Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
10-05-2024 16:07
Static task
static1
Behavioral task
behavioral1
Sample
2ff0cc7ca464a8b9fe2f47d20b4cc1aa_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2ff0cc7ca464a8b9fe2f47d20b4cc1aa_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
2ff0cc7ca464a8b9fe2f47d20b4cc1aa_JaffaCakes118.html
-
Size
97KB
-
MD5
2ff0cc7ca464a8b9fe2f47d20b4cc1aa
-
SHA1
1ff49e8756242e34178a2ef89bd9f81374ee8d37
-
SHA256
292e93045d1cb0fbb4b8742a55a08fda6b510944eda9012a7f74b469a1a404f0
-
SHA512
523fcb5d1242377d3c6366c7f410dd8ff90c8560ec2ce1fb638480d3e53edbdbfd76072959aba7053d954a0fee8ef4b6d61684940fd2508953b9f852e0d1a8cb
-
SSDEEP
1536:Uui6zHNXBDI4wH46REywppj0QbQmzK98hFeK98ANNmMPnvUaGhG5doy:Li6TZBDcH46R2pt0SQmzKsFeKZGhG5
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
msedge.exemsedge.exemsedge.exepid process 4668 msedge.exe 4668 msedge.exe 1896 msedge.exe 1896 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe 4152 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
Processes:
msedge.exepid process 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 1896 wrote to memory of 2552 1896 msedge.exe msedge.exe PID 1896 wrote to memory of 2552 1896 msedge.exe msedge.exe PID 1896 wrote to memory of 4724 1896 msedge.exe msedge.exe PID 1896 wrote to memory of 4724 1896 msedge.exe msedge.exe PID 1896 wrote to memory of 4724 1896 msedge.exe msedge.exe PID 1896 wrote to memory of 4724 1896 msedge.exe msedge.exe PID 1896 wrote to memory of 4724 1896 msedge.exe msedge.exe PID 1896 wrote to memory of 4724 1896 msedge.exe msedge.exe PID 1896 wrote to memory of 4724 1896 msedge.exe msedge.exe PID 1896 wrote to memory of 4724 1896 msedge.exe msedge.exe PID 1896 wrote to memory of 4724 1896 msedge.exe msedge.exe PID 1896 wrote to memory of 4724 1896 msedge.exe msedge.exe PID 1896 wrote to memory of 4724 1896 msedge.exe msedge.exe PID 1896 wrote to memory of 4724 1896 msedge.exe msedge.exe PID 1896 wrote to memory of 4724 1896 msedge.exe msedge.exe PID 1896 wrote to memory of 4724 1896 msedge.exe msedge.exe PID 1896 wrote to memory of 4724 1896 msedge.exe msedge.exe PID 1896 wrote to memory of 4724 1896 msedge.exe msedge.exe PID 1896 wrote to memory of 4724 1896 msedge.exe msedge.exe PID 1896 wrote to memory of 4724 1896 msedge.exe msedge.exe PID 1896 wrote to memory of 4724 1896 msedge.exe msedge.exe PID 1896 wrote to memory of 4724 1896 msedge.exe msedge.exe PID 1896 wrote to memory of 4724 1896 msedge.exe msedge.exe PID 1896 wrote to memory of 4724 1896 msedge.exe msedge.exe PID 1896 wrote to memory of 4724 1896 msedge.exe msedge.exe PID 1896 wrote to memory of 4724 1896 msedge.exe msedge.exe PID 1896 wrote to memory of 4724 1896 msedge.exe msedge.exe PID 1896 wrote to memory of 4724 1896 msedge.exe msedge.exe PID 1896 wrote to memory of 4724 1896 msedge.exe msedge.exe PID 1896 wrote to memory of 4724 1896 msedge.exe msedge.exe PID 1896 wrote to memory of 4724 1896 msedge.exe msedge.exe PID 1896 wrote to memory of 4724 1896 msedge.exe msedge.exe PID 1896 wrote to memory of 4724 1896 msedge.exe msedge.exe PID 1896 wrote to memory of 4724 1896 msedge.exe msedge.exe PID 1896 wrote to memory of 4724 1896 msedge.exe msedge.exe PID 1896 wrote to memory of 4724 1896 msedge.exe msedge.exe PID 1896 wrote to memory of 4724 1896 msedge.exe