Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
10/05/2024, 15:03
Static task
static1
Behavioral task
behavioral1
Sample
2fb2f6b5dfa0e00408a4fa29557a0dd7_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
2fb2f6b5dfa0e00408a4fa29557a0dd7_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
2fb2f6b5dfa0e00408a4fa29557a0dd7_JaffaCakes118.html
-
Size
19KB
-
MD5
2fb2f6b5dfa0e00408a4fa29557a0dd7
-
SHA1
fcdc770af6e0cd5e5dc2ebfbe93e3d7111607b33
-
SHA256
20777722d375fffda13f7a8f064b8cc3ceb6e2227633388a64963c0da21200de
-
SHA512
3f6101dce8cd934f54f4261fc3d258ca03ee63200b0627605df73a1bf8da470f6fdbed7aae5bbe20109dea73c429bcd1787c90a10e8bae873de5c8a8ad701b8e
-
SSDEEP
384:SxSn6sjSvyFDfIzqrFXgaqKbTvz12LIiguF3jpRXjSh9FdWuWAsR:SknTBDQzO9knjpljaFUuWbR
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2496 msedge.exe 2496 msedge.exe 4800 msedge.exe 4800 msedge.exe 3276 identity_helper.exe 3276 identity_helper.exe 1996 msedge.exe 1996 msedge.exe 1996 msedge.exe 1996 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4800 wrote to memory of 1112 4800 msedge.exe 85 PID 4800 wrote to memory of 1112 4800 msedge.exe 85 PID 4800 wrote to memory of 3016 4800 msedge.exe 86 PID 4800 wrote to memory of 3016 4800 msedge.exe 86 PID 4800 wrote to memory of 3016 4800 msedge.exe 86 PID 4800 wrote to memory of 3016 4800 msedge.exe 86 PID 4800 wrote to memory of 3016 4800 msedge.exe 86 PID 4800 wrote to memory of 3016 4800 msedge.exe 86 PID 4800 wrote to memory of 3016 4800 msedge.exe 86 PID 4800 wrote to memory of 3016 4800 msedge.exe 86 PID 4800 wrote to memory of 3016 4800 msedge.exe 86 PID 4800 wrote to memory of 3016 4800 msedge.exe 86 PID 4800 wrote to memory of 3016 4800 msedge.exe 86 PID 4800 wrote to memory of 3016 4800 msedge.exe 86 PID 4800 wrote to memory of 3016 4800 msedge.exe 86 PID 4800 wrote to memory of 3016 4800 msedge.exe 86 PID 4800 wrote to memory of 3016 4800 msedge.exe 86 PID 4800 wrote to memory of 3016 4800 msedge.exe 86 PID 4800 wrote to memory of 3016 4800 msedge.exe 86 PID 4800 wrote to memory of 3016 4800 msedge.exe 86 PID 4800 wrote to memory of 3016 4800 msedge.exe 86 PID 4800 wrote to memory of 3016 4800 msedge.exe 86 PID 4800 wrote to memory of 3016 4800 msedge.exe 86 PID 4800 wrote to memory of 3016 4800 msedge.exe 86 PID 4800 wrote to memory of 3016 4800 msedge.exe 86 PID 4800 wrote to memory of 3016 4800 msedge.exe 86 PID 4800 wrote to memory of 3016 4800 msedge.exe 86 PID 4800 wrote to memory of 3016 4800 msedge.exe 86 PID 4800 wrote to memory of 3016 4800 msedge.exe 86 PID 4800 wrote to memory of 3016 4800 msedge.exe 86 PID 4800 wrote to memory of 3016 4800 msedge.exe 86 PID 4800 wrote to memory of 3016 4800 msedge.exe 86 PID 4800 wrote to memory of 3016 4800 msedge.exe 86 PID 4800 wrote to memory of 3016 4800 msedge.exe 86 PID 4800 wrote to memory of 3016 4800 msedge.exe 86 PID 4800 wrote to memory of 3016 4800 msedge.exe 86 PID 4800 wrote to memory of 3016 4800 msedge.exe 86 PID 4800 wrote to memory of 3016 4800 msedge.exe 86 PID 4800 wrote to memory of 3016 4800 msedge.exe 86 PID 4800 wrote to memory of 3016 4800 msedge.exe 86 PID 4800 wrote to memory of 3016 4800 msedge.exe 86 PID 4800 wrote to memory of 3016 4800 msedge.exe 86 PID 4800 wrote to memory of 2496 4800 msedge.exe 87 PID 4800 wrote to memory of 2496 4800 msedge.exe 87 PID 4800 wrote to memory of 5116 4800 msedge.exe 88 PID 4800 wrote to memory of 5116 4800 msedge.exe 88 PID 4800 wrote to memory of 5116 4800 msedge.exe 88 PID 4800 wrote to memory of 5116 4800 msedge.exe 88 PID 4800 wrote to memory of 5116 4800 msedge.exe 88 PID 4800 wrote to memory of 5116 4800 msedge.exe 88 PID 4800 wrote to memory of 5116 4800 msedge.exe 88 PID 4800 wrote to memory of 5116 4800 msedge.exe 88 PID 4800 wrote to memory of 5116 4800 msedge.exe 88 PID 4800 wrote to memory of 5116 4800 msedge.exe 88 PID 4800 wrote to memory of 5116 4800 msedge.exe 88 PID 4800 wrote to memory of 5116 4800 msedge.exe 88 PID 4800 wrote to memory of 5116 4800 msedge.exe 88 PID 4800 wrote to memory of 5116 4800 msedge.exe 88 PID 4800 wrote to memory of 5116 4800 msedge.exe 88 PID 4800 wrote to memory of 5116 4800 msedge.exe 88 PID 4800 wrote to memory of 5116 4800 msedge.exe 88 PID 4800 wrote to memory of 5116 4800 msedge.exe 88 PID 4800 wrote to memory of 5116 4800 msedge.exe 88 PID 4800 wrote to memory of 5116 4800 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2fb2f6b5dfa0e00408a4fa29557a0dd7_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4800 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff28d446f8,0x7fff28d44708,0x7fff28d447182⤵PID:1112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,17562169811760087183,7168451405339479236,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:22⤵PID:3016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,17562169811760087183,7168451405339479236,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2280 