Analysis
-
max time kernel
145s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
10-05-2024 05:54
Static task
static1
Behavioral task
behavioral1
Sample
2dab1cada6135e0d91476ed6f7477365_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2dab1cada6135e0d91476ed6f7477365_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
2dab1cada6135e0d91476ed6f7477365_JaffaCakes118.html
-
Size
7KB
-
MD5
2dab1cada6135e0d91476ed6f7477365
-
SHA1
1f72e66f1c6efdde2125799b5c50dbe31524b6f0
-
SHA256
fafcdbe91b555b7ada5150d5b61343cf5002623635abd473785ef7299f0d011e
-
SHA512
1b27e70f910c232b68cbe6cc130b3fa5507476b56993b0a1ea73aad2ced2115c9e8540aadb04a8f35515b72c924173b9b201f2fdd3bad8c552b8b0d60a973ded
-
SSDEEP
96:SIcrJcQSqq1KerHDVbY4jrHSM4bu++B5kJFzbXmTiwWx8bKVuqw1u25BwE5GtAvS:SIcrJFSuTD+BuHelo5ulu9E5lzn1g
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1360 msedge.exe 1360 msedge.exe 228 msedge.exe 228 msedge.exe 2476 identity_helper.exe 2476 identity_helper.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 228 wrote to memory of 2564 228 msedge.exe 82 PID 228 wrote to memory of 2564 228 msedge.exe 82 PID 228 wrote to memory of 640 228 msedge.exe 83 PID 228 wrote to memory of 640 228 msedge.exe 83 PID 228 wrote to memory of 640 228 msedge.exe 83 PID 228 wrote to memory of 640 228 msedge.exe 83 PID 228 wrote to memory of 640 228 msedge.exe 83 PID 228 wrote to memory of 640 228 msedge.exe 83 PID 228 wrote to memory of 640 228 msedge.exe 83 PID 228 wrote to memory of 640 228 msedge.exe 83 PID 228 wrote to memory of 640 228 msedge.exe 83 PID 228 wrote to memory of 640 228 msedge.exe 83 PID 228 wrote to memory of 640 228 msedge.exe 83 PID 228 wrote to memory of 640 228 msedge.exe 83 PID 228 wrote to memory of 640 228 msedge.exe 83 PID 228 wrote to memory of 640 228 msedge.exe 83 PID 228 wrote to memory of 640 228 msedge.exe 83 PID 228 wrote to memory of 640 228 msedge.exe 83 PID 228 wrote to memory of 640 228 msedge.exe 83 PID 228 wrote to memory of 640 228 msedge.exe 83 PID 228 wrote to memory of 640 228 msedge.exe 83 PID 228 wrote to memory of 640 228 msedge.exe 83 PID 228 wrote to memory of 640 228 msedge.exe 83 PID 228 wrote to memory of 640 228 msedge.exe 83 PID 228 wrote to memory of 640 228 msedge.exe 83 PID 228 wrote to memory of 640 228 msedge.exe 83 PID 228 wrote to memory of 640 228 msedge.exe 83 PID 228 wrote to memory of 640 228 msedge.exe 83 PID 228 wrote to memory of 640 228 msedge.exe 83 PID 228 wrote to memory of 640 228 msedge.exe 83 PID 228 wrote to memory of 640 228 msedge.exe 83 PID 228 wrote to memory of 640 228 msedge.exe 83 PID 228 wrote to memory of 640 228 msedge.exe 83 PID 228 wrote to memory of 640 228 msedge.exe 83 PID 228 wrote to memory of 640 228 msedge.exe 83 PID 228 wrote to memory of 640 228 msedge.exe 83 PID 228 wrote to memory of 640 228 msedge.exe 83 PID 228 wrote to memory of 640 228 msedge.exe 83 PID 228 wrote to memory of 640 228 msedge.exe 83 PID 228 wrote to memory of 640 228 msedge.exe 83 PID 228 wrote to memory of 640 228 msedge.exe 83 PID 228 wrote to memory of 640 228 msedge.exe 83 PID 228 wrote to memory of 1360 228 msedge.exe 84 PID 228 wrote to memory of 1360 228 msedge.exe 84 PID 228 wrote to memory of 4560 228 msedge.exe 85 PID 228 wrote to memory of 4560 228 msedge.exe 85 PID 228 wrote to memory of 4560 228 msedge.exe 85 PID 228 wrote to memory of 4560 228 msedge.exe 85 PID 228 wrote to memory of 4560 228 msedge.exe 85 PID 228 wrote to memory of 4560 228 msedge.exe 85 PID 228 wrote to memory of 4560 228 msedge.exe 85 PID 228 wrote to memory of 4560 228 msedge.exe 85 PID 228 wrote to memory of 4560 228 msedge.exe 85 PID 228 wrote to memory of 4560 228 msedge.exe 85 PID 228 wrote to memory of 4560 228 msedge.exe 85 PID 228 wrote to memory of 4560 228 msedge.exe 85 PID 228 wrote to memory of 4560 228 msedge.exe 85 PID 228 wrote to memory of 4560 228 msedge.exe 85 PID 228 wrote to memory of 4560 228 msedge.exe 85 PID 228 wrote to memory of 4560 228 msedge.exe 85 PID 228 wrote to memory of 4560 228 msedge.exe 85 PID 228 wrote to memory of 4560 228 msedge.exe 85 PID 228 wrote to memory of 4560 228 msedge.exe 85 PID 228 wrote to memory of 4560 228 