Analysis
-
max time kernel
145s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
10-05-2024 07:12
Static task
static1
Behavioral task
behavioral1
Sample
2df4bad18d40bf639f856d159654cc73_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2df4bad18d40bf639f856d159654cc73_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
2df4bad18d40bf639f856d159654cc73_JaffaCakes118.html
-
Size
36KB
-
MD5
2df4bad18d40bf639f856d159654cc73
-
SHA1
2c95a0727e5d7d2136c074743a424b0041de5572
-
SHA256
5e26e9f2fbd606c920c3f58c9530871f1706a1d93c15daf1449f8f4c0d6f2754
-
SHA512
c425c7b3dff3c7c401bff1c4114b71f46d8811e7ecab2e1274ef8c9865b907b74f162bf1d16e761e9de051d25a786e81b3c4863a72b0b9ab16506f4c126a1263
-
SSDEEP
768:zwx/MDTHm488hARhZPXwE1XnXrFLxNLlDNoPqkPTHlnkM3Gr6ThZOg6f9U56lLRY:Q/9bJxNVNufSM/P8BK
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3048 msedge.exe 3048 msedge.exe 4404 msedge.exe 4404 msedge.exe 576 identity_helper.exe 576 identity_helper.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4404 wrote to memory of 208 4404 msedge.exe 84 PID 4404 wrote to memory of 208 4404 msedge.exe 84 PID 4404 wrote to memory of 4580 4404 msedge.exe 86 PID 4404 wrote to memory of 4580 4404 msedge.exe 86 PID 4404 wrote to memory of 4580 4404 msedge.exe 86 PID 4404 wrote to memory of 4580 4404 msedge.exe 86 PID 4404 wrote to memory of 4580 4404 msedge.exe 86 PID 4404 wrote to memory of 4580 4404 msedge.exe 86 PID 4404 wrote to memory of 4580 4404 msedge.exe 86 PID 4404 wrote to memory of 4580 4404 msedge.exe 86 PID 4404 wrote to memory of 4580 4404 msedge.exe 86 PID 4404 wrote to memory of 4580 4404 msedge.exe 86 PID 4404 wrote to memory of 4580 4404 msedge.exe 86 PID 4404 wrote to memory of 4580 4404 msedge.exe 86 PID 4404 wrote to memory of 4580 4404 msedge.exe 86 PID 4404 wrote to memory of 4580 4404 msedge.exe 86 PID 4404 wrote to memory of 4580 4404 msedge.exe 86 PID 4404 wrote to memory of 4580 4404 msedge.exe 86 PID 4404 wrote to memory of 4580 4404 msedge.exe 86 PID 4404 wrote to memory of 4580 4404 msedge.exe 86 PID 4404 wrote to memory of 4580 4404 msedge.exe 86 PID 4404 wrote to memory of 4580 4404 msedge.exe 86 PID 4404 wrote to memory of 4580 4404 msedge.exe 86 PID 4404 wrote to memory of 4580 4404 msedge.exe 86 PID 4404 wrote to memory of 4580 4404 msedge.exe 86 PID 4404 wrote to memory of 4580 4404 msedge.exe 86 PID 4404 wrote to memory of 4580 4404 msedge.exe 86 PID 4404 wrote to memory of 4580 4404 msedge.exe 86 PID 4404 wrote to memory of 4580 4404 msedge.exe 86 PID 4404 wrote to memory of 4580 4404 msedge.exe 86 PID 4404 wrote to memory of 4580 4404 msedge.exe 86 PID 4404 wrote to memory of 4580 4404 msedge.exe 86 PID 4404 wrote to memory of 4580 4404 msedge.exe 86 PID 4404 wrote to memory of 4580 4404 msedge.exe 86 PID 4404 wrote to memory of 4580 4404 msedge.exe 86 PID 4404 wrote to memory of 4580 4404 msedge.exe 86 PID 4404 wrote to memory of 4580 4404 msedge.exe 86 PID 4404 wrote to memory of 4580 4404 msedge.exe 86 PID 4404 wrote to memory of 4580 4404 msedge.exe 86 PID 4404 wrote to memory of 4580 4404 msedge.exe 86 PID 4404 wrote to memory of 4580 4404 msedge.exe 86 PID 4404 wrote to memory of 4580 4404 msedge.exe 86 PID 4404 wrote to memory of 3048 4404 msedge.exe 87 PID 4404 wrote to memory of 3048 4404 msedge.exe 87 PID 4404 wrote to memory of 2920 4404 msedge.exe 88 PID 4404 wrote to memory of 2920 4404 msedge.exe 88 PID 4404 wrote to memory of 2920 4404 msedge.exe 88 PID 4404 wrote to memory of 2920 4404 msedge.exe 88 PID 4404 wrote to memory of 2920 4404 msedge.exe 88 PID 4404 wrote to memory of 2920 4404 msedge.exe 88 PID 4404 wrote to memory of 2920 4404 msedge.exe 88 PID 4404 wrote to memory of 2920 4404 msedge.exe 88 PID 4404 wrote to memory of 2920 4404 msedge.exe 88 PID 4404 wrote to memory of 2920 4404 msedge.exe 88 PID 4404 wrote to memory of 2920 4404 msedge.exe 88 PID 4404 wrote to memory of 2920 4404 msedge.exe 88 PID 4404 wrote to memory of 2920 4404 msedge.exe 88 PID 4404 wrote to memory of 2920 4404 msedge.exe 88 PID 4404 wrote to memory of 2920 4404 msedge.exe 88 PID 4404 wrote to memory of 2920 4404 msedge.exe 88 PID 4404 wrote to memory of 2920 4404 msedge.exe 88 PID 4404 wrote to memory of 2920 4404 msedge.exe 88 PID 4404 wrote to memory of 2920 4404 msedge.exe 88 PID 4404 wrote to memory of 2920 