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,17562169811760087183,7168451405339479236,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2864 /prefetch:82⤵PID:5116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,17562169811760087183,7168451405339479236,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:4568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,17562169811760087183,7168451405339479236,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:12⤵PID:2816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,17562169811760087183,7168451405339479236,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4744 /prefetch:12⤵PID:2512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,17562169811760087183,7168451405339479236,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4708 /prefetch:12⤵PID:1344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,17562169811760087183,7168451405339479236,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5880 /prefetch:82⤵PID:3536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,17562169811760087183,7168451405339479236,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5880 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,17562169811760087183,7168451405339479236,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5996 /prefetch:12⤵PID:752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,17562169811760087183,7168451405339479236,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5064 /prefetch:12⤵PID:5072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,17562169811760087183,7168451405339479236,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4120 /prefetch:12⤵PID:3536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,17562169811760087183,7168451405339479236,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5212 /prefetch:12⤵PID:3616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,17562169811760087183,7168451405339479236,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4236 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1996
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2556
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4356
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2108
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51ac52e2503cc26baee4322f02f5b8d9c
SHA138e0cee911f5f2a24888a64780ffdf6fa72207c8
SHA256f65058c6f1a745b37a64d4c97a8e8ee940210273130cec97a67f568088b5d4d4
SHA5127670d606bc5197ecb7db3ddaecd6f74a80e6decae92b94e0e8145a7f463fa099058e89f9dfa1c45b9197c36e5e21994698186a2ec970bbdb0937fe28ca46a834
-
Filesize
152B
MD5b2a1398f937474c51a48b347387ee36a
SHA1922a8567f09e68a04233e84e5919043034635949
SHA2562dc0bf08246ddd5a32288c895d676017578d792349ca437b1b36e7b2f0ade6d6
SHA5124a660c0549f7a850e07d8d36dab33121af02a7bd7e9b2f0137930b4c8cd89b6c5630e408f882684e6935dcb0d5cb5e01a854950eeda252a4881458cafcc7ef7c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize216B
MD56888f0d67e813d36f413fb8199265c00
SHA1689ad6d2a90a32e6a161711df71d30ffd8b34af4
SHA2564fcbf8548670871a5fa62e20b160febb43c802443f4727813a2b82b5810f7d9f
SHA512c50c58c7b311f5f7a8077937ed266b118bdb5e5b98920fe8ec974fcdb0ff3d7682af4284d49a800b51b6f92dbb902a207f390f7a03b64a64e0b55700ffe7d093
-
Filesize
2KB
MD51cc36bd0f8a6c4360f8ee9cddfc9ae77
SHA12f4da73adc696fd6722751aa36672b3f24f86c22
SHA25649f4a4aeaa79241074072c73a5fe0811ff8af452951b3fec26f4c5193c863866
SHA512f9ba2b3d4ff15f0380c4f33ddd70a4442c87b025a5a51a1b1932188b459a7375c66969c45a118ef8a424055985b33ec0eedd636e9ef9e96f3cd99bb7bd789bed
-
Filesize
2KB
MD590216d866723a4db98ffa623be75f409
SHA16302d595d096fe01454759935a9d5a31341784fa
SHA256562f45c0f11e76ba6643623d16bab01e05aabe661f1f512c675eebfe8cf3fcf1
SHA512ce22cf10d7ee7b51ac995a937603a278fdc10780093e6e627be95cfc77d4dca22b2b711f4be43b420de179d3cf6751315909ba8250f663697b4c197f3dc52566
-
Filesize
6KB
MD5e647e90b1bedd5a4d80517903a2a77b2
SHA1fe97f29724a6f0b04c69e37a909e0f2a2435dc6b
SHA256029cc839cfee7f395dd82c470d1fb042d33076a1ab2163ee35084df789bafdcc
SHA5121529d13e8f41b647c20be93bdbf7168d96cfd3396ece54ccaa92309a54ab7e21d17f5df99451b542305eb65e888ebdf24f3f782cd16dc66eb5b5600806a23930
-
Filesize
7KB
MD5dba5046bdc2ad9e09bd41b9697e70279
SHA17c03c5c719fcfada0ab655e78e304d167e6a594d
SHA2564b45ef9ab8dc8f5a7359be2615c9b9ceb6d2f9fb368e329e40b26f86c0e60a41
SHA512961caa2d80d275ecffc038c738baea7957262bbe4cb90385c1247bec764cc06f9e3a505837ffd61338886d45fcde9cf4cff6367133ba75e4e77d3c50c5768314
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD55db357e9e53ac69fe40ee0cfff5f1c2a
SHA14ea4daeffaa9e8a4be148f1d3bafdd49187167fd
SHA2568876fa2c353afc3a377f1fc6bde30be430c8fd9b2219993491bbf21b05070eb6
SHA5124b7fee59c849024b5dab518cbde96a308c295dca55791cb82f73ef90256eaca64d23178123d679e777e3751ceae7cf0409301e3d0673b5193fc75a1671ce4816