Analysis
-
max time kernel
147s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-10-2024 09:34
Static task
static1
Behavioral task
behavioral1
Sample
2ec3b1d92c15fc32139670b4f9dc7b64_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2ec3b1d92c15fc32139670b4f9dc7b64_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
2ec3b1d92c15fc32139670b4f9dc7b64_JaffaCakes118.html
-
Size
27KB
-
MD5
2ec3b1d92c15fc32139670b4f9dc7b64
-
SHA1
0215645008ddf63175100374f187ac37bc434aae
-
SHA256
ab72060960323f34459244f140cbc18fded967377ae102f83358810afa40bd67
-
SHA512
f8d0709a98308034b306dafe9bf33d87ce1aaafde3171c84017dd09a530f3a03642ff8dccf5cff8f9cd4ada838ac1ee21ca048f124d3eacd4969192dbda4922a
-
SSDEEP
768:SDzdsFqvfudlQVV1C5m1CCCcmzm3C/CnCQG2GkIpdAeV0yjtz2:SHdsFqvfug1C5m1CCCcmzm3C/CnCQpD7
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4508 msedge.exe 4508 msedge.exe 3232 msedge.exe 3232 msedge.exe 3684 identity_helper.exe 3684 identity_helper.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3232 wrote to memory of 2260 3232 msedge.exe 83 PID 3232 wrote to memory of 2260 3232 msedge.exe 83 PID 3232 wrote to memory of 1308 3232 msedge.exe 84 PID 3232 wrote to memory of 1308 3232 msedge.exe 84 PID 3232 wrote to memory of 1308 3232 msedge.exe 84 PID 3232 wrote to memory of 1308 3232 msedge.exe 84 PID 3232 wrote to memory of 1308 3232 msedge.exe 84 PID 3232 wrote to memory of 1308 3232 msedge.exe 84 PID 3232 wrote to memory of 1308 3232 msedge.exe 84 PID 3232 wrote to memory of 1308 3232 msedge.exe 84 PID 3232 wrote to memory of 1308 3232 msedge.exe 84 PID 3232 wrote to memory of 1308 3232 msedge.exe 84 PID 3232 wrote to memory of 1308 3232 msedge.exe 84 PID 3232 wrote to memory of 1308 3232 msedge.exe 84 PID 3232 wrote to memory of 1308 3232 msedge.exe 84 PID 3232 wrote to memory of 1308 3232 msedge.exe 84 PID 3232 wrote to memory of 1308 3232 msedge.exe 84 PID 3232 wrote to memory of 1308 3232 msedge.exe 84 PID 3232 wrote to memory of 1308 3232 msedge.exe 84 PID 3232 wrote to memory of 1308 3232 msedge.exe 84 PID 3232 wrote to memory of 1308 3232 msedge.exe 84 PID 3232 wrote to memory of 1308 3232 msedge.exe 84 PID 3232 wrote to memory of 1308 3232 msedge.exe 84 PID 3232 wrote to memory of 1308 3232 msedge.exe 84 PID 3232 wrote to memory of 1308 3232 msedge.exe 84 PID 3232 wrote to memory of 1308 3232 msedge.exe 84 PID 3232 wrote to memory of 1308 3232 msedge.exe 84 PID 3232 wrote to memory of 1308 3232 msedge.exe 84 PID 3232 wrote to memory of 1308 3232 msedge.exe 84 PID 3232 wrote to memory of 1308 3232 msedge.exe 84 PID 3232 wrote to memory of 1308 3232 msedge.exe 84 PID 3232 wrote to memory of 1308 3232 msedge.exe 84 PID 3232 wrote to memory of 1308 3232 msedge.exe 84 PID 3232 wrote to memory of 1308 3232 msedge.exe 84 PID 3232 wrote to memory of 1308 3232 msedge.exe 84 PID 3232 wrote to memory of 1308 3232 msedge.exe 84 PID 3232 wrote to memory of 1308 3232 msedge.exe 84 PID 3232 wrote to memory of 1308 3232 msedge.exe 84 PID 3232 wrote to memory of 1308 3232 msedge.exe 84 PID 3232 wrote to memory of 1308 3232 msedge.exe 84 PID 3232 wrote to memory of 1308 3232 msedge.exe 84 PID 3232 wrote to memory of 1308 3232 msedge.exe 84 PID 3232 wrote to memory of 4508 3232 msedge.exe 85 PID 3232 wrote to memory of 4508 3232 msedge.exe 85 PID 3232 wrote to memory of 4512 3232 msedge.exe 86 PID 3232 wrote to memory of 4512 3232 msedge.exe 86 PID 3232 wrote to memory of 4512 3232 msedge.exe 86 PID 3232 wrote to memory of 4512 3232 msedge.exe 86 PID 3232 wrote to memory of 4512 3232 msedge.exe 86 PID 3232 wrote to memory of 4512 3232 msedge.exe 86 PID 3232 wrote to memory of 4512 3232 msedge.exe 86 PID 3232 wrote to memory of 4512 3232 msedge.exe 86 PID 3232 wrote to memory of 4512 3232 msedge.exe 86 PID 3232 wrote to memory of 4512 3232 msedge.exe 86 PID 3232 wrote to memory of 4512 3232 msedge.exe 86 PID 3232 wrote to memory of 4512 3232 msedge.exe 86 PID 3232 wrote to memory of 4512 3232 msedge.exe 86 PID 3232 wrote to memory of 4512 3232 msedge.exe 86 PID 3232 wrote to memory of 4512 3232 msedge.exe 86 PID 3232 wrote to memory of 4512 3232 msedge.exe 86 PID 3232 wrote to memory of 4512 3232 msedge.exe 86 PID 3232 wrote to memory of 4512 3232 msedge.exe 86 PID 3232 wrote to memory of 4512 3232 msedge.exe 86 PID 3232 wrote to memory of 4512 3232 