Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
10-05-2024 02:58
Static task
static1
Behavioral task
behavioral1
Sample
2d02bd52fee7c16c79d243fc4e898117_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2d02bd52fee7c16c79d243fc4e898117_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
2d02bd52fee7c16c79d243fc4e898117_JaffaCakes118.html
-
Size
36KB
-
MD5
2d02bd52fee7c16c79d243fc4e898117
-
SHA1
b5563e6a7c290351665d4ed602031e925b447e4b
-
SHA256
da04d55b6cddf37b8bd765baa38ba044aadd9ff9b8544a7d413dd1f8382209c7
-
SHA512
776b8cb17239213ab610ee31d3ee9d69fe999db882a1583aad4b1781acec89488986c0630501dae7947d24e9d9ad7425001e1eb7f25c70556cb2bdadc6edac78
-
SSDEEP
768:zwx/MDTHik88hARVZPXEE1XnXrFLxNLlDNoPqkPTHlnkM3Gr6TtZO46lrl6lLRcT:Q/nbJxNVuu0Sx/c8wK
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4636 msedge.exe 4636 msedge.exe 3124 msedge.exe 3124 msedge.exe 4032 identity_helper.exe 4032 identity_helper.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3124 wrote to memory of 4972 3124 msedge.exe 82 PID 3124 wrote to memory of 4972 3124 msedge.exe 82 PID 3124 wrote to memory of 4948 3124 msedge.exe 83 PID 3124 wrote to memory of 4948 3124 msedge.exe 83 PID 3124 wrote to memory of 4948 3124 msedge.exe 83 PID 3124 wrote to memory of 4948 3124 msedge.exe 83 PID 3124 wrote to memory of 4948 3124 msedge.exe 83 PID 3124 wrote to memory of 4948 3124 msedge.exe 83 PID 3124 wrote to memory of 4948 3124 msedge.exe 83 PID 3124 wrote to memory of 4948 3124 msedge.exe 83 PID 3124 wrote to memory of 4948 3124 msedge.exe 83 PID 3124 wrote to memory of 4948 3124 msedge.exe 83 PID 3124 wrote to memory of 4948 3124 msedge.exe 83 PID 3124 wrote to memory of 4948 3124 msedge.exe 83 PID 3124 wrote to memory of 4948 3124 msedge.exe 83 PID 3124 wrote to memory of 4948 3124 msedge.exe 83 PID 3124 wrote to memory of 4948 3124 msedge.exe 83 PID 3124 wrote to memory of 4948 3124 msedge.exe 83 PID 3124 wrote to memory of 4948 3124 msedge.exe 83 PID 3124 wrote to memory of 4948 3124 msedge.exe 83 PID 3124 wrote to memory of 4948 3124 msedge.exe 83 PID 3124 wrote to memory of 4948 3124 msedge.exe 83 PID 3124 wrote to memory of 4948 3124 msedge.exe 83 PID 3124 wrote to memory of 4948 3124 msedge.exe 83 PID 3124 wrote to memory of 4948 3124 msedge.exe 83 PID 3124 wrote to memory of 4948 3124 msedge.exe 83 PID 3124 wrote to memory of 4948 3124 msedge.exe 83 PID 3124 wrote to memory of 4948 3124 msedge.exe 83 PID 3124 wrote to memory of 4948 3124 msedge.exe 83 PID 3124 wrote to memory of 4948 3124 msedge.exe 83 PID 3124 wrote to memory of 4948 3124 msedge.exe 83 PID 3124 wrote to memory of 4948 3124 msedge.exe 83 PID 3124 wrote to memory of 4948 3124 msedge.exe 83 PID 3124 wrote to memory of 4948 3124 msedge.exe 83 PID 3124 wrote to memory of 4948 3124 msedge.exe 83 PID 3124 wrote to memory of 4948 3124 msedge.exe 83 PID 3124 wrote to memory of 4948 3124 msedge.exe 83 PID 3124 wrote to memory of 4948 3124 msedge.exe 83 PID 3124 wrote to memory of 4948 3124 msedge.exe 83 PID 3124 wrote to memory of 4948 3124 msedge.exe 83 PID 3124 wrote to memory of 4948 3124 msedge.exe 83 PID 3124 wrote to memory of 4948 3124 msedge.exe 83 PID 3124 wrote to memory of 4636 3124 msedge.exe 84 PID 3124 wrote to memory of 4636 3124 msedge.exe 84 PID 3124 wrote to memory of 4504 3124 msedge.exe 85 PID 3124 wrote to memory of 4504 3124 msedge.exe 85 PID 3124 wrote to memory of 4504 3124 msedge.exe 85 PID 3124 wrote to memory of 4504 3124 msedge.exe 85 PID 3124 wrote to memory of 4504 3124 msedge.exe 85 PID 3124 wrote to memory of 4504 3124 msedge.exe 85 PID 3124 wrote to memory of 4504 3124 msedge.exe 85 PID 3124 wrote to memory of 4504 3124 msedge.exe 85 PID 3124 wrote to memory of 4504 3124 msedge.exe 85 PID 3124 wrote to memory of 4504 3124 msedge.exe 85 PID 3124 wrote to memory of 4504 3124 msedge.exe 85 PID 3124 wrote to memory of 4504 3124 msedge.exe 85 PID 3124 wrote to memory of 4504 3124 msedge.exe 85 PID 3124 wrote to memory of 4504 3124 msedge.exe 85 PID 3124 wrote to memory of 4504 3124 msedge.exe 85 PID 3124 wrote to memory of 4504 3124 msedge.exe 85 PID 3124 wrote to memory of 4504 3124 msedge.exe 85 PID 3124 wrote to memory of 4504 3124 msedge.exe 85 PID 3124 wrote to memory of 4504 3124 msedge.exe 85 PID 3124 wrote to memory of 4504 3124 