Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
10-05-2024 16:14
Static task
static1
Behavioral task
behavioral1
Sample
2ff854d8937fd12741c38f741d653d7a_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
2ff854d8937fd12741c38f741d653d7a_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
2ff854d8937fd12741c38f741d653d7a_JaffaCakes118.html
-
Size
313KB
-
MD5
2ff854d8937fd12741c38f741d653d7a
-
SHA1
3b36c0982eb950e08a07b276f8c993ee470512ff
-
SHA256
ff333af8f2227649f7ea9f579fae3755004a9432415952de817193b3ec4ebedb
-
SHA512
11c57c715bebb7d528ebd3aff3b815565c94ba8e00ceb7cc82c1b70bc0414e1215e80d83c25377356d068c1e25a9b7ba2122d7b3d77b3430c2c9ce2dead83e2d
-
SSDEEP
3072:UqteT4JSMk/TiIHC3FM2GSKQtMzCMq/X6V97:9eT+3FM2I3
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3088 msedge.exe 3088 msedge.exe 1704 msedge.exe 1704 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe 2872 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1704 wrote to memory of 3316 1704 msedge.exe 82 PID 1704 wrote to memory of 3316 1704 msedge.exe 82 PID 1704 wrote to memory of 3272 1704 msedge.exe 83 PID 1704 wrote to memory of 3272 1704 msedge.exe 83 PID 1704 wrote to memory of 3272 1704 msedge.exe 83 PID 1704 wrote to memory of 3272 1704 msedge.exe 83 PID 1704 wrote to memory of 3272 1704 msedge.exe 83 PID 1704 wrote to memory of 3272 1704 msedge.exe 83 PID 1704 wrote to memory of 3272 1704 msedge.exe 83 PID 1704 wrote to memory of 3272 1704 msedge.exe 83 PID 1704 wrote to memory of 3272 1704 msedge.exe 83 PID 1704 wrote to memory of 3272 1704 msedge.exe 83 PID 1704 wrote to memory of 3272 1704 msedge.exe 83 PID 1704 wrote to memory of 3272 1704 msedge.exe 83 PID 1704 wrote to memory of 3272 1704 msedge.exe 83 PID 1704 wrote to memory of 3272 1704 msedge.exe 83 PID 1704 wrote to memory of 3272 1704 msedge.exe 83 PID 1704 wrote to memory of 3272 1704 msedge.exe 83 PID 1704 wrote to memory of 3272 1704 msedge.exe 83 PID 1704 wrote to memory of 3272 1704 msedge.exe 83 PID 1704 wrote to memory of 3272 1704 msedge.exe 83 PID 1704 wrote to memory of 3272 1704 msedge.exe 83 PID 1704 wrote to memory of 3272 1704 msedge.exe 83 PID 1704 wrote to memory of 3272 1704 msedge.exe 83 PID 1704 wrote to memory of 3272 1704 msedge.exe 83 PID 1704 wrote to memory of 3272 1704 msedge.exe 83 PID 1704 wrote to memory of 3272 1704 msedge.exe 83 PID 1704 wrote to memory of 3272 1704 msedge.exe 83 PID 1704 wrote to memory of 3272 1704 msedge.exe 83 PID 1704 wrote to memory of 3272 1704 msedge.exe 83 PID 1704 wrote to memory of 3272 1704 msedge.exe 83 PID 1704 wrote to memory of 3272 1704 msedge.exe 83 PID 1704 wrote to memory of 3272 1704 msedge.exe 83 PID 1704 wrote to memory of 3272 1704 msedge.exe 83 PID 1704 wrote to memory of 3272 1704 msedge.exe 83 PID 1704 wrote to memory of 3272 1704 msedge.exe 83 PID 1704 wrote to memory of 3272 1704 msedge.exe 83 PID 1704 wrote to memory of 3272 1704 msedge.exe 83 PID 1704 wrote to memory of 3272 1704 msedge.exe 83 PID 1704 wrote to memory of 3272 1704 msedge.exe 83 PID 1704 wrote to memory of 3272 1704 msedge.exe 83 PID 1704 wrote to memory of 3272 1704 