Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
09/05/2024, 20:38
Static task
static1
Behavioral task
behavioral1
Sample
2b9a22aa4675420b23973389d03e151a_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2b9a22aa4675420b23973389d03e151a_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
2b9a22aa4675420b23973389d03e151a_JaffaCakes118.html
-
Size
112KB
-
MD5
2b9a22aa4675420b23973389d03e151a
-
SHA1
c83007bb52c4fdac307cfee97627b729db2cec75
-
SHA256
294e2eead660bd1559c5ad73ff7dc22b325ef9374cb2b4d749dd013e5c95cc4a
-
SHA512
5c4c2a7ca773e1703e425690c59acb3b926d76cbf97f8582185ca4409e8a2dbad4f30fddae3138d93138eb8392122ae0b016ee06dbdbde82293593bb424afb0d
-
SSDEEP
3072:yDz4VqvWxkollEbp8d9T9iS17HkSfv/IQtiODIyu1CZuySOvdjtIbmepCrIRVrTe:y4VqvWxkol2bp8d9T9iS17HkSfv/7
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1664 msedge.exe 1664 msedge.exe 1908 msedge.exe 1908 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1908 msedge.exe 1908 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1908 msedge.exe 1908 msedge.exe 1908 msedge.exe 1908 msedge.exe 1908 msedge.exe 1908 msedge.exe 1908 msedge.exe 1908 msedge.exe 1908 msedge.exe 1908 msedge.exe 1908 msedge.exe 1908 msedge.exe 1908 msedge.exe 1908 msedge.exe 1908 msedge.exe 1908 msedge.exe 1908 msedge.exe 1908 msedge.exe 1908 msedge.exe 1908 msedge.exe 1908 msedge.exe 1908 msedge.exe 1908 msedge.exe 1908 msedge.exe 1908 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1908 msedge.exe 1908 msedge.exe 1908 msedge.exe 1908 msedge.exe 1908 msedge.exe 1908 msedge.exe 1908 msedge.exe 1908 msedge.exe 1908 msedge.exe 1908 msedge.exe 1908 msedge.exe 1908 msedge.exe 1908 msedge.exe 1908 msedge.exe 1908 msedge.exe 1908 msedge.exe 1908 msedge.exe 1908 msedge.exe 1908 msedge.exe 1908 msedge.exe 1908 msedge.exe 1908 msedge.exe 1908 msedge.exe 1908 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1908 wrote to memory of 1580 1908 msedge.exe 82 PID 1908 wrote to memory of 1580 1908 msedge.exe 82 PID 1908 wrote to memory of 3492 1908 msedge.exe 83 PID 1908 wrote to memory of 3492 1908 msedge.exe 83 PID 1908 wrote to memory of 3492 1908 msedge.exe 83 PID 1908 wrote to memory of 3492 1908 msedge.exe 83 PID 1908 wrote to memory of 3492 1908 msedge.exe 83 PID 1908 wrote to memory of 3492 1908 msedge.exe 83 PID 1908 wrote to memory of 3492 1908 msedge.exe 83 PID 1908 wrote to memory of 3492 1908 msedge.exe 83 PID 1908 wrote to memory of 3492 1908 msedge.exe 83 PID 1908 wrote to memory of 3492 1908 msedge.exe 83 PID 1908 wrote to memory of 3492 1908 msedge.exe 83 PID 1908 wrote to memory of 3492 1908 msedge.exe 83 PID 1908 wrote to memory of 3492 1908 msedge.exe 83 PID 1908 wrote to memory of 3492 1908 msedge.exe 83 PID 1908 wrote to memory of 3492 1908 msedge.exe 83 PID 1908 wrote to memory of 3492 1908 msedge.exe 83 PID 1908 wrote to memory of 3492 1908 msedge.exe 83 PID 1908 wrote to memory of 3492 1908 msedge.exe 83 PID 1908 wrote to memory of 3492 1908 msedge.exe 83 PID 1908 wrote to memory of 3492 1908 msedge.exe 83 PID 1908 wrote to memory of 3492 1908 msedge.exe 83 PID 1908 wrote to memory of 3492 1908 msedge.exe 83 PID 1908 wrote to memory of 3492 1908 msedge.exe 83 PID 1908 wrote to memory of 3492 1908 msedge.exe 83 PID 1908 wrote to memory of 3492 1908 msedge.exe 83 PID 1908 wrote to memory of 3492 1908 msedge.exe 83 PID 1908 wrote to memory of 3492 1908 msedge.exe 83 PID 1908 wrote to memory of 3492 1908 msedge.exe 83 PID 1908 wrote to memory of 3492 1908 msedge.exe 83 PID 1908 wrote to memory of 3492 1908 msedge.exe 83 PID 1908 wrote to memory of 3492 1908 msedge.exe 83 PID 1908 wrote to memory of 3492 1908 msedge.exe 83 PID 1908 wrote to memory of 3492 1908 msedge.exe 83 PID 1908 wrote to memory of 3492 1908 msedge.exe 83 PID 1908 wrote to memory of 3492 1908 msedge.exe 83 PID 1908 wrote to memory of 3492 1908 msedge.exe 83 PID 1908 wrote to memory of 3492 1908 msedge.exe 83 PID 1908 wrote to memory of 3492 1908 msedge.exe 83 PID 1908 wrote to memory of 3492 1908 msedge.exe 83 PID 1908 wrote to memory of 3492 1908 msedge.exe 83 PID 1908 wrote to memory of 1664 1908 msedge.exe 84 PID 1908 wrote to memory of 1664 1908 msedge.exe 84 PID 1908 wrote to