Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
09-07-2024 00:50
Static task
static1
Behavioral task
behavioral1
Sample
2e6d961e98c1a796c60921182d145daf_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2e6d961e98c1a796c60921182d145daf_JaffaCakes118.html
Resource
win10v2004-20240704-en
General
-
Target
2e6d961e98c1a796c60921182d145daf_JaffaCakes118.html
-
Size
89B
-
MD5
2e6d961e98c1a796c60921182d145daf
-
SHA1
45ed6e37ddf614bc26cff6f3cb394b0294cf7f7c
-
SHA256
16dc1c5f048e833aed67ebee4188b15e3cf78868a181820db9f1516c9c9d05e9
-
SHA512
43b5cc1f9ab2d6c91ca56cc8de596c368beb6e33f10f0aef941d0157e6661723326e4f49a7fca9888ecca65e8405ae54183f8e29673c557125c3bfdb12157034
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3728 msedge.exe 3728 msedge.exe 3976 msedge.exe 3976 msedge.exe 3100 identity_helper.exe 3100 identity_helper.exe 2604 msedge.exe 2604 msedge.exe 2604 msedge.exe 2604 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 3976 msedge.exe 3976 msedge.exe 3976 msedge.exe 3976 msedge.exe 3976 msedge.exe 3976 msedge.exe 3976 msedge.exe 3976 msedge.exe 3976 msedge.exe 3976 msedge.exe 3976 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3976 msedge.exe 3976 msedge.exe 3976 msedge.exe 3976 msedge.exe 3976 msedge.exe 3976 msedge.exe 3976 msedge.exe 3976 msedge.exe 3976 msedge.exe 3976 msedge.exe 3976 msedge.exe 3976 msedge.exe 3976 msedge.exe 3976 msedge.exe 3976 msedge.exe 3976 msedge.exe 3976 msedge.exe 3976 msedge.exe 3976 msedge.exe 3976 msedge.exe 3976 msedge.exe 3976 msedge.exe 3976 msedge.exe 3976 msedge.exe 3976 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3976 msedge.exe 3976 msedge.exe 3976 msedge.exe 3976 msedge.exe 3976 msedge.exe 3976 msedge.exe 3976 msedge.exe 3976 msedge.exe 3976 msedge.exe 3976 msedge.exe 3976 msedge.exe 3976 msedge.exe 3976 msedge.exe 3976 msedge.exe 3976 msedge.exe 3976 msedge.exe 3976 msedge.exe 3976 msedge.exe 3976 msedge.exe 3976 msedge.exe 3976 msedge.exe 3976 msedge.exe 3976 msedge.exe 3976 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3976 wrote to memory of 872 3976 msedge.exe 82 PID 3976 wrote to memory of 872 3976 msedge.exe 82 PID 3976 wrote to memory of 1956 3976 msedge.exe 84 PID 3976 wrote to memory of 1956 3976 msedge.exe 84 PID 3976 wrote to memory of 1956 3976 msedge.exe 84 PID 3976 wrote to memory of 1956 3976 msedge.exe 84 PID 3976 wrote to memory of 1956 3976 msedge.exe 84 PID 3976 wrote to memory of 1956 3976 msedge.exe 84 PID 3976 wrote to memory of 1956 3976 msedge.exe 84 PID 3976 wrote to memory of 1956 3976 msedge.exe 84 PID 3976 wrote to memory of 1956 3976 msedge.exe 84 PID 3976 wrote to memory of 1956 3976 msedge.exe 84 PID 3976 wrote to memory of 1956 3976 msedge.exe 84 PID 3976 wrote to memory of 1956 3976 msedge.exe 84 PID 3976 wrote to memory of 1956 3976 msedge.exe 84 PID 3976 wrote to memory of 1956 3976 msedge.exe 84 PID 3976 wrote to memory of 1956 3976 msedge.exe 84 PID 3976 wrote to memory of 1956 3976 msedge.exe 84 PID 3976 wrote to memory of 1956 3976 msedge.exe 84 PID 3976 wrote to memory of 1956 3976 msedge.exe 84 PID 3976 wrote to memory of 1956 3976 msedge.exe 84 PID 3976 wrote to memory of 1956 3976 msedge.exe 84 PID 3976 wrote to memory of 1956 3976 msedge.exe 84 PID 3976 wrote to memory of 1956 3976 msedge.exe 84 PID 3976 wrote to memory of 1956 3976 msedge.exe 84 PID 3976 wrote to memory of 1956 3976 msedge.exe 84 PID 3976 wrote to memory of 1956 3976 msedge.exe 84 PID 3976 wrote to memory of 1956 3976 msedge.exe 84 PID 3976 wrote to memory of 1956 3976 msedge.exe 84 PID 3976 wrote to memory of 1956 3976 msedge.exe 84 PID 3976 wrote to memory of 1956 3976 msedge.exe 84 PID 3976 wrote to memory of 1956 3976 msedge.exe 84 PID 3976 wrote to memory of 1956 3976 msedge.exe 84 PID 3976 wrote to memory of 1956 3976 msedge.exe 84 PID 3976 wrote to memory of 1956 3976 msedge.exe 84 PID 3976 wrote to memory of 1956 3976 msedge.exe 84 PID 3976 wrote to memory of 1956 3976 msedge.exe 84 PID 3976 wrote to memory of 1956 3976 msedge.exe 84 PID 3976 wrote to memory of 1956 3976 msedge.exe 84 PID 3976 wrote to memory of 1956 3976 msedge.exe 84 PID 3976 wrote to memory of 1956 3976 msedge.exe 84 PID 3976 wrote to memory of 1956 3976 msedge.exe 84 PID 3976 wrote to memory of 3728 3976 msedge.exe 85 PID 3976 wrote to memory of 3728 3976 msedge.exe 85 PID 3976 wrote to memory of 996 3976 msedge.exe 86 PID 3976 wrote to memory of 996 3976 msedge.exe 86 PID 3976 wrote to memory of 996 3976 msedge.exe 86 PID 3976 wrote to memory of 996 3976 msedge.exe 86 PID 3976 wrote to memory of 996 3976 msedge.exe 86 PID 3976 wrote to memory of 996 3976 msedge.exe 86 PID 3976 wrote to memory of 996 3976 msedge.exe 86 PID 3976 wrote to memory of 996 3976 msedge.exe 86 PID 3976 wrote to memory of 996 3976 msedge.exe 86 PID 3976 wrote to memory of 996 3976 msedge.exe 86 PID 3976 wrote to memory of 996 3976 msedge.exe 86 PID 3976 wrote to memory of 996 3976 msedge.exe 86 PID 3976 wrote to memory of 996 3976 msedge.exe 86 PID 3976 wrote to memory of 996 3976 msedge.exe 86 PID 3976 wrote to memory of 996 3976 msedge.exe 86 PID 3976 