Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
17-05-2024 19:15
Static task
static1
Behavioral task
behavioral1
Sample
510fb1c6f20495fe501ac38f5618f8b1_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
510fb1c6f20495fe501ac38f5618f8b1_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
510fb1c6f20495fe501ac38f5618f8b1_JaffaCakes118.html
-
Size
191KB
-
MD5
510fb1c6f20495fe501ac38f5618f8b1
-
SHA1
b3674be08122c79d2a2a57e8138fb1aadb5a649f
-
SHA256
0f75298944a5886499ce3827fbcb623661a4ccc8d063e998bf89815d47867334
-
SHA512
2fd725fdba9c90b56767bf41469b7bc188b710fe82985ce61f61b20fada44aa7e6f74c4968fc0cb1545a3a87bd00de6c5fcdf3374f7bdaf5f2a86356130cad6e
-
SSDEEP
1536:RjIYkfC2kGMuM7sMLh1fpAK9y6wuM7sMLhH4ppK9yUnmwGErgH5jcmRzegZoARAM:RHG0fpAK9yH4ppK9yzWgZQ0eglo1y/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2536 msedge.exe 2536 msedge.exe 4648 msedge.exe 4648 msedge.exe 3312 identity_helper.exe 3312 identity_helper.exe 1972 msedge.exe 1972 msedge.exe 1972 msedge.exe 1972 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4648 wrote to memory of 532 4648 msedge.exe 83 PID 4648 wrote to memory of 532 4648 msedge.exe 83 PID 4648 wrote to memory of 3572 4648 msedge.exe 84 PID 4648 wrote to memory of 3572 4648 msedge.exe 84 PID 4648 wrote to memory of 3572 4648 msedge.exe 84 PID 4648 wrote to memory of 3572 4648 msedge.exe 84 PID 4648 wrote to memory of 3572 4648 msedge.exe 84 PID 4648 wrote to memory of 3572 4648 msedge.exe 84 PID 4648 wrote to memory of 3572 4648 msedge.exe 84 PID 4648 wrote to memory of 3572 4648 msedge.exe 84 PID 4648 wrote to memory of 3572 4648 msedge.exe 84 PID 4648 wrote to memory of 3572 4648 msedge.exe 84 PID 4648 wrote to memory of 3572 4648 msedge.exe 84 PID 4648 wrote to memory of 3572 4648 msedge.exe 84 PID 4648 wrote to memory of 3572 4648 msedge.exe 84 PID 4648 wrote to memory of 3572 4648 msedge.exe 84 PID 4648 wrote to memory of 3572 4648 msedge.exe 84 PID 4648 wrote to memory of 3572 4648 msedge.exe 84 PID 4648 wrote to memory of 3572 4648 msedge.exe 84 PID 4648 wrote to memory of 3572 4648 msedge.exe 84 PID 4648 wrote to memory of 3572 4648 msedge.exe 84 PID 4648 wrote to memory of 3572 4648 msedge.exe 84 PID 4648 wrote to memory of 3572 4648 msedge.exe 84 PID 4648 wrote to memory of 3572 4648 msedge.exe 84 PID 4648 wrote to memory of 3572 4648 msedge.exe 84 PID 4648 wrote to memory of 3572 4648 msedge.exe 84 PID 4648 wrote to memory of 3572 4648 msedge.exe 84 PID 4648 wrote to memory of 3572 4648 msedge.exe 84 PID 4648 wrote to memory of 3572 4648 msedge.exe 84 PID 4648 wrote to memory of 3572 4648 msedge.exe 84 PID 4648 wrote to memory of 3572 4648 msedge.exe 84 PID 4648 wrote to memory of 3572 4648 msedge.exe 84 PID 4648 wrote to memory of 3572 4648 msedge.exe 84 PID 4648 wrote to memory of 3572 4648 msedge.exe 84 PID 4648 wrote to memory of 3572 4648 msedge.exe 84 PID 4648 wrote to memory of 3572 4648 msedge.exe 84 PID 4648 wrote to memory of 3572 4648 msedge.exe 84 PID 4648 wrote to memory of 3572 4648 msedge.exe 84 PID 4648 wrote to memory of 3572 4648 msedge.exe 84 PID 4648 wrote to memory of 3572 4648 msedge.exe 84 PID 4648 wrote to memory of 3572 4648 msedge.exe 84 PID 4648 wrote to memory of 3572 4648 msedge.exe 84 PID 4648 wrote to memory of 2536 4648 msedge.exe 