Analysis
-
max time kernel
145s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
09/05/2024, 17:22
Static task
static1
Behavioral task
behavioral1
Sample
2b0b339d58281124f631e537d22481f5_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2b0b339d58281124f631e537d22481f5_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
2b0b339d58281124f631e537d22481f5_JaffaCakes118.html
-
Size
213KB
-
MD5
2b0b339d58281124f631e537d22481f5
-
SHA1
64732abee79b6d503353db5c96b67ade6b4d994c
-
SHA256
fe76f26526b3285db6273b05a0c4cb734d7c8e6eb1403419066f904860c6ac42
-
SHA512
54351620322794847ced1683b114afd99c81f89923f6dd9b8c89df07bed2e45c23eabe0faf146859c8199ff278f1d29e189de128dba6c7fd9cd39762447d3305
-
SSDEEP
3072:UrhB9CyHxX7Be7iAvtLPbAwuBNKifXTJF:sz9VxLY7iAVLTBQJlF
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3888 msedge.exe 3888 msedge.exe 3432 msedge.exe 3432 msedge.exe 1572 identity_helper.exe 1572 identity_helper.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3432 wrote to memory of 4036 3432 msedge.exe 82 PID 3432 wrote to memory of 4036 3432 msedge.exe 82 PID 3432 wrote to memory of 1780 3432 msedge.exe 83 PID 3432 wrote to memory of 1780 3432 msedge.exe 83 PID 3432 wrote to memory of 1780 3432 msedge.exe 83 PID 3432 wrote to memory of 1780 3432 msedge.exe 83 PID 3432 wrote to memory of 1780 3432 msedge.exe 83 PID 3432 wrote to memory of 1780 3432 msedge.exe 83 PID 3432 wrote to memory of 1780 3432 msedge.exe 83 PID 3432 wrote to memory of 1780 3432 msedge.exe 83 PID 3432 wrote to memory of 1780 3432 msedge.exe 83 PID 3432 wrote to memory of 1780 3432 msedge.exe 83 PID 3432 wrote to memory of 1780 3432 msedge.exe 83 PID 3432 wrote to memory of 1780 3432 msedge.exe 83 PID 3432 wrote to memory of 1780 3432 msedge.exe 83 PID 3432 wrote to memory of 1780 3432 msedge.exe 83 PID 3432 wrote to memory of 1780 3432 msedge.exe 83 PID 3432 wrote to memory of 1780 3432 msedge.exe 83 PID 3432 wrote to memory of 1780 3432 msedge.exe 83 PID 3432 wrote to memory of 1780 3432 msedge.exe 83 PID 3432 wrote to memory of 1780 3432 msedge.exe 83 PID 3432 wrote to memory of 1780 3432 msedge.exe 83 PID 3432 wrote to memory of 1780 3432 msedge.exe 83 PID 3432 wrote to memory of 1780 3432 msedge.exe 83 PID 3432 wrote to memory of 1780 3432 msedge.exe 83 PID 3432 wrote to memory of 1780 3432 msedge.exe 83 PID 3432 wrote to memory of 1780 3432 msedge.exe 83 PID 3432 wrote to memory of 1780 3432 msedge.exe 83 PID 3432 wrote to memory of 1780 3432 msedge.exe 83 PID 3432 wrote to memory of 1780 3432 msedge.exe 83 PID 3432 wrote to memory of 1780 3432 msedge.exe 83 PID 3432 wrote to memory of 1780 3432 msedge.exe 83 PID 3432 wrote to memory of 1780 3432 msedge.exe 83 PID 3432 wrote to memory of 1780 3432 msedge.exe 83 PID 3432 wrote to memory of 1780 3432 msedge.exe 83 PID 3432 wrote to memory of 1780 3432 msedge.exe 83 PID 3432 wrote to memory of 1780 3432 msedge.exe 83 PID 3432 wrote to memory of 1780 3432 msedge.exe 83 PID 3432 wrote to memory of 1780 3432 msedge.exe 83 PID 3432 wrote to memory of 1780 3432 msedge.exe 83 PID 3432 wrote to memory of 1780 3432 msedge.exe 83 PID 3432 wrote to memory of 1780 3432 msedge.exe 83 PID 3432 wrote to memory of 3888 3432 msedge.exe 84 PID 3432 wrote to memory of 3888 3432 msedge.exe 84 PID 3432 wrote to memory of 4488 3432 msedge.exe 85 PID 3432 wrote to memory of 4488 3432 msedge.exe 85 PID 3432 wrote to memory of 4488 3432 msedge.exe 85 PID 3432 wrote to memory of 4488 3432 msedge.exe 85 PID 3432 wrote to memory of 4488 3432 msedge.exe 85 PID 3432 wrote to memory of 4488 3432 msedge.exe 85 PID 3432 wrote to memory of 4488 3432 msedge.exe 85 PID 3432 wrote to memory of 4488 3432 msedge.exe 85 PID 3432 wrote to memory of 4488 3432 msedge.exe 85 PID 3432 wrote to memory of 4488 3432 msedge.exe 85 PID 3432 wrote to memory of 4488 3432 msedge.exe 85 PID 3432 wrote to memory of 