Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
14-05-2024 07:14
Static task
static1
Behavioral task
behavioral1
Sample
40a44b841ea1ffa3fb1edc88b40b2e87_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
40a44b841ea1ffa3fb1edc88b40b2e87_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
40a44b841ea1ffa3fb1edc88b40b2e87_JaffaCakes118.html
-
Size
202KB
-
MD5
40a44b841ea1ffa3fb1edc88b40b2e87
-
SHA1
2aa24cc4bd782da1968b6f7d41432faa2cb88319
-
SHA256
4492cf430fc447bccba7e6f9345b3794a9c57d6d73d1b33fa5c575e5f25eacc9
-
SHA512
c0d7ce03270ea0727e832e944fa217a14dbcfe430c18724508ab81ebc61d4ef2f24b51c6161ec6be099052c53ed729fdb17480cbaf3c9dc4eb567c44ad3e0b03
-
SSDEEP
6144:/ZtoTQ13PSUl6oYw3xDjqmkOuu6b7QdcL:xtoTQ13KNoYw3xDjqmkOuu6b7QdcL
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4936 msedge.exe 4936 msedge.exe 5052 msedge.exe 5052 msedge.exe 4160 identity_helper.exe 4160 identity_helper.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5052 wrote to memory of 3744 5052 msedge.exe 82 PID 5052 wrote to memory of 3744 5052 msedge.exe 82 PID 5052 wrote to memory of 428 5052 msedge.exe 83 PID 5052 wrote to memory of 428 5052 msedge.exe 83 PID 5052 wrote to memory of 428 5052 msedge.exe 83 PID 5052 wrote to memory of 428 5052 msedge.exe 83 PID 5052 wrote to memory of 428 5052 msedge.exe 83 PID 5052 wrote to memory of 428 5052 msedge.exe 83 PID 5052 wrote to memory of 428 5052 msedge.exe 83 PID 5052 wrote to memory of 428 5052 msedge.exe 83 PID 5052 wrote to memory of 428 5052 msedge.exe 83 PID 5052 wrote to memory of 428 5052 msedge.exe 83 PID 5052 wrote to memory of 428 5052 msedge.exe 83 PID 5052 wrote to memory of 428 5052 msedge.exe 83 PID 5052 wrote to memory of 428 5052 msedge.exe 83 PID 5052 wrote to memory of 428 5052 msedge.exe 83 PID 5052 wrote to memory of 428 5052 msedge.exe 83 PID 5052 wrote to memory of 428 5052 msedge.exe 83 PID 5052 wrote to memory of 428 5052 msedge.exe 83 PID 5052 wrote to memory of 428 5052 msedge.exe 83 PID 5052 wrote to memory of 428 5052 msedge.exe 83 PID 5052 wrote to memory of 428 5052 msedge.exe 83 PID 5052 wrote to memory of 428 5052 msedge.exe 83 PID 5052 wrote to memory of 428 5052 msedge.exe 83 PID 5052 wrote to memory of 428 5052 msedge.exe 83 PID 5052 wrote to memory of 428 5052 msedge.exe 83 PID 5052 wrote to memory of 428 5052 msedge.exe 83 PID 5052 wrote to memory of 428 5052 msedge.exe 83 PID 5052 wrote to memory of 428 5052 msedge.exe 83 PID 5052 wrote to memory of 428 5052 msedge.exe 83 PID 5052 wrote to memory of 428 5052 msedge.exe 83 PID 5052 wrote to memory of 428 5052 msedge.exe 83 PID 5052 wrote to memory of 428 5052 msedge.exe 83 PID 5052 wrote to memory of 428 5052 msedge.exe 83 PID 5052 wrote to memory of 428 5052 msedge.exe 83 PID 5052 wrote to memory of 428 5052 msedge.exe 83 PID 5052 wrote to memory of 428 5052 msedge.exe 83 PID 5052 wrote to memory of 428 5052 msedge.exe 83 PID 5052 wrote to memory of 428 5052 msedge.exe 83 PID 5052 wrote to memory of 428 5052 msedge.exe 83 PID 5052 wrote to memory of 428 5052 msedge.exe 83 PID 5052 wrote to memory of 428 5052 msedge.exe 83 PID 5052 wrote to memory of 4936 5052 msedge.exe 84 PID 5052 wrote to memory of 4936 5052 msedge.exe 84 PID 5052 wrote to memory of 5084 5052 msedge.exe 85 