Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
26-04-2024 10:00
Static task
static1
Behavioral task
behavioral1
Sample
0085396aaf870deaa79d840ab82815c0_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
0085396aaf870deaa79d840ab82815c0_JaffaCakes118.html
Resource
win10v2004-20240412-en
General
-
Target
0085396aaf870deaa79d840ab82815c0_JaffaCakes118.html
-
Size
29KB
-
MD5
0085396aaf870deaa79d840ab82815c0
-
SHA1
140c34db89af1dc6c5fd23075a3408ff25c7c424
-
SHA256
f2886377f1e8204983f3c137fbf01d91ec8722d089837035a27f9935eaacb570
-
SHA512
a51a4406c0bd108570e94278bad1e1bdf03844af89c0715a23541b1664517d874738be63a6ec6672c781e210e24f19804056f857739a7479b88433218b41858d
-
SSDEEP
768:8mvXvV6q4VO7Vdnujx9JKo7zFuMaYoOmjWDupIH+Y/xRT:8mvXvVl4VO7Vdnujx9Yo7zFuMaFOmjWl
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3804 msedge.exe 3804 msedge.exe 2672 msedge.exe 2672 msedge.exe 2156 identity_helper.exe 2156 identity_helper.exe 5804 msedge.exe 5804 msedge.exe 5804 msedge.exe 5804 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2672 wrote to memory of 4644 2672 msedge.exe 85 PID 2672 wrote to memory of 4644 2672 msedge.exe 85 PID 2672 wrote to memory of 3708 2672 msedge.exe 86 PID 2672 wrote to memory of 3708 2672 msedge.exe 86 PID 2672 wrote to memory of 3708 2672 msedge.exe 86 PID 2672 wrote to memory of 3708 2672 msedge.exe 86 PID 2672 wrote to memory of 3708 2672 msedge.exe 86 PID 2672 wrote to memory of 3708 2672 msedge.exe 86 PID 2672 wrote to memory of 3708 2672 msedge.exe 86 PID 2672 wrote to memory of 3708 2672 msedge.exe 86 PID 2672 wrote to memory of 3708 2672 msedge.exe 86 PID 2672 wrote to memory of 3708 2672 msedge.exe 86 PID 2672 wrote to memory of 3708 2672 msedge.exe 86 PID 2672 wrote to memory of 3708 2672 msedge.exe 86 PID 2672 wrote to memory of 3708 2672 msedge.exe 86 PID 2672 wrote to memory of 3708 2672 msedge.exe 86 PID 2672 wrote to memory of 3708 2672 msedge.exe 86 PID 2672 wrote to memory of 3708 2672 msedge.exe 86 PID 2672 wrote to memory of 3708 2672 msedge.exe 86 PID 2672 wrote to memory of 3708 2672 msedge.exe 86 PID 2672 wrote to memory of 3708 2672 msedge.exe 86 PID 2672 wrote to memory of 3708 2672 msedge.exe 86 PID 2672 wrote to memory of 3708 2672 msedge.exe 86 PID 2672 wrote to memory of 3708 2672 msedge.exe 86 PID 2672 wrote to memory of 3708 2672 msedge.exe 86 PID 2672 wrote to memory of 3708 2672 msedge.exe 86 PID 2672 wrote to memory of 3708 2672 msedge.exe 86 PID 2672 wrote to memory of 3708 2672 msedge.exe 86 PID 2672 wrote to memory of 3708 2672 msedge.exe 86 PID 2672 wrote to memory of 3708 2672 msedge.exe 86 PID 2672 wrote to memory of 3708 2672 msedge.exe 86 PID 2672 wrote to memory of 3708 2672 msedge.exe 86 PID 2672 wrote to memory of 3708 2672 msedge.exe 86 PID 2672 wrote to memory of 3708 2672 msedge.exe 86 PID 2672 wrote to memory of 3708 2672 msedge.exe 86 PID 2672 wrote to memory of 3708 2672 msedge.exe 86 PID 2672 wrote to memory of 3708 2672 msedge.exe 86 PID 2672 wrote to memory of 3708 2672 msedge.exe 86 PID 2672 wrote to memory of 3708 2672 msedge.exe 86 PID 2672 wrote to memory of 3708 2672 msedge.exe 86 PID 2672 wrote to memory of 3708 2672 msedge.exe 86 PID 2672 wrote to memory of 3708 2672 msedge.exe 86 PID 2672 wrote to memory of 3804 2672 msedge.exe 87 PID 2672 wrote to memory of 3804 2672 msedge.exe 87 PID 2672 wrote to memory of 