Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
10-05-2024 07:32
Static task
static1
Behavioral task
behavioral1
Sample
2e08a3b4c8ae5ecc5c929b607493a4ce_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2e08a3b4c8ae5ecc5c929b607493a4ce_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
2e08a3b4c8ae5ecc5c929b607493a4ce_JaffaCakes118.html
-
Size
201KB
-
MD5
2e08a3b4c8ae5ecc5c929b607493a4ce
-
SHA1
399122bc2bbc5fe79dc885f3a0c63b1be7ef7048
-
SHA256
9a19a1a7aa769520ab7373bf15ceb0a0b5088ba901c6c73d68ee25b9d443a38e
-
SHA512
5576e12646087682064d5391d134f2089eede057f32bcd14dd52c4f9059ce85e9d2547e4f7e1b11c50260e588846c33757ced446fab847379219ad7da29c8d61
-
SSDEEP
1536:kaWX+cI8QmkVguwlaVcIIdXXwWOrnkr/K3NfC0B/5gLGvM:dWpXXhu+
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1872 msedge.exe 1872 msedge.exe 4984 msedge.exe 4984 msedge.exe 1048 identity_helper.exe 1048 identity_helper.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4984 wrote to memory of 1868 4984 msedge.exe 81 PID 4984 wrote to memory of 1868 4984 msedge.exe 81 PID 4984 wrote to memory of 4336 4984 msedge.exe 83 PID 4984 wrote to memory of 4336 4984 msedge.exe 83 PID 4984 wrote to memory of 4336 4984 msedge.exe 83 PID 4984 wrote to memory of 4336 4984 msedge.exe 83 PID 4984 wrote to memory of 4336 4984 msedge.exe 83 PID 4984 wrote to memory of 4336 4984 msedge.exe 83 PID 4984 wrote to memory of 4336 4984 msedge.exe 83 PID 4984 wrote to memory of 4336 4984 msedge.exe 83 PID 4984 wrote to memory of 4336 4984 msedge.exe 83 PID 4984 wrote to memory of 4336 4984 msedge.exe 83 PID 4984 wrote to memory of 4336 4984 msedge.exe 83 PID 4984 wrote to memory of 4336 4984 msedge.exe 83 PID 4984 wrote to memory of 4336 4984 msedge.exe 83 PID 4984 wrote to memory of 4336 4984 msedge.exe 83 PID 4984 wrote to memory of 4336 4984 msedge.exe 83 PID 4984 wrote to memory of 4336 4984 msedge.exe 83 PID 4984 wrote to memory of 4336 4984 msedge.exe 83 PID 4984 wrote to memory of 4336 4984 msedge.exe 83 PID 4984 wrote to memory of 4336 4984 msedge.exe 83 PID 4984 wrote to memory of 4336 4984 msedge.exe 83 PID 4984 wrote to memory of 4336 4984 msedge.exe 83 PID 4984 wrote to memory of 4336 4984 msedge.exe 83 PID 4984 wrote to memory of 4336 4984 msedge.exe 83 PID 4984 wrote to memory of 4336 4984 msedge.exe 83 PID 4984 wrote to memory of 4336 4984 msedge.exe 83 PID 4984 wrote to memory of 4336 4984 msedge.exe 83 PID 4984 wrote to memory of 4336 4984 msedge.exe 83 PID 4984 wrote to memory of 4336 4984 msedge.exe 83 PID 4984 wrote to memory of 4336 4984 msedge.exe 83 PID 4984 wrote to memory of 4336 4984 msedge.exe 83 PID 4984 wrote to memory of 4336 4984 msedge.exe 83 PID 4984 wrote to memory of 4336 4984 msedge.exe 83 PID 4984 wrote to memory of 4336 4984 msedge.exe 83 PID 4984 wrote to memory of 4336 4984 msedge.exe 83 PID 4984 wrote to memory of 4336 4984 msedge.exe 83 PID 4984 wrote to memory of 4336 4984 msedge.exe 83 PID 4984 wrote to memory of 4336 4984 msedge.exe 83 PID 4984 wrote to memory of 4336 4984 msedge.exe 83 PID 4984 wrote to memory of 4336 4984 msedge.exe 83 PID 4984 wrote to memory of 4336 4984 msedge.exe 83 PID 4984 wrote to memory of 1872 4984 msedge.exe 84 PID 4984 wrote to memory of 1872 4984 msedge.exe 84 PID 4984 wrote to memory of 2788 4984 msedge.exe 85 PID 4984 wrote to memory of 2788 4984 msedge.exe 85 PID 4984 wrote to memory of 2788 4984 msedge.exe 85 PID 4984 wrote to memory of 2788 4984 msedge.exe 85 PID 4984 wrote to memory of 2788 4984 msedge.exe 85 PID 4984 wrote to memory of 2788 4984 msedge.exe 85 PID 4984 wrote to memory of 2788 4984 msedge.exe 85 PID 4984 wrote to memory of 2788 4984 msedge.exe 85 PID 4984 wrote to memory of 2788 4984 msedge.exe 85 PID 4984 wrote to memory of 2788 4984 msedge.exe 85 PID 4984 wrote to memory of 2788 4984 msedge.exe 85 PID 4984 wrote to memory of 2788 4984 msedge.exe 85 PID 4984 wrote to memory of 2788 4984 msedge.exe 85 PID 4984 wrote to memory of 2788 4984 msedge.exe 85 PID 4984 wrote to memory of 2788 4984 msedge.exe 85 PID 4984 wrote to memory of 2788 4984 msedge.exe 85 PID 4984 wrote to memory of 2788 4984 msedge.exe 85 PID 4984 wrote to memory of 2788 4984 msedge.exe 85 PID 4984 wrote to memory of 2788 4984 msedge.exe 