Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
08-05-2024 15:38
Static task
static1
Behavioral task
behavioral1
Sample
258993f7d7ff8c07af42e77d9735f556_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
258993f7d7ff8c07af42e77d9735f556_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
258993f7d7ff8c07af42e77d9735f556_JaffaCakes118.html
-
Size
62KB
-
MD5
258993f7d7ff8c07af42e77d9735f556
-
SHA1
8ce9717ddd94e5569804f7f44fb72ba8ca90d1e9
-
SHA256
fb6e988324f0ed7c44a87802f85c5798f368125e5748f9a882d51d3b2b18f7d8
-
SHA512
b8f959b782717b2e0bd33b8f760eed52fed0989d30882626834f0f8a7fc771bd685edcb247b0343e4946aeeeec80b96c634eae39031e379ba11a2c288d14a116
-
SSDEEP
384:3gs/TWhzcLB63idlOZsrER+ozZ1QR1ZS1Axzk1rzF1ytH+5tH+gQ2dnhwbghDVUl:RyhzcL1+GYwxRFOlGLdTpyibqyN
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1348 msedge.exe 1348 msedge.exe 4704 msedge.exe 4704 msedge.exe 2536 identity_helper.exe 2536 identity_helper.exe 676 msedge.exe 676 msedge.exe 676 msedge.exe 676 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4704 wrote to memory of 2724 4704 msedge.exe 83 PID 4704 wrote to memory of 2724 4704 msedge.exe 83 PID 4704 wrote to memory of 4580 4704 msedge.exe 84 PID 4704 wrote to memory of 4580 4704 msedge.exe 84 PID 4704 wrote to memory of 4580 4704 msedge.exe 84 PID 4704 wrote to memory of 4580 4704 msedge.exe 84 PID 4704 wrote to memory of 4580 4704 msedge.exe 84 PID 4704 wrote to memory of 4580 4704 msedge.exe 84 PID 4704 wrote to memory of 4580 4704 msedge.exe 84 PID 4704 wrote to memory of 4580 4704 msedge.exe 84 PID 4704 wrote to memory of 4580 4704 msedge.exe 84 PID 4704 wrote to memory of 4580 4704 msedge.exe 84 PID 4704 wrote to memory of 4580 4704 msedge.exe 84 PID 4704 wrote to memory of 4580 4704 msedge.exe 84 PID 4704 wrote to memory of 4580 4704 msedge.exe 84 PID 4704 wrote to memory of 4580 4704 msedge.exe 84 PID 4704 wrote to memory of 4580 4704 msedge.exe 84 PID 4704 wrote to memory of 4580 4704 msedge.exe 84 PID 4704 wrote to memory of 4580 4704 msedge.exe 84 PID 4704 wrote to memory of 4580 4704 msedge.exe 84 PID 4704 wrote to memory of 4580 4704 msedge.exe 84 PID 4704 wrote to memory of 4580 4704 msedge.exe 84 PID 4704 wrote to memory of 4580 4704 msedge.exe 84 PID 4704 wrote to memory of 4580 4704 msedge.exe 84 PID 4704 wrote to memory of 4580 4704 msedge.exe 84 PID 4704 wrote to memory of 4580 4704 msedge.exe 84 PID 4704 wrote to memory of 4580 4704 msedge.exe 84 PID 4704 wrote to memory of 4580 4704 msedge.exe 84 PID 4704 wrote to memory of 4580 4704 msedge.exe 84 PID 4704 wrote to memory of 4580 4704 msedge.exe 84 PID 4704 wrote to memory of 4580 4704 msedge.exe 84 PID 4704 wrote to memory of 4580 4704 msedge.exe 84 PID 4704 wrote to memory of 4580 4704 msedge.exe 84 PID 4704 wrote to memory of 4580 4704 msedge.exe 84 PID 4704 wrote to memory of 4580 4704 msedge.exe 84 PID 4704 wrote to memory of 4580 4704 msedge.exe 84 PID 4704 wrote to memory of 4580 4704 msedge.exe 84 PID 4704 wrote to memory of 4580 4704 msedge.exe 84 PID 4704 wrote to memory of 4580 4704 msedge.exe 84 PID 4704 wrote to memory of 4580 4704 msedge.exe 84 PID 4704 wrote to memory of 4580 4704 msedge.exe 84 PID 4704 wrote to memory of 4580 4704 msedge.exe 84 PID 4704 wrote to memory of 1348 4704 msedge.exe 85 PID 4704 wrote to memory of 1348 4704 msedge.exe 85 PID 4704 wrote to memory of 1340 4704 msedge.exe 86 PID 4704 wrote to memory of 1340 4704 msedge.exe 86 PID 4704 wrote to memory of 1340 4704 msedge.exe 86 PID 4704 wrote to memory of 1340 4704 msedge.exe 86 PID 4704 wrote to memory of 1340 4704 msedge.exe 86 PID 4704 wrote to memory of 1340 4704 msedge.exe 86 PID 4704 wrote to memory of 1340 4704 msedge.exe 86 PID 4704 wrote to memory of 1340 4704 msedge.exe 86 PID 4704 wrote to memory of 1340 4704 msedge.exe 86 PID 4704 wrote to memory of 1340 4704 msedge.exe 86 PID 4704 wrote to memory of 1340 4704 msedge.exe 86 PID 4704 wrote to memory of 1340 4704 msedge.exe 86 PID 4704 wrote to memory of 1340 4704 msedge.exe 86 PID 4704 wrote to memory of 1340 4704 msedge.exe 86 PID 4704 wrote to memory of 1340 4704 msedge.exe 86 PID 4704 wrote to memory of 1340 4704 msedge.exe 86 PID 4704 wrote to memory of 1340 4704 msedge.exe 86 PID 4704 wrote to memory of 1340 4704 msedge.exe 86 PID 4704 wrote to memory of 1340 4704 msedge.exe 86 PID 4704 wrote to memory of 1340 4704 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\258993f7d7ff8c07af42e77d9735f556_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4704 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe8a7246f8,0x7ffe8a724708,0x7ffe8a7247182⤵PID:2724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,1617527896637134133,14116644586934397594,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:22⤵PID:4580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,1617527896637134133,14116644586934397594,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2196 