Analysis
-
max time kernel
145s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
09-05-2024 19:02
Static task
static1
Behavioral task
behavioral1
Sample
2b6f507bca8f196faa5ddbdb7eae18d9_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2b6f507bca8f196faa5ddbdb7eae18d9_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
2b6f507bca8f196faa5ddbdb7eae18d9_JaffaCakes118.html
-
Size
35KB
-
MD5
2b6f507bca8f196faa5ddbdb7eae18d9
-
SHA1
9e2fb4d19c43b149e876fbe214a02d69603f032a
-
SHA256
1e310f5006412189d8714495b64cc24ff8eefd4280da58f414101ed8056c4766
-
SHA512
77e0423e6cfe8bbe585695f5c08969ba1a7b7e3c807fbae5b2f61943fa79b8b8d4dfb338cc585b4d8854ebe140b146c933dfe78fc117247b382f001cf913374b
-
SSDEEP
768:zwx/MDTHk+88hAREZPXvE1XnXrFLxNLlDNoPqkPTHlnkM3Gr6T5Sd6zBy6OxJy6H:Q/HbJxNVOu6St/+8cK
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4076 msedge.exe 4076 msedge.exe 1240 msedge.exe 1240 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1240 wrote to memory of 2156 1240 msedge.exe 82 PID 1240 wrote to memory of 2156 1240 msedge.exe 82 PID 1240 wrote to memory of 920 1240 msedge.exe 83 PID 1240 wrote to memory of 920 1240 msedge.exe 83 PID 1240 wrote to memory of 920 1240 msedge.exe 83 PID 1240 wrote to memory of 920 1240 msedge.exe 83 PID 1240 wrote to memory of 920 1240 msedge.exe 83 PID 1240 wrote to memory of 920 1240 msedge.exe 83 PID 1240 wrote to memory of 920 1240 msedge.exe 83 PID 1240 wrote to memory of 920 1240 msedge.exe 83 PID 1240 wrote to memory of 920 1240 msedge.exe 83 PID 1240 wrote to memory of 920 1240 msedge.exe 83 PID 1240 wrote to memory of 920 1240 msedge.exe 83 PID 1240 wrote to memory of 920 1240 msedge.exe 83 PID 1240 wrote to memory of 920 1240 msedge.exe 83 PID 1240 wrote to memory of 920 1240 msedge.exe 83 PID 1240 wrote to memory of 920 1240 msedge.exe 83 PID 1240 wrote to memory of 920 1240 msedge.exe 83 PID 1240 wrote to memory of 920 1240 msedge.exe 83 PID 1240 wrote to memory of 920 1240 msedge.exe 83 PID 1240 wrote to memory of 920 1240 msedge.exe 83 PID 1240 wrote to memory of 920 1240 msedge.exe 83 PID 1240 wrote to memory of 920 1240 msedge.exe 83 PID 1240 wrote to memory of 920 1240 msedge.exe 83 PID 1240 wrote to memory of 920 1240 msedge.exe 83 PID 1240 wrote to memory of 920 1240 msedge.exe 83 PID 1240 wrote to memory of 920 1240 msedge.exe 83 PID 1240 wrote to memory of 920 1240 msedge.exe 83 PID 1240 wrote to memory of 920 1240 msedge.exe 83 PID 1240 wrote to memory of 920 1240 msedge.exe 83 PID 1240 wrote to memory of 920 1240 msedge.exe 83 PID 1240 wrote to memory of 920 1240 msedge.exe 83 PID 1240 wrote to memory of 920 1240 msedge.exe 83 PID 1240 wrote to memory of 920 1240 msedge.exe 83 PID 1240 wrote to memory of 920 1240 msedge.exe 83 PID 1240 wrote to memory of 920 1240 msedge.exe 83 PID 1240 wrote to memory of 920 1240 msedge.exe 83 PID 1240 wrote to memory of 920 1240 msedge.exe 83 PID 1240 wrote to memory of 920 1240 msedge.exe 83 PID 1240 wrote to memory of 920 1240 msedge.exe 83 PID 1240 wrote to memory of 920 1240 msedge.exe 83 PID 1240 wrote to memory of 920 1240 msedge.exe 83 PID 1240 wrote to memory of 4076 1240 msedge.exe 84 PID 1240 wrote to memory of 4076 1240 msedge.exe 84 PID 1240 wrote to memory of 3904 1240 msedge.exe 85 PID 1240 wrote to memory of 3904 1240 msedge.exe 85 PID 1240 wrote to memory of 3904 1240 msedge.exe 85 PID 1240 wrote to memory of 3904 1240 msedge.exe 85 PID 1240 wrote to memory of 3904 1240 msedge.exe 85 PID 1240 wrote to memory of 3904 1240 msedge.exe 85 PID 1240 wrote to memory of 3904 1240 msedge.exe 85 PID 1240 wrote to memory of 3904 1240 msedge.exe 85 PID 1240 wrote to memory of 3904 1240 msedge.exe 85 PID 1240 wrote to memory of 3904 1240 msedge.exe 85 PID 1240 wrote to memory of 3904 1240 msedge.exe 85 PID 1240 wrote to memory of 3904 1240 msedge.exe 85 PID 1240 wrote to memory of 3904 1240 msedge.exe 85 PID 1240 wrote to memory of 3904 1240 msedge.exe 85 PID 1240 wrote to memory of 3904 1240 msedge.exe 85 PID 1240 wrote to memory of 3904 1240 msedge.exe 85 PID 1240 wrote to memory of 3904 1240 msedge.exe 85 PID 1240 wrote to memory of 3904 1240 msedge.exe 85 PID 1240 wrote to memory of 3904 1240 msedge.exe 85 PID 1240 wrote to memory of 3904 1240 