Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
10-05-2024 02:51
Static task
static1
Behavioral task
behavioral1
Sample
2cfc953980530841e7dced5589002342_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2cfc953980530841e7dced5589002342_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
2cfc953980530841e7dced5589002342_JaffaCakes118.html
-
Size
11KB
-
MD5
2cfc953980530841e7dced5589002342
-
SHA1
c35bbd94c893826f0ed120cb799bac2a74aa3a4c
-
SHA256
c9de68a9b6c2fd91b0a5461c0f8d093bc24c1e264f59ccc1a84b8db5a409ef87
-
SHA512
64809d89730761d69e559509bac063e4433452f4e74ec828d409e3b1b4e7756bb3358956945119275abb46cdd441a79e227eecc703af08aae6c44b75e16b750e
-
SSDEEP
192:SV0zQbKLGsC8iAVbj2qzTU8vbVPp8BtJ0ADmMZbGs+a+k1RAbiVkPGJ4CF2Zugbt:SS1imeUH8BtJ0ADmkBD+kYCF2xd
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1236 msedge.exe 1236 msedge.exe 1224 msedge.exe 1224 msedge.exe 3416 identity_helper.exe 3416 identity_helper.exe 5980 msedge.exe 5980 msedge.exe 5980 msedge.exe 5980 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe 1224 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1224 wrote to memory of 2924 1224 msedge.exe 82 PID 1224 wrote to memory of 2924 1224 msedge.exe 82 PID 1224 wrote to memory of 2916 1224 msedge.exe 83 PID 1224 wrote to memory of 2916 1224 msedge.exe 83 PID 1224 wrote to memory of 2916 1224 msedge.exe 83 PID 1224 wrote to memory of 2916 1224 msedge.exe 83 PID 1224 wrote to memory of 2916 1224 msedge.exe 83 PID 1224 wrote to memory of 2916 1224 msedge.exe 83 PID 1224 wrote to memory of 2916 1224 msedge.exe 83 PID 1224 wrote to memory of 2916 1224 msedge.exe 83 PID 1224 wrote to memory of 2916 1224 msedge.exe 83 PID 1224 wrote to memory of 2916 1224 msedge.exe 83 PID 1224 wrote to memory of 2916 1224 msedge.exe 83 PID 1224 wrote to memory of 2916 1224 msedge.exe 83 PID 1224 wrote to memory of 2916 1224 msedge.exe 83 PID 1224 wrote to memory of 2916 1224 msedge.exe 83 PID 1224 wrote to memory of 2916 1224 msedge.exe 83 PID 1224 wrote to memory of 2916 1224 msedge.exe 83 PID 1224 wrote to memory of 2916 1224 msedge.exe 83 PID 1224 wrote to memory of 2916 1224 msedge.exe 83 PID 1224 wrote to memory of 2916 1224 msedge.exe 83 PID 1224 wrote to memory of 2916 1224 msedge.exe 83 PID 1224 wrote to memory of 2916 1224 msedge.exe 83 PID 1224 wrote to memory of 2916 1224 msedge.exe 83 PID 1224 wrote to memory of 2916 1224 msedge.exe 83 PID 1224 wrote to memory of 2916 1224 msedge.exe 83 PID 1224 wrote to memory of 2916 1224 msedge.exe 83 PID 1224 wrote to memory of 2916 1224 msedge.exe 83 PID 1224 wrote to memory of 2916 1224 msedge.exe 83 PID 1224 wrote to memory of 2916 1224 msedge.exe 83 PID 1224 wrote to memory of 2916 1224 msedge.exe 83 PID 1224 wrote to memory of 2916 1224 msedge.exe 83 PID 1224 wrote to memory of 2916 1224 msedge.exe 83 PID 1224 wrote to memory of 2916 1224 msedge.exe 83 PID 1224 wrote to memory of 2916 1224 msedge.exe 83 PID 1224 wrote to memory of 2916 1224 msedge.exe 83 PID 1224 wrote to memory of 2916 1224 msedge.exe 83 PID 1224 wrote to memory of 2916 1224 msedge.exe 83 PID 1224 wrote to memory of 2916 1224 msedge.exe 83 PID 1224 wrote to memory of 2916 1224 msedge.exe 83 PID 1224 wrote to memory of 2916 1224 msedge.exe 83 PID 1224 wrote to memory of 2916 1224 msedge.exe 83 PID 1224 wrote to memory of 1236 1224 msedge.exe 84 PID 1224 wrote to memory of 1236 1224 msedge.exe 84 PID 1224 wrote to memory of 1892 1224 msedge.exe 85 PID 1224 wrote to memory of 1892 1224 msedge.exe 85 PID 1224 wrote to memory of 1892 1224 msedge.exe 85 PID 1224 wrote to memory of 1892 1224 msedge.exe 85 PID 1224 wrote to memory of 1892 1224 msedge.exe 85 PID 1224 wrote to memory of 1892 1224 msedge.exe 85 PID 1224 wrote to memory of 1892 1224 msedge.exe 85 PID 1224 wrote to memory of 1892 1224 msedge.exe 85 PID 1224 wrote to memory of 1892 1224 msedge.exe 85 PID 1224 wrote to memory of 1892 1224 msedge.exe 85 PID 1224 wrote to memory of 1892 1224 msedge.exe 85 PID 1224 wrote to memory of 1892 1224 msedge.exe 85 PID 1224 wrote to memory of 1892 1224 msedge.exe 85 PID 1224 wrote to memory of 1892 1224 msedge.exe 85 PID 1224 wrote to memory of 1892 1224 msedge.exe 85 PID 1224 wrote to memory of 1892 1224 msedge.exe 85 PID 1224 wrote to memory of 1892 1224 msedge.exe 85 PID 1224 wrote to memory of 1892 1224 msedge.exe 85 PID 1224 wrote to memory of 1892 1224 msedge.exe 85 PID 1224 wrote to memory of 1892 1224 