85 PID 4648 wrote to memory of 2536 4648 msedge.exe 85 PID 4648 wrote to memory of 2160 4648 msedge.exe 86 PID 4648 wrote to memory of 2160 4648 msedge.exe 86 PID 4648 wrote to memory of 2160 4648 msedge.exe 86 PID 4648 wrote to memory of 2160 4648 msedge.exe 86 PID 4648 wrote to memory of 2160 4648 msedge.exe 86 PID 4648 wrote to memory of 2160 4648 msedge.exe 86 PID 4648 wrote to memory of 2160 4648 msedge.exe 86 PID 4648 wrote to memory of 2160 4648 msedge.exe 86 PID 4648 wrote to memory of 2160 4648 msedge.exe 86 PID 4648 wrote to memory of 2160 4648 msedge.exe 86 PID 4648 wrote to memory of 2160 4648 msedge.exe 86 PID 4648 wrote to memory of 2160 4648 msedge.exe 86 PID 4648 wrote to memory of 2160 4648 msedge.exe 86 PID 4648 wrote to memory of 2160 4648 msedge.exe 86 PID 4648 wrote to memory of 2160 4648 msedge.exe 86 PID 4648 wrote to memory of 2160 4648 msedge.exe 86 PID 4648 wrote to memory of 2160 4648 msedge.exe 86 PID 4648 wrote to memory of 2160 4648 msedge.exe 86 PID 4648 wrote to memory of 2160 4648 msedge.exe 86 PID 4648 wrote to memory of 2160 4648 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\510fb1c6f20495fe501ac38f5618f8b1_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4648 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff6dc846f8,0x7fff6dc84708,0x7fff6dc847182⤵PID:532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,259457975466239850,16023884453748101592,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:22⤵PID:3572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,259457975466239850,16023884453748101592,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,259457975466239850,16023884453748101592,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2868 /prefetch:82⤵PID:2160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,259457975466239850,16023884453748101592,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:4644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,259457975466239850,16023884453748101592,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:4000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,259457975466239850,16023884453748101592,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5872 /prefetch:82⤵PID:4504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,259457975466239850,16023884453748101592,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5872 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,259457975466239850,16023884453748101592,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2232 /prefetch:12⤵PID:2576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,259457975466239850,16023884453748101592,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1812 /prefetch:12⤵PID:3968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,259457975466239850,16023884453748101592,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5852 /prefetch:12⤵PID:1756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,259457975466239850,16023884453748101592,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1992 /prefetch:12⤵PID:1836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,259457975466239850,16023884453748101592,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4792 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1972
