Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-10-2024 10:22
Static task
static1
Behavioral task
behavioral1
Sample
2f6533ff97d49eb99545b4128cec7d1c_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2f6533ff97d49eb99545b4128cec7d1c_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
2f6533ff97d49eb99545b4128cec7d1c_JaffaCakes118.html
-
Size
24KB
-
MD5
2f6533ff97d49eb99545b4128cec7d1c
-
SHA1
24f2ef0b7a9ab66e45ac092622df9fefbdf7d90d
-
SHA256
516fa40f7f1768b42f1046db721f25d960d97d9e80ddbd1d71115080b566ee9f
-
SHA512
b16916f314095db9f5e80588c33cbf5e36b1f15165f0792258972a7171932a33d239c2f40df74921fd42945882d70c4303b2d0a47df3b3c7acc1b54ff4682cc3
-
SSDEEP
384:BnGqTFS1spKVAqnd+uRf7Hby9Cxv9hB2FzcYZJ7s3OOZLvZj4F2Spo2dllIkYd3:W1spKVAqnd+qi9q7B2iYZJ7sxVA2StC
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3608 msedge.exe 3608 msedge.exe 2068 msedge.exe 2068 msedge.exe 4420 identity_helper.exe 4420 identity_helper.exe 1556 msedge.exe 1556 msedge.exe 1556 msedge.exe 1556 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2068 wrote to memory of 4900 2068 msedge.exe 85 PID 2068 wrote to memory of 4900 2068 msedge.exe 85 PID 2068 wrote to memory of 2812 2068 msedge.exe 86 PID 2068 wrote to memory of 2812 2068 msedge.exe 86 PID 2068 wrote to memory of 2812 2068 msedge.exe 86 PID 2068 wrote to memory of 2812 2068 msedge.exe 86 PID 2068 wrote to memory of 2812 2068 msedge.exe 86 PID 2068 wrote to memory of 2812 2068 msedge.exe 86 PID 2068 wrote to memory of 2812 2068 msedge.exe 86 PID 2068 wrote to memory of 2812 2068 msedge.exe 86 PID 2068 wrote to memory of 2812 2068 msedge.exe 86 PID 2068 wrote to memory of 2812 2068 msedge.exe 86 PID 2068 wrote to memory of 2812 2068 msedge.exe 86 PID 2068 wrote to memory of 2812 2068 msedge.exe 86 PID 2068 wrote to memory of 2812 2068 msedge.exe 86 PID 2068 wrote to memory of 2812 2068 msedge.exe 86 PID 2068 wrote to memory of 2812 2068 msedge.exe 86 PID 2068 wrote to memory of 2812 2068 msedge.exe 86 PID 2068 wrote to memory of 2812 2068 msedge.exe 86 PID 2068 wrote to memory of 2812 2068 msedge.exe 86 PID 2068 wrote to memory of 2812 2068 msedge.exe 86 PID 2068 wrote to memory of 2812 2068 msedge.exe 86 PID 2068 wrote to memory of 2812 2068 msedge.exe 86 PID 2068 wrote to memory of 2812 2068 msedge.exe 86 PID 2068 wrote to memory of 2812 2068 msedge.exe 86 PID 2068 wrote to memory of 2812 2068 msedge.exe 86 PID 2068 wrote to memory of 2812 2068 msedge.exe 86 PID 2068 wrote to memory of 2812 2068 msedge.exe 86 PID 2068 wrote to memory of 2812 2068 msedge.exe 86 PID 2068 wrote to memory of 2812 2068 msedge.exe 86 PID 2068 wrote to memory of 2812 2068 msedge.exe 86 PID 2068 wrote to memory of 2812 2068 msedge.exe 86 PID 2068 wrote to memory of 2812 2068 msedge.exe 86 PID 2068 wrote to memory of 2812 2068 msedge.exe 86 PID 2068 wrote to memory of 2812 2068 msedge.exe 86 PID 2068 wrote to memory of 2812 2068 msedge.exe 86 PID 2068 wrote to memory of 2812 2068 msedge.exe 86 PID 2068 wrote to memory of 2812 2068 msedge.exe 86 PID 2068 wrote to memory of 2812 2068 msedge.exe 86 PID 2068 wrote to memory of 2812 2068 msedge.exe 86 PID 2068 wrote to memory of 2812 2068 msedge.exe 86 PID 2068 wrote to memory of 2812 2068 msedge.exe 86 PID 2068 wrote to memory of 3608 2068 msedge.exe 87 PID 2068 wrote to memory of 3608 2068 msedge.exe 87 PID 2068 wrote to memory of 2928 2068 msedge.exe 88 PID 2068 wrote to memory of 2928 2068 msedge.exe 88 PID 2068 wrote to memory of 2928 2068 msedge.exe 88 PID 2068 wrote to memory of 2928 2068 msedge.exe 88 PID 2068 wrote to memory of 2928 2068 msedge.exe 88 PID 2068 wrote to memory of 2928 2068 msedge.exe 88 PID 2068 wrote to memory of 2928 2068 msedge.exe 88 PID 2068 wrote to memory of 2928 2068 msedge.exe 88 PID 2068 wrote to memory of 2928 2068 msedge.exe 88 PID 2068 wrote to memory of 2928 2068 msedge.exe 88 PID 2068 wrote to memory of 2928 2068 msedge.exe 88 PID 2068 wrote to memory of 2928 2068 msedge.exe 88 PID 2068 wrote to memory of 2928 2068 msedge.exe 88 PID 2068 wrote to memory of 2928 2068 msedge.exe 88 PID 2068 wrote to memory of 2928 2068 msedge.exe 88 PID 2068 wrote to memory of 2928 2068 msedge.exe 88 PID 2068 wrote to memory of 2928 2068 msedge.exe 88 PID 2068 wrote to memory of 2928 2068 msedge.exe 88 PID 2068 wrote to memory of 2928 2068 msedge.exe 88 PID 2068 wrote to memory of 2928 2068 