Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
09-05-2024 17:33
Static task
static1
Behavioral task
behavioral1
Sample
2b156afd5440d6c89d811fce986df18a_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2b156afd5440d6c89d811fce986df18a_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
2b156afd5440d6c89d811fce986df18a_JaffaCakes118.html
-
Size
4KB
-
MD5
2b156afd5440d6c89d811fce986df18a
-
SHA1
a7124ef167ca9761a0df6cec0902b2fbf6774f6e
-
SHA256
819c5655acfcf342bb53657e19a447eacb78df61749899cc00d84afe5568c4c5
-
SHA512
b5c2899447ef78c025857f1385f56ea4087ae0b5aaf6715edf0ef7b18f4abce094238fea2455b04b249aa17a989efc7ef0b64897f2499b934a5d3c7968bf2886
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oFyd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDP
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4748 msedge.exe 4748 msedge.exe 996 msedge.exe 996 msedge.exe 2596 identity_helper.exe 2596 identity_helper.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 996 wrote to memory of 1208 996 msedge.exe 85 PID 996 wrote to memory of 1208 996 msedge.exe 85 PID 996 wrote to memory of 3456 996 msedge.exe 86 PID 996 wrote to memory of 3456 996 msedge.exe 86 PID 996 wrote to memory of 3456 996 msedge.exe 86 PID 996 wrote to memory of 3456 996 msedge.exe 86 PID 996 wrote to memory of 3456 996 msedge.exe 86 PID 996 wrote to memory of 3456 996 msedge.exe 86 PID 996 wrote to memory of 3456 996 msedge.exe 86 PID 996 wrote to memory of 3456 996 msedge.exe 86 PID 996 wrote to memory of 3456 996 msedge.exe 86 PID 996 wrote to memory of 3456 996 msedge.exe 86 PID 996 wrote to memory of 3456 996 msedge.exe 86 PID 996 wrote to memory of 3456 996 msedge.exe 86 PID 996 wrote to memory of 3456 996 msedge.exe 86 PID 996 wrote to memory of 3456 996 msedge.exe 86 PID 996 wrote to memory of 3456 996 msedge.exe 86 PID 996 wrote to memory of 3456 996 msedge.exe 86 PID 996 wrote to memory of 3456 996 msedge.exe 86 PID 996 wrote to memory of 3456 996 msedge.exe 86 PID 996 wrote to memory of 3456 996 msedge.exe 86 PID 996 wrote to memory of 3456 996 msedge.exe 86 PID 996 wrote to memory of 3456 996 msedge.exe 86 PID 996 wrote to memory of 3456 996 msedge.exe 86 PID 996 wrote to memory of 3456 996 msedge.exe 86 PID 996 wrote to memory of 3456 996 msedge.exe 86 PID 996 wrote to memory of 3456 996 msedge.exe 86 PID 996 wrote to memory of 3456 996 msedge.exe 86 PID 996 wrote to memory of 3456 996 msedge.exe 86 PID 996 wrote to memory of 3456 996 msedge.exe 86 PID 996 wrote to memory of 3456 996 msedge.exe 86 PID 996 wrote to memory of 3456 996 msedge.exe 86 PID 996 wrote to memory of 3456 996 msedge.exe 86 PID 996 wrote to memory of 3456 996 msedge.exe 86 PID 996 wrote to memory of 3456 996 msedge.exe 86 PID 996 wrote to memory of 3456 996 msedge.exe 86 PID 996 wrote to memory of 3456 996 msedge.exe 86 PID 996 wrote to memory of 3456 996 msedge.exe 86 PID 996 wrote to memory of 3456 996 msedge.exe 86 PID 996 wrote to memory of 3456 996 msedge.exe 86 PID 996 wrote to memory of 3456 996 msedge.exe 86 PID 996 wrote to memory of 3456 996 msedge.exe 86 PID 996 wrote to memory of 4748 996 msedge.exe 87 PID 996 wrote to memory of 4748 996 msedge.exe 87 PID 996 wrote to memory of 2396 996 msedge.exe 88 PID 996 wrote to memory of 2396 996 msedge.exe 88 PID 996 wrote to memory of 2396 996 msedge.exe 88 PID 996 wrote to memory of 2396 996 msedge.exe 88 PID 996 wrote to memory of 2396 996 msedge.exe 88 PID 996 wrote to memory of 2396 996 msedge.exe 88 PID 996 wrote to memory of 2396 996 msedge.exe 88 PID 996 wrote to memory of 2396 996 msedge.exe 88 PID 996 wrote to memory of 2396 996 msedge.exe 88 PID 996 wrote to memory of 2396 996 msedge.exe 88 PID 996 wrote to memory of 2396 996 msedge.exe 88 PID 996 wrote to memory of 2396 996 msedge.exe 88 PID 996 wrote to memory of 2396 996 msedge.exe 88 PID 996 wrote to memory of 2396 996 msedge.exe 88 PID 996 wrote to memory of 2396 996 msedge.exe 88 PID 996 wrote to memory of 2396 996 msedge.exe 88 PID 996 wrote to memory of 2396 996 msedge.exe 88 PID 996 wrote to memory of 2396 996 msedge.exe 88 PID 996 wrote to memory of 2396 996 msedge.exe 88 PID 996 wrote to memory of 2396 996 