memory of 3560 1908 msedge.exe 85 PID 1908 wrote to memory of 3560 1908 msedge.exe 85 PID 1908 wrote to memory of 3560 1908 msedge.exe 85 PID 1908 wrote to memory of 3560 1908 msedge.exe 85 PID 1908 wrote to memory of 3560 1908 msedge.exe 85 PID 1908 wrote to memory of 3560 1908 msedge.exe 85 PID 1908 wrote to memory of 3560 1908 msedge.exe 85 PID 1908 wrote to memory of 3560 1908 msedge.exe 85 PID 1908 wrote to memory of 3560 1908 msedge.exe 85 PID 1908 wrote to memory of 3560 1908 msedge.exe 85 PID 1908 wrote to memory of 3560 1908 msedge.exe 85 PID 1908 wrote to memory of 3560 1908 msedge.exe 85 PID 1908 wrote to memory of 3560 1908 msedge.exe 85 PID 1908 wrote to memory of 3560 1908 msedge.exe 85 PID 1908 wrote to memory of 3560 1908 msedge.exe 85 PID 1908 wrote to memory of 3560 1908 msedge.exe 85 PID 1908 wrote to memory of 3560 1908 msedge.exe 85 PID 1908 wrote to memory of 3560 1908 msedge.exe 85 PID 1908 wrote to memory of 3560 1908 msedge.exe 85 PID 1908 wrote to memory of 3560 1908 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2b9a22aa4675420b23973389d03e151a_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcca3d46f8,0x7ffcca3d4708,0x7ffcca3d47182⤵PID:1580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,5932989288821868272,1638186525803863337,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 /prefetch:22⤵PID:3492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2164,5932989288821868272,1638186525803863337,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2212 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2164,5932989288821868272,1638186525803863337,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2808 /prefetch:82⤵PID:3560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,5932989288821868272,1638186525803863337,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:64
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,5932989288821868272,1638186525803863337,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:5084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,5932989288821868272,1638186525803863337,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1412 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2352
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1516
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4436
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54b4f91fa1b362ba5341ecb2836438dea
SHA19561f5aabed742404d455da735259a2c6781fa07
SHA256d824b742eace197ddc8b6ed5d918f390fde4b0fbf0e371b8e1f2ed40a3b6455c
SHA512fef22217dcdd8000bc193e25129699d4b8f7a103ca4fe1613baf73ccf67090d9fbae27eb93e4bb8747455853a0a4326f2d0c38df41c8d42351cdcd4132418dac
-
Filesize
152B
MD5eaa3db555ab5bc0cb364826204aad3f0
SHA1a4cdfaac8de49e6e6e88b335cfeaa7c9e3c563ca
SHA256ef7baeb1b2ab05ff3c5fbb76c2759db49294654548706c7c8e87f0cde855b86b
SHA512e13981da51b52c15261ecabb98af32f9b920651b46b10ce0cc823c5878b22eb1420258c80deef204070d1e0bdd3a64d875ac2522e3713a3cf11657aa55aeccd4
-
Filesize
522B
MD5fc1128fdcfed474e46c9943dc36da475
SHA1cf3e936990e60e9ea77a16360351c4ecdce08ba4
SHA25675919ab882fb985e1d98b222b7508c1c0193f5a647843c39ec149b0e13d0e1bc
SHA5121c180143d0f88806c3b489cc8ca18c74440f25d7a75ccd5c6e2f7af7500c9e5dec19dd4c09ec6ed078c281b195816acc3ddb78293bd8f1a045a2314fcef9d595
-
Filesize
6KB
MD513ffe9efadef8885de079e721ab0617b
SHA1b7e254ccb0ee88da15fc73fd1fb71034d41ed5d8
SHA2565e27f16bb2cf319d9088d33601187b9b69df69b63815eeea9fe3525413b0e721
SHA512d67ed6ad00bf8009d0936d5542957e01280f01cbad0db7fc13fd44b6c9a660e7273dd092f7c83ac5a5393e3206adaedb3e11d99d037ea9087fb7238ee0264e54
-
Filesize
6KB
MD52feefc0655c264e6e71e82a67c4d605f
SHA1afb279786499cd84f6f1b1ae16710ca7b967eaf8
SHA25606366d8852bc8a8f2b9c10e28849237ca8a96abab3b4082004d6cf271f08a7ba
SHA512211ed6129424531944a12702758d1db43f15f6654d88aa9fbe1e9fc8a519866a0c26735b98247f509d54a3f718a9b77597b4ae141b47ea796920ec2e7c0e661a
-
Filesize
11KB
MD5a232cac4a16240ad928a1a7a85202d2c
SHA1044295ee4bb2eb065cfe6fad1f4919ed428d3e81
SHA256ba090d71822c4bf57221ac621de947e5678acef3bef670671f7d35783be8b639
SHA5122cffe81289348d89cc9cf37a6169107cc3fc43dd3d568f65b770d77b6cbe8d8fcbc2a312e3034bad827aab74b12aa64d2f353edc6e19d522588059ba670dbb24