Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
15-06-2024 05:18
Static task
static1
Behavioral task
behavioral1
Sample
acff475a2b42df4e4d41abd8d27ccfbb_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
acff475a2b42df4e4d41abd8d27ccfbb_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
acff475a2b42df4e4d41abd8d27ccfbb_JaffaCakes118.html
-
Size
50KB
-
MD5
acff475a2b42df4e4d41abd8d27ccfbb
-
SHA1
34d1862c6ddd5f0da4a0c2a24af1607d82a0922b
-
SHA256
b4bda8685bf48fa7bfa48c2a5157eaa3dafa20e5efabc72f6963319f8d895212
-
SHA512
94c64b3eccb577530e57e6a135be770d94c455dea50baa0545a0fc06ae1c154f3a567ac42a6b039356b664f3a5748a9da46077655cbb038f87f3d898eb650d5b
-
SSDEEP
1536:iFsqbIuPO0FO+wesDmfSuJK6rwE3a4zqmaAi6K2eF3PKGBDR6:MIuPOonsDWJK6rwKa4Oma16K2eF3PKG6
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1496 msedge.exe 1496 msedge.exe 2724 msedge.exe 2724 msedge.exe 4928 identity_helper.exe 4928 identity_helper.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2724 wrote to memory of 4592 2724 msedge.exe 81 PID 2724 wrote to memory of 4592 2724 msedge.exe 81 PID 2724 wrote to memory of 4380 2724 msedge.exe 82 PID 2724 wrote to memory of 4380 2724 msedge.exe 82 PID 2724 wrote to memory of 4380 2724 msedge.exe 82 PID 2724 wrote to memory of 4380 2724 msedge.exe 82 PID 2724 wrote to memory of 4380 2724 msedge.exe 82 PID 2724 wrote to memory of 4380 2724 msedge.exe 82 PID 2724 wrote to memory of 4380 2724 msedge.exe 82 PID 2724 wrote to memory of 4380 2724 msedge.exe 82 PID 2724 wrote to memory of 4380 2724 msedge.exe 82 PID 2724 wrote to memory of 4380 2724 msedge.exe 82 PID 2724 wrote to memory of 4380 2724 msedge.exe 82 PID 2724 wrote to memory of 4380 2724 msedge.exe 82 PID 2724 wrote to memory of 4380 2724 msedge.exe 82 PID 2724 wrote to memory of 4380 2724 msedge.exe 82 PID 2724 wrote to memory of 4380 2724 msedge.exe 82 PID 2724 wrote to memory of 4380 2724 msedge.exe 82 PID 2724 wrote to memory of 4380 2724 msedge.exe 82 PID 2724 wrote to memory of 4380 2724 msedge.exe 82 PID 2724 wrote to memory of 4380 2724 msedge.exe 82 PID 2724 wrote to memory of 4380 2724 msedge.exe 82 PID 2724 wrote to memory of 4380 2724 msedge.exe 82 PID 2724 wrote to memory of 4380 2724 msedge.exe 82 PID 2724 wrote to memory of 4380 2724 msedge.exe 82 PID 2724 wrote to memory of 4380 2724 msedge.exe 82 PID 2724 wrote to memory of 4380 2724 msedge.exe 82 PID 2724 wrote to memory of 4380 2724 msedge.exe 82 PID 2724 wrote to memory of 4380 2724 msedge.exe 82 PID 2724 wrote to memory of 4380 2724 msedge.exe 82 PID 2724 wrote to memory of 4380 2724 msedge.exe 82 PID 2724 wrote to memory of 4380 2724 msedge.exe 82 PID 2724 wrote to memory of 4380 2724 msedge.exe 82 PID 2724 wrote to memory of 4380 2724 msedge.exe 82 PID 2724 wrote to memory of 4380 2724 msedge.exe 82 PID 2724 wrote to memory of 4380 2724 msedge.exe 82 PID 2724 wrote to memory of 4380 2724 msedge.exe 82 PID 2724 wrote to memory of 4380 2724 msedge.exe 82 PID 2724 wrote to memory of 4380 2724 msedge.exe 82 PID 2724 wrote to memory of 4380 2724 msedge.exe 82 PID 2724 wrote to memory of 4380 2724 msedge.exe 82 PID 2724 wrote to memory of 4380 2724 msedge.exe 82 PID 2724 wrote to memory of 1496 2724 msedge.exe 83 PID 2724 wrote to memory of 1496 2724 msedge.exe 83 PID 2724 wrote to memory of 2032 2724 msedge.exe 84 PID 2724 wrote to memory of 2032 2724 msedge.exe 84 PID 2724 wrote to memory of 2032 2724 msedge.exe 84 PID 2724 wrote to memory of 2032 2724 msedge.exe 84 PID 2724 wrote to memory of 2032 2724 msedge.exe 84 PID 2724 wrote to memory of 2032 2724 msedge.exe 84 PID 2724 wrote to memory of 2032 2724 msedge.exe 84 PID 2724 wrote to memory of 2032 2724 msedge.exe 84 PID 2724 wrote to memory of 2032 2724 msedge.exe 84 PID 2724 wrote to memory of 2032 2724 msedge.exe 84 PID 2724 wrote to memory of 2032 2724 msedge.exe 84 PID 2724 wrote to memory of 2032 2724 msedge.exe 84 PID 2724 wrote to memory of 2032 2724 msedge.exe 84 PID 2724 wrote to