Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
10-05-2024 05:47
Static task
static1
Behavioral task
behavioral1
Sample
2da45f46e94a02376ba12ed191c95592_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2da45f46e94a02376ba12ed191c95592_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
2da45f46e94a02376ba12ed191c95592_JaffaCakes118.html
-
Size
43KB
-
MD5
2da45f46e94a02376ba12ed191c95592
-
SHA1
9041b533869c33239f088125d26efd371647e76b
-
SHA256
7254e45fe4ac18abefd7f8ac8bf268aaa3fedfbbe4209e12d9a665338810c0c6
-
SHA512
889a368e08c14dcef0a6630fded980fe5b52266294d39af24b1205a0549dae1f455c1de6fd6618451207faeffd87b4ba63d7d9b0436ca5eb1bf45307b7704604
-
SSDEEP
768:Hi+BN02F5eMuzz/BIujgNu3JuxPvWV5uPn4hDxkzo/tjARJXF4qIS/G/NN01A:Hi+BN0W5evzz/+rNYJaPvWV5uPn4hDxn
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3288 msedge.exe 3288 msedge.exe 464 msedge.exe 464 msedge.exe 4576 identity_helper.exe 4576 identity_helper.exe 2428 msedge.exe 2428 msedge.exe 2428 msedge.exe 2428 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3288 wrote to memory of 4412 3288 msedge.exe 81 PID 3288 wrote to memory of 4412 3288 msedge.exe 81 PID 3288 wrote to memory of 4948 3288 msedge.exe 82 PID 3288 wrote to memory of 4948 3288 msedge.exe 82 PID 3288 wrote to memory of 4948 3288 msedge.exe 82 PID 3288 wrote to memory of 4948 3288 msedge.exe 82 PID 3288 wrote to memory of 4948 3288 msedge.exe 82 PID 3288 wrote to memory of 4948 3288 msedge.exe 82 PID 3288 wrote to memory of 4948 3288 msedge.exe 82 PID 3288 wrote to memory of 4948 3288 msedge.exe 82 PID 3288 wrote to memory of 4948 3288 msedge.exe 82 PID 3288 wrote to memory of 4948 3288 msedge.exe 82 PID 3288 wrote to memory of 4948 3288 msedge.exe 82 PID 3288 wrote to memory of 4948 3288 msedge.exe 82 PID 3288 wrote to memory of 4948 3288 msedge.exe 82 PID 3288 wrote to memory of 4948 3288 msedge.exe 82 PID 3288 wrote to memory of 4948 3288 msedge.exe 82 PID 3288 wrote to memory of 4948 3288 msedge.exe 82 PID 3288 wrote to memory of 4948 3288 msedge.exe 82 PID 3288 wrote to memory of 4948 3288 msedge.exe 82 PID 3288 wrote to memory of 4948 3288 msedge.exe 82 PID 3288 wrote to memory of 4948 3288 msedge.exe 82 PID 3288 wrote to memory of 4948 3288 msedge.exe 82 PID 3288 wrote to memory of 4948 3288 msedge.exe 82 PID 3288 wrote to memory of 4948 3288 msedge.exe 82 PID 3288 wrote to memory of 4948 3288 msedge.exe 82 PID 3288 wrote to memory of 4948 3288 msedge.exe 82 PID 3288 wrote to memory of 4948 3288 msedge.exe 82 PID 3288 wrote to memory of 4948 3288 msedge.exe 82 PID 3288 wrote to memory of 4948 3288 msedge.exe 82 PID 3288 wrote to memory of 4948 3288 msedge.exe 82 PID 3288 wrote to memory of 4948 3288 msedge.exe 82 PID 3288 wrote to memory of 4948 3288 msedge.exe 82 PID 3288 wrote to memory of 4948 3288 msedge.exe 82 PID 3288 wrote to memory of 4948 3288 msedge.exe 82 PID 3288 wrote to memory of 4948 3288 msedge.exe 82 PID 3288 wrote to memory of 4948 3288 msedge.exe 82 PID 3288 wrote to memory of 4948 3288 msedge.exe 82 PID 3288 wrote to memory of 4948 3288 msedge.exe 82 PID 3288 wrote to memory of 4948 3288 msedge.exe 82 PID 3288 wrote to memory of 4948 3288 msedge.exe 82 PID 3288 wrote to memory of 4948 3288 msedge.exe 82 PID 3288 wrote to memory of 464 3288 msedge.exe 83 PID 3288 wrote to memory of 464 3288 msedge.exe 83 PID 3288 wrote to memory of 4680 3288 msedge.exe 84 PID 3288 wrote to memory of 4680 3288 msedge.exe 84 PID 3288 wrote to memory of 4680 3288 msedge.exe 84 PID 3288 wrote to memory of 4680 3288 msedge.exe 84 PID 3288 wrote to memory of 4680 3288 msedge.exe 84 PID 3288 wrote to memory of 4680 3288 msedge.exe 84 PID 3288 wrote to memory of 4680 3288 msedge.exe 84 PID 3288 wrote to memory of 4680 3288 msedge.exe 84 PID 3288 wrote to memory of 4680 3288 msedge.exe 84 PID 3288 wrote to memory of 4680 3288 msedge.exe 84 PID 3288 wrote to memory of 4680 3288 msedge.exe 84 PID 3288 wrote to memory of 4680 3288 msedge.exe 84 PID 3288 wrote to memory of 4680 3288 msedge.exe 84 PID 3288 wrote to memory of 4680 3288 msedge.exe 84 PID 3288 wrote to memory of 4680 3288 msedge.exe 84 PID 3288 wrote to memory of 4680 3288 msedge.exe 84 PID 3288 wrote to memory of 4680 3288 msedge.exe 84 PID 3288 wrote to memory of 4680 3288 msedge.exe 84 PID 3288 wrote to memory of 4680 3288 msedge.exe 84 PID 3288 wrote to memory of 4680 3288 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2da45f46e94a02376ba12ed191c95592_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3288 