Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
17-05-2024 17:27
Static task
static1
Behavioral task
behavioral1
Sample
50a34a4655579ca54055b8e884f1d875_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
50a34a4655579ca54055b8e884f1d875_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
50a34a4655579ca54055b8e884f1d875_JaffaCakes118.html
-
Size
55KB
-
MD5
50a34a4655579ca54055b8e884f1d875
-
SHA1
ff5de6448cdf6197b1346c3e02ffb752dd9e2dfe
-
SHA256
66b77abc3b1c32019aee6f7da228a4141f610ac696305c4e7e415a7d7b4b93d4
-
SHA512
185a6da198737e1631de5a8d58067aefca28ba87f37e1b7639a63b2e667a6babae9cae0696d53126bbce79b3f986c5d5d0ab330af64c00d2579cac7ca6336edc
-
SSDEEP
1536:Rg5Nr5SkTPSUmla67L2lMFuuNlK920qTyVeuz4/gQZQTXInMuplCLJ2I:gNUUR6xuuNlK920quVeuzlQZQTXInMue
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 5040 msedge.exe 5040 msedge.exe 5244 msedge.exe 5244 msedge.exe 5748 identity_helper.exe 5748 identity_helper.exe 5308 msedge.exe 5308 msedge.exe 5308 msedge.exe 5308 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 5244 msedge.exe 5244 msedge.exe 5244 msedge.exe 5244 msedge.exe 5244 msedge.exe 5244 msedge.exe 5244 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5244 msedge.exe 5244 msedge.exe 5244 msedge.exe 5244 msedge.exe 5244 msedge.exe 5244 msedge.exe 5244 msedge.exe 5244 msedge.exe 5244 msedge.exe 5244 msedge.exe 5244 msedge.exe 5244 msedge.exe 5244 msedge.exe 5244 msedge.exe 5244 msedge.exe 5244 msedge.exe 5244 msedge.exe 5244 msedge.exe 5244 msedge.exe 5244 msedge.exe 5244 msedge.exe 5244 msedge.exe 5244 msedge.exe 5244 msedge.exe 5244 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5244 msedge.exe 5244 msedge.exe 5244 msedge.exe 5244 msedge.exe 5244 msedge.exe 5244 msedge.exe 5244 msedge.exe 5244 msedge.exe 5244 msedge.exe 5244 msedge.exe 5244 msedge.exe 5244 msedge.exe 5244 msedge.exe 5244 msedge.exe 5244 msedge.exe 5244 msedge.exe 5244 msedge.exe 5244 msedge.exe 5244 msedge.exe 5244 msedge.exe 5244 msedge.exe 5244 msedge.exe 5244 msedge.exe 5244 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5244 wrote to memory of 4576 5244 msedge.exe 82 PID 5244 wrote to memory of 4576 5244 msedge.exe 82 PID 5244 wrote to memory of 3560 5244 msedge.exe 83 PID 5244 wrote to memory of 3560 5244 msedge.exe 83 PID 5244 wrote to memory of 3560 5244 msedge.exe 83 PID 5244 wrote to memory of 3560 5244 msedge.exe 83 PID 5244 wrote to memory of 3560 5244 msedge.exe 83 PID 5244 wrote to memory of 3560 5244 msedge.exe 83 PID 5244 wrote to memory of 3560 5244 msedge.exe 83 PID 5244 wrote to memory of 3560 5244 msedge.exe 83 PID 5244 wrote to memory of 3560 5244 msedge.exe 83 PID 5244 wrote to memory of 3560 5244 msedge.exe 83 PID 5244 wrote to memory of 3560 5244 msedge.exe 83 PID 5244 wrote to memory of 3560 5244 msedge.exe 83 PID 5244 wrote to memory of 3560 5244 msedge.exe 83 PID 5244 wrote to memory of 3560 5244 msedge.exe 83 PID 5244 wrote to memory of 3560 5244 msedge.exe 83 PID 5244 wrote to memory of 3560 5244 msedge.exe 83 PID 5244 wrote to memory of 3560 5244 msedge.exe 83 PID 5244 wrote to memory of 3560 5244 msedge.exe 83 PID 5244 wrote to memory of 3560 5244 msedge.exe 83 PID 5244 wrote to memory of 3560 5244 msedge.exe 83 PID 5244 wrote to memory of 3560 5244 msedge.exe 83 PID 5244 wrote to memory of 3560 5244 msedge.exe 83 PID 5244 wrote to memory of 3560 5244 msedge.exe 83 PID 5244 wrote to memory of 3560 5244 msedge.exe 83 PID 5244 wrote to memory of 3560 5244 msedge.exe 83 PID 5244 wrote to memory of 3560 5244 