Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
09/05/2024, 17:48
Static task
static1
Behavioral task
behavioral1
Sample
2b269cf2eb4f93f3b59dd1a8d0fe9f86_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2b269cf2eb4f93f3b59dd1a8d0fe9f86_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
2b269cf2eb4f93f3b59dd1a8d0fe9f86_JaffaCakes118.html
-
Size
45KB
-
MD5
2b269cf2eb4f93f3b59dd1a8d0fe9f86
-
SHA1
101d58335058e0c881488a53f8d643bf1acdbfb0
-
SHA256
898b6f5a50108b30b10599160531ad5a6ec3049943f518e8de5ce4b6c4ca79f9
-
SHA512
c9d1eeee790643644440e94a28f5c9fed3ea0279083ce1ef2f05c63d3211b18dc1dc97ca881e6aeb004eea0a59286e5ea00588698e8a6e32855c9078dde50a4d
-
SSDEEP
192:8d3vv0sQ0kkDct+WuZURwjohOdkCUzSqDG0ajqR7dTztVwJBm9AK:8d3vMik4c1uZURwjo+sRhl5KJK
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1444 msedge.exe 1444 msedge.exe 3700 msedge.exe 3700 msedge.exe 1324 identity_helper.exe 1324 identity_helper.exe 2288 msedge.exe 2288 msedge.exe 2288 msedge.exe 2288 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe 3700 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3700 wrote to memory of 3576 3700 msedge.exe 83 PID 3700 wrote to memory of 3576 3700 msedge.exe 83 PID 3700 wrote to memory of 3320 3700 msedge.exe 84 PID 3700 wrote to memory of 3320 3700 msedge.exe 84 PID 3700 wrote to memory of 3320 3700 msedge.exe 84 PID 3700 wrote to memory of 3320 3700 msedge.exe 84 PID 3700 wrote to memory of 3320 3700 msedge.exe 84 PID 3700 wrote to memory of 3320 3700 msedge.exe 84 PID 3700 wrote to memory of 3320 3700 msedge.exe 84 PID 3700 wrote to memory of 3320 3700 msedge.exe 84 PID 3700 wrote to memory of 3320 3700 msedge.exe 84 PID 3700 wrote to memory of 3320 3700 msedge.exe 84 PID 3700 wrote to memory of 3320 3700 msedge.exe 84 PID 3700 wrote to memory of 3320 3700 msedge.exe 84 PID 3700 wrote to memory of 3320 3700 msedge.exe 84 PID 3700 wrote to memory of 3320 3700 msedge.exe 84 PID 3700 wrote to memory of 3320 3700 msedge.exe 84 PID 3700 wrote to memory of 3320 3700 msedge.exe 84 PID 3700 wrote to memory of 3320 3700 msedge.exe 84 PID 3700 wrote to memory of 3320 3700 msedge.exe 84 PID 3700 wrote to memory of 3320 3700 msedge.exe 84 PID 3700 wrote to memory of 3320 3700 msedge.exe 84 PID 3700 wrote to memory of 3320 3700 msedge.exe 84 PID 3700 wrote to memory of 3320 3700 msedge.exe 84 PID 3700 wrote to memory of 3320 3700 msedge.exe 84 PID 3700 wrote to memory of 3320 3700 msedge.exe 84 PID 3700 wrote to memory of 3320 3700 msedge.exe 84 PID 3700 wrote to memory of 3320 3700 msedge.exe 84 PID 3700 wrote to memory of 3320 3700 msedge.exe 84 PID 3700 wrote to memory of 3320 3700 msedge.exe 84 PID 3700 wrote to memory of 3320 3700 msedge.exe 84 PID 3700 wrote to memory of 3320 3700 msedge.exe 84 PID 3700 wrote to memory of 3320 3700 msedge.exe 84 PID 3700 wrote to memory of 3320 3700 msedge.exe 84 PID 3700 wrote to memory of 3320 3700 msedge.exe 84 PID 3700 wrote to memory of 3320 3700 msedge.exe 84 PID 3700 wrote to memory of 3320 3700 msedge.exe 84 PID 3700 wrote to memory of 3320 3700 msedge.exe 84 PID 3700 wrote to memory of 3320 3700 msedge.exe 84 PID 3700 wrote to memory of 3320 3700 msedge.exe 84 PID 3700 wrote to memory of 3320 3700 msedge.exe 84 PID 3700 wrote to memory of 3320 3700 msedge.exe 84 PID 3700 