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2f6533ff97d49eb99545b4128cec7d1c_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa98a646f8,0x7ffa98a64708,0x7ffa98a647182⤵PID:4900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1968,10936929790758417199,13309203835453940010,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2056 /prefetch:22⤵PID:2812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1968,10936929790758417199,13309203835453940010,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2220 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1968,10936929790758417199,13309203835453940010,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2760 /prefetch:82⤵PID:2928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1968,10936929790758417199,13309203835453940010,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:12⤵PID:5040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1968,10936929790758417199,13309203835453940010,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:12⤵PID:3932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1968,10936929790758417199,13309203835453940010,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5412 /prefetch:82⤵PID:992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1968,10936929790758417199,13309203835453940010,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5412 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1968,10936929790758417199,13309203835453940010,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5084 /prefetch:12⤵PID:2656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1968,10936929790758417199,13309203835453940010,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5032 /prefetch:12⤵PID:3248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1968,10936929790758417199,13309203835453940010,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5076 /prefetch:12⤵PID:2012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1968,10936929790758417199,13309203835453940010,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5020 /prefetch:12⤵PID:3948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1968,10936929790758417199,13309203835453940010,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2224 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1556
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2664
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2624
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD599afa4934d1e3c56bbce114b356e8a99
SHA13f0e7a1a28d9d9c06b6663df5d83a65c84d52581
SHA25608e098bb97fd91d815469cdfd5568607a3feca61f18b6b5b9c11b531fde206c8
SHA51276686f30ed68144cf943b80ac10b52c74eee84f197cee3c24ef7845ef44bdb5586b6e530824543deeed59417205ac0e2559808bcb46450504106ac8f4c95b9da
-
Filesize
152B
MD5443a627d539ca4eab732bad0cbe7332b
SHA186b18b906a1acd2a22f4b2c78ac3564c394a9569
SHA2561e1ad9dce141f5f17ea07c7e9c2a65e707c9943f172b9134b0daf9eef25f0dc9
SHA512923b86d75a565c91250110162ce13dd3ef3f6bdde1a83f7af235ed302d4a96b8c9ed722e2152781e699dfcb26bb98afc73f5adb298f8fd673f14c9f28b5f764d
-
Filesize
395B
MD5e94bb5f199069bcb8e51b141f524bf44
SHA1c0e55f3ebb724ece27f440006c3177327a4d7acf
SHA2567b96666cda0c77d95e9476a2b539556212933801ceb02f1aefd2d532a89e5ff1
SHA5128f83a08706474414544582efd38740cbdddaad20e9820f7d98a70a80de5519f734dd255d18e85ea8e21da4a2cf2a01d1902bcf4a0c584e24db6eea13f558d178
-
Filesize
6KB
MD5a3e75f1d38db07173801de4c36ab3afb
SHA1e338028ac0eeb51322ae11a2700f4c4dc3be7a45
SHA256ab41ee8f07cf2267549151ae40836a9048c3d57ede4e9314c35f213149a1707d
SHA5120af016a2aeef5d77536ab2b34ea9edaa3976257f21974e5466ec3edb625a4c62afd6bd28111d791a1ed0c9801980e3c6825a391c6f9eb826a2c648c5193090a7
-
Filesize
6KB
MD5d6cb98f3c1721de5dfcdb59d69457a77
SHA190e770199a09e03c460ae7db7898a64d75d41ed1
SHA256a6154c5abc7b4a711a78f5877604260e139067a7678d55ce1133e634ef0e8bc4
SHA51200f969ddcfc93e493b46b6f54b7dd666f37c02b3fe28846a8ee7036308a58e5c4056785a29aba9a1ee9700091a918968b2d165a0ed2eba5b4545260fb9ec1348
-
Filesize
6KB
MD57ed717d0ad5c33c93c380581b24d233e
SHA1d2f77d36562ea5b8d515aa603a6645b5f8b5a5b9
SHA256bd661d947ba6e5be04b8529ac87eb2e6f642b2faa08f20b81fa2c46b1986ffc1
SHA5125324fa348900e034faafd7dcaead7ba601ceb1c27f178e77cbc92d7601c0432f871fdce876ab6bc6ea7d2255a1cdaa0e765dbe9a38169068374684d76c2a9010
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD59a29500281009a9c6666e109c3dbb5c7
SHA12a3de51bd361395fa4f40aa6e272a6311b8ffcbe
SHA25662444bd19872819f79b219004d8153df0532b955eeea9a9bf6819d54b0f5e227
SHA5129673df941f1b0396ac235def40172c332f6fe9551abf3a538f791efb0223e9254e2183c051be5908f2facfe4b044d784efef8538619d320ff547e780fb236267