Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04-10-2024 10:47
Static task
static1
Behavioral task
behavioral1
Sample
1306a25ddca4189fa8d3fb4cac1116f5_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
1306a25ddca4189fa8d3fb4cac1116f5_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
1306a25ddca4189fa8d3fb4cac1116f5_JaffaCakes118.html
-
Size
9KB
-
MD5
1306a25ddca4189fa8d3fb4cac1116f5
-
SHA1
1274287aafec0fde988860a704235a6d2a8a94ee
-
SHA256
132430d6f89ed0fb704aa905a298f4b260a6b461e1ddbdf06a73a860f82e31ba
-
SHA512
d2ad93cf95bc954b0a1a99b9fd57e0028f1f120e7d4364b9a8ac427574a2c0f7ac1f429b56601485c0521d7a842a97902bcee507d2a59506ad7ee95fc17d8f68
-
SSDEEP
192:adLxumzj6I460C4GvVmVZA70/zwfrLM/AAAAzzFq1Deu6:iumP60BVmVZ6uaeAAAAvFq1Deu6
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3760 msedge.exe 3760 msedge.exe 2988 msedge.exe 2988 msedge.exe 1580 identity_helper.exe 1580 identity_helper.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe 924 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2988 wrote to memory of 4132 2988 msedge.exe 81 PID 2988 wrote to memory of 4132 2988 msedge.exe 81 PID 2988 wrote to memory of 2344 2988 msedge.exe 82 PID 2988 wrote to memory of 2344 2988 msedge.exe 82 PID 2988 wrote to memory of 2344 2988 msedge.exe 82 PID 2988 wrote to memory of 2344 2988 msedge.exe 82 PID 2988 wrote to memory of 2344 2988 msedge.exe 82 PID 2988 wrote to memory of 2344 2988 msedge.exe 82 PID 2988 wrote to memory of 2344 2988 msedge.exe 82 PID 2988 wrote to memory of 2344 2988 msedge.exe 82 PID 2988 wrote to memory of 2344 2988 msedge.exe 82 PID 2988 wrote to memory of 2344 2988 msedge.exe 82 PID 2988 wrote to memory of 2344 2988 msedge.exe 82 PID 2988 wrote to memory of 2344 2988 msedge.exe 82 PID 2988 wrote to memory of 2344 2988 msedge.exe 82 PID 2988 wrote to memory of 2344 2988 msedge.exe 82 PID 2988 wrote to memory of 2344 2988 msedge.exe 82 PID 2988 wrote to memory of 2344 2988 msedge.exe 82 PID 2988 wrote to memory of 2344 2988 msedge.exe 82 PID 2988 wrote to memory of 2344 2988 msedge.exe 82 PID 2988 wrote to memory of 2344 2988 msedge.exe 82 PID 2988 wrote to memory of 2344 2988 msedge.exe 82 PID 2988 wrote to memory of 2344 2988 msedge.exe 82 PID 2988 wrote to memory of 2344 2988 msedge.exe 82 PID 2988 wrote to memory of 2344 2988 msedge.exe 82 PID 2988 wrote to memory of 2344 2988 msedge.exe 82 PID 2988 wrote to memory of 2344 2988 msedge.exe 82 PID 2988 wrote to memory of 2344 2988 msedge.exe 82 PID 2988 wrote to memory of 2344 2988 msedge.exe 82 PID 2988 wrote to memory of 2344 2988 msedge.exe 82 PID 2988 wrote to memory of 2344 2988 msedge.exe 82 PID 2988 wrote to memory of 2344 2988 msedge.exe 82 PID 2988 wrote to memory of 2344 2988 msedge.exe 82 PID 2988 wrote to memory of 2344 2988 msedge.exe 82 PID 2988 wrote to memory of 2344 2988 msedge.exe 82 PID 2988 wrote to memory of 2344 2988 msedge.exe 82 PID 2988 wrote to memory of 2344 2988 msedge.exe 82 PID 2988 wrote to memory of 2344 2988 msedge.exe 82 PID 2988 wrote to memory of 2344 2988 msedge.exe 82 PID 2988 wrote to memory of 2344 2988 msedge.exe 82 PID 2988 wrote to memory of 2344 2988 msedge.exe 82 PID 2988 wrote to memory of 2344 2988 msedge.exe 82 PID 2988 wrote to memory of 3760 2988 msedge.exe 83 PID 2988 wrote to memory of 3760 2988 msedge.exe 83 PID 2988 wrote to memory of 1292 2988 msedge.exe 84 PID 2988 wrote to memory of 1292 2988 msedge.exe 84 PID 2988 wrote to memory of 1292 2988 msedge.exe 84 PID 2988 wrote to memory of 1292 2988 msedge.exe 84 PID 2988 wrote to memory of 1292 2988 msedge.exe 84 PID 2988 wrote to memory of 1292 2988 msedge.exe 84 PID 2988 wrote to memory of 1292 2988 msedge.exe 84 PID 2988 wrote to memory of 1292 2988 msedge.exe 84 PID 2988 wrote to memory of 1292 2988 msedge.exe 84 PID 2988 wrote to memory of 1292 2988 msedge.exe 84 PID 2988 wrote to memory of 1292 2988 msedge.exe 84 PID 2988 wrote to memory of 1292 2988 msedge.exe 84 PID 2988 wrote to memory of 1292 2988 msedge.exe 84 PID 2988 wrote to memory of 1292 2988 msedge.exe 84 PID 2988 wrote to memory of 1292 2988 msedge.exe 84 PID 2988 wrote to memory of 1292 2988 msedge.exe 84 PID 2988 wrote to memory of 1292 2988 msedge.exe 84 PID 2988 wrote to memory of 1292 2988 msedge.exe 84 PID 2988 wrote to memory of 1292 2988 msedge.exe 84 PID 2988 