Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
10/05/2024, 03:13
Static task
static1
Behavioral task
behavioral1
Sample
2d10768a1fec51014feb7d3e915bd64f_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2d10768a1fec51014feb7d3e915bd64f_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
2d10768a1fec51014feb7d3e915bd64f_JaffaCakes118.html
-
Size
20KB
-
MD5
2d10768a1fec51014feb7d3e915bd64f
-
SHA1
df1681cb3a5bf866e3312e2f48fbbc75d87bc08b
-
SHA256
177ab3a73a0810cfab08d7abbf69624407722667c0bba155c08c7ac351cb1e26
-
SHA512
8a5d282b3d1ef4a6a5716324e5b7faa19abcca9a10d9fbb90ed091736efd213f632953799e5307266d66b3f957500543102f9ee2eed757ff316bbb20991840bf
-
SSDEEP
384:g92CKAiZw8EBMUns5lpPsrB5844efNi0Pwp748g89W4u:gsDzjECFsrBT4efNi0Pwp748g89W4u
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1856 msedge.exe 1856 msedge.exe 2568 msedge.exe 2568 msedge.exe 216 identity_helper.exe 216 identity_helper.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe 2568 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2568 wrote to memory of 4744 2568 msedge.exe 83 PID 2568 wrote to memory of 4744 2568 msedge.exe 83 PID 2568 wrote to memory of 2856 2568 msedge.exe 84 PID 2568 wrote to memory of 2856 2568 msedge.exe 84 PID 2568 wrote to memory of 2856 2568 msedge.exe 84 PID 2568 wrote to memory of 2856 2568 msedge.exe 84 PID 2568 wrote to memory of 2856 2568 msedge.exe 84 PID 2568 wrote to memory of 2856 2568 msedge.exe 84 PID 2568 wrote to memory of 2856 2568 msedge.exe 84 PID 2568 wrote to memory of 2856 2568 msedge.exe 84 PID 2568 wrote to memory of 2856 2568 msedge.exe 84 PID 2568 wrote to memory of 2856 2568 msedge.exe 84 PID 2568 wrote to memory of 2856 2568 msedge.exe 84 PID 2568 wrote to memory of 2856 2568 msedge.exe 84 PID 2568 wrote to memory of 2856 2568 msedge.exe 84 PID 2568 wrote to memory of 2856 2568 msedge.exe 84 PID 2568 wrote to memory of 2856 2568 msedge.exe 84 PID 2568 wrote to memory of 2856 2568 msedge.exe 84 PID 2568 wrote to memory of 2856 2568 msedge.exe 84 PID 2568 wrote to memory of 2856 2568 msedge.exe 84 PID 2568 wrote to memory of 2856 2568 msedge.exe 84 PID 2568 wrote to memory of 2856 2568 msedge.exe 84 PID 2568 wrote to memory of 2856 2568 msedge.exe 84 PID 2568 wrote to memory of 2856 2568 msedge.exe 84 PID 2568 wrote to memory of 2856 2568 msedge.exe 84 PID 2568 wrote to memory of 2856 2568 msedge.exe 84 PID 2568 wrote to memory of 2856 2568 msedge.exe 84 PID 2568 wrote to memory of 2856 2568 msedge.exe 84 PID 2568 wrote to memory of 2856 2568 msedge.exe 84 PID 2568 wrote to memory of 2856 2568 msedge.exe 84 PID 2568 wrote to memory of 2856 2568 msedge.exe 84 PID 2568 wrote to memory of 2856 2568 msedge.exe 84 PID 2568 wrote to memory of 2856 2568 msedge.exe 84 PID 2568 wrote to memory of 2856 2568 msedge.exe 84 PID 2568 wrote to memory of 2856 2568 msedge.exe 84 PID 2568 wrote to memory of 2856 2568 msedge.exe 84 PID 2568 wrote to memory of 2856 2568 msedge.exe 84 PID 2568 wrote to memory of 2856 2568 msedge.exe 84 PID 2568 wrote to memory of 2856 2568 msedge.exe 84 PID 2568 wrote to memory of 2856 2568 msedge.exe 84 PID 2568 wrote to memory of 2856 2568 msedge.exe 84 PID 2568 wrote to memory of 2856 2568 msedge.exe 84 PID 2568 wrote to memory of 1856 2568 msedge.exe 85 PID 2568 wrote to memory of 1856 2568 msedge.exe 85 PID 2568 wrote to memory of 1428 2568 msedge.exe 86 PID 2568 wrote to memory of 1428 2568 msedge.exe 86 PID 2568 wrote to memory of 1428 2568 msedge.exe 86 PID 2568 wrote to memory of 1428 2568 msedge.exe 86 PID 2568 wrote to memory of 1428 2568 msedge.exe 86 PID 2568 wrote to memory of 1428 2568 msedge.exe 86 PID 2568 wrote to memory of 1428 2568 msedge.exe 86 PID 2568 wrote to memory of 1428 2568 msedge.exe 86 PID 2568 wrote to memory of 1428 2568 msedge.exe 86 PID 2568 wrote to memory of 1428 2568 msedge.exe 86 PID 2568 wrote to memory of 1428 2568 msedge.exe 86 PID 2568 wrote to memory of 1428 2568 msedge.exe 86 PID 2568 wrote to memory of 1428 2568 msedge.exe 86 PID 2568 wrote to memory of 1428 2568 msedge.exe 86 PID 2568 wrote to memory of 1428 2568 msedge.exe 86 PID 2568 wrote to memory of 1428 