Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
11/05/2024, 13:27
Static task
static1
Behavioral task
behavioral1
Sample
34cdb294f187ee95dcb007180721b4a2_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
34cdb294f187ee95dcb007180721b4a2_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
34cdb294f187ee95dcb007180721b4a2_JaffaCakes118.html
-
Size
202KB
-
MD5
34cdb294f187ee95dcb007180721b4a2
-
SHA1
17a83483c4ec09bf6ebe247f4560289c3710ebf9
-
SHA256
2b839c078f56d55a918def1baf9a3ae1eeab15a2f99ef931d54b5c3dd70c0a7a
-
SHA512
5906dc9146cd4125ea05f983910f3d44434b9829125e6f61ba79cba49541b95077c94f62aaf5d7356f65b98d0683687fa2aa8624d070ea04339665e4112357e9
-
SSDEEP
6144:/HtCpqGInSUloui2lXegnom0o4wlVQNfM:/tCpqGISfui2lXegnom0o4wlVQNfM
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3120 msedge.exe 3120 msedge.exe 3728 msedge.exe 3728 msedge.exe 5024 identity_helper.exe 5024 identity_helper.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3728 wrote to memory of 712 3728 msedge.exe 82 PID 3728 wrote to memory of 712 3728 msedge.exe 82 PID 3728 wrote to memory of 628 3728 msedge.exe 83 PID 3728 wrote to memory of 628 3728 msedge.exe 83 PID 3728 wrote to memory of 628 3728 msedge.exe 83 PID 3728 wrote to memory of 628 3728 msedge.exe 83 PID 3728 wrote to memory of 628 3728 msedge.exe 83 PID 3728 wrote to memory of 628 3728 msedge.exe 83 PID 3728 wrote to memory of 628 3728 msedge.exe 83 PID 3728 wrote to memory of 628 3728 msedge.exe 83 PID 3728 wrote to memory of 628 3728 msedge.exe 83 PID 3728 wrote to memory of 628 3728 msedge.exe 83 PID 3728 wrote to memory of 628 3728 msedge.exe 83 PID 3728 wrote to memory of 628 3728 msedge.exe 83 PID 3728 wrote to memory of 628 3728 msedge.exe 83 PID 3728 wrote to memory of 628 3728 msedge.exe 83 PID 3728 wrote to memory of 628 3728 msedge.exe 83 PID 3728 wrote to memory of 628 3728 msedge.exe 83 PID 3728 wrote to memory of 628 3728 msedge.exe 83 PID 3728 wrote to memory of 628 3728 msedge.exe 83 PID 3728 wrote to memory of 628 3728 msedge.exe 83 PID 3728 wrote to memory of 628 3728 msedge.exe 83 PID 3728 wrote to memory of 628 3728 msedge.exe 83 PID 3728 wrote to memory of 628 3728 msedge.exe 83 PID 3728 wrote to memory of 628 3728 msedge.exe 83 PID 3728 wrote to memory of 628 3728 msedge.exe 83 PID 3728 wrote to memory of 628 3728 msedge.exe 83 PID 3728 wrote to memory of 628 3728 msedge.exe 83 PID 3728 wrote to memory of 628 3728 msedge.exe 83 PID 3728 wrote to memory of 628 3728 msedge.exe 83 PID 3728 wrote to memory of 628 3728 msedge.exe 83 PID 3728 wrote to memory of 628 3728 msedge.exe 83 PID 3728 wrote to memory of 628 3728 msedge.exe 83 PID 3728 wrote to memory of 628 3728 msedge.exe 83 PID 3728 wrote to memory of 628 3728 msedge.exe 83 PID 3728 wrote to memory of 628 3728 msedge.exe 83 PID 3728 wrote to memory of 628 3728 msedge.exe 83 PID 3728 wrote to memory of 628 3728 msedge.exe 83 PID 3728 wrote to memory of 628 3728 msedge.exe 83 PID 3728 wrote to memory of 628 3728 msedge.exe 83 PID 3728 wrote to memory of 628 3728 msedge.exe 83 PID 3728 wrote to memory of 628 3728 msedge.exe 83 PID 3728 wrote to memory of 3120 3728 msedge.exe 84 PID 3728 wrote to memory of 3120 3728 msedge.exe 84 PID 3728 wrote to memory of 5764 3728 msedge.exe 85 PID 3728 wrote to memory of 5764 3728 msedge.exe 85 PID 3728 wrote to memory of 5764 3728 msedge.exe 85 PID 3728 wrote to memory of 5764 3728 msedge.exe 85 PID 3728 wrote to memory of 5764 3728 msedge.exe 85 PID 3728 wrote to memory of 5764 3728 msedge.exe 85 PID 3728 wrote to memory of 5764 3728 msedge.exe 85 PID 3728 wrote to memory of 5764 3728 msedge.exe 85 PID 3728 wrote to memory of 5764 3728 msedge.exe 85 PID 3728 wrote to memory of 5764 3728 msedge.exe 85 PID 3728 wrote to memory of 5764 3728 msedge.exe 85 PID 3728 wrote to memory of 5764 3728 msedge.exe 85 PID 3728 wrote to memory of 5764 3728 msedge.exe 85 PID 3728 wrote to memory of 5764 3728 msedge.exe 85 PID 3728 wrote to memory of 5764 3728 msedge.exe 85 PID 3728 wrote to memory of 5764 3728 msedge.exe 85 PID 3728 wrote to memory of 5764 3728 msedge.exe 85 PID 3728 wrote to memory of 5764 3728 msedge.exe 85 PID 3728 wrote to memory of 5764 3728 msedge.exe 85 PID 3728 wrote to memory of 5764 3728 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\34cdb294f187ee95dcb007180721b4a2_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3728 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff427246f8,0x7fff42724708,0x7fff427247182⤵PID:712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,12150058358693092378,12611799257139381292,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2096 /prefetch:22⤵PID:628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,12150058358693092378,12611799257139381292,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,12150058358693092378,12611799257139381292,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2824 /prefetch:82⤵PID:5764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,12150058358693092378,12611799257139381292,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:5428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,12150058358693092378,12611799257139381292,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:4820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,12150058358693092378,12611799257139381292,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4808 /prefetch:12⤵PID:5988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,12150058358693092378,12611799257139381292,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5988 /prefetch:82⤵PID:1168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,12150058358693092378,12611799257139381292,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5988 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,12150058358693092378,12611799257139381292,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5812 /prefetch:12⤵PID:5104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,12150058358693092378,12611799257139381292,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5760 /prefetch:12⤵PID:5336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,12150058358693092378,12611799257139381292,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4016 /prefetch:12⤵PID:4664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,12150058358693092378,12611799257139381292,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5880 /prefetch:12⤵PID:6068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,12150058358693092378,12611799257139381292,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4884 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1512
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4476
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2988
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ae54e9db2e89f2c54da8cc0bfcbd26bd
SHA1a88af6c673609ecbc51a1a60dfbc8577830d2b5d
SHA2565009d3c953de63cfd14a7d911156c514e179ff07d2b94382d9caac6040cb72af
SHA512e3b70e5eb7321b9deca6f6a17424a15b9fd5c4008bd3789bd01099fd13cb2f4a2f37fe4b920fb51c50517745b576c1f94df83efd1a7e75949551163985599998
-
Filesize
152B
MD5f53207a5ca2ef5c7e976cbb3cb26d870
SHA149a8cc44f53da77bb3dfb36fc7676ed54675db43
SHA25619ab4e3c9da6d9cedda7461efdba9a2085e743513ab89f1dd0fd5a8f9486ad23
SHA512be734c7e8afda19f445912aef0d78f9941add29baebd4a812bff27f10a1d78b52aeb11c551468c8644443c86e1a2a6b2e4aead3d7f81d39925e3c20406ac1499
-
Filesize
399B
MD54ec9fb261aaac96d82616a8fb5757ef1
SHA1aaa9b9b09d81c5cf74e89d8299a46023e133b35a
SHA256d1970a489379cd8455e7f5581378434dbe8cbdd31ce98a6c4274fd6a5f10874f
SHA512c0759032f8cad88518dc7f01dfd3dcc0f293f98dced3d95c85e30b7bebf0ae7060aa98971c0407ed50653a7ad411f97859e583037a82fea9bf45e1657930a07b
-
Filesize
6KB
MD5eee7e6af9148cf21878045c465aae111
SHA11d6e7e2c6beea13d883c8b7213f735f06ddca882
SHA2561c0b4901e2b17b75ad61df02b6bba152199e4e24944706bb444f62f8f7a548ea
SHA5126c514778110755ff1c57fad82fe95e2ec4d4d00bca8d1029e8d5c6b496535cdb645022f67f88879c1832a926c8a21292fcc577f2380447fec3932b0de78693ba
-
Filesize
6KB
MD5f5273b924531537fed659e276a7ed7be
SHA15cb2f0f0a66d5d887b040267142d94178b29cdea
SHA2568957e78aa366f7ec530eabe0a0a8fd2dbfd88d8b252cd8f47cd1f9624eb8a675
SHA512479189d8dc5414efe51a0c1765da2f35c093cab6f4f99d80925e86ac0225946af17faca313b0229629039914be96e1bdab70277e83767fbffe476fd916f85ea3
-
Filesize
1KB
MD5822cdf2aa79d856b438ad94083f04adc
SHA1f67e8647dcdff65afbc309e6f82c12b8d18172ca
SHA256d456f9217ad6c3194bab4907bc14d62770e1fe5241b419c9906eac516f4a61ed
SHA512e71dae94499db5d0b001adb0029714e2a4242bb590316200d1960939c8af52a6682a8f5c1cbb0b3788e5f56c07258589487ca23ae940d1be23afe57909cec5d2
-
Filesize
1KB
MD5664903ba424e3406eec4ef26420c73ef
SHA1d08b251787f69bdade4993dca65f274f986808e5
SHA256cd0cddbc8cae0fcbfbb5eb9d5fbbe7f2cdffc2d30b22a2496d473c47dac08f25
SHA512b9349da0a442ad2a0e725ea2a1b565f5c454e9d397f59541e3df9fc8f112dc24868d507ed1f3ac774eca60ec224000198bd1b22a45a5e17d801d737609aa6aa6
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\c64d28ba-f389-49e8-b5de-e0af9d50a409.tmp
Filesize5KB
MD5ee8f81fe62380cbd3c2c3177533db6f4
SHA14b8be83b62e20c7de0b52a51afaab3292b9f67ec
SHA256ae0e0f65eae66381fb53a45de3860127cf5ee8b23d809a1e2e13a444080bb7ba
SHA512892b4eceea6272e5e79967b970c6b7fbe57b48a42098974c8208466625f956492c9ce9f60595716d29d54475649409931b88dafded337015bac305c26b005591
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD550ad4d914ec6a23572b353df2739f6f4
SHA13967f5fa4c6dd59fee363132fb438edd9e83d4e8
SHA256f01e617fa2bef9b992b33fd726887afce5c6cca9c59d2d59ef4cbcfb924ba19d
SHA512ace0b293640f77d5c51fdaf6777674ef4c090e31836ea32e26531a536161807da91289b47edf7590899d30084f8a08f773be8c48f99db5d1dc401d7cc84374ad