Analysis
-
max time kernel
145s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
10/05/2024, 06:30
Static task
static1
Behavioral task
behavioral1
Sample
2dcd6d3d30b1a90306c5321c2dcbf98a_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
2dcd6d3d30b1a90306c5321c2dcbf98a_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
2dcd6d3d30b1a90306c5321c2dcbf98a_JaffaCakes118.html
-
Size
57KB
-
MD5
2dcd6d3d30b1a90306c5321c2dcbf98a
-
SHA1
fadbd36999f4af811e969d9b4869e34842cbcf97
-
SHA256
b5edd4aba86e5d41c07a5af0796cd4f28958217adaeb9f93e30dfea725c5baaf
-
SHA512
c6c50e0023b5abd1bb8691b07f120d9a3292dad37ac3ea4c8c3c9d68c96b8b25b97d9ab5b6a953422e1fab578f1c8bff85cda4dbe7667efbad55d7017372a247
-
SSDEEP
768:zrAEVPgkQVuNt7b5EVPgrrf3GIPu/+vitUcUU6A3uyEPlioA:jdQVAtPYe3BG/+vitU+3lEPl8
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1660 msedge.exe 1660 msedge.exe 2740 msedge.exe 2740 msedge.exe 1356 identity_helper.exe 1356 identity_helper.exe 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe 4128 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe 2740 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2740 wrote to memory of 2964 2740 msedge.exe 82 PID 2740 wrote to memory of 2964 2740 msedge.exe 82 PID 2740 wrote to memory of 4936 2740 msedge.exe 83 PID 2740 wrote to memory of 4936 2740 msedge.exe 83 PID 2740 wrote to memory of 4936 2740 msedge.exe 83 PID 2740 wrote to memory of 4936 2740 msedge.exe 83 PID 2740 wrote to memory of 4936 2740 msedge.exe 83 PID 2740 wrote to memory of 4936 2740 msedge.exe 83 PID 2740 wrote to memory of 4936 2740 msedge.exe 83 PID 2740 wrote to memory of 4936 2740 msedge.exe 83 PID 2740 wrote to memory of 4936 2740 msedge.exe 83 PID 2740 wrote to memory of 4936 2740 msedge.exe 83 PID 2740 wrote to memory of 4936 2740 msedge.exe 83 PID 2740 wrote to memory of 4936 2740 msedge.exe 83 PID 2740 wrote to memory of 4936 2740 msedge.exe 83 PID 2740 wrote to memory of 4936 2740 msedge.exe 83 PID 2740 wrote to memory of 4936 2740 msedge.exe 83 PID 2740 wrote to memory of 4936 2740 msedge.exe 83 PID 2740 wrote to memory of 4936 2740 msedge.exe 83 PID 2740 wrote to memory of 4936 2740 msedge.exe 83 PID 2740 wrote to memory of 4936 2740 msedge.exe 83 PID 2740 wrote to memory of 4936 2740 msedge.exe 83 PID 2740 wrote to memory of 4936 2740 msedge.exe 83 PID 2740 wrote to memory of 4936 2740 msedge.exe 83 PID 2740 wrote to memory of 4936 2740 msedge.exe 83 PID 2740 wrote to memory of 4936 2740 msedge.exe 83 PID 2740 wrote to memory of 4936 2740 msedge.exe 83 PID 2740 wrote to memory of 4936 2740 msedge.exe 83 PID 2740 wrote to memory of 4936 2740 msedge.exe 83 PID 2740 wrote to memory of 4936 2740 msedge.exe 83 PID 2740 wrote to memory of 4936 2740 msedge.exe 83 PID 2740 wrote to memory of 4936 2740 msedge.exe 83 PID 2740 wrote to memory of 4936 2740 msedge.exe 83 PID 2740 wrote to memory of 4936 2740 msedge.exe 83 PID 2740 wrote to memory of 4936 2740 msedge.exe 83 PID 2740 wrote to memory of 4936 2740 msedge.exe 83 PID 2740 wrote to memory of 4936 2740 msedge.exe 83 PID 2740 wrote to memory of 4936 2740 msedge.exe 83 PID 2740 wrote to memory of 4936 2740 msedge.exe 83 PID 2740 wrote to memory of 4936 2740 msedge.exe 83 PID 2740 wrote to memory of 4936 2740 msedge.exe 83 PID 2740 wrote to memory of 4936 2740 msedge.exe 83 PID 2740 wrote to memory of 1660 2740 msedge.exe 84 PID 2740 wrote to memory of 1660 2740 msedge.exe 84 PID 2740 wrote to memory of 3128 2740 msedge.exe 85 PID 2740 wrote to memory of 3128 2740 msedge.exe 85 PID 2740 wrote to memory of 3128 2740 msedge.exe 85 PID 2740 wrote to memory of 3128 2740 msedge.exe 85 PID 2740 wrote to memory of 3128 2740 msedge.exe 85 PID 2740 wrote to memory of 3128 2740 msedge.exe 85 PID 2740 wrote to memory of 3128 2740 msedge.exe 85 PID 2740 wrote to memory of 3128 2740 msedge.exe 85 PID 2740 wrote to memory of 3128 2740 msedge.exe 85 PID 2740 wrote to memory of 3128 2740 msedge.exe 85 PID 2740 wrote to memory of 3128 2740 msedge.exe 85 PID 2740 wrote to memory of 3128 2740 msedge.exe 85 PID 2740 wrote to memory of 3128 2740 msedge.exe 85 PID 2740 wrote to memory of 3128 2740 msedge.exe 85 PID 2740 wrote to memory of 3128 2740 msedge.exe 85 PID 2740 wrote to memory of 3128 2740 msedge.exe 85 PID 2740 wrote to memory of 3128 2740 msedge.exe 85 PID 2740 wrote to memory of 3128 2740 msedge.exe 85 PID 2740 wrote to memory of 3128 2740 msedge.exe 85 PID 2740 wrote to memory of 3128 2740 