Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
09/05/2024, 16:52
Static task
static1
Behavioral task
behavioral1
Sample
2af10dfe54a0324e161e8372eba0c59e_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2af10dfe54a0324e161e8372eba0c59e_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
2af10dfe54a0324e161e8372eba0c59e_JaffaCakes118.html
-
Size
207KB
-
MD5
2af10dfe54a0324e161e8372eba0c59e
-
SHA1
8b1ea2d2809d42bccf1a4543bba87481e3e42644
-
SHA256
69abd54cfa508c961a41dc46fc87eec42e3ffaad43d5ac9cc9124cba65392691
-
SHA512
6524f1c9bf71bc452b16e81de9599f1cc16b685eee0d71fef466e84d4a58d4b4719193c2eac465686f37227cb7b08567b756ebea81c4180358eb28965a4397f4
-
SSDEEP
6144:2530DH6NEQwjcHXxQRVufJc/0931k1h5Z:2uDHQmjcxQRVufJc//Z
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3412 msedge.exe 3412 msedge.exe 1104 msedge.exe 1104 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1104 wrote to memory of 2976 1104 msedge.exe 81 PID 1104 wrote to memory of 2976 1104 msedge.exe 81 PID 1104 wrote to memory of 2488 1104 msedge.exe 82 PID 1104 wrote to memory of 2488 1104 msedge.exe 82 PID 1104 wrote to memory of 2488 1104 msedge.exe 82 PID 1104 wrote to memory of 2488 1104 msedge.exe 82 PID 1104 wrote to memory of 2488 1104 msedge.exe 82 PID 1104 wrote to memory of 2488 1104 msedge.exe 82 PID 1104 wrote to memory of 2488 1104 msedge.exe 82 PID 1104 wrote to memory of 2488 1104 msedge.exe 82 PID 1104 wrote to memory of 2488 1104 msedge.exe 82 PID 1104 wrote to memory of 2488 1104 msedge.exe 82 PID 1104 wrote to memory of 2488 1104 msedge.exe 82 PID 1104 wrote to memory of 2488 1104 msedge.exe 82 PID 1104 wrote to memory of 2488 1104 msedge.exe 82 PID 1104 wrote to memory of 2488 1104 msedge.exe 82 PID 1104 wrote to memory of 2488 1104 msedge.exe 82 PID 1104 wrote to memory of 2488 1104 msedge.exe 82 PID 1104 wrote to memory of 2488 1104 msedge.exe 82 PID 1104 wrote to memory of 2488 1104 msedge.exe 82 PID 1104 wrote to memory of 2488 1104 msedge.exe 82 PID 1104 wrote to memory of 2488 1104 msedge.exe 82 PID 1104 wrote to memory of 2488 1104 msedge.exe 82 PID 1104 wrote to memory of 2488 1104 msedge.exe 82 PID 1104 wrote to memory of 2488 1104 msedge.exe 82 PID 1104 wrote to memory of 2488 1104 msedge.exe 82 PID 1104 wrote to memory of 2488 1104 msedge.exe 82 PID 1104 wrote to memory of 2488 1104 msedge.exe 82 PID 1104 wrote to memory of 2488 1104 msedge.exe 82 PID 1104 wrote to memory of 2488 1104 msedge.exe 82 PID 1104 wrote to memory of 2488 1104 msedge.exe 82 PID 1104 wrote to memory of 2488 1104 msedge.exe 82 PID 1104 wrote to memory of 2488 1104 msedge.exe 82 PID 1104 wrote to memory of 2488 1104 msedge.exe 82 PID 1104 wrote to memory of 2488 1104 msedge.exe 82 PID 1104 wrote to memory of 2488 1104 msedge.exe 82 PID 1104 wrote to memory of 2488 1104 msedge.exe 82 PID 1104 wrote to memory of 2488 1104 msedge.exe 82 PID 1104 wrote to memory of 2488 1104 msedge.exe 82 PID 1104 wrote to memory of 2488 1104 msedge.exe 82 PID 1104 wrote to memory of 2488 1104 msedge.exe 82 PID 1104 wrote to memory of 2488 1104 msedge.exe 82 PID 1104 wrote to memory of 3412 1104 msedge.exe 83 PID 1104 wrote to memory of 3412 1104 msedge.exe 83 PID 1104 wrote to memory of 4832 1104 msedge.exe 84 PID 1104 wrote to memory of 4832 1104 msedge.exe 84 PID 1104 wrote to memory of 4832 1104 msedge.exe 84 PID 1104 wrote to memory of 4832 1104 msedge.exe 84 PID 1104 wrote to memory of 4832 1104 msedge.exe 84 PID 1104 wrote to memory of 4832 1104 msedge.exe 84 PID 1104 wrote to memory of 4832 1104 msedge.exe 84 PID 1104 wrote to memory of 4832 1104 msedge.exe 84 PID 1104 wrote to memory of 4832 1104 msedge.exe 84 PID 1104 wrote to memory of 4832 1104 msedge.exe 84 PID 1104 wrote to memory of 4832 1104 msedge.exe 84 PID 1104 wrote to memory of 4832 1104 msedge.exe 84 PID 1104 wrote to memory of 4832 1104 msedge.exe 84 PID 1104 wrote to memory of 4832 1104 msedge.exe 84 PID 1104 wrote to memory of 4832 1104 msedge.exe 84 PID 1104 wrote to memory of 4832 1104 msedge.exe 84 PID 1104 wrote to memory of 4832 1104 msedge.exe 84 PID 1104 wrote to memory of 4832 1104 msedge.exe 84 PID 1104 wrote to memory of 4832 1104 msedge.exe 84 PID 1104 wrote to memory of 4832 1104 