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2cfc953980530841e7dced5589002342_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xb4,0x108,0x7fffc8f746f8,0x7fffc8f74708,0x7fffc8f747182⤵PID:2924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,3101666147123589449,6268119965732335340,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:22⤵PID:2916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,3101666147123589449,6268119965732335340,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2336 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,3101666147123589449,6268119965732335340,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2652 /prefetch:82⤵PID:1892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,3101666147123589449,6268119965732335340,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:4436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,3101666147123589449,6268119965732335340,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:2208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,3101666147123589449,6268119965732335340,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4672 /prefetch:12⤵PID:3380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,3101666147123589449,6268119965732335340,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4948 /prefetch:12⤵PID:3092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,3101666147123589449,6268119965732335340,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4988 /prefetch:12⤵PID:3736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,3101666147123589449,6268119965732335340,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5164 /prefetch:12⤵PID:1952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,3101666147123589449,6268119965732335340,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6064 /prefetch:82⤵PID:2452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,3101666147123589449,6268119965732335340,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6064 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,3101666147123589449,6268119965732335340,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5664 /prefetch:12⤵PID:2452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,3101666147123589449,6268119965732335340,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5648 /prefetch:12⤵PID:5128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,3101666147123589449,6268119965732335340,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6420 /prefetch:12⤵PID:5464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,3101666147123589449,6268119965732335340,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6444 /prefetch:12⤵PID:5472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,3101666147123589449,6268119965732335340,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2944 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5980
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4600
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4292
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54f7152bc5a1a715ef481e37d1c791959
SHA1c8a1ed674c62ae4f45519f90a8cc5a81eff3a6d7
SHA256704dd4f98d8ca34ec421f23ba1891b178c23c14b3301e4655efc5c02d356c2bc
SHA5122e6b02ca35d76a655a17a5f3e9dbd8d7517c7dae24f0095c7350eb9e7bdf9e1256a7009aa8878f96c89d1ea4fe5323a41f72b8c551806dda62880d7ff231ff5c
-
Filesize
152B
MD5ea98e583ad99df195d29aa066204ab56
SHA1f89398664af0179641aa0138b337097b617cb2db
SHA256a7abb51435909fa2d75c6f2ff5c69a93d4a0ab276ed579e7d8733b2a63ffbee6
SHA512e109be3466e653e5d310b3e402e1626298b09205d223722a82344dd78504f3c33e1e24e8402a02f38cd2c9c50d96a303ce4846bea5a583423937ab018cd5782f
-
Filesize
180B
MD5ad73470c6e4d4bd50aa730c77aa22d32
SHA1dc181c4a194291b87bf8daa4bf803c91d7a64c92
SHA25636849d935eac5eca3ed2f702742e601163502037369465b810112f9877aff69d
SHA512ebcd2781f57c83df1a636b87cd6d69e74714c08fe0be4e0ee4171ed05b9e7efda3c002e7d64f74f74325632aa7ae216f4c293dd663e8354a08264d4704e3cd2a
-
Filesize
5KB
MD530c5a0fcc9b551df28a05e1328e7e955
SHA196a38bb83c2521d8ec9e9d307bcd224d507334d8
SHA256b40bcb83d034554037fe8be3f167c40f736266121d972bc3be10210b8adec80d
SHA5123572cb2b1853b81d1dc447698655715a6ad4df902c32dd63c5ecc3c95dc9e92056a2cc19d6fa9152c2ba88fe579cb1c43d0a1620db26f86e7818263f8c1fb1c5
-
Filesize
6KB
MD534a48e5f8fef4e2a8f8f9d04bebacd71
SHA143ed51201fa15ebc4f5dab6b9cf17eb256dddbb2
SHA256305943e7641d8c6dce17ae53ff32034d73d42245bad729e65129940c5c3080c5
SHA512d2e7b5f529de2846417acc8e902883f5fca2bb73c36508f21e7043febd4bf9e37a1669587bf69c72e4c9946522d370e70d515c82ca2d3b41751609750d7ab016
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD54c8f0134f03fbbb9de27287f0499f09e
SHA1135024a8bdaca0300cfd6a02e7eaa6d56cc79223
SHA256a825fd93d597afdfdc01b44f6f27e8c2235bd79665f462c4ee2444714b6fe4a1
SHA512b4ee26f75cb663c28560318d3b18fccede29a9dfd938d8bdc8eb4eeec526d7d4152c1bb52fcac2c6558bd8c5dbe18b79458180bd33094aa9d192baeef7743dfc