Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
18/04/2024, 07:29
Static task
static1
Behavioral task
behavioral1
Sample
f7899032ddb8935ad9412e77dff25094_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f7899032ddb8935ad9412e77dff25094_JaffaCakes118.html
Resource
win10v2004-20240412-en
General
-
Target
f7899032ddb8935ad9412e77dff25094_JaffaCakes118.html
-
Size
170KB
-
MD5
f7899032ddb8935ad9412e77dff25094
-
SHA1
0233edaba41e3ef0c791ff5696f474a8e1e9bc47
-
SHA256
57a6321ae23ccfda91672a26b6796ebde4468d1ebb0c32a32d6015d633a70df2
-
SHA512
b610cbc52283d0ae3ce2b1a2b94a05df101d4655cf281167e751bc6fb4e579a446a4e22016769ed477ae50436391561cc364cacce511adf1a9520d8d42aed605
-
SSDEEP
3072:ZGuGuGADrR37RQWV/lnyK6CV5a7Sdm34W1LDiI6Fovv+P/ue57b29SzZFIi:dD51/lnyK6CV51ue5B
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 7 IoCs
flow ioc 19 sites.google.com 11 sites.google.com 14 sites.google.com 15 sites.google.com 16 sites.google.com 17 sites.google.com 18 sites.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3212 msedge.exe 3212 msedge.exe 4216 msedge.exe 4216 msedge.exe 4544 identity_helper.exe 4544 identity_helper.exe 3516 msedge.exe 3516 msedge.exe 3516 msedge.exe 3516 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3212 wrote to memory of 4904 3212 msedge.exe 86 PID 3212 wrote to memory of 4904 3212 msedge.exe 86 PID 3212 wrote to memory of 2444 3212 msedge.exe 87 PID 3212 wrote to memory of 2444 3212 msedge.exe 87 PID 3212 wrote to memory of 2444 3212 msedge.exe 87 PID 3212 wrote to memory of 2444 3212 msedge.exe 87 PID 3212 wrote to memory of 2444 3212 msedge.exe 87 PID 3212 wrote to memory of 2444 3212 msedge.exe 87 PID 3212 wrote to memory of 2444 3212 msedge.exe 87 PID 3212 wrote to memory of 2444 3212 msedge.exe 87 PID 3212 wrote to memory of 2444 3212 msedge.exe 87 PID 3212 wrote to memory of 2444 3212 msedge.exe 87 PID 3212 wrote to memory of 2444 3212 msedge.exe 87 PID 3212 wrote to memory of 2444 3212 msedge.exe 87 PID 3212 wrote to memory of 2444 3212 msedge.exe 87 PID 3212 wrote to memory of 2444 3212 msedge.exe 87 PID 3212 wrote to memory of 2444 3212 msedge.exe 87 PID 3212 wrote to memory of 2444 3212 msedge.exe 87 PID 3212 wrote to memory of 2444 3212 msedge.exe 87 PID 3212 wrote to memory of 2444 3212 msedge.exe 87 PID 3212 wrote to memory of 2444 3212 msedge.exe 87 PID 3212 wrote to memory of 2444 3212 msedge.exe 87 PID 3212 wrote to memory of 2444 3212 msedge.exe 87 PID 3212 wrote to memory of 2444 3212 msedge.exe 87 PID 3212 wrote to memory of 2444 3212 msedge.exe 87 PID 3212 wrote to memory of 2444 3212 msedge.exe 87 PID 3212 wrote to memory of 2444 3212 msedge.exe 87 PID 3212 wrote to memory of 2444 3212 msedge.exe 87 PID 3212 wrote to memory of 2444 3212 msedge.exe 87 PID 3212 wrote to memory of 2444 3212 msedge.exe 87 PID 3212 wrote to memory of 2444 3212 msedge.exe 87 PID 3212 wrote to memory of 2444 3212 msedge.exe 87 PID 3212 wrote to memory of 2444 3212 msedge.exe 87 PID 3212 wrote to memory of 2444 3212 msedge.exe 87 PID 3212 wrote to memory of 2444 3212 msedge.exe 87 PID 3212 wrote to memory of 2444 3212 msedge.exe 87 PID 3212 wrote to memory of 2444 3212 msedge.exe 87 PID 3212 wrote to memory of 2444 3212 msedge.exe 87 PID 3212 wrote to memory of 2444 3212 msedge.exe 87 