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2ec3b1d92c15fc32139670b4f9dc7b64_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3232 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa997746f8,0x7ffa99774708,0x7ffa997747182⤵PID:2260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2220,3671791346818553147,15195859089876668969,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2248 /prefetch:22⤵PID:1308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2220,3671791346818553147,15195859089876668969,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2304 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2220,3671791346818553147,15195859089876668969,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2892 /prefetch:82⤵PID:4512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,3671791346818553147,15195859089876668969,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:3456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,3671791346818553147,15195859089876668969,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:3020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2220,3671791346818553147,15195859089876668969,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5824 /prefetch:82⤵PID:1896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2220,3671791346818553147,15195859089876668969,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5824 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,3671791346818553147,15195859089876668969,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5024 /prefetch:12⤵PID:3096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,3671791346818553147,15195859089876668969,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3988 /prefetch:12⤵PID:4392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,3671791346818553147,15195859089876668969,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4160 /prefetch:12⤵PID:528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,3671791346818553147,15195859089876668969,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5944 /prefetch:12⤵PID:5044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2220,3671791346818553147,15195859089876668969,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3764 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1896
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5052
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4408
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5b8880802fc2bb880a7a869faa01315b0
SHA151d1a3fa2c272f094515675d82150bfce08ee8d3
SHA256467b8cd4aacac66557712f9843023dcedefcc26efc746f3e44157bc8dac73812
SHA512e1c6dba2579357ba70de58968b167d2c529534d24bff70568144270c48ac18a48ee2af2d58d78ae741e5a36958fa78a57955bd2456f1df00b781fc1002e123d2
-
Filesize
152B
MD5ba6ef346187b40694d493da98d5da979
SHA1643c15bec043f8673943885199bb06cd1652ee37
SHA256d86eec91f295dfda8ed1c5fa99de426f2fe359282c7ebf67e3a40be739475d73
SHA5122e6cc97330be8868d4b9c53be7e12c558f6eb1ac2c4080a611ba6c43561d0c5bb4791b8a11a8c2371599f0ba73ed1d9a7a2ea6dee2ae6a080f1912e0cb1f656c
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
388B
MD56d583b1e620d48359274be53a315d94a
SHA139757008458ca7b71d9fef826d325486c929eff3
SHA256e7f55a938f13f17624fb1c999594b1a6808c6268ca5b3243d019e40f7063b424
SHA51214d98cd02f2f79b5eb1c178040935e5350c6a48d90868736c848f8844c4674c57bcddecd8450888a8ba116a93f147d4abb8856993a014289861979202930348d
-
Filesize
6KB
MD56240ae91e2deccb509efcff6deffb9d2
SHA1f22975313e37d6a787a24f77af2004c64481e059
SHA25683c2348f55b5bcb4e22f4f8b008acd73181d2030c475ff779acc02259c3cdf4c
SHA51226ff3a415ae36bd69e4d36f7b0d7e551f7280bda055625d74d997024c15d76977466c27fc330c25d4c14bdf9bf446ac86f3d2de6aabbc187144a7b704d41779f
-
Filesize
6KB
MD5cd4448f2c6ff4d4cc79012e5e5384058
SHA1167cfa7917e67d94c633473099a2872a53104575
SHA25661d242818a2a5990373c5f251bf05f8b24abff951f1fe048e6ddadc5bdd6626b
SHA5125a44af995409ac38320e7f616067f75cb37c14d358737e8d4d8c6d74ab339337856c49e7669e46de1778e11fea78f49fd16bfea17918269aaa15ac427ec3529c
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD516cc9a5f6c98c9cb454eb4f8f0a636fc
SHA1c3149c46814ac55a3d3932f0b4873c1bc5256076
SHA256cedad358bacb2f6b40b9cbfd0f4544e55fe263a17419d240a4e493dc87800dbe
SHA512a45dae5dc7b2b845606ac3ed96a876c236a9a40d351d4d790ead62a8e5e520df346f71caf252bea6503fcb7e598ac4d420f270405f726c1eca3906b72ec84b64