Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
10-05-2024 04:26
Static task
static1
Behavioral task
behavioral1
Sample
2d54e11192e1e73488baee83b499c0f5_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2d54e11192e1e73488baee83b499c0f5_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
2d54e11192e1e73488baee83b499c0f5_JaffaCakes118.html
-
Size
139KB
-
MD5
2d54e11192e1e73488baee83b499c0f5
-
SHA1
18b06e43842013a3e6f83635d7359cd0ee0f3650
-
SHA256
4f0b2c3ac368187519374550c742c7c92978dac8e44322b501774d75f2488d02
-
SHA512
2d2b5070d4d5f355cafc3426ee6ae775ac101eb4690a1b5eaf57a37e0891305c34f9f2f22a5b417ae9ed2e7e9ab5cd9006b772c5ba8c0366663c1d6f16876a6a
-
SSDEEP
1536:Sj1Vv3lmyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOy+:SjIyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 1472 msedge.exe 1472 msedge.exe 1472 msedge.exe 3552 msedge.exe 3552 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3552 msedge.exe 3552 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3552 wrote to memory of 1512 3552 msedge.exe 82 PID 3552 wrote to memory of 1512 3552 msedge.exe 82 PID 3552 wrote to memory of 4168 3552 msedge.exe 84 PID 3552 wrote to memory of 4168 3552 msedge.exe 84 PID 3552 wrote to memory of 4168 3552 msedge.exe 84 PID 3552 wrote to memory of 4168 3552 msedge.exe 84 PID 3552 wrote to memory of 4168 3552 msedge.exe 84 PID 3552 wrote to memory of 4168 3552 msedge.exe 84 PID 3552 wrote to memory of 4168 3552 msedge.exe 84 PID 3552 wrote to memory of 4168 3552 msedge.exe 84 PID 3552 wrote to memory of 4168 3552 msedge.exe 84 PID 3552 wrote to memory of 4168 3552 msedge.exe 84 PID 3552 wrote to memory of 4168 3552 msedge.exe 84 PID 3552 wrote to memory of 4168 3552 msedge.exe 84 PID 3552 wrote to memory of 4168 3552 msedge.exe 84 PID 3552 wrote to memory of 4168 3552 msedge.exe 84 PID 3552 wrote to memory of 4168 3552 msedge.exe 84 PID 3552 wrote to memory of 4168 3552 msedge.exe 84 PID 3552 wrote to memory of 4168 3552 msedge.exe 84 PID 3552 wrote to memory of 4168 3552 msedge.exe 84 PID 3552 wrote to memory of 4168 3552 msedge.exe 84 PID 3552 wrote to memory of 4168 3552 msedge.exe 84 PID 3552 wrote to memory of 4168 3552 msedge.exe 84 PID 3552 wrote to memory of 4168 3552 msedge.exe 84 PID 3552 wrote to memory of 4168 3552 msedge.exe 84 PID 3552 wrote to memory of 4168 3552 msedge.exe 84 PID 3552 wrote to memory of 4168 3552 msedge.exe 84 PID 3552 wrote to memory of 4168 3552 msedge.exe 84 PID 3552 wrote to memory of 4168 3552 msedge.exe 84 PID 3552 wrote to memory of 4168 3552 msedge.exe 84 PID 3552 wrote to memory of 4168 3552 msedge.exe 84 PID 3552 wrote to memory of 4168 3552 msedge.exe 84 PID 3552 wrote to memory of 4168 3552 msedge.exe 84 PID 3552 wrote to memory of 4168 3552 msedge.exe 84 PID 3552 wrote to memory of 4168 3552 msedge.exe 84 PID 3552 wrote to memory of 4168 3552 msedge.exe 84 PID 3552 wrote to memory of 4168 3552 msedge.exe 84 PID 3552 wrote to memory of 4168 3552 msedge.exe 84 PID 3552 wrote to memory of 4168 3552 msedge.exe 84 PID 3552 wrote to memory of 4168 3552 msedge.exe 84 PID 3552 wrote to memory of 4168 3552 msedge.exe 84 PID 3552 wrote to memory of 4168 3552 msedge.exe 84 PID 3552 wrote to memory of 1472 3552 msedge.exe 85 PID 3552 wrote to memory of 1472 3552 msedge.exe 85 PID 3552 wrote to memory of 4740 3552 msedge.exe 86 PID 3552 wrote to memory of 4740 3552 msedge.exe 86 PID 3552 wrote to memory of 4740 3552 msedge.exe 86 PID 3552 wrote to memory of 4740 3552 msedge.exe 86 PID 3552 wrote to memory of 4740 3552 msedge.exe 86 PID 3552 wrote to memory of 4740 3552 msedge.exe 86 PID 3552 wrote to memory of 4740 3552 msedge.exe 86 PID 3552 wrote to memory of 4740 3552 msedge.exe 86 PID 3552 wrote to memory of 4740 3552 msedge.exe 86 PID 3552 wrote to memory of 4740 3552 msedge.exe 86 PID 3552 wrote to memory of 4740 3552 msedge.exe 86 PID 3552 wrote to memory of 4740 3552 msedge.exe 86 PID 3552 wrote to memory of 4740 3552 msedge.exe 86 PID 3552 wrote to memory of 4740 3552 msedge.exe 86 PID 3552 wrote to memory of 4740 3552 msedge.exe 86 PID 3552 wrote to memory of 4740 3552 msedge.exe 86 PID 3552 wrote to memory of 4740 3552 msedge.exe 86 PID 3552 wrote to memory of 4740 3552 msedge.exe 86 PID 3552 wrote to memory of 4740 3552 msedge.exe 86 PID 3552 wrote to memory of 4740 3552 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2d54e11192e1e73488baee83b499c0f5_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3552 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb649446f8,0x7ffb64944708,0x7ffb649447182⤵PID:1512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,6696661390532365642,10634653159909969540,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵PID:4168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2068,6696661390532365642,10634653159909969540,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2480 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2068,6696661390532365642,10634653159909969540,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2980 /prefetch:82⤵PID:4740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,6696661390532365642,10634653159909969540,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:4752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,6696661390532365642,10634653159909969540,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:4868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,6696661390532365642,10634653159909969540,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4880 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3488
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4696
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:460
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
Filesize
6KB
MD548268752814b71ebc3598bf94e2f519d
SHA1404868c6ea365b660d7af2e24936736d326ec07b
SHA256a508b0f0727e24f9eeec777d614f0cc65612d90d33f9df4a50f61873c07faae8
SHA51219ef981d84628376a53ae6b7178440f8a57c87fd18691bc5dfe50f3d932eb04902349973d05b921de175af8ff322650e14e210f0cb619708b158b22252028ef6
-
Filesize
6KB
MD50e53ba9f1e58538f727696ab85cf6916
SHA184c40b622d399703e4e9ec315029879d3a6e1dbb
SHA256661b302d7dd87a7cd9c34d94124077c8391f008026a8c12ca043f7943d343897
SHA5123965da41351d85a9543e7e34c61968838e7958d544b479086d3f4f4facaab9f752da905fc2accf03018442178ea0dfef859a5cbaf3480ba1977c477b92527703
-
Filesize
11KB
MD5fbb256d4dd64321e8955a5613554858a
SHA1b3a6330fcd41adcab830fa0e0d87378b8c6ba95e
SHA256ebfa3db4020e8cc3470c482739aa954e1a15c979a7675ca14cfb23b31814617b
SHA512df1411411ab1bc27da9475dbb2f4a60801199f209438c4b271d72ef65b8b5dd3cfdeb3a5364432ea1b24aa25ad8631e20d79209eea864a23a76c291abeebb069