Analysis
-
max time kernel
145s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
12/05/2024, 08:02
Static task
static1
Behavioral task
behavioral1
Sample
39157db6d1919d6957430cdd5db6fd1f_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
39157db6d1919d6957430cdd5db6fd1f_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
39157db6d1919d6957430cdd5db6fd1f_JaffaCakes118.html
-
Size
64KB
-
MD5
39157db6d1919d6957430cdd5db6fd1f
-
SHA1
384dc3d8d0cea62d206ed1e7c8c0ee86c2533f63
-
SHA256
3deb1eceefc2f512d1c0a751946be07509fc0131e37a33736fd6a2d6a0f03752
-
SHA512
952e34f229dace34296c0358a14f96355dc63ab9519f4bcdfeee6fc23cbd98e91db988a24eac15acb45ee2860fd4bd9ff350478b12ac68dd8e80990f988fd133
-
SSDEEP
1536:bYIXOgCo98eVUDDkKugpPRJSEdiT2Jtr8934z:kZxFugdSFyJtr893G
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 224 msedge.exe 224 msedge.exe 4388 msedge.exe 4388 msedge.exe 3284 identity_helper.exe 3284 identity_helper.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe 1692 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4388 wrote to memory of 3016 4388 msedge.exe 82 PID 4388 wrote to memory of 3016 4388 msedge.exe 82 PID 4388 wrote to memory of 4236 4388 msedge.exe 83 PID 4388 wrote to memory of 4236 4388 msedge.exe 83 PID 4388 wrote to memory of 4236 4388 msedge.exe 83 PID 4388 wrote to memory of 4236 4388 msedge.exe 83 PID 4388 wrote to memory of 4236 4388 msedge.exe 83 PID 4388 wrote to memory of 4236 4388 msedge.exe 83 PID 4388 wrote to memory of 4236 4388 msedge.exe 83 PID 4388 wrote to memory of 4236 4388 msedge.exe 83 PID 4388 wrote to memory of 4236 4388 msedge.exe 83 PID 4388 wrote to memory of 4236 4388 msedge.exe 83 PID 4388 wrote to memory of 4236 4388 msedge.exe 83 PID 4388 wrote to memory of 4236 4388 msedge.exe 83 PID 4388 wrote to memory of 4236 4388 msedge.exe 83 PID 4388 wrote to memory of 4236 4388 msedge.exe 83 PID 4388 wrote to memory of 4236 4388 msedge.exe 83 PID 4388 wrote to memory of 4236 4388 msedge.exe 83 PID 4388 wrote to memory of 4236 4388 msedge.exe 83 PID 4388 wrote to memory of 4236 4388 msedge.exe 83 PID 4388 wrote to memory of 4236 4388 msedge.exe 83 PID 4388 wrote to memory of 4236 4388 msedge.exe 83 PID 4388 wrote to memory of 4236 4388 msedge.exe 83 PID 4388 wrote to memory of 4236 4388 msedge.exe 83 PID 4388 wrote to memory of 4236 4388 msedge.exe 83 PID 4388 wrote to memory of 4236 4388 msedge.exe 83 PID 4388 wrote to memory of 4236 4388 msedge.exe 83 PID 4388 wrote to memory of 4236 4388 msedge.exe 83 PID 4388 wrote to memory of 4236 4388 msedge.exe 83 PID 4388 wrote to memory of 4236 4388 msedge.exe 83 PID 4388 wrote to memory of 4236 4388 msedge.exe 83 PID 4388 wrote to memory of 4236 4388 msedge.exe 83 PID 4388 wrote to memory of 4236 4388 msedge.exe 83 PID 4388 wrote to memory of 4236 4388 msedge.exe 83 PID 4388 wrote to memory of 4236 4388 msedge.exe 83 PID 4388 wrote to memory of 4236 4388 msedge.exe 83 PID 4388 wrote to memory of 4236 4388 msedge.exe 83 PID 4388 wrote to memory of 4236 4388 msedge.exe 83 PID 4388 wrote to memory of 4236 4388 msedge.exe 83 PID 4388 wrote to memory of 4236 4388 msedge.exe 83 PID 4388 wrote to memory of 4236 4388 msedge.exe 83 PID 4388 wrote to memory of 4236 4388 msedge.exe 83 PID 4388 wrote to memory of 224 4388 msedge.exe 84 PID 4388 wrote to memory of 224 4388 msedge.exe 84 PID 4388 wrote to memory of 2120 4388 msedge.exe 85 PID 4388 wrote to memory of 2120 4388 msedge.exe 85 PID 4388 wrote to memory of 2120 4388 msedge.exe 85 PID 4388 wrote to memory of 2120 4388 msedge.exe 85 PID 4388 wrote to memory of 2120 4388 msedge.exe 85 PID 4388 wrote to memory of 2120 4388 msedge.exe 85 PID 4388 wrote to memory of 2120 4388 msedge.exe 85 PID 4388 wrote to memory of 2120 4388 msedge.exe 85 PID 4388 wrote to memory of 2120 4388 msedge.exe 85 PID 4388 wrote to memory of 2120 4388 msedge.exe 85 PID 4388 wrote to memory of 2120 4388 msedge.exe 85 PID 4388 wrote to memory of 2120 4388 msedge.exe 85 PID 4388 wrote to memory of 2120 4388 msedge.exe 85 PID 4388 wrote to memory of 2120 4388 msedge.exe 85 PID 4388 wrote to memory of 2120 4388 msedge.exe 85 PID 4388 wrote to memory of 2120 4388 msedge.exe 85 PID 4388 wrote to memory of 2120 4388 msedge.exe 85 PID 4388 wrote to memory of 2120 4388 msedge.exe 85 PID 4388 wrote to memory of 2120 4388 msedge.exe 85 PID 4388 wrote to memory of 2120 4388 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\39157db6d1919d6957430cdd5db6fd1f_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4388 