Analysis
-
max time kernel
148s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
09/05/2024, 04:15
Static task
static1
Behavioral task
behavioral1
Sample
2842d99fa0002d3dfad94f444cb0dd82_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2842d99fa0002d3dfad94f444cb0dd82_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
2842d99fa0002d3dfad94f444cb0dd82_JaffaCakes118.html
-
Size
45KB
-
MD5
2842d99fa0002d3dfad94f444cb0dd82
-
SHA1
3ba34da91eb4462977f716ea2b03d85e2c6db8cc
-
SHA256
a248ea393bc3fc5151c3fe6b976121db386ead9d2af27fc906c63b51d0af9dec
-
SHA512
746742b8681fedf026c0d0f3c07bfd3b415c76ea0dff6ea06fa152cfbd78a48f4ddef61b7ed595eb256254553221bd6f61191fbf267dd5a8b0127f4d79ff77e9
-
SSDEEP
768:EVjzpS0kA2OTkuNBA+C7Nt/9Lh4HS7FaWRoIBVrPHlbG1kcu3kcuAprJDr09ZFOI:EjR6Cyt/9LhF7FjFa1kcckcNrM8vjX6J
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4528 msedge.exe 4528 msedge.exe 4812 msedge.exe 4812 msedge.exe 1368 msedge.exe 1368 msedge.exe 1368 msedge.exe 1368 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4812 wrote to memory of 1456 4812 msedge.exe 79 PID 4812 wrote to memory of 1456 4812 msedge.exe 79 PID 4812 wrote to memory of 624 4812 msedge.exe 80 PID 4812 wrote to memory of 624 4812 msedge.exe 80 PID 4812 wrote to memory of 624 4812 msedge.exe 80 PID 4812 wrote to memory of 624 4812 msedge.exe 80 PID 4812 wrote to memory of 624 4812 msedge.exe 80 PID 4812 wrote to memory of 624 4812 msedge.exe 80 PID 4812 wrote to memory of 624 4812 msedge.exe 80 PID 4812 wrote to memory of 624 4812 msedge.exe 80 PID 4812 wrote to memory of 624 4812 msedge.exe 80 PID 4812 wrote to memory of 624 4812 msedge.exe 80 PID 4812 wrote to memory of 624 4812 msedge.exe 80 PID 4812 wrote to memory of 624 4812 msedge.exe 80 PID 4812 wrote to memory of 624 4812 msedge.exe 80 PID 4812 wrote to memory of 624 4812 msedge.exe 80 PID 4812 wrote to memory of 624 4812 msedge.exe 80 PID 4812 wrote to memory of 624 4812 msedge.exe 80 PID 4812 wrote to memory of 624 4812 msedge.exe 80 PID 4812 wrote to memory of 624 4812 msedge.exe 80 PID 4812 wrote to memory of 624 4812 msedge.exe 80 PID 4812 wrote to memory of 624 4812 msedge.exe 80 PID 4812 wrote to memory of 624 4812 msedge.exe 80 PID 4812 wrote to memory of 624 4812 msedge.exe 80 PID 4812 wrote to memory of 624 4812 msedge.exe 80 PID 4812 wrote to memory of 624 4812 msedge.exe 80 PID 4812 wrote to memory of 624 4812 msedge.exe 80 PID 4812 wrote to memory of 624 4812 msedge.exe 80 PID 4812 wrote to memory of 624 4812 msedge.exe 80 PID 4812 wrote to memory of 624 4812 msedge.exe 80 PID 4812 wrote to memory of 624 4812 msedge.exe 80 PID 4812 wrote to memory of 624 4812 msedge.exe 80 PID 4812 wrote to memory of 624 4812 msedge.exe 80 PID 4812 wrote to memory of 624 4812 msedge.exe 80 PID 4812 wrote to memory of 624 4812 msedge.exe 80 PID 4812 wrote to memory of 624 4812 msedge.exe 80 PID 4812 wrote to memory of 624 4812 msedge.exe 80 PID 4812 wrote to memory of 624 4812 msedge.exe 80 PID 4812 wrote to memory of 624 4812 msedge.exe 80 PID 4812 wrote to memory of 624 4812 msedge.exe 80 PID 4812 wrote to memory of 624 4812 msedge.exe 80 PID 4812 wrote to memory of 624 4812 msedge.exe 80 PID 4812 wrote to memory of 4528 4812 msedge.exe 81 PID 4812 wrote to memory of 4528 4812 msedge.exe 81 PID 4812 wrote to memory of 1556 4812 msedge.exe 82 PID 