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2dcd6d3d30b1a90306c5321c2dcbf98a_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff61f746f8,0x7fff61f74708,0x7fff61f747182⤵PID:2964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,13567715169545832935,15981653599391435451,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵PID:4936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,13567715169545832935,15981653599391435451,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2320 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,13567715169545832935,15981653599391435451,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2716 /prefetch:82⤵PID:3128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,13567715169545832935,15981653599391435451,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:1528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,13567715169545832935,15981653599391435451,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:2532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,13567715169545832935,15981653599391435451,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5428 /prefetch:82⤵PID:3956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,13567715169545832935,15981653599391435451,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5428 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,13567715169545832935,15981653599391435451,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5416 /prefetch:12⤵PID:4216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,13567715169545832935,15981653599391435451,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5060 /prefetch:12⤵PID:556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,13567715169545832935,15981653599391435451,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3880 /prefetch:12⤵PID:3328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,13567715169545832935,15981653599391435451,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3428 /prefetch:12⤵PID:3916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,13567715169545832935,15981653599391435451,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5388 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4128
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:904
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4372
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51ac52e2503cc26baee4322f02f5b8d9c
SHA138e0cee911f5f2a24888a64780ffdf6fa72207c8
SHA256f65058c6f1a745b37a64d4c97a8e8ee940210273130cec97a67f568088b5d4d4
SHA5127670d606bc5197ecb7db3ddaecd6f74a80e6decae92b94e0e8145a7f463fa099058e89f9dfa1c45b9197c36e5e21994698186a2ec970bbdb0937fe28ca46a834
-
Filesize
152B
MD5b2a1398f937474c51a48b347387ee36a
SHA1922a8567f09e68a04233e84e5919043034635949
SHA2562dc0bf08246ddd5a32288c895d676017578d792349ca437b1b36e7b2f0ade6d6
SHA5124a660c0549f7a850e07d8d36dab33121af02a7bd7e9b2f0137930b4c8cd89b6c5630e408f882684e6935dcb0d5cb5e01a854950eeda252a4881458cafcc7ef7c
-
Filesize
32KB
MD5f48baec69cc4dc0852d118259eff2d56
SHA1e64c6e4423421da5b35700154810cb67160bc32b
SHA256463d99ca5448f815a05b2d946ddae9eed3e21c335c0f4cfe7a16944e3512f76c
SHA51206fdccb5d9536ab7c68355dbf49ac02ebccad5a4ea01cb62200fd67728a6d05c276403e588a5bdceacf5e671913fc65b63e8b92456ca5493dae5b5a70e4a8b37
-
Filesize
1KB
MD5766ea7d29913521a5919078ae9402cb4
SHA1c48aa0ab2336ba2e7717fbc8b00a38c03027fa8e
SHA256d5e3a32d7b3d6f0b6153c2f6c849ded59691797ee307667fa82af13dd0c0c87f
SHA512d34472444ef57cb73e7cf65787b653b1993ded7dbad77f01f59e35c78b5ecf2cac6dd8c71bf3ba73703add62d2d9495aaed157c2c4f7fa75cbb8b75ad1daa707
-
Filesize
6KB
MD55a886406cbe61e981f66b11eece8514c
SHA1ae6e5aebb26f7a35beab3d2df9ce3ca5e1d7563e
SHA2560c7d9405dabc8402b029add4a416d7fd7ee1e7883fa543fae86357532f6067c2
SHA51213b0c8fc5acac7992d55c570717134e42793d1da85b38490d367ef9cb976c85f76b702a0cd7d29c21c5dd5ed1724f87b1a929bf96d79e842fcf314fb03939657
-
Filesize
5KB
MD5ac09a1de3a2f0c89727cf7977846d702
SHA1f9d79ec5a2f33dbe818803a76fe1744d839f1cc4
SHA256fe27739e53c5ac8a0469a030313150e513df9ee92ba63bd5cc59bd8e1aeb9f23
SHA5128c31fcb294a3200d5082fc10d40adee16d6e25da2cd95152df8b9bba4ca10f91c6a7cb7b53a35fe312a8858a61aecbd33ba7ece29264c3d84e81edf3447fd8c3
-
Filesize
6KB
MD57ad0094e7f42a849018c4a6a241bc93e
SHA1c8c0f8a59d5d5c5b73065cba74b8d2e2514a342f
SHA25641ef6a3f3d21437dc22a2ffda03041d38d635925fd1e3c4af50232f70c8452fb
SHA51265040357355e2fa8f956a0d2824cf367f0992040e03361a09d7d1f0ec0260fa19048491a9e45c433bec4f9374e08f095697ee0e792453f64cc67aeea4c12bb41
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5a813116c4e2caa9e2c00056156c75696
SHA1adadf4e42b403225aaf6de313f3cda4e867d2e56
SHA256f551eeaf5b29c4b5ee61aa30047a559f02883693819cc09112242c30e70daed4
SHA5125ffabe30995e8bedad4c5ed2841996f9d1953527bd78f76f294662ae7907123f92c2b2eec6d6db73c8d16d2cae9d33309fc36d8d93bdb4b07e05377c751884e3