Analysis
-
max time kernel
145s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 00:11
Static task
static1
Behavioral task
behavioral1
Sample
69197429b4b6ffdb6eeca8bc51789b05_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
69197429b4b6ffdb6eeca8bc51789b05_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
69197429b4b6ffdb6eeca8bc51789b05_JaffaCakes118.html
-
Size
50KB
-
MD5
69197429b4b6ffdb6eeca8bc51789b05
-
SHA1
8d37da9a899c4a7a3bd6e2cdc65c93282257fba4
-
SHA256
0a59b419be3e45559c0f930fab760911c1423fc2d0c56d800092a37a738527de
-
SHA512
a18d3bfb20db23a1aa3cb072d3c27f0c73969657c95e80600a0c1eac1d02f589ae8e051b353e62428bac11b44bc10caba1e3d126fcb297fe3a5ae5a65e981a34
-
SSDEEP
768:IAnQzJZcpD3gGcIeU2aEUWNWPvONQNoFLw86oIi+k4g5Kx82S7Vve:IAQcpD3utU5DWNWSQoLw86T9KKxaU
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 452 msedge.exe 452 msedge.exe 4696 msedge.exe 4696 msedge.exe 5152 identity_helper.exe 5152 identity_helper.exe 5732 msedge.exe 5732 msedge.exe 5732 msedge.exe 5732 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
Processes:
msedge.exepid process 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 4696 wrote to memory of 1232 4696 msedge.exe msedge.exe PID 4696 wrote to memory of 1232 4696 msedge.exe msedge.exe PID 4696 wrote to memory of 6056 4696 msedge.exe msedge.exe PID 4696 wrote to memory of 6056 4696 msedge.exe msedge.exe PID 4696 wrote to memory of 6056 4696 msedge.exe msedge.exe PID 4696 wrote to memory of 6056 4696 msedge.exe msedge.exe PID 4696 wrote to memory of 6056 4696 msedge.exe msedge.exe PID 4696 wrote to memory of 6056 4696 msedge.exe msedge.exe PID 4696 wrote to memory of 6056 4696 msedge.exe msedge.exe PID 4696 wrote to memory of 6056 4696 msedge.exe msedge.exe PID 4696 wrote to memory of 6056 4696 msedge.exe msedge.exe PID 4696 wrote to memory of 6056 4696 msedge.exe msedge.exe PID 4696 wrote to memory of 6056 4696 msedge.exe msedge.exe PID 4696 wrote to memory of 6056 4696 msedge.exe msedge.exe PID 4696 wrote to memory of 6056 4696 msedge.exe msedge.exe PID 4696 wrote to memory of 6056 4696 msedge.exe msedge.exe PID 4696 wrote to memory of 6056 4696 msedge.exe msedge.exe PID 4696 wrote to memory of 6056 4696 msedge.exe msedge.exe PID 4696 wrote to memory of 6056 4696 msedge.exe msedge.exe PID 4696 wrote to memory of 6056 4696 msedge.exe msedge.exe PID 4696 wrote to memory of 6056 4696 msedge.exe msedge.exe PID 4696 wrote to memory of 6056 4696 msedge.exe msedge.exe PID 4696 wrote to memory of 6056 4696 msedge.exe msedge.exe PID 4696 wrote to memory of 6056 4696 msedge.exe msedge.exe PID 4696 wrote to memory of 6056 4696 msedge.exe msedge.exe PID 4696 wrote to memory of 6056 4696 msedge.exe msedge.exe PID 4696 wrote to memory of 6056 4696 msedge.exe msedge.exe PID 4696 wrote to memory of 6056 4696 msedge.exe msedge.exe PID 4696 wrote to memory of 6056 4696 msedge.exe msedge.exe PID 4696 wrote to memory of 6056 4696 msedge.exe msedge.exe PID 4696 wrote to memory of 6056 4696 msedge.exe msedge.exe PID 4696 wrote to memory of 6056 4696 msedge.exe msedge.exe PID 4696 wrote to memory of 6056 4696 msedge.exe msedge.exe PID 4696 wrote to memory of 6056 4696 msedge.exe msedge.exe PID 4696 wrote to memory of 6056 4696 msedge.exe msedge.exe PID 4696 wrote to memory of 6056 4696 msedge.exe msedge.exe PID 4696 wrote to memory of 6056 4696 msedge.exe msedge.exe PID 4696 wrote to memory of 6056 4696 msedge.exe msedge.exe PID 4696 wrote to memory of 