Analysis
-
max time kernel
145s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 23:03
Static task
static1
Behavioral task
behavioral1
Sample
68f117d2f42cc1289f483d695e5e7b87_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
68f117d2f42cc1289f483d695e5e7b87_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
68f117d2f42cc1289f483d695e5e7b87_JaffaCakes118.html
-
Size
461KB
-
MD5
68f117d2f42cc1289f483d695e5e7b87
-
SHA1
35df89d3118589c975d14a48b76128c5865cac2e
-
SHA256
13ed8525c2bc6d42d76eaffab8b1e7dc29fe17f84917aa8152ad16302f7147f1
-
SHA512
d4dcc8e07801bc3f72796c4a74f59f1d522644dacdb821e1ecebe4ff76d9bbb74f6472cdb3f21bd75896fadfd728c8defda6e465a86500988107a311311cdf80
-
SSDEEP
6144:SJsMYod+X3oI+YJQusMYod+X3oI+Yw7sMYod+X3oI+YLsMYod+X3oI+YQ:Q5d+X3P5d+X3E5d+X315d+X3+
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 4000 msedge.exe 4000 msedge.exe 3332 msedge.exe 3332 msedge.exe 4068 identity_helper.exe 4068 identity_helper.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
Processes:
msedge.exepid process 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe 3332 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 3332 wrote to memory of 4600 3332 msedge.exe msedge.exe PID 3332 wrote to memory of 4600 3332 msedge.exe msedge.exe PID 3332 wrote to memory of 1616 3332 msedge.exe msedge.exe PID 3332 wrote to memory of 1616 3332 msedge.exe msedge.exe PID 3332 wrote to memory of 1616 3332 msedge.exe msedge.exe PID 3332 wrote to memory of 1616 3332 msedge.exe msedge.exe PID 3332 wrote to memory of 1616 3332 msedge.exe msedge.exe PID 3332 wrote to memory of 1616 3332 msedge.exe msedge.exe PID 3332 wrote to memory of 1616 3332 msedge.exe msedge.exe PID 3332 wrote to memory of 1616 3332 msedge.exe msedge.exe PID 3332 wrote to memory of 1616 3332 msedge.exe msedge.exe PID 3332 wrote to memory of 1616 3332 msedge.exe msedge.exe PID 3332 wrote to memory of 1616 3332 msedge.exe msedge.exe PID 3332 wrote to memory of 1616 3332 msedge.exe msedge.exe PID 3332 wrote to memory of 1616 3332 msedge.exe msedge.exe PID 3332 wrote to memory of 1616 3332 msedge.exe msedge.exe PID 3332 wrote to memory of 1616 3332 msedge.exe msedge.exe PID 3332 wrote to memory of 1616 3332 msedge.exe msedge.exe PID 3332 wrote to memory of 1616 3332 msedge.exe msedge.exe PID 3332 wrote to memory of 1616 3332 msedge.exe msedge.exe PID 3332 wrote to memory of 1616 3332 msedge.exe msedge.exe PID 3332 wrote to memory of 1616 3332 msedge.exe msedge.exe PID 3332 wrote to memory of 1616 3332 msedge.exe msedge.exe PID 3332 wrote to memory of 1616 3332 msedge.exe msedge.exe PID 3332 wrote to memory of 1616 3332 msedge.exe msedge.exe PID 3332 wrote to memory of 1616 3332 msedge.exe msedge.exe PID 3332 wrote to memory of 1616 3332 msedge.exe msedge.exe PID 3332 wrote to memory of 1616 3332 msedge.exe msedge.exe PID 3332 wrote to memory of 1616 3332 msedge.exe msedge.exe PID 3332 wrote to memory of 1616 3332 msedge.exe msedge.exe PID 3332 wrote to memory of 1616 3332 msedge.exe msedge.exe PID 3332 wrote to memory of 1616 3332 msedge.exe msedge.exe PID 3332 wrote to memory of 1616 3332 msedge.exe msedge.exe PID 3332 wrote to memory of 1616 3332 msedge.exe msedge.exe PID 3332 wrote to memory of 1616 3332 msedge.exe msedge.exe PID 3332 wrote to memory of 1616 3332 msedge.exe msedge.exe PID 3332 wrote to memory of 1616 3332 msedge.exe msedge.exe PID 3332 wrote to memory of 1616 3332 msedge.exe msedge.exe PID 3332 wrote to memory of 1616 3332 msedge.exe msedge.exe PID 3332 wrote to memory of 1616 3332 msedge.exe msedge.exe PID 3332 wrote to memory of 1616 3332 msedge.exe msedge.exe PID 3332 wrote to memory of 1616 3332 msedge.exe msedge.exe PID 3332 wrote to memory of 4000 3332 msedge.exe msedge.exe PID 3332 wrote to memory of 4000 3332 msedge.exe msedge.exe PID 3332 wrote to memory of 1672 3332 msedge.exe msedge.exe PID 3332 wrote to memory of 1672 3332 msedge.exe msedge.exe PID 3332 wrote to memory of 1672 3332 msedge.exe msedge.exe PID 3332 wrote to memory of 1672 3332 msedge.exe msedge.exe PID 3332 wrote to memory of 1672 3332 msedge.exe msedge.exe PID 3332 wrote to memory of 1672 3332 msedge.exe msedge.exe PID 3332 wrote to memory of 1672 3332 msedge.exe msedge.exe PID 3332 wrote to memory of 1672 3332 msedge.exe msedge.exe PID 3332 wrote to memory of 1672 3332 msedge.exe msedge.exe PID 3332 wrote to memory of 1672 3332 msedge.exe msedge.exe PID 3332 wrote to memory of 1672 3332 msedge.exe msedge.exe