Analysis
-
max time kernel
145s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
12/05/2024, 08:13
Static task
static1
Behavioral task
behavioral1
Sample
392033ccecb721338ff8688ab7fd5289_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
392033ccecb721338ff8688ab7fd5289_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
392033ccecb721338ff8688ab7fd5289_JaffaCakes118.html
-
Size
67KB
-
MD5
392033ccecb721338ff8688ab7fd5289
-
SHA1
a4769f3c396c30f879845c0b3ca08cc806860908
-
SHA256
b412de98b13c5ac8ceda608a66db9e89e1d7a12157e0d396435086ea2ceaf9c4
-
SHA512
174672999aaf152f18dc99e5345f8957040ea20862b82d8432ca8b18739b91d8a2b614c423d789236f922cd453133449006a66a9d109a46bca8db7a5f590e93e
-
SSDEEP
1536:d002oJ0j0pY7DWBuNiC/1t/Sh2i7vD2FCm0zpRwcfUbvpU7xMQjRpA3J:HPwDhNiC/7/ShLSUpRwcfUm7xMQjRpAZ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3544 msedge.exe 3544 msedge.exe 2184 msedge.exe 2184 msedge.exe 5024 identity_helper.exe 5024 identity_helper.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2184 wrote to memory of 1168 2184 msedge.exe 81 PID 2184 wrote to memory of 1168 2184 msedge.exe 81 PID 2184 wrote to memory of 3404 2184 msedge.exe 82 PID 2184 wrote to memory of 3404 2184 msedge.exe 82 PID 2184 wrote to memory of 3404 2184 msedge.exe 82 PID 2184 wrote to memory of 3404 2184 msedge.exe 82 PID 2184 wrote to memory of 3404 2184 msedge.exe 82 PID 2184 wrote to memory of 3404 2184 msedge.exe 82 PID 2184 wrote to memory of 3404 2184 msedge.exe 82 PID 2184 wrote to memory of 3404 2184 msedge.exe 82 PID 2184 wrote to memory of 3404 2184 msedge.exe 82 PID 2184 wrote to memory of 3404 2184 msedge.exe 82 PID 2184 wrote to memory of 3404 2184 msedge.exe 82 PID 2184 wrote to memory of 3404 2184 msedge.exe 82 PID 2184 wrote to memory of 3404 2184 msedge.exe 82 PID 2184 wrote to memory of 3404 2184 msedge.exe 82 PID 2184 wrote to memory of 3404 2184 msedge.exe 82 PID 2184 wrote to memory of 3404 2184 msedge.exe 82 PID 2184 wrote to memory of 3404 2184 msedge.exe 82 PID 2184 wrote to memory of 3404 2184 msedge.exe 82 PID 2184 wrote to memory of 3404 2184 msedge.exe 82 PID 2184 wrote to memory of 3404 2184 msedge.exe 82 PID 2184 wrote to memory of 3404 2184 msedge.exe 82 PID 2184 wrote to memory of 3404 2184 msedge.exe 82 PID 2184 wrote to memory of 3404 2184 msedge.exe 82 PID 2184 wrote to memory of 3404 2184 msedge.exe 82 PID 2184 wrote to memory of 3404 2184 msedge.exe 82 PID 2184 wrote to memory of 3404 2184 msedge.exe 82 PID 2184 wrote to memory of 3404 2184 msedge.exe 82 PID 2184 wrote to memory of 3404 2184 msedge.exe 82 PID 2184 wrote to memory of 3404 2184 msedge.exe 82 PID 2184 wrote to memory of 3404 2184 msedge.exe 82 PID 2184 wrote to memory of 3404 2184 msedge.exe 82 PID 2184 wrote to memory of 3404 2184 msedge.exe 82 PID 2184 wrote to memory of 3404 2184 msedge.exe 82 PID 2184 wrote to memory of 3404 2184 msedge.exe 82 PID 2184 wrote to memory of 3404 2184 msedge.exe 82 PID 2184 wrote to memory of 3404 2184 msedge.exe 82 PID 2184 wrote to memory of 3404 2184 msedge.exe 82 PID 2184 wrote to memory of 3404 2184 msedge.exe 82 PID 2184 wrote to memory of 3404 2184 msedge.exe 82 PID 2184 wrote to memory of 3404 2184 msedge.exe 82 PID 2184 wrote to memory of 3544 2184 msedge.exe 83 PID 2184 wrote to memory of 3544 2184 msedge.exe 83 PID 2184 wrote to memory of 1636 2184 msedge.exe 84 PID 2184 wrote to memory of 1636 2184 msedge.exe 84 PID 2184 wrote to memory of 1636 2184 msedge.exe 84 PID 2184 wrote to memory of 1636 2184 msedge.exe 84 PID 2184 wrote to memory of 1636 2184 msedge.exe 84 PID 2184 wrote to memory of 1636 2184 msedge.exe 84 PID 2184 wrote to memory of 1636 2184 msedge.exe 84 PID 2184 wrote to memory of 1636 2184 msedge.exe 84 PID 2184 wrote to memory of 1636 2184 msedge.exe 84 PID 2184 wrote to memory of 1636 2184 msedge.exe 84 PID 2184 wrote to memory of 1636 2184 msedge.exe 84 PID 2184 wrote to memory of 1636 2184 msedge.exe 84 PID 2184 wrote to memory of 1636 2184 msedge.exe 84 PID 2184 wrote to memory of 1636 2184 msedge.exe 84 PID 2184 wrote to memory of 1636 2184 msedge.exe 84 PID 2184 wrote to memory of 1636 2184 msedge.exe 84 PID 2184 wrote to memory of 1636 2184 msedge.exe 84 PID 2184 wrote to memory of 1636 2184 msedge.exe 84 PID 2184 wrote to memory of 1636 2184 msedge.exe 84 PID 2184 wrote to memory of 1636 2184 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\392033ccecb721338ff8688ab7fd5289_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe986b46f8,0x7ffe986b4708,0x7ffe986b47182⤵PID:1168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,5955564532174879211,10848849266272655509,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2080 /prefetch:22⤵PID:3404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,5955564532174879211,10848849266272655509,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,5955564532174879211,10848849266272655509,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2744 /prefetch:82⤵PID:1636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,5955564532174879211,10848849266272655509,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:1284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,5955564532174879211,10848849266272655509,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:3880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,5955564532174879211,10848849266272655509,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2544 /prefetch:12⤵PID:3988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,5955564532174879211,10848849266272655509,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5568 /prefetch:82⤵PID:2796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,5955564532174879211,10848849266272655509,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5568 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,5955564532174879211,10848849266272655509,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1856 /prefetch:12⤵PID:4848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,5955564532174879211,10848849266272655509,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1260 /prefetch:12⤵PID:940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,5955564532174879211,10848849266272655509,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6124 /prefetch:12⤵PID:5100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,5955564532174879211,10848849266272655509,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6064 /prefetch:12⤵PID:1992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,5955564532174879211,10848849266272655509,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4980 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2760
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:344
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2456
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
Filesize
666B
MD520afc91064246b122d9b062e39cfe98a
SHA13dbf65adb797979d5b17ff47596e175bb53b1901
SHA256562f89c4d2eff4f048062f458d39f717122f9ec5a012075c25b6f1bac8f1e0f4
SHA51231bae0cda840475502d05394083e1f59deac898fcd00ca342a4e19b343064c6ef1c97067b7383e94d0978d9b2ae5bee4c892db47ef153f66640e588560a7eead
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
666B
MD566efcd670b2bb46703d6aa4a818f4981
SHA1aacc077856aef60bac465fa6809b0d3d5084a116
SHA256a35e130d837be4bafa391e7931f56f331174cc3ea4088313c25fc52e341c2fba
SHA51214da092ff0b5aba3024bd261a102335ca0a665603f578565111dc249912578db0386c5f798f83e9ebb68a104fd1d175cb04b7e183cd2620df2c02f8ea81a424e
-
Filesize
6KB
MD5719f6a533622ab29a2564afd94fa926f
SHA10000029a1a32bb1496668fe0a461069400f73aa8
SHA2568715e5d32d50c18bc39ffa4e424ca4d7bb3fa6a35b57d5207313f7ee473f8ced
SHA51275fda813c41be5d6e3b6fe05c7958cfd923b665ea19b9f23ae0bd5e856649d5396310fb1979a2818ce97bf307d936f93779b0a7d796e212409fd95da4fd31713
-
Filesize
6KB
MD54e147f3a081c48a6741592ff5fa70eab
SHA14dd7ca48a151b07b0db0d0e31a60b1ead40bc591
SHA2560afd56bce0d082d0f9bdfd775de69a2266b8f824231a78188d35d8ae22ceb85a
SHA51266ee3c916dcc80df8c7b7ad4ce0bb978a4f111c7c87e1f8bbc2432201f0603b222b1cf10eadb8a2a92abe2682c399b92792f063a4299ae7a6051c045728adf21
-
Filesize
6KB
MD58422a5844e02a65184aeb1ac0d197e7e
SHA12de8e75f610b8354295de0e526a57a7ef8a48aa8
SHA25669ad46e7e6fb3ce983b5c2350b407430e953eac905488515e4b0df06ff0e9306
SHA512122eff9c55483ece646d42d0c4111f6f2ba1409c7a61e7eac5172c73ef596f76020b591d0be4953900613a7a87b86cee71fe4dc5c0c9747c6e0fc672dd241d2a
-
Filesize
370B
MD5075bb6bc9acb4a7752a52d2364035504
SHA19148fd85d1c851394a39a887528dcb619ab9abf1
SHA256a7e00b4af376464c19d8f079dde1b0943cee70d05b73f791e3b4a88805bdc80b
SHA5120b25ea2b0dd3238844a67355a407b616f5595db5afebcc5f67a3b1e18927df3c5f564a1b8118a68ff336ac8ce423616984d564ec6bcd19015f054ef88097fcb5
-
Filesize
203B
MD5744af7891901a52643529fd76db37672
SHA130e4da18afd7c9b39d0a9a0052f6bc90e3fd4aa7
SHA256dd1cdfc575210dda1f4260da03600120b92673ba2ed0ebf4dbd5047bc8de3113
SHA512357e7ca3d20f0d4f125064f2d11a63d59315a441e0202ced9339fdec6613c2417630921284eccfdfc8ff408203e0e0988722c28227f7c27c0c86d912941865c0
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5bc79ea4a9301709538a428d558f721ff
SHA13b42bb974ebe29871eea740dd903746f6a379281
SHA2567d1afef2ddac0ee744cc0c927558839eaacab19cd9c5d154801df6e1e5ed866b
SHA512f298296c7d8a4f73c875410c9ff29846e01c88f82153e49e6d667ccfbaf116813392702426ae8895fbd4c628ce47d23af1f1de6844a447737e74b2e4aea043bc