Analysis
-
max time kernel
145s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
10-05-2024 02:53
Static task
static1
Behavioral task
behavioral1
Sample
2cfed4f6bd3b3ac0372256c7691e8334_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2cfed4f6bd3b3ac0372256c7691e8334_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
2cfed4f6bd3b3ac0372256c7691e8334_JaffaCakes118.html
-
Size
78KB
-
MD5
2cfed4f6bd3b3ac0372256c7691e8334
-
SHA1
819f4f71e5576e9ea1ab64f57312a318927b128f
-
SHA256
a8ec7a4d24006f8278d021b2f42dcf0f00e9f023b5a183f908d9683aa39e56d9
-
SHA512
73c0c2225ddd7bed35dc2517f0a94239d1fb85f84b54d0044cba031de64944a4ec2940f74ff765a164f0dbb9509863657246da07687fdd7fab526e3285331b0b
-
SSDEEP
1536:MtFypBqW0l37n1wHyTjxB4ZwE4Z/M6Sjd3qfdQjFcPbyUYI/V/X2JJ/pfRW+VP5m:MtFw0Rg6Sjd3qfdtHD02EJtnho
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3888 msedge.exe 3888 msedge.exe 4160 msedge.exe 4160 msedge.exe 4044 identity_helper.exe 4044 identity_helper.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4160 wrote to memory of 4928 4160 msedge.exe 82 PID 4160 wrote to memory of 4928 4160 msedge.exe 82 PID 4160 wrote to memory of 2484 4160 msedge.exe 83 PID 4160 wrote to memory of 2484 4160 msedge.exe 83 PID 4160 wrote to memory of 2484 4160 msedge.exe 83 PID 4160 wrote to memory of 2484 4160 msedge.exe 83 PID 4160 wrote to memory of 2484 4160 msedge.exe 83 PID 4160 wrote to memory of 2484 4160 msedge.exe 83 PID 4160 wrote to memory of 2484 4160 msedge.exe 83 PID 4160 wrote to memory of 2484 4160 msedge.exe 83 PID 4160 wrote to memory of 2484 4160 msedge.exe 83 PID 4160 wrote to memory of 2484 4160 msedge.exe 83 PID 4160 wrote to memory of 2484 4160 msedge.exe 83 PID 4160 wrote to memory of 2484 4160 msedge.exe 83 PID 4160 wrote to memory of 2484 4160 msedge.exe 83 PID 4160 wrote to memory of 2484 4160 msedge.exe 83 PID 4160 wrote to memory of 2484 4160 msedge.exe 83 PID 4160 wrote to memory of 2484 4160 msedge.exe 83 PID 4160 wrote to memory of 2484 4160 msedge.exe 83 PID 4160 wrote to memory of 2484 4160 msedge.exe 83 PID 4160 wrote to memory of 2484 4160 msedge.exe 83 PID 4160 wrote to memory of 2484 4160 msedge.exe 83 PID 4160 wrote to memory of 2484 4160 msedge.exe 83 PID 4160 wrote to memory of 2484 4160 msedge.exe 83 PID 4160 wrote to memory of 2484 4160 msedge.exe 83 PID 4160 wrote to memory of 2484 4160 msedge.exe 83 PID 4160 wrote to memory of 2484 4160 msedge.exe 83 PID 4160 wrote to memory of 2484 4160 msedge.exe 83 PID 4160 wrote to memory of 2484 4160 msedge.exe 83 PID 4160 wrote to memory of 2484 4160 msedge.exe 83 PID 4160 wrote to memory of 2484 4160 msedge.exe 83 PID 4160 wrote to memory of 2484 4160 msedge.exe 83 PID 4160 wrote to memory of 2484 4160 msedge.exe 83 PID 4160 wrote to memory of 2484 4160 msedge.exe 83 PID 4160 wrote to memory of 2484 4160 msedge.exe 83 PID 4160 wrote to memory of 2484 4160 msedge.exe 83 PID 4160 wrote to memory of 2484 4160 msedge.exe 83 PID 4160 wrote to memory of 2484 4160 msedge.exe 83 PID 4160 wrote to memory of 2484 4160 msedge.exe 83 PID 4160 wrote to memory of 2484 4160 msedge.exe 83 PID 4160 wrote to memory of 2484 4160 msedge.exe 83 PID 4160 wrote to memory of 2484 4160 msedge.exe 83 PID 4160 wrote to memory of 3888 4160 msedge.exe 84 PID 4160 wrote to memory of 3888 4160 msedge.exe 84 PID 4160 wrote to memory of 2112 4160 msedge.exe 85 PID 4160 wrote to memory of 2112 4160 msedge.exe 85 PID 4160 wrote to memory of 2112 4160 msedge.exe 85 PID 4160 wrote to memory of 2112 4160 msedge.exe 85 PID 4160 wrote to memory of 2112 4160 msedge.exe 85 PID 4160 wrote to memory of 2112 4160 msedge.exe 85 PID 4160 wrote to memory of 2112 4160 msedge.exe 85 PID 4160 wrote to memory of 2112 4160 msedge.exe 85 PID 4160 wrote to memory of 2112 4160 msedge.exe 85 PID 4160 wrote to memory of 2112 4160 msedge.exe 85 PID 4160 wrote to memory of 2112 4160 msedge.exe 85 PID 4160 wrote to memory of 2112 4160 msedge.exe 85 PID 4160 wrote to memory of 2112 4160 msedge.exe 85 PID 4160 wrote to memory of 2112 4160 msedge.exe 85 PID 4160 wrote to memory of 2112 4160 msedge.exe 85 PID 4160 wrote to memory of 2112 4160 msedge.exe 85 PID 4160 wrote