Analysis
-
max time kernel
149s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
14/05/2024, 19:17
Static task
static1
Behavioral task
behavioral1
Sample
42ab2367f20d213fc4eedcd78ad90dcd_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
42ab2367f20d213fc4eedcd78ad90dcd_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
42ab2367f20d213fc4eedcd78ad90dcd_JaffaCakes118.html
-
Size
277KB
-
MD5
42ab2367f20d213fc4eedcd78ad90dcd
-
SHA1
c20f95ffdabe55f4d908b710765cc978a7635c52
-
SHA256
670330d0dfcc8f759e771263a3903101e31a7541024de795ac5307201de831df
-
SHA512
bc2222b89b25a568fd929c34a69142ca95942e7cd8a1d528107e8cb16d3c76897ddd4284ca0e1f11862530cde1085cfc7366a3b97c643b78b76bcb790b9f7f16
-
SSDEEP
6144:HS28YxfTER5XBYV8rpMUdUF11O71Xk9Nb:HS2ncBC
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1184 msedge.exe 1184 msedge.exe 2396 msedge.exe 2396 msedge.exe 4920 identity_helper.exe 4920 identity_helper.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2396 wrote to memory of 3088 2396 msedge.exe 82 PID 2396 wrote to memory of 3088 2396 msedge.exe 82 PID 2396 wrote to memory of 4368 2396 msedge.exe 83 PID 2396 wrote to memory of 4368 2396 msedge.exe 83 PID 2396 wrote to memory of 4368 2396 msedge.exe 83 PID 2396 wrote to memory of 4368 2396 msedge.exe 83 PID 2396 wrote to memory of 4368 2396 msedge.exe 83 PID 2396 wrote to memory of 4368 2396 msedge.exe 83 PID 2396 wrote to memory of 4368 2396 msedge.exe 83 PID 2396 wrote to memory of 4368 2396 msedge.exe 83 PID 2396 wrote to memory of 4368 2396 msedge.exe 83 PID 2396 wrote to memory of 4368 2396 msedge.exe 83 PID 2396 wrote to memory of 4368 2396 msedge.exe 83 PID 2396 wrote to memory of 4368 2396 msedge.exe 83 PID 2396 wrote to memory of 4368 2396 msedge.exe 83 PID 2396 wrote to memory of 4368 2396 msedge.exe 83 PID 2396 wrote to memory of 4368 2396 msedge.exe 83 PID 2396 wrote to memory of 4368 2396 msedge.exe 83 PID 2396 wrote to memory of 4368 2396 msedge.exe 83 PID 2396 wrote to memory of 4368 2396 msedge.exe 83 PID 2396 wrote to memory of 4368 2396 msedge.exe 83 PID 2396 wrote to memory of 4368 2396 msedge.exe 83 PID 2396 wrote to memory of 4368 2396 msedge.exe 83 PID 2396 wrote to memory of 4368 2396 msedge.exe 83 PID 2396 wrote to memory of 4368 2396 msedge.exe 83 PID 2396 wrote to memory of 4368 2396 msedge.exe 83 PID 2396 wrote to memory of 4368 2396 msedge.exe 83 PID 2396 wrote to memory of 4368 2396 msedge.exe 83 PID 2396 wrote to memory of 4368 2396 msedge.exe 83 PID 2396 wrote to memory of 4368 2396 msedge.exe 83 PID 2396 wrote to memory of 4368 2396 msedge.exe 83 PID 2396 wrote to memory of 4368 2396 msedge.exe 83 PID 2396 wrote to memory of 4368 2396 msedge.exe 83 PID 2396 wrote to memory of 4368 2396 msedge.exe 83 PID 2396 wrote to memory of 4368 2396 msedge.exe 83 PID 2396 wrote to memory of 4368 2396 msedge.exe 83 PID 2396 wrote to memory of 4368 2396 msedge.exe 83 PID 2396 wrote to memory of 4368 2396 msedge.exe 83 PID 2396 wrote to memory of 4368 2396 msedge.exe 83 PID 2396 wrote to memory of 4368 2396 msedge.exe 83 PID 2396 wrote to memory of 4368 2396 msedge.exe 83 PID 2396 wrote to memory of 4368 2396 msedge.exe 83 PID 2396 wrote to memory of 1184 2396 msedge.exe 84 PID 2396 wrote to memory of 1184 2396 msedge.exe 84 PID 2396 wrote to memory of 456 2396 msedge.exe 85 PID 2396 wrote to memory of 456 2396 msedge.exe 85 PID 2396 wrote to memory of 456 2396 msedge.exe 85 PID 2396 wrote to memory of 456 2396 msedge.exe 85 PID 2396 wrote to memory of 456 2396 msedge.exe 85 PID 2396 wrote to memory of 456 2396 msedge.exe 85 PID 2396 wrote to memory of 456 2396 msedge.exe 85 PID 2396 wrote to memory of 456 2396 msedge.exe 85 PID 2396 wrote to memory of 456 2396 msedge.exe 85 PID 2396 wrote to memory of 456 2396 msedge.exe 85 PID 2396 wrote to memory of 456 2396 msedge.exe 85 PID 2396 wrote to memory of 456 2396 msedge.exe 85 PID 2396 wrote to memory of 456 2396 msedge.exe 85 PID 2396 wrote to memory of 456 2396 msedge.exe 85 PID 2396 wrote to memory of 456 2396 msedge.exe 85 PID 2396 wrote to memory of 456 2396 msedge.exe 85 PID 2396 wrote to memory of 456 2396 msedge.exe 85 PID 2396 wrote to memory of 456 2396 msedge.exe 85 PID 2396 wrote to memory of 456 2396 msedge.exe 85 PID 2396 wrote to memory of 456 2396 