Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
10/05/2024, 03:19
Static task
static1
Behavioral task
behavioral1
Sample
2d15a605e170d50f000352da9caf2bdf_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2d15a605e170d50f000352da9caf2bdf_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
2d15a605e170d50f000352da9caf2bdf_JaffaCakes118.html
-
Size
46KB
-
MD5
2d15a605e170d50f000352da9caf2bdf
-
SHA1
161434d2f707dc6610a22eda80380a4093a34d95
-
SHA256
d06b80a3e8dd31f336f7b34d685cff019f9bdc84a9b476df5d2571f279a247e6
-
SHA512
567b111e00eb13730869833696ad136d84f31fc3c067f1238fdb38ecc13c314e60923c3ca8a0228b6af561281dbc7611a2acbfb07e034acea38d03cc66db74db
-
SSDEEP
768:aOhwmAqhFobwrjTjApdQzdowtmftAFhDmdjDO/stqkLitlDCv5C+cY8KM4VUkMMX:aHngBJtmfgOO+qk+tlDCv5C+cYVM0Ul0
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4524 msedge.exe 4524 msedge.exe 2052 msedge.exe 2052 msedge.exe 1696 identity_helper.exe 1696 identity_helper.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2052 wrote to memory of 3368 2052 msedge.exe 85 PID 2052 wrote to memory of 3368 2052 msedge.exe 85 PID 2052 wrote to memory of 2764 2052 msedge.exe 86 PID 2052 wrote to memory of 2764 2052 msedge.exe 86 PID 2052 wrote to memory of 2764 2052 msedge.exe 86 PID 2052 wrote to memory of 2764 2052 msedge.exe 86 PID 2052 wrote to memory of 2764 2052 msedge.exe 86 PID 2052 wrote to memory of 2764 2052 msedge.exe 86 PID 2052 wrote to memory of 2764 2052 msedge.exe 86 PID 2052 wrote to memory of 2764 2052 msedge.exe 86 PID 2052 wrote to memory of 2764 2052 msedge.exe 86 PID 2052 wrote to memory of 2764 2052 msedge.exe 86 PID 2052 wrote to memory of 2764 2052 msedge.exe 86 PID 2052 wrote to memory of 2764 2052 msedge.exe 86 PID 2052 wrote to memory of 2764 2052 msedge.exe 86 PID 2052 wrote to memory of 2764 2052 msedge.exe 86 PID 2052 wrote to memory of 2764 2052 msedge.exe 86 PID 2052 wrote to memory of 2764 2052 msedge.exe 86 PID 2052 wrote to memory of 2764 2052 msedge.exe 86 PID 2052 wrote to memory of 2764 2052 msedge.exe 86 PID 2052 wrote to memory of 2764 2052 msedge.exe 86 PID 2052 wrote to memory of 2764 2052 msedge.exe 86 PID 2052 wrote to memory of 2764 2052 msedge.exe 86 PID 2052 wrote to memory of 2764 2052 msedge.exe 86 PID 2052 wrote to memory of 2764 2052 msedge.exe 86 PID 2052 wrote to memory of 2764 2052 msedge.exe 86 PID 2052 wrote to memory of 2764 2052 msedge.exe 86 PID 2052 wrote to memory of 2764 2052 msedge.exe 86 PID 2052 wrote to memory of 2764 2052 msedge.exe 86 PID 2052 wrote to memory of 2764 2052 msedge.exe 86 PID 2052 wrote to memory of 2764 2052 msedge.exe 86 PID 2052 wrote to memory of 2764 2052 msedge.exe 86 PID 2052 wrote to memory of 2764 2052 msedge.exe 86 PID 2052 wrote to memory of 2764 2052 msedge.exe 86 PID 2052 wrote to memory of 2764 2052 msedge.exe 86 PID 2052 wrote to memory of 2764 2052 msedge.exe 86 PID 2052 wrote to memory of 2764 2052 msedge.exe 86 PID 2052 wrote to memory of 2764 2052 msedge.exe 86 PID 2052 wrote to memory of 2764 2052 msedge.exe 86 PID 2052 wrote to memory of 2764 2052 msedge.exe 86 PID 2052 wrote to memory of 2764 2052 msedge.exe 86 PID 2052 wrote to memory of 2764 2052 msedge.exe 86 PID 2052 wrote to memory of 4524 2052 msedge.exe 87 PID 2052 wrote to memory of 4524 2052 msedge.exe 87 PID 2052 wrote to memory of 4024 2052 msedge.exe 88 PID 2052 wrote to memory of 4024 2052 msedge.exe 88 PID 2052 wrote to memory of 4024 2052 msedge.exe 88 PID 2052 wrote to memory of 4024 2052 msedge.exe 88 PID 2052 wrote to memory of 4024 2052 msedge.exe 88 PID 2052 wrote to memory of 4024 2052 msedge.exe 88 PID 2052 wrote to memory of 4024 2052 msedge.exe 88 PID 2052 wrote to memory of 4024 2052 msedge.exe 88 PID 2052 wrote to memory of 4024 2052 msedge.exe 88 PID 2052 wrote to memory of 4024 2052 msedge.exe 88 PID 2052 wrote to memory of 4024 2052 msedge.exe 88 PID 2052 wrote to memory of 4024 2052 msedge.exe 88 PID 2052 wrote to memory of 4024 2052 msedge.exe 88 PID 2052 wrote to memory of 4024 2052 msedge.exe 88 PID 2052 wrote to memory of 4024 2052 msedge.exe 88 PID 2052 wrote to memory of 4024 2052 msedge.exe 88 PID 2052 wrote to memory of 4024 2052 msedge.exe 88 PID 2052 wrote to memory of 4024 2052 msedge.exe 88 PID 2052 wrote to memory of 4024 2052 msedge.exe 88 PID 2052 wrote to memory of 4024 2052 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2d15a605e170d50f000352da9caf2bdf_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd0f0646f8,0x7ffd0f064708,0x7ffd0f0647182⤵PID:3368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,3632816375301848405,15538957278876239261,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2144 /prefetch:22⤵PID:2764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,3632816375301848405,15538957278876239261,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2244 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,3632816375301848405,15538957278876239261,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2884 /prefetch:82⤵PID:4024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,3632816375301848405,15538957278876239261,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:2884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,3632816375301848405,15538957278876239261,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:2004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,3632816375301848405,15538957278876239261,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5004 /prefetch:12⤵PID:4788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,3632816375301848405,15538957278876239261,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5176 /prefetch:12⤵PID:1348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,3632816375301848405,15538957278876239261,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5968 /prefetch:82⤵PID:1756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,3632816375301848405,15538957278876239261,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5968 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,3632816375301848405,15538957278876239261,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3144 /prefetch:12⤵PID:1148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,3632816375301848405,15538957278876239261,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4800 /prefetch:12⤵PID:996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,3632816375301848405,15538957278876239261,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4152 /prefetch:12⤵PID:1660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,3632816375301848405,15538957278876239261,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5268 /prefetch:12⤵PID:1476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,3632816375301848405,15538957278876239261,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4816 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2856
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1296
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2304
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f61fa5143fe872d1d8f1e9f8dc6544f9
SHA1df44bab94d7388fb38c63085ec4db80cfc5eb009
SHA256284a24b5b40860240db00ef3ae6a33c9fa8349ab5490a634e27b2c6e9a191c64
SHA512971000784a6518bb39c5cf043292c7ab659162275470f5f6b632ea91a6bcae83bc80517ceb983dd5abfe8fb4e157344cb65c27e609a879eec00b33c5fad563a6
-
Filesize
152B
MD587f7abeb82600e1e640b843ad50fe0a1
SHA1045bbada3f23fc59941bf7d0210fb160cb78ae87
SHA256b35d6906050d90a81d23646f86c20a8f5d42f058ffc6436fb0a2b8bd71ee1262
SHA512ea8e7f24ab823ad710ce079c86c40aa957353a00d2775732c23e31be88a10d212e974c4691279aa86016c4660f5795febf739a15207833df6ed964a9ed99d618
-
Filesize
1KB
MD547589e3a46dabaed5c388f0cee2e154a
SHA16dab63a0efbc7e5bb0d857ef3990a79a34df004d
SHA256ec11cbb36ec669bded14b2c14cdd175fa45b794c654ac44267a06ed7bcb46559
SHA51275fa7ca73f016e816ee2193c76dcb7b42e1cd2eb70e4d7c184647f1b1abed40974364add8bdd2a55090e77552a34d875078b47498c3f758aa41a6b7aaa7e940e
-
Filesize
6KB
MD56bfa34156ed415f3395463a534aca8a3
SHA18c094fbfb7f6e774defe0a631be7d73194eda3ca
SHA256cc9eea1339c4a6762ed4cbe6451c4f24ab5ec063a47758464e4efa014eabe4d2
SHA512d071c8c252b9a7cfa1d7ac39322383c555ba0bd6fea56c8de7856ce267b03e1afd067876192a5d703774eedfdc9e04a6330f229644958439a19974076a4ae9b3
-
Filesize
6KB
MD5d9ae7f0168344601fe0efbf43415fc18
SHA1ae80f9f79a866f008023a6d7d481014e7468bbba
SHA256a9403d604a1a5166aafaef1910a42c0736e504b9641a24b3ff4e6ff216000341
SHA51262a201d9e06305cb644900d714250e653809e186b8c81f8c776a8a16439e883f9ad1bdd881dcfba0ff08cf2eeda10aa10b1045318bd89c87d701efef9545181e
-
Filesize
6KB
MD52da281e1dfda30e707027f3320fa0d1d
SHA1a386ab82a30a34fd3326cf8a22dab4147c07a8a3
SHA256bcf10b4c4588d57a3ae1ea699c6745e2f706e758d9515560f2e2a20a25a21eef
SHA51286e36bfd5ef079fafe04d3341103f8c0d403a834fbdd1aa644abde69d773aa02e369ff49a107c69d41eb041690fb60f92c669cd384d3a3851719dcfb21698872
-
Filesize
372B
MD5ccdbf707585609f0b90e52b08bf2924d
SHA13fdfaf613da256ebee389445f0388e7deda2fb4d
SHA25600c742022a2ce8e141df58448d42a71ef0bf8229ea8ca576681567d3e62af632
SHA512368c7b82cd8058c45896e80392f0ce846f59708e17a7e216f76c550709f41dce48acc88e78fb87bf757663a2870c7216c31a714fc4f2738e92227130450d262b
-
Filesize
204B
MD562694bdbf40bc188f27517b977e69225
SHA1d240845ad32a253da74c5d87a8fa52462c19a66d
SHA256af1f964c7b73fe6765a70eac018b014d66ac68a628509a5b6eb2afc8a020a3f7
SHA5129eea60621417412195e177e877c8340e9d2199c2a0866726496973888c350b3cc19ce04c701748c8b8f0d297acc0196cb84730a555d1c45d7575a61daf368788
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD5d59d1e5e60fa011ee7afbe37ac943bdf
SHA1561e2fad28e4e38fe2c4e1b5670e7160c0b20a46
SHA256f3c3755f8e37b98e6262deb1704530f71eca99c56f37a94f35b47feb0290d59b
SHA51204d3258e6f8b5f97484c3017e77e08276a21c57b2d86228ca108032c731efe936368615955169651a22200ade791dbf0e40b6f54f9c90cf618208488dfbceb08