Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
14/05/2024, 11:02
Static task
static1
Behavioral task
behavioral1
Sample
414202c41a83d01a675624b3ff66f03e_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
414202c41a83d01a675624b3ff66f03e_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
414202c41a83d01a675624b3ff66f03e_JaffaCakes118.html
-
Size
31KB
-
MD5
414202c41a83d01a675624b3ff66f03e
-
SHA1
4b35db35613c43ff41470d8d827d972072cb420c
-
SHA256
608a59a065edb5c83dbc503c512a8568b3144490291f0d513c1b355891abb299
-
SHA512
e810c1a216bf2d9daa1b91fe3367ee0507389b9719f44f37fa12ed954657a4cec3c49a1ed796072cf1c2fdd1960f8a9d39a5e46c564f2a817e43dfb479cdd396
-
SSDEEP
768:8mvXvV6BBx37wxx9JKo7zFuQKyIYoOmjWDupIH+Y/UxE:8mvXvVuBx37wxx9Yo7zFuQKyIFOmjWDj
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1592 msedge.exe 1592 msedge.exe 1188 msedge.exe 1188 msedge.exe 4444 identity_helper.exe 4444 identity_helper.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe 1188 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1188 wrote to memory of 4724 1188 msedge.exe 82 PID 1188 wrote to memory of 4724 1188 msedge.exe 82 PID 1188 wrote to memory of 3408 1188 msedge.exe 83 PID 1188 wrote to memory of 3408 1188 msedge.exe 83 PID 1188 wrote to memory of 3408 1188 msedge.exe 83 PID 1188 wrote to memory of 3408 1188 msedge.exe 83 PID 1188 wrote to memory of 3408 1188 msedge.exe 83 PID 1188 wrote to memory of 3408 1188 msedge.exe 83 PID 1188 wrote to memory of 3408 1188 msedge.exe 83 PID 1188 wrote to memory of 3408 1188 msedge.exe 83 PID 1188 wrote to memory of 3408 1188 msedge.exe 83 PID 1188 wrote to memory of 3408 1188 msedge.exe 83 PID 1188 wrote to memory of 3408 1188 msedge.exe 83 PID 1188 wrote to memory of 3408 1188 msedge.exe 83 PID 1188 wrote to memory of 3408 1188 msedge.exe 83 PID 1188 wrote to memory of 3408 1188 msedge.exe 83 PID 1188 wrote to memory of 3408 1188 msedge.exe 83 PID 1188 wrote to memory of 3408 1188 msedge.exe 83 PID 1188 wrote to memory of 3408 1188 msedge.exe 83 PID 1188 wrote to memory of 3408 1188 msedge.exe 83 PID 1188 wrote to memory of 3408 1188 msedge.exe 83 PID 1188 wrote to memory of 3408 1188 msedge.exe 83 PID 1188 wrote to memory of 3408 1188 msedge.exe 83 PID 1188 wrote to memory of 3408 1188 msedge.exe 83 PID 1188 wrote to memory of 3408 1188 msedge.exe 83 PID 1188 wrote to memory of 3408 1188 msedge.exe 83 PID 1188 wrote to memory of 3408 1188 msedge.exe 83 PID 1188 wrote to memory of 3408 1188 msedge.exe 83 PID 1188 wrote to memory of 3408 1188 msedge.exe 83 PID 1188 wrote to memory of 3408 1188 msedge.exe 83 PID 1188 wrote to memory of 3408 1188 msedge.exe 83 PID 1188 wrote to memory of 3408 1188 msedge.exe 83 PID 1188 wrote to memory of 3408 1188 msedge.exe 83 PID 1188 wrote to memory of 3408 1188 msedge.exe 83 PID 1188 wrote to memory of 3408 1188 msedge.exe 83 PID 1188 wrote to memory of 3408 1188 msedge.exe 83 PID 1188 wrote to memory of 3408 1188 msedge.exe 83 PID 1188 wrote to memory of 3408 1188 msedge.exe 83 PID 1188 wrote to memory of 3408 1188 msedge.exe 83 PID 1188 wrote to memory of 3408 1188 msedge.exe 83 PID 1188 wrote to memory of 3408 1188 msedge.exe 83 PID 1188 wrote to memory of 3408 1188 msedge.exe 83 PID 1188 wrote to memory of 1592 1188 msedge.exe 84 PID 1188 wrote to memory of 1592 