Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
10/07/2024, 12:46
Static task
static1
Behavioral task
behavioral1
Sample
34c75d4e1e3cd307fc54ce73b9c53e11_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
34c75d4e1e3cd307fc54ce73b9c53e11_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
34c75d4e1e3cd307fc54ce73b9c53e11_JaffaCakes118.html
-
Size
2KB
-
MD5
34c75d4e1e3cd307fc54ce73b9c53e11
-
SHA1
4339d0378b9c247cf45bdb5ba888c82a1bc249e9
-
SHA256
b333d51d2f21def9e7b7f51c80e1d8b0da797ba0f29a6bf9b8231adfa78e2510
-
SHA512
6eedb7ea9afeb7762e52fe11116a01e39b903387c287567c4c3bb75a9b23717c3088e9a4636b607500607ca29625e4de2d3a7c28f612c9df32f190ea515743e0
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1368 msedge.exe 1368 msedge.exe 2408 msedge.exe 2408 msedge.exe 3184 identity_helper.exe 3184 identity_helper.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe 4628 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe 2408 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2408 wrote to memory of 1864 2408 msedge.exe 82 PID 2408 wrote to memory of 1864 2408 msedge.exe 82 PID 2408 wrote to memory of 3632 2408 msedge.exe 84 PID 2408 wrote to memory of 3632 2408 msedge.exe 84 PID 2408 wrote to memory of 3632 2408 msedge.exe 84 PID 2408 wrote to memory of 3632 2408 msedge.exe 84 PID 2408 wrote to memory of 3632 2408 msedge.exe 84 PID 2408 wrote to memory of 3632 2408 msedge.exe 84 PID 2408 wrote to memory of 3632 2408 msedge.exe 84 PID 2408 wrote to memory of 3632 2408 msedge.exe 84 PID 2408 wrote to memory of 3632 2408 msedge.exe 84 PID 2408 wrote to memory of 3632 2408 msedge.exe 84 PID 2408 wrote to memory of 3632 2408 msedge.exe 84 PID 2408 wrote to memory of 3632 2408 msedge.exe 84 PID 2408 wrote to memory of 3632 2408 msedge.exe 84 PID 2408 wrote to memory of 3632 2408 msedge.exe 84 PID 2408 wrote to memory of 3632 2408 msedge.exe 84 PID 2408 wrote to memory of 3632 2408 msedge.exe 84 PID 2408 wrote to memory of 3632 2408 msedge.exe 84 PID 2408 wrote to memory of 3632 2408 msedge.exe 84 PID 2408 wrote to memory of 3632 2408 msedge.exe 84 PID 2408 wrote to memory of 3632 2408 msedge.exe 84 PID 2408 wrote to memory of 3632 2408 msedge.exe 84 PID 2408 wrote to memory of 3632 2408 msedge.exe 84 PID 2408 wrote to memory of 3632 2408 msedge.exe 84 PID 2408 wrote to memory of 3632 2408 msedge.exe 84 PID 2408 wrote to memory of 3632 2408 msedge.exe 84 PID 2408 wrote to memory of 3632 2408 msedge.exe 84 PID 2408 wrote to memory of 3632 2408 msedge.exe 84 PID 2408 wrote to memory of 3632 2408 msedge.exe 84 PID 2408 wrote to memory of 3632 2408 msedge.exe 84 PID 2408 wrote to memory of 3632 2408 msedge.exe 84 PID 2408 wrote to memory of 3632 2408 msedge.exe 84 PID 2408 wrote to memory of 3632 2408 msedge.exe 84 PID 2408 wrote to memory of 3632 2408 msedge.exe 84 PID 2408 wrote to memory of 3632 2408 msedge.exe 84 PID 2408 wrote to memory of 3632 2408 msedge.exe 84 PID 2408 wrote to memory of 3632 2408 msedge.exe 84 PID 2408 wrote to memory of 3632 2408 msedge.exe 84 PID 2408 wrote to memory of 3632 2408 msedge.exe 84 PID 2408 wrote to memory of 3632 2408 msedge.exe 84 PID 2408 wrote to memory of 3632 2408 msedge.exe 84 PID 2408 wrote to memory of 1368 2408 msedge.exe 85 PID 2408 wrote to memory of 1368 2408 msedge.exe 85 PID 2408 wrote to memory of 1944 2408 msedge.exe 86 PID 2408 wrote to memory of 1944 2408 msedge.exe 86 PID 2408 wrote to memory of 1944 2408 msedge.exe 86 PID 2408 wrote to memory of 1944 2408 msedge.exe 86 PID 2408 wrote to memory of 1944 2408 msedge.exe 86 PID 2408 wrote to memory of 1944 2408 msedge.exe 86 PID 2408 wrote to memory of 1944 2408 msedge.exe 86 PID 2408 wrote to memory of 1944 2408 msedge.exe 86 PID 2408 wrote to memory of 1944 2408 msedge.exe 86 PID 2408 wrote to memory of 1944 2408 msedge.exe 86 PID 2408 wrote to memory of 1944 2408 msedge.exe 86 PID 2408 wrote to memory of 1944 2408 msedge.exe 86 PID 2408 wrote to memory of 1944 2408 msedge.exe 86 PID 2408 wrote to memory of 1944 2408 msedge.exe 86 PID 2408 wrote to memory of 1944 2408 msedge.exe 86 PID 2408 wrote to memory of 1944 2408 msedge.exe 86 PID 2408 wrote to memory of 1944 2408 msedge.exe 86 PID 