Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
04/07/2024, 02:07
Static task
static1
Behavioral task
behavioral1
Sample
2445e35048b4d11be6bccfd64a92fc39_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
2445e35048b4d11be6bccfd64a92fc39_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
2445e35048b4d11be6bccfd64a92fc39_JaffaCakes118.html
-
Size
53KB
-
MD5
2445e35048b4d11be6bccfd64a92fc39
-
SHA1
aa95346c8a8c1b5c81ffc76f2a265ed93bbc9b06
-
SHA256
47774b5a221814487d8919418bc357d2cd352cac926103b9f8e5b9967fdc4fbc
-
SHA512
d15e50d5a889be6a43386867950e7cac01f070902b768262df96b1a09540874ddd1e316d2ee1cf717233614831e337c7943cfc94aaac77b5ca02e8aaee96d60f
-
SSDEEP
1536:CkgUiIakTqGivi+PyUNrunlYJ63Nj+q5Vy0R0w2AzTICbbRom/t9M/dNwIUTDmDB:CkgUiIakTqGivi+PyUNrunlYJ63Nj+qC
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3592 msedge.exe 3592 msedge.exe 3776 msedge.exe 3776 msedge.exe 3620 identity_helper.exe 3620 identity_helper.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3776 wrote to memory of 2188 3776 msedge.exe 82 PID 3776 wrote to memory of 2188 3776 msedge.exe 82 PID 3776 wrote to memory of 5148 3776 msedge.exe 83 PID 3776 wrote to memory of 5148 3776 msedge.exe 83 PID 3776 wrote to memory of 5148 3776 msedge.exe 83 PID 3776 wrote to memory of 5148 3776 msedge.exe 83 PID 3776 wrote to memory of 5148 3776 msedge.exe 83 PID 3776 wrote to memory of 5148 3776 msedge.exe 83 PID 3776 wrote to memory of 5148 3776 msedge.exe 83 PID 3776 wrote to memory of 5148 3776 msedge.exe 83 PID 3776 wrote to memory of 5148 3776 msedge.exe 83 PID 3776 wrote to memory of 5148 3776 msedge.exe 83 PID 3776 wrote to memory of 5148 3776 msedge.exe 83 PID 3776 wrote to memory of 5148 3776 msedge.exe 83 PID 3776 wrote to memory of 5148 3776 msedge.exe 83 PID 3776 wrote to memory of 5148 3776 msedge.exe 83 PID 3776 wrote to memory of 5148 3776 msedge.exe 83 PID 3776 wrote to memory of 5148 3776 msedge.exe 83 PID 3776 wrote to memory of 5148 3776 msedge.exe 83 PID 3776 wrote to memory of 5148 3776 msedge.exe 83 PID 3776 wrote to memory of 5148 3776 msedge.exe 83 PID 3776 wrote to memory of 5148 3776 msedge.exe 83 PID 3776 wrote to memory of 5148 3776 msedge.exe 83 PID 3776 wrote to memory of 5148 3776 msedge.exe 83 PID 3776 wrote to memory of 5148 3776 msedge.exe 83 PID 3776 wrote to memory of 5148 3776 msedge.exe 83 PID 3776 wrote to memory of 5148 3776 msedge.exe 83 PID 3776 wrote to memory of 5148 3776 msedge.exe 83 PID 3776 wrote to memory of 5148 3776 msedge.exe 83 PID 3776 wrote to memory of 5148 3776 msedge.exe 83 PID 3776 wrote to memory of 5148 3776 msedge.exe 83 PID 3776 wrote to memory of 5148 3776 msedge.exe 83 PID 3776 wrote to memory of 5148 3776 msedge.exe 83 PID 3776 wrote to memory of 5148 3776 msedge.exe 83 PID 3776 wrote to memory of 5148 3776 msedge.exe 83 PID 3776 wrote to memory of 5148 3776 msedge.exe 83 PID 3776 wrote to memory of 5148 3776 msedge.exe 83 PID 3776 wrote to memory of 5148 3776 msedge.exe 83 PID 3776 wrote to memory of 5148 3776 msedge.exe 83 PID 3776 wrote to memory of 5148 3776 msedge.exe 83 PID 3776 wrote to memory of 5148 3776 msedge.exe 83 PID 3776 wrote to memory of 5148 3776 msedge.exe 83 PID 3776 wrote to memory of 3592 3776 msedge.exe 84 PID 3776 wrote to memory of 3592 3776 msedge.exe 84 PID 3776 wrote to memory of 5440 3776 msedge.exe 85 PID 3776 wrote to memory of 5440 3776 msedge.exe 85 PID 3776 wrote to memory of 5440 3776 msedge.exe 85 PID 3776 wrote to memory of 5440 3776 msedge.exe 85 PID 3776 wrote to memory of 5440 3776 msedge.exe 85 PID 3776 wrote to memory of 5440 3776 msedge.exe 85 PID 3776 wrote to memory of 5440 3776 msedge.exe 85 PID 3776 wrote to memory of 5440 3776 msedge.exe 85 PID 3776 wrote to memory of 5440 3776 msedge.exe 85 PID 3776 wrote to memory of 5440 3776 msedge.exe 85 PID 3776 wrote to memory of 5440 3776 msedge.exe 85 PID 3776 wrote to memory of 5440 3776 msedge.exe 85 PID 3776 wrote to memory of 5440 3776 msedge.exe 85 PID 3776 wrote to memory of 5440 3776 msedge.exe 85 PID 3776 wrote to memory of 5440 3776 msedge.exe 85 PID 3776 wrote to memory of 5440 3776 msedge.exe 85 PID 3776 wrote to memory of 5440 3776 msedge.exe 85 PID 3776 wrote to memory of 5440 3776 msedge.exe 85 PID 3776 wrote to memory of 5440 3776 msedge.exe 85 PID 3776 wrote to memory of 5440 3776 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2445e35048b4d11be6bccfd64a92fc39_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3776 