Analysis
-
max time kernel
145s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
10/05/2024, 19:48
Static task
static1
Behavioral task
behavioral1
Sample
30bf8bc2d355db1a2cc842902fa9368e_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
30bf8bc2d355db1a2cc842902fa9368e_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
30bf8bc2d355db1a2cc842902fa9368e_JaffaCakes118.html
-
Size
24KB
-
MD5
30bf8bc2d355db1a2cc842902fa9368e
-
SHA1
cfe83dd49478359125eff0b84015ed11f8c0bd6c
-
SHA256
f8885fa478c19c7c2532fd301deb82a1716dc5dc61d7e0a3d7ad6bd3fce04afd
-
SHA512
e6ebe9033a8e126412a27dbf1aa7d90498dfa8f7f64cca6cc26f7ab30135a343c2c42753a20c6925b621bf03064a6f124cd7e1046d73d15bbadc6c69aacaaf46
-
SSDEEP
192:bkXQC1FtECVM/bD+d8wDdfecVuuGyDCFt9XGXt2TT9Tl9TojS+Es1l0ZLz8q8c3l:bkXQC1FtEgM/b6scVNC+d5KLz/8c1
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1488 msedge.exe 1488 msedge.exe 2280 msedge.exe 2280 msedge.exe 1536 identity_helper.exe 1536 identity_helper.exe 4576 msedge.exe 4576 msedge.exe 4576 msedge.exe 4576 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2280 msedge.exe 2280 msedge.exe 2280 msedge.exe 2280 msedge.exe 2280 msedge.exe 2280 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2280 msedge.exe 2280 msedge.exe 2280 msedge.exe 2280 msedge.exe 2280 msedge.exe 2280 msedge.exe 2280 msedge.exe 2280 msedge.exe 2280 msedge.exe 2280 msedge.exe 2280 msedge.exe 2280 msedge.exe 2280 msedge.exe 2280 msedge.exe 2280 msedge.exe 2280 msedge.exe 2280 msedge.exe 2280 msedge.exe 2280 msedge.exe 2280 msedge.exe 2280 msedge.exe 2280 msedge.exe 2280 msedge.exe 2280 msedge.exe 2280 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2280 msedge.exe 2280 msedge.exe 2280 msedge.exe 2280 msedge.exe 2280 msedge.exe 2280 msedge.exe 2280 msedge.exe 2280 msedge.exe 2280 msedge.exe 2280 msedge.exe 2280 msedge.exe 2280 msedge.exe 2280 msedge.exe 2280 msedge.exe 2280 msedge.exe 2280 msedge.exe 2280 msedge.exe 2280 msedge.exe 2280 msedge.exe 2280 msedge.exe 2280 msedge.exe 2280 msedge.exe 2280 msedge.exe 2280 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2280 wrote to memory of 932 2280 msedge.exe 83 PID 2280 wrote to memory of 932 2280 msedge.exe 83 PID 2280 wrote to memory of 2712 2280 msedge.exe 86 PID 2280 wrote to memory of 2712 2280 msedge.exe 86 PID 2280 wrote to memory of 2712 2280 msedge.exe 86 PID 2280 wrote to memory of 2712 2280 msedge.exe 86 PID 2280 wrote to memory of 2712 2280 msedge.exe 86 PID 2280 wrote to memory of 2712 2280 msedge.exe 86 PID 2280 wrote to memory of 2712 2280 msedge.exe 86 PID 2280 wrote to memory of 2712 2280 msedge.exe 86 PID 2280 wrote to memory of 2712 2280 msedge.exe 86 PID 2280 wrote to memory of 2712 2280 msedge.exe 86 PID 2280 wrote to memory of 2712 2280 msedge.exe 86 PID 2280 wrote to memory of 2712 2280 msedge.exe 86 PID 2280 wrote to memory of 2712 2280 msedge.exe 86 PID 2280 wrote to memory of 2712 2280 msedge.exe 86 PID 2280 wrote to memory of 2712 2280 msedge.exe 86 PID 2280 wrote to memory of 2712 2280 msedge.exe 86 PID 2280 wrote to memory of 2712 2280 msedge.exe 86 PID 2280 wrote to memory of 2712 2280 msedge.exe 86 PID 2280 wrote to memory of 2712 2280 msedge.exe 86 PID 2280 wrote to memory of 2712 2280 msedge.exe 86 PID 2280 wrote to memory of 2712 2280 msedge.exe 86 PID 2280 wrote to memory of 2712 2280 