Analysis
-
max time kernel
149s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
04/07/2024, 19:36
Static task
static1
Behavioral task
behavioral1
Sample
2601d00bcc5a1e4178c7382cb389bc37_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
2601d00bcc5a1e4178c7382cb389bc37_JaffaCakes118.html
Resource
win10v2004-20240704-en
General
-
Target
2601d00bcc5a1e4178c7382cb389bc37_JaffaCakes118.html
-
Size
47KB
-
MD5
2601d00bcc5a1e4178c7382cb389bc37
-
SHA1
869ffb37538549ea9f2fb1603a8a92423bc313e9
-
SHA256
d3dad00ab6039f6f1c2ce4b36da62624aa9e95e33ece1374860e95c0537effd8
-
SHA512
6dcd7023a7207f337b44ec932bb4272178b802345247201b983fb889e5ff93a69797f67f553867f8930234fb7a95b9d04e4698cce4ac2e07876784bca1935e27
-
SSDEEP
384:Sd+R/i08YfQ6qfbcnTs/6t7m0l5Lvl75lQZt:Yuf4AEF0bvqZt
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3904 msedge.exe 3904 msedge.exe 3460 msedge.exe 3460 msedge.exe 640 identity_helper.exe 640 identity_helper.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3460 wrote to memory of 1896 3460 msedge.exe 81 PID 3460 wrote to memory of 1896 3460 msedge.exe 81 PID 3460 wrote to memory of 2700 3460 msedge.exe 82 PID 3460 wrote to memory of 2700 3460 msedge.exe 82 PID 3460 wrote to memory of 2700 3460 msedge.exe 82 PID 3460 wrote to memory of 2700 3460 msedge.exe 82 PID 3460 wrote to memory of 2700 3460 msedge.exe 82 PID 3460 wrote to memory of 2700 3460 msedge.exe 82 PID 3460 wrote to memory of 2700 3460 msedge.exe 82 PID 3460 wrote to memory of 2700 3460 msedge.exe 82 PID 3460 wrote to memory of 2700 3460 msedge.exe 82 PID 3460 wrote to memory of 2700 3460 msedge.exe 82 PID 3460 wrote to memory of 2700 3460 msedge.exe 82 PID 3460 wrote to memory of 2700 3460 msedge.exe 82 PID 3460 wrote to memory of 2700 3460 msedge.exe 82 PID 3460 wrote to memory of 2700 3460 msedge.exe 82 PID 3460 wrote to memory of 2700 3460 msedge.exe 82 PID 3460 wrote to memory of 2700 3460 msedge.exe 82 PID 3460 wrote to memory of 2700 3460 msedge.exe 82 PID 3460 wrote to memory of 2700 3460 msedge.exe 82 PID 3460 wrote to memory of 2700 3460 msedge.exe 82 PID 3460 wrote to memory of 2700 3460 msedge.exe 82 PID 3460 wrote to memory of 2700 3460 msedge.exe 82 PID 3460 wrote to memory of 2700 3460 msedge.exe 82 PID 3460 wrote to memory of 2700 3460 msedge.exe 82 PID 3460 wrote to memory of 2700 3460 msedge.exe 82 PID 3460 wrote to memory of 2700 3460 msedge.exe 82 PID 3460 wrote to memory of 2700 3460 msedge.exe 82 PID 3460 wrote to memory of 2700 3460 msedge.exe 82 PID 3460 wrote to memory of 2700 3460 msedge.exe 82 PID 3460 wrote to memory of 2700 3460 msedge.exe 82 PID 3460 wrote to memory of 2700 3460 msedge.exe 82 PID 3460 wrote to memory of 2700 3460 msedge.exe 82 PID 3460 wrote to memory of 2700 3460 msedge.exe 82 PID 3460 wrote to memory of 2700 3460 msedge.exe 82 PID 3460 wrote to memory of 2700 3460 msedge.exe 82 PID 3460 wrote to memory of 2700 3460 msedge.exe 82 PID 3460 wrote to memory of 2700 3460 msedge.exe 82 PID 3460 wrote to memory of 2700 3460 msedge.exe 82 PID 3460 wrote to memory of 2700 3460 msedge.exe 82 PID 3460 wrote to memory of 2700 3460 msedge.exe 82 PID 3460 wrote to memory of 2700 3460 msedge.exe 82 PID 3460 wrote to memory of 3904 3460 msedge.exe 83 PID 3460 wrote to memory of 3904 3460 msedge.exe 83 PID 3460 wrote to memory of 3868 3460 msedge.exe 84 PID 3460 wrote to memory of 3868 3460 msedge.exe 84 PID 3460 wrote to memory of 3868 3460 msedge.exe 84 PID 3460 wrote to memory of 3868 3460 msedge.exe 84 PID 3460 wrote to memory of 3868 3460 msedge.exe 84 PID 3460 wrote to memory of 3868 3460 msedge.exe 84 PID 3460 wrote to memory of 3868 3460 msedge.exe 84 PID 3460 wrote to memory of 3868 3460 msedge.exe 84 PID 3460 wrote to memory of 3868 3460 msedge.exe 84 PID 3460 wrote to memory of 3868 3460 msedge.exe 84 PID 3460 wrote to memory of 3868 3460 msedge.exe 84 PID 3460 wrote to memory of 3868 3460 msedge.exe 84 PID 3460 wrote to memory of 3868 3460 msedge.exe 84 PID 3460 wrote to memory of 3868 3460 msedge.exe 84 PID 3460 wrote to memory of 3868 3460 msedge.exe 84 PID 3460 wrote to memory of 3868 3460 msedge.exe 84 PID 3460 wrote to memory of 3868 3460 msedge.exe 84 PID 3460 wrote to memory of 3868 3460 msedge.exe 84 PID 3460 wrote to memory of 3868 3460 msedge.exe 84 PID 3460 wrote to memory of 3868 3460 