Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
10/05/2024, 15:53
Static task
static1
Behavioral task
behavioral1
Sample
2fe2598352ddeefdeac44864e4af2659_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2fe2598352ddeefdeac44864e4af2659_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
2fe2598352ddeefdeac44864e4af2659_JaffaCakes118.html
-
Size
28KB
-
MD5
2fe2598352ddeefdeac44864e4af2659
-
SHA1
ce0121d95f0bf3457f9145000ce7a0a35920debb
-
SHA256
b7bf12b15f79fab7d67b8cfd8276103d789d46812258424f5adccffd916a5305
-
SHA512
6f113fd2aafb83830798f75b6840d9e1669b8fecee30388bff0dc71f6ba7273aa98be51fac263ab738571329c1d50a4c372baabef6808b60939ccccb3d82c027
-
SSDEEP
768:SbzdsFqvfudlQVV1C5m1CCCcmzm3C/CnCQGALjQYFza0OYz2:S/dsFqvfug1C5m1CCCcmzm3C/CnCQnjC
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1252 msedge.exe 1252 msedge.exe 4520 msedge.exe 4520 msedge.exe 232 identity_helper.exe 232 identity_helper.exe 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe 4156 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe 4520 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4520 wrote to memory of 2368 4520 msedge.exe 82 PID 4520 wrote to memory of 2368 4520 msedge.exe 82 PID 4520 wrote to memory of 2116 4520 msedge.exe 83 PID 4520 wrote to memory of 2116 4520 msedge.exe 83 PID 4520 wrote to memory of 2116 4520 msedge.exe 83 PID 4520 wrote to memory of 2116 4520 msedge.exe 83 PID 4520 wrote to memory of 2116 4520 msedge.exe 83 PID 4520 wrote to memory of 2116 4520 msedge.exe 83 PID 4520 wrote to memory of 2116 4520 msedge.exe 83 PID 4520 wrote to memory of 2116 4520 msedge.exe 83 PID 4520 wrote to memory of 2116 4520 msedge.exe 83 PID 4520 wrote to memory of 2116 4520 msedge.exe 83 PID 4520 wrote to memory of 2116 4520 msedge.exe 83 PID 4520 wrote to memory of 2116 4520 msedge.exe 83 PID 4520 wrote to memory of 2116 4520 msedge.exe 83 PID 4520 wrote to memory of 2116 4520 msedge.exe 83 PID 4520 wrote to memory of 2116 4520 msedge.exe 83 PID 4520 wrote to memory of 2116 4520 msedge.exe 83 PID 4520 wrote to memory of 2116 4520 msedge.exe 83 PID 4520 wrote to memory of 2116 4520 msedge.exe 83 PID 4520 wrote to memory of 2116 4520 msedge.exe 83 PID 4520 wrote to memory of 2116 4520 msedge.exe 83 PID 4520 wrote to memory of 2116 4520 msedge.exe 83 PID 4520 wrote to memory of 2116 4520 msedge.exe 83 PID 4520 wrote to memory of 2116 4520 msedge.exe 83 PID 4520 wrote to memory of 2116 4520 msedge.exe 83 PID 4520 wrote to memory of 2116 4520 msedge.exe 83 PID 4520 wrote to memory of 2116 4520 msedge.exe 83 PID 4520 wrote to memory of 2116 4520 msedge.exe 83 PID 4520 wrote to memory of 2116 4520 msedge.exe 83 PID 4520 wrote to memory of 2116 4520 msedge.exe 83 PID 4520 wrote to memory of 2116 4520 msedge.exe 83 PID 4520 wrote to memory of 2116 4520 msedge.exe 83 PID 4520 wrote to memory of 2116 4520 msedge.exe 83 PID 4520 wrote to memory of 2116 4520 msedge.exe 83 PID 4520 wrote to memory of 2116 4520 msedge.exe 83 PID 4520 wrote to memory of 2116 4520 msedge.exe 83 PID 4520 wrote to memory of 2116 4520 msedge.exe 83 PID 4520 wrote to memory of 2116 4520 msedge.exe 83 PID 4520 wrote to memory of 2116 4520 msedge.exe 83 PID 4520 wrote to memory of 2116 4520 msedge.exe 83 PID 4520 wrote to memory of 2116 4520 msedge.exe 83 PID 4520 wrote to memory of 1252 4520 msedge.exe 84 PID 4520 wrote to memory of 1252 4520 msedge.exe 84 PID 4520 wrote to memory of 4784 4520 msedge.exe 85 PID 4520 wrote to memory of 4784 4520 msedge.exe 85 PID 4520 wrote to memory of 4784 4520 msedge.exe 85 PID 4520 wrote to memory of 4784 4520 msedge.exe 85 PID 4520 wrote to memory of 4784 4520 msedge.exe 85 PID 4520 wrote to memory of 4784 4520 msedge.exe 85 PID 4520 wrote to memory of 4784 4520 msedge.exe 85 PID 4520 wrote to memory of 4784 4520 msedge.exe 85 PID 4520 wrote to memory of 4784 4520 msedge.exe 85 PID 4520 wrote to memory of 4784 4520 msedge.exe 85 PID 4520 wrote to memory of 4784 4520 msedge.exe 85 PID 4520 wrote to memory of 4784 4520 msedge.exe 85 PID 4520 wrote to memory of 4784 4520 msedge.exe 85 PID 4520 