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2b6f507bca8f196faa5ddbdb7eae18d9_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1240 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8daf946f8,0x7ff8daf94708,0x7ff8daf947182⤵PID:2156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,1725863951335343236,7756350831780697410,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:22⤵PID:920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,1725863951335343236,7756350831780697410,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2176 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,1725863951335343236,7756350831780697410,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2676 /prefetch:82⤵PID:3904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,1725863951335343236,7756350831780697410,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3172 /prefetch:12⤵PID:1420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,1725863951335343236,7756350831780697410,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3184 /prefetch:12⤵PID:3540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,1725863951335343236,7756350831780697410,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5168 /prefetch:82⤵PID:3696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,1725863951335343236,7756350831780697410,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5168 /prefetch:82⤵PID:512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,1725863951335343236,7756350831780697410,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5164 /prefetch:12⤵PID:3688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,1725863951335343236,7756350831780697410,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5232 /prefetch:12⤵PID:3616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,1725863951335343236,7756350831780697410,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3504 /prefetch:12⤵PID:368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,1725863951335343236,7756350831780697410,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5172 /prefetch:12⤵PID:1360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,1725863951335343236,7756350831780697410,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2184 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2324
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2872
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3328
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ae54e9db2e89f2c54da8cc0bfcbd26bd
SHA1a88af6c673609ecbc51a1a60dfbc8577830d2b5d
SHA2565009d3c953de63cfd14a7d911156c514e179ff07d2b94382d9caac6040cb72af
SHA512e3b70e5eb7321b9deca6f6a17424a15b9fd5c4008bd3789bd01099fd13cb2f4a2f37fe4b920fb51c50517745b576c1f94df83efd1a7e75949551163985599998
-
Filesize
152B
MD5f53207a5ca2ef5c7e976cbb3cb26d870
SHA149a8cc44f53da77bb3dfb36fc7676ed54675db43
SHA25619ab4e3c9da6d9cedda7461efdba9a2085e743513ab89f1dd0fd5a8f9486ad23
SHA512be734c7e8afda19f445912aef0d78f9941add29baebd4a812bff27f10a1d78b52aeb11c551468c8644443c86e1a2a6b2e4aead3d7f81d39925e3c20406ac1499
-
Filesize
612B
MD5ef20f6483ed5237229dbbbd189368ecf
SHA1d676b1c3b37225b84d06e6255d253b8542145823
SHA25663002b4deff9b34a86e12b0cf28b43860cdaa2eb97bf4770de01b30b831256c2
SHA51224815a8d9d6e0a6d1373a3d141914a85d03ff95483f0d89a63095ae7a7058340650a85703305be6ddf74ff3835e09e2014b4e9040c978e78181d09b3e544dd67
-
Filesize
5KB
MD5d547d66091b8c8ab78240ac5825fb3d2
SHA1599f9a36c07815ecc518df2a3baeb8871104cab4
SHA256021b27b00c682c650da0d14372ac2d764cbd2dbad0b447687e3ba7fc4fd1b073
SHA5129cb9386bf8ba86a93c7531365d8e9d81e191b3668eb10d915625eaa841c07565146b681119b0f5ca6c1a1482dce86cca328e826fdb6313de5785adfc41135e3b
-
Filesize
6KB
MD5f45ed1f603bdb35eed5ae82f3d3276bc
SHA191b8e565be8f78f09dc02be5e5904d2758b3a500
SHA2567e9a6b19f32799da3e885ee778cb76135fd975542dd5d230bea7a785d661d720
SHA51263d541e1efe48045222a04e5f561543d615edc043e02bceb6c5aa9e463ebcbf4ff2aeac211b9806dae111b4a578e729c57411632c756dab0b5b55f94f6347fc1
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD52bd6917751138432d4be54bb1e9e0ec5
SHA10cefc960fa673e04597651535f8598926ef438a2
SHA256e3c8c989c26b11c2fa10ec4f3a523ac0ba7b9e46fe8913caa399c254c441414e
SHA512c5c2461458d0c51d53aaf3380bf6e5cf7f198770e53f0721a781b66b7c0381fc1bdd5683339e8fd588757bb5c5a915f6a846e868d10defdea4600db162670afc