Analysis
-
max time kernel
149s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
11-05-2024 13:31
Static task
static1
Behavioral task
behavioral1
Sample
34d11c2d094f3d2cd738d5cd49f34118_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
34d11c2d094f3d2cd738d5cd49f34118_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
34d11c2d094f3d2cd738d5cd49f34118_JaffaCakes118.html
-
Size
19KB
-
MD5
34d11c2d094f3d2cd738d5cd49f34118
-
SHA1
bfc40316dba10f34a0932e2d54e98da63231c158
-
SHA256
1154aaae5d45f8f825359baed147512bc169d97c4d96ccbd59c49f7601abb3a5
-
SHA512
b140cf5c0e1a93a9f38237509c47572b07f63b185d2692935dd8c90c2d8bebd175ffed633863a8fceec1b98a1bedab35a9cd9280b0ddb043472a4b15fcff0e04
-
SSDEEP
192:9K/ypUhTSWiqEWyLTgE9d31ib7OU/1lq74MQfQljQZWiEb18oQ4hEiZ7lq7OMlUw:4/yoT1ibLXfcUQ9CHp55ipigiC
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 392 msedge.exe 392 msedge.exe 5068 msedge.exe 5068 msedge.exe 3376 identity_helper.exe 3376 identity_helper.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe 4148 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5068 wrote to memory of 5024 5068 msedge.exe 84 PID 5068 wrote to memory of 5024 5068 msedge.exe 84 PID 5068 wrote to memory of 2316 5068 msedge.exe 85 PID 5068 wrote to memory of 2316 5068 msedge.exe 85 PID 5068 wrote to memory of 2316 5068 msedge.exe 85 PID 5068 wrote to memory of 2316 5068 msedge.exe 85 PID 5068 wrote to memory of 2316 5068 msedge.exe 85 PID 5068 wrote to memory of 2316 5068 msedge.exe 85 PID 5068 wrote to memory of 2316 5068 msedge.exe 85 PID 5068 wrote to memory of 2316 5068 msedge.exe 85 PID 5068 wrote to memory of 2316 5068 msedge.exe 85 PID 5068 wrote to memory of 2316 5068 msedge.exe 85 PID 5068 wrote to memory of 2316 5068 msedge.exe 85 PID 5068 wrote to memory of 2316 5068 msedge.exe 85 PID 5068 wrote to memory of 2316 5068 msedge.exe 85 PID 5068 wrote to memory of 2316 5068 msedge.exe 85 PID 5068 wrote to memory of 2316 5068 msedge.exe 85 PID 5068 wrote to memory of 2316 5068 msedge.exe 85 PID 5068 wrote to memory of 2316 5068 msedge.exe 85 PID 5068 wrote to memory of 2316 5068 msedge.exe 85 PID 5068 wrote to memory of 2316 5068 msedge.exe 85 PID 5068 wrote to memory of 2316 5068 msedge.exe 85 PID 5068 wrote to memory of 2316 5068 msedge.exe 85 PID 5068 wrote to memory of 2316 5068 msedge.exe 85 PID 5068 wrote to memory of 2316 5068 msedge.exe 85 PID 5068 wrote to memory of 2316 5068 msedge.exe 85 PID 5068 wrote to memory of 2316 5068 msedge.exe 85 PID 5068 wrote to memory of 2316 5068 msedge.exe 85 PID 5068 wrote to memory of 2316 5068 msedge.exe 85 PID 5068 wrote to memory of 2316 5068 msedge.exe 85 PID 5068 wrote to memory of 2316 5068 msedge.exe 85 PID 5068 wrote to memory of 2316 5068 msedge.exe 85 PID 5068 wrote to memory of 2316 5068 msedge.exe 85 PID 5068 wrote to memory of 2316 5068 msedge.exe 85 PID 5068 wrote to memory of 2316 5068 msedge.exe 85 PID 5068 wrote to memory of 2316 5068 msedge.exe 85 PID 5068 wrote to memory of 2316 5068 msedge.exe 85 PID 5068 wrote to memory of 2316 5068 msedge.exe 85 PID 5068 wrote to memory of 2316 5068 msedge.exe 85 PID 5068 wrote to memory of 2316 5068 msedge.exe 85 PID 5068 wrote to memory of 2316 5068 msedge.exe 85 PID 5068 wrote to memory of 2316 5068 msedge.exe 85 PID 5068 wrote to memory of 392 5068 msedge.exe 86 PID 5068 wrote to memory of 392 5068 msedge.exe 86 PID 5068 wrote to memory of 4588 5068 msedge.exe 87 PID 5068 wrote to memory of 4588 5068 msedge.exe 87 PID 5068 wrote to memory of 4588 5068 msedge.exe 87 PID 5068 wrote to memory of 4588 5068 msedge.exe 87 PID 5068 wrote to memory of 4588 5068 msedge.exe 87 PID 5068 wrote to memory of 4588 5068 msedge.exe 87 PID 5068 wrote to memory of 4588 5068 msedge.exe 87 PID 5068 wrote to memory of 4588 5068 msedge.exe 87 PID 5068 wrote to memory of 4588 5068 msedge.exe 87 PID 5068 wrote to memory of 4588 5068 msedge.exe 87 PID 5068 wrote to memory of 4588 5068 msedge.exe 87 PID 5068 wrote to memory of 4588 5068 msedge.exe 87 PID 5068 wrote to memory of 4588 5068 msedge.exe 87 PID 5068 wrote to memory of 4588 5068 msedge.exe 87 PID 5068 wrote to memory of 4588 5068 msedge.exe 87 PID 5068 wrote to memory of 4588 5068 msedge.exe 87 PID 5068 wrote to memory of 4588 5068 msedge.exe 87 PID 5068 wrote to memory of 4588 5068 msedge.exe 87 PID 5068 wrote to memory of 4588 5068 msedge.exe 87 PID 5068 wrote to memory of 4588 5068 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\34d11c2d094f3d2cd738d5cd49f34118_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5068 