Analysis
-
max time kernel
146s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
14-05-2024 20:56
Static task
static1
Behavioral task
behavioral1
Sample
430a8eb106ef2e67528d17b4d4358bff_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
430a8eb106ef2e67528d17b4d4358bff_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
430a8eb106ef2e67528d17b4d4358bff_JaffaCakes118.html
-
Size
147KB
-
MD5
430a8eb106ef2e67528d17b4d4358bff
-
SHA1
4aca2a4b1bb6258fccaf533ce9a2ffccf61e9781
-
SHA256
6abed0ef975f4779427b0c2caaffa3f7f3aa7deb36a8f314083a14906f8de3d1
-
SHA512
4cf87f77e0806797f3b354bd694c57b25fa0d9510c6416dc55ae04b038b618e978e6e0c0f0f61b2ff6cd0310e6fcf2598ecc434818383c415bc1cfdc7e77ac60
-
SSDEEP
3072:3NNx9ki7Zog/J7D6HV9KISFScS/SZSz2O4CR1PbqRCQ7Zu:PfvC2O4CR1PIu
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2168 msedge.exe 2168 msedge.exe 2876 msedge.exe 2876 msedge.exe 5344 identity_helper.exe 5344 identity_helper.exe 5720 msedge.exe 5720 msedge.exe 5720 msedge.exe 5720 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2876 wrote to memory of 3152 2876 msedge.exe 83 PID 2876 wrote to memory of 3152 2876 msedge.exe 83 PID 2876 wrote to memory of 5792 2876 msedge.exe 84 PID 2876 wrote to memory of 5792 2876 msedge.exe 84 PID 2876 wrote to memory of 5792 2876 msedge.exe 84 PID 2876 wrote to memory of 5792 2876 msedge.exe 84 PID 2876 wrote to memory of 5792 2876 msedge.exe 84 PID 2876 wrote to memory of 5792 2876 msedge.exe 84 PID 2876 wrote to memory of 5792 2876 msedge.exe 84 PID 2876 wrote to memory of 5792 2876 msedge.exe 84 PID 2876 wrote to memory of 5792 2876 msedge.exe 84 PID 2876 wrote to memory of 5792 2876 msedge.exe 84 PID 2876 wrote to memory of 5792 2876 msedge.exe 84 PID 2876 wrote to memory of 5792 2876 msedge.exe 84 PID 2876 wrote to memory of 5792 2876 msedge.exe 84 PID 2876 wrote to memory of 5792 2876 msedge.exe 84 PID 2876 wrote to memory of 5792 2876 msedge.exe 84 PID 2876 wrote to memory of 5792 2876 msedge.exe 84 PID 2876 wrote to memory of 5792 2876 msedge.exe 84 PID 2876 wrote to memory of 5792 2876 msedge.exe 84 PID 2876 wrote to memory of 5792 2876 msedge.exe 84 PID 2876 wrote to memory of 5792 2876 msedge.exe 84 PID 2876 wrote to memory of 5792 2876 msedge.exe 84 PID 2876 wrote to memory of 5792 2876 msedge.exe 84 PID 2876 wrote to memory of 5792 2876 msedge.exe 84 PID 2876 wrote to memory of 5792 2876 msedge.exe 84 PID 2876 wrote to memory of 5792 2876 msedge.exe 84 PID 2876 wrote to memory of 5792 2876 msedge.exe 84 PID 2876 wrote to memory of 5792 2876 msedge.exe 84 PID 2876 wrote to memory of 5792 2876 msedge.exe 84 PID 2876 wrote to memory of 5792 2876 msedge.exe 84 PID 2876 wrote to memory of 5792 2876 msedge.exe 84 PID 2876 wrote to memory of 5792 2876 msedge.exe 84 PID 2876 wrote to memory of 5792 2876 msedge.exe 84 PID 2876 wrote to memory of 5792 2876 msedge.exe 84 PID 2876 wrote to memory of 5792 2876 msedge.exe 84 PID 2876 wrote to memory of 5792 2876 msedge.exe 84 PID 2876 wrote to memory of 5792 2876 msedge.exe 84 PID 2876 wrote to memory of 5792 2876 msedge.exe 84 PID 2876 wrote to memory of 5792 2876 msedge.exe 84 PID 2876 wrote to memory of 5792 2876 msedge.exe 84 PID 2876 wrote to memory of 5792 2876 msedge.exe 84 PID 2876 wrote to memory of 2168 2876 msedge.exe 85 PID 2876 wrote to memory of 2168 2876 msedge.exe 85 PID 2876 wrote to memory of 4340 2876 msedge.exe 86 PID 2876 wrote to memory of 4340 2876 msedge.exe 86 PID 2876 wrote to memory of 4340 2876 msedge.exe 86 PID 2876 wrote to memory of 4340 2876 msedge.exe 86 PID 2876 wrote to memory of 4340 2876 msedge.exe 86 PID 2876 wrote to memory of 4340 2876 msedge.exe 86 PID 2876 wrote to memory of 4340 2876 msedge.exe 86 PID 2876 wrote to memory of 4340 2876 msedge.exe 86 PID 2876 wrote to memory of 4340 2876 msedge.exe 86 PID 2876 wrote to memory of 4340 2876 msedge.exe 86 PID 2876 wrote to memory of 4340 2876 msedge.exe 86 PID 2876 wrote to memory of 4340 2876 msedge.exe 86 PID 2876 wrote to memory of 4340 2876 msedge.exe 86 PID 2876 wrote to memory of 4340 2876 msedge.exe 86 PID 2876 wrote to memory of 4340 2876 msedge.exe 86 PID 2876 wrote to memory of 4340 2876 msedge.exe 86 PID 2876 wrote to memory of 4340 2876 msedge.exe 86 PID 2876 wrote to memory of 4340 2876 msedge.exe 86 PID 2876 wrote to memory of 4340 2876 msedge.exe 86 PID 2876 wrote to memory of 4340 2876 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\430a8eb106ef2e67528d17b4d4358bff_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8d51846f8,0x7ff8d5184708,0x7ff8d51847182⤵PID:3152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2040,4170570394322461748,6971598417244073499,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2068 /prefetch:22⤵PID:5792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2040,4170570394322461748,6971598417244073499,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2524 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2040,4170570394322461748,6971598417244073499,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2752 /prefetch:82⤵PID:4340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,4170570394322461748,6971598417244073499,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:3172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,4170570394322461748,6971598417244073499,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:2320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,4170570394322461748,6971598417244073499,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5212 /prefetch:12⤵PID:5200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2040,4170570394322461748,6971598417244073499,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5640 /prefetch:82⤵PID:3832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2040,4170570394322461748,6971598417244073499,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5640 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,4170570394322461748,6971598417244073499,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5452 /prefetch:12⤵PID:3844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,4170570394322461748,6971598417244073499,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5444 /prefetch:12⤵PID:3996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,4170570394322461748,6971598417244073499,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5124 /prefetch:12⤵PID:5048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,4170570394322461748,6971598417244073499,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5100 /prefetch:12⤵PID:2444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2040,4170570394322461748,6971598417244073499,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5256 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5720
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2032
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2012
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54f7152bc5a1a715ef481e37d1c791959
SHA1c8a1ed674c62ae4f45519f90a8cc5a81eff3a6d7
SHA256704dd4f98d8ca34ec421f23ba1891b178c23c14b3301e4655efc5c02d356c2bc
SHA5122e6b02ca35d76a655a17a5f3e9dbd8d7517c7dae24f0095c7350eb9e7bdf9e1256a7009aa8878f96c89d1ea4fe5323a41f72b8c551806dda62880d7ff231ff5c
-
Filesize
152B
MD5ea98e583ad99df195d29aa066204ab56
SHA1f89398664af0179641aa0138b337097b617cb2db
SHA256a7abb51435909fa2d75c6f2ff5c69a93d4a0ab276ed579e7d8733b2a63ffbee6
SHA512e109be3466e653e5d310b3e402e1626298b09205d223722a82344dd78504f3c33e1e24e8402a02f38cd2c9c50d96a303ce4846bea5a583423937ab018cd5782f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize240B
MD50ff15a9aab95ab47d7208039881bef90
SHA191f4a3f96f38aeed4e1c8ce9614d98f962766c65
SHA25635049f1a50a4ca5b4fd37563f4b0b09a18a31bdda0873c84f29468d3a910845d
SHA51277b19cd1266f68db00f7d45138fedd5f5674ba4013560c864f4172949e1477e5fd25d1cf5f1a40084771a6239693c6b01b07ed303db4757336c9064311179539
-
Filesize
1KB
MD5edc98689bf7ed9ec319199539f59fea9
SHA15d00f62bf57ae84574d956acb3dee8f08b5e7727
SHA256143be3fb6150f6751148ff3a397b0069c5c5e086650ed196ba617164a52c8454
SHA512276b033853f49771143b6a6e58c351b22dfaa5a861a44b784e5bee5218a75613a73f70cff5a5999dd763ca66d3de6c148b8995197095c56f5ea4e8cd5ce1ec9a
-
Filesize
5KB
MD50429cf4aa5b431030c81a2f25282da83
SHA16e5a67b614d3ffb08428149224bd81c2010016d1
SHA256ac40b0fa2fae712134a88bb72ebb82577f287c87c04fa39468f2b43aefc036df
SHA512cfe3f826e2b468b0fa0b7c14d3f72f8022dcbd333706ca288b867d9672aec8ddc583485ed75f3b4f56522ea5e3868e978aaeb374f4911ad9d7a9efd86d460116
-
Filesize
6KB
MD5cb38f7ad1ba2147041cd030d2456ff01
SHA19c10aacdb2b95783c327fce6dd53bdcbd74f7461
SHA256cf1d692d3475cb44771f444353504457ee5dcb9f9b8e01fdcde8a1f77454a626
SHA512b03c22404807e3d7e103cd33ed5462012690aaad095235f4d69355d3c2451e952493fc7d46081bd8275306c5df89f6f312ed41b042b6f77bdfa8e439befce3c1
-
Filesize
6KB
MD5de236b29f5c49d2195ce0c9c27047d60
SHA1e7ccec6aa1ec2fa902f582195e2ee4d5f353f2f7
SHA256083631ae9321741749bc771e09a6aca89bb7af1c6308f79bc9c4801e78c4d4e3
SHA5125a7c597889c62c2749ca58e81433f3e592f10e34006d8ab880e390536f1d1a3fb0ad6c5bd7409376931fc62207af6f3cf909dccd16e349d5ebc637b39fc6b966
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD50e42555ef787bc64f139f38bd0ebbc46
SHA1c037acd2616e09fbb4c09c578ad045f3aeeb8511
SHA2568873d64c303b672f3c4e48ef42d0ae95f5ab915e0b16b14a045affc2fdd7ff34
SHA512de460cb7875a73bb4c924c4bf715295d355d3bdcac7f17fe3eb70ec9f4547a2284ef7451660f46780ace587878f8092b444c7409386779b84e3ee2f0527c3d8e