Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240708-en -
resource tags
arch:x64arch:x86image:win10v2004-20240708-enlocale:en-usos:windows10-2004-x64system -
submitted
08-07-2024 17:06
Static task
static1
Behavioral task
behavioral1
Sample
2d2364b0c4bcf543ca3e7fae342955ab_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2d2364b0c4bcf543ca3e7fae342955ab_JaffaCakes118.html
Resource
win10v2004-20240708-en
General
-
Target
2d2364b0c4bcf543ca3e7fae342955ab_JaffaCakes118.html
-
Size
53KB
-
MD5
2d2364b0c4bcf543ca3e7fae342955ab
-
SHA1
e54ef4b32f85f9af59a7ef310b1d5f8c3875d940
-
SHA256
1b5ce1def13ec3b060affa19127d7e4917135f1672c487234e1b8acb330ceb65
-
SHA512
8346c73572c5935afaf011ebfa954b8897c2b52987f9eb69f4652d89dfec494ca37d43ae8a4e3ba03df33643a986c4237d9d6c62678ac0c26313531ed45ac6e0
-
SSDEEP
1536:CkgUiIakTqGivi+PyUerunlYH63Nj+q5VyvR0w2AzTICbb5o4/t9M/dNwIUTDmDc:CkgUiIakTqGivi+PyUerunlYH63Nj+qQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3944 msedge.exe 3944 msedge.exe 4772 msedge.exe 4772 msedge.exe 1656 identity_helper.exe 1656 identity_helper.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4772 wrote to memory of 3692 4772 msedge.exe 81 PID 4772 wrote to memory of 3692 4772 msedge.exe 81 PID 4772 wrote to memory of 2884 4772 msedge.exe 82 PID 4772 wrote to memory of 2884 4772 msedge.exe 82 PID 4772 wrote to memory of 2884 4772 msedge.exe 82 PID 4772 wrote to memory of 2884 4772 msedge.exe 82 PID 4772 wrote to memory of 2884 4772 msedge.exe 82 PID 4772 wrote to memory of 2884 4772 msedge.exe 82 PID 4772 wrote to memory of 2884 4772 msedge.exe 82 PID 4772 wrote to memory of 2884 4772 msedge.exe 82 PID 4772 wrote to memory of 2884 4772 msedge.exe 82 PID 4772 wrote to memory of 2884 4772 msedge.exe 82 PID 4772 wrote to memory of 2884 4772 msedge.exe 82 PID 4772 wrote to memory of 2884 4772 msedge.exe 82 PID 4772 wrote to memory of 2884 4772 msedge.exe 82 PID 4772 wrote to memory of 2884 4772 msedge.exe 82 PID 4772 wrote to memory of 2884 4772 msedge.exe 82 PID 4772 wrote to memory of 2884 4772 msedge.exe 82 PID 4772 wrote to memory of 2884 4772 msedge.exe 82 PID 4772 wrote to memory of 2884 4772 msedge.exe 82 PID 4772 wrote to memory of 2884 4772 msedge.exe 82 PID 4772 wrote to memory of 2884 4772 msedge.exe 82 PID 4772 wrote to memory of 2884 4772 msedge.exe 82 PID 4772 wrote to memory of 2884 4772 msedge.exe 82 PID 4772 wrote to memory of 2884 4772 msedge.exe 82 PID 4772 wrote to memory of 2884 4772 msedge.exe 82 PID 4772 wrote to memory of 2884 4772 msedge.exe 82 PID 4772 wrote to memory of 2884 4772 msedge.exe 82 PID 4772 wrote to memory of 2884 4772 msedge.exe 82 PID 4772 wrote to memory of 2884 4772 msedge.exe 82 PID 4772 wrote to memory of 2884 4772 msedge.exe 82 PID 4772 wrote to memory of 2884 4772 msedge.exe 82 PID 4772 wrote to memory of 2884 4772 msedge.exe 82 PID 4772 wrote to memory of 2884 4772 msedge.exe 82 PID 4772 wrote to memory of 2884 4772 msedge.exe 82 PID 4772 wrote to memory of 2884 4772 msedge.exe 82 PID 4772 wrote to memory of 2884 4772 msedge.exe 82 PID 4772 wrote to memory of 2884 4772 msedge.exe 82 PID 4772 wrote to memory of 2884 4772 msedge.exe 82 PID 4772 wrote to memory of 2884 4772 msedge.exe 82 PID 4772 wrote to memory of 2884 4772 msedge.exe 82 PID 4772 wrote to memory of 2884 4772 msedge.exe 82 PID 4772 wrote to memory of 3944 4772 msedge.exe 83 PID 4772 wrote to memory of 3944 4772 msedge.exe 83 PID 4772 wrote to memory of 1552 4772 msedge.exe 84 PID 4772 wrote to memory of 1552 4772 msedge.exe 84 PID 4772 wrote to memory of 1552 4772 msedge.exe 84 PID 4772 wrote to memory of 1552 4772 msedge.exe 84 PID 4772 wrote to memory of 1552 4772 msedge.exe 84 PID 4772 wrote to memory of 1552 4772 msedge.exe 84 PID 4772 wrote to memory of 1552 4772 msedge.exe 84 PID 4772 wrote to memory of 1552 4772 msedge.exe 84 PID 4772 wrote to memory of 1552 4772 msedge.exe 84 PID 4772 wrote to memory of 1552 4772 msedge.exe 84 PID 4772 wrote to memory of 1552 4772 msedge.exe 84 PID 4772 wrote to memory of 1552 4772 msedge.exe 84 PID 4772 wrote to memory of 1552 4772 msedge.exe 84 PID 4772 wrote to memory of 1552 4772 msedge.exe 84 PID 4772 wrote to memory of 1552 4772 msedge.exe 84 PID 4772 wrote to memory of 1552 4772 msedge.exe 84 PID 4772 wrote to memory of 1552 4772 msedge.exe 84 PID 4772 wrote to memory of 1552 4772 msedge.exe 84 PID 4772 wrote to memory of 1552 4772 msedge.exe 84 PID 4772 wrote to memory of 1552 4772 