Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
13-05-2024 15:35
Static task
static1
Behavioral task
behavioral1
Sample
402e999f06d2e3694e8e971abfd02f93_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
402e999f06d2e3694e8e971abfd02f93_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
402e999f06d2e3694e8e971abfd02f93_JaffaCakes118.html
-
Size
88KB
-
MD5
402e999f06d2e3694e8e971abfd02f93
-
SHA1
ae73e94ace5be342b55b488bee29606839731d1a
-
SHA256
9f312cf701bc5ac48c1fef6faf485618f61b1678e81e6745afbf201e56a924dc
-
SHA512
21490cb49c92bb63b735da1a034b0f7ff606b93ed215eff1647ab70c22e5a8b8bd29729e2887458b1eb0cd639e71b230b8de7afb4ff046c175d48155bf725a9d
-
SSDEEP
1536:o9Z4uG+Bem72Q2pl5ARvExCRNy8Ht0ZChuRdQWpby7aoQrE31WRvWLz/z7xAOLct:UZXG8em72Q2WwRdQ7aoQra1WRvWLz/ny
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2020 msedge.exe 2020 msedge.exe 2760 msedge.exe 2760 msedge.exe 3984 identity_helper.exe 3984 identity_helper.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2760 wrote to memory of 3084 2760 msedge.exe 83 PID 2760 wrote to memory of 3084 2760 msedge.exe 83 PID 2760 wrote to memory of 3884 2760 msedge.exe 84 PID 2760 wrote to memory of 3884 2760 msedge.exe 84 PID 2760 wrote to memory of 3884 2760 msedge.exe 84 PID 2760 wrote to memory of 3884 2760 msedge.exe 84 PID 2760 wrote to memory of 3884 2760 msedge.exe 84 PID 2760 wrote to memory of 3884 2760 msedge.exe 84 PID 2760 wrote to memory of 3884 2760 msedge.exe 84 PID 2760 wrote to memory of 3884 2760 msedge.exe 84 PID 2760 wrote to memory of 3884 2760 msedge.exe 84 PID 2760 wrote to memory of 3884 2760 msedge.exe 84 PID 2760 wrote to memory of 3884 2760 msedge.exe 84 PID 2760 wrote to memory of 3884 2760 msedge.exe 84 PID 2760 wrote to memory of 3884 2760 msedge.exe 84 PID 2760 wrote to memory of 3884 2760 msedge.exe 84 PID 2760 wrote to memory of 3884 2760 msedge.exe 84 PID 2760 wrote to memory of 3884 2760 msedge.exe 84 PID 2760 wrote to memory of 3884 2760 msedge.exe 84 PID 2760 wrote to memory of 3884 2760 msedge.exe 84 PID 2760 wrote to memory of 3884 2760 msedge.exe 84 PID 2760 wrote to memory of 3884 2760 msedge.exe 84 PID 2760 wrote to memory of 3884 2760 msedge.exe 84 PID 2760 wrote to memory of 3884 2760 msedge.exe 84 PID 2760 wrote to memory of 3884 2760 msedge.exe 84 PID 2760 wrote to memory of 3884 2760 msedge.exe 84 PID 2760 wrote to memory of 3884 2760 msedge.exe 84 PID 2760 wrote to memory of 3884 2760 msedge.exe 84 PID 2760 wrote to memory of 3884 2760 msedge.exe 84 PID 2760 wrote to memory of 3884 2760 msedge.exe 84 PID 2760 wrote to memory of 3884 2760 msedge.exe 84 PID 2760 wrote to memory of 3884 2760 msedge.exe 84 PID 2760 wrote to memory of 3884 2760 msedge.exe 84 PID 2760 wrote to memory of 3884 2760 msedge.exe 84 PID 2760 wrote to memory of 3884 2760 msedge.exe 84 PID 2760 wrote to memory of 3884 2760 msedge.exe 84 PID 2760 wrote to memory of 3884 2760 msedge.exe 84 PID 2760 wrote to memory of 3884 2760 msedge.exe 84 PID 2760 wrote to memory of 3884 2760 msedge.exe 84 PID 2760 wrote to memory of 3884 2760 msedge.exe 84 PID 2760 wrote to memory of 3884 2760 msedge.exe 84 PID 2760 wrote to memory of 3884 2760 msedge.exe 84 PID 2760 wrote to memory of 2020 2760 msedge.exe 85 PID 2760 wrote to memory of 2020 2760 msedge.exe 85 PID 2760 wrote to memory of 912 2760 msedge.exe 86 PID 2760 wrote to memory of 912 2760 msedge.exe 86 PID 2760 wrote to memory of 912 2760 msedge.exe 86 PID 2760 wrote to memory of 912 2760 msedge.exe 86 PID 2760 wrote to memory of 912 2760 msedge.exe 86 PID 2760 wrote to memory of 912 2760 msedge.exe 86 PID 2760 wrote to memory of 912 2760 msedge.exe 86 PID 2760 wrote to memory of 912 2760 msedge.exe 86 PID 2760 wrote to memory of 912 2760 msedge.exe 86 PID 2760 wrote to memory of 912 2760 msedge.exe 86 PID 2760 wrote to memory of 912 2760 msedge.exe 86 PID 2760 wrote to memory of 912 2760 msedge.exe 86 PID 2760 wrote to memory of 912 2760 msedge.exe 86 PID 2760 wrote to memory of 912 2760 msedge.exe 86 PID 2760 wrote to memory of 912 2760 msedge.exe 86 PID 2760 wrote to memory of 912 2760 msedge.exe 86 PID 2760 wrote to memory of 912 2760 msedge.exe 86 PID 2760 wrote to memory of 912 2760 msedge.exe 86 PID 2760 wrote to memory of 912 2760 msedge.exe 86 PID 2760 wrote to memory of 912 2760 