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2b156afd5440d6c89d811fce986df18a_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:996 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa445a46f8,0x7ffa445a4708,0x7ffa445a47182⤵PID:1208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,62001076546417196,10204074425979082542,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:22⤵PID:3456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,62001076546417196,10204074425979082542,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2220 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,62001076546417196,10204074425979082542,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2844 /prefetch:82⤵PID:2396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,62001076546417196,10204074425979082542,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:4236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,62001076546417196,10204074425979082542,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:2480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,62001076546417196,10204074425979082542,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5168 /prefetch:82⤵PID:216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,62001076546417196,10204074425979082542,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5168 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,62001076546417196,10204074425979082542,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4740 /prefetch:12⤵PID:432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,62001076546417196,10204074425979082542,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5196 /prefetch:12⤵PID:4408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,62001076546417196,10204074425979082542,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4180 /prefetch:12⤵PID:3716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,62001076546417196,10204074425979082542,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3448 /prefetch:12⤵PID:852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,62001076546417196,10204074425979082542,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4840 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3972
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4568
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3828
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5537815e7cc5c694912ac0308147852e4
SHA12ccdd9d9dc637db5462fe8119c0df261146c363c
SHA256b4b69d099507d88abdeff4835e06cc6711e1c47464c963d013cef0a278e52d4f
SHA51263969a69af057235dbdecddc483ef5ce0058673179a3580c5aa12938c9501513cdb72dd703a06fa7d4fc08d074f17528283338c795334398497c771ecbd1350a
-
Filesize
152B
MD58b167567021ccb1a9fdf073fa9112ef0
SHA13baf293fbfaa7c1e7cdacb5f2975737f4ef69898
SHA25626764cedf35f118b55f30b3a36e0693f9f38290a5b2b6b8b83a00e990ae18513
SHA512726098001ef1acf1dd154a658752fa27dea32bca8fbb66395c142cb666102e71632adbad1b7e2f717071cd3e3af3867471932a71707f2ae97b989f4be468ab54
-
Filesize
292B
MD52d2afbcda0e40b52770711a87edfbacf
SHA12f07da7fd96a08bc6e5d015bc0001c88e02002b0
SHA2562c8d72709bd9226c9e71c036983de130dbe9ee44f39e0fcefc673a33d3c92ab3
SHA512dd75534cedaaccbb794ee0af446e719fe8900404ed4e303d18b146fa8aeb88ec85ff9d92728c3a64d3d77b3c15b44c6b385b7abac00f625e3e885cbd1e256c16
-
Filesize
6KB
MD597706a152b390f7335601fb440d60a50
SHA1fcb6d17fbb6a67fb0474ac83683cc797410bc621
SHA256ec11c48f2b891003541edecc144823d25b25bea1ac293c3ceb74c4870e9d9020
SHA512f5dbe87db61bdf203d9c34b8fb37e2ef7d94bb8eba7239b344e718b687e2142bb3f0cc6ae63818e6176a2b274a25a4079fb2c3d52dbf30adf6438bfcc314588e
-
Filesize
5KB
MD5615e5ca94115c49c5133302b4f50c353
SHA199276bd53a5298439751811d819fd3477728aa91
SHA256944c50ac508479071f4b521a3a0b8eb2c2c90a550c5f41cf6306305050b53ec4
SHA512aa17edea3e8bb15006c3cf945c5c7d5da8cba1a832a04558e33d8026853690b2e8e1df8f87fea871e8caf1b15c97a5d156fabd44a5a9331be156979b6d5dac38
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD502c3027f4950645841a625770c8ee722
SHA15ca7b27d97f0ad643624a85dc73242c9f85b78fc
SHA256b38d11be997b8ed03f0895307c79571d1c20183d18f3f667a1e6fd5f20e53e4c
SHA512ade6be8694921f2a47375227c2066b6a67e9dafee21da21f045dec6684dac9516ee7c1940d3a09359f942eea2e8cb372e8197958c6190666172b1838550a9bb2