msedge.exe 83 PID 5244 wrote to memory of 3560 5244 msedge.exe 83 PID 5244 wrote to memory of 3560 5244 msedge.exe 83 PID 5244 wrote to memory of 3560 5244 msedge.exe 83 PID 5244 wrote to memory of 3560 5244 msedge.exe 83 PID 5244 wrote to memory of 3560 5244 msedge.exe 83 PID 5244 wrote to memory of 3560 5244 msedge.exe 83 PID 5244 wrote to memory of 3560 5244 msedge.exe 83 PID 5244 wrote to memory of 3560 5244 msedge.exe 83 PID 5244 wrote to memory of 3560 5244 msedge.exe 83 PID 5244 wrote to memory of 3560 5244 msedge.exe 83 PID 5244 wrote to memory of 3560 5244 msedge.exe 83 PID 5244 wrote to memory of 3560 5244 msedge.exe 83 PID 5244 wrote to memory of 3560 5244 msedge.exe 83 PID 5244 wrote to memory of 3560 5244 msedge.exe 83 PID 5244 wrote to memory of 5040 5244 msedge.exe 84 PID 5244 wrote to memory of 5040 5244 msedge.exe 84 PID 5244 wrote to memory of 6092 5244 msedge.exe 85 PID 5244 wrote to memory of 6092 5244 msedge.exe 85 PID 5244 wrote to memory of 6092 5244 msedge.exe 85 PID 5244 wrote to memory of 6092 5244 msedge.exe 85 PID 5244 wrote to memory of 6092 5244 msedge.exe 85 PID 5244 wrote to memory of 6092 5244 msedge.exe 85 PID 5244 wrote to memory of 6092 5244 msedge.exe 85 PID 5244 wrote to memory of 6092 5244 msedge.exe 85 PID 5244 wrote to memory of 6092 5244 msedge.exe 85 PID 5244 wrote to memory of 6092 5244 msedge.exe 85 PID 5244 wrote to memory of 6092 5244 msedge.exe 85 PID 5244 wrote to memory of 6092 5244 msedge.exe 85 PID 5244 wrote to memory of 6092 5244 msedge.exe 85 PID 5244 wrote to memory of 6092 5244 msedge.exe 85 PID 5244 wrote to memory of 6092 5244 msedge.exe 85 PID 5244 wrote to memory of 6092 5244 msedge.exe 85 PID 5244 wrote to memory of 6092 5244 msedge.exe 85 PID 5244 wrote to memory of 6092 5244 msedge.exe 85 PID 5244 wrote to memory of 6092 5244 msedge.exe 85 PID 5244 wrote to memory of 6092 5244 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\50a34a4655579ca54055b8e884f1d875_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5244 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9a06c46f8,0x7ff9a06c4708,0x7ff9a06c47182⤵PID:4576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,1438089262203566252,6506651664180404585,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:22⤵PID:3560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2084,1438089262203566252,6506651664180404585,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2264 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2084,1438089262203566252,6506651664180404585,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2760 /prefetch:82⤵PID:6092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,1438089262203566252,6506651664180404585,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3188 /prefetch:12⤵PID:3140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,1438089262203566252,6506651664180404585,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3196 /prefetch:12⤵PID:680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,1438089262203566252,6506651664180404585,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4940 /prefetch:12⤵PID:5804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,1438089262203566252,6506651664180404585,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5832 /prefetch:82⤵PID:1896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,1438089262203566252,6506651664180404585,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5832 