4812 wrote to memory of 1556 4812 msedge.exe 82 PID 4812 wrote to memory of 1556 4812 msedge.exe 82 PID 4812 wrote to memory of 1556 4812 msedge.exe 82 PID 4812 wrote to memory of 1556 4812 msedge.exe 82 PID 4812 wrote to memory of 1556 4812 msedge.exe 82 PID 4812 wrote to memory of 1556 4812 msedge.exe 82 PID 4812 wrote to memory of 1556 4812 msedge.exe 82 PID 4812 wrote to memory of 1556 4812 msedge.exe 82 PID 4812 wrote to memory of 1556 4812 msedge.exe 82 PID 4812 wrote to memory of 1556 4812 msedge.exe 82 PID 4812 wrote to memory of 1556 4812 msedge.exe 82 PID 4812 wrote to memory of 1556 4812 msedge.exe 82 PID 4812 wrote to memory of 1556 4812 msedge.exe 82 PID 4812 wrote to memory of 1556 4812 msedge.exe 82 PID 4812 wrote to memory of 1556 4812 msedge.exe 82 PID 4812 wrote to memory of 1556 4812 msedge.exe 82 PID 4812 wrote to memory of 1556 4812 msedge.exe 82 PID 4812 wrote to memory of 1556 4812 msedge.exe 82 PID 4812 wrote to memory of 1556 4812 msedge.exe 82
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2842d99fa0002d3dfad94f444cb0dd82_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4812 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa087846f8,0x7ffa08784708,0x7ffa087847182⤵PID:1456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,2185390580259533094,16299648149406047528,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2172 /prefetch:22⤵PID:624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2160,2185390580259533094,16299648149406047528,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2160,2185390580259533094,16299648149406047528,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2800 /prefetch:82⤵PID:1556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,2185390580259533094,16299648149406047528,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:1844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,2185390580259533094,16299648149406047528,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:1724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,2185390580259533094,16299648149406047528,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5004 /prefetch:12⤵PID:956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,2185390580259533094,16299648149406047528,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1716 /prefetch:12⤵PID:4400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,2185390580259533094,16299648149406047528,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5172 /prefetch:12⤵PID:2296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,2185390580259533094,16299648149406047528,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5856 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1368
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2732
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5000
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556641592f6e69f5f5fb06f2319384490
SHA16a86be42e2c6d26b7830ad9f4e2627995fd91069
SHA25602d4984e590e947265474d592e64edde840fdca7eb881eebde3e220a1d883455
SHA512c75e689b2bbbe07ebf72baf75c56f19c39f45d5593cf47535eb722f95002b3ee418027047c0ee8d63800f499038db5e2c24aff9705d830c7b6eaa290d9adc868
-
Filesize
152B
MD5612a6c4247ef652299b376221c984213
SHA1d306f3b16bde39708aa862aee372345feb559750
SHA2569d8e24c91cff338e56b518a533cb2e49a2803356bbf6e04892fb168a7ce2844a