wrote to memory of 1292 2988 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\1306a25ddca4189fa8d3fb4cac1116f5_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffae86e46f8,0x7ffae86e4708,0x7ffae86e47182⤵PID:4132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2176,672862537935175029,2740347655685505337,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2180 /prefetch:22⤵PID:2344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2176,672862537935175029,2740347655685505337,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2248 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2176,672862537935175029,2740347655685505337,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2788 /prefetch:82⤵PID:1292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,672862537935175029,2740347655685505337,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:1836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,672862537935175029,2740347655685505337,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:12⤵PID:3728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2176,672862537935175029,2740347655685505337,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5216 /prefetch:82⤵PID:1828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2176,672862537935175029,2740347655685505337,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5216 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,672862537935175029,2740347655685505337,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5180 /prefetch:12⤵PID:3956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,672862537935175029,2740347655685505337,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5444 /prefetch:12⤵PID:1428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,672862537935175029,2740347655685505337,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5292 /prefetch:12⤵PID:4932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,672862537935175029,2740347655685505337,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3448 /prefetch:12⤵PID:4840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2176,672862537935175029,2740347655685505337,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2192 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:924
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4972
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2332
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52dc1a9f2f3f8c3cfe51bb29b078166c5
SHA1eaf3c3dad3c8dc6f18dc3e055b415da78b704402
SHA256dcb76fa365c2d9ee213b224a91cdd806d30b1e8652d72a22f2371124fa4479fa
SHA512682061d9cc86a6e5d99d022da776fb554350fc95efbf29cd84c1db4e2b7161b76cd1de48335bcc3a25633079fb0bd412e4f4795ed6291c65e9bc28d95330bb25
-
Filesize
152B
MD5e4f80e7950cbd3bb11257d2000cb885e
SHA110ac643904d539042d8f7aa4a312b13ec2106035
SHA2561184ee8d32d0edecddd93403fb888fad6b3e2a710d37335c3989cc529bc08124
SHA5122b92c9807fdcd937e514d4e7e1cc7c2d3e3aa162099b7289ceac2feea72d1a4afbadf1c09b3075d470efadf9a9edd63e07ea7e7a98d22243e45b3d53473fa4f0
-
Filesize
329B
MD5366905393d13260247202030e8c82137
SHA155bbb4a1d15341b72af0f4d27d6a06d6d713440d
SHA256a0720c4ad805f2eaa3b150de7a58c057fcead04881bb1345b7d3feb2d4d36593
SHA51243c326c7c94260fca03d7f30add7a5bf644a242141f8665ad281ba0c5d6f5fac902b6ef4f2b6d62098fadecf1b02510568e90ef68b456173d3bc9fa921aaf2a4
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD5af5afd1920de57faaa436a489b25f548
SHA162d70dfb8c3f5fbb82a7a5811d3935fb16d87610
SHA256146c0c38b80d1fa4d139e1e6aeac9ec8d16e6465e3c395e15ba25945780f2e8e
SHA5122cbcb886599cb7eeb37beebad2c994384c3f27ce08f2387f576c34cc72817eef102ce0ae3602091bd7316202a8abeca49ab113cf8b99b32cdc20bd1ecbe9d513
-
Filesize
6KB
MD5098b0ff18a1ba61829f7295c0af7af58
SHA11a53d15b031762b5873b568f4d8ed070c5a96d77
SHA256b3fde36af02dac64e0cc71815705f74028fb3f4a55733dd7a8f64d16403600ce
SHA512f6b43b5b30d189aae96ad4006cb6e55772a5a20520bf619e01ae9439cfd5103fd1b901f8026b7ca00e8180964392cd115b5cbc36c428a06a18778deabd70b441
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD538ff3ce1360bf4236e99ca594df84782
SHA1880a3474fa5aec861397266f339637ed31353af0
SHA2564c6b17ee6015454109ec5a6bffa1369543ba936bd3d434f19a64a1cb2c93e912
SHA5128360ced773ad6a6c65a43595afca093febf32b9fe651b61c0e8395a107ae9012a030b115d660fd8113caccc28aa7db5eca3865b3e1c4c2b09885c439dac77987