Analysis
-
max time kernel
149s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
10/05/2024, 01:15
Static task
static1
Behavioral task
behavioral1
Sample
2ca02180f345e38d3d12dd75ce1e9214_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2ca02180f345e38d3d12dd75ce1e9214_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
2ca02180f345e38d3d12dd75ce1e9214_JaffaCakes118.html
-
Size
70KB
-
MD5
2ca02180f345e38d3d12dd75ce1e9214
-
SHA1
a4b26fb2e769f92398f6a6fa4b96b658c4e116fd
-
SHA256
e604a8df7cc47fc7de0b709541c5fd31c62bfc3b1ef8761ac05073c230b15fa7
-
SHA512
ed3918ecd0de6afdaa5c28599150b9e167cedafdea2f5b1f204f8be8e7c5044a64f934731e2741b39b93a5c77e1ed2cf52dcee1180c57c27c287b62e0ef2763c
-
SSDEEP
1536:s21PApYOMjikQ5YVEDFD9kjVCwjycsL2/VQB/oAC:s21PApYOMjikQ5YVEDFACwjycsL2/VQG
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2676 msedge.exe 2676 msedge.exe 116 msedge.exe 116 msedge.exe 3836 identity_helper.exe 3836 identity_helper.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 116 wrote to memory of 320 116 msedge.exe 83 PID 116 wrote to memory of 320 116 msedge.exe 83 PID 116 wrote to memory of 4428 116 msedge.exe 84 PID 116 wrote to memory of 4428 116 msedge.exe 84 PID 116 wrote to memory of 4428 116 msedge.exe 84 PID 116 wrote to memory of 4428 116 msedge.exe 84 PID 116 wrote to memory of 4428 116 msedge.exe 84 PID 116 wrote to memory of 4428 116 msedge.exe 84 PID 116 wrote to memory of 4428 116 msedge.exe 84 PID 116 wrote to memory of 4428 116 msedge.exe 84 PID 116 wrote to memory of 4428 116 msedge.exe 84 PID 116 wrote to memory of 4428 116 msedge.exe 84 PID 116 wrote to memory of 4428 116 msedge.exe 84 PID 116 wrote to memory of 4428 116 msedge.exe 84 PID 116 wrote to memory of 4428 116 msedge.exe 84 PID 116 wrote to memory of 4428 116 msedge.exe 84 PID 116 wrote to memory of 4428 116 msedge.exe 84 PID 116 wrote to memory of 4428 116 msedge.exe 84 PID 116 wrote to memory of 4428 116 msedge.exe 84 PID 116 wrote to memory of 4428 116 msedge.exe 84 PID 116 wrote to memory of 4428 116 msedge.exe 84 PID 116 wrote to memory of 4428 116 msedge.exe 84 PID 116 wrote to memory of 4428 116 msedge.exe 84 PID 116 wrote to memory of 4428 116 msedge.exe 84 PID 116 wrote to memory of 4428 116 msedge.exe 84 PID 116 wrote to memory of 4428 116 msedge.exe 84 PID 116 wrote to memory of 4428 116 msedge.exe 84 PID 116 wrote to memory of 4428 116 msedge.exe 84 PID 116 wrote to memory of 4428 116 msedge.exe 84 PID 116 wrote to memory of 4428 116 msedge.exe 84 PID 116 wrote to memory of 4428 116 msedge.exe 84 PID 116 wrote to memory of 4428 116 msedge.exe 84 PID 116 wrote to memory of 4428 116 msedge.exe 84 PID 116 wrote to memory of 4428 116 msedge.exe 84 PID 116 wrote to memory of 4428 116 msedge.exe 84 PID 116 wrote to memory of 4428 116 msedge.exe 84 PID 116 wrote to memory of 4428 116 msedge.exe 84 PID 116 wrote to memory of 4428 116 msedge.exe 84 PID 116 wrote to memory of 4428 116 msedge.exe 84 PID 116 wrote to memory of 4428 116 msedge.exe 84 PID 116 wrote to memory of 4428 116 msedge.exe 84 PID 116 wrote to memory of 4428 116 msedge.exe 84 PID 116 wrote to memory of 2676 116 msedge.exe 85 PID 116 wrote to memory of 2676 116 msedge.exe 85 PID 116 wrote to memory of 4344 116 msedge.exe 86 PID 116 wrote to memory of 4344 116 msedge.exe 86 PID 116 wrote to memory of 4344 116 msedge.exe 86 PID 116 wrote to memory of 4344 116 msedge.exe 86 PID 116 wrote to memory of 4344 116 msedge.exe 86 PID 116 wrote to memory of 4344 116 msedge.exe 86 PID 116 wrote to memory of 4344 116 msedge.exe 86 PID 116 wrote to memory of 4344 116 msedge.exe 86 PID 116 wrote to memory of 4344 116 msedge.exe 86 PID 116 wrote to memory of 4344 116 msedge.exe 86 PID 116 wrote to memory of 4344 116 msedge.exe 86 PID 116 wrote to memory of 4344 116 msedge.exe 86 PID 116 wrote to memory of 4344 116 msedge.exe 86 PID 116 wrote to memory of 4344 116 msedge.exe 86 PID 116 wrote to memory of 4344 116 msedge.exe 86 PID 116 wrote to memory of 4344 116 msedge.exe 86 PID 116 wrote to memory of 4344 116 msedge.exe 86 PID 116 wrote to memory of 4344 116 msedge.exe 86 PID 116 wrote to memory of 4344 116 msedge.exe 86 PID 116 wrote to memory of 4344 116 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2ca02180f345e38d3d12dd75ce1e9214_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:116 