Analysis
-
max time kernel
146s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
10/05/2024, 08:45
Static task
static1
Behavioral task
behavioral1
Sample
2e499104c6070008d9825b7e55252fe0_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2e499104c6070008d9825b7e55252fe0_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
2e499104c6070008d9825b7e55252fe0_JaffaCakes118.html
-
Size
26KB
-
MD5
2e499104c6070008d9825b7e55252fe0
-
SHA1
dd914b15758eaf2737a70d8e376286afc5c7f114
-
SHA256
1b66c552cdf52f45f43963740a438349fee47486050c52fa681597850b797a23
-
SHA512
bb51c59646e81406376c64dcb1c6e49b9649fce28a1325f1af259428c78472119d848c35fe7fa9195bdcfff37d2720928e39c2ef0c963dfce1edd29ad0a8460c
-
SSDEEP
192:uq1bjVb5nPanQjxn5Q/GnQiedNnGnQOkEnt2wnQTbndnQFCJVevo7NtgFo+NzQ48:n1Q/8ygcvbDV
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2976 msedge.exe 2976 msedge.exe 2376 msedge.exe 2376 msedge.exe 2524 identity_helper.exe 2524 identity_helper.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2376 wrote to memory of 4344 2376 msedge.exe 82 PID 2376 wrote to memory of 4344 2376 msedge.exe 82 PID 2376 wrote to memory of 1264 2376 msedge.exe 84 PID 2376 wrote to memory of 1264 2376 msedge.exe 84 PID 2376 wrote to memory of 1264 2376 msedge.exe 84 PID 2376 wrote to memory of 1264 2376 msedge.exe 84 PID 2376 wrote to memory of 1264 2376 msedge.exe 84 PID 2376 wrote to memory of 1264 2376 msedge.exe 84 PID 2376 wrote to memory of 1264 2376 msedge.exe 84 PID 2376 wrote to memory of 1264 2376 msedge.exe 84 PID 2376 wrote to memory of 1264 2376 msedge.exe 84 PID 2376 wrote to memory of 1264 2376 msedge.exe 84 PID 2376 wrote to memory of 1264 2376 msedge.exe 84 PID 2376 wrote to memory of 1264 2376 msedge.exe 84 PID 2376 wrote to memory of 1264 2376 msedge.exe 84 PID 2376 wrote to memory of 1264 2376 msedge.exe 84 PID 2376 wrote to memory of 1264 2376 msedge.exe 84 PID 2376 wrote to memory of 1264 2376 msedge.exe 84 PID 2376 wrote to memory of 1264 2376 msedge.exe 84 PID 2376 wrote to memory of 1264 2376 msedge.exe 84 PID 2376 wrote to memory of 1264 2376 msedge.exe 84 PID 2376 wrote to memory of 1264 2376 msedge.exe 84 PID 2376 wrote to memory of 1264 2376 msedge.exe 84 PID 2376 wrote to memory of 1264 2376 msedge.exe 84 PID 2376 wrote to memory of 1264 2376 msedge.exe 84 PID 2376 wrote to memory of 1264 2376 msedge.exe 84 PID 2376 wrote to memory of 1264 2376 msedge.exe 84 PID 2376 wrote to memory of 1264 2376 msedge.exe 84 PID 2376 wrote to memory of 1264 2376 msedge.exe 84 PID 2376 wrote to memory of 1264 2376 msedge.exe 84 PID 2376 wrote to memory of 1264 2376 msedge.exe 84 PID 2376 wrote to memory of 1264 2376 msedge.exe 84 PID 2376 wrote to memory of 1264 2376 msedge.exe 84 PID 2376 wrote to memory of 1264 2376 msedge.exe 84 PID 2376 wrote to memory of 1264 2376 msedge.exe 84 PID 2376 wrote to memory of 1264 2376 msedge.exe 84 PID 2376 wrote to memory of 1264 2376 msedge.exe 84 PID 2376 wrote to memory of 1264 2376 msedge.exe 84 PID 2376 wrote to memory of 1264 2376 msedge.exe 84 PID 2376 wrote to memory of 1264 2376 msedge.exe 84 PID 2376 wrote to memory of 1264 2376 msedge.exe 84 PID 2376 wrote to memory of 1264 2376 msedge.exe 84 PID 2376 wrote to memory of 2976 2376 msedge.exe 85 PID 2376 wrote to memory of 2976 2376 msedge.exe 85 PID 2376 wrote to memory of 1668 2376 msedge.exe 86 PID 2376 wrote to memory of 1668 2376 msedge.exe 86 PID 2376 wrote to memory of 1668 2376 msedge.exe 86 PID 2376 wrote to memory of 1668 2376 msedge.exe 86 PID 2376 wrote to memory of 1668 2376 msedge.exe 86 PID 2376 wrote to memory of 1668 2376 msedge.exe 86 PID 2376 wrote to memory of 1668 2376 msedge.exe 86 PID 2376 wrote to memory of 1668 2376 msedge.exe 86 PID 2376 wrote to memory of 1668 2376 msedge.exe 86 PID 2376 wrote to memory of 1668 2376 msedge.exe 86 PID 2376 wrote to memory of 1668 2376 msedge.exe 86 PID 2376 wrote to memory of 1668 2376 msedge.exe 86 PID 2376 wrote to memory of 1668 2376 msedge.exe 86 PID 2376 wrote to memory of 1668 2376 msedge.exe 86 PID 2376 wrote to memory of 1668 2376 msedge.exe 