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\42ab2367f20d213fc4eedcd78ad90dcd_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff6dc846f8,0x7fff6dc84708,0x7fff6dc847182⤵PID:3088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,3869316595689233869,11487851170343738074,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵PID:4368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,3869316595689233869,11487851170343738074,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2360 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2080,3869316595689233869,11487851170343738074,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2840 /prefetch:82⤵PID:456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,3869316595689233869,11487851170343738074,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:3188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,3869316595689233869,11487851170343738074,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:12⤵PID:1640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,3869316595689233869,11487851170343738074,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5700 /prefetch:82⤵PID:3752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,3869316595689233869,11487851170343738074,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5700 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,3869316595689233869,11487851170343738074,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4956 /prefetch:12⤵PID:4124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,3869316595689233869,11487851170343738074,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5016 /prefetch:12⤵PID:4308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,3869316595689233869,11487851170343738074,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5744 /prefetch:12⤵PID:5072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,3869316595689233869,11487851170343738074,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5768 /prefetch:12⤵PID:4520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,3869316595689233869,11487851170343738074,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3316 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4632
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4872
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3376
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f61fa5143fe872d1d8f1e9f8dc6544f9
SHA1df44bab94d7388fb38c63085ec4db80cfc5eb009
SHA256284a24b5b40860240db00ef3ae6a33c9fa8349ab5490a634e27b2c6e9a191c64
SHA512971000784a6518bb39c5cf043292c7ab659162275470f5f6b632ea91a6bcae83bc80517ceb983dd5abfe8fb4e157344cb65c27e609a879eec00b33c5fad563a6
-
Filesize
152B
MD587f7abeb82600e1e640b843ad50fe0a1
SHA1045bbada3f23fc59941bf7d0210fb160cb78ae87
SHA256b35d6906050d90a81d23646f86c20a8f5d42f058ffc6436fb0a2b8bd71ee1262
SHA512ea8e7f24ab823ad710ce079c86c40aa957353a00d2775732c23e31be88a10d212e974c4691279aa86016c4660f5795febf739a15207833df6ed964a9ed99d618
-
Filesize
1KB
MD58cf2032574d95c72f6bbc9ff3e93757b
SHA13dd048be9bf31faa45de328995bb7ae4148127ff
SHA256d1735ddb9b2ff9e767cbad7dc8b246d4dc72d7d763f732c00c3739649e14d67a
SHA5125ce5ce7a71ae98a528b2d7c3d6d25e177dac89adb3b15ca20c2f28d71a9fe02e5f7b80ce6b69fc79e4e4478191d5cccd7ca91f6073192b5c36a115aa86a3364f
-
Filesize
1KB
MD5510dd252aa43b24b065e08b42fd13433
SHA17cd5e36ce365ea0601c49594d76b5e3a77285979
SHA256ea3e053ade2bcf527034eef948dd9c7d9c6b94e1b54d58dd9d013b1e2443feba
SHA5125dc01e057e2b0ae880095014953ec1d2d0088a61faf3de0533f5db206b3d2c648ff59df414f969b9cc51459239e2b6c16ac2f21d0cf7efb15e0ab3a3ea135f6e
-
Filesize
6KB
MD5e48efd567c25068a4e65d55ad6748109
SHA133f53aab3b7f96e7865521d3a6396b800f1b134b
SHA25612cba78257f3aaff5dd121080a947a8c7fb4b03526a7048aed0ae2374a8e7efc
SHA5122f80814487c65f03fa9d839316c72a0ebe57c1c6b8558b1d84b96fbf8b8525f2d85abe40dd4a5873645a229d37369f4087d02809d3d55deffc1d296bfc602497
-
Filesize
6KB
MD545325525e6eeb6d9cf946f9ebc295216
SHA1079ee514d40279e1372acc4e2b1f8d41dcb24ab3
SHA25649de7bfc806bdc8effd7831ac255848f2bb63552ac3c73c469d5c138e75301b7
SHA512cf56fd179c1c5ffccbd8657370c29afff093fb4d666fd43dbc221ae98d597546b0a6b3710cdd8b6d7369abcfe7228a729aea97d5970064398f7c9062eb620dda
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5eda0b91c271e85c479f07fe0416a4f43
SHA1d285b7a54ca555e18906c4fae45de8875937d562
SHA256acb52aef9a50cf387693ab90e25c9b8ce6cf123b1ff1bdf896f820c0f3d9e40a
SHA5122246997d50ef3b5a30a9d9466812c349ec19148c2edcd3aaa4e7b0f83ab730a895874f4eadfa8b8f6a31d519ef8d5b964baf2a55eceab7eff8eddc421b211a3b