Analysis
-
max time kernel
150s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
05/07/2024, 21:02
Static task
static1
Behavioral task
behavioral1
Sample
271f41547ce2e2f9f22a06edd3924494_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
271f41547ce2e2f9f22a06edd3924494_JaffaCakes118.html
Resource
win10v2004-20240704-en
General
-
Target
271f41547ce2e2f9f22a06edd3924494_JaffaCakes118.html
-
Size
41KB
-
MD5
271f41547ce2e2f9f22a06edd3924494
-
SHA1
a0de2b31270f166d82ba5052f9541cf5eaaafa9b
-
SHA256
c395571d12af77a7f4427610cc17d514286d5cc0759a8f8eb987b02b36a47742
-
SHA512
9941740c889e2532a0510d850aaa05339da119b84c9c83dfc3f0a502fa695ab1f9e8b6e842f3fcfddce199dd0e71a6cc69a5926e6be187b559f399881abdb015
-
SSDEEP
768:XQdZhempDxrzMTU8oyR92VeRohs9a6Htd:XQgPSeRys9aI
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4372 msedge.exe 4372 msedge.exe 4040 msedge.exe 4040 msedge.exe 3180 identity_helper.exe 3180 identity_helper.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4040 wrote to memory of 3036 4040 msedge.exe 82 PID 4040 wrote to memory of 3036 4040 msedge.exe 82 PID 4040 wrote to memory of 2920 4040 msedge.exe 83 PID 4040 wrote to memory of 2920 4040 msedge.exe 83 PID 4040 wrote to memory of 2920 4040 msedge.exe 83 PID 4040 wrote to memory of 2920 4040 msedge.exe 83 PID 4040 wrote to memory of 2920 4040 msedge.exe 83 PID 4040 wrote to memory of 2920 4040 msedge.exe 83 PID 4040 wrote to memory of 2920 4040 msedge.exe 83 PID 4040 wrote to memory of 2920 4040 msedge.exe 83 PID 4040 wrote to memory of 2920 4040 msedge.exe 83 PID 4040 wrote to memory of 2920 4040 msedge.exe 83 PID 4040 wrote to memory of 2920 4040 msedge.exe 83 PID 4040 wrote to memory of 2920 4040 msedge.exe 83 PID 4040 wrote to memory of 2920 4040 msedge.exe 83 PID 4040 wrote to memory of 2920 4040 msedge.exe 83 PID 4040 wrote to memory of 2920 4040 msedge.exe 83 PID 4040 wrote to memory of 2920 4040 msedge.exe 83 PID 4040 wrote to memory of 2920 4040 msedge.exe 83 PID 4040 wrote to memory of 2920 4040 msedge.exe 83 PID 4040 wrote to memory of 2920 4040 msedge.exe 83 PID 4040 wrote to memory of 2920 4040 msedge.exe 83 PID 4040 wrote to memory of 2920 4040 msedge.exe 83 PID 4040 wrote to memory of 2920 4040 msedge.exe 83 PID 4040 wrote to memory of 2920 4040 msedge.exe 83 PID 4040 wrote to memory of 2920 4040 msedge.exe 83 PID 4040 wrote to memory of 2920 4040 msedge.exe 83 PID 4040 wrote to memory of 2920 4040 msedge.exe 83 PID 4040 wrote to memory of 2920 4040 msedge.exe 83 PID 4040 wrote to memory of 2920 4040 msedge.exe 83 PID 4040 wrote to memory of 2920 4040 msedge.exe 83 PID 4040 wrote to memory of 2920 4040 msedge.exe 83 PID 4040 wrote to memory of 2920 4040 msedge.exe 83 PID 4040 wrote to memory of 2920 4040 msedge.exe 83 PID 4040 wrote to memory of 2920 4040 msedge.exe 83 PID 4040 wrote to memory of 2920 4040 msedge.exe 83 PID 4040 wrote to memory of 2920 4040 msedge.exe 83 PID 4040 wrote to memory of 2920 4040 msedge.exe 83 PID 4040 wrote to memory of 2920 4040 msedge.exe 83 PID 4040 wrote to memory of 2920 4040 msedge.exe 83 PID 4040 wrote to memory of 2920 4040 msedge.exe 83 PID 4040 wrote to memory of 2920 4040 msedge.exe 83 PID 4040 wrote to memory of 4372 4040 msedge.exe 84 PID 4040 wrote to memory of 4372 4040 msedge.exe 84 PID 4040 wrote to memory of 3376 4040 msedge.exe 85 PID 4040 wrote to memory of 3376 4040 msedge.exe 85 PID 4040 wrote to memory of 3376 4040 msedge.exe 85 PID 4040 wrote to memory of 3376 4040 msedge.exe 85 PID 4040 wrote to memory of 3376 4040 msedge.exe 85 PID 4040 wrote to memory of 3376 4040 msedge.exe 85 PID 4040 wrote to memory of 3376 4040 msedge.exe 85 PID 4040 wrote to memory of 3376 4040 msedge.exe 85 PID 4040 wrote to memory of 3376 4040 msedge.exe 85 PID 4040 wrote to memory of 3376 4040 msedge.exe 85 PID 4040 wrote to memory of 3376 4040 msedge.exe 85 PID 4040 wrote to memory of 3376 4040 msedge.exe 85 PID 4040 wrote to memory of 3376 4040 msedge.exe 85 PID 4040 wrote to memory of 3376 4040 msedge.exe 85 PID 4040 wrote to memory of 3376 4040 msedge.exe 85 PID 4040 wrote to memory of 3376 4040 msedge.exe 85 PID 4040 wrote to memory of 3376 4040 msedge.exe 85 PID 4040 wrote to memory of 3376 4040 msedge.exe 85 PID 4040 wrote to memory of 3376 4040 msedge.exe 85 PID 4040 wrote to memory of 3376 4040 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\271f41547ce2e2f9f22a06edd3924494_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4040 