Analysis
-
max time kernel
149s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
10/05/2024, 07:16
Static task
static1
Behavioral task
behavioral1
Sample
2df8d4791aa02fa16d8eb8cf7699c70a_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2df8d4791aa02fa16d8eb8cf7699c70a_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
2df8d4791aa02fa16d8eb8cf7699c70a_JaffaCakes118.html
-
Size
16KB
-
MD5
2df8d4791aa02fa16d8eb8cf7699c70a
-
SHA1
abaf47d1dc9ddb347068ac65ca24e1b3c0bb0a6c
-
SHA256
5908798fae2f6e347c0ae2f30d28d37adefa5ee033107fba18145b10fe0ae9d4
-
SHA512
f4ca164a6419f0ddc553705b73c8bae040a2b0fad087353c5463769a2517bac8d06a21d29dab2b152f07ea709eebb674b75601f860da66041ae81775bf31d215
-
SSDEEP
384:SI7UypLFIpuiti1jFHj7NyaRktVfVvM6NNgMZ8G1RsXCGFq:SUyuitAvNyaRyVt06HFZHpGU
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2856 msedge.exe 2856 msedge.exe 1256 msedge.exe 1256 msedge.exe 3244 identity_helper.exe 3244 identity_helper.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1256 wrote to memory of 4128 1256 msedge.exe 81 PID 1256 wrote to memory of 4128 1256 msedge.exe 81 PID 1256 wrote to memory of 2372 1256 msedge.exe 83 PID 1256 wrote to memory of 2372 1256 msedge.exe 83 PID 1256 wrote to memory of 2372 1256 msedge.exe 83 PID 1256 wrote to memory of 2372 1256 msedge.exe 83 PID 1256 wrote to memory of 2372 1256 msedge.exe 83 PID 1256 wrote to memory of 2372 1256 msedge.exe 83 PID 1256 wrote to memory of 2372 1256 msedge.exe 83 PID 1256 wrote to memory of 2372 1256 msedge.exe 83 PID 1256 wrote to memory of 2372 1256 msedge.exe 83 PID 1256 wrote to memory of 2372 1256 msedge.exe 83 PID 1256 wrote to memory of 2372 1256 msedge.exe 83 PID 1256 wrote to memory of 2372 1256 msedge.exe 83 PID 1256 wrote to memory of 2372 1256 msedge.exe 83 PID 1256 wrote to memory of 2372 1256 msedge.exe 83 PID 1256 wrote to memory of 2372 1256 msedge.exe 83 PID 1256 wrote to memory of 2372 1256 msedge.exe 83 PID 1256 wrote to memory of 2372 1256 msedge.exe 83 PID 1256 wrote to memory of 2372 1256 msedge.exe 83 PID 1256 wrote to memory of 2372 1256 msedge.exe 83 PID 1256 wrote to memory of 2372 1256 msedge.exe 83 PID 1256 wrote to memory of 2372 1256 msedge.exe 83 PID 1256 wrote to memory of 2372 1256 msedge.exe 83 PID 1256 wrote to memory of 2372 1256 msedge.exe 83 PID 1256 wrote to memory of 2372 1256 msedge.exe 83 PID 1256 wrote to memory of 2372 1256 msedge.exe 83 PID 1256 wrote to memory of 2372 1256 msedge.exe 83 PID 1256 wrote to memory of 2372 1256 msedge.exe 83 PID 1256 wrote to memory of 2372 1256 msedge.exe 83 PID 1256 wrote to memory of 2372 1256 msedge.exe 83 PID 1256 wrote to memory of 2372 1256 msedge.exe 83 PID 1256 wrote to memory of 2372 1256 msedge.exe 83 PID 1256 wrote to memory of 2372 1256 msedge.exe 83 PID 1256 wrote to memory of 2372 1256 msedge.exe 83 PID 1256 wrote to memory of 2372 1256 msedge.exe 83 PID 1256 wrote to memory of 2372 1256 msedge.exe 83 PID 1256 wrote to memory of 2372 1256 msedge.exe 83 PID 1256 wrote to memory of 2372 1256 msedge.exe 83 PID 1256 wrote to memory of 2372 1256 msedge.exe 83 PID 1256 wrote to memory of 2372 1256 msedge.exe 83 PID 1256 wrote to memory of 2372 1256 msedge.exe 83 PID 1256 wrote to memory of 2856 1256 msedge.exe 84 PID 1256 wrote to memory of 2856 1256 msedge.exe 84 PID 1256 wrote to memory of 3536 1256 msedge.exe 85 PID 1256 wrote to memory of 3536 1256 msedge.exe 85 PID 1256 wrote to memory of 3536 1256 msedge.exe 85 PID 1256 wrote to memory of 3536 1256 msedge.exe 85 PID 1256 wrote to memory of 3536 1256 msedge.exe 85 PID 1256 wrote to memory of 3536 1256 msedge.exe 85 PID 1256 wrote to memory of 3536 1256 msedge.exe 85 PID 1256 wrote to memory of 3536 1256 msedge.exe 85 PID 1256 wrote to memory of 3536 1256 msedge.exe 85 PID 1256 wrote to memory of 3536 1256 msedge.exe 85 PID 1256 wrote to memory of 3536 1256 msedge.exe 85 PID 1256 wrote to memory of 3536 1256 msedge.exe 85 PID 1256 wrote to memory of 3536 1256 msedge.exe 85 PID 1256 wrote to memory of 3536 1256 msedge.exe 85 PID 1256 wrote to memory of 3536 1256 msedge.exe 85 PID 1256 wrote to memory of 3536 1256 