Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
21-05-2024 20:44
Static task
static1
Behavioral task
behavioral1
Sample
64b507518e4efa9a0a526d3b4fc661df_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
64b507518e4efa9a0a526d3b4fc661df_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
64b507518e4efa9a0a526d3b4fc661df_JaffaCakes118.html
-
Size
20KB
-
MD5
64b507518e4efa9a0a526d3b4fc661df
-
SHA1
a1bfe0dd394c07f740a2a764aaa263594eec0947
-
SHA256
f949004c6de88e5fbf1258e138576e509f18c364da04e966c42a96b19f3d0882
-
SHA512
6000bd6c3cbe70fbbb0f82295ecbe8cade42940b5c212e08d352535d5d6a725c967ee98e711e9dd3f68566f13db18ef1b11fb7161918a0f4c18798f2b83c37b2
-
SSDEEP
384:Qv3lW5BszjELBPfIMLOI/C1FpEiMFPR1JbAaEfELBmrSSCqdhF2HgzR:Qv3iLBHIkOI/HHcaEf8BSCEF
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2364 msedge.exe 2364 msedge.exe 3972 msedge.exe 3972 msedge.exe 3736 identity_helper.exe 3736 identity_helper.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3972 wrote to memory of 4732 3972 msedge.exe 83 PID 3972 wrote to memory of 4732 3972 msedge.exe 83 PID 3972 wrote to memory of 4388 3972 msedge.exe 84 PID 3972 wrote to memory of 4388 3972 msedge.exe 84 PID 3972 wrote to memory of 4388 3972 msedge.exe 84 PID 3972 wrote to memory of 4388 3972 msedge.exe 84 PID 3972 wrote to memory of 4388 3972 msedge.exe 84 PID 3972 wrote to memory of 4388 3972 msedge.exe 84 PID 3972 wrote to memory of 4388 3972 msedge.exe 84 PID 3972 wrote to memory of 4388 3972 msedge.exe 84 PID 3972 wrote to memory of 4388 3972 msedge.exe 84 PID 3972 wrote to memory of 4388 3972 msedge.exe 84 PID 3972 wrote to memory of 4388 3972 msedge.exe 84 PID 3972 wrote to memory of 4388 3972 msedge.exe 84 PID 3972 wrote to memory of 4388 3972 msedge.exe 84 PID 3972 wrote to memory of 4388 3972 msedge.exe 84 PID 3972 wrote to memory of 4388 3972 msedge.exe 84 PID 3972 wrote to memory of 4388 3972 msedge.exe 84 PID 3972 wrote to memory of 4388 3972 msedge.exe 84 PID 3972 wrote to memory of 4388 3972 msedge.exe 84 PID 3972 wrote to memory of 4388 3972 msedge.exe 84 PID 3972 wrote to memory of 4388 3972 msedge.exe 84 PID 3972 wrote to memory of 4388 3972 msedge.exe 84 PID 3972 wrote to memory of 4388 3972 msedge.exe 84 PID 3972 wrote to memory of 4388 3972 msedge.exe 84 PID 3972 wrote to memory of 4388 3972 msedge.exe 84 PID 3972 wrote to memory of 4388 3972 msedge.exe 84 PID 3972 wrote to memory of 4388 3972 msedge.exe 84 PID 3972 wrote to memory of 4388 3972 msedge.exe 84 PID 3972 wrote to memory of 4388 3972 msedge.exe 84 PID 3972 wrote to memory of 4388 3972 msedge.exe 84 PID 3972 wrote to memory of 4388 3972 msedge.exe 84 PID 3972 wrote to memory of 4388 3972 msedge.exe 84 PID 3972 wrote to memory of 4388 3972 msedge.exe 84 PID 3972 wrote to memory of 4388 3972 msedge.exe 84 PID 3972 wrote to memory of 4388 3972 msedge.exe 84 PID 3972 wrote to memory of 4388 3972 msedge.exe 84 PID 3972 wrote to memory of 4388 3972 msedge.exe 84 PID 3972 wrote to memory of 4388 3972 msedge.exe 84 PID 3972 wrote to memory of 4388 3972 msedge.exe 84 PID 3972 wrote to memory of 4388 3972 msedge.exe 84 PID 3972 wrote to memory of 4388 3972 msedge.exe 84 PID 3972 wrote to memory of 2364 3972 msedge.exe 85 PID 3972 wrote to memory of 2364 3972 msedge.exe 85 PID 3972 wrote to memory of 2084 3972 msedge.exe 86 PID 3972 wrote to memory of 2084 3972 msedge.exe 86 PID 3972 wrote to memory of 2084 3972 msedge.exe 86 PID 3972 wrote to memory of 2084 3972 msedge.exe 86 PID 3972 wrote to memory of 2084 3972 msedge.exe 86 PID 3972 wrote to memory of 2084 3972 msedge.exe 86 PID 3972 wrote to memory of 2084 3972 msedge.exe 86 PID 3972 wrote to memory of 2084 3972 msedge.exe 86 PID 3972 wrote to memory of 2084 3972 msedge.exe 86 PID 3972 wrote to memory of 2084 3972 msedge.exe 86 PID 3972 wrote to memory of 2084 3972 msedge.exe 86 PID 3972 wrote to memory of 2084 3972 msedge.exe 86 PID 3972 wrote to memory of 2084 3972 msedge.exe 86 PID 3972 wrote to memory of 2084 3972 msedge.exe 86 PID 3972 wrote to memory of 2084 3972 msedge.exe 86 PID 3972 wrote to memory of 2084 3972 msedge.exe 86 PID 3972 wrote to memory of 2084 3972 msedge.exe 86 PID 3972 wrote to memory of 2084 3972 msedge.exe 86 PID 3972 wrote to memory of 2084 3972 msedge.exe 86 PID 3972 wrote to memory of 2084 3972 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\64b507518e4efa9a0a526d3b4fc661df_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3972 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8e77046f8,0x7ff8e7704708,0x7ff8e77047182⤵PID:4732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,13141491332715536436,4198043712370777619,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2068 /prefetch:22⤵PID:4388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2084,13141491332715536436,4198043712370777619,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2236 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2084,13141491332715536436,4198043712370777619,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2608 /prefetch:82⤵PID:2084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,13141491332715536436,4198043712370777619,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:1836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,13141491332715536436,4198043712370777619,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2128 /prefetch:12⤵PID:2144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,13141491332715536436,4198043712370777619,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5252 /prefetch:12⤵PID:3112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,13141491332715536436,4198043712370777619,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5040 /prefetch:12⤵PID:3260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,13141491332715536436,4198043712370777619,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5596 /prefetch:82⤵PID:3976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,13141491332715536436,4198043712370777619,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5596 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,13141491332715536436,4198043712370777619,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4812 /prefetch:12⤵PID:440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,13141491332715536436,4198043712370777619,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4788 /prefetch:12⤵PID:1356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,13141491332715536436,4198043712370777619,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5532 /prefetch:12⤵PID:4724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,13141491332715536436,4198043712370777619,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:4260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,13141491332715536436,4198043712370777619,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4964 /prefetch:12⤵PID:4984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,13141491332715536436,4198043712370777619,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2956 /prefetch:12⤵PID:4896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,13141491332715536436,4198043712370777619,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1048 /prefetch:12⤵PID:4968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,13141491332715536436,4198043712370777619,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4508 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4200
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4676
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2536
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f61fa5143fe872d1d8f1e9f8dc6544f9
SHA1df44bab94d7388fb38c63085ec4db80cfc5eb009
SHA256284a24b5b40860240db00ef3ae6a33c9fa8349ab5490a634e27b2c6e9a191c64
SHA512971000784a6518bb39c5cf043292c7ab659162275470f5f6b632ea91a6bcae83bc80517ceb983dd5abfe8fb4e157344cb65c27e609a879eec00b33c5fad563a6
-
Filesize
152B
MD587f7abeb82600e1e640b843ad50fe0a1
SHA1045bbada3f23fc59941bf7d0210fb160cb78ae87
SHA256b35d6906050d90a81d23646f86c20a8f5d42f058ffc6436fb0a2b8bd71ee1262
SHA512ea8e7f24ab823ad710ce079c86c40aa957353a00d2775732c23e31be88a10d212e974c4691279aa86016c4660f5795febf739a15207833df6ed964a9ed99d618
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\84640b7b-e184-44dd-a385-596d0ee322c2.tmp
Filesize6KB
MD5e4838981d7c1c3f0914d43e91e9846ba
SHA1fe739c56fac16950329c4d37cfce4ab542004047
SHA2563c55cdc03973ad734cc13896c98a3f8afa509885eac360c853bd45d2e06a7522
SHA51218e05721274a5e69bd61ffbd6499af7dc3281a8a954b93ee9e20a26db48d7d4344b4bf613e54ab584ee7ac627d854adc549d57c4abfa8962637786c302527bdc
-
Filesize
189B
MD5443319881835b14fda88caab9945e84c
SHA1adb420bd20774e8eabc4d3d53ecfccb20ae7cb54
SHA256fd79d0831e92ccbffc20eed3a0d07b39a121b4f3be4f720d2981fdd2e7b5b8da
SHA51239c2c7fd638c04ce244473831d3dc8175e8e9ecb9a0df38370300233202d7d7fa9166912b8d97b34efd7b90eab6da376191e1c5c9ce253e96c9686b886ab29fb
-
Filesize
5KB
MD553346712c0d2a4b1b587d713e40149cb
SHA12ed70154acec26ffbd0d26518511a614dccbbbde
SHA256b373631b9c1d573ac57b18df7e1115346c2cac8cd8beadebd24c76a99e7d3167
SHA512498fcbb4e224c04bdd11bb777a5f0b7e0f6caecbf2c9d5bb9f8623f703906bddd55dc461318d9603ad381f27ecba93968cbb6080e31d76b56c7f73ffb7f73ff2
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD58088c15da6b686a63f30764f33cc01af
SHA1f9f9de98bcc35d1528bdc6ab537b49f352e32b19
SHA2562fd08ad4b2122ab7af4f185d84c4ca70bb7c89f16bd98a8e3bbefbef2a91a5ee
SHA5120370589f52f5ad55fbeaecca2487c2b374cb936a46f40e7837b70f163eb839007109ac8671da22de1efb74875e73bab45c24c5b2c327f25cbfe8e7613f1940b7