PID 3332 wrote to memory of 1672 3332 msedge.exe msedge.exe PID 3332 wrote to memory of 1672 3332 msedge.exe msedge.exe PID 3332 wrote to memory of 1672 3332 msedge.exe msedge.exe PID 3332 wrote to memory of 1672 3332 msedge.exe msedge.exe PID 3332 wrote to memory of 1672 3332 msedge.exe msedge.exe PID 3332 wrote to memory of 1672 3332 msedge.exe msedge.exe PID 3332 wrote to memory of 1672 3332 msedge.exe msedge.exe PID 3332 wrote to memory of 1672 3332 msedge.exe msedge.exe PID 3332 wrote to memory of 1672 3332 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\68f117d2f42cc1289f483d695e5e7b87_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0x78,0x108,0x7ff9584f46f8,0x7ff9584f4708,0x7ff9584f47182⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2180,13443654109373402414,17192668571746221141,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2192 /prefetch:22⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2180,13443654109373402414,17192668571746221141,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2260 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2180,13443654109373402414,17192668571746221141,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1468 /prefetch:82⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,13443654109373402414,17192668571746221141,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,13443654109373402414,17192668571746221141,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2180,13443654109373402414,17192668571746221141,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4736 /prefetch:82⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2180,13443654109373402414,17192668571746221141,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4736 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,13443654109373402414,17192668571746221141,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4108 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,13443654109373402414,17192668571746221141,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5152 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,13443654109373402414,17192668571746221141,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3872 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,13443654109373402414,17192668571746221141,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3440 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2180,13443654109373402414,17192668571746221141,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2396 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD51ac52e2503cc26baee4322f02f5b8d9c
SHA138e0cee911f5f2a24888a64780ffdf6fa72207c8
SHA256f65058c6f1a745b37a64d4c97a8e8ee940210273130cec97a67f568088b5d4d4
SHA5127670d606bc5197ecb7db3ddaecd6f74a80e6decae92b94e0e8145a7f463fa099058e89f9dfa1c45b9197c36e5e21994698186a2ec970bbdb0937fe28ca46a834
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD5b2a1398f937474c51a48b347387ee36a
SHA1922a8567f09e68a04233e84e5919043034635949
SHA2562dc0bf08246ddd5a32288c895d676017578d792349ca437b1b36e7b2f0ade6d6
SHA5124a660c0549f7a850e07d8d36dab33121af02a7bd7e9b2f0137930b4c8cd89b6c5630e408f882684e6935dcb0d5cb5e01a854950eeda252a4881458cafcc7ef7c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
6KB
MD5afd38b172dfc12bdcd8c40eb4f50d777
SHA193c90d0110dbbe0f79fbecb6749d1cc03464a315
SHA256006a839e72f5fa66cd55b25858f37736e53cf8400c926316c39a1adee1f049a1
SHA512da238703475f2824e83f7aa9c1e498b3190e5e1f078682ec1646330a61a4353716728bbefbb8bef827c7265b2f111af48108a606c8bffe3faeaee16b5065d49d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
5KB
MD576a136e413faa7323607a92923266930
SHA162c669f75d1c570210993e196628f3ef4a005a1f
SHA2561366587c138733c4515d16aa7845378d07a82364c5c3b7e2ccb5a03488ad3586
SHA5120a01d3e89ddacf7d2e9de21d82230377cedc0d13331a2ad81e4c4a855f66548792cb525256abd33cec3b95ce2097482e106a41a99f5b046d437356abcebee682
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENTFilesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENTFilesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
11KB
MD5165ebb949dd6557d05ee8508a2df38f7
SHA11648ea7b86723835bc4011a0ccc8822ad906168b
SHA256a9ec984d289afbb3e1a4a8a9d6d7f4029cb148c9009b8a5e794cb5d5698d4da7
SHA512d63ef6e00f75cd40a45247a17a0a09a638f9aca8508e3a443d2b852d965ba4046a33aaac9c360a92b95f9cfb31412c0a14ec782451bb5c5a5df826b572a0cad4
-
\??\pipe\LOCAL\crashpad_3332_LCFILQVKUZVNYZQMMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e