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,1438089262203566252,6506651664180404585,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5836 /prefetch:12⤵PID:740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,1438089262203566252,6506651664180404585,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5352 /prefetch:12⤵PID:2196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,1438089262203566252,6506651664180404585,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5784 /prefetch:12⤵PID:3444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,1438089262203566252,6506651664180404585,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5828 /prefetch:12⤵PID:3580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,1438089262203566252,6506651664180404585,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2164 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5308
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4340
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4356
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ae54e9db2e89f2c54da8cc0bfcbd26bd
SHA1a88af6c673609ecbc51a1a60dfbc8577830d2b5d
SHA2565009d3c953de63cfd14a7d911156c514e179ff07d2b94382d9caac6040cb72af
SHA512e3b70e5eb7321b9deca6f6a17424a15b9fd5c4008bd3789bd01099fd13cb2f4a2f37fe4b920fb51c50517745b576c1f94df83efd1a7e75949551163985599998
-
Filesize
152B
MD5f53207a5ca2ef5c7e976cbb3cb26d870
SHA149a8cc44f53da77bb3dfb36fc7676ed54675db43
SHA25619ab4e3c9da6d9cedda7461efdba9a2085e743513ab89f1dd0fd5a8f9486ad23
SHA512be734c7e8afda19f445912aef0d78f9941add29baebd4a812bff27f10a1d78b52aeb11c551468c8644443c86e1a2a6b2e4aead3d7f81d39925e3c20406ac1499
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize240B
MD538d4190b66c2b7e23897ab315d8bd3c6
SHA13bcef5441797dfa0dd38fe51fbfecda10e00ced3
SHA256727f85266867b1726f23b186d6ed9852ed6dea8b96cf922ad6eb9f2619c6e179
SHA5122ed568c06cb65fec1e54133844db50c94386eeef78d23b1dbd2bbe154c0ad35c19dff2b606a42e39521b86a301f6ac0f749981d01959e6ce2d11ba0ff903c7ba
-
Filesize
787B
MD5c7c7a330edff74bc17de69ea5170e31c
SHA174a07cc14854cb7c9b9c64cbc9eaec8e3cecdb42
SHA25612fbb000bcefc1fabcadb93648689203ecb2c1043f33db3da97e4923b3948d5a
SHA512f5bbf86756befb5ccd887dee585741ac2bb6f10e845ce09f6f89de612a9e1531520be9565a00fdcd8c02307d2a4228cc8a74c5a523043f59d24116768d9c50ec
-
Filesize
5KB
MD54a04c2e76f636acce38ad22f18b3f1a7
SHA119f13ed7b1c3658ae8785492a1ea2a8661dbbc25
SHA256f2310b1cb5ee577b17bf37907e221ed4d0f566edd119c2390f8effdf04f3a940
SHA512d0b64861bedef2124cd32a33aa532a605b200dafcf5d2ead42cd02ab859669e5040d48caf0fb5eab32cca83d47ae0958a7d76611b8572ed74571aeb6c322da2c
-
Filesize
6KB
MD5088a5c5ab81cae3d9b8674329fe96212
SHA1e4354215af4658f3e175c293e7561335ded75286
SHA256bcdc67120802168453be17849e58a7acc6bd22f6354cd09ba70fc0b42811ed8f
SHA512cc6307b77c2586a1f6700de1a927e00b08399f50762086547d4642288f9c13819d6f5a5ce05e43c30c433bd042843147c923344361ed7c9e428d265c1c1ffb5e
-
Filesize
6KB
MD5173f55188371f4c7fcd6c7dc8d6977b4
SHA1673373637e2af919de17c84872e70c68593e505a
SHA2560c89bb78543526dae6ec20ec5193363c23892931ba69031bf8f73f1b5dd2b91c
SHA51234572193c3585a833d4d98fde8ff60348d5d4903817c8538e84ffa2d53d1d2a0257fc9b42370d445559dd0c6205e02a47984ca9458e961b9423161758a4c25f1
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5dcbc5e104ef743b17e2d639d2e1433e0
SHA1c070bfece296662cbce43aa7a766a3fea5aa9691
SHA2560ff443fb8f7e87e10058071c1f2d53a405ec31c9aa9f6553bd08b501bb27fdc8
SHA51239cfcfceb40cb50a5afeebb208e21f16e755d9152964954e778c54ff3d4014ed93eeba9f6360f1814fef23d811acb613de5aee0d62acea396fd0085d6e592a0c