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbb53f46f8,0x7ffbb53f4708,0x7ffbb53f47182⤵PID:2188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,8340459788238767693,11948746909027455441,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵PID:5148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,8340459788238767693,11948746909027455441,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2176 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2080,8340459788238767693,11948746909027455441,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2816 /prefetch:82⤵PID:5440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,8340459788238767693,11948746909027455441,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3180 /prefetch:12⤵PID:804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,8340459788238767693,11948746909027455441,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3200 /prefetch:12⤵PID:3524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,8340459788238767693,11948746909027455441,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4792 /prefetch:12⤵PID:3916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,8340459788238767693,11948746909027455441,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5216 /prefetch:12⤵PID:2556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,8340459788238767693,11948746909027455441,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5192 /prefetch:12⤵PID:3504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,8340459788238767693,11948746909027455441,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5032 /prefetch:82⤵PID:5280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,8340459788238767693,11948746909027455441,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5032 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,8340459788238767693,11948746909027455441,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5700 /prefetch:12⤵PID:2204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,8340459788238767693,11948746909027455441,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5880 /prefetch:12⤵PID:2884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,8340459788238767693,11948746909027455441,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5472 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2624
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2124
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1856
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5477462b6ad8eaaf8d38f5e3a4daf17b0
SHA186174e670c44767c08a39cc2a53c09c318326201
SHA256e6bbd4933b9baa1df4bb633319174de07db176ec215e71c8568d27c5c577184d
SHA512a0acc2ef7fd0fcf413572eeb94d1e38aa6a682195cc03d6eaaaa0bc9e5f4b2c0033da0b835f4617aebc52069d0a10b52fc31ed53c2fe7943a480b55b7481dd4e
-
Filesize
152B
MD5b704c9ca0493bd4548ac9c69dc4a4f27
SHA1a3e5e54e630dabe55ca18a798d9f5681e0620ba7
SHA2562ebd5229b9dc642afba36a27c7ac12d90196b1c50985c37e94f4c17474e15411
SHA51269c8116fb542b344a8c55e2658078bd3e0d3564b1e4c889b072dbc99d2b070dacbc4394dedbc22a4968a8cf9448e71f69ec71ded018c1bacc0e195b3b3072d32
-
Filesize
403B
MD5c2417fa3862cf0f131a9bca9c3fd36dc
SHA1e3ceec3da86441aa33967cfd879c2c2c9b86225b
SHA25654042c58ebfb39f017448cb22c9b46120b8cae256ed537ea06df37cf400f2a0c
SHA5124f8d5cdc70cfaf6a8465e97716c2a212f4cab8bfbd1f1679f3fafd591df4451bb25c6d966636f795611231cbd9df188416f3132c21ba15effb02e97dc03d7825
-
Filesize
6KB
MD5707286a9514f2057fd1ed4ef579ee145
SHA179c5e6d62d5b878700e5489ab9d1e57ae8624a1b
SHA2564730b80a4f9b6b4e580b44b37b4386e983b300b22fce779ff2520efb08c4b584
SHA512f61ea765710b164a2839664d0ea3568d450fa05904cb8aca9cd6bc591eaf65bdbac5a39fc9a6e4ac82f11ac6e07a3a41cbc5d4a87af0e8770c18c59d6794e05e
-
Filesize
5KB
MD55afa58e1fc2d19a2ab4168d0e3e1933c
SHA1d0f688f03a0a982d93c4f90a6ce7518fd2bb5061
SHA256420e40508eb5c8c6b4bd338e0835ce76ff43fa88f506ee542c29876d01d32122
SHA512a60a2e24ec3fe8d70f4251e9ad9b07fb46ffb61892a3d2a64b2ac23d2bbbfb732872b680bd1fad4f1d7db34da1933d5cf1d5744d2f3c1c29c972791fbb4b42bb
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD585540a981a7ceab862899149b05f7846
SHA14db2f3c6c990522772e34b2f8617bf3527c7a6a2
SHA2567b9039b950bcde4ab494405458f547258cf25ba724cd4d06aedcd9f6e0a02c62
SHA512e301ecdcea4cdf6d03f1ed799d578e2c47ff5a1fd0ec65c9133f8754150a044eafb5f66f5133ac04cbba6ae6e5eb9ef9cc8d4187c7a75c38ecd8a2c19d87e774