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbac2346f8,0x7ffbac234708,0x7ffbac2347182⤵PID:5024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,8319507614746639724,14053455285142610904,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2172 /prefetch:22⤵PID:2316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2156,8319507614746639724,14053455285142610904,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2228 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2156,8319507614746639724,14053455285142610904,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2716 /prefetch:82⤵PID:4588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,8319507614746639724,14053455285142610904,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:3100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,8319507614746639724,14053455285142610904,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:2860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,8319507614746639724,14053455285142610904,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6104 /prefetch:12⤵PID:960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2156,8319507614746639724,14053455285142610904,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5576 /prefetch:82⤵PID:4388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2156,8319507614746639724,14053455285142610904,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5576 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,8319507614746639724,14053455285142610904,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4968 /prefetch:12⤵PID:4392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,8319507614746639724,14053455285142610904,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4120 /prefetch:12⤵PID:4948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,8319507614746639724,14053455285142610904,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5956 /prefetch:12⤵PID:5008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,8319507614746639724,14053455285142610904,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5932 /prefetch:12⤵PID:4940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,8319507614746639724,14053455285142610904,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1316 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4148
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2336
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2712
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ae54e9db2e89f2c54da8cc0bfcbd26bd
SHA1a88af6c673609ecbc51a1a60dfbc8577830d2b5d
SHA2565009d3c953de63cfd14a7d911156c514e179ff07d2b94382d9caac6040cb72af
SHA512e3b70e5eb7321b9deca6f6a17424a15b9fd5c4008bd3789bd01099fd13cb2f4a2f37fe4b920fb51c50517745b576c1f94df83efd1a7e75949551163985599998
-
Filesize
152B
MD5f53207a5ca2ef5c7e976cbb3cb26d870
SHA149a8cc44f53da77bb3dfb36fc7676ed54675db43
SHA25619ab4e3c9da6d9cedda7461efdba9a2085e743513ab89f1dd0fd5a8f9486ad23
SHA512be734c7e8afda19f445912aef0d78f9941add29baebd4a812bff27f10a1d78b52aeb11c551468c8644443c86e1a2a6b2e4aead3d7f81d39925e3c20406ac1499
-
Filesize
1KB
MD5373769061a1a8f719913955c4c4d1072
SHA11b2d37f84afd84e17a539a9d53af64a0b8216dc1
SHA25684b5fe5ddc9ee84c3139906f10725226d54b6e61653122d10c575505752435fa
SHA512cc149560c71a19a3c8c132b268c3bc759fa1cc0adb75dec37abf7b4ab9327969af25bbd26d897f7e6bbea21d5700fcebf0cee94e184094e0409a01d198542910
-
Filesize
5KB
MD5231916ae4146480be872c3510866eda5
SHA153eadd079872a6e9bd9ffca03878ab2bfa4f5b6f
SHA256e918fb369bfe48c87e24fc13f9059b25c70054f0b33b7bcd80d3b22dc9721b10
SHA512b683845a4d0761fe997322b51f1f53ae812665ce3d561f6c43faa6f1550fd923809cb255a52cb932790ec29a8df1904886bf595f74704c4e9607fbd6ad95de36
-
Filesize
6KB
MD552f683693a772e0f8f59d72b666bb537
SHA1a170ef61b4bf280ff8504996c5500f4caeb76bd2
SHA256cddbe37e0b5f44dbeb527f7edf1d9f30217bbf9b1ec7a64a54b589de705d6fb7
SHA51233a35bb1c2e2f281c6c2ea65562e99333a9a9046ed02d266907000a49a3a0dd66e24b09eddc76343da770459dc46603f8a06e86ee6c53061fe794bcd3e9793e9
-
Filesize
6KB
MD5a56763d831a1bfd058aaee29c984a49c
SHA18e9c8496eb6dd60df0a2c9d5ae95d19c2c734efe
SHA2569bcb3ebfff5355c1828d31adc12133aa4ce45ad5ba2fe6e70f433e319074b922
SHA512a7eb8883cb4292c0e3434a18086e01d6a565a97e4d416261e3605ff21965b527369aa61bd597359d2b59c07816157070d21a6b5a520da00bba5294a648301c16
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD56631e22b589e84ac75f629540af4159e
SHA14fe4a3533db6ae14b8fd98bb62e8a6c6511557cf
SHA256279c2f2fdfaa97ea6ce1c0e145c30d9e7117e963f9d03047493358c0fcc88ab4
SHA5129fcffea3879e4efb5129a8382f6660fc0cf9b91e86520c8987668c5608fd4389815b921f8c9b48f0c6881e033b9f65fdc2d04e5b71d8eff975a74cf0ff4f52aa