1704 2672 msedge.exe 88 PID 2672 wrote to memory of 1704 2672 msedge.exe 88 PID 2672 wrote to memory of 1704 2672 msedge.exe 88 PID 2672 wrote to memory of 1704 2672 msedge.exe 88 PID 2672 wrote to memory of 1704 2672 msedge.exe 88 PID 2672 wrote to memory of 1704 2672 msedge.exe 88 PID 2672 wrote to memory of 1704 2672 msedge.exe 88 PID 2672 wrote to memory of 1704 2672 msedge.exe 88 PID 2672 wrote to memory of 1704 2672 msedge.exe 88 PID 2672 wrote to memory of 1704 2672 msedge.exe 88 PID 2672 wrote to memory of 1704 2672 msedge.exe 88 PID 2672 wrote to memory of 1704 2672 msedge.exe 88 PID 2672 wrote to memory of 1704 2672 msedge.exe 88 PID 2672 wrote to memory of 1704 2672 msedge.exe 88 PID 2672 wrote to memory of 1704 2672 msedge.exe 88 PID 2672 wrote to memory of 1704 2672 msedge.exe 88 PID 2672 wrote to memory of 1704 2672 msedge.exe 88 PID 2672 wrote to memory of 1704 2672 msedge.exe 88 PID 2672 wrote to memory of 1704 2672 msedge.exe 88 PID 2672 wrote to memory of 1704 2672 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\0085396aaf870deaa79d840ab82815c0_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff819d346f8,0x7ff819d34708,0x7ff819d347182⤵PID:4644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2240,11929536451446852459,16957105095684730356,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2248 /prefetch:22⤵PID:3708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2240,11929536451446852459,16957105095684730356,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2312 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2240,11929536451446852459,16957105095684730356,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2672 /prefetch:82⤵PID:1704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2240,11929536451446852459,16957105095684730356,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3208 /prefetch:12⤵PID:2924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2240,11929536451446852459,16957105095684730356,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:2464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2240,11929536451446852459,16957105095684730356,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6064 /prefetch:12⤵PID:4164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2240,11929536451446852459,16957105095684730356,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2020 /prefetch:12⤵PID:5484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2240,11929536451446852459,16957105095684730356,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5216 /prefetch:82⤵PID:5840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2240,11929536451446852459,16957105095684730356,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5216 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2240,11929536451446852459,16957105095684730356,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5712 /prefetch:12⤵PID:5944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2240,11929536451446852459,16957105095684730356,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5780 /prefetch:12⤵PID:5952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2240,11929536451446852459,16957105095684730356,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5728 /prefetch:12⤵PID:5276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2240,11929536451446852459,16957105095684730356,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5512 /prefetch:12⤵PID:5292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2240,11929536451446852459,16957105095684730356,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5668 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5804