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2d2364b0c4bcf543ca3e7fae342955ab_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4772 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa139846f8,0x7ffa13984708,0x7ffa139847182⤵PID:3692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2248,16989774908272286627,88987908087145084,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2252 /prefetch:22⤵PID:2884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2248,16989774908272286627,88987908087145084,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2412 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2248,16989774908272286627,88987908087145084,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2704 /prefetch:82⤵PID:1552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2248,16989774908272286627,88987908087145084,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:4988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2248,16989774908272286627,88987908087145084,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:12⤵PID:2012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2248,16989774908272286627,88987908087145084,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4972 /prefetch:12⤵PID:4676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2248,16989774908272286627,88987908087145084,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5288 /prefetch:82⤵PID:2144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2248,16989774908272286627,88987908087145084,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5288 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2248,16989774908272286627,88987908087145084,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5284 /prefetch:12⤵PID:1916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2248,16989774908272286627,88987908087145084,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5380 /prefetch:12⤵PID:1604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2248,16989774908272286627,88987908087145084,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5788 /prefetch:12⤵PID:4176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2248,16989774908272286627,88987908087145084,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5028 /prefetch:12⤵PID:3640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2248,16989774908272286627,88987908087145084,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3076 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4904
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3580
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1896
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD597f8be9c465b0ed67c2415868506c354
SHA1cdb221d6debcf55615d3b5f30796e32065046dd9
SHA256b606a1ee10b65eb9077e7d2f3b34a0d7a1ed6a4802a169fe55449c975332ee02
SHA512a0fe0ed30624658127316873137f4fc488a5916005e5e3f1f55b7d6442b54010c08d7037b94d0cf3c3316b1bb4acf91bad9e64ee6d15302e3cdd62bb18730542
-
Filesize
152B
MD56ae84fc1e66cbbb7e9d28b0e12d64550
SHA1100430bb653c896c11b94ac0bf2297a389ea5ad8
SHA256856a9c0ac8c29f738a3501b6bd007fd8cbbac211e461b91f4caff52dd41da75c
SHA5127fe7a8639d96118b843e67a6a6d397271b181dc6b049e6f7de77bee9c9214690b1b7f73164f7e463e117406dc978334ea02397fd639140598f60f89c6aaddbe8
-
Filesize
403B
MD5947c498879e1f5ed6201cb24a655100e
SHA112db2c550c912e563a0c801e5ec1b85a784608d5
SHA256477eddde53993b0b1ec499696f097e3a0d5de8f6cc2eeb3f85e6f344d5b82d5c
SHA5127b934e4e9cd89d8f3b53df5e54e4c138a450e6f86c6f934ad908b5de0148783d1cf39047c9127b1617ea15b97e087bf5569815d91375fc08508c343fddb473d5
-
Filesize
6KB
MD5e5f5d4908bdce773583f2eff9f5aa274
SHA15324bc1a71566e8a526ccd01471e7e5aa2aff156
SHA2567d538856f5713fb4eb20a9d215295509b95f37d46adc443d70647abec71a18b5
SHA51276cd08e239cce00dde8dda44f93b49c7aec4a49cbd1f3a957f7441a515cfc467ab3785f00d0f19a18667cd3904ec7a47b08c91973a0a1d54d4875b16e8e45761
-
Filesize
6KB
MD5fc1d5b46aaef75d8e9cff762e9a8c2eb
SHA13edd33983dd173d7563fe584177835e9e12abe89
SHA256a054f9f3b47efd91b55eaade159caa5a45304cbb2ea0002182256b5733119587
SHA512d9a54fc18326b05cc86872adb79e13c097a02ee553e2e7b8a77de672f913c339462804ccf4043d66cbb08ea9de1a6c60603dc2d4ef176952232eb26dd6cee8a1
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5430258448ccc6a24cf8d715676e6b59a
SHA11c0005bb897fb9063f5a85618c3345b475129ec9
SHA256ab523a399f5e3012523141dec7af3f15c6811176a3e9ac0c238ae377dc0797a5
SHA51223c08b73fb6714fb143d4886320a41ca77f010880ec2bdf764c97438dab9e3a843f3adc19fc1b7432021d4450cb5939c6e71beba197976f3168f03982ebede18