2568 msedge.exe 86 PID 2568 wrote to memory of 1428 2568 msedge.exe 86 PID 2568 wrote to memory of 1428 2568 msedge.exe 86 PID 2568 wrote to memory of 1428 2568 msedge.exe 86 PID 2568 wrote to memory of 1428 2568 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2d10768a1fec51014feb7d3e915bd64f_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8797646f8,0x7ff879764708,0x7ff8797647182⤵PID:4744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,584694458782656340,2587575320264787987,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 /prefetch:22⤵PID:2856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2056,584694458782656340,2587575320264787987,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2212 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2056,584694458782656340,2587575320264787987,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2740 /prefetch:82⤵PID:1428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,584694458782656340,2587575320264787987,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:3600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,584694458782656340,2587575320264787987,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:3296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,584694458782656340,2587575320264787987,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5112 /prefetch:82⤵PID:3584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,584694458782656340,2587575320264787987,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5112 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,584694458782656340,2587575320264787987,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5132 /prefetch:12⤵PID:1504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,584694458782656340,2587575320264787987,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5216 /prefetch:12⤵PID:2844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,584694458782656340,2587575320264787987,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3388 /prefetch:12⤵PID:1064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,584694458782656340,2587575320264787987,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3380 /prefetch:12⤵PID:3564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,584694458782656340,2587575320264787987,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4888 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4256
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1524
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4232
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52daa93382bba07cbc40af372d30ec576
SHA1c5e709dc3e2e4df2ff841fbde3e30170e7428a94
SHA2561826d2a57b1938c148bf212a47d947ed1bfb26cfc55868931f843ee438117f30
SHA51265635cb59c81548a9ef8fdb0942331e7f3cd0c30ce1d4dba48aed72dbb27b06511a55d2aeaadfadbbb4b7cb4b2e2772bbabba9603b3f7d9c8b9e4a7fbf3d6b6b
-
Filesize
152B
MD5ecdc2754d7d2ae862272153aa9b9ca6e
SHA1c19bed1c6e1c998b9fa93298639ad7961339147d
SHA256a13d791473f836edcab0e93451ce7b7182efbbc54261b2b5644d319e047a00a7
SHA512cd4fb81317d540f8b15f1495a381bb6f0f129b8923a7c06e4b5cf777d2625c30304aee6cc68aa20479e08d84e5030b43fbe93e479602400334dfdd7297f702f2
-
Filesize
5KB
MD5f99e88dea7aef6a4daa4749086d7b54a
SHA1078be135dae73dfb71c6130ab610bf73a93cd6a2
SHA256fda2ade9426fb29eb3a99289de3980a91b3ad2ecc494c3b433a7bb0edcc4c5a2
SHA512802a637627c5d78312b26ff6a4df9268419f1598aec5a2bfe5d4e4cc95c5d965c868a4ca125649794199c87875983b44ad1cf1b04bd66ea688296badcf4d646f
-
Filesize
6KB
MD5d3514ec2ef686520f27cbc8a341b48dc
SHA12c37c80070a893960f1b0291cb8ec925cf35d988
SHA256d21c2637ba851af591db3aceb4b7e5edec50ca26c2f51fdf57a0f9263ea18acd
SHA51223edf5448f3b5100c5437e0a9380565e49092c0bd86b939f62e8c967c2fd77500b24bc75178b65a5bd272351e43498ae41ac098e53bfc881a906080ff9028d6d
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5f676ac502d2c89a285f1c1bf76005c43
SHA1fd3aa32f7416f4e6e05fe65a3b150ef21db01e26
SHA256919ea852ccddacd6e92b37ddc9ea8f6de17da1c57c7af58522fe592382a06e71
SHA512c562a994fbb039718e193418f06cb62900ea9fb015665fcc8c8dcd34fbf9a35d0196362140994da30c98a85a58f603d8741be84742aed001ea053d0576254199