2408 wrote to memory of 1944 2408 msedge.exe 86 PID 2408 wrote to memory of 1944 2408 msedge.exe 86 PID 2408 wrote to memory of 1944 2408 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\34c75d4e1e3cd307fc54ce73b9c53e11_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc886446f8,0x7ffc88644708,0x7ffc886447182⤵PID:1864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,6228989033807616070,16736462737483270417,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:22⤵PID:3632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,6228989033807616070,16736462737483270417,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,6228989033807616070,16736462737483270417,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2896 /prefetch:82⤵PID:1944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,6228989033807616070,16736462737483270417,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:64
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,6228989033807616070,16736462737483270417,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:1868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,6228989033807616070,16736462737483270417,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3208 /prefetch:12⤵PID:1344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,6228989033807616070,16736462737483270417,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4644 /prefetch:82⤵PID:2976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,6228989033807616070,16736462737483270417,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4644 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,6228989033807616070,16736462737483270417,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4648 /prefetch:12⤵PID:3800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,6228989033807616070,16736462737483270417,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5436 /prefetch:12⤵PID:4804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,6228989033807616070,16736462737483270417,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5604 /prefetch:12⤵PID:3316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,6228989033807616070,16736462737483270417,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5624 /prefetch:12⤵PID:4744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,6228989033807616070,16736462737483270417,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6068 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4628
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4404
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2168
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD575c9f57baeefeecd6c184627de951c1e
SHA152e0468e13cbfc9f15fc62cc27ce14367a996cff
SHA256648ba270261690bb792f95d017e134d81a612ef4fc76dc41921c9e5b8f46d98f
SHA512c4570cc4bb4894de3ecc8eee6cd8bfa5809ea401ceef683557fb170175ff4294cc21cdc6834db4e79e5e82d3bf16105894fff83290d26343423324bc486d4a15
-
Filesize
152B
MD510fa19df148444a77ceec60cabd2ce21
SHA1685b599c497668166ede4945d8885d204fd8d70f
SHA256c3b5deb970d0f06a05c8111da90330ffe25da195aafa4e182211669484d1964b
SHA5123518ce16fef66c59e0bdb772db51aeaa9042c44ca399be61ca3d9979351f93655393236711cf2b1988d5f90a5b9318a7569a8cef3374fc745a8f9aa8323691ef
-
Filesize
6KB
MD585a97e9a77ac325f9bd8ed765c944d4a
SHA1583e86b711bbbf30c28b7a0ff3101d5241e0c063
SHA256348a5adcbadd1b146e7cfb4fdfb33f108a283828261a860b92f3445235b576ac
SHA512f9821c67a7e6b2f4433cce0ad0b447351f894ca19e0a3ce1b325d620c72f9cceae5ca8ebc87e0a282fa7ea27780ff0b1d6b4b2eaf06e72e2bb160f5efe887f78
-
Filesize
6KB
MD5810fae276cbcf641f5d3032b0961ad02
SHA162c4ea71b4b5a48d4ebf18e62b75d8961e366a69
SHA2563ea9fa827453724377417acbd2a99131d4c6a5fedafa2a4cc4cee2ff14ab62a6
SHA5123beb63d52e6d123e5d0227dd8215247c99ecc4d2a2f645151741f5363b605884e3e8f77f7859002bee54ba7c5a58a62ad9c1cd15da9fe78655f505b35c7bf5aa
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD58109eb6303e7dd593852b3a973926c21
SHA1dae74a19b12a7bc48388a98fde3766d51a778e6e
SHA25667f5f7b452d2783a7a55d22226c63b7fce48a86fb7920a0e261e7d6f99bb90f4
SHA5123b2e784605b9f944b117bfe727e0faf53f3f9c58b09f8ceac6b466cc46f5dfe8e21d03cad9d26968145956484108b48f62e04500cc014172d4d8d0e89b7c8685