Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
10-05-2024 16:05
Static task
static1
Behavioral task
behavioral1
Sample
2fef00b332dab4e10f4c9cbc0c16fe45_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
2fef00b332dab4e10f4c9cbc0c16fe45_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
2fef00b332dab4e10f4c9cbc0c16fe45_JaffaCakes118.html
-
Size
117KB
-
MD5
2fef00b332dab4e10f4c9cbc0c16fe45
-
SHA1
534eaa4fc3015196e3e8fe214b35a7db2e2b13c5
-
SHA256
5d3e8868242b3a06445728efd57598e7873c435f8071c70b20058cf64ca94391
-
SHA512
3ec257613abaae7cfa1e6451c34bf5fecb9ad27e5b7a1d93bfea08ca38bf58f5bcc249bc881151ab7174f94864fc655588678ef3d91425952692498d11e6506c
-
SSDEEP
768:c654De+GdwqOowd/+a+MjXPsaKDvHmNw+GQvOxobykQ/lnMN5CdMcW5whWcsoAV5:c654DUwqOowd+lLcXIM0c
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3452 msedge.exe 3452 msedge.exe 2336 msedge.exe 2336 msedge.exe 1296 identity_helper.exe 1296 identity_helper.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2336 wrote to memory of 4156 2336 msedge.exe 83 PID 2336 wrote to memory of 4156 2336 msedge.exe 83 PID 2336 wrote to memory of 4828 2336 msedge.exe 84 PID 2336 wrote to memory of 4828 2336 msedge.exe 84 PID 2336 wrote to memory of 4828 2336 msedge.exe 84 PID 2336 wrote to memory of 4828 2336 msedge.exe 84 PID 2336 wrote to memory of 4828 2336 msedge.exe 84 PID 2336 wrote to memory of 4828 2336 msedge.exe 84 PID 2336 wrote to memory of 4828 2336 msedge.exe 84 PID 2336 wrote to memory of 4828 2336 msedge.exe 84 PID 2336 wrote to memory of 4828 2336 msedge.exe 84 PID 2336 wrote to memory of 4828 2336 msedge.exe 84 PID 2336 wrote to memory of 4828 2336 msedge.exe 84 PID 2336 wrote to memory of 4828 2336 msedge.exe 84 PID 2336 wrote to memory of 4828 2336 msedge.exe 84 PID 2336 wrote to memory of 4828 2336 msedge.exe 84 PID 2336 wrote to memory of 4828 2336 msedge.exe 84 PID 2336 wrote to memory of 4828 2336 msedge.exe 84 PID 2336 wrote to memory of 4828 2336 msedge.exe 84 PID 2336 wrote to memory of 4828 2336 msedge.exe 84 PID 2336 wrote to memory of 4828 2336 msedge.exe 84 PID 2336 wrote to memory of 4828 2336 msedge.exe 84 PID 2336 wrote to memory of 4828 2336 msedge.exe 84 PID 2336 wrote to memory of 4828 2336 msedge.exe 84 PID 2336 wrote to memory of 4828 2336 msedge.exe 84 PID 2336 wrote to memory of 4828 2336 msedge.exe 84 PID 2336 wrote to memory of 4828 2336 msedge.exe 84 PID 2336 wrote to memory of 4828 2336 msedge.exe 84 PID 2336 wrote to memory of 4828 2336 msedge.exe 84 PID 2336 wrote to memory of 4828 2336 msedge.exe 84 PID 2336 wrote to memory of 4828 2336 msedge.exe 84 PID 2336 wrote to memory of 4828 2336 msedge.exe 84 PID 2336 wrote to memory of 4828 2336 msedge.exe 84 PID 2336 wrote to memory of 4828 2336 msedge.exe 84 PID 2336 wrote to memory of 4828 2336 msedge.exe 84 PID 2336 wrote to memory of 4828 2336 msedge.exe 84 PID 2336 wrote to memory of 4828 2336 msedge.exe 84 PID 2336 wrote to memory of 4828 2336 msedge.exe 84 PID 2336 wrote to memory of 4828 2336 msedge.exe 84 PID 2336 wrote to memory of 4828 2336 msedge.exe 84 PID 2336 wrote to memory of 4828 2336 msedge.exe 84 PID 2336 wrote to memory of 4828 2336 msedge.exe 84 PID 2336 wrote to memory of 3452 2336 msedge.exe 85 PID 2336 wrote to memory of 3452 2336 msedge.exe 85 PID 2336 wrote to memory of 384 2336 msedge.exe 86 PID 2336 wrote to memory of 384 2336 msedge.exe 86 PID 2336 wrote to memory of 384 2336 msedge.exe 86 PID 2336 wrote to memory of 384 2336 msedge.exe 86 PID 2336 wrote to memory of 384 2336 msedge.exe 86 PID 2336 wrote to memory of 384 2336 msedge.exe 86 PID 2336 wrote to memory of 384 2336 msedge.exe 86 PID 2336 wrote to memory of 384 2336 msedge.exe 86 PID 2336 wrote to memory of 384 2336 msedge.exe 86 PID 2336 wrote to memory of 384 2336 msedge.exe 86 PID 2336 wrote to memory of 384 2336 msedge.exe 86 PID 2336 wrote to memory of 384 2336 msedge.exe 86 PID 2336 wrote to memory of 384 2336 msedge.exe 86 PID 2336 wrote to memory of 384 2336 msedge.exe 86 PID 2336 wrote to memory of 384 2336 msedge.exe 86 PID 2336 wrote to memory of 384 2336 msedge.exe 86 PID 2336 wrote to memory of 384 2336 msedge.exe 86 