Analysis
-
max time kernel
145s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
10/05/2024, 22:38
Static task
static1
Behavioral task
behavioral1
Sample
31635350b34a680cdff9f9b123627ffe_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
31635350b34a680cdff9f9b123627ffe_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
31635350b34a680cdff9f9b123627ffe_JaffaCakes118.html
-
Size
229KB
-
MD5
31635350b34a680cdff9f9b123627ffe
-
SHA1
936cef5138b9f05d55124f930610d8d7d4652fb4
-
SHA256
df510029f26f0cf20ca3a7f254f728fcd1e749b22abb48a60b3acfc775be62d9
-
SHA512
4eb6a4f1f699462bcda543e26b80453b3ac49c25231be5329ab9e00c59f441f3a772298239b0835b21079aa668d1730800d3763a281339558b04b4ed7ef6609a
-
SSDEEP
1536:dyuXqZk/suzGrZAoH8WpaVg56ZpvfNMTqZ8AdBkOrZrd2HMB6NTrJ3fC+vIZ:VV+SpyqhfB6NTrJ3fC+vE
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 364 msedge.exe 364 msedge.exe 2660 msedge.exe 2660 msedge.exe 2268 identity_helper.exe 2268 identity_helper.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe 452 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe 2660 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2660 wrote to memory of 4576 2660 msedge.exe 83 PID 2660 wrote to memory of 4576 2660 msedge.exe 83 PID 2660 wrote to memory of 3460 2660 msedge.exe 84 PID 2660 wrote to memory of 3460 2660 msedge.exe 84 PID 2660 wrote to memory of 3460 2660 msedge.exe 84 PID 2660 wrote to memory of 3460 2660 msedge.exe 84 PID 2660 wrote to memory of 3460 2660 msedge.exe 84 PID 2660 wrote to memory of 3460 2660 msedge.exe 84 PID 2660 wrote to memory of 3460 2660 msedge.exe 84 PID 2660 wrote to memory of 3460 2660 msedge.exe 84 PID 2660 wrote to memory of 3460 2660 msedge.exe 84 PID 2660 wrote to memory of 3460 2660 msedge.exe 84 PID 2660 wrote to memory of 3460 2660 msedge.exe 84 PID 2660 wrote to memory of 3460 2660 msedge.exe 84 PID 2660 wrote to memory of 3460 2660 msedge.exe 84 PID 2660 wrote to memory of 3460 2660 msedge.exe 84 PID 2660 wrote to memory of 3460 2660 msedge.exe 84 PID 2660 wrote to memory of 3460 2660 msedge.exe 84 PID 2660 wrote to memory of 3460 2660 msedge.exe 84 PID 2660 wrote to memory of 3460 2660 msedge.exe 84 PID 2660 wrote to memory of 3460 2660 msedge.exe 84 PID 2660 wrote to memory of 3460 2660 msedge.exe 84 PID 2660 wrote to memory of 3460 2660 msedge.exe 84 PID 2660 wrote to memory of 3460 2660 msedge.exe 84 PID 2660 wrote to memory of 3460 2660 msedge.exe 84 PID 2660 wrote to memory of 3460 2660 msedge.exe 84 PID 2660 wrote to memory of 3460 2660 msedge.exe 84 PID 2660 wrote to memory of 3460 2660 msedge.exe 84 PID 2660 wrote to memory of 3460 2660 msedge.exe 84 PID 2660 wrote to memory of 3460 2660 msedge.exe 84 PID 2660 wrote to memory of 3460 2660 msedge.exe 84 PID 2660 wrote to memory of 3460 2660 msedge.exe 84 PID 2660 wrote to memory of 3460 2660 msedge.exe 84 PID 2660 wrote to memory of 3460 2660 msedge.exe 84 PID 2660 wrote to memory of 3460 2660 msedge.exe 84 PID 2660 wrote to memory of 3460 2660 msedge.exe 84 PID 2660 wrote to memory of 3460 2660 msedge.exe 84 PID 2660 wrote to memory of 3460 2660 msedge.exe 84 PID 2660 wrote to memory of 3460 2660 msedge.exe 84 PID 2660 wrote to memory of 3460 2660 msedge.exe 84 PID 2660 wrote to memory of 3460 2660 msedge.exe 84 PID 2660 wrote to memory of 3460 2660 msedge.exe 84 PID 2660 wrote to memory of 364 2660 msedge.exe 85 PID 2660 wrote to memory of 364 2660 msedge.exe 85 PID 2660 wrote to memory of 2880 2660 msedge.exe 86 PID 2660 wrote to memory of 2880 2660 msedge.exe 86 PID 2660 wrote to memory of 2880 2660 msedge.exe 86 PID 2660 wrote to memory of 2880 2660 msedge.exe 86 PID 2660 wrote to memory of 2880 2660 msedge.exe 86 PID 2660 wrote to memory of 2880 2660 msedge.exe 86 PID 2660 wrote to memory of 2880 2660 msedge.exe 86 PID 2660 wrote to memory of 2880 2660 msedge.exe 86 PID 2660 wrote to memory of 2880 2660 msedge.exe 86 PID 2660 wrote to memory of 2880 2660 msedge.exe 86 PID 2660 wrote to memory of 2880 2660 msedge.exe 86 PID 2660 wrote to memory of 2880 2660 msedge.exe 86 PID 2660 wrote to memory of 2880 2660 msedge.exe 86 PID 2660 wrote to memory of 2880 2660 msedge.exe 86 PID 2660 wrote to memory