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2dab1cada6135e0d91476ed6f7477365_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:228 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa82ad46f8,0x7ffa82ad4708,0x7ffa82ad47182⤵PID:2564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2180,12966319371965150844,3192002738649001491,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2200 /prefetch:22⤵PID:640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2180,12966319371965150844,3192002738649001491,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2252 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2180,12966319371965150844,3192002738649001491,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2964 /prefetch:82⤵PID:4560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,12966319371965150844,3192002738649001491,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:12⤵PID:2312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,12966319371965150844,3192002738649001491,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3368 /prefetch:12⤵PID:4920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,12966319371965150844,3192002738649001491,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4696 /prefetch:12⤵PID:3784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2180,12966319371965150844,3192002738649001491,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3744 /prefetch:82⤵PID:4876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2180,12966319371965150844,3192002738649001491,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3744 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,12966319371965150844,3192002738649001491,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3984 /prefetch:12⤵PID:3448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,12966319371965150844,3192002738649001491,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3972 /prefetch:12⤵PID:4820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,12966319371965150844,3192002738649001491,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4084 /prefetch:12⤵PID:3224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,12966319371965150844,3192002738649001491,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4704 /prefetch:12⤵PID:1392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2180,12966319371965150844,3192002738649001491,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3004 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1468
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2368
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4064
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54b4f91fa1b362ba5341ecb2836438dea
SHA19561f5aabed742404d455da735259a2c6781fa07
SHA256d824b742eace197ddc8b6ed5d918f390fde4b0fbf0e371b8e1f2ed40a3b6455c
SHA512fef22217dcdd8000bc193e25129699d4b8f7a103ca4fe1613baf73ccf67090d9fbae27eb93e4bb8747455853a0a4326f2d0c38df41c8d42351cdcd4132418dac
-
Filesize
152B
MD5eaa3db555ab5bc0cb364826204aad3f0
SHA1a4cdfaac8de49e6e6e88b335cfeaa7c9e3c563ca
SHA256ef7baeb1b2ab05ff3c5fbb76c2759db49294654548706c7c8e87f0cde855b86b
SHA512e13981da51b52c15261ecabb98af32f9b920651b46b10ce0cc823c5878b22eb1420258c80deef204070d1e0bdd3a64d875ac2522e3713a3cf11657aa55aeccd4
-
Filesize
6KB
MD5ec4e7a1ef81f3a96ea4707617d064dfa
SHA1105207c535174ab7ff358790cf01a8f48db3786d
SHA256be7317957384686b3e6ed06bfd2d6aac56420b286887e48ecd6a5e5c78a2e1a9
SHA512e622f5967540cecd09304cbaf2b5596850334ecbb7187aaa3f10025dbe58f922229df67369284798c8535eebd3d1c9f0aeeb0f7f5c5f898b935f76297bec8de9
-
Filesize
6KB
MD548bc79a42061b0d554a7ea577bf2db3c
SHA16984104bedc80b2313c7e8d02eba2b2526876345
SHA2563c8c563b95ee165dc77f658db5e9b4b2b64f8a2aac83c9ab30002e475fbe45d5
SHA5121d93d5eebe27e20d004542aab0663f05ebf8c157de1b4153c0b3d6cfd6bda5a196b3d2eda6b3ce8fd6b8c83a9e408dbf850855cfb90768ef5d3ae14a0b1a954a
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD50a92da39008e6c64cbd04ab5bc2a39fc
SHA1a1e64fe4c7d28d43d37b1105ccb23dd1e786f8dc
SHA256e977b4feda2f961a72c6bc81555aa694e06aebba90f7b7c12e0f1d40da6707c5
SHA51295270ea0323d9f37b168a91728ea34c774c97b3fd24a8ef4c4ff4c7adeade58ab9b5ee7b8d04bc7e40912a0ac98274274318484265be3ab1d0da321866f3c13a