PID 2336 wrote to memory of 384 2336 msedge.exe 86 PID 2336 wrote to memory of 384 2336 msedge.exe 86 PID 2336 wrote to memory of 384 2336 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2fef00b332dab4e10f4c9cbc0c16fe45_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffffdf846f8,0x7ffffdf84708,0x7ffffdf847182⤵PID:4156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,6426635029048567155,10089883392009642528,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:22⤵PID:4828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,6426635029048567155,10089883392009642528,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,6426635029048567155,10089883392009642528,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2728 /prefetch:82⤵PID:384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,6426635029048567155,10089883392009642528,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3184 /prefetch:12⤵PID:2480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,6426635029048567155,10089883392009642528,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:3148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,6426635029048567155,10089883392009642528,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5112 /prefetch:82⤵PID:4548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,6426635029048567155,10089883392009642528,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5112 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,6426635029048567155,10089883392009642528,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5168 /prefetch:12⤵PID:2932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,6426635029048567155,10089883392009642528,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5184 /prefetch:12⤵PID:4984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,6426635029048567155,10089883392009642528,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5460 /prefetch:12⤵PID:4668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,6426635029048567155,10089883392009642528,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5564 /prefetch:12⤵PID:520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,6426635029048567155,10089883392009642528,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2572 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3044
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1656
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2592
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5a138fd552b7aa7cc09a03e93ee08c97a
SHA1f641e2a6948aade7419fc80455ef99e1f31f00e6
SHA256786e145c3a075d54974baf630330925ab33b8bdf727e69fb24b44d12c04536d3
SHA51267f5320b88a5e0f18feedf5fea0e1d86a48b671df14b96f37fbda5793cbd2531791da3d47740ad0eaf8c6580d155fec11efc33ac5bfdde8383562a06618f4b1e
-
Filesize
152B
MD52daa93382bba07cbc40af372d30ec576
SHA1c5e709dc3e2e4df2ff841fbde3e30170e7428a94
SHA2561826d2a57b1938c148bf212a47d947ed1bfb26cfc55868931f843ee438117f30
SHA51265635cb59c81548a9ef8fdb0942331e7f3cd0c30ce1d4dba48aed72dbb27b06511a55d2aeaadfadbbb4b7cb4b2e2772bbabba9603b3f7d9c8b9e4a7fbf3d6b6b
-
Filesize
152B
MD5ecdc2754d7d2ae862272153aa9b9ca6e
SHA1c19bed1c6e1c998b9fa93298639ad7961339147d
SHA256a13d791473f836edcab0e93451ce7b7182efbbc54261b2b5644d319e047a00a7
SHA512cd4fb81317d540f8b15f1495a381bb6f0f129b8923a7c06e4b5cf777d2625c30304aee6cc68aa20479e08d84e5030b43fbe93e479602400334dfdd7297f702f2
-
Filesize
5KB
MD51d0c46cb6923892a547f2c9f62e8b5cf
SHA1c0d04be5e46ac11ab1b0b53d2ef13a188191746d
SHA2561edbe73964c8f74eb8ca16722772e5c3a661117c2173d0820a97e571dd45cf3d
SHA5123266e909b66bc8d01e7a617350c4151a22a736f001b93d993aa1ebe64ec15b9ea71cfcc5d564fe15064557eba01e5992908f039feb2d10d73e0ef574f42adae1
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\d7f3138e-6616-4056-b0ee-35ed241ec906.tmp
Filesize6KB
MD58a0f5aabc1fefc50fd2ebe25962dd51c
SHA10ff6c7efe196211e43e9bc9947bb8446c0a11327
SHA256fc8943096e09e2e4c995056cc91c94c8fe093d9a9deb12a02acb46b540489a2c
SHA512a68e2842913c934b4df908dcb79262ad832e516d9352523af87dcff18a0e00ae458f00b2db5bc17d844470ecbe5ee2205f00b5a6f0d368a5edfc12497c687d14
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389