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa088046f8,0x7ffa08804708,0x7ffa088047182⤵PID:4412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,10251884083077002326,4406896497831903266,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2096 /prefetch:22⤵PID:4948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2084,10251884083077002326,4406896497831903266,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2308 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2084,10251884083077002326,4406896497831903266,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2580 /prefetch:82⤵PID:4680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,10251884083077002326,4406896497831903266,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3156 /prefetch:12⤵PID:4532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,10251884083077002326,4406896497831903266,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3164 /prefetch:12⤵PID:2888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,10251884083077002326,4406896497831903266,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6076 /prefetch:82⤵PID:1420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,10251884083077002326,4406896497831903266,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6076 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,10251884083077002326,4406896497831903266,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4256 /prefetch:12⤵PID:4324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,10251884083077002326,4406896497831903266,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5136 /prefetch:12⤵PID:4560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,10251884083077002326,4406896497831903266,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4176 /prefetch:12⤵PID:2544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,10251884083077002326,4406896497831903266,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3384 /prefetch:12⤵PID:4080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,10251884083077002326,4406896497831903266,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2776 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2428
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1796
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2348
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5b1c14e0b15c50de9f37ae0ac54ad6c85
SHA1a332607a96b5f2ef915478bde69b9081ad080411
SHA256933b4a4a4b2924d3a45136246d9fe30d920d8faa0404ae6f9cfd71e26097129a
SHA5125d83b2b31dc0d1d70f0de2d27ae5d2af8b8b9d64c0537abffd00f677b0697cc9ff6dbd0f2e693edb8ee249d9892c7c0c3318e532c25565e10f1fa3458c0639ec
-
Filesize
152B
MD556641592f6e69f5f5fb06f2319384490
SHA16a86be42e2c6d26b7830ad9f4e2627995fd91069
SHA25602d4984e590e947265474d592e64edde840fdca7eb881eebde3e220a1d883455
SHA512c75e689b2bbbe07ebf72baf75c56f19c39f45d5593cf47535eb722f95002b3ee418027047c0ee8d63800f499038db5e2c24aff9705d830c7b6eaa290d9adc868
-
Filesize
152B
MD5612a6c4247ef652299b376221c984213
SHA1d306f3b16bde39708aa862aee372345feb559750
SHA2569d8e24c91cff338e56b518a533cb2e49a2803356bbf6e04892fb168a7ce2844a
SHA51234a14d63abb1e3fe0f9927a94393043d458fe0624843e108d290266f554018e6379cba924cb5388735abdd6c5f1e2e318478a673f3f9b762815a758866d10973
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\673f237f-6c6a-4973-b0f7-df8ac5c4d378.tmp
Filesize6KB
MD57db7615d2dd3b3d2318d4cae662147b5
SHA13243671d50bc64135c592c2f7d708441fbb35d98
SHA25658d83fc7d3fdbd75540c44a1ddba030c527a82759e0124c131846cd636f65eb5
SHA5123b3d67eff1ccc3cd9db383400f5843070927bf8359d501bd1334c5a9fc4e2d2d18488594e61c9b076b5e7f666d22ae184385161c7c0e0dd99f117b35ac28ddc4
-
Filesize
6KB
MD5d9987be35fc60ade2eb48f70705404b7
SHA194362978a3aaec255ec616e0a6c7ce2c0c9ced7b
SHA2562285c298b1d134d83a76ca226081ceeef10b59e91756778b3e9b478f6d1621f4
SHA5120f7bbbb1e55a0941242c23f8a2068639e47ec03b89c3adca9fbaa3fe56a0defaf503db9b20ec3923fb25c0418f0218c45eacc7f7309a920b7f91b84188687805
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\bf5c4c99-f3a4-4f04-a3f2-3ea7f2bd3167.tmp
Filesize6KB
MD55ebb7d86023336954bd703485c5ffaea
SHA1701db43e84dbdd2f4e27bcfbbea6a5b701fad3ef
SHA256e6ab52adbfbf514cfcdb6e22a89b4d62c8292a607fbf597197a1d565e749eb34
SHA5125acc4f2de050dba9d049dd83234a94d83180ee684503aeb908e625d7e9a4b7bd265974be572b216a778f5dd55ac478bd01efb64a00d67d938aa5a0970f74c085
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389