Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
09/05/2024, 20:41
Static task
static1
Behavioral task
behavioral1
Sample
2b9cdd658b7dbcfcc94160df2424a58b_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2b9cdd658b7dbcfcc94160df2424a58b_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
2b9cdd658b7dbcfcc94160df2424a58b_JaffaCakes118.html
-
Size
70KB
-
MD5
2b9cdd658b7dbcfcc94160df2424a58b
-
SHA1
028c0b8e474da3483ccbcf3f0eaf89ee88df277d
-
SHA256
fb1102cc3ec839df7dd40d7562244b9f40a2e67d2faad45ce52924e7377ba1b4
-
SHA512
3341aaec7a4f9adf24ed30ceef2869a608c925daaeda3c7276e15ad3eb4b6f780c21f77794680e06b698cb0212e84f78ca0e891e9876fc2f746d7e3e17fcf21a
-
SSDEEP
1536:mrYkclBo7mo8uqdVbXyQsRcPyQ1nkzZK2A9tqUxmUqNbrZSbx:mEkclW7Yuq/XyQsRcCK9tRxmUqNbrZSd
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4472 msedge.exe 4472 msedge.exe 2184 msedge.exe 2184 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2184 wrote to memory of 1724 2184 msedge.exe 81 PID 2184 wrote to memory of 1724 2184 msedge.exe 81 PID 2184 wrote to memory of 4988 2184 msedge.exe 84 PID 2184 wrote to memory of 4988 2184 msedge.exe 84 PID 2184 wrote to memory of 4988 2184 msedge.exe 84 PID 2184 wrote to memory of 4988 2184 msedge.exe 84 PID 2184 wrote to memory of 4988 2184 msedge.exe 84 PID 2184 wrote to memory of 4988 2184 msedge.exe 84 PID 2184 wrote to memory of 4988 2184 msedge.exe 84 PID 2184 wrote to memory of 4988 2184 msedge.exe 84 PID 2184 wrote to memory of 4988 2184 msedge.exe 84 PID 2184 wrote to memory of 4988 2184 msedge.exe 84 PID 2184 wrote to memory of 4988 2184 msedge.exe 84 PID 2184 wrote to memory of 4988 2184 msedge.exe 84 PID 2184 wrote to memory of 4988 2184 msedge.exe 84 PID 2184 wrote to memory of 4988 2184 msedge.exe 84 PID 2184 wrote to memory of 4988 2184 msedge.exe 84 PID 2184 wrote to memory of 4988 2184 msedge.exe 84 PID 2184 wrote to memory of 4988 2184 msedge.exe 84 PID 2184 wrote to memory of 4988 2184 msedge.exe 84 PID 2184 wrote to memory of 4988 2184 msedge.exe 84 PID 2184 wrote to memory of 4988 2184 msedge.exe 84 PID 2184 wrote to memory of 4988 2184 msedge.exe 84 PID 2184 wrote to memory of 4988 2184 msedge.exe 84 PID 2184 wrote to memory of 4988 2184 msedge.exe 84 PID 2184 wrote to memory of 4988 2184 msedge.exe 84 PID 2184 wrote to memory of 4988 2184 msedge.exe 84 PID 2184 wrote to memory of 4988 2184 msedge.exe 84 PID 2184 wrote to memory of 4988 2184 msedge.exe 84 PID 2184 wrote to memory of 4988 2184 msedge.exe 84 PID 2184 wrote to memory of 4988 2184 msedge.exe 84 PID 2184 wrote to memory of 4988 2184 msedge.exe 84 PID 2184 wrote to memory of 4988 2184 msedge.exe 84 PID 2184 wrote to memory of 4988 2184 msedge.exe 84 PID 2184 wrote to memory of 4988 2184 msedge.exe 84 PID 2184 wrote to memory of 4988 2184 msedge.exe 84 PID 2184 wrote to memory of 4988 2184 msedge.exe 84 PID 2184 wrote to memory of 4988 2184 msedge.exe 84 PID 2184 wrote to memory of 4988 2184 msedge.exe 84 PID 2184 wrote to memory of 4988 2184 msedge.exe 84 PID 2184 wrote to memory of 4988 2184 msedge.exe 84 PID 2184 wrote to memory of 4988 2184 msedge.exe 84 PID 2184 wrote to memory of 4472 2184 msedge.exe 85 PID 2184 wrote to memory of 4472 2184 msedge.exe 85 PID 2184 wrote to memory of 3952 2184 msedge.exe 86 PID 2184 wrote to memory of 3952 2184 msedge.exe 86 PID 2184 wrote to memory of 3952 2184 msedge.exe 86 PID 2184 wrote to memory of 3952 2184 msedge.exe 86 PID 2184 wrote to memory of 3952 2184 msedge.exe 86 PID 2184 wrote to memory of 3952 2184 msedge.exe 86 PID 2184 wrote to memory of 3952 2184 msedge.exe 86 PID 2184 wrote to memory of 3952 2184 msedge.exe 86 PID 2184 wrote