Analysis
-
max time kernel
145s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
10/05/2024, 01:44
Static task
static1
Behavioral task
behavioral1
Sample
2cbbd15d4b06bee6c039a2e5e7f6f778_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2cbbd15d4b06bee6c039a2e5e7f6f778_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
2cbbd15d4b06bee6c039a2e5e7f6f778_JaffaCakes118.html
-
Size
28KB
-
MD5
2cbbd15d4b06bee6c039a2e5e7f6f778
-
SHA1
7b4886384f6d79f82066b12e34bea1b97d27ca7a
-
SHA256
978cfc8c494b7a2f02bdeadb118c72c10ba87c5a68a4536b16364a1e8ea178a2
-
SHA512
0add085ac8f41b983c5c86f4a92171c67fae4c90ca78008fce90ae69ba4f135cd19de0c0db435d58e0f75dea59458b7102f6f62bbca43a1bb85e8cac920759c0
-
SSDEEP
768:eYILQvLknclDw5XFHxVprnS1TX/1JPpt9zDR1/t4mz8X:M8UcUtjmz8X
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 5020 msedge.exe 5020 msedge.exe 3956 msedge.exe 3956 msedge.exe 4556 identity_helper.exe 4556 identity_helper.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3956 wrote to memory of 3564 3956 msedge.exe 82 PID 3956 wrote to memory of 3564 3956 msedge.exe 82 PID 3956 wrote to memory of 4864 3956 msedge.exe 83 PID 3956 wrote to memory of 4864 3956 msedge.exe 83 PID 3956 wrote to memory of 4864 3956 msedge.exe 83 PID 3956 wrote to memory of 4864 3956 msedge.exe 83 PID 3956 wrote to memory of 4864 3956 msedge.exe 83 PID 3956 wrote to memory of 4864 3956 msedge.exe 83 PID 3956 wrote to memory of 4864 3956 msedge.exe 83 PID 3956 wrote to memory of 4864 3956 msedge.exe 83 PID 3956 wrote to memory of 4864 3956 msedge.exe 83 PID 3956 wrote to memory of 4864 3956 msedge.exe 83 PID 3956 wrote to memory of 4864 3956 msedge.exe 83 PID 3956 wrote to memory of 4864 3956 msedge.exe 83 PID 3956 wrote to memory of 4864 3956 msedge.exe 83 PID 3956 wrote to memory of 4864 3956 msedge.exe 83 PID 3956 wrote to memory of 4864 3956 msedge.exe 83 PID 3956 wrote to memory of 4864 3956 msedge.exe 83 PID 3956 wrote to memory of 4864 3956 msedge.exe 83 PID 3956 wrote to memory of 4864 3956 msedge.exe 83 PID 3956 wrote to memory of 4864 3956 msedge.exe 83 PID 3956 wrote to memory of 4864 3956 msedge.exe 83 PID 3956 wrote to memory of 4864 3956 msedge.exe 83 PID 3956 wrote to memory of 4864 3956 msedge.exe 83 PID 3956 wrote to memory of 4864 3956 msedge.exe 83 PID 3956 wrote to memory of 4864 3956 msedge.exe 83 PID 3956 wrote to memory of 4864 3956 msedge.exe 83 PID 3956 wrote to memory of 4864 3956 msedge.exe 83 PID 3956 wrote to memory of 4864 3956 msedge.exe 83 PID 3956 wrote to memory of 4864 3956 msedge.exe 83 PID 3956 wrote to memory of 4864 3956 msedge.exe 83 PID 3956 wrote to memory of 4864 3956 msedge.exe 83 PID 3956 wrote to memory of 4864 3956 msedge.exe 83 PID 3956 wrote to memory of 4864 3956 msedge.exe 83 PID 3956 wrote to memory of 4864 3956 msedge.exe 83 PID 3956 wrote to memory of 4864 3956 msedge.exe 83 PID 3956 wrote to memory of 4864 3956 msedge.exe 83 PID 3956 wrote to memory of 4864 3956 msedge.exe 83 PID 3956 wrote to memory of 4864 3956 msedge.exe 83 PID 3956 wrote to memory of 4864 3956 msedge.exe 83 PID 3956 wrote to memory of 4864 3956 msedge.exe 83 PID 3956 wrote to memory of 4864 3956 msedge.exe 83 PID 3956 wrote to memory of 5020 3956 msedge.exe 84 PID 3956 wrote to memory of 5020 3956 msedge.exe 84 PID 3956 wrote to memory of 3104 3956 msedge.exe 85 PID 3956 wrote to memory of 3104 3956 msedge.exe 85 PID 3956 wrote to memory of 3104 3956 msedge.exe 85 PID 3956 wrote to memory of 3104 3956 msedge.exe 85 PID 3956 wrote to memory of 3104 3956 msedge.exe 85 PID 3956 wrote to memory of 3104 3956 msedge.exe 85 PID 3956 wrote to memory of 3104 3956 msedge.exe 85 PID 3956 wrote to memory of 3104 3956 msedge.exe 85 PID 3956 wrote to memory of 3104 3956 msedge.exe 85 PID 3956 wrote to memory of 3104 3956 msedge.exe 85 PID 3956 wrote to memory of 3104 3956 msedge.exe 85 PID 3956 wrote to memory of 3104 3956 msedge.exe 85 PID 3956 wrote to memory of 3104 3956 msedge.exe 85 PID 3956 wrote to memory of 3104 3956 msedge.exe 85 PID 3956 wrote to memory of 3104 3956 msedge.exe 85 PID 3956 wrote to memory of 3104 3956 msedge.exe 85 PID 3956 wrote to memory of 3104 3956 msedge.exe 85 PID 3956 wrote to memory of 3104 3956 msedge.exe 85 PID 3956 wrote to memory of 3104 3956 msedge.exe 85 PID 3956 wrote to memory of 3104 3956 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2cbbd15d4b06bee6c039a2e5e7f6f778_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3956 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb576846f8,0x7ffb57684708,0x7ffb576847182⤵PID:3564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,16586404366163375933,17642737655451800312,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 /prefetch:22⤵PID:4864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2148,16586404366163375933,17642737655451800312,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2192 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2148,16586404366163375933,17642737655451800312,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2740 /prefetch:82⤵PID:3104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,16586404366163375933,17642737655451800312,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3200 /prefetch:12⤵PID:2104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,16586404366163375933,17642737655451800312,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:1724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,16586404366163375933,17642737655451800312,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4632 /prefetch:12⤵PID:1360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,16586404366163375933,17642737655451800312,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5844 /prefetch:82⤵PID:1328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,16586404366163375933,17642737655451800312,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5844 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,16586404366163375933,17642737655451800312,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5348 /prefetch:12⤵PID:4372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,16586404366163375933,17642737655451800312,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5308 /prefetch:12⤵PID:3516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,16586404366163375933,17642737655451800312,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4884 /prefetch:12⤵PID:60
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,16586404366163375933,17642737655451800312,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4536 /prefetch:12⤵PID:2596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,16586404366163375933,17642737655451800312,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5600 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3932
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2752
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4228
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54f7152bc5a1a715ef481e37d1c791959
SHA1c8a1ed674c62ae4f45519f90a8cc5a81eff3a6d7
SHA256704dd4f98d8ca34ec421f23ba1891b178c23c14b3301e4655efc5c02d356c2bc
SHA5122e6b02ca35d76a655a17a5f3e9dbd8d7517c7dae24f0095c7350eb9e7bdf9e1256a7009aa8878f96c89d1ea4fe5323a41f72b8c551806dda62880d7ff231ff5c
-
Filesize
152B
MD5ea98e583ad99df195d29aa066204ab56
SHA1f89398664af0179641aa0138b337097b617cb2db
SHA256a7abb51435909fa2d75c6f2ff5c69a93d4a0ab276ed579e7d8733b2a63ffbee6
SHA512e109be3466e653e5d310b3e402e1626298b09205d223722a82344dd78504f3c33e1e24e8402a02f38cd2c9c50d96a303ce4846bea5a583423937ab018cd5782f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD548f1ee3f9502532ec6a7db253ced6240
SHA162f31a346634e4fc8bc312d5d779e7ba42b9c6d9
SHA2561a8474e52ff8802ee8f8871902b0b199a9b282c77750850121db19f8a47e29dc
SHA512451c747b725a8cf476f1ae505b98c1c695da34193dc2b7e632980e96da96ac4f25d86b05dbed1c534a02148fc8db38f6ee889a8125d0dddb89600858a4130460
-
Filesize
495B
MD539847d058db7a6049b07b4919c5dbd0c
SHA140d84a8f64b7254442047bcbb1b7226142d3cb64
SHA25694d00b47bc9c15211305b6deded20de35cd4536d5dd2ac59fbc1dff280ce2931
SHA512ac483aef07af1777a0e1f500e51c2897f7d816e1cd869f5ab9ba959126970224edbffba0bdc5bad8b99d39dc0601a1f4e9051c920962634f58134005d73f8314
-
Filesize
5KB
MD5d2df4709a5c9bcaf5c6c3fdf97802009
SHA15f9bc13ccb61e0d27a2648d9e6d24607cd039e14
SHA256e8c4ff9e3ad63eddde86732adbac04db830143049d253fb079f0cdc5267aec1f
SHA51285a2b316f29f168d2f1789de6fc649d5da73d70a610321dc50136906ec5f2186afd08567789d213912cbc529ae2acb9543e0755958bfbe39f1dfe08fd8305b78
-
Filesize
6KB
MD5110d3d5afc1655208fa00a2b3910a363
SHA174bab8405ee6cc169d01c0c829454720bd55aefb
SHA2569c3ee0c0ec51eff6b78f16d8bbfb7b4ccb3f01f2c85bcada135c98b0c5407262
SHA51277eed0fe54a1705805b8a4d00f9a8586418e0fd4d8b86e90287e16a8d11e333a7c6611ee235a7ea22a4337da4ecfbcfdca70b17082c7dca89760f0d124793e2e
-
Filesize
6KB
MD5bede285e0e09409ae470adfa75226a0d
SHA1efd2cadaabeb82da817464de76a038c1a06531a4
SHA256893628c5ac79eeb2edada467a3ff58ff663e7fb4581c4a14b9fffdf3693549dc
SHA512e30a25c1ddc84a8e1e9225276dd3f1c29c5529f30b6ec512542e6c03c088c1d27e7a5f377cdf668699ac54831c2b6c73ee4a53132fd2f9d769b2a6fa26e8d1b7
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5e5b550c4abf0f04976b3cccbf415ae75
SHA1ac314b2f460f85010d17ad3d2199e3d9d36e1fc3
SHA256f022c570e8f70ad93bed9361eef0aebdf0b1692944a9c65b0978df16f447f0ef
SHA51251ad42f69655d610bae2eebe321e784008657d0703c6bf7baa7ce523713504ce161502b4117a4490d5c917560234166baed836d07163c341fc55b005eecb0549