Analysis
-
max time kernel
145s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06/09/2024, 14:14
Static task
static1
Behavioral task
behavioral1
Sample
cfb8c031048c7ed166d5d37b31603e73_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cfb8c031048c7ed166d5d37b31603e73_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
cfb8c031048c7ed166d5d37b31603e73_JaffaCakes118.html
-
Size
17KB
-
MD5
cfb8c031048c7ed166d5d37b31603e73
-
SHA1
10128128a1f8cc5212b02c847f38f185d0f3e94a
-
SHA256
ce718e3b91063f2b34a1f5b40042ad9b7cd6a8d3391ff87ba6306b74de12037d
-
SHA512
ab38c8bd3dae6bf6c58ceee8a2912266cbb22070bc76aa5d06515dc8c8bdaf4b8f76b750278e21c28a1c7f63cabf98597461f8a1a68fd8e84740c0b5810ba32b
-
SSDEEP
384:0nPXC13xsawG/aUmyo6myiea8PwD+pdll5Kd:f13xsst8D+pA
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4824 msedge.exe 4824 msedge.exe 2272 msedge.exe 2272 msedge.exe 1660 identity_helper.exe 1660 identity_helper.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2272 wrote to memory of 4600 2272 msedge.exe 83 PID 2272 wrote to memory of 4600 2272 msedge.exe 83 PID 2272 wrote to memory of 3500 2272 msedge.exe 84 PID 2272 wrote to memory of 3500 2272 msedge.exe 84 PID 2272 wrote to memory of 3500 2272 msedge.exe 84 PID 2272 wrote to memory of 3500 2272 msedge.exe 84 PID 2272 wrote to memory of 3500 2272 msedge.exe 84 PID 2272 wrote to memory of 3500 2272 msedge.exe 84 PID 2272 wrote to memory of 3500 2272 msedge.exe 84 PID 2272 wrote to memory of 3500 2272 msedge.exe 84 PID 2272 wrote to memory of 3500 2272 msedge.exe 84 PID 2272 wrote to memory of 3500 2272 msedge.exe 84 PID 2272 wrote to memory of 3500 2272 msedge.exe 84 PID 2272 wrote to memory of 3500 2272 msedge.exe 84 PID 2272 wrote to memory of 3500 2272 msedge.exe 84 PID 2272 wrote to memory of 3500 2272 msedge.exe 84 PID 2272 wrote to memory of 3500 2272 msedge.exe 84 PID 2272 wrote to memory of 3500 2272 msedge.exe 84 PID 2272 wrote to memory of 3500 2272 msedge.exe 84 PID 2272 wrote to memory of 3500 2272 msedge.exe 84 PID 2272 wrote to memory of 3500 2272 msedge.exe 84 PID 2272 wrote to memory of 3500 2272 msedge.exe 84 PID 2272 wrote to memory of 3500 2272 msedge.exe 84 PID 2272 wrote to memory of 3500 2272 msedge.exe 84 PID 2272 wrote to memory of 3500 2272 msedge.exe 84 PID 2272 wrote to memory of 3500 2272 msedge.exe 84 PID 2272 wrote to memory of 3500 2272 msedge.exe 84 PID 2272 wrote to memory of 3500 2272 msedge.exe 84 PID 2272 wrote to memory of 3500 2272 msedge.exe 84 PID 2272 wrote to memory of 3500 2272 msedge.exe 84 PID 2272 wrote to memory of 3500 2272 msedge.exe 84 PID 2272 wrote to memory of 3500 2272 msedge.exe 84 PID 2272 wrote to memory of 3500 2272 msedge.exe 84 PID 2272 wrote to memory of 3500 2272 msedge.exe 84 PID 2272 wrote to memory of 3500 2272 msedge.exe 84 PID 2272 wrote to memory of 3500 2272 msedge.exe 84 PID 2272 wrote to memory of 3500 2272 msedge.exe 84 PID 2272 wrote to memory of 3500 2272 msedge.exe 84 PID 2272 wrote to memory of 3500 2272 msedge.exe 84 PID 2272 wrote to memory of 3500 2272 msedge.exe 84 PID 2272 wrote to memory of 3500 2272 msedge.exe 84 PID 2272 wrote to memory of 3500 2272 msedge.exe 84 PID 2272 wrote to memory of 4824 2272 msedge.exe 85 PID 2272 wrote to memory of 4824 2272 msedge.exe 85 PID 2272 wrote to memory of 3880 2272 msedge.exe 86 PID 2272 wrote to memory of 3880 2272 msedge.exe 86 PID 2272 wrote to memory of 3880 2272 msedge.exe 86 PID 2272 wrote to memory of 3880 2272 msedge.exe 86 PID 2272 wrote to memory of 3880 2272 msedge.exe 86 PID 2272 wrote to memory of 3880 2272 msedge.exe 86 PID 2272 wrote to memory of 3880 2272 msedge.exe 86 PID 2272 wrote to memory of 3880 2272 msedge.exe 86 PID 2272 wrote to memory of 3880 2272 msedge.exe 86 PID 2272 wrote to memory of 3880 2272 msedge.exe 86 PID 2272 wrote to memory of 3880 2272 msedge.exe 86 PID 2272 wrote to memory of 3880 2272 msedge.exe 86 PID 2272 wrote to memory of 3880 2272 msedge.exe 86 PID 2272 wrote to memory of 3880 2272 msedge.exe 86 PID 2272 wrote to memory of 3880 2272 msedge.exe 86 PID 2272 wrote to memory of 3880 2272 msedge.exe 86 PID 2272 wrote to memory of 3880 2272 msedge.exe 86 PID 2272 wrote to memory of 3880 2272 msedge.exe 86 PID 2272 wrote to memory of 3880 2272 msedge.exe 86 PID 2272 wrote to memory of 3880 2272 