Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
09-05-2024 04:35
Static task
static1
Behavioral task
behavioral1
Sample
2851ff46d6fa2ebf856fe9041ab6ddb6_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2851ff46d6fa2ebf856fe9041ab6ddb6_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
2851ff46d6fa2ebf856fe9041ab6ddb6_JaffaCakes118.html
-
Size
36KB
-
MD5
2851ff46d6fa2ebf856fe9041ab6ddb6
-
SHA1
e01039923fa9bfbb845d44a563213cdf3341bb5e
-
SHA256
d9daa1cb7ee5df7a9f4200cde535f4e30ed008f168454e0a9e18904b0a75f63f
-
SHA512
441305b22ae2d0ac9fe64d1faab2cbc199ab6aea542804c32dcb3a3898c6804f5a0590aa9ed7f2fa61e974e0ac73757761d4d00d50b139d9af90b0bcbdadd380
-
SSDEEP
768:qPCWjIiCkCVCvCvCPCPCCCCCyCyCpCpC1C1C1C1C1Cg4ox+4B0LGBW4:qPCWjIiBEwwaaFFPPwwmmmmmH4oE4B0S
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2936 msedge.exe 2936 msedge.exe 4644 msedge.exe 4644 msedge.exe 3248 identity_helper.exe 3248 identity_helper.exe 1904 msedge.exe 1904 msedge.exe 1904 msedge.exe 1904 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4644 wrote to memory of 1360 4644 msedge.exe 79 PID 4644 wrote to memory of 1360 4644 msedge.exe 79 PID 4644 wrote to memory of 432 4644 msedge.exe 83 PID 4644 wrote to memory of 432 4644 msedge.exe 83 PID 4644 wrote to memory of 432 4644 msedge.exe 83 PID 4644 wrote to memory of 432 4644 msedge.exe 83 PID 4644 wrote to memory of 432 4644 msedge.exe 83 PID 4644 wrote to memory of 432 4644 msedge.exe 83 PID 4644 wrote to memory of 432 4644 msedge.exe 83 PID 4644 wrote to memory of 432 4644 msedge.exe 83 PID 4644 wrote to memory of 432 4644 msedge.exe 83 PID 4644 wrote to memory of 432 4644 msedge.exe 83 PID 4644 wrote to memory of 432 4644 msedge.exe 83 PID 4644 wrote to memory of 432 4644 msedge.exe 83 PID 4644 wrote to memory of 432 4644 msedge.exe 83 PID 4644 wrote to memory of 432 4644 msedge.exe 83 PID 4644 wrote to memory of 432 4644 msedge.exe 83 PID 4644 wrote to memory of 432 4644 msedge.exe 83 PID 4644 wrote to memory of 432 4644 msedge.exe 83 PID 4644 wrote to memory of 432 4644 msedge.exe 83 PID 4644 wrote to memory of 432 4644 msedge.exe 83 PID 4644 wrote to memory of 432 4644 msedge.exe 83 PID 4644 wrote to memory of 432 4644 msedge.exe 83 PID 4644 wrote to memory of 432 4644 msedge.exe 83 PID 4644 wrote to memory of 432 4644 msedge.exe 83 PID 4644 wrote to memory of 432 4644 msedge.exe 83 PID 4644 wrote to memory of 432 4644 msedge.exe 83 PID 4644 wrote to memory of 432 4644 msedge.exe 83 PID 4644 wrote to memory of 432 4644 msedge.exe 83 PID 4644 wrote to memory of 432 4644 msedge.exe 83 PID 4644 wrote to memory of 432 4644 msedge.exe 83 PID 4644 wrote to memory of 432 4644 msedge.exe 83 PID 4644 wrote to memory of 432 4644 msedge.exe 83 PID 4644 wrote to memory of 432 4644 msedge.exe 83 PID 4644 wrote to memory of 432 4644 msedge.exe 83 PID 4644 wrote to memory of 432 4644 msedge.exe 83 PID 4644 wrote to memory of 432 4644 msedge.exe 83 PID 4644 wrote to memory of 432 4644 msedge.exe 83 PID 4644 wrote to memory of 432 4644 msedge.exe 83 PID 4644 wrote to memory of 432 4644 msedge.exe 83 PID 4644 wrote to memory of 432 4644 msedge.exe 83 PID 4644 wrote to memory of 432 4644 msedge.exe 83 PID 4644 wrote to memory of 2936 4644 msedge.exe 84 PID 4644 wrote to memory of 2936 4644 msedge.exe 84 PID 4644 wrote to memory of 4316 4644 msedge.exe 85 PID 4644 wrote to memory of 4316 4644 msedge.exe 85 PID 4644 wrote to memory of 4316 4644 msedge.exe 85 PID 4644 wrote to memory of 4316 4644 msedge.exe 85 PID 4644 wrote to memory of 4316 4644 msedge.exe 85 PID 4644 wrote to memory of 4316 4644 msedge.exe 85 PID 4644 wrote to memory of 4316 4644 msedge.exe 85 PID 4644 wrote to memory of 4316 4644 msedge.exe 85 PID 4644 wrote to memory of 4316 4644 msedge.exe 85 PID 4644 wrote to memory of 4316 4644 msedge.exe 85 PID 4644 wrote to memory of 4316 4644 msedge.exe 85 PID 4644 wrote to memory of 4316 4644 msedge.exe 85 PID 4644 wrote to memory of 4316 4644 msedge.exe 85 PID 4644 wrote to memory of 4316 4644 msedge.exe 85 PID 4644 wrote to memory of 4316 4644 msedge.exe 85 PID 4644 wrote to memory of 4316 4644 msedge.exe 85 PID 4644 wrote to memory of 4316 4644 msedge.exe 85 PID 4644 wrote to memory of 4316 4644 msedge.exe 85 PID 4644 wrote to