msedge.exe 85 PID 1256 wrote to memory of 3536 1256 msedge.exe 85 PID 1256 wrote to memory of 3536 1256 msedge.exe 85 PID 1256 wrote to memory of 3536 1256 msedge.exe 85 PID 1256 wrote to memory of 3536 1256 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2df8d4791aa02fa16d8eb8cf7699c70a_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8fd0746f8,0x7ff8fd074708,0x7ff8fd0747182⤵PID:4128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,11916273438498150942,3670200771346234791,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:22⤵PID:2372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,11916273438498150942,3670200771346234791,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2384 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,11916273438498150942,3670200771346234791,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2712 /prefetch:82⤵PID:3536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,11916273438498150942,3670200771346234791,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:2112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,11916273438498150942,3670200771346234791,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:3000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,11916273438498150942,3670200771346234791,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6132 /prefetch:12⤵PID:2212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,11916273438498150942,3670200771346234791,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5560 /prefetch:82⤵PID:3516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,11916273438498150942,3670200771346234791,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5560 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,11916273438498150942,3670200771346234791,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5980 /prefetch:12⤵PID:4580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,11916273438498150942,3670200771346234791,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5876 /prefetch:12⤵PID:4444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,11916273438498150942,3670200771346234791,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4752 /prefetch:12⤵PID:2060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,11916273438498150942,3670200771346234791,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6068 /prefetch:12⤵PID:1584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,11916273438498150942,3670200771346234791,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1400 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3592
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:400
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2376
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5fc2f08cb558b9d3a4dbce59f534532ac
SHA17be1c101b467f6cb8d3a66f61eca8f7484da0057
SHA256b8c173b08f8403ffb904e5bf203c05a0125cf209ad0c314d2483bd617f6adbc6
SHA51234ba026b3aa0f75d08619354d750f6f719a76c1f805b58b46dc4f6d3b5bd9fce60aa5e934a1022c5c06529475c116088a8a96060539fb2051015b628e5f70fe6
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\900421eb-cf3e-40bf-a760-30249b0c9ab9.tmp
Filesize6KB
MD58ad4083ebeb8325d49bad80a5546f96c
SHA1839567ecb413f8421be8552f3a0e437e8b2c3815
SHA256cb1488e373e36e55039a53e3e8e3301e4f1132fb87a19ab96a1e524222e0f1ba
SHA512a82049796df1758ead5b8a0e00b9ac3f7f2267bf7b08d514f3ef35b60cfb8cdd7cddeb75b92e25a11883f7519c6b69f3df613747e341299e09823ec6aff942c4
-
Filesize
6KB
MD557e48e5e446bc3bc4237efdf289de2fd
SHA125c831f31556fdb4aee5ee12cd3994307aa7dce3
SHA256d5621b29376599603710c07f976201f7dde9f67181ecbccec478d2de28f9bc3a
SHA51228d649b1da49ed8fc61ce98ff9cdc649c122118d665feea4f5e321f808e3ce2a0dbb2218339bb88b0bd66b82fa2357ef654753a0dd51a33ad8e02002d47556e2
-
Filesize
6KB
MD549577508f12391fe39cc2373c43c651a
SHA1154e6042f2389af02d99237f5409a8569abda905
SHA25659faccbb8354acab9f3099318e63eddd9bf870774c742bb0816c7a250355b469
SHA512ee225426050f711352914c84f8ff7384d5f79911179ba4364a4ae30f43158e5ff3db869906eacad7a9cc69c1d743b8d6d602cee0fd2ff42ba2ce7e479a359726
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145