Analysis
-
max time kernel
145s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09/10/2024, 10:50
Static task
static1
Behavioral task
behavioral1
Sample
2fcc9a2a16c5da903e465fb71ebadc3c_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2fcc9a2a16c5da903e465fb71ebadc3c_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
2fcc9a2a16c5da903e465fb71ebadc3c_JaffaCakes118.html
-
Size
29KB
-
MD5
2fcc9a2a16c5da903e465fb71ebadc3c
-
SHA1
fb377957e2e0a1b45274cb79182c500a60602d68
-
SHA256
86531c16d01a51d984dffe46cb0f31497ea04a37b6d7384b88cacf5f6820e544
-
SHA512
7ba93f3ff2d2aa026a2d6a581f26fc666bfdd60af3992ef987ec7aa7dda16393bad014e50e364edc5983e386fdd0e3d7b4fdca73a376668a349bb042958fabb0
-
SSDEEP
768:7n1jYvstGqs39wAvXgFUev9XcVkW/oeISbl+uLmBN0w6:7n1jhQ9wAvXgFUev9XcVV/oeISbl+uLP
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2716 msedge.exe 2716 msedge.exe 2868 msedge.exe 2868 msedge.exe 4956 identity_helper.exe 4956 identity_helper.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe 2868 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2868 wrote to memory of 936 2868 msedge.exe 83 PID 2868 wrote to memory of 936 2868 msedge.exe 83 PID 2868 wrote to memory of 2876 2868 msedge.exe 85 PID 2868 wrote to memory of 2876 2868 msedge.exe 85 PID 2868 wrote to memory of 2876 2868 msedge.exe 85 PID 2868 wrote to memory of 2876 2868 msedge.exe 85 PID 2868 wrote to memory of 2876 2868 msedge.exe 85 PID 2868 wrote to memory of 2876 2868 msedge.exe 85 PID 2868 wrote to memory of 2876 2868 msedge.exe 85 PID 2868 wrote to memory of 2876 2868 msedge.exe 85 PID 2868 wrote to memory of 2876 2868 msedge.exe 85 PID 2868 wrote to memory of 2876 2868 msedge.exe 85 PID 2868 wrote to memory of 2876 2868 msedge.exe 85 PID 2868 wrote to memory of 2876 2868 msedge.exe 85 PID 2868 wrote to memory of 2876 2868 msedge.exe 85 PID 2868 wrote to memory of 2876 2868 msedge.exe 85 PID 2868 wrote to memory of 2876 2868 msedge.exe 85 PID 2868 wrote to memory of 2876 2868 msedge.exe 85 PID 2868 wrote to memory of 2876 2868 msedge.exe 85 PID 2868 wrote to memory of 2876 2868 msedge.exe 85 PID 2868 wrote to memory of 2876 2868 msedge.exe 85 PID 2868 wrote to memory of 2876 2868 msedge.exe 85 PID 2868 wrote to memory of 2876 2868 msedge.exe 85 PID 2868 wrote to memory of 2876 2868 msedge.exe 85 PID 2868 wrote to memory of 2876 2868 msedge.exe 85 PID 2868 wrote to memory of 2876 2868 msedge.exe 85 PID 2868 wrote to memory of 2876 2868 msedge.exe 85 PID 2868 wrote to memory of 2876 2868 msedge.exe 85 PID 2868 wrote to memory of 2876 2868 msedge.exe 85 PID 2868 wrote to memory of 2876 2868 msedge.exe 85 PID 2868 wrote to memory of 2876 2868 msedge.exe 85 PID 2868 wrote to memory of 2876 2868 msedge.exe 85 PID 2868 wrote to memory of 2876 2868 msedge.exe 85 PID 2868 wrote to memory of 2876 2868 msedge.exe 85 PID 2868 wrote to memory of 2876 2868 msedge.exe 85 PID 2868 wrote to memory of 2876 2868 msedge.exe 85 PID 2868 wrote to memory of 2876 2868 msedge.exe 85 PID 2868 wrote to memory of 2876 2868 msedge.exe 85 PID 2868 wrote to memory of 2876 2868 msedge.exe 85 PID 2868 wrote to memory of 2876 2868 msedge.exe 85 PID 2868 wrote to memory of 2876 2868 msedge.exe 85 PID 2868 wrote to memory of 2876 2868 msedge.exe 85 PID 2868 wrote to memory of 2716 2868 msedge.exe 86 PID 2868 wrote to memory of 2716 2868 msedge.exe 86 PID 2868 wrote to memory of 2172 2868 msedge.exe 87 PID 2868 wrote to memory of 2172 2868 msedge.exe 87 PID 2868 wrote to memory of 2172 2868 msedge.exe 87 PID 2868 wrote to memory of 2172 2868 msedge.exe 87 PID 2868 wrote to memory of 2172 2868 msedge.exe 87 PID 2868 wrote to memory of 2172 2868 msedge.exe 87 PID 2868 wrote to memory of 2172 2868 msedge.exe 87 PID 2868 wrote to memory of 2172 2868 msedge.exe 87 PID 2868 wrote to memory of 2172 2868 msedge.exe 87 PID 2868 wrote to memory of 2172 2868 msedge.exe 87 PID 2868 wrote to memory of 2172 2868 msedge.exe 87 PID 2868 wrote to memory of 2172 2868 msedge.exe 87 PID 2868 wrote to memory of 2172 2868 msedge.exe 87 PID 2868 wrote to memory of 2172 2868 msedge.exe 87 PID 2868 wrote to memory of 2172 2868 msedge.exe 87 PID 2868 wrote to memory of 2172 2868 msedge.exe 87 PID 2868 wrote to memory of 2172 2868 msedge.exe 87 PID 2868 wrote to memory of 