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2601d00bcc5a1e4178c7382cb389bc37_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3460 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9e33346f8,0x7ff9e3334708,0x7ff9e33347182⤵PID:1896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2024,14487797413332338137,6622953195035641305,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2064 /prefetch:22⤵PID:2700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2024,14487797413332338137,6622953195035641305,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2364 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2024,14487797413332338137,6622953195035641305,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2812 /prefetch:82⤵PID:3868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,14487797413332338137,6622953195035641305,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3184 /prefetch:12⤵PID:3816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,14487797413332338137,6622953195035641305,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3208 /prefetch:12⤵PID:3268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2024,14487797413332338137,6622953195035641305,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5184 /prefetch:82⤵PID:4800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2024,14487797413332338137,6622953195035641305,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5184 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,14487797413332338137,6622953195035641305,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5060 /prefetch:12⤵PID:1004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,14487797413332338137,6622953195035641305,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4708 /prefetch:12⤵PID:1320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,14487797413332338137,6622953195035641305,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4036 /prefetch:12⤵PID:1460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,14487797413332338137,6622953195035641305,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3404 /prefetch:12⤵PID:2180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2024,14487797413332338137,6622953195035641305,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1760 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4060
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1888
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4824
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD53c78617ec8f88da19254f9ff03312175
SHA1344e9fed9434d924d1c9f05351259cbc21e434d3
SHA2563cb47fcdca33bb3c8f4acc98424140987235ad79815da4f0e7593e4591ae90ed
SHA5125b58675088b0fc2b2d705cb648ea89385b80c7cf908b0f4f95a9acdbd350b50754e1b586202db6a918eef70029fafb210947f3c43c570ecf7657e08939fd7e9c
-
Filesize
152B
MD509c7ae658385f6de986103443217840b
SHA1298d880503edce4413337c09d3525f27a2edcd28
SHA25691e04ec38abdb0204458543592c4621b7bc0306407884f764aa9596a52454cd7
SHA5124e1272b209487d1e9e7d8502be49ebce91c76718410e817b3ac7faf47d9b699210aab1b941fbb5ddafc192ddf4b2ba151afd47fab753ec62bc0bca36039c55c3
-
Filesize
6KB
MD52bce10fa80ab840bc01166b83d99f98a
SHA1958bdff6958bcf05118d1ce3eadda6b7243500d0
SHA256396bbb1b953c72a0de32a4af57d02bec1eec9990f00da558f85c7d89cf1d36ef
SHA5125d53674deb997604af3b55f11e72b32c36a6ec76bffdbd45fd95f6984703295a7f183b0b49ef522518422841a4f5a3c2530135acb5953b1155eca158bcf1c2d5
-
Filesize
6KB
MD5ec1fa4caaac2fd35edc2cdde495524f7
SHA15257aae0193a35bc214842e532d3d32def5a97ec
SHA256f40c95cf07604013099a5588b6055b942433e83919c0865271cb1fb6f15d7bf1
SHA5126948252432a6b0ab196b77f692a488e75157e4d45965c1cd3ca7ff2e371cc02ea28fe77e7752935ec9b545b12b9e1bbe5c6c41411bcf797611f077462150789a
-
Filesize
6KB
MD5c306419d0ae30f3a78d29ef9cf7962d9
SHA1b85c0ba97dd7739fea896973594939ec27f38738
SHA2565c5cec5c87630a32602017c7a31e7f32629427a46749cca4671cf910c757603f
SHA5126845d0e466e4e67dee7f3c6a111252fe63ebd19e2337d07d38b0381ee91ea06d3123bbc1ee7cfa321125b3778a1335a4bd102276b51cb39338a367dea3e0d028
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5bf7495e7e468e11f922bd74af90d788d
SHA10675e12d44634d6351be2123f548a873b280c237
SHA256d6be0f9a317e42e90446c7445140c2954c9ea264d0db1cd464787230c94b81db
SHA512fcfe3179bf3dbcddea8e35dc4d8dd20563f5e2752c94ceba51f666fe78f07cc5cf2c9fe94e2e6bb241467ec060cbc8efdd5bcaf8dd71fe81dac7f823a6426f73