86 PID 2376 wrote to memory of 1668 2376 msedge.exe 86 PID 2376 wrote to memory of 1668 2376 msedge.exe 86 PID 2376 wrote to memory of 1668 2376 msedge.exe 86 PID 2376 wrote to memory of 1668 2376 msedge.exe 86 PID 2376 wrote to memory of 1668 2376 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2e499104c6070008d9825b7e55252fe0_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbcb3246f8,0x7ffbcb324708,0x7ffbcb3247182⤵PID:4344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2032,6386588978135877597,5560536597799270382,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1848 /prefetch:22⤵PID:1264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2032,6386588978135877597,5560536597799270382,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2112 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2032,6386588978135877597,5560536597799270382,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2948 /prefetch:82⤵PID:1668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,6386588978135877597,5560536597799270382,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,6386588978135877597,5560536597799270382,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2032,6386588978135877597,5560536597799270382,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5128 /prefetch:82⤵PID:1256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2032,6386588978135877597,5560536597799270382,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5128 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,6386588978135877597,5560536597799270382,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5228 /prefetch:12⤵PID:1212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,6386588978135877597,5560536597799270382,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5244 /prefetch:12⤵PID:4944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,6386588978135877597,5560536597799270382,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3432 /prefetch:12⤵PID:4392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,6386588978135877597,5560536597799270382,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:12⤵PID:4520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2032,6386588978135877597,5560536597799270382,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3648 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1496
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1172
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3520
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f61fa5143fe872d1d8f1e9f8dc6544f9
SHA1df44bab94d7388fb38c63085ec4db80cfc5eb009
SHA256284a24b5b40860240db00ef3ae6a33c9fa8349ab5490a634e27b2c6e9a191c64
SHA512971000784a6518bb39c5cf043292c7ab659162275470f5f6b632ea91a6bcae83bc80517ceb983dd5abfe8fb4e157344cb65c27e609a879eec00b33c5fad563a6
-
Filesize
152B
MD587f7abeb82600e1e640b843ad50fe0a1
SHA1045bbada3f23fc59941bf7d0210fb160cb78ae87
SHA256b35d6906050d90a81d23646f86c20a8f5d42f058ffc6436fb0a2b8bd71ee1262
SHA512ea8e7f24ab823ad710ce079c86c40aa957353a00d2775732c23e31be88a10d212e974c4691279aa86016c4660f5795febf739a15207833df6ed964a9ed99d618
-
Filesize
6KB
MD5c55c6c5186fe7229aaf5c074e700f814
SHA1894f7b8931f307a762450cd8edcc1a1ff031cea7
SHA256ac7e941c8510a19bd3cd7dc911eabf453fd7cbe1137dae7d6a31e0837c30d1ac
SHA512c681e3ebfc945f8b61d424d94397e976acd5871903cd3ba9a80cab1659de64b855875319e26f1107c856f2abc17c7d52a93756e034bbd693db25b6c5d119145b
-
Filesize
6KB
MD5c2b3514ac175049327d6dcd2e4ac2fe2
SHA1be9071682749fc0e4f30c0206e94d0d68b21106c
SHA256fd3865ee5d9a64c337a05eb1e15f3d6c791ea2fee4c188ff2e858128facfa340
SHA512b44c51d81fa665fbb919b492ea4b4f46f31a15be6063727235a0d04963de2d7dd70988096de10674b1457b5c7dd572f47d34ca28791235a287a99891b08f0976
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5b13979dcdbfa743d7d9327589ad80b13
SHA176fdb08e0063a67a69192220b88885e723dc7b7d
SHA2568f24b546bdc4108837fcd8466db2de38599aed31fbddb12b519812ea0e973433
SHA5128f33474dc11ea6726ff46efbec719bcb261f14c3c90c2d1921cbc729b30435ff90054868186bd03726391c3e446276334ecde3632277301a94e2e5a1fa16b54b