msedge.exe PID 1896 wrote to memory of 4724 1896 msedge.exe msedge.exe PID 1896 wrote to memory of 4724 1896 msedge.exe msedge.exe PID 1896 wrote to memory of 4724 1896 msedge.exe msedge.exe PID 1896 wrote to memory of 4724 1896 msedge.exe msedge.exe PID 1896 wrote to memory of 4724 1896 msedge.exe msedge.exe PID 1896 wrote to memory of 4668 1896 msedge.exe msedge.exe PID 1896 wrote to memory of 4668 1896 msedge.exe msedge.exe PID 1896 wrote to memory of 2516 1896 msedge.exe msedge.exe PID 1896 wrote to memory of 2516 1896 msedge.exe msedge.exe PID 1896 wrote to memory of 2516 1896 msedge.exe msedge.exe PID 1896 wrote to memory of 2516 1896 msedge.exe msedge.exe PID 1896 wrote to memory of 2516 1896 msedge.exe msedge.exe PID 1896 wrote to memory of 2516 1896 msedge.exe msedge.exe PID 1896 wrote to memory of 2516 1896 msedge.exe msedge.exe PID 1896 wrote to memory of 2516 1896 msedge.exe msedge.exe PID 1896 wrote to memory of 2516 1896 msedge.exe msedge.exe PID 1896 wrote to memory of 2516 1896 msedge.exe msedge.exe PID 1896 wrote to memory of 2516 1896 msedge.exe msedge.exe PID 1896 wrote to memory of 2516 1896 msedge.exe msedge.exe PID 1896 wrote to memory of 2516 1896 msedge.exe msedge.exe PID 1896 wrote to memory of 2516 1896 msedge.exe msedge.exe PID 1896 wrote to memory of 2516 1896 msedge.exe msedge.exe PID 1896 wrote to memory of 2516 1896 msedge.exe msedge.exe PID 1896 wrote to memory of 2516 1896 msedge.exe msedge.exe PID 1896 wrote to memory of 2516 1896 msedge.exe msedge.exe PID 1896 wrote to memory of 2516 1896 msedge.exe msedge.exe PID 1896 wrote to memory of 2516 1896 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2ff0cc7ca464a8b9fe2f47d20b4cc1aa_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffef86946f8,0x7ffef8694708,0x7ffef86947182⤵PID:2552
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,14164211652586682811,9559507552249538685,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2100 /prefetch:22⤵PID:4724
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2084,14164211652586682811,9559507552249538685,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4668 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2084,14164211652586682811,9559507552249538685,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2952 /prefetch:82⤵PID:2516
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,14164211652586682811,9559507552249538685,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:1900
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,14164211652586682811,9559507552249538685,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:3084
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,14164211652586682811,9559507552249538685,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4732 /prefetch:12⤵PID:716
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,14164211652586682811,9559507552249538685,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5136 /prefetch:12⤵PID:4364
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,14164211652586682811,9559507552249538685,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4928 /prefetch:12⤵PID:2136
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,14164211652586682811,9559507552249538685,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5972 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4152