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc3d5846f8,0x7ffc3d584708,0x7ffc3d5847182⤵PID:3036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,13461395418767971369,12804363913097125245,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 /prefetch:22⤵PID:2920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2084,13461395418767971369,12804363913097125245,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2244 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2084,13461395418767971369,12804363913097125245,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3028 /prefetch:82⤵PID:3376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,13461395418767971369,12804363913097125245,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:3100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,13461395418767971369,12804363913097125245,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:4892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,13461395418767971369,12804363913097125245,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1328 /prefetch:82⤵PID:1700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,13461395418767971369,12804363913097125245,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1328 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,13461395418767971369,12804363913097125245,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4872 /prefetch:12⤵PID:4124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,13461395418767971369,12804363913097125245,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4788 /prefetch:12⤵PID:4604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,13461395418767971369,12804363913097125245,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5904 /prefetch:12⤵PID:3656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,13461395418767971369,12804363913097125245,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1320 /prefetch:12⤵PID:3876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,13461395418767971369,12804363913097125245,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6016 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3968
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1700
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4252
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e1fe3a26bd35b84102bb4203f31e74c7
SHA145fdfa8433789b575eb64e116718e62e0e0cf4a0
SHA25626e0d51529de906dd285ba48288e25eaf5213c0f0bab9bc5f119ecbc5e1b93ee
SHA512d528db2e9b917d4fbe24b1b5c6f4cb274f4f91c84f63e5119e041fa89ae0cd01a370e314f8b6aca9d6fa958e79feabc720f4b54b3d8aed69aab11fa84cad36bd
-
Filesize
152B
MD52915233ace3b11bc8898c958f245aa9a
SHA168c6aa983da303b825d656ac3284081db682f702
SHA256b2cb442f2ca27619c8df087f56fcbbb53186c53f8fd131af886ee3712220477e
SHA512e3f1b70d39b615e212f84d587ee816598236ee6ce144d919593894fcce4a0900343a9e8b837a0d1bd10921fff1c976c84c4a570eda776fe84d374a69e7a54890
-
Filesize
178B
MD581b4ab89b012c6fdd249e364967a4a3c
SHA13a72bc3817e7394712dac612fde82c322d4e30af
SHA256a7baf57bee3d533c950bf088a1660b0ca8a0b6e676bff2c816eabb19787e5994
SHA512a29c1a32c84beb54a8b965f12f81d4e31b287f91cee3608847a00b85f784d6442eee328d72cc22409a7e047757f5b4b6f1f775ef9a22adf8e60f522a9740a346
-
Filesize
6KB
MD576a17f4d18daec643b1198d387bd1c45
SHA1fe19e0ea8f4465c8ca0a77982b397683d50cd36e
SHA256b24bd495bf39d004999e0c1f85dc0369c35741bc5abf099c382ba0330a0b8d25
SHA512c5c09f2d2b4c94a28e9d3983ace1deca106c036fb627d97cc2657eba42bb24d5784dcc1858a0facdca1f3ea32cdbdfca57af40113f7dfa302aff09c020632e92
-
Filesize
6KB
MD547978c7736b9973dc741f07887a76284
SHA129752b8bd8623e0ce966e687b322cc4a504eff5d
SHA256338f7e8733f507de9dd098070049cfac5a6f6935f1b25d35b7b2aeb2b3d659ac
SHA512c5d1317a1e823690049042d85e57e2855b5d0e23a6551158d1b637dd68bb6099902ac67774c379c1ba70693523452b70bb2a4cc55d3945a4a8dbc295cbde1d37
-
Filesize
6KB
MD5d95bbb9111831e80e39499040e474340
SHA125fd2195a11fe88a8f52b85af6dd192c6d306ba9
SHA25693f1003307b9f6b3070e28355c66d6f762e3345e3f663a6b3ff16e458175e299
SHA512c7244eb4ecdb20c50bd42a3752cad342a2f2aa1423bbe8f708b2dd6e1ee0218e6c189cc50aaf2ef1f005c8b6e56431047a9552c37b9b080589739c87a08a2ef0
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5acb0bb75da390f804c4bdded260c9ef9
SHA1533789ed1668021e6b3617ddf5b5a193ce013e08
SHA25677481941336ee6c5d39009ae6881892b2413bea8025e16beb644543411ab7a18
SHA512cb4fa3a6fc03df40289368bb44aeadb95db911993c451630d23cbfdfaff431161b536475270f4a0bf326372486b3f4ae3171dfd457b49ef2c889b594b5fac948