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\cfb8c031048c7ed166d5d37b31603e73_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8e84246f8,0x7ff8e8424708,0x7ff8e84247182⤵PID:4600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,14741209624061529881,5771309631797985318,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:22⤵PID:3500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,14741209624061529881,5771309631797985318,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2388 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,14741209624061529881,5771309631797985318,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2664 /prefetch:82⤵PID:3880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,14741209624061529881,5771309631797985318,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3192 /prefetch:12⤵PID:956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,14741209624061529881,5771309631797985318,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3204 /prefetch:12⤵PID:2560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,14741209624061529881,5771309631797985318,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5172 /prefetch:82⤵PID:3888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,14741209624061529881,5771309631797985318,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5172 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,14741209624061529881,5771309631797985318,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4036 /prefetch:12⤵PID:2084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,14741209624061529881,5771309631797985318,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4120 /prefetch:12⤵PID:4508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,14741209624061529881,5771309631797985318,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4848 /prefetch:12⤵PID:2324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,14741209624061529881,5771309631797985318,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5268 /prefetch:12⤵PID:3960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,14741209624061529881,5771309631797985318,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2076 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2852
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1668
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:880
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5eeaa8087eba2f63f31e599f6a7b46ef4
SHA1f639519deee0766a39cfe258d2ac48e3a9d5ac03
SHA25650fe80c9435f601c30517d10f6a8a0ca6ff8ca2add7584df377371b5a5dbe2d9
SHA512eaabfad92c84f422267615c55a863af12823c5e791bdcb30cabe17f72025e07df7383cf6cf0f08e28aa18a31c2aac5985cf5281a403e22fbcc1fb5e61c49fc3c
-
Filesize
152B
MD5b9569e123772ae290f9bac07e0d31748
SHA15806ed9b301d4178a959b26d7b7ccf2c0abc6741
SHA25620ab88e23fb88186b82047cd0d6dc3cfa23422e4fd2b8f3c8437546a2a842c2b
SHA512cfad8ce716ac815b37e8cc0e30141bfb3ca7f0d4ef101289bddcf6ed3c579bc34d369f2ec2f2dab98707843015633988eb97f1e911728031dd897750b8587795
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\5edabee7-cb69-4111-b7d8-b1566638b093.tmp
Filesize5KB
MD5716006015f30b0e48fe46c0de4aeb7eb
SHA1de6c70908ae1c6bf1db2c38645317172fbd34475
SHA256c8c2c4ed985e436114c020c810e12bd03b555b2fda8277cd50c038a6f0a57134
SHA51211cb7cfe435db9a01df4a37a41aa50eca049f8c3f0e098c1761875e31e6aca55535beda9b52ac318835f176abcceb7871f2bdbba1663565cf2fb87f906a83de8
-
Filesize
585B
MD573cb7e09ff03e9d614a2a76276cc5494
SHA1808c45d5cc595b641e424317b6a2ca3d4112d798
SHA256fc544725e739a21c9b6c282c2c115a0ca69c16774282154a1aafa60a7f43b852
SHA51203f872132c9423991dd30112289f11a1d83ddcfe8c25303a7e5c434782a29af19c7fefe6703639ca67dd59ebd9ef2dbcba77511ecb6992d128c923d12e785f8a
-
Filesize
6KB
MD50eb85e3811ffb74b33375437336fc2be
SHA12a2be2601fde03c457d66ae28fcd4d4624a1008b
SHA256f86184459d40942bd4148833d538679341b546d891a481f42c5bbe77145e435d
SHA5121f92f55ea5ce72224be414780c25db13532492864b2efb2b9ef110ed7b7240a7069d9338c6fa5d7fb3677ddf89cc215fc45395ffefdd3e6c846b6e2a8f44dba9
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5b896e710cf9a57ac54f3072bc871ac6b
SHA15143276af9dde42c0afbe635c8ed0e4a569c9ff5
SHA2560b5705e256c82301ce23cdd4ce3d0b5771a78c79d5c8c7619979a1feb0827901
SHA512d723dedf4dc2fa75425cc5c987a1ac3a5aa511d1cabfdcf0e7efa29753bb8860db1b1eb8bc16360e0dbad12c9c47aff24beae8d1913ccb6974eb254d3d6b0859