Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
13/05/2024, 16:57
Static task
static1
Behavioral task
behavioral1
Sample
407c50ebccff699885cc1ac95da1ae32_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
407c50ebccff699885cc1ac95da1ae32_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
407c50ebccff699885cc1ac95da1ae32_JaffaCakes118.html
-
Size
34KB
-
MD5
407c50ebccff699885cc1ac95da1ae32
-
SHA1
c0cef9359254201d102c0d4ec5e24faa6119dfbc
-
SHA256
dc4f1eff7a1bc4a9a2c1813072119bd10cb96c205793ea484299d920b9f1ab32
-
SHA512
cb9e7126615f55f09adac3d64420163651a3fa81e202014b3cdbded44f094e719bc851f9812589f2a4b00b34ee877890c49464bc230ba4bef61f709b22ef5ba5
-
SSDEEP
768:hdgpyg/Fjgvnsg8Q8g02tfYC7K4TZdeTHbUNTCGqoCtNSxRUMBfTeMRwbE3R8tb8:Lgpyg/Fjgvnsgd8g0qz70PSlBvRwY3Rh
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1604 msedge.exe 1604 msedge.exe 3776 msedge.exe 3776 msedge.exe 2496 identity_helper.exe 2496 identity_helper.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe 3776 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3776 wrote to memory of 3780 3776 msedge.exe 82 PID 3776 wrote to memory of 3780 3776 msedge.exe 82 PID 3776 wrote to memory of 4844 3776 msedge.exe 83 PID 3776 wrote to memory of 4844 3776 msedge.exe 83 PID 3776 wrote to memory of 4844 3776 msedge.exe 83 PID 3776 wrote to memory of 4844 3776 msedge.exe 83 PID 3776 wrote to memory of 4844 3776 msedge.exe 83 PID 3776 wrote to memory of 4844 3776 msedge.exe 83 PID 3776 wrote to memory of 4844 3776 msedge.exe 83 PID 3776 wrote to memory of 4844 3776 msedge.exe 83 PID 3776 wrote to memory of 4844 3776 msedge.exe 83 PID 3776 wrote to memory of 4844 3776 msedge.exe 83 PID 3776 wrote to memory of 4844 3776 msedge.exe 83 PID 3776 wrote to memory of 4844 3776 msedge.exe 83 PID 3776 wrote to memory of 4844 3776 msedge.exe 83 PID 3776 wrote to memory of 4844 3776 msedge.exe 83 PID 3776 wrote to memory of 4844 3776 msedge.exe 83 PID 3776 wrote to memory of 4844 3776 msedge.exe 83 PID 3776 wrote to memory of 4844 3776 msedge.exe 83 PID 3776 wrote to memory of 4844 3776 msedge.exe 83 PID 3776 wrote to memory of 4844 3776 msedge.exe 83 PID 3776 wrote to memory of 4844 3776 msedge.exe 83 PID 3776 wrote to memory of 4844 3776 msedge.exe 83 PID 3776 wrote to memory of 4844 3776 msedge.exe 83 PID 3776 wrote to memory of 4844 3776 msedge.exe 83 PID 3776 wrote to memory of 4844 3776 msedge.exe 83 PID 3776 wrote to memory of 4844 3776 msedge.exe 83 PID 3776 wrote to memory of 4844 3776 msedge.exe 83 PID 3776 wrote to memory of 4844 3776 msedge.exe 83 PID 3776 wrote to memory of 4844 3776 msedge.exe 83 PID 3776 wrote to memory of 4844 3776 msedge.exe 83 PID 3776 wrote to memory of 4844 3776 msedge.exe 83 PID 3776 wrote to memory of 4844 3776 msedge.exe 83 PID 3776 wrote to memory of 4844 3776 msedge.exe 83 PID 3776 wrote to memory of 4844 3776 msedge.exe 83 PID 3776 wrote to memory of 4844 3776 msedge.exe 83 PID 3776 wrote to memory of 4844 3776 msedge.exe 83 PID 3776 wrote to memory of 4844 3776 msedge.exe 83 PID 3776 wrote to memory of 4844 3776 msedge.exe 83 PID 3776 wrote to memory of 4844 3776 msedge.exe 83 PID 3776 wrote to memory of 4844 3776 msedge.exe 83 PID 3776 wrote to memory of 4844 3776 msedge.exe 83 PID 3776 wrote to memory of 1604 3776 msedge.exe 84 PID 3776 wrote to memory of 1604 3776 msedge.exe 84 PID 3776 wrote to memory of 4792 3776 msedge.exe 85 PID 3776 wrote to memory of 4792 3776 msedge.exe 85 PID 3776 wrote to memory of 4792 3776 msedge.exe 85 PID 3776 wrote to memory of 4792 3776 msedge.exe 85 PID 3776 wrote to memory of 4792 3776 msedge.exe 85 PID 3776 wrote to memory of 4792 3776 msedge.exe 85 PID 3776 wrote to memory of 4792 3776 msedge.exe 85 PID 3776 wrote to memory of 4792 3776 msedge.exe 85 PID 3776 wrote to memory of 4792 3776 msedge.exe 85 PID 3776 wrote to memory of 4792 3776 msedge.exe 85 PID 3776 wrote to memory of 4792 3776 msedge.exe 85 PID 3776 wrote to memory of 4792 3776 msedge.exe 85 PID 3776 wrote to memory of 4792 3776 msedge.exe 85 PID 3776 wrote to memory of 4792 3776 msedge.exe 85 PID 3776 wrote to memory of 4792 3776 msedge.exe 85 PID 3776 wrote to memory of 4792 3776 msedge.exe 85 PID 3776 wrote to memory of 4792 3776 msedge.exe 85 PID 3776 wrote to memory