msedge.exe 83 PID 1704 wrote to memory of 3088 1704 msedge.exe 84 PID 1704 wrote to memory of 3088 1704 msedge.exe 84 PID 1704 wrote to memory of 892 1704 msedge.exe 85 PID 1704 wrote to memory of 892 1704 msedge.exe 85 PID 1704 wrote to memory of 892 1704 msedge.exe 85 PID 1704 wrote to memory of 892 1704 msedge.exe 85 PID 1704 wrote to memory of 892 1704 msedge.exe 85 PID 1704 wrote to memory of 892 1704 msedge.exe 85 PID 1704 wrote to memory of 892 1704 msedge.exe 85 PID 1704 wrote to memory of 892 1704 msedge.exe 85 PID 1704 wrote to memory of 892 1704 msedge.exe 85 PID 1704 wrote to memory of 892 1704 msedge.exe 85 PID 1704 wrote to memory of 892 1704 msedge.exe 85 PID 1704 wrote to memory of 892 1704 msedge.exe 85 PID 1704 wrote to memory of 892 1704 msedge.exe 85 PID 1704 wrote to memory of 892 1704 msedge.exe 85 PID 1704 wrote to memory of 892 1704 msedge.exe 85 PID 1704 wrote to memory of 892 1704 msedge.exe 85 PID 1704 wrote to memory of 892 1704 msedge.exe 85 PID 1704 wrote to memory of 892 1704 msedge.exe 85 PID 1704 wrote to memory of 892 1704 msedge.exe 85 PID 1704 wrote to memory of 892 1704 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2ff854d8937fd12741c38f741d653d7a_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffceba246f8,0x7ffceba24708,0x7ffceba247182⤵PID:3316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,4399740654030584418,4808585611874311777,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2084 /prefetch:22⤵PID:3272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2076,4399740654030584418,4808585611874311777,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2244 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2076,4399740654030584418,4808585611874311777,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2796 /prefetch:82⤵PID:892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,4399740654030584418,4808585611874311777,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,4399740654030584418,4808585611874311777,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:2168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,4399740654030584418,4808585611874311777,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4968 /prefetch:12⤵PID:3108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,4399740654030584418,4808585611874311777,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5216 /prefetch:12⤵PID:244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,4399740654030584418,4808585611874311777,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5368 /prefetch:12⤵PID:2020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,4399740654030584418,4808585611874311777,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5572 /prefetch:12⤵PID:4776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,4399740654030584418,4808585611874311777,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2172 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2872
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2240
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4420