PID 3212 wrote to memory of 2444 3212 msedge.exe 87 PID 3212 wrote to memory of 2444 3212 msedge.exe 87 PID 3212 wrote to memory of 2444 3212 msedge.exe 87 PID 3212 wrote to memory of 4216 3212 msedge.exe 88 PID 3212 wrote to memory of 4216 3212 msedge.exe 88 PID 3212 wrote to memory of 2752 3212 msedge.exe 89 PID 3212 wrote to memory of 2752 3212 msedge.exe 89 PID 3212 wrote to memory of 2752 3212 msedge.exe 89 PID 3212 wrote to memory of 2752 3212 msedge.exe 89 PID 3212 wrote to memory of 2752 3212 msedge.exe 89 PID 3212 wrote to memory of 2752 3212 msedge.exe 89 PID 3212 wrote to memory of 2752 3212 msedge.exe 89 PID 3212 wrote to memory of 2752 3212 msedge.exe 89 PID 3212 wrote to memory of 2752 3212 msedge.exe 89 PID 3212 wrote to memory of 2752 3212 msedge.exe 89 PID 3212 wrote to memory of 2752 3212 msedge.exe 89 PID 3212 wrote to memory of 2752 3212 msedge.exe 89 PID 3212 wrote to memory of 2752 3212 msedge.exe 89 PID 3212 wrote to memory of 2752 3212 msedge.exe 89 PID 3212 wrote to memory of 2752 3212 msedge.exe 89 PID 3212 wrote to memory of 2752 3212 msedge.exe 89 PID 3212 wrote to memory of 2752 3212 msedge.exe 89 PID 3212 wrote to memory of 2752 3212 msedge.exe 89 PID 3212 wrote to memory of 2752 3212 msedge.exe 89 PID 3212 wrote to memory of 2752 3212 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\f7899032ddb8935ad9412e77dff25094_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3212 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbe87e46f8,0x7ffbe87e4708,0x7ffbe87e47182⤵PID:4904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2240,6043122906554623870,12533857738915855313,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2252 /prefetch:22⤵PID:2444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2240,6043122906554623870,12533857738915855313,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2304 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2240,6043122906554623870,12533857738915855313,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2292 /prefetch:82⤵PID:2752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2240,6043122906554623870,12533857738915855313,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:3996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2240,6043122906554623870,12533857738915855313,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:3564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2240,6043122906554623870,12533857738915855313,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6036 /prefetch:82⤵PID:2968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2240,6043122906554623870,12533857738915855313,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6036 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2240,6043122906554623870,12533857738915855313,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5032 /prefetch:12⤵PID:3640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2240,6043122906554623870,12533857738915855313,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5060 /prefetch:12⤵PID:4388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2240,6043122906554623870,12533857738915855313,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4200 /prefetch:12⤵PID:4692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2240,6043122906554623870,12533857738915855313,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4100 /prefetch:12⤵PID:3936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2240,6043122906554623870,12533857738915855313,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4888 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3516