1188 msedge.exe 84 PID 1188 wrote to memory of 4808 1188 msedge.exe 85 PID 1188 wrote to memory of 4808 1188 msedge.exe 85 PID 1188 wrote to memory of 4808 1188 msedge.exe 85 PID 1188 wrote to memory of 4808 1188 msedge.exe 85 PID 1188 wrote to memory of 4808 1188 msedge.exe 85 PID 1188 wrote to memory of 4808 1188 msedge.exe 85 PID 1188 wrote to memory of 4808 1188 msedge.exe 85 PID 1188 wrote to memory of 4808 1188 msedge.exe 85 PID 1188 wrote to memory of 4808 1188 msedge.exe 85 PID 1188 wrote to memory of 4808 1188 msedge.exe 85 PID 1188 wrote to memory of 4808 1188 msedge.exe 85 PID 1188 wrote to memory of 4808 1188 msedge.exe 85 PID 1188 wrote to memory of 4808 1188 msedge.exe 85 PID 1188 wrote to memory of 4808 1188 msedge.exe 85 PID 1188 wrote to memory of 4808 1188 msedge.exe 85 PID 1188 wrote to memory of 4808 1188 msedge.exe 85 PID 1188 wrote to memory of 4808 1188 msedge.exe 85 PID 1188 wrote to memory of 4808 1188 msedge.exe 85 PID 1188 wrote to memory of 4808 1188 msedge.exe 85 PID 1188 wrote to memory of 4808 1188 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\414202c41a83d01a675624b3ff66f03e_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff6dc846f8,0x7fff6dc84708,0x7fff6dc847182⤵PID:4724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2200,8855000323901361645,6267056673417286043,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2208 /prefetch:22⤵PID:3408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2200,8855000323901361645,6267056673417286043,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2632 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2200,8855000323901361645,6267056673417286043,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2684 /prefetch:82⤵PID:4808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,8855000323901361645,6267056673417286043,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:3544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,8855000323901361645,6267056673417286043,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:1556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,8855000323901361645,6267056673417286043,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5204 /prefetch:12⤵PID:4516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,8855000323901361645,6267056673417286043,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5368 /prefetch:12⤵PID:2652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2200,8855000323901361645,6267056673417286043,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6064 /prefetch:82⤵PID:3052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2200,8855000323901361645,6267056673417286043,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6064 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,8855000323901361645,6267056673417286043,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5624 /prefetch:12⤵PID:4292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,8855000323901361645,6267056673417286043,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1856 /prefetch:12⤵PID:2128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,8855000323901361645,6267056673417286043,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5092 /prefetch:12⤵PID:368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,8855000323901361645,6267056673417286043,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4980 /prefetch:12⤵PID:5104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2200,8855000323901361645,6267056673417286043,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5952 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4864
