Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
12-05-2024 04:03
Static task
static1
Behavioral task
behavioral1
Sample
382764dee826dfe619e3b021ad6f76b6_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
382764dee826dfe619e3b021ad6f76b6_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
382764dee826dfe619e3b021ad6f76b6_JaffaCakes118.html
-
Size
67KB
-
MD5
382764dee826dfe619e3b021ad6f76b6
-
SHA1
e5d59830bfb9e874b51da3a14101fba90f07d51d
-
SHA256
00fcab149c64d54935eb047340081cda4202f1feb736882582eb4cd4d75001ec
-
SHA512
f9a023144627a9ad8b3f9722fc37db0fbbbe58c299e17a45120192c7cda5ed7b46342e240cd07e35b6ecdce855b40ac975c41985ffc9b4660f8646f5b48d1d39
-
SSDEEP
1536:jcwQWttjIDr4ESTSpStQoRSGOfFDGC4asNGK7881SZBSMIhyfuYoPnUj1LbOVuMc:wwQWttk5STSpStQoRSGOfFDGC4asNGKQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1632 msedge.exe 1632 msedge.exe 3440 msedge.exe 3440 msedge.exe 1084 identity_helper.exe 1084 identity_helper.exe 788 msedge.exe 788 msedge.exe 788 msedge.exe 788 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3440 wrote to memory of 4188 3440 msedge.exe 84 PID 3440 wrote to memory of 4188 3440 msedge.exe 84 PID 3440 wrote to memory of 1408 3440 msedge.exe 86 PID 3440 wrote to memory of 1408 3440 msedge.exe 86 PID 3440 wrote to memory of 1408 3440 msedge.exe 86 PID 3440 wrote to memory of 1408 3440 msedge.exe 86 PID 3440 wrote to memory of 1408 3440 msedge.exe 86 PID 3440 wrote to memory of 1408 3440 msedge.exe 86 PID 3440 wrote to memory of 1408 3440 msedge.exe 86 PID 3440 wrote to memory of 1408 3440 msedge.exe 86 PID 3440 wrote to memory of 1408 3440 msedge.exe 86 PID 3440 wrote to memory of 1408 3440 msedge.exe 86 PID 3440 wrote to memory of 1408 3440 msedge.exe 86 PID 3440 wrote to memory of 1408 3440 msedge.exe 86 PID 3440 wrote to memory of 1408 3440 msedge.exe 86 PID 3440 wrote to memory of 1408 3440 msedge.exe 86 PID 3440 wrote to memory of 1408 3440 msedge.exe 86 PID 3440 wrote to memory of 1408 3440 msedge.exe 86 PID 3440 wrote to memory of 1408 3440 msedge.exe 86 PID 3440 wrote to memory of 1408 3440 msedge.exe 86 PID 3440 wrote to memory of 1408 3440 msedge.exe 86 PID 3440 wrote to memory of 1408 3440 msedge.exe 86 PID 3440 wrote to memory of 1408 3440 msedge.exe 86 PID 3440 wrote to memory of 1408 3440 msedge.exe 86 PID 3440 wrote to memory of 1408 3440 msedge.exe 86 PID 3440 wrote to memory of 1408 3440 msedge.exe 86 PID 3440 wrote to memory of 1408 3440 msedge.exe 86 PID 3440 wrote to memory of 1408 3440 msedge.exe 86 PID 3440 wrote to memory of 1408 3440 msedge.exe 86 PID 3440 wrote to memory of 1408 3440 msedge.exe 86 PID 3440 wrote to memory of 1408 3440 msedge.exe 86 PID 3440 wrote to memory of 1408 3440 msedge.exe 86 PID 3440 wrote to memory of 1408 3440 msedge.exe 86 PID 3440 wrote to memory of 1408 3440 msedge.exe 86 PID 3440 wrote to memory of 1408 3440 msedge.exe 86 PID 3440 wrote to memory of 1408 3440 msedge.exe 86 PID 3440 wrote to memory of 1408 3440 msedge.exe 86 PID 3440 wrote to memory of 1408 3440 msedge.exe 86 PID 3440 wrote to memory of 1408 3440 msedge.exe 86 PID 3440 wrote to memory of 1408 3440 msedge.exe 86 PID 3440 wrote to memory of 1408 3440 msedge.exe 86 PID 3440 wrote to memory of 1408 3440 msedge.exe 86 PID 3440 wrote to memory of 1632 3440 msedge.exe 87 PID 3440 wrote to memory of 1632 3440 msedge.exe 87 PID 3440 wrote to memory of 4460 3440 msedge.exe 88 PID 3440 wrote to memory of 4460 3440 msedge.exe 88 PID 3440 wrote to memory of 4460 3440 msedge.exe 88 PID 3440 wrote to memory of 4460 3440 msedge.exe 88 PID 3440 wrote to memory of 4460 3440 msedge.exe 88 PID 3440 wrote to memory of 4460 3440 msedge.exe 88 PID 3440 wrote to memory of 4460 3440 msedge.exe 88 PID 3440 wrote to memory of 4460 3440 msedge.exe 88 PID 3440 wrote to memory of 4460 3440 msedge.exe 88 PID 3440 wrote to memory of 4460 3440 msedge.exe 88 PID 3440 wrote to memory of 4460 3440 msedge.exe 88 PID 3440 wrote to memory of 4460 3440 msedge.exe 88 PID 3440 wrote to memory of 4460 3440 msedge.exe 88 PID 3440 wrote to memory of 4460 3440 msedge.exe 88 PID 3440 wrote to memory of 4460 3440 msedge.exe 88 PID 3440 wrote to memory of 4460 3440 msedge.exe 88 PID 3440 wrote to memory of 4460 3440 msedge.exe 88 PID 3440 wrote to memory of 4460 3440 msedge.exe 88 PID 3440 wrote to memory of 4460 3440 msedge.exe 88 PID 3440 wrote to memory of 4460 3440 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\382764dee826dfe619e3b021ad6f76b6_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3440 