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2272
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2664
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f61fa5143fe872d1d8f1e9f8dc6544f9
SHA1df44bab94d7388fb38c63085ec4db80cfc5eb009
SHA256284a24b5b40860240db00ef3ae6a33c9fa8349ab5490a634e27b2c6e9a191c64
SHA512971000784a6518bb39c5cf043292c7ab659162275470f5f6b632ea91a6bcae83bc80517ceb983dd5abfe8fb4e157344cb65c27e609a879eec00b33c5fad563a6
-
Filesize
152B
MD587f7abeb82600e1e640b843ad50fe0a1
SHA1045bbada3f23fc59941bf7d0210fb160cb78ae87
SHA256b35d6906050d90a81d23646f86c20a8f5d42f058ffc6436fb0a2b8bd71ee1262
SHA512ea8e7f24ab823ad710ce079c86c40aa957353a00d2775732c23e31be88a10d212e974c4691279aa86016c4660f5795febf739a15207833df6ed964a9ed99d618
-
Filesize
20KB
MD5b6c8122025aff891940d1d5e1ab95fce
SHA1a0c7ca41d0922d085c358f5dde81ae3e85a8c9c4
SHA2569954c64c68000f615e5066bc255eced1195d1f8b7dbc715f9062ddf9f147e87e
SHA512e62a37b55b6b8d95c24fb624105ff6ff72f118e31760d0da1e8df8e8acf627ec6327c26dfa26df8535585877604c7948d2f621ccabc39beec49787e22c302c10
-
Filesize
44KB
MD588477d32f888c2b8a3f3d98deb460b3d
SHA11fae9ac6c1082fc0426aebe4e683eea9b4ba898c
SHA2561b1f0b5ef5f21d5742d84f331def7116323365c3dd4aec096a55763e310879d8
SHA512e0c0588ff27a989cac47797e5a8044983d0b3c75c44416c5f977e0e93e9d3a9321b9283ea077e6dcad0619ac960ee45fe8570f1d5cc7d5d4117fee4f2f0c96b3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize192B
MD5dced13a716869e57a4c4553c345a15a2
SHA1433449bfb76ef3970b751b0196b667718c79912d
SHA25621f615affd104c151887626974ee7fa2c80676c9693728906ecf225dbed68e60
SHA512e095a7996c7db9b0d504677a4ea005c96e65845767587af69bccc6a5c0493d47313e2c261cf63a4b9027f9bac3046b6bae7ae45f4ea48cd316ad5e36ffcc7f11
-
Filesize
1KB
MD561a803ce5b376a59c68e786f6844c0c7
SHA155347361a9617d31a086f35cb7043d7c4b66a298
SHA256bb32adb341552c9c7aedcfec816c89554c37f88fcf3e778519bc775d4dc3abbf
SHA512b5c96cedf90d681c417227ce7f618b72d5ac2c8cc561d42adf89fb48969fad95b011adde2f15850509ba2838b2b28523fdc45d93a6daff37f3f4742efa417be8
-
Filesize
6KB
MD5ea70d617c0ce50e4c8bac7c8578335e4
SHA10de4eaa9b4f623939c57f87ec0d35280eac4bdb6
SHA256108f578aacd5670852eca1a1f7387538312d2c54a5d1742dcc2daf59d42f1e5b
SHA5127b2ff25e7b216ac3c031e02aa6421895ba77ab283240bf7688befeac7f120fc3b2adb2b61812a853b995b44be5c1bfd53848162dbc4fa02ea5a67fc547a0d327
-
Filesize
7KB
MD50a648a770e7ac7036a1b5143e546edc5
SHA1395a5804212ec461cf30e6cc3fb37e60985c2fb6
SHA25696bcfb17c00059596c2e5818f309a2fdb1c7675b20f042f91c24ec8a278419ca
SHA512aa49229b101c821b547ce5c6736e826a21a9858295c4e9bbc051a4ad3c4bac66e5a895f1d751f3349a1b2128f5f7bb56f63fd282fa55aa947ebafd461136194e
-
Filesize
7KB
MD5b9f7825104ff7811d4f283f68dd3f6c4
SHA1ca1a08ff1ed8050b6c45816d462d45725e46cdc2
SHA256f7bcfb9018ab576eeb788563fc92798b08e01c10f7aec34e786e4945883d8f66
SHA512bbb78c0e9678c785f7d43efd2d61bce7b33fa825ed3e81eb3cbb0ff0e5fcff2c6eae2e62cff2ed52556ac45e2a011dc02bdb3d6bb3f3426dca0b0a3b1b59540f
-
Filesize
11KB
MD515ae1cd9aebf6050f609c5fe7c67e153
SHA1cd4e518a825d6f7a5f53ef2352bdface7d24d54f
SHA256fe8b9ffa0d2241bcf1095e3fe303118c38bdfb92a1452ebd2f3f0b9374c88cbd
SHA5127281e4c6f723be8791bac7ca969dffcdadc831b0a3e7d3ee4ae7cbeae3af9ccee246ed2144e6f62fe1f7a6549aac61fd0a54caef578c1d47889938c90731c90c
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e