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2628
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1012
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD59c0b39d3a0d17cc37d48a51f13601a95
SHA16fe317c8c74dbb738874de9f9bd1a91a308c6f9e
SHA2565978909a66e8ed5a534c4ea4991090e06cd519ce810696f9df772a47148902df
SHA51226066ca0ad317c2445e3c9a65e345a37d61bd5fac86a5939426d5738f40d1df1c0cd7e734319a1528691308164c4fd9a44b642bdacb017567481ce91fef1c551
-
Filesize
152B
MD5f61fa5143fe872d1d8f1e9f8dc6544f9
SHA1df44bab94d7388fb38c63085ec4db80cfc5eb009
SHA256284a24b5b40860240db00ef3ae6a33c9fa8349ab5490a634e27b2c6e9a191c64
SHA512971000784a6518bb39c5cf043292c7ab659162275470f5f6b632ea91a6bcae83bc80517ceb983dd5abfe8fb4e157344cb65c27e609a879eec00b33c5fad563a6
-
Filesize
152B
MD587f7abeb82600e1e640b843ad50fe0a1
SHA1045bbada3f23fc59941bf7d0210fb160cb78ae87
SHA256b35d6906050d90a81d23646f86c20a8f5d42f058ffc6436fb0a2b8bd71ee1262
SHA512ea8e7f24ab823ad710ce079c86c40aa957353a00d2775732c23e31be88a10d212e974c4691279aa86016c4660f5795febf739a15207833df6ed964a9ed99d618
-
Filesize
2KB
MD5be4daa756a74409ad0834f844ce4a713
SHA121551e97de39c0f2e9d6a72f9e968b0abae21378
SHA256d36e4c449c6f7077bfa795f3c733b4f9ed4878dcf77c42e30724e6039558a648
SHA51254a0f749ff3570aaa374a0b019ec8fc0e94e39062275cce6ac53de54a6a5131f88f00c1f2e4e157576649bee2ac96c69ecba7933483df505c97447b23c9974b7
-
Filesize
6KB
MD594778a8929c0e22f2cb85335cde00166
SHA1e42c7ef270fb16a41e7b0208917283c8f2a68daa
SHA2563c266ad6de0405992b24ed2436fa5a7844d26bee7010620487b1c15ddd0f1876
SHA51232a353602f183f717a39329ebd28bedddfe70717316978f9f15aa1ea371fb380efd94cceb7da03d0bf0c7b6edbfb47bb9a33b49297ff0b6ae8f01b9109f6e123
-
Filesize
7KB
MD5424fd87d83d44f2ebd5e30720467a44d
SHA1906c7b3ba9544f21498a3ef0319b0e9e81a01eba
SHA256f1f46ff71ec4d8831a8811dee2ef62b8f8287a7780a04829ac9058ad7a9d6be0
SHA5126babc83d1d3817e1cc47c835182ba9fdd640b829c57497eb9f8f3eabb9361726eaf218f80c9a7e0c9d7bb6ad9f8de2efc8ed2bebb4f4f776aebc730d49fbce4c
-
Filesize
1KB
MD57bc84397b0ed02b95b936eedb5bb2d2a
SHA1c3dc52f6326538a31aa9aefbca325ac2f4f617e2
SHA256ab983f5f64029a74e24316eb2390f806b83190125f769f874c9f3e90aad1123b
SHA512c6c37598a44bd8c3f99dd060a81cc8e7044fd4eef4c04383453b38105411b314d3f3a9fbe37d3175370e6fcdbac18c87cbe7bf8dd5fe2113ac4112ebffd01506
-
Filesize
707B
MD533567dcadea4c0bfede9bca129866472
SHA1546252e0b07ed7c2649ca73794b386da4e2f1b97
SHA2566785bb8f15fb36a945c3c82cd4f9b2390f30ede0a00cd57335d356d92cd57b87
SHA51263b39da3e98628b150d21bc6632ccb4244bb4df712c3555dfe2bb36522eff75e0f2c4cfda6dce55588d93e00c34a6b35f89db56c1d82bdd0a65b59efc4aa2ccc
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\ed215157-722d-44cd-8f91-ad2c8e94ae1b.tmp
Filesize6KB
MD53ac57add352e98a74ad034a5f77b6bb4
SHA1fa65167d6ffd36dba8687ff3027f886e3c89c4d3
SHA2564717752b190f08a1f47bfbd76dcf162e92a9c0c7ee2a7bd7bb506232d5bbb763
SHA512a27d8588cd8b106e1eac91482873bdc3ca750c897744d7f3bb9d9246fcbf70647854c45c7205c01357641c781f9de2f82267aeaec1eb6ac85a98fc08fa36a834