de615fef170c50d1be2aaa2693900690c83db376d56eb2606cad191508
SHA51286847c4ff21d2f3c105596be62ec3a36bb2ea17d90f69c7c3f3537a45fa7195064684555e35123d88f41f7e0d60215f11aa6f8644ad14fbe047cacfd8180521d