Analysis
-
max time kernel
145s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
14/05/2024, 09:13
Static task
static1
Behavioral task
behavioral1
Sample
40f7d7107f2734c6f4fa38fefad9fd3f_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
40f7d7107f2734c6f4fa38fefad9fd3f_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
40f7d7107f2734c6f4fa38fefad9fd3f_JaffaCakes118.html
-
Size
201KB
-
MD5
40f7d7107f2734c6f4fa38fefad9fd3f
-
SHA1
046082db2f0fd017b07838822feb3eacf56e3646
-
SHA256
3889b0761334e88ab170971313aa1253fb1b6a95a02ab5e9168e38a94401deb3
-
SHA512
a4f24363f44bc1897946db06829c868710184122c89899b23ed3c52a27dc4ca7eda8d200a89c3373fee49f727926a8273050b381a542679a3ab741cc0c61cc78
-
SSDEEP
1536:kaSWfQyL3Ll/WR2KbcpK2I9XBsOOARQDcm5HadEhGZMGvM:dSv9X5q5
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1624 msedge.exe 1624 msedge.exe 3064 msedge.exe 3064 msedge.exe 3584 identity_helper.exe 3584 identity_helper.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3064 msedge.exe 3064 msedge.exe 3064 msedge.exe 3064 msedge.exe 3064 msedge.exe 3064 msedge.exe 3064 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3064 msedge.exe 3064 msedge.exe 3064 msedge.exe 3064 msedge.exe 3064 msedge.exe 3064 msedge.exe 3064 msedge.exe 3064 msedge.exe 3064 msedge.exe 3064 msedge.exe 3064 msedge.exe 3064 msedge.exe 3064 msedge.exe 3064 msedge.exe 3064 msedge.exe 3064 msedge.exe 3064 msedge.exe 3064 msedge.exe 3064 msedge.exe 3064 msedge.exe 3064 msedge.exe 3064 msedge.exe 3064 msedge.exe 3064 msedge.exe 3064 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3064 msedge.exe 3064 msedge.exe 3064 msedge.exe 3064 msedge.exe 3064 msedge.exe 3064 msedge.exe 3064 msedge.exe 3064 msedge.exe 3064 msedge.exe 3064 msedge.exe 3064 msedge.exe 3064 msedge.exe 3064 msedge.exe 3064 msedge.exe 3064 msedge.exe 3064 msedge.exe 3064 msedge.exe 3064 msedge.exe 3064 msedge.exe 3064 msedge.exe 3064 msedge.exe 3064 msedge.exe 3064 msedge.exe 3064 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3064 wrote to memory of 5072 3064 msedge.exe 82 PID 3064 wrote to memory of 5072 3064 msedge.exe 82 PID 3064 wrote to memory of 2240 3064 msedge.exe 83 PID 3064 wrote to memory of 2240 3064 msedge.exe 83 PID 3064 wrote to memory of 2240 3064 msedge.exe 83 PID 3064 wrote to memory of 2240 3064 msedge.exe 83 PID 3064 wrote to memory of 2240 3064 msedge.exe 83 PID 3064 wrote to memory of 2240 3064 msedge.exe 83 PID 3064 wrote to memory of 2240 3064 msedge.exe 83 PID 3064 wrote to memory of 2240 3064 msedge.exe 83 PID 3064 wrote to memory of 2240 3064 msedge.exe 83 PID 3064 wrote to memory of 2240 3064 msedge.exe 83 PID 3064 wrote to memory of 2240 3064 msedge.exe 83 PID 3064 wrote to memory of 2240 3064 msedge.exe 83 PID 3064 wrote to memory of 2240 3064 msedge.exe 83 PID 3064 wrote to memory of 2240 3064 msedge.exe 83 PID 3064 wrote to memory of 2240 3064 msedge.exe 83 PID 3064 wrote to memory of 2240 3064 msedge.exe 83 PID 3064 wrote to memory of 2240 3064 msedge.exe 83 PID 3064 wrote to memory of 2240 3064 msedge.exe 83 PID 3064 wrote to memory of 2240 3064 msedge.exe 83 PID 3064 wrote to memory of 2240 3064 msedge.exe 83 PID 3064 wrote to memory of 2240 3064 msedge.exe 83 PID 3064 wrote to memory of 2240 3064 msedge.exe 83 PID 3064 wrote to memory of 2240 3064 msedge.exe 83 PID 3064 wrote to memory of 2240 