PID 5052 wrote to memory of 5084 5052 msedge.exe 85 PID 5052 wrote to memory of 5084 5052 msedge.exe 85 PID 5052 wrote to memory of 5084 5052 msedge.exe 85 PID 5052 wrote to memory of 5084 5052 msedge.exe 85 PID 5052 wrote to memory of 5084 5052 msedge.exe 85 PID 5052 wrote to memory of 5084 5052 msedge.exe 85 PID 5052 wrote to memory of 5084 5052 msedge.exe 85 PID 5052 wrote to memory of 5084 5052 msedge.exe 85 PID 5052 wrote to memory of 5084 5052 msedge.exe 85 PID 5052 wrote to memory of 5084 5052 msedge.exe 85 PID 5052 wrote to memory of 5084 5052 msedge.exe 85 PID 5052 wrote to memory of 5084 5052 msedge.exe 85 PID 5052 wrote to memory of 5084 5052 msedge.exe 85 PID 5052 wrote to memory of 5084 5052 msedge.exe 85 PID 5052 wrote to memory of 5084 5052 msedge.exe 85 PID 5052 wrote to memory of 5084 5052 msedge.exe 85 PID 5052 wrote to memory of 5084 5052 msedge.exe 85 PID 5052 wrote to memory of 5084 5052 msedge.exe 85 PID 5052 wrote to memory of 5084 5052 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\40a44b841ea1ffa3fb1edc88b40b2e87_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5052 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff61f746f8,0x7fff61f74708,0x7fff61f747182⤵PID:3744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,12367341071672049763,6481792903767749545,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2176 /prefetch:22⤵PID:428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2164,12367341071672049763,6481792903767749545,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2228 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2164,12367341071672049763,6481792903767749545,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2776 /prefetch:82⤵PID:5084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,12367341071672049763,6481792903767749545,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:3792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,12367341071672049763,6481792903767749545,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3460 /prefetch:12⤵PID:2136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,12367341071672049763,6481792903767749545,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:3580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2164,12367341071672049763,6481792903767749545,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5984 /prefetch:82⤵PID:844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2164,12367341071672049763,6481792903767749545,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5984 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,12367341071672049763,6481792903767749545,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2908 /prefetch:12⤵PID:1612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,12367341071672049763,6481792903767749545,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5172 /prefetch:12⤵PID:940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,12367341071672049763,6481792903767749545,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5828 /prefetch:12⤵PID:3344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,12367341071672049763,6481792903767749545,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4024 /prefetch:12⤵PID:3436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,12367341071672049763,6481792903767749545,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4864 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:116
