Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
11/04/2024, 15:39
Static task
static1
Behavioral task
behavioral1
Sample
edc4e9d8d454c9026edf77df8e593072_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
edc4e9d8d454c9026edf77df8e593072_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
edc4e9d8d454c9026edf77df8e593072_JaffaCakes118.html
-
Size
120KB
-
MD5
edc4e9d8d454c9026edf77df8e593072
-
SHA1
ecea4eb4a66aad40a9b32b5fb99aba4b9f5e8602
-
SHA256
fb0d74f133c0dbb35d00ed40a6c06560c745d2c1690b2437ae4813751b272553
-
SHA512
c1ed4bfcdbc7a3c7fc40570a5dd551d4332c01dc1e82d8fca0dd05e9b9e84171a576111fa0bbe27c50118c9c3c74bd175f236e6fc5ee2931a3cf35ae12c37ab1
-
SSDEEP
1536:dp+yKvqXqhcpomLndc2P947mQGvuaIG0G5Ji:ayKWqCvr2Gvsl
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3908 msedge.exe 3908 msedge.exe 3112 msedge.exe 3112 msedge.exe 3752 msedge.exe 3752 msedge.exe 3752 msedge.exe 3752 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3112 wrote to memory of 3244 3112 msedge.exe 84 PID 3112 wrote to memory of 3244 3112 msedge.exe 84 PID 3112 wrote to memory of 1420 3112 msedge.exe 85 PID 3112 wrote to memory of 1420 3112 msedge.exe 85 PID 3112 wrote to memory of 1420 3112 msedge.exe 85 PID 3112 wrote to memory of 1420 3112 msedge.exe 85 PID 3112 wrote to memory of 1420 3112 msedge.exe 85 PID 3112 wrote to memory of 1420 3112 msedge.exe 85 PID 3112 wrote to memory of 1420 3112 msedge.exe 85 PID 3112 wrote to memory of 1420 3112 msedge.exe 85 PID 3112 wrote to memory of 1420 3112 msedge.exe 85 PID 3112 wrote to memory of 1420 3112 msedge.exe 85 PID 3112 wrote to memory of 1420 3112 msedge.exe 85 PID 3112 wrote to memory of 1420 3112 msedge.exe 85 PID 3112 wrote to memory of 1420 3112 msedge.exe 85 PID 3112 wrote to memory of 1420 3112 msedge.exe 85 PID 3112 wrote to memory of 1420 3112 msedge.exe 85 PID 3112 wrote to memory of 1420 3112 msedge.exe 85 PID 3112 wrote to memory of 1420 3112 msedge.exe 85 PID 3112 wrote to memory of 1420 3112 msedge.exe 85 PID 3112 wrote to memory of 1420 3112 msedge.exe 85 PID 3112 wrote to memory of 1420 3112 msedge.exe 85 PID 3112 wrote to memory of 1420 3112 msedge.exe 85 PID 3112 wrote to memory of 1420 3112 msedge.exe 85 PID 3112 wrote to memory of 1420 3112 msedge.exe 85 PID 3112 wrote to memory of 1420 3112 msedge.exe 85 PID 3112 wrote to memory of 1420 3112 msedge.exe 85 PID 3112 wrote to memory of 1420 3112 msedge.exe 85 PID 3112 wrote to memory of 1420 3112 msedge.exe 85 PID 3112 wrote to memory of 1420 3112 msedge.exe 85 PID 3112 wrote to memory of 1420 3112 msedge.exe 85 PID 3112 wrote to memory of 1420 3112 msedge.exe 85 PID 3112 wrote to memory of 1420 3112 msedge.exe 85 PID 3112 wrote to memory of 1420 3112 msedge.exe 85 PID 3112 wrote to memory of 1420 3112 msedge.exe 85 PID 3112 wrote to memory of 1420 3112 msedge.exe 85 PID 3112 wrote to memory of 1420 3112 msedge.exe 85 PID 3112 wrote to memory of 1420 3112 msedge.exe 85 PID 3112 wrote to memory of 1420 3112 msedge.exe 85 PID 3112 wrote to memory of 1420 3112 msedge.exe 85 PID 3112 wrote to memory of 1420 3112 msedge.exe 85 PID 3112 wrote to memory of 1420 3112 msedge.exe 85 PID 3112 wrote to memory of 3908 3112 msedge.exe 86 PID 3112 wrote to memory of 3908 3112 msedge.exe 86 PID 3112 wrote to memory of 3588 3112 msedge.exe 87 PID 3112 wrote to memory of 3588 3112 msedge.exe 87 PID 3112 wrote to memory of 3588 3112 msedge.exe 87 PID 3112 wrote to memory of 3588 3112 msedge.exe 87 PID 3112 wrote to memory of 3588 3112 msedge.exe 87 PID 3112 wrote to memory of 3588 3112 msedge.exe 87 PID 3112 wrote to memory of 3588 3112 msedge.exe 87 PID 3112 wrote to memory of 3588 3112 msedge.exe 87 PID 3112 wrote to memory of 3588 3112 msedge.exe 87 PID 3112 wrote to memory of 3588 3112 msedge.exe 87 PID 3112 wrote to memory of 3588 3112 msedge.exe 87 PID 3112 wrote to memory of 