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,1617527896637134133,14116644586934397594,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2688 /prefetch:82⤵PID:1340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,1617527896637134133,14116644586934397594,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:4876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,1617527896637134133,14116644586934397594,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:3276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,1617527896637134133,14116644586934397594,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5868 /prefetch:82⤵PID:1620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,1617527896637134133,14116644586934397594,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5868 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,1617527896637134133,14116644586934397594,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2964 /prefetch:12⤵PID:3812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,1617527896637134133,14116644586934397594,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5096 /prefetch:12⤵PID:1540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,1617527896637134133,14116644586934397594,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,1617527896637134133,14116644586934397594,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5820 /prefetch:12⤵PID:4920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,1617527896637134133,14116644586934397594,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4148 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:676
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1540
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3520
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ae54e9db2e89f2c54da8cc0bfcbd26bd
SHA1a88af6c673609ecbc51a1a60dfbc8577830d2b5d
SHA2565009d3c953de63cfd14a7d911156c514e179ff07d2b94382d9caac6040cb72af
SHA512e3b70e5eb7321b9deca6f6a17424a15b9fd5c4008bd3789bd01099fd13cb2f4a2f37fe4b920fb51c50517745b576c1f94df83efd1a7e75949551163985599998
-
Filesize
152B
MD5f53207a5ca2ef5c7e976cbb3cb26d870
SHA149a8cc44f53da77bb3dfb36fc7676ed54675db43
SHA25619ab4e3c9da6d9cedda7461efdba9a2085e743513ab89f1dd0fd5a8f9486ad23
SHA512be734c7e8afda19f445912aef0d78f9941add29baebd4a812bff27f10a1d78b52aeb11c551468c8644443c86e1a2a6b2e4aead3d7f81d39925e3c20406ac1499
-
Filesize
753B
MD5046066d4a22091e807cf761025e879c4
SHA10ef04c39e05f6a69527a9a416e5cdd765dd56dba
SHA25672dcc63a6db5b3513ec40fe6c7fc74c4c2095816f2fb899ed7406fd050af23e9
SHA5128a78063347ad6f2fd523a05fc19afcb76b27227e3c86df1fd1e462e28ba9b4744be1f2ea0398189009d800c9a6b29833e5bc94a17525f5ec16cfb4f580b1e0f9
-
Filesize
6KB
MD522ef2b49fbe0d35355ef664807f64246
SHA17cb4c09f37b40f9922723c6cb96ffd8cea594ad3
SHA256cfe0e7e7e64496a3511aebf9a7ebf4e5cf7f6234ee4de3a2eed358505a0766d5
SHA512d73962fe716d04d308eabaf44a0704f67536dff3f10a547efbabbe05a3a15ac3232f30626cfa9b11241ca4b5c05667f3f7e12cc58b28b6c59aea0a6e49e494a1
-
Filesize
6KB
MD5650b807c52f38b78a15244e8f7adb3c7
SHA10d9724abb2e0fae630e2a9c35d92e51315c4a0ea
SHA2565663d84183e8c61b3628930cc0ffa13dda9f7c5f043c78244a3303e4e5c82433
SHA512590ca87e23ff2cc1b99652058c602b9343d604c41cd29d6169f7b858aa75be4b4994bce9ec01d535d4eb70c1261f58b2e0998baf9173b17e6c6ae3a358c82509
-
Filesize
6KB
MD52f0f653d10352d1e7aa34624124436c6
SHA17fa63d37790aa8b68e25163127a4059138541410
SHA256a3762dac9a7232700fc5cae9b2a03fd33912ba2cc50166e7ee49c3f977473d77
SHA512e169712ae8aea8fd98c88bcfb07b8232ac0008e9690705f668bc56331a6352456f7c04636b860f84f709b1e0f666f701b4e9e721d41ce0e15c222f18a2ff7075
-
Filesize
536B
MD545e9501b50b27d2035f26bcdc1177121
SHA1ee9e63260d60dc41a8c105a64b1eb876f5c84214
SHA256b61d113a2e6acd228ea1ca31c379e0e094940f81b1269f1232a14fa5f8ab0210
SHA512b66a9474373ede9597ce7d8def4665d8867d4236a4374581113cebb07453b022af366d184a9c952ad2f0852be36c1f7e8351f9c43654826009e793831889cc89
-
Filesize
202B
MD5fcba8324220bc6512ed5376cb0e2bde2
SHA1bc3d4e64a82b9a39cadea87c43dad1f4675cd1ca
SHA2563852737660042c8a2d418a9dbb69d60a4a5408195ca9ea04a2ea5573d3b1fd6f
SHA512ad594b48b1334de5ef1ed79da46b32250761dfe145d8c7f0c666aeaa5fbad79dcb616052d3269fd2e213a709be2a330b69b30a65ebfd91e67c2037d056a34807
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD59bcba28f8e3445f8f415db1d5937647f
SHA12bd63167c94cc6597711247153d6a2cf387740fe
SHA25663497e4a479720de531048a7c56e88689dfeb142383a204734becc10718d3651
SHA51238dc287fd67eaa98b0bd1a5df37e35203dc361231facc40bc92b7cb329be06e35cf66e57534b031e984b6e9e684a3347db8ab72a31ceadf208e2c6ad25bbfa1f