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2140
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2036
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f61fa5143fe872d1d8f1e9f8dc6544f9
SHA1df44bab94d7388fb38c63085ec4db80cfc5eb009
SHA256284a24b5b40860240db00ef3ae6a33c9fa8349ab5490a634e27b2c6e9a191c64
SHA512971000784a6518bb39c5cf043292c7ab659162275470f5f6b632ea91a6bcae83bc80517ceb983dd5abfe8fb4e157344cb65c27e609a879eec00b33c5fad563a6
-
Filesize
152B
MD587f7abeb82600e1e640b843ad50fe0a1
SHA1045bbada3f23fc59941bf7d0210fb160cb78ae87
SHA256b35d6906050d90a81d23646f86c20a8f5d42f058ffc6436fb0a2b8bd71ee1262
SHA512ea8e7f24ab823ad710ce079c86c40aa957353a00d2775732c23e31be88a10d212e974c4691279aa86016c4660f5795febf739a15207833df6ed964a9ed99d618
-
Filesize
905B
MD5ea28f8ddb2bdf4d96f5a4d5c64a8f70a
SHA1a1f58e7f0351bff8406bb91720793adf5c587a88
SHA256ea56f3949721bff05efb2cb4b942352ca7ef8e28befa5b20153864de8015f7c4
SHA512626de54a5c4732b8026e1756918f7f7481f17775d6a59b837c066e50a7f95191f5b5c799778bb2e16ae3b7d712e2d35cdd2bb87a964d9b9fe63bd227f45b930b
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
6KB
MD5f4d6f739ab667a1a1ba043adfa0ba7b3
SHA1402778b13b6725d77a426e841145c09370216e05
SHA2565cceef75fe2f44f2b4f00e00175b6f7af0b193924e892fee8a977d05c1c8dc5e
SHA512db9cd8bb3c59704795572360010004741e2dc57cd74ecd0450c22ba749c8c234cea40cd5c3deab807e5abf2b19c8873e62368a4cfeefbfd00be11f6c1485588a
-
Filesize
6KB
MD5b90ccccd7533a68eb44e17cc31bc5cc5
SHA13dd63a84b1a7b1875ba15774f82d73b9fe7999fb
SHA2561ffb0de46419d26ad011da6eed52e1e4b6c21df9ce7c4baa91f1f3c7e7b80560
SHA512c047678d0effb172df817c2af688e42e1c8eeb8811981e6992089aca659428449842da5c2a9c22e2393cc7897e2ecfb837f215b630777b8e3565074c35f04c01
-
Filesize
5KB
MD5a64d5e3d45220bb0b80e337c44d752bb
SHA157747588199dae6af9edc5b0b2c03369f114232e
SHA2561d57d5502bd46fca6cef6f56d23908b353acf4a0d3080833babe9ebbcfb0bc9e
SHA512b4fb2ede037d74a6ca901e89545b2fc45743a43836b1c0ca03ea640a9127af96f5b6ce8c3a2527cdf73d22f00a35ad9cec81910497210f36fc8961c543c4a11c
-
Filesize
6KB
MD5e3997ecd320a13dfa5acfa64c4370969
SHA1f7a815c34c81f38b99b791a17ae070976cf46172
SHA2565a60c11c62f7057195fa19fd6185cba5e487f022012926857e9487368c656841
SHA5122e8eb3ef5c48ab9083dfbe979b83ae7d26f086173023c723fe769cd7f099cd9347fc0fd85008972ec00f313a7a6d1c017e8eb03ef06905b5c67c09014a4c4106
-
Filesize
371B
MD560251f49b50e918b5489bb291c11e494
SHA1a2811e037cdce888f390f8124bbf319b88df1692
SHA256deddaebea1fc87717e8b0bb9701be7a115b2e7cc8235d36bfdc72c95e99a9be7
SHA51210936e9ac6f752c473bcaf098a414d9318030a4b5d8cb9f18c57aeea45640b9d7e52cbce76aae6eba9f4e4d8fc7158bcc8a964762ee51cd23bfdbeee2d34ebc5
-
Filesize
37B
MD5661760f65468e15dd28c1fd21fb55e6d
SHA1207638003735c9b113b1f47bb043cdcdbf4b0b5f
SHA2560a5f22651f8fe6179e924a10a444b7c394c56e1ed6015d3fc336198252984c0e
SHA5126454c5f69a2d7d7f0df4f066f539561c365bb6b14c466f282a99bf1116b72d757bef0bf03a0e0c68a7538a02a993fc070c52133ca2162c8496017053194f441c
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5d1b606a78b869ea25913ac3ded4f2426
SHA1a9c7ddca6d23a5eeda542a1847f2a65b3a714869
SHA256bdea644d3f60d918817cbadf5780ca38fb16a944a67cd18ad3d2edd19a02bc84
SHA512d8c28f9d48b6a01bc7fbdceb185596a1defb741feb1b9bb59a6dfc9166271568a44103bd26a2fc0241001ef9617677b79897654ab86c15e6879d3b6b7534105c