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2d02bd52fee7c16c79d243fc4e898117_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3124 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc284846f8,0x7ffc28484708,0x7ffc284847182⤵PID:4972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,2025479390674433892,7862070184265166481,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2172 /prefetch:22⤵PID:4948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,2025479390674433892,7862070184265166481,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2516 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2080,2025479390674433892,7862070184265166481,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2824 /prefetch:82⤵PID:4504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,2025479390674433892,7862070184265166481,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3196 /prefetch:12⤵PID:2512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,2025479390674433892,7862070184265166481,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:1676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,2025479390674433892,7862070184265166481,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5408 /prefetch:82⤵PID:3676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,2025479390674433892,7862070184265166481,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5408 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,2025479390674433892,7862070184265166481,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1988 /prefetch:12⤵PID:4068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,2025479390674433892,7862070184265166481,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4860 /prefetch:12⤵PID:3248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,2025479390674433892,7862070184265166481,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5244 /prefetch:12⤵PID:1620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,2025479390674433892,7862070184265166481,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4932 /prefetch:12⤵PID:2392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,2025479390674433892,7862070184265166481,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1884 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:632
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4004
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3672
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54b4f91fa1b362ba5341ecb2836438dea
SHA19561f5aabed742404d455da735259a2c6781fa07
SHA256d824b742eace197ddc8b6ed5d918f390fde4b0fbf0e371b8e1f2ed40a3b6455c
SHA512fef22217dcdd8000bc193e25129699d4b8f7a103ca4fe1613baf73ccf67090d9fbae27eb93e4bb8747455853a0a4326f2d0c38df41c8d42351cdcd4132418dac
-
Filesize
152B
MD5eaa3db555ab5bc0cb364826204aad3f0
SHA1a4cdfaac8de49e6e6e88b335cfeaa7c9e3c563ca
SHA256ef7baeb1b2ab05ff3c5fbb76c2759db49294654548706c7c8e87f0cde855b86b
SHA512e13981da51b52c15261ecabb98af32f9b920651b46b10ce0cc823c5878b22eb1420258c80deef204070d1e0bdd3a64d875ac2522e3713a3cf11657aa55aeccd4
-
Filesize
613B
MD50c1970f90b8ebcd313266eb21327adaf
SHA145521e867116ff695fc08644deeecb04158b4943
SHA256642d9353d610d91a895f7cd293400f9733e05690458ce256ecf8bf8764e314cf
SHA5124b3d2e0e9f2a58933c448944692bfc5755518e8ef4066fd3de2ebf58ffabfaa28fe580736973104566cbc7bd321b6535036a56864e09963a824ea5930af1bf4c
-
Filesize
6KB
MD58e51a086c9920f534c85eb6dd7e958ce
SHA1d6fb06767ec861635b5982c67432edf57092ca21
SHA256edf2e1f98394361f440fca1da7d1141ca420426ba58edc2fe793cbaeaee0ef9b
SHA51235dd86d1f773b83002c1b70ce1eb56ab411658e716629e5e7826725af68963a5831d01a43a6b558118fb29f939a608e2999b81d90326f4dcf024ae80a1856149
-
Filesize
6KB
MD5cbd272c896078318ac895f49254aec16
SHA1fbe591fc3c44b880f230bb6036a089aa0ecc6569
SHA256df6dc7e8238c8ba708a20505714cae5ba6fe409cd2a90d4446dd6db2f4052afe
SHA5124591b703c2752c3098f5050c4d7761074f5a51bd42cc5a40119520e34d2c01231cea2b02348f335b5c2b340cbf777b06511f39d0a8ee701465af171fa31f3c33
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5a6b0722e3f2e3b7c51bdef6fda04a8eb
SHA1a19e6abae30ff1a45a519a93060c2486819d178b
SHA256a946fc129f99d2f5c06f3075ec6d936bb88509885b838d5297a5a2ec46237c14
SHA512a977b57b6be9b9f2f3ac0267b322ebebfec774e93bbb6c386ead0725f51cf8bddd5918c964ed8bf07bd089c70ddae518559efd8e2d53c03c831533abc9cd2436