SHA51234a14d63abb1e3fe0f9927a94393043d458fe0624843e108d290266f554018e6379cba924cb5388735abdd6c5f1e2e318478a673f3f9b762815a758866d10973
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\051881e6-04ab-457b-a974-d39af632aa32.tmp
Filesize7KB
MD514f98fbc936e0a613adf72d7fd91b88d
SHA1ef10de6511fdde73eb044382afabcd3f17994dae
SHA25619b9d76c8bb97d47423372cde44356c3154f89d220da6115c96daf4c08af0aeb
SHA512748141ada33ac75bd7e7c948d4a06c73842bb3c45bf375868bf3634b6f38ea8fef72c021d89a6dcf43d343f137776ca3bb25da65d6392a9a1ee50e2c73b6048c
-
Filesize
20KB
MD5b6c8122025aff891940d1d5e1ab95fce
SHA1a0c7ca41d0922d085c358f5dde81ae3e85a8c9c4
SHA2569954c64c68000f615e5066bc255eced1195d1f8b7dbc715f9062ddf9f147e87e
SHA512e62a37b55b6b8d95c24fb624105ff6ff72f118e31760d0da1e8df8e8acf627ec6327c26dfa26df8535585877604c7948d2f621ccabc39beec49787e22c302c10
-
Filesize
44KB
MD588477d32f888c2b8a3f3d98deb460b3d
SHA11fae9ac6c1082fc0426aebe4e683eea9b4ba898c
SHA2561b1f0b5ef5f21d5742d84f331def7116323365c3dd4aec096a55763e310879d8
SHA512e0c0588ff27a989cac47797e5a8044983d0b3c75c44416c5f977e0e93e9d3a9321b9283ea077e6dcad0619ac960ee45fe8570f1d5cc7d5d4117fee4f2f0c96b3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD5ffd4e54bd15eef5ceb1c24e1ce78a349
SHA1172d65b161a7a000a3506023068012f920894acf
SHA256a4f8e6f5404d27743bc932bf59db26a38197eb70eac7514fa157d2a9700a2f16
SHA5124d9f8d70c3511e81d9028d635f8468b7eebed03b5441cdc120eef8b1375daf78dbeabc17c8b4df36919a646240c047a7a3abb368a7887649eb19ab68a4c0644b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD5cc8f98d6e33a651c0c2b38b082ba1f95
SHA1fbd73850184bfaa1fea91ee554d0069cd961a83b
SHA256ba1b19588a72958ecbadd6c19345cd288f019d816293cbb43b042f8c14c6fca0
SHA512604f42a0c01b271f633ed44e69536ff1d6f93846e4dfc5c8f71ffaa6a6029efe554fbecc357e1d97580657664a584a847fa5887c72647a3c9c607d0e5d5a2092
-
Filesize
1KB
MD58ea1a75f810dd5017c45b6ee71b0c60d
SHA1e2037e423d8570b8634b50dc90301a258eb8af01
SHA256cc124c7ad1a32534a25cc525659a9cdf68d58cdaf490fc25cdb114c88445130e
SHA5127be89fd27298c9b81ab96cecbab4f50452df01ba6aff505347a6f45430df3e9b61040bd1cc3b79e3074678dbd11081ebddfbefed5d8526c9879d3125ce722cbb
-
Filesize
1KB
MD5bc3847d1bcca0f22cb9042e638f567a3
SHA118e17fe2f5c834882b6f935bebfaab3a9ad13bf2
SHA256fafaad0bb90b63d29bdfe900385fbcc5c4b3da7d3e8a2472c19aa2c5c0215ec8
SHA5121b1e8e05acf2f8a274824e79beebdcb663d0b30c79381de9df772c957f4d324370694c541270d592643ce8c4913dc6f84ba94c463beb0a028cada66938c3ed8b
-
Filesize
6KB
MD5dc3808160e24e5f0d4ff2b927e8ace40
SHA1ccd46567b70c66569229f2d1f2b129d9b1f4c8c2
SHA256c0c71cfeee7e9966c6224a59d64553a5291437745bd03edfc1d09a05976f84a7
SHA512010e1df2689446b3854f66c026f0be5654b72b2bfa7aebfeb56b4dc6928f4d1d17c8babddf355de1a7057e9af38eed2b1771b9abe8d99d3be7aab016dd376881
-
Filesize
6KB
MD54357b1afee21ca9c0e3296c8ad42c4cf
SHA11017778404c2d03ba914e587db8aa99f95a16658
SHA256eda6b04c027ab83b363d65675b246b1827168a7890d3655076495ba0d79bf0bf
SHA5125579d48a9ef7b4fad48b5e90ec7aa873eb5e78c91286f36f521709f0a9e27e6f55afd39a659b2cd76342a4e8e1b372a536d6aae29382be28377f6762f5818d99
-
Filesize
11KB
MD575af87f1c9d00f980f4f9a0bbd51005b
SHA107644bd63295e118957bd78c85583215a2e3c6a6
SHA25628596e94f17e9521838028c4588ec5a60136a58a039781c48ee7ef7aa37a0dc9
SHA5126d8ab21571c2a00607c4d57620a2c955f3d0e2de8f26692c458dbaea3a2b822a6a0daacebfc4f61432a6bc9904b67ee85ae6ddc82c009ad1e6c6d6cc2f43bc0a