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb1a3646f8,0x7ffb1a364708,0x7ffb1a3647182⤵PID:320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2168,12650135795320224412,14777731663643750680,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 /prefetch:22⤵PID:4428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2168,12650135795320224412,14777731663643750680,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2416 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2168,12650135795320224412,14777731663643750680,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2908 /prefetch:82⤵PID:4344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,12650135795320224412,14777731663643750680,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:1800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,12650135795320224412,14777731663643750680,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:1052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,12650135795320224412,14777731663643750680,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5208 /prefetch:12⤵PID:2088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,12650135795320224412,14777731663643750680,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5220 /prefetch:12⤵PID:4332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2168,12650135795320224412,14777731663643750680,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5488 /prefetch:82⤵PID:1048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2168,12650135795320224412,14777731663643750680,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5488 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,12650135795320224412,14777731663643750680,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5480 /prefetch:12⤵PID:2860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,12650135795320224412,14777731663643750680,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2612 /prefetch:12⤵PID:4112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2168,12650135795320224412,14777731663643750680,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4880 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5032
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3296
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2340
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54f7152bc5a1a715ef481e37d1c791959
SHA1c8a1ed674c62ae4f45519f90a8cc5a81eff3a6d7
SHA256704dd4f98d8ca34ec421f23ba1891b178c23c14b3301e4655efc5c02d356c2bc
SHA5122e6b02ca35d76a655a17a5f3e9dbd8d7517c7dae24f0095c7350eb9e7bdf9e1256a7009aa8878f96c89d1ea4fe5323a41f72b8c551806dda62880d7ff231ff5c
-
Filesize
152B
MD5ea98e583ad99df195d29aa066204ab56
SHA1f89398664af0179641aa0138b337097b617cb2db
SHA256a7abb51435909fa2d75c6f2ff5c69a93d4a0ab276ed579e7d8733b2a63ffbee6
SHA512e109be3466e653e5d310b3e402e1626298b09205d223722a82344dd78504f3c33e1e24e8402a02f38cd2c9c50d96a303ce4846bea5a583423937ab018cd5782f
-
Filesize
32KB
MD5f48baec69cc4dc0852d118259eff2d56
SHA1e64c6e4423421da5b35700154810cb67160bc32b
SHA256463d99ca5448f815a05b2d946ddae9eed3e21c335c0f4cfe7a16944e3512f76c
SHA51206fdccb5d9536ab7c68355dbf49ac02ebccad5a4ea01cb62200fd67728a6d05c276403e588a5bdceacf5e671913fc65b63e8b92456ca5493dae5b5a70e4a8b37
-
Filesize
5KB
MD5308702569eebd28a9d203fca8df9ca39
SHA1b1f3788166657e65834185fb6a83d08bd0d183a0
SHA2569c4e7e456de53c1543bf7491922c2a39ec84c630531d3b238705d8806cfb648f
SHA512a709f116a1e813cc22b14ff5b25ae9adf5e0770fd454867187573f9b7377e7e1f65dacdfc7eb940f22ea05a57a4f0595a875436bbf83f1f8765dc452707e91b6
-
Filesize
6KB
MD5faf49b6eefcbda9ec435c7e819586f97
SHA1f19cb3a2446ad77f0c082d4b5ce4998b9d4a1e45
SHA2566d3ef81b8ebe68b996d4b4e236163423db8dbec8dce6e028d3749962b2c6a218
SHA51295ebc52cd9c2aa7caaec9088001fb85af10943570db4fdc8cd1a826336d747936dd32c312da558bf5a6a0ad3629f1438fcfefde584e1657e85b9fbe1e4156b16
-
Filesize
6KB
MD5377a66f52ea5f0fad1cc2800bf9f607b
SHA135f97dd0249852fb567713101bd91e2edf2c2573
SHA2564b2a398435cfbcad0d5b0073f8276eb64101bb82313853a61d4d98e924c7d1f6
SHA512e9acb0612a52d25f06df36acc3e34ad6bc8480b113e63a10ceb27515416cb1b211c5a0ad8ffe46923ec0b33e8030bf822702427539d6de4c61a54fc4de50f569
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5f52567a362c4cf3974b3bf02169f53eb
SHA10e20412b1a919c91c50bafe8c94bbf24a08f58fb
SHA2569598b0b51af2cb2d21b1b7f68e4a1e5101a2a543a477eecdd9258a7c501e18e2
SHA5121ae1e3327010b2f43eb35a2ec249b192ff1dc9b83c599d34e56b6b75db4d8ba9552fd787f83a403a7158384852d8937066a8159959b965527429f660dc337430