2172 2868 msedge.exe 87 PID 2868 wrote to memory of 2172 2868 msedge.exe 87 PID 2868 wrote to memory of 2172 2868 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2fcc9a2a16c5da903e465fb71ebadc3c_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc02b446f8,0x7ffc02b44708,0x7ffc02b447182⤵PID:936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2228,5639835683611042525,10108170911670804410,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2236 /prefetch:22⤵PID:2876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2228,5639835683611042525,10108170911670804410,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2308 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2228,5639835683611042525,10108170911670804410,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2872 /prefetch:82⤵PID:2172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,5639835683611042525,10108170911670804410,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,5639835683611042525,10108170911670804410,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2228,5639835683611042525,10108170911670804410,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6080 /prefetch:82⤵PID:3456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2228,5639835683611042525,10108170911670804410,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6080 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,5639835683611042525,10108170911670804410,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6016 /prefetch:12⤵PID:4656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,5639835683611042525,10108170911670804410,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6024 /prefetch:12⤵PID:3516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,5639835683611042525,10108170911670804410,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4152 /prefetch:12⤵PID:1368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,5639835683611042525,10108170911670804410,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3372 /prefetch:12⤵PID:1032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2228,5639835683611042525,10108170911670804410,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4824 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2804
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3984
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4988
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5dc058ebc0f8181946a312f0be99ed79c
SHA10c6f376ed8f2d4c275336048c7c9ef9edf18bff0
SHA256378701e87dcff90aa092702bc299859d6ae8f7e313f773bf594f81df6f40bf6a
SHA51236e0de64a554762b28045baebf9f71930c59d608f8d05c5faf8906d62eaf83f6d856ef1d1b38110e512fbb1a85d3e2310be11a7f679c6b5b3c62313cc7af52aa
-
Filesize
152B
MD5a0486d6f8406d852dd805b66ff467692
SHA177ba1f63142e86b21c951b808f4bc5d8ed89b571
SHA256c0745fd195f3a51b27e4d35a626378a62935dccebefb94db404166befd68b2be
SHA512065a62032eb799fade5fe75f390e7ab3c9442d74cb8b520d846662d144433f39b9186b3ef3db3480cd1d1d655d8f0630855ed5d6e85cf157a40c38a19375ed8a
-
Filesize
523B
MD5318b35d43c213094853c0d3f18088a24
SHA1320d5afe276dd705c9128c62f3d0df322e354c6e
SHA25650168556b3353156672cd8058ee389bec6e72b45f6390368de6b4746f2a49687
SHA5120418cf02f36f32edbaa27d3a654cef0ef20af3e3e88d22aa94eb70aed75737e753c3e0f4960602429390af1e32b5fc0f365517cea768ae42092f4fa2a272bb16
-
Filesize
6KB
MD55da215c7106c8f2073b8a7a206af2d5e
SHA1c5d4c3bc0b32026af7e0b3453b53e306a13704db
SHA2567baa99c5527f1a9070bc4b240b09a42f944bc2f869f94f8e2dcc43e1a4cc1d75
SHA51235b47b18b0fac89fbb6c833a9f6a009a6b39ec7d0affda1c547b75ab090a2a1e4e3dc368ec6262c1d5a896e1f4b024eba040439a3d801d9b1db07409f9806778
-
Filesize
6KB
MD5b9c562df28c224eec8d884bf2e0c8999
SHA1e9ba76dc0280d2cbd2f587307e3e54189b15a095
SHA256a90677af3563d8dee77d6ecff285b9341c93412be8ef5f242f9dfc3582ac94d7
SHA51229ab930106ceba45c79eaa33fff8e837fd85f40b1a7bbda7954398f1b78dd844eac9ba445fac6bc83dc91e3387a24a4fedbb7347d24f41a1edb93114b6900055
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD568601461adf4d43f5e533bb51258dfe2
SHA1cb6d0edc37d752d75acfa3a99b23ed386bcc377c
SHA2568d7cdabf47b99c55ef4a873d06ac4ee838663562e187c422013c2589550eeb6a
SHA5129e4a5b891da4bb94eee6bd3524fa5e912ee9d9f42db07f9beba728d658950fbfffeda7b6fcc219ff52d90cbc2f14c92e1cad564b9dda42ec980ec9c22dafd8e2