4404 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2df4bad18d40bf639f856d159654cc73_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4404 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xb4,0x108,0x7ff8c93a46f8,0x7ff8c93a4708,0x7ff8c93a47182⤵PID:208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2240,11461018470776660095,14023048361000280970,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2272 /prefetch:22⤵PID:4580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2240,11461018470776660095,14023048361000280970,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2324 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2240,11461018470776660095,14023048361000280970,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2804 /prefetch:82⤵PID:2920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2240,11461018470776660095,14023048361000280970,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:1576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2240,11461018470776660095,14023048361000280970,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:4576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2240,11461018470776660095,14023048361000280970,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5476 /prefetch:12⤵PID:3208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2240,11461018470776660095,14023048361000280970,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5492 /prefetch:12⤵PID:4320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2240,11461018470776660095,14023048361000280970,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5864 /prefetch:82⤵PID:1728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2240,11461018470776660095,14023048361000280970,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5864 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2240,11461018470776660095,14023048361000280970,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4132 /prefetch:12⤵PID:4268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2240,11461018470776660095,14023048361000280970,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4980 /prefetch:12⤵PID:212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2240,11461018470776660095,14023048361000280970,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3956
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3432
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4904
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54f7152bc5a1a715ef481e37d1c791959
SHA1c8a1ed674c62ae4f45519f90a8cc5a81eff3a6d7
SHA256704dd4f98d8ca34ec421f23ba1891b178c23c14b3301e4655efc5c02d356c2bc
SHA5122e6b02ca35d76a655a17a5f3e9dbd8d7517c7dae24f0095c7350eb9e7bdf9e1256a7009aa8878f96c89d1ea4fe5323a41f72b8c551806dda62880d7ff231ff5c
-
Filesize
152B
MD5ea98e583ad99df195d29aa066204ab56
SHA1f89398664af0179641aa0138b337097b617cb2db
SHA256a7abb51435909fa2d75c6f2ff5c69a93d4a0ab276ed579e7d8733b2a63ffbee6
SHA512e109be3466e653e5d310b3e402e1626298b09205d223722a82344dd78504f3c33e1e24e8402a02f38cd2c9c50d96a303ce4846bea5a583423937ab018cd5782f
-
Filesize
613B
MD5f1b666f4e5cc867bef5c716d6d9531ff
SHA1fc3363e384359b0fad401385af6d8d44e01c3c33
SHA2563e211668b478be84c0161c814ed7ff3d5442a227bdce2e978a5d75eb73ea8661
SHA5123c58dee0df6bf8841864ad4223880464016674d6215729cb438ccf049b3414df846b6cf2221d7433c54acf4453ecfe91a2340ff7ae576823c70d2b51e3b7e491
-
Filesize
5KB
MD5b193b2b205efa83fe3f66c84db7df408
SHA11e392ceb8f411bd875f53c38ec11ddd1b6f17efc
SHA25627b947c491690b2d5df71fcee695f8d11a8be91dbb59478bad63b2148914ae82
SHA5124b7846f6c01e0b08e42fa07865865de50a8f179416fd07555e52ab7878b10dabdfa17e15ba50378a6c9e9b79c03d2f04ca77d2ff39f06a62fe7833371e33af5a
-
Filesize
6KB
MD5c1fe93ccd1acfe28515c31491dff2db9
SHA1204d0228d196f9fa2a66eb7652ea94848aae467c
SHA256d2f8c4b6df84c508f4e09d38ef54bf58acb769d195d92dffa5ef029f9ecc2c3e
SHA512616a7a45201de796c7edf72b704083ad89bacd632c146c6d96a820e6ced15115d4c12612d4b24d579513864629707b843f96254366ea7fb506ced1ca72b1329e
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD59daef498c2f2e0c9587e945ceecccfac
SHA1190541597b65ec015d6a50a76d78084e52ad1499
SHA256aa544cc31ebd5871257901096eb02447a3dee402ec37fb6a8c8a7a8115df8045
SHA512955db883472f31d23d4eadee7ec5ff7f72c67c726bbe03f614929f3572c732e14ff4b56ee22bd68ad49288e092df32468e556d2bf2e6a28dfa91f49f6799aac7