msedge.exe 86 PID 2280 wrote to memory of 2712 2280 msedge.exe 86 PID 2280 wrote to memory of 2712 2280 msedge.exe 86 PID 2280 wrote to memory of 2712 2280 msedge.exe 86 PID 2280 wrote to memory of 2712 2280 msedge.exe 86 PID 2280 wrote to memory of 2712 2280 msedge.exe 86 PID 2280 wrote to memory of 2712 2280 msedge.exe 86 PID 2280 wrote to memory of 2712 2280 msedge.exe 86 PID 2280 wrote to memory of 2712 2280 msedge.exe 86 PID 2280 wrote to memory of 2712 2280 msedge.exe 86 PID 2280 wrote to memory of 2712 2280 msedge.exe 86 PID 2280 wrote to memory of 2712 2280 msedge.exe 86 PID 2280 wrote to memory of 2712 2280 msedge.exe 86 PID 2280 wrote to memory of 2712 2280 msedge.exe 86 PID 2280 wrote to memory of 2712 2280 msedge.exe 86 PID 2280 wrote to memory of 2712 2280 msedge.exe 86 PID 2280 wrote to memory of 2712 2280 msedge.exe 86 PID 2280 wrote to memory of 2712 2280 msedge.exe 86 PID 2280 wrote to memory of 2712 2280 msedge.exe 86 PID 2280 wrote to memory of 1488 2280 msedge.exe 87 PID 2280 wrote to memory of 1488 2280 msedge.exe 87 PID 2280 wrote to memory of 3064 2280 msedge.exe 88 PID 2280 wrote to memory of 3064 2280 msedge.exe 88 PID 2280 wrote to memory of 3064 2280 msedge.exe 88 PID 2280 wrote to memory of 3064 2280 msedge.exe 88 PID 2280 wrote to memory of 3064 2280 msedge.exe 88 PID 2280 wrote to memory of 3064 2280 msedge.exe 88 PID 2280 wrote to memory of 3064 2280 msedge.exe 88 PID 2280 wrote to memory of 3064 2280 msedge.exe 88 PID 2280 wrote to memory of 3064 2280 msedge.exe 88 PID 2280 wrote to memory of 3064 2280 msedge.exe 88 PID 2280 wrote to memory of 3064 2280 msedge.exe 88 PID 2280 wrote to memory of 3064 2280 msedge.exe 88 PID 2280 wrote to memory of 3064 2280 msedge.exe 88 PID 2280 wrote to memory of 3064 2280 msedge.exe 88 PID 2280 wrote to memory of 3064 2280 msedge.exe 88 PID 2280 wrote to memory of 3064 2280 msedge.exe 88 PID 2280 wrote to memory of 3064 2280 msedge.exe 88 PID 2280 wrote to memory of 3064 2280 msedge.exe 88 PID 2280 wrote to memory of 3064 2280 msedge.exe 88 PID 2280 wrote to memory of 3064 2280 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\30bf8bc2d355db1a2cc842902fa9368e_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8699846f8,0x7ff869984708,0x7ff8699847182⤵PID:932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,4507393864018845921,13515087090540931046,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2180 /prefetch:22⤵PID:2712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2156,4507393864018845921,13515087090540931046,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2344 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2156,4507393864018845921,13515087090540931046,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2888 /prefetch:82⤵PID:3064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,4507393864018845921,13515087090540931046,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:2036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,4507393864018845921,13515087090540931046,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:4020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2156,4507393864018845921,13515087090540931046,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5920 /prefetch:82⤵PID:2324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2156,4507393864018845921,13515087090540931046,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5920 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,4507393864018845921,13515087090540931046,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5924 /prefetch:12⤵PID:2972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,4507393864018845921,13515087090540931046,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4196 /prefetch:12⤵PID:2952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,4507393864018845921,13515087090540931046,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4700 /prefetch:12⤵PID:4636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,4507393864018845921,13515087090540931046,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4760 /prefetch:12⤵PID:3956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,4507393864018845921,13515087090540931046,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4808 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4576
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4396
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4204
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54f7152bc5a1a715ef481e37d1c791959
SHA1c8a1ed674c62ae4f45519f90a8cc5a81eff3a6d7
SHA256704dd4f98d8ca34ec421f23ba1891b178c23c14b3301e4655efc5c02d356c2bc
SHA5122e6b02ca35d76a655a17a5f3e9dbd8d7517c7dae24f0095c7350eb9e7bdf9e1256a7009aa8878f96c89d1ea4fe5323a41f72b8c551806dda62880d7ff231ff5c
-
Filesize
152B
MD5ea98e583ad99df195d29aa066204ab56
SHA1f89398664af0179641aa0138b337097b617cb2db
SHA256a7abb51435909fa2d75c6f2ff5c69a93d4a0ab276ed579e7d8733b2a63ffbee6
SHA512e109be3466e653e5d310b3e402e1626298b09205d223722a82344dd78504f3c33e1e24e8402a02f38cd2c9c50d96a303ce4846bea5a583423937ab018cd5782f
-
Filesize
262B
MD54543d0e512def8bdbd47c536c8cf5826
SHA10c64149e875c2d8467647bdb3916ee9731039423
SHA256a4fdda829762df7d991e1b716864629e16c474b5f376bff96b06845adafdd0b2
SHA51249b1b1d09f604377890449a4bec07402a4e2571ddf1ae97a5ce186e8be23a0d0a3f9bfab361b20a8a0f3033871c149f0ca22caa1568f006248bb4937dcb5dec1
-
Filesize
5KB
MD54950cf3d1c8d90d8a8efd14f3c066924
SHA1c37cc70f13062ce37a54b3d00d227d932f46d4f7
SHA2569c08904468e133eda4149767865b3f150b9eddb539defbf9cfbfce7014fe182d
SHA5128b1e947647b4e69216dae026ae8e4560fcc718401546a15b87c603278e29c226b08eb5ddc4f307ccf9c0f24000805a7c702ca7de075c20114b34bd3700043e89
-
Filesize
6KB
MD53f32d9c383968bc9ccf140792a038ce5
SHA1d3f73c2c61731376ae1d378472c85b0ff4e58dae
SHA256ce597b4b13ed7aff57feaf3a070477dff4e941bcbb2170f8fcb4c1d2a34a0197
SHA51242a0d52a229da59b8f19d6374387d3aefb557c2821dfe85a8b422bd585e75049290136feb3ea4c35ba9340d48200dd3106f25b3364ef2e1c26fe1ce3cdbef396
-
Filesize
6KB
MD5786c45eb525309ac0041c0cf7e2ae2ce
SHA10bf861bf897c6cfa3c6f290bafb67201944ebcac
SHA25601753a04d5363ea69e1fab4873ee699ee285d50c16c19705338ef9050781bfcb
SHA512a75d7739a73c2e1a5919b77d38ec46cdeccbe1a47054778fe0bb51ab1acb12bd64d40fb1dc4d08977aa7ae6f9f5ae4a897504c710f2aba8ffb6f3a4daa6f6f63
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD51d9491921c0cd34a52d45c37323b7e81
SHA14d2c8ba7e64ad1923f69a66e89aba99babd91a58
SHA256b51da0c6ccc010d707fc52c57982575238fea77ca1e2356e92dc2eb365f9bd3f
SHA512e19938be1c28283c2b8b8a70fcc9de55e50cc11ba88fab6b2b89938265155b403af42234d5bae30b84889f04ca5f540702c82b9f911c733b079cdbc3f9f4a30c