wrote to memory of 1444 3700 msedge.exe 85 PID 3700 wrote to memory of 1444 3700 msedge.exe 85 PID 3700 wrote to memory of 3452 3700 msedge.exe 86 PID 3700 wrote to memory of 3452 3700 msedge.exe 86 PID 3700 wrote to memory of 3452 3700 msedge.exe 86 PID 3700 wrote to memory of 3452 3700 msedge.exe 86 PID 3700 wrote to memory of 3452 3700 msedge.exe 86 PID 3700 wrote to memory of 3452 3700 msedge.exe 86 PID 3700 wrote to memory of 3452 3700 msedge.exe 86 PID 3700 wrote to memory of 3452 3700 msedge.exe 86 PID 3700 wrote to memory of 3452 3700 msedge.exe 86 PID 3700 wrote to memory of 3452 3700 msedge.exe 86 PID 3700 wrote to memory of 3452 3700 msedge.exe 86 PID 3700 wrote to memory of 3452 3700 msedge.exe 86 PID 3700 wrote to memory of 3452 3700 msedge.exe 86 PID 3700 wrote to memory of 3452 3700 msedge.exe 86 PID 3700 wrote to memory of 3452 3700 msedge.exe 86 PID 3700 wrote to memory of 3452 3700 msedge.exe 86 PID 3700 wrote to memory of 3452 3700 msedge.exe 86 PID 3700 wrote to memory of 3452 3700 msedge.exe 86 PID 3700 wrote to memory of 3452 3700 msedge.exe 86 PID 3700 wrote to memory of 3452 3700 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2b269cf2eb4f93f3b59dd1a8d0fe9f86_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3700 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xb4,0x108,0x7ffffdf846f8,0x7ffffdf84708,0x7ffffdf847182⤵PID:3576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,9661266188328981870,11320163388030735068,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵PID:3320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2084,9661266188328981870,11320163388030735068,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2156 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2084,9661266188328981870,11320163388030735068,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2796 /prefetch:82⤵PID:3452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,9661266188328981870,11320163388030735068,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2112 /prefetch:12⤵PID:3184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,9661266188328981870,11320163388030735068,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:3096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,9661266188328981870,11320163388030735068,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4960 /prefetch:12⤵PID:3880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,9661266188328981870,11320163388030735068,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4832 /prefetch:82⤵PID:5028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,9661266188328981870,11320163388030735068,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4832 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,9661266188328981870,11320163388030735068,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5676 /prefetch:12⤵PID:4860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,9661266188328981870,11320163388030735068,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4824 /prefetch:12⤵PID:4556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,9661266188328981870,11320163388030735068,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5272 /prefetch:12⤵PID:2604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,9661266188328981870,11320163388030735068,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3952 /prefetch:12⤵PID:4316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,9661266188328981870,11320163388030735068,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3920 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2288