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff761546f8,0x7fff76154708,0x7fff761547182⤵PID:4188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,18335611424488381422,1738448105716611278,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 /prefetch:22⤵PID:1408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,18335611424488381422,1738448105716611278,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2228 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2116,18335611424488381422,1738448105716611278,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2756 /prefetch:82⤵PID:4460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,18335611424488381422,1738448105716611278,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:4880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,18335611424488381422,1738448105716611278,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:2592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,18335611424488381422,1738448105716611278,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5348 /prefetch:82⤵PID:2396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,18335611424488381422,1738448105716611278,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5348 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,18335611424488381422,1738448105716611278,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4972 /prefetch:12⤵PID:3644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,18335611424488381422,1738448105716611278,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5060 /prefetch:12⤵PID:4828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,18335611424488381422,1738448105716611278,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3592 /prefetch:12⤵PID:1724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,18335611424488381422,1738448105716611278,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4764 /prefetch:12⤵PID:3492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,18335611424488381422,1738448105716611278,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1912 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:788
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4748
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4256
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\9c5e0208-5e7c-42db-a291-a968311ddfaa.tmp
Filesize6KB
MD5434457ca930e884d77ae83e5c5c8f59e
SHA1039c46bdcdab56c3f1104fbf0486c9ac1301c060
SHA256dc3314a93513b7b9f1cbf4afba5929a226a4e2a842c9a9fd6b3a3c1125fecb69
SHA51249972a4648aa14fc214fe785b2229f1c25f4bc38ad9f3d48631f00712b0e345365257cb9ff1335d8bc5bcccd872c6741292936af393b9b1b64e2ff02dce2add8
-
Filesize
191B
MD56bb0e1d8bab7ce211a058d8817f73035
SHA1125a3b2a1187f2f70351cfc97c8b88d4094ef05e
SHA256ff92bc2ea67f586d5de3bf6d0d22651fbc091b1e6fe822a8f003df5e1d27e888
SHA512b592ad470dfe2cad76587bfef3afab3dcfa836d00a33cf7a134fec0f3de77c86e27f225e1d2a40be27a1c3ef662e83fa510052c1dde824d2d510ec25a8c18533
-
Filesize
6KB
MD596b57cafd2f6a61dcd61240e2ef280c5
SHA12e98bd06e776ee04d451e45a52f8ede45acec0f1
SHA256eed8aa66342326242eb329b137955b1fc5626fc418e9133490b768339cb45be2
SHA512c2bd6ffdcc975e6eec1d65cd0c374b3c900d6849651f92f6552a70deaddc1cf5ca37dfc0fa0ed1726353aa3dde7bf19aa2d36bd6039b9f0ccb03d82ff996af68
-
Filesize
6KB
MD50bb26dafcb8c68012c5f15babf774dfa
SHA1e03ddcaa1f9e841e5bd1fbf79cc2c8e2e59612f2
SHA2566a4b6e48eab5e90d2adb960479c80cd24976649515d55218e9266babcae4e552
SHA512714628db4bf32145679e2594bee4a57614011a52bf09647dc91d22a8ec1240a6917e435fdae7fb0ff597f01d6262a1dd3d9abad16867f7ecb0f5589959c8fc2d
-
Filesize
203B
MD5aee9e04111685c703f7666696601f84d
SHA1cb5e1cb95829c2e194a416e13f695bbfda56504b
SHA2565b541ebc602934d6c23185f3da4138c300b7933bd3a9a4728c3795a65457db36
SHA512c6620b30d0f24ae65ec3cdadc15e31f99b6255ddfdbfcf53cfb6a992a9fdcd7aa19364ba0838e184ce984adc30bdce5b398771126e3ef934e646a8a1d7edd7f6
-
Filesize
203B
MD5c754db3a880e2359099e160e0e35de74
SHA1837c04e6d4f4bae10dcc6f76764aacb8a50f8374
SHA2563edd93a715f87a51193135db41a71d4a581855e013262340db4944df795c3800
SHA512b03eaf29c7ad69823fcc66a3ba1c55e7c352cb05d32068bc312b61800327a6fd30ea397e1da3377d0e9e115de1ff2be8b00b387c7443a611a263edff860c8eed
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD59bf25a860dce18f0a691b24cefd1a59e
SHA124a8995f663b00b357fdb027a68aece5ccf32592
SHA2564be606f7b0da0debcdc06703e52d32be971bab8e0b43b3b1bd84915147ed62c4
SHA512c1692259298c351b71c28a1e78509e140ef18c1fd72b5608ea0e701fbf416bd70c9b441dcb325050798d0504373682af9f9cc05e842c53d9dc5fa4acfeca9bde