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4664
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2060
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5120a75f233314ba1fe34e9d6c09f30b9
SHA1a9f92f2d3f111eaadd9bcf8fceb3c9553753539c
SHA256e04101215c3534dbc77c0b5df2e1d1ff74c277d2946f391f939c9a7948a22dd0
SHA5123c4eb93e425b50e8bcc1712f4cc2be11888a0273c3a619fc6bf72ccab876a427158f661bfc80d0c1e47ef4116febf76a3aaa31a60ec662eae0e51c7f1d3d89b3
-
Filesize
152B
MD5bc2edd0741d97ae237e9f00bf3244144
SHA17c1e5d324f5c7137a3c4ec85146659f026c11782
SHA256dbce3287c7ae69ccbd1d780c39f3ffa3c98bd4609a939fff8ee9c99f14265041
SHA51200f505a0b4ea0df626175bf9d39a205f18f9754b62e4dba6fbb5b4a716b3539e7809723e1596bcfe1ba3041e22342e3a9cbaad88e84ce9c8c6531331bbc25093
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\947a9321-2750-40da-a797-58d8f8667a50.tmp
Filesize6KB
MD5be4617cb5e1ed379182a78cab57bdbf2
SHA19ed7931ae5f58f06d70d477c59c86117dc8442d6
SHA256fccddce50dde2e986308570a3eaea60ede16740a36bc0b090c0d90db785120a7
SHA5120483960430b1949d91e48c41006deb2ed730407c98ba1765a68e5ee98e51dee8562e51442f6afea4710c8fc04401cd5773d5a59b4a55e484954d05e7d001f849
-
Filesize
2KB
MD5781117f0d3f3ee930f69a00a106e8ff0
SHA1ad06c3eef5a20c22812be5710c26200dc0029483
SHA256f2d02b1c4976f58f17246af2f19b6de787c05570ce343685f74c5c912e1e47b8
SHA512c37edd8e11b9180f0d054c37e0926438da9e814f030a9d862a8456962f2bb4abdbb4cb05aa5a14ec4fe9a41f797cc0acc2ee87a8de7c159cd19106daff9275ae
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD506c9e89aba1c052d211e8cba4ddfac7b
SHA1f51fcf87013a256866873d0333207ce194379f55
SHA256d251fae0223ad37b78a92bf2fe602bd2b284f23d281114d7730697ecb85bd3c8
SHA512443671b02ed5296f7c3d0a138db91312ce6b90a3673b6afafd7ab2f2a4daafa2a7505d491d280dbaa9f6d1a40660b3cb16eb7004d794069dad50bd5be3d3ff21
-
Filesize
7KB
MD59a2f50da3688561ccbb0a41ce819e73a
SHA147c18c5f8f3f6f659c739fdb3e908e2d8b434584
SHA256e6e7f11a8d4e6ede6dd742e20e8aa3aeaf6388fbeefdd3f06e11bc1e456318b5
SHA512311808f874e704c7bab72dd423a94dcdb2364d2d1faeab9e8897dde4d4835f7e5e4825fffdc4066f69972dbb4beb3824681ba4ea27b6abd12a42bffcf572797c
-
Filesize
1KB
MD5f2de53c625b33a88080cb263616b9c21
SHA135fb3ff1b1a5cf92e57786aa6cb1ea07dcf5b9c9
SHA2561a9572011debf16db3b38e43c97a48b966ced9b02d2598f69ce569177b4d2795
SHA512ae29886cf165b0b168e66b227edf04326552a00a539dc41feb60fcdd91a9e3b70666fbac0aa365349a5dc4af7344aa62259c3cd8c6613fc5d5441ddc78a8a1ae
-
Filesize
1KB
MD5fdddb6d45895944bc4cef0ad7416396a
SHA16d046710bae8ce9515570af27652e6d8f9249bee
SHA2560ff522ed8c4e8f170f91b6a254ba6c48ab4724f7f9676f85a33834335628594a
SHA512e0c55d445556efbeea91317ca5ddbed22b256f599ec186b2bca901ff9ff31470629b644edff07d6b52abdedcf6031bca0e665bb264e682fe5cc0e36731a963db
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
8KB
MD5f9672a65dd917d402e8707f9e063b43b
SHA120acf49de94ed525dd3753e18fb7e47f325b4245
SHA25650153cdce0a52f9f5a61520680bc5eeaa109ea166ce6dc199423e5b072708c94
SHA512e0d57c30bc44f827a5ca19414fe3cac942ac16ac9bbd55230ea8f883216e8bc9cf3ebe801479a08a44785baa848662ab56f45e735dd74282032c89104a11e6e3