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe902246f8,0x7ffe90224708,0x7ffe902247182⤵PID:3016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,5106273016927104191,2609039239525311202,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2268 /prefetch:22⤵PID:4236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,5106273016927104191,2609039239525311202,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2244 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2136,5106273016927104191,2609039239525311202,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2896 /prefetch:82⤵PID:2120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,5106273016927104191,2609039239525311202,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:4104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,5106273016927104191,2609039239525311202,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:3528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,5106273016927104191,2609039239525311202,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1840 /prefetch:82⤵PID:2980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,5106273016927104191,2609039239525311202,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1840 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,5106273016927104191,2609039239525311202,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6128 /prefetch:12⤵PID:2132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,5106273016927104191,2609039239525311202,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4856 /prefetch:12⤵PID:1128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,5106273016927104191,2609039239525311202,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3488 /prefetch:12⤵PID:1532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,5106273016927104191,2609039239525311202,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3448 /prefetch:12⤵PID:208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,5106273016927104191,2609039239525311202,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4092 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1692
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4056
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4884
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
Filesize
589B
MD566c8c20a76b5244da756081d13798915
SHA190cc40e7f38f26251611586893c6830e94dd3cf1
SHA2566ac6f0cdc5599a2592aa415e831ce7853114ea20f5e4c473a8fc07583a4e22ec
SHA512a9ddd7a61b06f1d7181ee34fb8a7049fa314c25eaebe447e197dc126bbb5fea481d4a90e2f342b4435b969d4f8993c96fa2a956c7809616e3e33dc042a881f71
-
Filesize
6KB
MD5970434362fd4bad10f8dc90772b8515e
SHA1c9baf2ab911db0bbccd11ac665a6a583f4815561
SHA25645513eec1804a1faec1d00f3d0be243ebe7b3c56746f230160642664cc3f1ea9
SHA512b8dbe01aaa0e6f68f6f4fca52d5a08faee9eacb249c4a22319158b8e59f32dc4cc1b183f8d25a42f7acaad7a8a8baa7a1034bf0bf94e759515241e1ee09d08b7
-
Filesize
6KB
MD545cbb6dc8ccda6f573ad7d6aaaffb9ca
SHA14350c009a8c37c6a853514e803c400860d8685db
SHA256d46065698ddb42c8a73d6b5af29cf8f275c0de1d76b8460cfc7946666b9b314c
SHA512bb632b736a0eec7d93eb6332a848cb6c4176c4e07022bd45e1c9a9525c3816bed12165cf1b0828763492af0ba8ac031dd0dd442a6dcef7b8eeb45db8d566ba0c
-
Filesize
6KB
MD57c33fc1d5460dca5cd987c64e7ee9e0c
SHA18daf95bd5fcb901f58bbf02c03b16f36cc4fd8ca
SHA256fd73e0b5d8498e57189bfebdb3fee3420780e448109eab137385f75f5d46a959
SHA512e40b84ffe7feb357dfb454380cc40f991a8f5faedc51681573c23b7d2d5cacab8fe8277b2881076dd24a2d1635576e5c5fb95f3a8b1fdd3aae441b9ad05cbfe0
-
Filesize
370B
MD5d15a6a79db49d07c90191fdbbba0f20e
SHA1c133e5b4f0cd4a3a1c27201a5fb039b0ad993d55
SHA2563836e7f7b8d50a8cf2101bda93d5a420a3cdbe3dd1e0818c261503152d436aaf
SHA512163fb5807ac16a2bdd08765ddca67a9750669b5c37a748c9169e507a577009b5c8199be96d5feae8a9f1c69164d82dba93bae0d110a2c2fa894eeb5066b9cf13
-
Filesize
203B
MD570255a71017a92e01e35a5506bd7f782
SHA1980de286822a27e2eb59a4c1e3989c1fbc44360a
SHA256a9e0b4f6c09c1bb25b6e9cf5bd93780fd078517ee498cb7c4e4439b6f00c24fb
SHA5123409a37bd000f8c58aab24d4267aadbb6878ea53f0c82a3173c6421ab0ad3068b0f0336f7efb3c7a6c629e80e8a46bb888a9c1106e141f1b3c65f9df5fd4a4bc
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5dec54ceea3cc89b493117eccea2573b7
SHA1feb4b48f38570567aedce5beb077663d850bd054
SHA2562219b97125c6888cf078de0ff882033cd86346c3360f188a3ff29a6f4e2e75fd
SHA51207c275574ee39364562502ad4174a345da10a2a9dda21b97bcb06a85cf6b2b9d0202ef93b4d702591977a4f4a3b597a44bdf0c74b19facb33af113bcd1f74dac