Analysis
-
max time kernel
150s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
17-05-2024 17:55
Static task
static1
Behavioral task
behavioral1
Sample
50bdfbcd70cf43cd6f9204f6012af5fd_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
50bdfbcd70cf43cd6f9204f6012af5fd_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
50bdfbcd70cf43cd6f9204f6012af5fd_JaffaCakes118.html
-
Size
11KB
-
MD5
50bdfbcd70cf43cd6f9204f6012af5fd
-
SHA1
4ea68af1612302db2349eab20a26992934479caa
-
SHA256
e87c46fbc927464fb5e6e48fc5a69afdb46945a60acdac51de47ea78098e9c95
-
SHA512
d34775cf4babd19d1b95130aecb36a78155a1d76b91327c8a1e0676a7f8b7223c1247536c442d256216c329ca33ad4ebf817ca10f6c581fc91955f99376eb59e
-
SSDEEP
192:2StwmO3ghcrxOWuzSw3s8BRfDtwNnfCgMCg4w:2UwmO3iSsdBRufCuK
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 388 msedge.exe 388 msedge.exe 3096 msedge.exe 3096 msedge.exe 3800 identity_helper.exe 3800 identity_helper.exe 1292 msedge.exe 1292 msedge.exe 1292 msedge.exe 1292 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3096 wrote to memory of 3452 3096 msedge.exe 83 PID 3096 wrote to memory of 3452 3096 msedge.exe 83 PID 3096 wrote to memory of 544 3096 msedge.exe 84 PID 3096 wrote to memory of 544 3096 msedge.exe 84 PID 3096 wrote to memory of 544 3096 msedge.exe 84 PID 3096 wrote to memory of 544 3096 msedge.exe 84 PID 3096 wrote to memory of 544 3096 msedge.exe 84 PID 3096 wrote to memory of 544 3096 msedge.exe 84 PID 3096 wrote to memory of 544 3096 msedge.exe 84 PID 3096 wrote to memory of 544 3096 msedge.exe 84 PID 3096 wrote to memory of 544 3096 msedge.exe 84 PID 3096 wrote to memory of 544 3096 msedge.exe 84 PID 3096 wrote to memory of 544 3096 msedge.exe 84 PID 3096 wrote to memory of 544 3096 msedge.exe 84 PID 3096 wrote to memory of 544 3096 msedge.exe 84 PID 3096 wrote to memory of 544 3096 msedge.exe 84 PID 3096 wrote to memory of 544 3096 msedge.exe 84 PID 3096 wrote to memory of 544 3096 msedge.exe 84 PID 3096 wrote to memory of 544 3096 msedge.exe 84 PID 3096 wrote to memory of 544 3096 msedge.exe 84 PID 3096 wrote to memory of 544 3096 msedge.exe 84 PID 3096 wrote to memory of 544 3096 msedge.exe 84 PID 3096 wrote to memory of 544 3096 msedge.exe 84 PID 3096 wrote to memory of 544 3096 msedge.exe 84 PID 3096 wrote to memory of 544 3096 msedge.exe 84 PID 3096 wrote to memory of 544 3096 msedge.exe 84 PID 3096 wrote to memory of 544 3096 msedge.exe 84 PID 3096 wrote to memory of 544 3096 msedge.exe 84 PID 3096 wrote to memory of 544 3096 msedge.exe 84 PID 3096 wrote to memory of 544 3096 msedge.exe 84 PID 3096 wrote to memory of 544 3096 msedge.exe 84 PID 3096 wrote to memory of 544 3096 msedge.exe 84 PID 3096 wrote to memory of 544 3096 msedge.exe 84 PID 3096 wrote to memory of 544 3096 msedge.exe 84 PID 3096 wrote to memory of 544 3096 msedge.exe 84 PID 3096 wrote to memory of 544 3096 msedge.exe 84 PID 3096 wrote to memory of 544 3096 msedge.exe 84 PID 3096 wrote to memory of 544 3096 msedge.exe 84 PID 3096 wrote to memory of 544 3096 msedge.exe 84 PID 3096 wrote to memory of 544 3096 msedge.exe 84 PID 3096 wrote to memory of 544 3096 msedge.exe 84 PID 3096 wrote to memory of 544 3096 msedge.exe 84 PID 3096 wrote to memory of 388 3096 msedge.exe 85 PID 3096 wrote to memory of 388 3096 msedge.exe 85 PID 3096 wrote to memory of 1480 3096 msedge.exe 86 PID 3096 wrote to memory of 1480 3096 msedge.exe 86 PID 3096 wrote to memory of 1480 3096 msedge.exe 86 PID 3096 wrote to memory of 1480 3096 msedge.exe 86 PID 3096 wrote to memory of 1480 3096 msedge.exe 86 PID 3096 wrote to memory of 1480 3096 msedge.exe 86 PID 3096 wrote to memory of 1480 3096 msedge.exe 86 PID 3096 wrote to memory of 1480 3096 msedge.exe 86 PID 3096 wrote to memory of 1480 3096 msedge.exe 86 PID 3096 wrote to memory of 1480 3096 msedge.exe 86 PID 3096 wrote to memory of 1480 3096 msedge.exe 86 PID 3096 wrote to memory of 1480 3096 msedge.exe 86 PID 3096 wrote to memory of 1480 3096 msedge.exe 86 PID 3096 wrote to memory of 1480 3096 msedge.exe 86 PID 3096 wrote to memory of 1480 3096 msedge.exe 86 PID 3096 wrote to memory of 1480 3096 msedge.exe 86 PID 3096 wrote to memory of 1480 3096 msedge.exe 86 PID 3096 wrote to memory of 1480 3096 msedge.exe 86 PID 3096 wrote to memory of 1480 3096 msedge.exe 86 PID 3096 wrote to memory of 1480 3096 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\50bdfbcd70cf43cd6f9204f6012af5fd_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3096 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa82ad46f8,0x7ffa82ad4708,0x7ffa82ad47182⤵PID:3452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,7697238959312828720,7051467142950234522,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2080 /prefetch:22⤵PID:544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2052,7697238959312828720,7051467142950234522,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2052,7697238959312828720,7051467142950234522,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2828 /prefetch:82⤵PID:1480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,7697238959312828720,7051467142950234522,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:5052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,7697238959312828720,7051467142950234522,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:5092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,7697238959312828720,7051467142950234522,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4920 /prefetch:12⤵PID:932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,7697238959312828720,7051467142950234522,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5644 /prefetch:82⤵PID:4876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,7697238959312828720,7051467142950234522,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5644 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,7697238959312828720,7051467142950234522,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4652 /prefetch:12⤵PID:4072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,7697238959312828720,7051467142950234522,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4656 /prefetch:12⤵PID:1396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,7697238959312828720,7051467142950234522,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5352 /prefetch:12⤵PID:2080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,7697238959312828720,7051467142950234522,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5376 /prefetch:12⤵PID:4784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,7697238959312828720,7051467142950234522,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4816 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1292
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2932
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3336
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54b4f91fa1b362ba5341ecb2836438dea
SHA19561f5aabed742404d455da735259a2c6781fa07
SHA256d824b742eace197ddc8b6ed5d918f390fde4b0fbf0e371b8e1f2ed40a3b6455c
SHA512fef22217dcdd8000bc193e25129699d4b8f7a103ca4fe1613baf73ccf67090d9fbae27eb93e4bb8747455853a0a4326f2d0c38df41c8d42351cdcd4132418dac
-
Filesize
152B
MD5eaa3db555ab5bc0cb364826204aad3f0
SHA1a4cdfaac8de49e6e6e88b335cfeaa7c9e3c563ca
SHA256ef7baeb1b2ab05ff3c5fbb76c2759db49294654548706c7c8e87f0cde855b86b
SHA512e13981da51b52c15261ecabb98af32f9b920651b46b10ce0cc823c5878b22eb1420258c80deef204070d1e0bdd3a64d875ac2522e3713a3cf11657aa55aeccd4
-
Filesize
327B
MD543917cb525ed4e1451fa8e54c3132949
SHA155e291fd4e150553539f09df582cc28dbc07bd2f
SHA25663d53943886ba2a8da675141cc5bbbf79ed01485fa34fc37caa29cb3fc028446
SHA512c2ad7ed2816802573a7379bf4230c113a5b8c991dde49f6c1216ca4c54c772724fc1bffd2b5e220be6884f191631a6e719839bd7bad8630a7bd636ad1b82903b
-
Filesize
5KB
MD5899db5e6980905a4a0913e28a6abdb77
SHA160efd6ac27a78d192b5137e665fa1b85dab00575
SHA256f3b7f68536082737ab6275afd7b13824e89f78a772b10665fd56831f9d51c57c
SHA5122f593d078b90533a7d69f8e57be5a6b2ff497ad3a9aa39498cc61b5396d87c9695bcfbb1b857b5b0f0415c532e03fa1f5fe767b7bb4e4ba7b93b37fb0faf4f27
-
Filesize
7KB
MD5cc97897843e239ac004083fd6136bcd3
SHA10a11bb3428c6a2fb901cf545fcb03c753352138e
SHA256d044b9b3382026b71eb38b41f29f2eed9a9b65fffe532557dad1c7af1718e4d2
SHA5126840bbf3e5ffffa4d735596c01e65d5c8caf556b8bd29459cf8516b08bff781fafa9f6f47bf1f90495e4ddbb54a52f4c68abab587d7aad198cea913ba30c0543
-
Filesize
6KB
MD5f71d402289a216c972659181c7ae0ce2
SHA1e50387a0f6a39de656af7b1481cd00f5314a2ee2
SHA256bf9f1b4dc3b486e124b4b80ab3f47555c3455fc40b31c312679c294bb679b725
SHA512bec296577ed705c0c3a90dd2276ec1e35aced6204fa23431a7332d39042d35e5869b3238c2abf3a9a442696246134d13fdfce9181b15373ee3efd09798e14a17
-
Filesize
539B
MD5394f301f316377c337aeb5188259cb2c
SHA18b63329dfdd2d0306065eea4ef6a080675fd3908
SHA256eacf371cf530f2a8356fc53accba36d73c80eaebfe1d7301ec145d71389794a8
SHA5122cd2523ed2cc850c6dad37ef961c4b16d67e79a6d78fb677be2a2c07d69e25c3d2b4d1719d0dfeb078075a32b8138b0e6005fb748eb8132f83997f002eab6f00
-
Filesize
539B
MD5c37320d6bc758ab8c58869cbfb9b290f
SHA1551e87687adc9feca703509ed31d09557439a2bc
SHA2567d56adfa8f658376c0c242c294a480386fb8ffedca305a4d38248bc6577cecbf
SHA512fb7d3ab48b44bf7ab830e2abc32e7a485e345167ae053693affe2d6a6e64cc2ded987aed4907fa75102a61a19d170bf1f6f451c0c3f68122076d0595e2f39648
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5c927095b932a96587ee83091e21f645e
SHA1f4850f89c365e9ea7abe7f5cb1152e356db444c9
SHA256f3aa794971b5da60ba00019941c42582a858735d7a5c4e291c2aae3af3d7675e
SHA5124f613a2b668fdd21b0bcd41e025c74001deae86541b8926236db8d210bdc71323f8bed92e29d0465fd5ce118f22ab2975dfa2ceea551a59159d931782a5f8ad1