6056 4696 msedge.exe msedge.exe PID 4696 wrote to memory of 6056 4696 msedge.exe msedge.exe PID 4696 wrote to memory of 6056 4696 msedge.exe msedge.exe PID 4696 wrote to memory of 6056 4696 msedge.exe msedge.exe PID 4696 wrote to memory of 452 4696 msedge.exe msedge.exe PID 4696 wrote to memory of 452 4696 msedge.exe msedge.exe PID 4696 wrote to memory of 5940 4696 msedge.exe msedge.exe PID 4696 wrote to memory of 5940 4696 msedge.exe msedge.exe PID 4696 wrote to memory of 5940 4696 msedge.exe msedge.exe PID 4696 wrote to memory of 5940 4696 msedge.exe msedge.exe PID 4696 wrote to memory of 5940 4696 msedge.exe msedge.exe PID 4696 wrote to memory of 5940 4696 msedge.exe msedge.exe PID 4696 wrote to memory of 5940 4696 msedge.exe msedge.exe PID 4696 wrote to memory of 5940 4696 msedge.exe msedge.exe PID 4696 wrote to memory of 5940 4696 msedge.exe msedge.exe PID 4696 wrote to memory of 5940 4696 msedge.exe msedge.exe PID 4696 wrote to memory of 5940 4696 msedge.exe msedge.exe PID 4696 wrote to memory of 5940 4696 msedge.exe msedge.exe PID 4696 wrote to memory of 5940 4696 msedge.exe msedge.exe PID 4696 wrote to memory of 5940 4696 msedge.exe msedge.exe PID 4696 wrote to memory of 5940 4696 msedge.exe msedge.exe PID 4696 wrote to memory of 5940 4696 msedge.exe msedge.exe PID 4696 wrote to memory of 5940 4696 msedge.exe msedge.exe PID 4696 wrote to memory of 5940 4696 msedge.exe msedge.exe PID 4696 wrote to memory of 5940 4696 msedge.exe msedge.exe PID 4696 wrote to memory of 5940 4696 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\69197429b4b6ffdb6eeca8bc51789b05_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4696 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffab54046f8,0x7ffab5404708,0x7ffab54047182⤵PID:1232
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,10623887773862331804,13497915243304064951,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:22⤵PID:6056
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,10623887773862331804,13497915243304064951,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2308 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:452 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,10623887773862331804,13497915243304064951,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2876 /prefetch:82⤵PID:5940
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,10623887773862331804,13497915243304064951,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:3688
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,10623887773862331804,13497915243304064951,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:5424
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,10623887773862331804,13497915243304064951,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4692 /prefetch:12⤵PID:5172
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,10623887773862331804,13497915243304064951,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6040 /prefetch:82⤵PID:5176
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,10623887773862331804,13497915243304064951,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6040 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5152 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,10623887773862331804,13497915243304064951,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5912 /prefetch:12⤵PID:2904