memory of 4316 4644 msedge.exe 85 PID 4644 wrote to memory of 4316 4644 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2851ff46d6fa2ebf856fe9041ab6ddb6_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4644 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8ace946f8,0x7ff8ace94708,0x7ff8ace947182⤵PID:1360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2032,6303990827318207725,4662914530646405189,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1836 /prefetch:22⤵PID:432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2032,6303990827318207725,4662914530646405189,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2508 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2032,6303990827318207725,4662914530646405189,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2864 /prefetch:82⤵PID:4316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,6303990827318207725,4662914530646405189,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:1952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,6303990827318207725,4662914530646405189,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:2952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,6303990827318207725,4662914530646405189,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4940 /prefetch:12⤵PID:448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2032,6303990827318207725,4662914530646405189,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5104 /prefetch:82⤵PID:4248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2032,6303990827318207725,4662914530646405189,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5104 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,6303990827318207725,4662914530646405189,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5788 /prefetch:12⤵PID:4848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,6303990827318207725,4662914530646405189,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5796 /prefetch:12⤵PID:264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,6303990827318207725,4662914530646405189,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6096 /prefetch:12⤵PID:4228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,6303990827318207725,4662914530646405189,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6044 /prefetch:12⤵PID:4756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2032,6303990827318207725,4662914530646405189,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4032 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1904
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3188
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1912
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD5d4c8a2595eb4b14ddcd094c5a18a868d
SHA1940ab30bb15a2b1a96d678dd20be7044289378c4
SHA25697730726f95776a02d4655ac4f0ab9279affc7a2e93d4a526ff8b0ca274cbe23
SHA512776829e8a6f2cdfedaa0379a6e7a76b4637c6f3f6a239ebb7a6e5bad7804a216339a93dcd8c78821b6439b5c40661230a71acb2774934383f8e4504b7b5d9576
-
Filesize
843B
MD5dbc501a3fcf23cc872ff8ead91e51446
SHA142c491e6465633be63c90d77f1748baed77acc68
SHA256099cbaa8b9f45ef48cece081484f451074a947c93fdeda4e51907a83cc383fc0
SHA51210b8c5d9a5936f9a5ec426c8cfc89f13549ea16ba449c3882e7beb47b586d136f8dc3a360f81c07a767b82e98affd3d401b79c4edf90d23daddb6e43ebdfbafe
-
Filesize
6KB
MD585ebfb75820c6ddb832a03ada937cfa2
SHA17ad8f2324b955f3836e38cf30b0305643c723574
SHA2565b72718732989429a256e11870d24a5735b36c12c3cd03e30ff6b4b055c4fc61
SHA5123ce8684bc5f9e83beeebc2dfc09a9fcedb9bc738427a38e3700855171da10d82a2658350a07793eff0ac64a6560a8c348884ac9cac68ef4b497db3d382e1c631
-
Filesize
6KB
MD54a84f95e3601df0dd60ed58f8efedbda
SHA1740e757a140bc1740bdb0c20d79119a63f2a1bc5
SHA2560765023e6aa530edb7e858a3e3dd01560c905ead7e43fd0be29e7a8f2fc2c223
SHA512746d740878de2e3c8964611f1bb35bc8a4b3bffc5ca532f0fcd998af1acf70163688203bc0cf942121b8719b1a938d2e975121cd4e708a0b897c472be2b67dfb
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD570c4d90b5f6a419c646d5831e6ff49a2
SHA127d1afa373ca5e54ec0f15b57bc495453e07be95
SHA256681814298dcf116163035792fe6bc3c2fd1aa2e4973ecb878523a315ca11d275
SHA512a001d32494e02a0a34e9153c66818e700616636749af624fdb922def44d3667946e6cedd3cc33a7d829bf6efebad3b0e514b7fa2316848176f014487bac12014