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2708
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2588
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52daa93382bba07cbc40af372d30ec576
SHA1c5e709dc3e2e4df2ff841fbde3e30170e7428a94
SHA2561826d2a57b1938c148bf212a47d947ed1bfb26cfc55868931f843ee438117f30
SHA51265635cb59c81548a9ef8fdb0942331e7f3cd0c30ce1d4dba48aed72dbb27b06511a55d2aeaadfadbbb4b7cb4b2e2772bbabba9603b3f7d9c8b9e4a7fbf3d6b6b
-
Filesize
152B
MD5ecdc2754d7d2ae862272153aa9b9ca6e
SHA1c19bed1c6e1c998b9fa93298639ad7961339147d
SHA256a13d791473f836edcab0e93451ce7b7182efbbc54261b2b5644d319e047a00a7
SHA512cd4fb81317d540f8b15f1495a381bb6f0f129b8923a7c06e4b5cf777d2625c30304aee6cc68aa20479e08d84e5030b43fbe93e479602400334dfdd7297f702f2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD536c1302050adbd72a6b1184578262bbc
SHA1fae0e9cc6bb0d06eeff877b44d169935c0385453
SHA25664cce166aae2878fe07d08e67494a2ed6dd10d177a74f492649888c07a1f9192
SHA512d811ff09fdc7461a80efbd57cb6768645c54a8b908e3f8a6f3efd88baeec5b3facdc263a3ab2b2b5f0cb761aadde34660efc87b46b822728b6ba9c4f6733c3cb
-
Filesize
713B
MD5cd4abe6b486cbbf0af4c38bd8fdddec4
SHA141bcb7e29ce5cc6e0cefcf4d8f879d3ffc54ddf2
SHA256b1654e2621a7fb3eeb33829a45919ac6e5d1e2d7bc1f716f62a89f63340a9d54
SHA512966bf2c05adc8f15d5d5d09ef9e498ef9712f677bab8f0158de3fb4da6feb1a7ce25048594fb044e17804ef9b43d2f5b1fff86721c6de7fcb70de8e0abc32373
-
Filesize
5KB
MD5237ce7a3e61257ee4b4c029c64131744
SHA1938e8f2f2d61d7e0fc96f7d27c3395bd8ec7cace
SHA256f2719c436ab2e5da62636dc7feea7f34f56191c8718009c791b38b81e9fcc9d6
SHA51291af7073bfd75d7e1345dab1008151d168a1ee72c51fd9c1f6a70b8f3601c2087fe47d105454883b260343a6a2a9ae10dce3bcdb2434ca7d3037664c3592fa10
-
Filesize
6KB
MD5e17684f7b5f0f1a20646bcad2d686a54
SHA134585ea26107ca156280372137401be6baa448c6
SHA2566701cdea37a6a54a27e728045803fe5a34363a3185eb4728312ab6a1fdc219f6
SHA512fa68bc05068b9719a310203f02df16e83fae451ab9b9a58500c5976e69b95e72dddae33e7f8aec8717c4e03f727fc5e6345c635a7169b787aee5a6b2236ac482
-
Filesize
372B
MD53bfdab6af0cda3fd8384c6515f6fc55b
SHA1e8994048ddeadf339341eb7ec0ae2a810e69c9b0
SHA256572bdd788dddac5360096451105db9fb313ab101479dcb25d9128a68a133a109
SHA512e0722c692a37bb2c79a6d59b99397137deb8ccb3b2a7b33e401e848ec930c4dab019f5f91342ab98fd40b0700bed353f6900b4241e81bae89f67265420cc6f2b
-
Filesize
372B
MD5847728eee01c52c6b5bc91b494d19389
SHA19f358841bd7789694a6fb7aaebc328e0344769bc
SHA2568d6c83bf7a3aa74ac51e68a0a9901e0b2237f7a6a704cdfc64dd89708d3a6b25
SHA5128915df6fdc87fc07517420d45cd286bd96402ad901f4f5a48bb1012f43e1eeb94962440c3957915e01f6c5ef9e5b98b55faee7b7134a446924faf9b298bdf50f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD53857fb3d90fb6865ffa1b2870788c2f5
SHA1a93e3710bc42cf111d9e6e6710dfd6cba05266c7
SHA256ff5afad6b66b5bc23af6d53cb4e24f302f4dce343987b9b4abc7b5f11328319e
SHA5121348352691172e2ed1a6acbaeab573ba52d365a53232e5c8f78e248065c76cf0dd99d01dbda7e63647b870e760bbea1b2e2b8c03e196d50e612c540030c36035