Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09/10/2024, 08:13
Static task
static1
Behavioral task
behavioral1
Sample
2dbbe38f96b50788f1ddb5631827b98a_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2dbbe38f96b50788f1ddb5631827b98a_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
2dbbe38f96b50788f1ddb5631827b98a_JaffaCakes118.html
-
Size
214KB
-
MD5
2dbbe38f96b50788f1ddb5631827b98a
-
SHA1
7f9c561a3e91730cd280bc08bf58d2789d0ca1ce
-
SHA256
e9e32057614b83163c48887629378486cf3f25a2d3096250dfebc7bcb6084d9d
-
SHA512
64c1fcff6bb9d6d9ed0e78ba11d98585cf015a5277529cc2f3883ca092d39d1cf59046ec0067bfd58a352a96dbb7aa2051bbdcd0804ca1db4fd775f038988d35
-
SSDEEP
3072:IrhB9CyHxX7Be7iAvtLPbAwuBNKifXTJNE:Qz9VxLY7iAVLTBQJlC
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3132 msedge.exe 3132 msedge.exe 2560 msedge.exe 2560 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2560 msedge.exe 2560 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2560 msedge.exe 2560 msedge.exe 2560 msedge.exe 2560 msedge.exe 2560 msedge.exe 2560 msedge.exe 2560 msedge.exe 2560 msedge.exe 2560 msedge.exe 2560 msedge.exe 2560 msedge.exe 2560 msedge.exe 2560 msedge.exe 2560 msedge.exe 2560 msedge.exe 2560 msedge.exe 2560 msedge.exe 2560 msedge.exe 2560 msedge.exe 2560 msedge.exe 2560 msedge.exe 2560 msedge.exe 2560 msedge.exe 2560 msedge.exe 2560 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2560 msedge.exe 2560 msedge.exe 2560 msedge.exe 2560 msedge.exe 2560 msedge.exe 2560 msedge.exe 2560 msedge.exe 2560 msedge.exe 2560 msedge.exe 2560 msedge.exe 2560 msedge.exe 2560 msedge.exe 2560 msedge.exe 2560 msedge.exe 2560 msedge.exe 2560 msedge.exe 2560 msedge.exe 2560 msedge.exe 2560 msedge.exe 2560 msedge.exe 2560 msedge.exe 2560 msedge.exe 2560 msedge.exe 2560 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2560 wrote to memory of 2892 2560 msedge.exe 85 PID 2560 wrote to memory of 2892 2560 msedge.exe 85 PID 2560 wrote to memory of 2176 2560 msedge.exe 86 PID 2560 wrote to memory of 2176 2560 msedge.exe 86 PID 2560 wrote to memory of 2176 2560 msedge.exe 86 PID 2560 wrote to memory of 2176 2560 msedge.exe 86 PID 2560 wrote to memory of 2176 2560 msedge.exe 86 PID 2560 wrote to memory of 2176 2560 msedge.exe 86 PID 2560 wrote to memory of 2176 2560 msedge.exe 86 PID 2560 wrote to memory of 2176 2560 msedge.exe 86 PID 2560 wrote to memory of 2176 2560 msedge.exe 86 PID 2560 wrote to memory of 2176 2560 msedge.exe 86 PID 2560 wrote to memory of 2176 2560 msedge.exe 86 PID 2560 wrote to memory of 2176 2560 msedge.exe 86 PID 2560 wrote to memory of 2176 2560 msedge.exe 86 PID 2560 wrote to memory of 2176 2560 msedge.exe 86 PID 2560 wrote to memory of 2176 2560 msedge.exe 86 PID 2560 wrote to memory of 2176 2560 msedge.exe 86 PID 2560 wrote to memory of 2176 2560 msedge.exe 86 PID 2560 wrote to memory of 2176 2560 msedge.exe 86 PID 2560 wrote to memory of 2176 2560 msedge.exe 86 PID 2560 wrote to memory of 2176 2560 msedge.exe 86 PID 2560 wrote to memory of 2176 2560 msedge.exe 86 PID 2560 wrote to memory of 2176 2560 msedge.exe 86 PID 2560 wrote to memory of 2176 2560 msedge.exe 86 PID 2560 wrote to memory of 2176 2560 msedge.exe 86 PID 2560 wrote to memory of 2176 2560 msedge.exe 86 PID 2560 wrote to memory of 2176 2560 msedge.exe 86 PID 2560 wrote to memory of 2176 2560 msedge.exe 86 PID 2560 wrote to memory of 2176 2560 msedge.exe 86 PID 2560 wrote to memory of 2176 2560 msedge.exe 86 PID 2560 wrote to memory of 2176 2560 msedge.exe 86 PID 2560 wrote to memory of 2176 2560 msedge.exe 86 PID 2560 wrote to memory of 2176 2560 msedge.exe 86 PID 2560 wrote to memory of 2176 2560 msedge.exe 86 PID 2560 wrote to memory of 2176 2560 msedge.exe 86 PID 2560 wrote to memory of 2176 2560 msedge.exe 86 PID 2560 wrote to memory of 2176 2560 msedge.exe 86 PID 2560 wrote to memory of 2176 2560 msedge.exe 86 PID 2560 wrote to memory of 2176 2560 msedge.exe 86 PID 2560 wrote to memory of 2176 2560 msedge.exe 86 PID 2560 wrote to memory of 2176 2560 msedge.exe 86 PID 2560 wrote to memory of 3132 2560 msedge.exe 87 PID 2560 wrote to memory of 3132 2560 msedge.exe 87 PID 2560 wrote to memory of 112 2560 