4488 3432 msedge.exe 85 PID 3432 wrote to memory of 4488 3432 msedge.exe 85 PID 3432 wrote to memory of 4488 3432 msedge.exe 85 PID 3432 wrote to memory of 4488 3432 msedge.exe 85 PID 3432 wrote to memory of 4488 3432 msedge.exe 85 PID 3432 wrote to memory of 4488 3432 msedge.exe 85 PID 3432 wrote to memory of 4488 3432 msedge.exe 85 PID 3432 wrote to memory of 4488 3432 msedge.exe 85 PID 3432 wrote to memory of 4488 3432 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2b0b339d58281124f631e537d22481f5_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3432 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffae9a446f8,0x7ffae9a44708,0x7ffae9a447182⤵PID:4036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,14777486021099721398,14944643828882968667,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2080 /prefetch:22⤵PID:1780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2060,14777486021099721398,14944643828882968667,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2580 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2060,14777486021099721398,14944643828882968667,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2748 /prefetch:82⤵PID:4488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,14777486021099721398,14944643828882968667,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:12⤵PID:4888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,14777486021099721398,14944643828882968667,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3368 /prefetch:12⤵PID:4556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,14777486021099721398,14944643828882968667,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5128 /prefetch:82⤵PID:3792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,14777486021099721398,14944643828882968667,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5128 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,14777486021099721398,14944643828882968667,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5124 /prefetch:12⤵PID:3468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,14777486021099721398,14944643828882968667,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5256 /prefetch:12⤵PID:2712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,14777486021099721398,14944643828882968667,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3456 /prefetch:12⤵PID:4668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,14777486021099721398,14944643828882968667,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3384 /prefetch:12⤵PID:4368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,14777486021099721398,14944643828882968667,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4924 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2804
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3200
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2984
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
6KB
MD5fc90243c8358145f116293cfd94ac6a7
SHA1a2854b0466319bbdc296cae25662fc2fa248bbbd
SHA256439ccf02a227052dd0e9cab48ca6b43ca545831e0f9676c82777d5ec8e8d240a
SHA512c28e23deb6f0780fd4368e54afe5abd63b19524c30277aec3c3459dfc07e2801195a85ec6bd97b2924ce83ea4e545526b8c8b9826a1d24460241c93784eb3a5b
-
Filesize
6KB
MD5f49a9de0736660cd9e3aa9658cc6967e
SHA1d32e351f7992b3e7629cc8fbb7438c75d73770c8
SHA256dbe4df1d91b7f6fe2a246345bfac659764f889b681b4f95d173f0178218e035e
SHA512974105eb896e84d2927ccd981039abc1c35f4fc312448ab82464d28c09aef6ee09d70caf8f6601685aee2f0a0e27fa9270c16703f226219b43fe861a0ada2804
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD591e38cee36fcc607e4c56f2ead0215f0
SHA191779307e253490b56f956e77252389c5e55d8a4
SHA25671f5f7298ffcc4c89aad2c3d3a3ee65b80df3839d1d101624f651ce582a9059d
SHA512b1a6b49864fbb6fba72de33317d9f31c21811ee5b600b76a85aa36fd951bf2c325909cdf1863348d420ca6ca75f8efa97c5815ef8cec7d0e6c7891538f6a3a4a