Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
08-05-2024 01:24
Static task
static1
Behavioral task
behavioral1
Sample
2295c9986b388baea10d905d4dbc1741_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
2295c9986b388baea10d905d4dbc1741_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
2295c9986b388baea10d905d4dbc1741_JaffaCakes118.html
-
Size
90KB
-
MD5
2295c9986b388baea10d905d4dbc1741
-
SHA1
f18605367c9304526c288bda9c26d8a0b020ec37
-
SHA256
9d944d83b66ad2b3595da53e6f9ced0acb900bc07d5e4be065d4b8e57233f6e6
-
SHA512
df36389064578a48dbc5c8751640aedc95b6e7c47319831e677c3be66858414272756851ad267a459c90fabc57fdaf619cbae73c21d2bda96498c5518dba0484
-
SSDEEP
1536:tUbyXMWf+cuAASENzT8rdan4cllrlwDWn17yGkFVb:WbycW93ENT8rdan4St+DWnTkFVb
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2420 msedge.exe 2420 msedge.exe 116 msedge.exe 116 msedge.exe 4136 identity_helper.exe 4136 identity_helper.exe 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe 1164 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 116 wrote to memory of 220 116 msedge.exe 83 PID 116 wrote to memory of 220 116 msedge.exe 83 PID 116 wrote to memory of 1448 116 msedge.exe 84 PID 116 wrote to memory of 1448 116 msedge.exe 84 PID 116 wrote to memory of 1448 116 msedge.exe 84 PID 116 wrote to memory of 1448 116 msedge.exe 84 PID 116 wrote to memory of 1448 116 msedge.exe 84 PID 116 wrote to memory of 1448 116 msedge.exe 84 PID 116 wrote to memory of 1448 116 msedge.exe 84 PID 116 wrote to memory of 1448 116 msedge.exe 84 PID 116 wrote to memory of 1448 116 msedge.exe 84 PID 116 wrote to memory of 1448 116 msedge.exe 84 PID 116 wrote to memory of 1448 116 msedge.exe 84 PID 116 wrote to memory of 1448 116 msedge.exe 84 PID 116 wrote to memory of 1448 116 msedge.exe 84 PID 116 wrote to memory of 1448 116 msedge.exe 84 PID 116 wrote to memory of 1448 116 msedge.exe 84 PID 116 wrote to memory of 1448 116 msedge.exe 84 PID 116 wrote to memory of 1448 116 msedge.exe 84 PID 116 wrote to memory of 1448 116 msedge.exe 84 PID 116 wrote to memory of 1448 116 msedge.exe 84 PID 116 wrote to memory of 1448 116 msedge.exe 84 PID 116 wrote to memory of 1448 116 msedge.exe 84 PID 116 wrote to memory of 1448 116 msedge.exe 84 PID 116 wrote to memory of 1448 116 msedge.exe 84 PID 116 wrote to memory of 1448 116 msedge.exe 84 PID 116 wrote to memory of 1448 116 msedge.exe 84 PID 116 wrote to memory of 1448 116 msedge.exe 84 PID 116 wrote to memory of 1448 116 msedge.exe 84 PID 116 wrote to memory of 1448 116 msedge.exe 84 PID 116 wrote to memory of 1448 116 msedge.exe 84 PID 116 wrote to memory of 1448 116 msedge.exe 84 PID 116 wrote to memory of 1448 116 msedge.exe 84 PID 116 wrote to memory of 1448 116 msedge.exe 84 PID 116 wrote to memory of 1448 116 msedge.exe 84 PID 116 wrote to memory of 1448 116 msedge.exe 84 PID 116 wrote to memory of 1448 116 msedge.exe 84 PID 116 wrote to memory of 1448 116 msedge.exe 84 PID 116 wrote to memory of 1448 116 msedge.exe 84 PID 116 wrote to memory of 1448 116 msedge.exe 84 PID 116 wrote to memory of 1448 116 msedge.exe 84 PID 116 wrote to memory of 1448 116 msedge.exe 84 PID 116 wrote to memory of 2420 116 msedge.exe 85 PID 116 wrote to memory of 2420 116 msedge.exe 85 PID 116 wrote to memory of 3124 116 msedge.exe 86 PID 116 wrote to memory of 3124 116 msedge.exe 86 PID 116 wrote to memory of 3124 116 msedge.exe 86 PID 116 wrote to memory of 3124 116 msedge.exe 86 PID 116 wrote to memory of 3124 116 msedge.exe 86 PID 116 wrote to memory of 3124 116 msedge.exe 86 PID 116 wrote to memory of 3124 116 msedge.exe 86 PID 116 wrote to memory of 3124 116 msedge.exe 86 PID 116 wrote to memory of 3124 116 msedge.exe 86 PID 116 wrote to memory of 3124 116 msedge.exe 86 PID 116 wrote to memory of 3124 116 msedge.exe 86 PID 116 wrote to memory of 3124 116 msedge.exe 86 PID 116 wrote to memory of 3124 116 msedge.exe 86 PID 116 wrote to memory of 3124 116 msedge.exe 86 PID 116 wrote to memory of 3124 116 msedge.exe 86 PID 116 wrote to memory of 3124 116 msedge.exe 86 PID 116 wrote to memory of 3124 116 msedge.exe 86 PID 116 wrote to memory of 3124 116 msedge.exe 86 PID 116 wrote to memory of 3124 116 msedge.exe 86 PID 116 wrote to memory of 3124 116 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2295c9986b388baea10d905d4dbc1741_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:116 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb1a3646f8,0x7ffb1a364708,0x7ffb1a3647182⤵PID:220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2172,9895472789981174214,4946811036690515070,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2188 /prefetch:22⤵PID:1448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2172,9895472789981174214,4946811036690515070,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2236 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2172,9895472789981174214,4946811036690515070,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2876 /prefetch:82⤵PID:3124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,9895472789981174214,4946811036690515070,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:1604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,9895472789981174214,4946811036690515070,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3396 /prefetch:12⤵PID:1044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,9895472789981174214,4946811036690515070,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1364 /prefetch:12⤵PID:1712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,9895472789981174214,4946811036690515070,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5908 /prefetch:12⤵PID:4316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,9895472789981174214,4946811036690515070,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1816 /prefetch:12⤵PID:1016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2172,9895472789981174214,4946811036690515070,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5412 /prefetch:82⤵PID:4088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2172,9895472789981174214,4946811036690515070,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5412 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,9895472789981174214,4946811036690515070,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4732 /prefetch:12⤵PID:5016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,9895472789981174214,4946811036690515070,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=180 /prefetch:12⤵PID:3448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,9895472789981174214,4946811036690515070,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6048 /prefetch:12⤵PID:1292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,9895472789981174214,4946811036690515070,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5968 /prefetch:12⤵PID:1136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2172,9895472789981174214,4946811036690515070,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3108 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1164
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1516
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3296
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54f7152bc5a1a715ef481e37d1c791959
SHA1c8a1ed674c62ae4f45519f90a8cc5a81eff3a6d7
SHA256704dd4f98d8ca34ec421f23ba1891b178c23c14b3301e4655efc5c02d356c2bc
SHA5122e6b02ca35d76a655a17a5f3e9dbd8d7517c7dae24f0095c7350eb9e7bdf9e1256a7009aa8878f96c89d1ea4fe5323a41f72b8c551806dda62880d7ff231ff5c
-
Filesize
152B
MD5ea98e583ad99df195d29aa066204ab56
SHA1f89398664af0179641aa0138b337097b617cb2db
SHA256a7abb51435909fa2d75c6f2ff5c69a93d4a0ab276ed579e7d8733b2a63ffbee6
SHA512e109be3466e653e5d310b3e402e1626298b09205d223722a82344dd78504f3c33e1e24e8402a02f38cd2c9c50d96a303ce4846bea5a583423937ab018cd5782f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD52216a8d3414dc62fdf9f8c55c6a9559c
SHA153ce64a18da3ba193a2a1f88d038bc7984b078a4
SHA25656d5e4e2f38cca6c34095caad0625a70c681a4e1abd81fade27b9d8e19afad87
SHA512fdce0975b400d749107a9b284a0b0cc790e17181f4695c02bfe379179eab1358e1c687f17aeac725e915ab45e66412adb06063b94f0aff083a4d11edf0d7bc07
-
Filesize
648B
MD5c1e7223dfbc66bd6887ec839f0d1b8fa
SHA1c9b14ad4103add40409acd2e69c7aeebac3d83e7
SHA2566b42a108c52d7a45133bbc3859588229dfbf7234feb842415410195e2f4e0eb8
SHA512286341cd6145cbcea3eb810e335d9793fe96a8b08a6f66e81d19d1570611dc647bca48cb8dee1b74e0c7d30ba4aca7303798c41ccd7eaad6a76617ecbc2182ac
-
Filesize
6KB
MD51ece5409fbc49c701be9e5193a20defe
SHA1da446ac02e3a88f2a1711704af1309d13b773292
SHA2566ec098be7ad008b51b309178fb01ac61c7a0144e4e160f87be02e03675629b86
SHA5121ae508de7062ddd8c0a529fe4ecceafadcb92ee8cf62ece9f2bf4b14ab024e07a1969b4771cc16e914c4435dba3876e9ec80685428a32a7e838225d7323a8ad9
-
Filesize
6KB
MD58c3aa52ae231be0aa44e3a4188a6fd56
SHA1cc483c3f00fd1aca9bd0f9af8afbad4184fca22f
SHA256db8abf17d95137435d0d1c22c3373f7647d183b072efa2d87a6493f0b2c8a362
SHA512930da629b269522a0d05b466720bdbaedc003980ea6e6c04904168307b3bd277d4c46c9a624066757859b94ef8e7b8b7f17eb7f6f1cdbe5c568db99d892b8564
-
Filesize
6KB
MD5b95ccf887a23f4c2d3d2c9def2630475
SHA1f834c0d625909bd9d429e01cdd6f8d1e498cfc66
SHA256ce3faf9f64a7762057974a799ec1cee4e7f1e01d79a60187a45f3ce1f5467ea0
SHA5121c7edeb85be2e8e1f611b25c395cd095c1ea1c15bf1f206cf7e98ca04a41a47d23c643caf7730e216e93ba2da6a8301a9b5dcdea4413b47d8555904d06435f82
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5fcb887ff0444d907886e76d8cad44dd9
SHA1fb1d09c56d7680a92749cd230a74e04043230a84
SHA25646d487c02afb129710e7b520234637130edeec1d64c8f54169e599c44e874d76
SHA5126e0efcfef31f50aebd83ddac5622b8dd8d2491860f233e34f656b3ad07695488921f696f7bad01470f7e61cccfe80248ce99cde3c7fbb48adabd9217684a8d05
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e