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1224
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3216
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD57b56675b54840d86d49bde5a1ff8af6a
SHA1fe70a1b85f88d60f3ba9fc7bb5f81fc41e150811
SHA25686af7213f410df65d0937f4331f783160f30eaeb088e28a9eef461713b9a3929
SHA51211fc61b83365391efee8084de5c2af7e064f0182b943a0db08d95a0f450d3877bde5b5e6a6b9f008e58b709bb1a34f7b50085c41927f091df1eea78f039402e9
-
Filesize
152B
MD548cff1baabb24706967de3b0d6869906
SHA1b0cd54f587cd4c88e60556347930cb76991e6734
SHA256f6b5fbc610a71b3914753feb2bd4475a7c77d0d785cc36255bf93b3fe3ccb775
SHA512fd0c848f3f9de81aca81af999262f96ea4c1cd1d1f32d304f56c7382f3b1bb604e5fbe9f209ad6e4b38988d92357ef82e9668806d0727f2856c7dc1f07aae2b6
-
Filesize
1KB
MD5e9d38e2c0513760f425bfa6b89eef3ea
SHA175ed6b37420af83075c94b8227f1572784259ad7
SHA256312e7de89ee8e7ae273f323ed5da10416d1d46dcaf5a2337efc320dafe00a467
SHA512e8e0b261b3f15d5cb21d32d42359dfee0929268b126669edab0b15744731dd081a851b5a4bd11fe7e1c3bbe7df03e848da764b35cfdcca214dd9ce6f64bcd974
-
Filesize
6KB
MD55a3bbd01c89dce37c20a73ac6b72c1f4
SHA1fd027a511df854f48c6fb1f20b9815729bc4af92
SHA2562d353bf070d0f0ffd867366ea913e4a3e712c677cade911df1795ef5f36b1b60
SHA5124f27b836b31766a0c3205ef2549a78adbd838612ada6659f9eceee045a6379a3c2e9890ea7802cb423bf6e1d0bb93f9ffd57ff3f60409ac7cf47947b46b8e069
-
Filesize
7KB
MD5f265390612e6b18259fbcaa879867dc0
SHA1bc79aac005dbc4f851b775fb12f7042b8ed6c376
SHA256258182d9bc4a43289a9d1db58bc768afcf08411adb8935efe818941f0a933a66
SHA512d725314613049e1caee694b82a0464111ca91dbe7068a64309c4bceaa57df188ae8b8c17b6e50265054a32c5d6e254189bfae0bd85661ca1bfd5672379e415fc
-
Filesize
7KB
MD5fc3744224fb7b6e9b68d94ccd0caceeb
SHA16b0a852335f9dd1d898067e507b662bdab9045eb
SHA256b8b2dfe4e3a1eb99bcf4e3810bb485a378c856c240e21512268d86e9fd15f224
SHA5126ef40844b9de0d3cc8c25c315d7eff0e4207bf8e1a86626b289b70f33eb5444be487cd1947fabef6abef2d2a4a1de89cc1b5c55db6dce60c18d46aa600dd8775
-
Filesize
203B
MD5607fbc9d9a4186f04a74d5f2c00d3cd7
SHA17ad1c770086fabad0db97cccf8038625ce8ccabf
SHA2562187184fecd1812dd49e242b073a45eb996fdc97468caea5de6541f8acef7362
SHA5128854ef4a793d70db02a6996451ccf026303f626301fa355c18ba1071556f0885094b84653ae7df212fa01a66194fa5dcb1ed7bd2660d4120cfeea6a19156d115
-
Filesize
203B
MD587fe3b93ff27584cb601658033ceeace
SHA121627d3e72cc790c1a4f18aad6cf624d67adc492
SHA256e342a8be67d4982c84e8703444b997ce9bc5fbab954cd6caeb7dac189ce75e30
SHA512162340fb1ad365b85d763760c82ad2868c3650a86b5d702fba7334b692303509fb3ac328a7c1cac1c0e32d9e7da114a94c87825d1ada138272b99b06fa712733
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD58325727d73660cb36c54540c1893ba55
SHA1f9dd27d4536d33ba40e4df91fb4c01d16d696159
SHA256984f795bcb92e917f18562073cd3ecf068167f438b23fc506b25f5f99188ce11
SHA512f1a244481bc762d795c0809b575651fbc8f2c222aa101ef3ed69cedafcbba4f4902801db8a33d8a09d88e9cf74149a6fb9d0dfd3e76ae09a0853f1521b82555a