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\402e999f06d2e3694e8e971abfd02f93_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffff05446f8,0x7ffff0544708,0x7ffff05447182⤵PID:3084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,11280524843375896184,2392813578814380674,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2088 /prefetch:22⤵PID:3884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,11280524843375896184,2392813578814380674,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2156 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2080,11280524843375896184,2392813578814380674,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2764 /prefetch:82⤵PID:912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,11280524843375896184,2392813578814380674,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:3340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,11280524843375896184,2392813578814380674,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:4496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,11280524843375896184,2392813578814380674,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5884 /prefetch:82⤵PID:1396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,11280524843375896184,2392813578814380674,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5884 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,11280524843375896184,2392813578814380674,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5080 /prefetch:12⤵PID:1196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,11280524843375896184,2392813578814380674,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5108 /prefetch:12⤵PID:1988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,11280524843375896184,2392813578814380674,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3952 /prefetch:12⤵PID:3316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,11280524843375896184,2392813578814380674,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5024 /prefetch:12⤵PID:2952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,11280524843375896184,2392813578814380674,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3936 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3792
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2768
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4072
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54f7152bc5a1a715ef481e37d1c791959
SHA1c8a1ed674c62ae4f45519f90a8cc5a81eff3a6d7
SHA256704dd4f98d8ca34ec421f23ba1891b178c23c14b3301e4655efc5c02d356c2bc
SHA5122e6b02ca35d76a655a17a5f3e9dbd8d7517c7dae24f0095c7350eb9e7bdf9e1256a7009aa8878f96c89d1ea4fe5323a41f72b8c551806dda62880d7ff231ff5c
-
Filesize
152B
MD5ea98e583ad99df195d29aa066204ab56
SHA1f89398664af0179641aa0138b337097b617cb2db
SHA256a7abb51435909fa2d75c6f2ff5c69a93d4a0ab276ed579e7d8733b2a63ffbee6
SHA512e109be3466e653e5d310b3e402e1626298b09205d223722a82344dd78504f3c33e1e24e8402a02f38cd2c9c50d96a303ce4846bea5a583423937ab018cd5782f
-
Filesize
509B
MD52fe56e36ef16638fd4d3a989ebca78f5
SHA15813c0f5b99e5df470e761e532870e39c74715d8
SHA2569c2469a88155c97492f7ff446926eb8430223b6508e3224c4a84447367f10445
SHA512ad07e6c968f0deea948b23da5fe1c71c611e96d67df249a1940d65e6cd3e9326c6f00b2dfb65821dfed9f61104bb6a93fd2d25eb7184405a8a88aeb0b67d1a37
-
Filesize
5KB
MD585659cf96c6fa79530785240a77b2524
SHA1be493419dd94244adfcc42a930a87db29659945a
SHA25610570e357dfc065a708d76394a2868120049189ad7a8d4c52504618f5b54eae0
SHA512050f1663351b5abf6255c03d4928c2c682eae404d723d21691e379e0cd0f24af2e6caefacb7fc1b2492e26f15736709688350fb1da6eaf5b91ffc990da9b23ae
-
Filesize
6KB
MD5c49d6e92c685784d3098fcbd14e5df8a
SHA1f9206d210dd2022fffffe2f81813a13f41fbe8b9
SHA2568afec2a73fbf6fd8382ddd18abfa90afd4253139dfeb5041051bbf96a90891fb
SHA512c5ce1a1c101cbb2a96e180fc2ec5952abdb0638cb719807d56eb20def3d8eecc81a7f42bffdc1dde34967937879f2549b5a6c4bc030a01ec123a50f21ac95983
-
Filesize
6KB
MD5d793f863a2e8b80f284bf9d2f0f276a0
SHA1062cc4bd9e909b1eb2029b951dbd9f62dbeefa3d
SHA256c88b259f0acdf765ae5341903a08b62bd2ea8137702a0088f07419a0110611ed
SHA512023f1a4fe2822291adfdd3453c554bbef2f6cb5121acd5a6b09b8e271028ef3bf4f735c7dbe60bb661a2eb1490cd8e2d0ed7ba7da0e267890a06b695cc9db739
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD50f9e1ec5a73b2275631599afa8b9f08d
SHA153be0c47ed4f3da165013474e358337f16392978
SHA256bed26773e42708b3dcf9f9c95e535eaeaf622c1a72490abcc2f01131812d0a05
SHA5124f4d98f14bc4ae6cd2f974692ac5487bec0fd58555f4b5a327b25d4044f9600d78d1b4b745b845a15c497b5269ce475dc0d4c97837281b2aa381e4c7cd5717d8