Analysis
-
max time kernel
145s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
07/05/2024, 00:37
Static task
static1
Behavioral task
behavioral1
Sample
1edba606568e8f88c7bffc06043f0c27_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
1edba606568e8f88c7bffc06043f0c27_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
1edba606568e8f88c7bffc06043f0c27_JaffaCakes118.html
-
Size
75KB
-
MD5
1edba606568e8f88c7bffc06043f0c27
-
SHA1
b44cac7e24c116effc980284229104d129ae26a8
-
SHA256
f023cbe4349daf56eb18f51bf5d24b0b4f0d08cd7bb8560ca5c4c68b16d9c706
-
SHA512
f7d6a5f5e06da82120668f50d3b772cd932498e4d3d74bd1fc121cbc663fef010c4919d9ea074439dae46fc867190d716926f57a99485944506eb003b9c5ae10
-
SSDEEP
1536:L+ycJIFhEjtm1X9t/fKuOWouX9t/YlmXOIOII:t1VX95fKuOWouX9hYlmy
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2928 msedge.exe 2928 msedge.exe 4788 msedge.exe 4788 msedge.exe 1548 identity_helper.exe 1548 identity_helper.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4788 wrote to memory of 1800 4788 msedge.exe 83 PID 4788 wrote to memory of 1800 4788 msedge.exe 83 PID 4788 wrote to memory of 3564 4788 msedge.exe 84 PID 4788 wrote to memory of 3564 4788 msedge.exe 84 PID 4788 wrote to memory of 3564 4788 msedge.exe 84 PID 4788 wrote to memory of 3564 4788 msedge.exe 84 PID 4788 wrote to memory of 3564 4788 msedge.exe 84 PID 4788 wrote to memory of 3564 4788 msedge.exe 84 PID 4788 wrote to memory of 3564 4788 msedge.exe 84 PID 4788 wrote to memory of 3564 4788 msedge.exe 84 PID 4788 wrote to memory of 3564 4788 msedge.exe 84 PID 4788 wrote to memory of 3564 4788 msedge.exe 84 PID 4788 wrote to memory of 3564 4788 msedge.exe 84 PID 4788 wrote to memory of 3564 4788 msedge.exe 84 PID 4788 wrote to memory of 3564 4788 msedge.exe 84 PID 4788 wrote to memory of 3564 4788 msedge.exe 84 PID 4788 wrote to memory of 3564 4788 msedge.exe 84 PID 4788 wrote to memory of 3564 4788 msedge.exe 84 PID 4788 wrote to memory of 3564 4788 msedge.exe 84 PID 4788 wrote to memory of 3564 4788 msedge.exe 84 PID 4788 wrote to memory of 3564 4788 msedge.exe 84 PID 4788 wrote to memory of 3564 4788 msedge.exe 84 PID 4788 wrote to memory of 3564 4788 msedge.exe 84 PID 4788 wrote to memory of 3564 4788 msedge.exe 84 PID 4788 wrote to memory of 3564 4788 msedge.exe 84 PID 4788 wrote to memory of 3564 4788 msedge.exe 84 PID 4788 wrote to memory of 3564 4788 msedge.exe 84 PID 4788 wrote to memory of 3564 4788 msedge.exe 84 PID 4788 wrote to memory of 3564 4788 msedge.exe 84 PID 4788 wrote to memory of 3564 4788 msedge.exe 84 PID 4788 wrote to memory of 3564 4788 msedge.exe 84 PID 4788 wrote to memory of 3564 4788 msedge.exe 84 PID 4788 wrote to memory of 3564 4788 msedge.exe 84 PID 4788 wrote to memory of 3564 4788 msedge.exe 84 PID 4788 wrote to memory of 3564 4788 msedge.exe 84 PID 4788 wrote to memory of 3564 4788 msedge.exe 84 PID 4788 wrote to memory of 3564 4788 msedge.exe 84 PID 4788 wrote to memory of 3564 4788 msedge.exe 84 PID 4788 wrote to memory of 3564 4788 msedge.exe 84 PID 4788 wrote to memory of 3564 4788 msedge.exe 84 PID 4788 wrote to memory of 3564 4788 msedge.exe 84 PID 4788 wrote to memory of 3564 4788 msedge.exe 84 PID 4788 wrote to memory of 2928 4788 msedge.exe 85 PID 4788 wrote to memory of 2928 4788 msedge.exe 85 PID 4788 wrote to memory of 2140 4788 msedge.exe 86 PID 4788 wrote to memory of 2140 4788 msedge.exe 86 PID 4788 wrote to memory of 2140 4788 msedge.exe 86 PID 4788 wrote to memory of 2140 4788 msedge.exe 86 PID 4788 wrote to memory of 2140 4788 msedge.exe 86 PID 4788 wrote to memory of 2140 4788 msedge.exe 86 PID 4788 wrote to memory of 2140 4788 msedge.exe 86 PID 4788 wrote to memory of 2140 4788 msedge.exe 86 PID 4788 wrote to memory of 2140 4788 msedge.exe 86 PID 4788 wrote to memory of 2140 4788 msedge.exe 86 PID 4788 wrote to memory of 2140 4788 msedge.exe 86 PID 4788 wrote to memory of 2140 4788 msedge.exe 86 PID 4788 wrote to memory of 2140 4788 msedge.exe 86 PID 4788 wrote to memory of 2140 4788 msedge.exe 86 PID 4788 wrote to memory of 2140 4788 msedge.exe 86 PID 4788 wrote to memory of 2140 4788 msedge.exe 86 PID 4788 wrote to memory of 2140 4788 msedge.exe 86 PID 4788 wrote to memory of 2140 4788 msedge.exe 86 PID 4788 wrote to memory of 2140 4788 msedge.exe 86 PID 4788 wrote to memory of 2140 4788 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\1edba606568e8f88c7bffc06043f0c27_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4788 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9bd5946f8,0x7ff9bd594708,0x7ff9bd5947182⤵PID:1800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,9019000778304955393,16771273606690849126,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2096 /prefetch:22⤵PID:3564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2084,9019000778304955393,16771273606690849126,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2320 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2084,9019000778304955393,16771273606690849126,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2924 /prefetch:82⤵PID:2140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,9019000778304955393,16771273606690849126,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:1996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,9019000778304955393,16771273606690849126,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,9019000778304955393,16771273606690849126,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6052 /prefetch:82⤵PID:2144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,9019000778304955393,16771273606690849126,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6052 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,9019000778304955393,16771273606690849126,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5140 /prefetch:12⤵PID:3996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,9019000778304955393,16771273606690849126,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5164 /prefetch:12⤵PID:2128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,9019000778304955393,16771273606690849126,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5172 /prefetch:12⤵PID:4012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,9019000778304955393,16771273606690849126,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4820 /prefetch:12⤵PID:1252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,9019000778304955393,16771273606690849126,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4920 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4812
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4236
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2476
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54e96ed67859d0bafd47d805a71041f49
SHA17806c54ae29a6c8d01dcbc78e5525ddde321b16b
SHA256bd13ddab4dc4bbf01ed50341953c9638f6d71faf92bc79fbfe93687432c2292d
SHA512432201c3119779d91d13da55a26d4ff4ce4a9529e00b44ec1738029f92610d4e6e25c05694adf949c3e9c70fbbbbea723f63c29287906729f5e88a046a2edcb7
-
Filesize
152B
MD51cbd0e9a14155b7f5d4f542d09a83153
SHA127a442a921921d69743a8e4b76ff0b66016c4b76
SHA256243d05d6af19bfe3e06b1f7507342ead88f9d87b84e239ad1d144e9e454b548c
SHA51217e5217d5bf67571afb0e7ef30ac21c11ea6553f89457548d96ee4461011f641a7872a37257239fa5f25702f027afb85d5bd9faf2f2f183992b8879407e56a0d
-
Filesize
475B
MD59cfee699fa93ef6eac1e4062866862d2
SHA1ea6a49c1207dc66ddcb282492d2ef370b3fae287
SHA2560ab9f731489d0851f561d0a90b85838fb003138a634cc157f2758124f5c6a05e
SHA5129f5570a7ed1aa2bfb68d980c961be5555543751894724219d387cf03681240e9e913bb96988406db0b00013d2c8a718c4c2e9919e1c1eea9a089cf1d894a0330
-
Filesize
475B
MD5214386adfa4703e33d5b6daac94b9653
SHA1b4c382390c62fcf8e078dd658504cd2e9b764de2
SHA256b6b6e1c0d0f3bc32d301d2929416c0a158f843f10ff9805659c3cb3ada53c62e
SHA512678dc136e9115556495cf31d8757d7cc9db66d62da31df42e6ca50699bfdc2bc1be0a4600bc895a98a2d5d1aaea91ad790fc716d0b186b2e5faf6230f29df816
-
Filesize
5KB
MD5d95a5e9a2e0f9411003924c365e887d9
SHA1f87b6dd877f8e995caefc510e05b7fc81a95a645
SHA256bfcd7905aae78df03b8f20b99c5244861b780aabdf9c6131c357d127f13c51b7
SHA51291e8a04eaa4e2a47a5c068a139b988edc85eed2f2545ea36d192f4f52b40dbdb907133f5b85f19710986ff55b3deb871ef7ae5567486d231e8dd8be964198a98
-
Filesize
6KB
MD579e69b59c6de8b603c135b6614fc37e0
SHA14669164640f7a6016ab249427912d07608e95fc2
SHA25632e30d43791589970371170b01e1c00a097bc6d9b1eff1586c96206ca1f35077
SHA5123dab465ec5a37624cb641ab4a1a7ff7c920caec3fe5476fc7a9a5ef06a89cf016f90f66d150b14106017d83616309692399bba5676c382423aa448971cf81394
-
Filesize
6KB
MD5b760437a6a39f65f6e1a48a09c0e9e28
SHA199b8967d89ef82e89baeb70d6022c13e4cbf4c0e
SHA2565bd2f7674bdb9f866d1504c2c5692e7ff78b8de1b3886d411850a336c15232b6
SHA512665b1d5712c15956879066a157a1f05ca38e1d4ba01ffeffd793d5c8b976179cca7d8c046e718aafe9a9f9366d41cacee2d034e16cbd85dde02307aefba27ed8
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5de37d883ac709e4d2bd2d7e605592752
SHA13e5f778faebadc5e033606717e52e719c018ef37
SHA256873242bfc4fec87b4a53266d7dc99c882e93ea1a710c3fac8e3b861561202a92
SHA512b25a189fd1cadfc3796996e4d8588b7dd2ef15c6a1a82a575bc5a8ab88993ab52a2e8897b060240998abb8bcdfdafb0f1ac8c93e0fa526432955e6aa8ba8a687