msedge.exe 88 PID 2560 wrote to memory of 112 2560 msedge.exe 88 PID 2560 wrote to memory of 112 2560 msedge.exe 88 PID 2560 wrote to memory of 112 2560 msedge.exe 88 PID 2560 wrote to memory of 112 2560 msedge.exe 88 PID 2560 wrote to memory of 112 2560 msedge.exe 88 PID 2560 wrote to memory of 112 2560 msedge.exe 88 PID 2560 wrote to memory of 112 2560 msedge.exe 88 PID 2560 wrote to memory of 112 2560 msedge.exe 88 PID 2560 wrote to memory of 112 2560 msedge.exe 88 PID 2560 wrote to memory of 112 2560 msedge.exe 88 PID 2560 wrote to memory of 112 2560 msedge.exe 88 PID 2560 wrote to memory of 112 2560 msedge.exe 88 PID 2560 wrote to memory of 112 2560 msedge.exe 88 PID 2560 wrote to memory of 112 2560 msedge.exe 88 PID 2560 wrote to memory of 112 2560 msedge.exe 88 PID 2560 wrote to memory of 112 2560 msedge.exe 88 PID 2560 wrote to memory of 112 2560 msedge.exe 88 PID 2560 wrote to memory of 112 2560 msedge.exe 88 PID 2560 wrote to memory of 112 2560 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2dbbe38f96b50788f1ddb5631827b98a_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffe9e246f8,0x7fffe9e24708,0x7fffe9e247182⤵PID:2892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1980,16927664772456818574,7149097657321551538,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2028 /prefetch:22⤵PID:2176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1980,16927664772456818574,7149097657321551538,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2112 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1980,16927664772456818574,7149097657321551538,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2752 /prefetch:82⤵PID:112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,16927664772456818574,7149097657321551538,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:1540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,16927664772456818574,7149097657321551538,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:3400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1980,16927664772456818574,7149097657321551538,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4880 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3336
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2060
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3232
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d7cb450b1315c63b1d5d89d98ba22da5
SHA1694005cd9e1a4c54e0b83d0598a8a0c089df1556
SHA25638355fd694faf1223518e40bac1996bdceaf44191214b0a23c4334d5fb07d031
SHA512df04d4f4b77bae447a940b28aeac345b21b299d8d26e28ecbb3c1c9e9a0e07c551e412d545c7dbb147a92c12bad7ae49ac35af021c34b88e2c6c5f7a0b65f6a8
-
Filesize
152B
MD537f660dd4b6ddf23bc37f5c823d1c33a
SHA11c35538aa307a3e09d15519df6ace99674ae428b
SHA2564e2510a1d5a50a94fe4ce0f74932ab780758a8cbdc6d176a9ce8ab92309f26f8
SHA512807b8b8dc9109b6f78fc63655450bf12b9a006ff63e8f29ade8899d45fdf4a6c068c5c46a3efbc4232b9e1e35d6494f00ded5cdb3e235c8a25023bfbd823992d
-
Filesize
6KB
MD56b1107457162b9f8e6fd3ad8f841ef0f
SHA11abba3be04aeaee95d2ccb61f41da5d2d286c260
SHA256589c1448a6cb74bfd454ff13d76357c608c32d950c32de33135c4b388068a221
SHA512b361c64f71000a1938e980fa5c04a60bd4d2a8c9a0d58e3b4639a0421bdf9986db8200cd8579e73d60958543204e655d7cfde3638f7adf9914ab7acde7a990b4
-
Filesize
6KB
MD5ae1d1547885dc2c726803a2b41af9d94
SHA13b6ddd13db33587f8891332eeae9369b80685992
SHA256bf53a24627005045df8c13759a8b735683b5ea0f50b473f3b653e184fb2423b3
SHA512d10a5572b5723a88eae3887981e6141d981252dc6a7365e5dd07eea88fbb1a7d798fdb83b1bb3855f4e9e051dd0e088313515246a5eff565478d2ec06e386302
-
Filesize
6KB
MD5185ce1d32af74083f033c05026fd0d03
SHA1b45d21e1cfea71a190c23812d785144db4b662db
SHA2561c3666c00fea386ef9ac306043775a1a675ee2a0cd26dd917605bc9a98133ba1
SHA512781f58a844ce650591abdd99d84a8eb641dc4b79e802c01be7e5ad927e057143e7f99e994a3608ee1034015a41072b591abf7a69ee840461a63fbf31423e747d
-
Filesize
10KB
MD5c5d359ce8dc6f6ab3892b06d5cdf3752
SHA123cd15ab5e29abdea91fa67dff584977007cd735
SHA256d3325c7f6f3e9a0925a5ac7c191a5ea29b1315d5bb99a7cb4bfba3dd078b0f69
SHA5127a456e8a9a6581eb4d0212ad8423e70bc67691ecb0ac14a1a752737a816a732a919f83de611853c86a0a29b5adacbbdc82c875a5e40202077a42cae2ca13302f