of 2880 2660 msedge.exe 86 PID 2660 wrote to memory of 2880 2660 msedge.exe 86 PID 2660 wrote to memory of 2880 2660 msedge.exe 86 PID 2660 wrote to memory of 2880 2660 msedge.exe 86 PID 2660 wrote to memory of 2880 2660 msedge.exe 86 PID 2660 wrote to memory of 2880 2660 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\31635350b34a680cdff9f9b123627ffe_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb428446f8,0x7ffb42844708,0x7ffb428447182⤵PID:4576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,11628822674342637370,9062611081179115088,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2180 /prefetch:22⤵PID:3460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2164,11628822674342637370,9062611081179115088,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2268 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2164,11628822674342637370,9062611081179115088,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2812 /prefetch:82⤵PID:2880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,11628822674342637370,9062611081179115088,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,11628822674342637370,9062611081179115088,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:4348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2164,11628822674342637370,9062611081179115088,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4932 /prefetch:82⤵PID:3456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2164,11628822674342637370,9062611081179115088,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4932 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,11628822674342637370,9062611081179115088,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2004 /prefetch:12⤵PID:1992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,11628822674342637370,9062611081179115088,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5204 /prefetch:12⤵PID:1576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,11628822674342637370,9062611081179115088,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3468 /prefetch:12⤵PID:3456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,11628822674342637370,9062611081179115088,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3432 /prefetch:12⤵PID:4056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,11628822674342637370,9062611081179115088,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3032 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:452
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2072
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3904
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52daa93382bba07cbc40af372d30ec576
SHA1c5e709dc3e2e4df2ff841fbde3e30170e7428a94
SHA2561826d2a57b1938c148bf212a47d947ed1bfb26cfc55868931f843ee438117f30
SHA51265635cb59c81548a9ef8fdb0942331e7f3cd0c30ce1d4dba48aed72dbb27b06511a55d2aeaadfadbbb4b7cb4b2e2772bbabba9603b3f7d9c8b9e4a7fbf3d6b6b
-
Filesize
152B
MD5ecdc2754d7d2ae862272153aa9b9ca6e
SHA1c19bed1c6e1c998b9fa93298639ad7961339147d
SHA256a13d791473f836edcab0e93451ce7b7182efbbc54261b2b5644d319e047a00a7
SHA512cd4fb81317d540f8b15f1495a381bb6f0f129b8923a7c06e4b5cf777d2625c30304aee6cc68aa20479e08d84e5030b43fbe93e479602400334dfdd7297f702f2
-
Filesize
5KB
MD513f892d1048a96eaf77e01b9bd4d7045
SHA17bcd2caafa1b80d5f724c8a5f052da9f25c10ecc
SHA2562b4508bd58e9ee7b06918519afa6a8a39f6560518ad403e3a978fd3358d67cf8
SHA5124a248a225f5a8ae865c4215126fea361f00e649c98683c0e8359a4d04955e69c968d945d04ee5ca376d40f94a892654ade2a5359b009578d54daf4b15ecfe751
-
Filesize
6KB
MD5a44ebc36337af18ae4bae1ffdc4f8e14
SHA1b1f5e49c018892236dc6e7f01ad317b90525782f
SHA256e60b87e059bce38c9f6f33a259a2a3f082d6c25c6f2f6d856e762b52eab936ff
SHA51282597f598a0dcc6d883162bed5a29c3bb4148060ec5ae231c166f0874aa309bf62ab736844bca77ba1a526ef54d3c06acb1dcaa8295fa9d62fe0ebf7c65d6bca
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5f8ea100ce0af80150b1b23fabac5bfc6
SHA1cd2bccd61f2d6de1a5bdf294b75f67ecb6c4de40
SHA256b85272198e1a70dc854615f32e5b7ec59f69b75df031ba69103669c5becc732e
SHA5125fcb1b872a41f65c3fcec89843401e3f08bb678f108a3eecc065f1cb7cd75d18ad6e1139eb8faaa72f82b6043c8fc84b54bf40a1158a223e7b91ec219bb2c2e2