3064 msedge.exe 83 PID 3064 wrote to memory of 2240 3064 msedge.exe 83 PID 3064 wrote to memory of 2240 3064 msedge.exe 83 PID 3064 wrote to memory of 2240 3064 msedge.exe 83 PID 3064 wrote to memory of 2240 3064 msedge.exe 83 PID 3064 wrote to memory of 2240 3064 msedge.exe 83 PID 3064 wrote to memory of 2240 3064 msedge.exe 83 PID 3064 wrote to memory of 2240 3064 msedge.exe 83 PID 3064 wrote to memory of 2240 3064 msedge.exe 83 PID 3064 wrote to memory of 2240 3064 msedge.exe 83 PID 3064 wrote to memory of 2240 3064 msedge.exe 83 PID 3064 wrote to memory of 2240 3064 msedge.exe 83 PID 3064 wrote to memory of 2240 3064 msedge.exe 83 PID 3064 wrote to memory of 2240 3064 msedge.exe 83 PID 3064 wrote to memory of 2240 3064 msedge.exe 83 PID 3064 wrote to memory of 2240 3064 msedge.exe 83 PID 3064 wrote to memory of 2240 3064 msedge.exe 83 PID 3064 wrote to memory of 1624 3064 msedge.exe 84 PID 3064 wrote to memory of 1624 3064 msedge.exe 84 PID 3064 wrote to memory of 2964 3064 msedge.exe 85 PID 3064 wrote to memory of 2964 3064 msedge.exe 85 PID 3064 wrote to memory of 2964 3064 msedge.exe 85 PID 3064 wrote to memory of 2964 3064 msedge.exe 85 PID 3064 wrote to memory of 2964 3064 msedge.exe 85 PID 3064 wrote to memory of 2964 3064 msedge.exe 85 PID 3064 wrote to memory of 2964 3064 msedge.exe 85 PID 3064 wrote to memory of 2964 3064 msedge.exe 85 PID 3064 wrote to memory of 2964 3064 msedge.exe 85 PID 3064 wrote to memory of 2964 3064 msedge.exe 85 PID 3064 wrote to memory of 2964 3064 msedge.exe 85 PID 3064 wrote to memory of 2964 3064 msedge.exe 85 PID 3064 wrote to memory of 2964 3064 msedge.exe 85 PID 3064 wrote to memory of 2964 3064 msedge.exe 85 PID 3064 wrote to memory of 2964 3064 msedge.exe 85 PID 3064 wrote to memory of 2964 3064 msedge.exe 85 PID 3064 wrote to memory of 2964 3064 msedge.exe 85 PID 3064 wrote to memory of 2964 3064 msedge.exe 85 PID 3064 wrote to memory of 2964 3064 msedge.exe 85 PID 3064 wrote to memory of 2964 3064 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\40f7d7107f2734c6f4fa38fefad9fd3f_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdfb8946f8,0x7ffdfb894708,0x7ffdfb8947182⤵PID:5072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,6957324158445113925,8238367625564843646,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:22⤵PID:2240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,6957324158445113925,8238367625564843646,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2212 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,6957324158445113925,8238367625564843646,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2824 /prefetch:82⤵PID:2964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,6957324158445113925,8238367625564843646,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:3112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,6957324158445113925,8238367625564843646,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:12⤵PID:3124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,6957324158445113925,8238367625564843646,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4732 /prefetch:12⤵PID:1004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,6957324158445113925,8238367625564843646,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6028 /prefetch:82⤵PID:2812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,6957324158445113925,8238367625564843646,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6028 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,6957324158445113925,8238367625564843646,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6032 /prefetch:12⤵PID:3036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,6957324158445113925,8238367625564843646,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5888 /prefetch:12⤵PID:3472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,6957324158445113925,8238367625564843646,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4028 /prefetch:12⤵PID:2184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,6957324158445113925,8238367625564843646,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5828 /prefetch:12⤵PID:1140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,6957324158445113925,8238367625564843646,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3840 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1356
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:924
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3976
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f61fa5143fe872d1d8f1e9f8dc6544f9
SHA1df44bab94d7388fb38c63085ec4db80cfc5eb009
SHA256284a24b5b40860240db00ef3ae6a33c9fa8349ab5490a634e27b2c6e9a191c64
SHA512971000784a6518bb39c5cf043292c7ab659162275470f5f6b632ea91a6bcae83bc80517ceb983dd5abfe8fb4e157344cb65c27e609a879eec00b33c5fad563a6
-
Filesize
152B
MD587f7abeb82600e1e640b843ad50fe0a1
SHA1045bbada3f23fc59941bf7d0210fb160cb78ae87
SHA256b35d6906050d90a81d23646f86c20a8f5d42f058ffc6436fb0a2b8bd71ee1262
SHA512ea8e7f24ab823ad710ce079c86c40aa957353a00d2775732c23e31be88a10d212e974c4691279aa86016c4660f5795febf739a15207833df6ed964a9ed99d618
-
Filesize
255B
MD584b28e8ffed9fa0b8f6a91b5b31b308d
SHA1efaf4dff37c34966c481eef0caf7dacee9e2a78c
SHA256cf81f066b1ba1e869f5551bbc61c497d91035e2afcb750c3e63d5c7644b0b29c
SHA512a838f81d13c5ecf02aedcdc60159f4b3f6e22e1f14c566ee3b2765e5645fe0eebabe24124ac018ea64986261c904e5bb50512708babe39bde76d7a5ab9280ea9
-
Filesize
6KB
MD5e7078beccc8299be34f34b7341c2ecc8
SHA1f524a6b12fcc7747d1cdf0e1616909e1f9c492c5
SHA2567b73818f72216afd8a2305dee73f9ac8ba972078cca3cb0b6179e58a56009e42
SHA512cbd3db341e5fd1598032b5434b314268b2d9e3816925a806bd84dd7fcfbf4d21bc5c54b13a5a15ef9a391fff57a0c1b60048c4c9fd27f32116854e2fa268b51d
-
Filesize
6KB
MD5821dbef227ed15ebb57ea0f1e26b7cb4
SHA1afa50395c28be93474d5a45c746cfa54abdf6343
SHA2565740e917d5c596e1b6e95573411245778f05f35f47dc985ee8f2940ed0f6e920
SHA51266fadfdf180ae14007129b9d541e52a035aeeba29d1ba48341f77f03831113814f8e5ef9f3824e3c9d0235430668bfe17e37df83519c85110c2a5ecc944aacfc
-
Filesize
6KB
MD59597c97750353acfe758d21fc1b44e1e
SHA13e5fdb3d7d0d2e1a7df4d0ed27b37e7651365242
SHA256edd8e0e2b583af4db3e228dc4d76ca914c0804d5d6e6239c5954b4941f4ac4bd
SHA512507c954756ce37d19848f3885f6d16b62579693e0d0f8039ddcd6422ae268897332b89d35c42af8a9c73d6c8f19aad325d921416d17e7e01f4a9bdf87e5647a0
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD543288b1ebe18f11d59b760eb300c7e34
SHA175867e234dc1f9623d68eb94a5e8084dee78dae5
SHA2566f095e9f9cfd4a975b154206048334565cb7b354f6e1a4ffab27e4dcbbf5baa7
SHA512f2adb221b9ba69107781cddc9c3aee87d94dd04a7178ac1cf75e6e321c534d29c28dc48c87e6470e2de55802d7ebaf9383f1a0b3112f837e1a0a14352ab93ce3