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ae54e9db2e89f2c54da8cc0bfcbd26bd
SHA1a88af6c673609ecbc51a1a60dfbc8577830d2b5d
SHA2565009d3c953de63cfd14a7d911156c514e179ff07d2b94382d9caac6040cb72af
SHA512e3b70e5eb7321b9deca6f6a17424a15b9fd5c4008bd3789bd01099fd13cb2f4a2f37fe4b920fb51c50517745b576c1f94df83efd1a7e75949551163985599998
-
Filesize
152B
MD5f53207a5ca2ef5c7e976cbb3cb26d870
SHA149a8cc44f53da77bb3dfb36fc7676ed54675db43
SHA25619ab4e3c9da6d9cedda7461efdba9a2085e743513ab89f1dd0fd5a8f9486ad23
SHA512be734c7e8afda19f445912aef0d78f9941add29baebd4a812bff27f10a1d78b52aeb11c551468c8644443c86e1a2a6b2e4aead3d7f81d39925e3c20406ac1499
-
Filesize
20KB
MD5397383c90a2d930f866f405747e27466
SHA17bb6b5d6cee104c877dc5c3462f61232ffe5b360
SHA256a67db01d19e15d8fa76e5a075e336e195325d79d277a83aadb6a440acf887c47
SHA5124357eddc0581e3cd6209646540bf59756cb4035d7dba47d5cb6b0050e6c202bda65721d4e9d644f37e3cd105bc5fa240574cfa96649f01e2769b796b523e08aa
-
Filesize
44KB
MD588477d32f888c2b8a3f3d98deb460b3d
SHA11fae9ac6c1082fc0426aebe4e683eea9b4ba898c
SHA2561b1f0b5ef5f21d5742d84f331def7116323365c3dd4aec096a55763e310879d8
SHA512e0c0588ff27a989cac47797e5a8044983d0b3c75c44416c5f977e0e93e9d3a9321b9283ea077e6dcad0619ac960ee45fe8570f1d5cc7d5d4117fee4f2f0c96b3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize264B
MD5843c4f0775a76cae0d60413ddfaadf88
SHA1aa60a1037cbb278175bf7e8cce336e5868616f80
SHA256dbaad0376f634248b5f14cf8b04802c144f87cec71abfc382d5af79cb8f03686
SHA512a776430bba50edab1b1fae7a7cda78d8c313394e8f0d45170ac7cda2df9b521e6c5dcd761b30da5c1c8ca7a2e2a15db4f0e0fa97f581e75de287cf499ee3e716
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize240B
MD56bf8cc8e6d91f0032682c860fcd41901
SHA1cf50853013219288419bb7ad4e03e8c9ef987fab
SHA2565ebf907e3637633b0b379fb6e43c3606ee70afb952d625c925a37b9883e64d0f
SHA5124d0fb012459ba6dd058fc3cb8bc268d2b7ff98034f66ba24bad3e6f378362c46ddc2e610545651ab679d9dc65e945047e436c8c9f17d1f18263dde4748964523
-
Filesize
3KB
MD56ebfbe76b0917108c167f94e118ab0a2
SHA1e6f2baefefd0bc492b7703c9582e15523d0807d2
SHA25698b9cbd5c83f0267bf448ecef7826ec0b077a158e9e9cbd7c6e3edef8aed883d
SHA51222d8dc9b69035a2cc429b4125bc0bd3a63c9721fef98e81fe7918e0204962d84ac8513302adda37cc505c43a739cc01324eb9d26a59f39c2e87619bc6d9a7759
-
Filesize
5KB
MD578c42008e2eb6bc54f5a0abb0fe0f101
SHA1b3b9cdaf4c58f8226ca73ecc696604d9c90b739f
SHA2562f735811db164f59dc554671b761d12c6c5ed0c69e4dee69f65d0b1a59754006
SHA512662fc344a91ad4f861ca9f8908921a05571fe577dc98b9164b34902a04fe8469d6fe1a1eaad91e2e094730a3774818b021f5dd69bdd7f5c2b0199b803ed4a34e
-
Filesize
8KB
MD5b224510aab9f8f1dd79be4d957a10bca
SHA120105f8b36ffb9fcf557b39c0c3baab5db4e3cd5
SHA256b5c74254f48fa4e8afba5af6177d317c2d8bb143b49f7a9614d2cfbd55d38b70
SHA5127ad83101e72644fe54434123324cb404aee5f548c3e141e6ff5a5ae9e601c19422113e3ca9cfb259e8e40bdbe26918559d495e1ab040077fb8ece01129d95693
-
Filesize
11KB
MD54ceeabd607380860e021bf75dea019e2
SHA1d0b5a22d0d9ee23307673fecc3178f444e43facc
SHA2568228dc3334a7bb2d3137e8a8b2732bceb28e438ea034f49afc8d112f3f7d03a1
SHA512151621678818a4b0fb9ba80f8390213599dcda2fdf80e2a674859eccf3e38b590aacc355fe38ef1ea6fd399cbaefe6216d84e0768ce8a4c7a4e853e3a5129acb