wrote to memory of 4784 4520 msedge.exe 85 PID 4520 wrote to memory of 4784 4520 msedge.exe 85 PID 4520 wrote to memory of 4784 4520 msedge.exe 85 PID 4520 wrote to memory of 4784 4520 msedge.exe 85 PID 4520 wrote to memory of 4784 4520 msedge.exe 85 PID 4520 wrote to memory of 4784 4520 msedge.exe 85 PID 4520 wrote to memory of 4784 4520 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2fe2598352ddeefdeac44864e4af2659_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4520 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa84ef46f8,0x7ffa84ef4708,0x7ffa84ef47182⤵PID:2368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2176,13281339170922122020,4924338106040516810,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2188 /prefetch:22⤵PID:2116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2176,13281339170922122020,4924338106040516810,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2248 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2176,13281339170922122020,4924338106040516810,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2864 /prefetch:82⤵PID:4784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,13281339170922122020,4924338106040516810,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:1648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,13281339170922122020,4924338106040516810,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:2264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2176,13281339170922122020,4924338106040516810,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1356 /prefetch:82⤵PID:2380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2176,13281339170922122020,4924338106040516810,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1356 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,13281339170922122020,4924338106040516810,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3144 /prefetch:12⤵PID:3884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,13281339170922122020,4924338106040516810,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5004 /prefetch:12⤵PID:468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,13281339170922122020,4924338106040516810,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4132 /prefetch:12⤵PID:2084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,13281339170922122020,4924338106040516810,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5780 /prefetch:12⤵PID:4292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2176,13281339170922122020,4924338106040516810,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6036 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4156
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4440
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3420
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
Filesize
779B
MD55c41c4aba9b084442ab41819f99bca51
SHA107d3a586cf812a73ce44944d631dddbda50f9d62
SHA256a45a8d708aca5271d9798be78b73f011c2c82a15efaa1a08e47ba97ce9e3b80e
SHA512883f5c023aef5941becd2bb93aa00bffb9c53d5fd76ec93696aad3631553aafea9383c88bd7e5d9f01467e3298d2c2e5a1808d4b1e55bce2c28dab752b3492b9
-
Filesize
6KB
MD52efb50244c2463900e7f629b20d1f115
SHA1bc8691ecf78517ca095617434449acf6f527c4e0
SHA256f21010b1b8dcfc2c4ad23ffd028c7d7010b0f3c3b3cc82754b32963b53c23d48
SHA512bb2a81c3292f6ca041704c300b2096fa2fb3bedabdb4a8ecc54f8c0160f0b3a4fdaad4b9ce7a804bdccae09fa2c7251ae11809103526854f58f107ecd26e38db
-
Filesize
6KB
MD531df478d23ef5fc69be81d9c03da65e1
SHA110e091a98e28dc2c7461d0d308e549a5f3969c04
SHA256cbd8848b2e04ff21758146016e4e157eb207128345609ff03681eed945004e39
SHA51220687668470bc3cadf86007267c503909035e524d4012c8113405ebfcd4f39e918f28accf43897e5a69c328c53a7a0c81fe0d1530c0586d094b34fcafc1192b1
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD537c20c76ce0cdbdb6fa497d0fedd810d
SHA11b85d330c21be72b3476a81683196335015caf76
SHA2568f9c17db3dd591d8fc6d35d90e8296c6ecbb7d3400ec66f4aa1c6884e97f9eae
SHA5126b12336892bcd9dec7f5e700d1ba4e68ab3ed0b5c33c204f09c610a46cbaccb62e24e8ca5461b2f8db11a2b8dc242c83e235ec2b7d495a0ad5e2c0edb139769e