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4832
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3628
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51ac52e2503cc26baee4322f02f5b8d9c
SHA138e0cee911f5f2a24888a64780ffdf6fa72207c8
SHA256f65058c6f1a745b37a64d4c97a8e8ee940210273130cec97a67f568088b5d4d4
SHA5127670d606bc5197ecb7db3ddaecd6f74a80e6decae92b94e0e8145a7f463fa099058e89f9dfa1c45b9197c36e5e21994698186a2ec970bbdb0937fe28ca46a834
-
Filesize
152B
MD5b2a1398f937474c51a48b347387ee36a
SHA1922a8567f09e68a04233e84e5919043034635949
SHA2562dc0bf08246ddd5a32288c895d676017578d792349ca437b1b36e7b2f0ade6d6
SHA5124a660c0549f7a850e07d8d36dab33121af02a7bd7e9b2f0137930b4c8cd89b6c5630e408f882684e6935dcb0d5cb5e01a854950eeda252a4881458cafcc7ef7c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\83997170-cc59-467e-83dc-64914dceed9b.tmp
Filesize327B
MD52c2c44a5dd80c6a15667bca22ff85a87
SHA1b1b06391c8876f94e86d9605e6d17c1a4d18821f
SHA256a4ed741f4a29bf1fe2411e811926e4b374ef6a10f795c862e4f8907008282900
SHA5128bfb34e7e9e6263527b1f86e5c70fe59f880565f31b6a0dd347a720258bd48563d2a6e5228a237b128da8cf6a7ffb3a06c891072e4ed6b05dd980061e5d197cc
-
Filesize
5KB
MD53bf2eb49a4e4f7d5c0e35c645da078d1
SHA1d5b086c699b4c3f1b0c0f13014c29a6ac2fd21f7
SHA256207d2704731073193d9f9284ff284a97ca2ce03f7967fe48643b3f683ba7fb02
SHA512b47e706521ade649115796d7e623742c6a64ff76422b1d98d002432a462c3c5aa5c1ca301ce4ccf8bd1dd375f4f535beb2b8ebca9b51e7b5091b03189a1a46d9
-
Filesize
6KB
MD543afb11675cfcd7ae3007be4f81adf38
SHA1d253c1bad5f3cfe0c7c846de588d27535b132c17
SHA256aaf319c33f670c5271ea0c892c155d40e9e759fe37ab0c5d2540aa6a06db1261
SHA5128469f521e0a3b699f55ae5e0cb4a6789f161928e236d1d8712c2670999d6b437470e8f5137c4cb37a863426167f2457c29b171d527fc1d4f68db62147de92d98
-
Filesize
6KB
MD585db9697e8730507bfa39313bd39c05b
SHA1489594da18094cd13d3b0fc52d08aaf0c7cddaf2
SHA256b45758356dc0ad4ce07cccfb2c050b3cdad660a4c15e25e842a62381abdafeee
SHA51209c62bf1f8187c517ea2253ecbb599e9f1d4702d26ce3120010e89cf64ccdf39682e92b49fd3fa06aa48556cc416395a6c059501c6c733f09f9f07bb25b90c86
-
Filesize
1KB
MD510df33b2a8b0ac1ae0354750db268ab7
SHA1e580215b839a499243f512bbc3103970f5021837
SHA256eb1e43761902d404b3ca3435c5e40109d07b9767f6005daaf1d4d3a39e49c227
SHA512ece35c491548b656ff8a8ee35569167f73a8935a254edfaf7395d0a32d6ccf1f02e971210da9d15c9abfea9dc14f98aaeb9ab12035da833ea22b859d8c794266
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\e0ec87f5-2eba-4b6a-80a9-ea04f67480e6.tmp
Filesize1KB
MD56b6291b2c07b512d30eded511780bf2e
SHA152a707442baf9faf559df3df84a6ccd165cfc1d7
SHA256c5739975bf23256e0b4c6717002514918a7e3d463c870956beaafa77ce3b742f
SHA5122346607cdbbd75de6f513fb3aea2a6d3f6b30f16c809b4fff3b7b95d8944661fa2abaea98a4a33feaf7742d498ed1a9516a2fd46b1126cc13b25475fd564c173
-
Filesize
11KB
MD5da852ee907abcf43bd6cd4437116f477
SHA142887c7f62154ba72cc2cce7e9af5a5ac45ce0b1
SHA256e3e4048eea24b745917cc5e94c6d75cee8e2e174ef3b73099a08f07fd6d7bd90
SHA512a41004a0d1ecbfa92909fff9c0a2d746d1f00bc3ecb790ae84cc1ec8c1f83eb685344cd42be07dcf3159b7370fc1ef49d0ce1eda1118839cc0ae38c2b9d558d0