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2af10dfe54a0324e161e8372eba0c59e_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1104 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff9c6246f8,0x7fff9c624708,0x7fff9c6247182⤵PID:2976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,7468284344500443402,16505783976062311077,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵PID:2488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,7468284344500443402,16505783976062311077,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2156 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,7468284344500443402,16505783976062311077,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2908 /prefetch:82⤵PID:4832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,7468284344500443402,16505783976062311077,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:3184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,7468284344500443402,16505783976062311077,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:2324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,7468284344500443402,16505783976062311077,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6136 /prefetch:12⤵PID:2448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,7468284344500443402,16505783976062311077,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4616 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4992
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2136
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4812
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54b4f91fa1b362ba5341ecb2836438dea
SHA19561f5aabed742404d455da735259a2c6781fa07
SHA256d824b742eace197ddc8b6ed5d918f390fde4b0fbf0e371b8e1f2ed40a3b6455c
SHA512fef22217dcdd8000bc193e25129699d4b8f7a103ca4fe1613baf73ccf67090d9fbae27eb93e4bb8747455853a0a4326f2d0c38df41c8d42351cdcd4132418dac
-
Filesize
152B
MD5eaa3db555ab5bc0cb364826204aad3f0
SHA1a4cdfaac8de49e6e6e88b335cfeaa7c9e3c563ca
SHA256ef7baeb1b2ab05ff3c5fbb76c2759db49294654548706c7c8e87f0cde855b86b
SHA512e13981da51b52c15261ecabb98af32f9b920651b46b10ce0cc823c5878b22eb1420258c80deef204070d1e0bdd3a64d875ac2522e3713a3cf11657aa55aeccd4
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
2KB
MD511cc15fad05043207681df6c19d90c49
SHA1206617c849f3cbed08ec53bc83c13ce5f59df197
SHA2565ae7b1987c2b14b1ee570f92d485a8d353ae2073e2faf6c28c1a3ae2fd0d780a
SHA512d0bb29ab672b2f1dec93b9617a3d0ca7e65ebde269aa87407637e1aecfe3c094eba8b8c9cda6d76230d24a554f9ebf7ece9dfd02cd756ae75d2af2e0766138d6
-
Filesize
6KB
MD54c7e866d20c0529b5cf939cf0ae215cf
SHA13202613a2980653a9468f6a9dd04969b5ce20d65
SHA2565070356b2349270f5f3c3b7244886df3b28f1e1a9fcbd1b742a43187b0e68175
SHA5124fe9a2335f5cd7c89dd5d4b2e687cfc55530d37c837b8d3270b947ad0dc164bb72a4c7f54279be8b647fe7c2b5c25f94661187bcd1f108d74c4c570d87556531
-
Filesize
7KB
MD5cdb10ce8f39bf37f15f380c5cf4e6a16
SHA1be78a0b8305ad7dad0a742d2c9e37a9b663bcf49
SHA2564a855b0080dc3e99c35b83ef328a05cce1d6c3059c31338d49bf00ba13844a4a
SHA51201318f44ff488e8791aae694b68c6295c3e592f7021970e61359acbf2db43795dfdb6be7e497f263b03a92ef7ff588ae83efacb6c6c46539f9ec18149657f4d7
-
Filesize
6KB
MD5d1442e75d1ea8321e5335359aa6b1b28
SHA11a775016979d3b46499761bcf72c1406b95952e3
SHA256c3d950f6cd56c0028cfab07304bff7d4850f86d301cd8f355022566ed284a064
SHA5128008bc56a47285c3dcaf01317419cae5040eb3521f57ae0747622f8be66fb32f0b9d5a2e1dba191f3717626305f9efeb83b50fb3a50621add6690df5206cdfd2
-
Filesize
1KB
MD50b1396b9235af98bd17d26023e9149c6
SHA16aa34461492446514a67d7db62b9fb35f5638d75
SHA256eb1177d5b220a85dcfc11f395e0fc5d49d7226d9b5663a4146224a109ae0899e
SHA512ed1b7123fc47b922c5297e60872f8ba26c9cb6662f454950f7b916760c17ec21804693edbeca46ca89622113c38261d8ce8512e55d11b8e406b1761ffcfc108f
-
Filesize
707B
MD58b1d78d4f330c87686b1db44b6a999e6
SHA1a91562d518d769a7ea5a115f18d4a2ec31e77153
SHA256e132673b467f22ff1a9932f6a1a7180626500ff9e8eb82ad19826df6930a4183
SHA5124d65c1e73dafb2faf6ab2c386603a4bd71c4582934ec9f2288d6c0ce62f40c2c99a97820595194dd45ec477f32f688829c8e92f20a84bbac3efb850654c9466c
-
Filesize
11KB
MD5604506eb4a2f0f33fc407d1a5f631b0c
SHA1dfce74125b19d93fece6cdfed0a62aa5ae60056e
SHA25653d854b45d72eba64f932459439d701a3dd46b4984d5d7e7cc1ba97668efbb05
SHA512cdb172ee4c903115cf21593715dbfec9e55b6ea63bae19c25b3b3ff236422f5c6e1cd87cccd199c014c356f025c79c01c33e58bd61a8fd84df7cd774f15a677a