Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 21:39
Static task
static1
Behavioral task
behavioral1
Sample
68b9eca4ab772f9769bff3cba18b6cff_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
68b9eca4ab772f9769bff3cba18b6cff_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
68b9eca4ab772f9769bff3cba18b6cff_JaffaCakes118.html
-
Size
61KB
-
MD5
68b9eca4ab772f9769bff3cba18b6cff
-
SHA1
28378d4c9e64e7b87e9086cfbd590e4e2f37b6cc
-
SHA256
35f2bbf75eaec9edf5c7146fb1d4ff982865a928648da46dbe2664b29bdcc0e5
-
SHA512
e857be359892fbc4026f2e01f41084e7a623ae081bb018ae69044c68b2ede909c5a8bddaab9069a8f118cbf8191f1ad7a85e9e51bae02ed9f6603973c079c43c
-
SSDEEP
1536:VVAF/1G2TgW3ApLNODyCdFU9Xllo7QvkEB6GRW:VU/SprCdFUR6GRW
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 2376 msedge.exe 2376 msedge.exe 4016 msedge.exe 4016 msedge.exe 2304 identity_helper.exe 2304 identity_helper.exe 5592 msedge.exe 5592 msedge.exe 5592 msedge.exe 5592 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
Processes:
msedge.exepid process 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 4016 wrote to memory of 4848 4016 msedge.exe msedge.exe PID 4016 wrote to memory of 4848 4016 msedge.exe msedge.exe PID 4016 wrote to memory of 4752 4016 msedge.exe msedge.exe PID 4016 wrote to memory of 4752 4016 msedge.exe msedge.exe PID 4016 wrote to memory of 4752 4016 msedge.exe msedge.exe PID 4016 wrote to memory of 4752 4016 msedge.exe msedge.exe PID 4016 wrote to memory of 4752 4016 msedge.exe msedge.exe PID 4016 wrote to memory of 4752 4016 msedge.exe msedge.exe PID 4016 wrote to memory of 4752 4016 msedge.exe msedge.exe PID 4016 wrote to memory of 4752 4016 msedge.exe msedge.exe PID 4016 wrote to memory of 4752 4016 msedge.exe msedge.exe PID 4016 wrote to memory of 4752 4016 msedge.exe msedge.exe PID 4016 wrote to memory of 4752 4016 msedge.exe msedge.exe PID 4016 wrote to memory of 4752 4016 msedge.exe msedge.exe PID 4016 wrote to memory of 4752 4016 msedge.exe msedge.exe PID 4016 wrote to memory of 4752 4016 msedge.exe msedge.exe PID 4016 wrote to memory of 4752 4016 msedge.exe msedge.exe PID 4016 wrote to memory of 4752 4016 msedge.exe msedge.exe PID 4016 wrote to memory of 4752 4016 msedge.exe msedge.exe PID 4016 wrote to memory of 4752 4016 msedge.exe msedge.exe PID 4016 wrote to memory of 4752 4016 msedge.exe msedge.exe PID 4016 wrote to memory of 4752 4016 msedge.exe msedge.exe PID 4016 wrote to memory of 4752 4016 msedge.exe msedge.exe PID 4016 wrote to memory of 4752 4016 msedge.exe msedge.exe PID 4016 wrote to memory of 4752 4016 msedge.exe msedge.exe PID 4016 wrote to memory of 4752 4016 msedge.exe msedge.exe PID 4016 wrote to memory of 4752 4016 msedge.exe msedge.exe PID 4016 wrote to memory of 4752 4016 msedge.exe msedge.exe PID 4016 wrote to memory of 4752 4016 msedge.exe msedge.exe PID 4016 wrote to memory of 4752 4016 msedge.exe msedge.exe PID 4016 wrote to memory of 4752 4016 msedge.exe msedge.exe PID 4016 wrote to memory of 4752 4016 msedge.exe msedge.exe PID 4016 wrote to memory of 4752 4016 msedge.exe msedge.exe PID 4016 wrote to memory of 4752 4016 msedge.exe msedge.exe PID 4016 wrote to memory of 4752 4016 msedge.exe msedge.exe PID 4016 wrote to memory of 4752 4016 msedge.exe msedge.exe PID 4016 wrote to memory of 4752 4016 msedge.exe msedge.exe PID 4016 wrote to memory of 4752 4016 msedge.exe msedge.exe PID 4016 wrote to memory of 4752 4016 msedge.exe msedge.exe PID 4016 wrote to memory of 4752 4016 msedge.exe msedge.exe PID 4016 wrote to memory of 4752 4016 msedge.exe msedge.exe PID 4016 wrote to memory of 4752 4016 msedge.exe msedge.exe PID 4016 wrote to memory of 2376 4016 msedge.exe msedge.exe PID 4016 wrote to memory of 2376 4016 msedge.exe msedge.exe PID 4016 wrote to memory of 1760 4016 msedge.exe msedge.exe PID 4016 wrote to memory of 1760 4016 msedge.exe msedge.exe PID 4016 wrote to memory of 1760 4016 msedge.exe msedge.exe PID 4016 wrote to memory of 1760 4016 msedge.exe msedge.exe PID 4016 wrote to memory of 1760 4016 msedge.exe msedge.exe PID 4016 wrote to memory of 1760 4016 msedge.exe msedge.exe PID 4016 wrote to memory of 1760 4016 msedge.exe msedge.exe PID 4016 wrote to memory of 1760 4016 msedge.exe msedge.exe PID 4016 wrote to memory of 1760 4016 msedge.exe msedge.exe PID 4016 wrote to memory of 1760 4016 msedge.exe msedge.exe PID 4016 wrote to memory of 1760 4016 msedge.exe msedge.exe PID 4016 wrote to memory of 1760 4016 msedge.exe msedge.exe PID 4016 wrote to memory of 1760 4016 msedge.exe msedge.exe PID 4016 wrote to memory of 1760 4016 msedge.exe msedge.exe PID 4016 wrote to memory of 1760 4016 