wrote to memory of 996 3976 msedge.exe 86 PID 3976 wrote to memory of 996 3976 msedge.exe 86 PID 3976 wrote to memory of 996 3976 msedge.exe 86 PID 3976 wrote to memory of 996 3976 msedge.exe 86 PID 3976 wrote to memory of 996 3976 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2e6d961e98c1a796c60921182d145daf_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3976 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffaf03346f8,0x7ffaf0334708,0x7ffaf03347182⤵PID:872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2196,6255206444880174436,1730981280263811962,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2208 /prefetch:22⤵PID:1956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2196,6255206444880174436,1730981280263811962,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2260 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2196,6255206444880174436,1730981280263811962,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2848 /prefetch:82⤵PID:996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,6255206444880174436,1730981280263811962,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:2572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,6255206444880174436,1730981280263811962,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:1696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,6255206444880174436,1730981280263811962,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4104 /prefetch:12⤵PID:4000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2196,6255206444880174436,1730981280263811962,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5596 /prefetch:82⤵PID:2816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2196,6255206444880174436,1730981280263811962,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5596 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,6255206444880174436,1730981280263811962,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5488 /prefetch:12⤵PID:1176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,6255206444880174436,1730981280263811962,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5504 /prefetch:12⤵PID:1132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,6255206444880174436,1730981280263811962,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5672 /prefetch:12⤵PID:4284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,6255206444880174436,1730981280263811962,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5696 /prefetch:12⤵PID:3512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,6255206444880174436,1730981280263811962,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3644 /prefetch:12⤵PID:2172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,6255206444880174436,1730981280263811962,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3724 /prefetch:12⤵PID:3128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,6255206444880174436,1730981280263811962,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3860 /prefetch:12⤵PID:3316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,6255206444880174436,1730981280263811962,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1264 /prefetch:12⤵PID:2168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2196,6255206444880174436,1730981280263811962,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3448 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2604
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2032
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4076
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5de1d175f3af722d1feb1c205f4e92d1e
SHA1019cf8527a9b94bd0b35418bf7be8348be5a1c39
SHA2561b99cae942ebf99c31795fa279d51b1a2379ca0af7b27bd3c58ea6c78a033924
SHA512f0dcd08afd3c6a761cc1afa2846ec23fb5438d6127ebd535a754498debabd0b1ebd04858d1b98be92faf14b512f982b1f3dcbb702860e96877eb835f763f9734
-
Filesize
152B
MD506b496d28461d5c01fc81bc2be6a9978
SHA136e7a9d9c7a924d5bb448d68038c7fe5e6cbf5aa
SHA256e4a2d1395627095b0fa55e977e527ccb5b71dff3cd2d138df498f50f9f5ab507
SHA5126488a807c978d38d65010583c1e5582548ab8102ebd68ee827e603c9bdfcdbb9f98a488d31414a829409f6edca8bd2eb4aadd4ff31b144de41249fa63a26bc91
-
Filesize
6KB
MD51d991c6cba3b77b24298263f3ffafdff
SHA1554d90863144aaa040345fdc9a90833b8f592f80
SHA25676cd1803a87d94e96f11c269edaadff16b47c43d2423ca905caf4188643c2608
SHA512261a7cdce088c8c5c5fd820bb2988390b1cc532c6ec4555667f8c63cce7f8a0da33df2f29ec7ca7df8e5ee096bb3a5101b589bd0145f161b0c0c6ca8e2ccf8cf
-
Filesize
6KB
MD563cffb1304588fb5961ce74a62b5f454
SHA15fd22f27c90fb3949534237f62246345c2c9290f
SHA256d1ca416636f30a456b1f568e3ced300cd2dc73a22c106bd45a184f012cb4c8fe
SHA512046773038bc8ffb6945acaeb4b4c84be00baf8a67ac18ee3b45170e6116fcac06f82d469fbf5b0847aea278776116b2f890840af9e5815dcd289689e23c46094
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5a04862de75211799120cfd5cb89ce80b
SHA1204b7269bbcbb3cc4d21c8e0ba1346a57dda9ebb
SHA2560469fea40e64e507c5122741e55ff42ea4000c3216e8e10056989fe780c777cf
SHA512cdf05a2f67e087952ed717b6026771001ff24b302abfbc4c5dd8d76ee58863d1f9f0f8501cd9502e48cd756d47a874a533667c15b51e319916371aa0c9ae350b