of 4792 3776 msedge.exe 85 PID 3776 wrote to memory of 4792 3776 msedge.exe 85 PID 3776 wrote to memory of 4792 3776 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\407c50ebccff699885cc1ac95da1ae32_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3776 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffed44d46f8,0x7ffed44d4708,0x7ffed44d47182⤵PID:3780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2032,7758974347233239477,1666446182355151596,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2060 /prefetch:22⤵PID:4844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2032,7758974347233239477,1666446182355151596,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2296 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2032,7758974347233239477,1666446182355151596,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2836 /prefetch:82⤵PID:4792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,7758974347233239477,1666446182355151596,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:5100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,7758974347233239477,1666446182355151596,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,7758974347233239477,1666446182355151596,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5104 /prefetch:12⤵PID:1888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2032,7758974347233239477,1666446182355151596,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5460 /prefetch:82⤵PID:4436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2032,7758974347233239477,1666446182355151596,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5460 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,7758974347233239477,1666446182355151596,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5336 /prefetch:12⤵PID:3632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,7758974347233239477,1666446182355151596,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5112 /prefetch:12⤵PID:3852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,7758974347233239477,1666446182355151596,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4736 /prefetch:12⤵PID:4872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,7758974347233239477,1666446182355151596,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3844 /prefetch:12⤵PID:3668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2032,7758974347233239477,1666446182355151596,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5944 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3940
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1076
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1448
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
267B
MD5a4ce5bd91d1d6b50f207890214265f81
SHA1a2991c8503367317ec259a73a04cb12fff28e2b1
SHA256437d0430845df4dd1578905050ab8e64dec25c29e902cc86cd2b6cc5b0e6f9bc
SHA512ced58cd1c4f7a4dcd40bc9fd38a59f5319d006ca29531e6615050a10401f9be92f14e9030033401e2e7e3e3f180d193f8b454617e1fc357791bc89d4cd4eaf95
-
Filesize
6KB
MD5358719c9c8b3840287d768b1a4387515
SHA195e1b8f56c26811d8df6f09fb7f82d1b020e2a9c
SHA25693198406b702bd08c3fb3428f290b36dfcd5ec7ca4303b6486b4f89ddc00bc98
SHA5127b3256e7e8195b3ef31a98e506df74c5ab8e14a12d88ee1c23ffdab6a9cf70fd202d517a8191fdf1e1e8cb61b09b4159e5004d19dcdd3a8d8e9bbf35ef5b4a61
-
Filesize
6KB
MD515b07916ec9024817308e55bcce24b0b
SHA1177321daf4890a67533b370a8e804eaa1d402322
SHA2561112b256a18a99a7cba81c4f609735947e687b13d298312766099692e4dbfd02
SHA512cbdf3bd285bd0f4d3f9ac926680b66b07b6aaa2c271306e9b05ecd6c225cd913c4302f64f83dd859eb19dfc0cbe9b067442fa914cf7191777c6ffffb461306cb
-
Filesize
6KB
MD5a647f1d791b9de46438e1f90ef9a7a5d
SHA186d666b80849e54b46ca2980ef0e9de63cdb2279
SHA256b26e7e037c4cffee3477336ab915054cd7a1209a87ea8e8bc3c49782879ac125
SHA512ee500d9ccd07528901bff559284eb20293c11c1a71da9ff8dc0b39c0682fa1ee011ab362763697fa18bc16d57f9fa365f6c3e3214f697e63ad2c9579d9fab52d
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD578999f115a4d37afcf2e2ab6e15e4994
SHA1c10ed6f8dc3beb97e6cd0227b36f2872f1d2bd42
SHA2568200d57e395323ce129cab4cff99dae0e6cce4b49f0193276cc0bc9662bfb2ba
SHA512c80e94bec33b4d82681f03e529b8368640c35a3f7d1a1bc2f922f4bb6f12b8369b46340cfbe80170ccbc020c133851b1575de02fffe811bd34b6550118c11665