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,10623887773862331804,13497915243304064951,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5924 /prefetch:12⤵PID:3964
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,10623887773862331804,13497915243304064951,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5124 /prefetch:12⤵PID:1716
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,10623887773862331804,13497915243304064951,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5544 /prefetch:12⤵PID:1976
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,10623887773862331804,13497915243304064951,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5024 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5732
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3888
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4604
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ae54e9db2e89f2c54da8cc0bfcbd26bd
SHA1a88af6c673609ecbc51a1a60dfbc8577830d2b5d
SHA2565009d3c953de63cfd14a7d911156c514e179ff07d2b94382d9caac6040cb72af
SHA512e3b70e5eb7321b9deca6f6a17424a15b9fd5c4008bd3789bd01099fd13cb2f4a2f37fe4b920fb51c50517745b576c1f94df83efd1a7e75949551163985599998
-
Filesize
152B
MD5f53207a5ca2ef5c7e976cbb3cb26d870
SHA149a8cc44f53da77bb3dfb36fc7676ed54675db43
SHA25619ab4e3c9da6d9cedda7461efdba9a2085e743513ab89f1dd0fd5a8f9486ad23
SHA512be734c7e8afda19f445912aef0d78f9941add29baebd4a812bff27f10a1d78b52aeb11c551468c8644443c86e1a2a6b2e4aead3d7f81d39925e3c20406ac1499
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\1de84a5e-2bc4-4881-8273-f8441d1351ce.tmp
Filesize1KB
MD560a862528a822b91303b342cdd0fa11f
SHA183abe618fab4dbec62cc8d1517bf6798abc3147e
SHA2566ee828173224fecf9eeed1abb39ff243dce039ea49472a75cf37c138c391b570
SHA512f4107ab2378210f7eafc5758371a34ec04862fab54eca4b65275de40a12e7c10c3a39599bb87dfa3d4c073b5356d778d328f880efe1754143e796e030cd93feb
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD551acfc7e5d64c9770f26bd913dcd9da0
SHA138eae5acfa86abba6b720ae687381c03443a6cff
SHA2565364f57737c8e452dc54c420710d321b57841858df9c65334d5ae1e9bf3d5dad
SHA5124a8ce4f6319f1d71556d7feebee24c90c33459c7fd507dd2b4309a7f6c3b0e2de772c306c576c053be8c602a3b89be833d381e08e314621a7e0f3ccebffeb4af
-
Filesize
5KB
MD58af6d4d86f364482452ffdd13f1a75b3
SHA16dced55df6df40a6cb16acc4e47dc0e175222c10
SHA256e3dd6aa036f10052fa8db46c0f5aada15823f556324f7168dd47213a81b6316b
SHA512b6e7042d61e23cde8d95180b8d076b64a5aec101ac60d2f206bfc901e3e0a5f72398389f6c535f5c8c898370af66c53031649bdd15e3fd6c703d9d04de4458fb
-
Filesize
7KB
MD56b46d68c67c431ce67742d1416ac09cc
SHA1d6d09c2b472a10a7eb64a0e0f4ad1a14b2a0ee63
SHA2566adac6b53d7e3af595d9559575fbd9fb63a8eac3329a184f561d950e83ff0a29
SHA512bf6a45c2595b9258e24e70f351e2b7031cb50c1e6bb00d98c4397858ffe67ae11540eba5cee00e901ff1e0f38c06c820ac66876d960e5f94695001c77a24830a
-
Filesize
7KB
MD5d0530e2987e42cf4362eb9e72deec8cf
SHA181c76544289923a175a483f3c17c24398160b572
SHA2563e3168fa4c53f75d4982dd77e8e4c10947292f083ec19d1797b73140bca915f0
SHA512ab3fa7f62a94a7ac36bd934313d993d70c1fee1caf49cb1d3828adcb79c500ced653c5d23d031704ef748583fc9bcd816f29060f20d1e715855c144095f4504c
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5714fa3d476e5ce7a569d68f2a5181ad4
SHA1cc5cece3f1f7186d524bdba6484ccaaf9fcf924a
SHA2567d58d116e93c1e5ad43c62bf6be6b4fabc665de4b1cac9692b3c03851e861475
SHA512fad83b473a20c1624ca00f1161395217000118922665f6a426ed61b5d93bce71dae6235b0f30521db0076d5b3f7876256fec4775e89171b4da54b0a18ec014c8
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e