85 PID 4984 wrote to memory of 2788 4984 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2e08a3b4c8ae5ecc5c929b607493a4ce_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4984 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa54c746f8,0x7ffa54c74708,0x7ffa54c747182⤵PID:1868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,17533807223265296913,3387959962710854910,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2168 /prefetch:22⤵PID:4336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2152,17533807223265296913,3387959962710854910,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2252 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2152,17533807223265296913,3387959962710854910,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2664 /prefetch:82⤵PID:2788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,17533807223265296913,3387959962710854910,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:5016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,17533807223265296913,3387959962710854910,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:3956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,17533807223265296913,3387959962710854910,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4648 /prefetch:12⤵PID:3568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,17533807223265296913,3387959962710854910,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5632 /prefetch:82⤵PID:2936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,17533807223265296913,3387959962710854910,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5632 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,17533807223265296913,3387959962710854910,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5444 /prefetch:12⤵PID:2148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,17533807223265296913,3387959962710854910,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5436 /prefetch:12⤵PID:3300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,17533807223265296913,3387959962710854910,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4672 /prefetch:12⤵PID:960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,17533807223265296913,3387959962710854910,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4736 /prefetch:12⤵PID:884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,17533807223265296913,3387959962710854910,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4952 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4120
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4244
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3420
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
255B
MD584b28e8ffed9fa0b8f6a91b5b31b308d
SHA1efaf4dff37c34966c481eef0caf7dacee9e2a78c
SHA256cf81f066b1ba1e869f5551bbc61c497d91035e2afcb750c3e63d5c7644b0b29c
SHA512a838f81d13c5ecf02aedcdc60159f4b3f6e22e1f14c566ee3b2765e5645fe0eebabe24124ac018ea64986261c904e5bb50512708babe39bde76d7a5ab9280ea9
-
Filesize
6KB
MD5ff6b1445eeb36626c1f176179f51cead
SHA113033eccbc60f89c51ac814c0680d20596edfeb3
SHA25658f25bdbde673693469de88a1aab8f580655b0a824228d5c2205ef9983824f39
SHA512581204f61ad613e88a8f1f505dee94430977b37b9fd6f12287d65ecadd13e44585033fb66eec8e15452fa5c44f060c0c1d8858504bf53feb9c22febbda2109f2
-
Filesize
6KB
MD59766389a950b8a8482a76c8687ba4f3a
SHA1880e54056eb23cd2cbc4b9d1c254290f44387bf5
SHA2560e4449bcee9bd4af24df6ac6f2906d30cb84159220f48b7dc9680e97c53d6dce
SHA512f8944a84da7f86739e479e2292c9ea2739a801815b398ccb4089bb9a14a2b838ce69910065f5a01672df439d921c3cf0deefd60555e6be1979f01304f6f456fe
-
Filesize
6KB
MD509a623ca5490e5142fa64442baad8bb3
SHA1092c3f8adedd00919e25000f0fe9eeb15a7812bf
SHA256c5b5e8da4ce98530e2b78c0e19e5cde3b73f9b866526ebeca2fe961b1b0d422e
SHA51274d7678dd5958468880db68aa61d919e2c202aae8269227ae4873e7385cf320f5490c0ae4ca9af66301c0ee96dd1d4bdf646a6a1b6fcce9a058dae206ee35716
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD5b25bd6dae603ecd58e0515506af368e3
SHA1773c11a65dcd48151a33da5f700ac862f009189b
SHA2569ef64792315f70624c1f2f30db3558f50a3cf178e12b000049eddff9aa973175
SHA5127917ead452e33959a264e368d0c12d3174a9aeee93d687d1f3e2fe8b65e1967652f37a16ec4fe06f0b63e77da387332c44e7b129562b5544693a8fc14e5d0b84