msedge.exe msedge.exe PID 4016 wrote to memory of 1760 4016 msedge.exe msedge.exe PID 4016 wrote to memory of 1760 4016 msedge.exe msedge.exe PID 4016 wrote to memory of 1760 4016 msedge.exe msedge.exe PID 4016 wrote to memory of 1760 4016 msedge.exe msedge.exe PID 4016 wrote to memory of 1760 4016 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\68b9eca4ab772f9769bff3cba18b6cff_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffaa37e46f8,0x7ffaa37e4708,0x7ffaa37e47182⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,62559910804487446,6351582891476234996,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:22⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,62559910804487446,6351582891476234996,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2476 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,62559910804487446,6351582891476234996,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2848 /prefetch:82⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,62559910804487446,6351582891476234996,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,62559910804487446,6351582891476234996,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,62559910804487446,6351582891476234996,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6128 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,62559910804487446,6351582891476234996,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5636 /prefetch:82⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,62559910804487446,6351582891476234996,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5636 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,62559910804487446,6351582891476234996,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4628 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,62559910804487446,6351582891476234996,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4992 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,62559910804487446,6351582891476234996,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5620 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,62559910804487446,6351582891476234996,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5628 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,62559910804487446,6351582891476234996,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3136 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
96B
MD57950c20f1edb255a0000f7d80e562b14
SHA1ed2f3982d2433b9268fbf5fca4cdf80ed5facc21
SHA25638da00d927a1252e6f6b2392793ad789df6b095c084d98816fddf9aca69be4cb
SHA512f47969d361731a3d04e7ff3f19877190acac83e0bd0d695f2e95edc77bedea8ea0100603816bc5797d2e03e56f2998c1646f757c6f70554aeeea116d66449893
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent StateFilesize
1KB
MD5c197ce587d8a9e19f0c110663e280ab6
SHA10fd3a372bf92c0dcda7d2764038da367bba82493
SHA2567af345ca3fca820164746ed4f50d632d5097ac3045fdb395dabd66a78578cf43
SHA512a226188facb8be305cd924b28ba0dd198bc79a4cb24c53d644ff476a7d4cb435a9c97d956f0abc29853de699b3e77ebf96fc24fe9ed2f92482734b62c2f6fab5
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
5KB
MD57e52569fc775ca1202301da0001b5034
SHA17a14665c6c6721d5fa53796ba091e4e21dd51d74
SHA256236d06a2204014d4161beb1de1729ffa2ef52ac7c5e235c506d23611a513e47f
SHA512872c447e1ce0e9b26c1f8039cabc9addd33d25dfb7567a9f2133298892a8041a284980e4f68a38146d577c181b285b9cd06306fe01a2cd22394b218a6efb3f76
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
6KB
MD505c8b74e3df0cdfed0213699906b115f
SHA1a97569c8eeb5d6468201906d2829d479f825e83d
SHA25622ba555b793bcbce8bd2d96215e55b0bf178429b2676bf6882ec8dd06c5d01cd
SHA512b493aafd2f3261d06b9c0d6360a5584a99430dcd4793bfab1ff4fee4ef97b6dbd27408a28a27b402dd7630f0df9852db88758a107179b9c171d45d188143b246
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
6KB
MD5a4214e6f475881683d0c4ef68542db6b
SHA11b15acba1c6e39b3be951612ccd69de52e38d7a5
SHA2567c4e6c1c1c1e3e3c1b058d9e0132beb1da147545ff124ffaf873381882670970
SHA512f8bf94548a0d54e23bbffc13f7f74ad13c11831ec478ba6d5cb656e483a00ec0baf026958ac544bcfa7b65ac55fc023982ff44f0c48462dfa316fb36b59a9b13
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\000004.dbtmpFilesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
11KB
MD5c7f9e6e72395e563a3ca627ede6bda34
SHA198521fac8a42a1b602202d9218cc64c6c30b2443
SHA25667eca1b52ff124dda36f58228cfb4cd12c63a63f57c58e239845ba0445096a7e
SHA5120a8e77f958eeeb3324b2bb1955d1d32ad45b06e5a11054eefa41e5784a4ff880a1c95f19c7b8aa53173c01e955a723f74fe1499b9d39109832ed9a67f528d4d7
-
\??\pipe\LOCAL\crashpad_4016_BYSDUTCGCENMAXTKMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e