Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
08-07-2024 08:35
Static task
static1
Behavioral task
behavioral1
Sample
2bac010ed38332da2e1df70c5a9e08fc_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2bac010ed38332da2e1df70c5a9e08fc_JaffaCakes118.html
Resource
win10v2004-20240704-en
General
-
Target
2bac010ed38332da2e1df70c5a9e08fc_JaffaCakes118.html
-
Size
97B
-
MD5
2bac010ed38332da2e1df70c5a9e08fc
-
SHA1
f3288341dca4e4f185f8a9afa747920100dff0c6
-
SHA256
de577e97ced606242960ebba4acafd66bc420f07331323bf458b11a10ed17872
-
SHA512
643a9e39fa74ac5d1e4166550afc9e5482b04a1c11e628a7e56dabf05610f14202fc69a4a44e8f418a09c32effd9e31e1a9a819877d824075a2b11e5d0cdfd0b
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3956 msedge.exe 3956 msedge.exe 1420 msedge.exe 1420 msedge.exe 2988 identity_helper.exe 2988 identity_helper.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1420 wrote to memory of 2880 1420 msedge.exe 82 PID 1420 wrote to memory of 2880 1420 msedge.exe 82 PID 1420 wrote to memory of 2364 1420 msedge.exe 83 PID 1420 wrote to memory of 2364 1420 msedge.exe 83 PID 1420 wrote to memory of 2364 1420 msedge.exe 83 PID 1420 wrote to memory of 2364 1420 msedge.exe 83 PID 1420 wrote to memory of 2364 1420 msedge.exe 83 PID 1420 wrote to memory of 2364 1420 msedge.exe 83 PID 1420 wrote to memory of 2364 1420 msedge.exe 83 PID 1420 wrote to memory of 2364 1420 msedge.exe 83 PID 1420 wrote to memory of 2364 1420 msedge.exe 83 PID 1420 wrote to memory of 2364 1420 msedge.exe 83 PID 1420 wrote to memory of 2364 1420 msedge.exe 83 PID 1420 wrote to memory of 2364 1420 msedge.exe 83 PID 1420 wrote to memory of 2364 1420 msedge.exe 83 PID 1420 wrote to memory of 2364 1420 msedge.exe 83 PID 1420 wrote to memory of 2364 1420 msedge.exe 83 PID 1420 wrote to memory of 2364 1420 msedge.exe 83 PID 1420 wrote to memory of 2364 1420 msedge.exe 83 PID 1420 wrote to memory of 2364 1420 msedge.exe 83 PID 1420 wrote to memory of 2364 1420 msedge.exe 83 PID 1420 wrote to memory of 2364 1420 msedge.exe 83 PID 1420 wrote to memory of 2364 1420 msedge.exe 83 PID 1420 wrote to memory of 2364 1420 msedge.exe 83 PID 1420 wrote to memory of 2364 1420 msedge.exe 83 PID 1420 wrote to memory of 2364 1420 msedge.exe 83 PID 1420 wrote to memory of 2364 1420 msedge.exe 83 PID 1420 wrote to memory of 2364 1420 msedge.exe 83 PID 1420 wrote to memory of 2364 1420 msedge.exe 83 PID 1420 wrote to memory of 2364 1420 msedge.exe 83 PID 1420 wrote to memory of 2364 1420 msedge.exe 83 PID 1420 wrote to memory of 2364 1420 msedge.exe 83 PID 1420 wrote to memory of 2364 1420 msedge.exe 83 PID 1420 wrote to memory of 2364 1420 msedge.exe 83 PID 1420 wrote to memory of 2364 1420 msedge.exe 83 PID 1420 wrote to memory of 2364 1420 msedge.exe 83 PID 1420 wrote to memory of 2364 1420 msedge.exe 83 PID 1420 wrote to memory of 2364 1420 msedge.exe 83 PID 1420 wrote to memory of 2364 1420 msedge.exe 83 PID 1420 wrote to memory of 2364 1420 msedge.exe 83 PID 1420 wrote to memory of 2364 1420 msedge.exe 83 PID 1420 wrote to memory of 2364 1420 msedge.exe 83 PID 1420 wrote to memory of 3956 1420 msedge.exe 84 PID 1420 wrote to memory of 3956 1420 msedge.exe 84 PID 1420 wrote to memory of 4940 1420 msedge.exe 85 PID 1420 wrote to memory of 4940 1420 msedge.exe 85 PID 1420 wrote to memory of 4940 1420 msedge.exe 85 PID 1420 wrote to memory of 4940 1420 msedge.exe 85 PID 1420 wrote to memory of 4940 1420 msedge.exe 85 PID 1420 wrote to memory of 4940 1420 msedge.exe 85 PID 1420 wrote to memory of 4940 1420 msedge.exe 85 PID 1420 wrote to memory of 4940 1420 msedge.exe 85 PID 1420 wrote to memory of 4940 1420 msedge.exe 85 PID 1420 wrote to memory of 4940 1420 msedge.exe 85 PID 1420 wrote to memory of 4940 1420 msedge.exe 85 PID 1420 wrote to memory of 4940 1420 msedge.exe 85 PID 1420 wrote to memory of 4940 1420 msedge.exe 85 PID 1420 wrote to memory of 4940 1420 msedge.exe 85 PID 1420 wrote to memory of 4940 1420 msedge.exe 85 PID 1420 wrote to memory of 4940 1420 msedge.exe 85 PID 1420 wrote to memory of 4940 1420 msedge.exe 85 PID 1420 wrote to memory of 4940 1420 msedge.exe 85 PID 1420 wrote to memory of 4940 1420 msedge.exe 85 PID 1420 wrote to memory of 4940 1420 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2bac010ed38332da2e1df70c5a9e08fc_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff88a7846f8,0x7ff88a784708,0x7ff88a7847182⤵PID:2880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,1959168668462295683,11846119450545716216,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2072 /prefetch:22⤵PID:2364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2060,1959168668462295683,11846119450545716216,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2236 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2060,1959168668462295683,11846119450545716216,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2708 /prefetch:82⤵PID:4940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,1959168668462295683,11846119450545716216,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:3536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,1959168668462295683,11846119450545716216,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:1600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,1959168668462295683,11846119450545716216,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3912 /prefetch:12⤵PID:1080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,1959168668462295683,11846119450545716216,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5624 /prefetch:82⤵PID:1884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,1959168668462295683,11846119450545716216,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5624 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,1959168668462295683,11846119450545716216,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2824 /prefetch:12⤵PID:4500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,1959168668462295683,11846119450545716216,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3984 /prefetch:12⤵PID:4340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,1959168668462295683,11846119450545716216,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5996 /prefetch:12⤵PID:772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,1959168668462295683,11846119450545716216,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6024 /prefetch:12⤵PID:3888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,1959168668462295683,11846119450545716216,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3756 /prefetch:12⤵PID:4328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,1959168668462295683,11846119450545716216,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3500 /prefetch:12⤵PID:4680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,1959168668462295683,11846119450545716216,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4164 /prefetch:12⤵PID:2216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,1959168668462295683,11846119450545716216,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1308 /prefetch:12⤵PID:3836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,1959168668462295683,11846119450545716216,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1048 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4080
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1604
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2440
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5210676dde5c0bd984dc057e2333e1075
SHA12d2f8c14ee48a2580f852db7ac605f81b5b1399a
SHA2562a89d71b4ddd34734b16d91ebd8ea68b760f321baccdd4963f91b8d3507a3fb5
SHA512aeb81804cac5b17a5d1e55327f62df7645e9bbbfa8cad1401e7382628341a939b7aedc749b2412c06174a9e3fcdd5248d6df9b5d3f56c53232d17e59277ab017
-
Filesize
152B
MD5f4e6521c03f1bc16d91d99c059cc5424
SHA1043665051c486192a6eefe6d0632cf34ae8e89ad
SHA2567759c346539367b2f80e78abca170f09731caa169e3462f11eda84c3f1ca63d1
SHA5120bb4f628da6d715910161439685052409be54435e192cb4105191472bb14a33724592df24686d1655e9ba9572bd3dff8f46e211c0310e16bfe2ac949c49fbc5e
-
Filesize
6KB
MD51fe50af30e27b65666dc6d4387665117
SHA1466a6b98df54545d82a9425b3a556fc238c9cbd9
SHA25677ec5268e93bf0666644f019d46706695a2c6795b12d2f0ab228500fdd868454
SHA512ecc48fde9aaa202fc0253f07786fab28c8113ba2ff93a70b1d6dd0ad99c40edc4e810668fdb820822f3c86a9ac1cc082a60e88c6fed5eb508f0d0fab6365de87
-
Filesize
6KB
MD521e30b44d1de85397ac6c45f73897b3c
SHA191c1d62d02121381e32937f787964461d32c95c4
SHA256814ac5c65b7a029635ba12a9d011115ed46083ce2de6ae0c6921dc09e42ee9f6
SHA512ef2b8066de3f7eb1711a0f54fbf8addea8e7eb11eca759d8d844d012c391c1d0721e2bc319923e45820ebcb8f4282f4a16e1dc053bb4fb12221a3fb6554b1802
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5e7944eb96d5af18c9655fa962a32951a
SHA1531b7a1110001b91490aded658a79ed000e11f88
SHA2566a082b7f029d0cf99213c0fc0861d328b0a02fb7a370996aa63e408533454084
SHA512940690f0a7363837c28b32ad4ff4796c61cea1858a13174896a2ee07b9b7bdf0e098cbe3d4a4669449d4af2a5b67e63a58cebd5173f3351681b92561fb0d415c