to memory of 2112 4160 msedge.exe 85 PID 4160 wrote to memory of 2112 4160 msedge.exe 85 PID 4160 wrote to memory of 2112 4160 msedge.exe 85 PID 4160 wrote to memory of 2112 4160 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2cfed4f6bd3b3ac0372256c7691e8334_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4160 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffae94e46f8,0x7ffae94e4708,0x7ffae94e47182⤵PID:4928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,2383084175474144641,10579592521075920530,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2168 /prefetch:22⤵PID:2484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,2383084175474144641,10579592521075920530,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2212 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,2383084175474144641,10579592521075920530,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2676 /prefetch:82⤵PID:2112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2383084175474144641,10579592521075920530,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:3668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2383084175474144641,10579592521075920530,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:4824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,2383084175474144641,10579592521075920530,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5416 /prefetch:82⤵PID:1188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,2383084175474144641,10579592521075920530,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5416 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2383084175474144641,10579592521075920530,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5008 /prefetch:12⤵PID:3480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2383084175474144641,10579592521075920530,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5076 /prefetch:12⤵PID:4356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2383084175474144641,10579592521075920530,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:3196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2383084175474144641,10579592521075920530,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4800 /prefetch:12⤵PID:4808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,2383084175474144641,10579592521075920530,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1264 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1240
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4228
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2600
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
497B
MD56787a0c1c3b6689bbfd64238a61fbddd
SHA1b132ef5bafc9bda506c05fe1687e87bb8fc94619
SHA256ff3d0530dbfabe2f95a69ac2a77a267e3b967fd23a1f6a6340ec078254079076
SHA5128fa5cd65d921d773812a268d5139d766959b8d1a685a79b692f06c881b3c230957a9b8d7d2ef5fc10e381434b792358cee8f28f620688b5b88d35acdf5d398f9
-
Filesize
6KB
MD555ffb66076589f6ecd9393a2285f9d64
SHA13855479bb7c49f7f06cbe8348355f40cc8efe5cd
SHA2568d8d8c5b15a51c5b74d82757352b676f5b02c42b2e483dd658ff04f965233b25
SHA5128d90feadbc4ec112fb4ab10ddfd09569f77c37a521e849d4cf7576a9b90b91fff8a2a801a256ea11996ad0359626e88638c31adf6f7452f6a0a76be230ed0cda
-
Filesize
6KB
MD5e42f5206fb6e51b3e947ecedbe81a2c3
SHA1fc058a0e8d27412f20c1c919d946931362a360c9
SHA2563bf2ad243bc7379816dfdfb0470b77e6a460119c112b93dc5dac95dbf954134e
SHA51228950ba7ee94caed62f14599e4a9cef00a218bcd559cb1916938ff04bebc2d40f13af76474dd7a0b51a57cb55c02f21251699cf994809bfd76345a4c3adae47a
-
Filesize
6KB
MD5d9a9e634ba95660877b2c00498d3c6b8
SHA1fa0937484a161afc504cc4a0677d415801c743ea
SHA25622734294fdbe325ef649ca24ca5e56051d1f0a6142a53ee468f1eee313ca464a
SHA512d11030edf947a8070d6e82528a17996f40d579eff52ff98deae4def814a550929cca50fa7d97a523c2837d7a70d7b64f91714d0328b4198ccbd6b02a98199f8f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5be087e142bffe1670e59494672a4a3fd
SHA120272c6e9efd7c95614e91f3aa867c8ba13b0a87
SHA25604bb0dd1f65e69716646ab83cf4598075ed7170b7fde332f213778d331a75156
SHA5125cce9f72239ab0e887f85f220ca382c0fe51cacc659d175fcd357f52374b5928e1de2b35e6b1493a0e17873c806eae34cbe08250b301a82ecd1b1271034f6972