memory of 2032 2724 msedge.exe 84 PID 2724 wrote to memory of 2032 2724 msedge.exe 84 PID 2724 wrote to memory of 2032 2724 msedge.exe 84 PID 2724 wrote to memory of 2032 2724 msedge.exe 84 PID 2724 wrote to memory of 2032 2724 msedge.exe 84 PID 2724 wrote to memory of 2032 2724 msedge.exe 84 PID 2724 wrote to memory of 2032 2724 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\acff475a2b42df4e4d41abd8d27ccfbb_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffaab146f8,0x7fffaab14708,0x7fffaab147182⤵PID:4592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,12026591074896156939,1170049002298717332,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:22⤵PID:4380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,12026591074896156939,1170049002298717332,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2556 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2136,12026591074896156939,1170049002298717332,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2524 /prefetch:82⤵PID:2032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,12026591074896156939,1170049002298717332,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:4752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,12026591074896156939,1170049002298717332,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:12⤵PID:416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,12026591074896156939,1170049002298717332,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5100 /prefetch:82⤵PID:852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,12026591074896156939,1170049002298717332,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5100 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,12026591074896156939,1170049002298717332,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5184 /prefetch:12⤵PID:1412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,12026591074896156939,1170049002298717332,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4956 /prefetch:12⤵PID:4372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,12026591074896156939,1170049002298717332,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4004 /prefetch:12⤵PID:3712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,12026591074896156939,1170049002298717332,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3468 /prefetch:12⤵PID:1468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,12026591074896156939,1170049002298717332,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2520 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1948
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4056
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1768
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c39b3aa574c0c938c80eb263bb450311
SHA1f4d11275b63f4f906be7a55ec6ca050c62c18c88
SHA25666f8d413a30451055d4b6fa40e007197a4bb93a66a28ca4112967ec417ffab6c
SHA512eeca2e21cd4d66835beb9812e26344c8695584253af397b06f378536ca797c3906a670ed239631729c96ebb93acfb16327cf58d517e83fb8923881c5fdb6d232
-
Filesize
6KB
MD50e03b08393e0a65fc5e9cfa752e11d8c
SHA17f79367fd0bf4e5e60becad8953db9941fe28197
SHA25625337fad53b9af1f3a6a0f3c2df018fea4ca604ee4760dbbaf8eb97c40a0e697
SHA512903df522f39dc8cd0496e93a1cb0cb4764c0bede084711a79052a687eabe8b373f5ef3983b06d2df275ed0880d25b37b1b16e8bb016bf883e0df8671cbf34573
-
Filesize
6KB
MD59c4fac5c21f03e88e0fefec2c17ab559
SHA1513328148e861028451fd8d125cc9e81941e9223
SHA256875089e415b9506f9c5a1abe78eeddf7d2fc964a13cea0ca32fb42ada423ddd9
SHA512e66d2144200629f4dd6e21e247659ca48b7584d5f6a9f0445fda343489e7727435543b7ac0b7a78be2721ffe4c8bcfc9f5b619447c96d37419f3ed58e667b3b4
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5233c54c610363e17a9746c6832b642c5
SHA1c71ab32e320545f8dc081903d2db84876ef1d6c8
SHA2561a75c31dfa84f11bc0c385bef38ddc73efd88216b366009a91bc31f3dee60e72
SHA51277dfaafc76ecc437fc016edd69b8e61c0a6f5b469ea0689c7e47b193f05ae01b36ef170b6757b46325a2ea726b36ad39c119b0595f4dcc301554c6821121ce5f