to memory of 3952 2184 msedge.exe 86 PID 2184 wrote to memory of 3952 2184 msedge.exe 86 PID 2184 wrote to memory of 3952 2184 msedge.exe 86 PID 2184 wrote to memory of 3952 2184 msedge.exe 86 PID 2184 wrote to memory of 3952 2184 msedge.exe 86 PID 2184 wrote to memory of 3952 2184 msedge.exe 86 PID 2184 wrote to memory of 3952 2184 msedge.exe 86 PID 2184 wrote to memory of 3952 2184 msedge.exe 86 PID 2184 wrote to memory of 3952 2184 msedge.exe 86 PID 2184 wrote to memory of 3952 2184 msedge.exe 86 PID 2184 wrote to memory of 3952 2184 msedge.exe 86 PID 2184 wrote to memory of 3952 2184 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2b9cdd658b7dbcfcc94160df2424a58b_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe410b46f8,0x7ffe410b4708,0x7ffe410b47182⤵PID:1724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,13378776806082131225,17592967750264617738,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:22⤵PID:4988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,13378776806082131225,17592967750264617738,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2192 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,13378776806082131225,17592967750264617738,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2888 /prefetch:82⤵PID:3952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,13378776806082131225,17592967750264617738,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:3728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,13378776806082131225,17592967750264617738,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:1932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,13378776806082131225,17592967750264617738,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4764 /prefetch:12⤵PID:4932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,13378776806082131225,17592967750264617738,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2300 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4276
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:452
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1836
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD57252ef0dc21e84082f96fd385c21158b
SHA1caba7b9d443d145a703993eabdfbd2a9cf53e956
SHA25687d965f5219168c5cfb5fe43186a1d5398c92963f6ccf2e919051d209520c8ea
SHA5121b568cceef7af1414a75cfaddccae2f0e6bda91ca3fe47ba141c4d87db7da6ccfa5a5056e0b79c5601363581edc2f3809791502d72775f482ac5d5eeabe3d0c9
-
Filesize
1KB
MD5c6761ff68721a58449632166e2240981
SHA1c5c506607aafb0ed84e144abe4648e15b8629a92
SHA256a2b402d72da85a2ed0a7233c520b60d3884b836e07fb5020bc9be38dc6a8d093
SHA512da6cf7366d776c8e3514ae50c6fc0f821345ee932a4b6675c91aa9e49fa333586d1418fc20bdba2c12af8d8e226184ab5298852b18e51c0ac539780368d0f652
-
Filesize
6KB
MD550cd63e092ddcafa998df26306d38a65
SHA1ea7ad142a089b2c700ccd5713b2696ff0220da4e
SHA2563bcb292d50c5ba9ea86adf94d658b4f5585e4ae2acf8ca9f08abba99537d79ef
SHA512a0e57dfa404124ac9f31fb5f23ad7b537ec74b8bb2244213b052e0721d119311c607333023720067725aa511fed0e66644046e26dbb14cb26d7530199719fb88
-
Filesize
6KB
MD5cfc6d7d2a5c72a14b6bbb7ad421c033f
SHA150a68c6a75f2dd3207d94fa50a6fc389b84066ad
SHA256735c2a5bac13f2125471384d503c034e38d3417addee5f0fcadc8513e958b421
SHA51238d1f74e243edcbfbcf45524bb95943400bdfcc884079422dcc47934a82107a3831de3cdd6601387ed1edec56fa572056a9c256317267f9deecf85aa8c805e7a
-
Filesize
11KB
MD5b26e3396d3e9cb178e6dcfaea7451ef2
SHA153757c79583df596fa4266e3b06581b2cfc6079e
SHA25692e6c0345acfdbccedc6d6503e9efe4a30c1196d5c3aad25abe5c5196ec211c9
SHA51227da615a35c0e39f1f46c52ce5184429ad3b3da1ed3b9fde8025897ccafa64f9955fab9f485186e093bb9dd9108a50e16641d439ac85b2a3bd1388fd467192ae