3588 3112 msedge.exe 87 PID 3112 wrote to memory of 3588 3112 msedge.exe 87 PID 3112 wrote to memory of 3588 3112 msedge.exe 87 PID 3112 wrote to memory of 3588 3112 msedge.exe 87 PID 3112 wrote to memory of 3588 3112 msedge.exe 87 PID 3112 wrote to memory of 3588 3112 msedge.exe 87 PID 3112 wrote to memory of 3588 3112 msedge.exe 87 PID 3112 wrote to memory of 3588 3112 msedge.exe 87 PID 3112 wrote to memory of 3588 3112 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\edc4e9d8d454c9026edf77df8e593072_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3112 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffacec146f8,0x7ffacec14708,0x7ffacec147182⤵PID:3244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,1350409791045503688,124781814383948023,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:22⤵PID:1420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2084,1350409791045503688,124781814383948023,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2084,1350409791045503688,124781814383948023,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2960 /prefetch:82⤵PID:3588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,1350409791045503688,124781814383948023,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:4024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,1350409791045503688,124781814383948023,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:1268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,1350409791045503688,124781814383948023,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4176 /prefetch:12⤵PID:3864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,1350409791045503688,124781814383948023,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4736 /prefetch:12⤵PID:1620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,1350409791045503688,124781814383948023,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3496 /prefetch:12⤵PID:3492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,1350409791045503688,124781814383948023,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4048 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3752
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5104
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:216
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5cbec32729772aa6c576e97df4fef48f5
SHA16ec173d5313f27ba1e46ad66c7bbe7c0a9767dba
SHA256d34331aa91a21e127bbe68f55c4c1898c429d9d43545c3253d317ffb105aa24e
SHA512425b3638fed70da3bc16bba8b9878de528aca98669203f39473b931f487a614d3f66073b8c3d9bc2211e152b4bbdeceb2777001467954eec491f862912f3c7a0
-
Filesize
152B
MD5279e783b0129b64a8529800a88fbf1ee
SHA1204c62ec8cef8467e5729cad52adae293178744f
SHA2563619c3b82a8cbdce37bfd88b66d4fdfcd728a1112b05eb26998bea527d187932
SHA51232730d9124dd28c196bd4abcfd6a283a04553f3f6b050c057264bc883783d30d6602781137762e66e1f90847724d0e994bddf6e729de11a809f263f139023d3b
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
6KB
MD5378ad08c75d47207a7839a7c68586cf6
SHA11eda363a6de615e4fbff6405ae37e20c59b73a90
SHA2566e32b6430dff43ac1e5c68d805c3b86b25eea0860708426e2e5ad69ac611a6d2
SHA512141f419c74ca3de9b9a255badcb63fa8387a271bc3fe700a3812ceec3ad4a9544798ee28e4385c6eaf7bca40672134dbc32fe6c98b4608dd1ceb2fc7582ad156
-
Filesize
6KB
MD56f53c788dcfab26500dad29514cf780f
SHA1436f1eb1aaa6b8c27c8e51e3d5cd6c40374e65f8
SHA2564d248844208deabe7ab39f536495e52d1568c251f5700f77c3c1f88efaa9ffc3
SHA512051e9e6576007bbc1908842f38c1eb5c9669f08fc0f375646c8ec58fb4f60ed9ae44223a865ab7466832b8cd2e896d25c005fa1a659699c244268fbfdf65bf66
-
Filesize
11KB
MD5da0661ab17461ece8b2703d07a81c907
SHA1f81309c1fc768f9b824c1b1b1a434e83247d3c8d
SHA25657a3251f922695e0d321724a6c680904f9f3674d3e462ddcfdd727acc97801a8
SHA5120aec0a0b564b2edbdd170370ec2db07d5e131eaaf795451162570d83338af3b66331018b96e49b0e0c72b50129c7353fa305ce0e5e23a42d17fded7ad45b9913