Analysis
-
max time kernel
145s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 00:26
Static task
static1
Behavioral task
behavioral1
Sample
69233302a9b94f05747b1886d70b5fc3_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
69233302a9b94f05747b1886d70b5fc3_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
69233302a9b94f05747b1886d70b5fc3_JaffaCakes118.html
-
Size
32KB
-
MD5
69233302a9b94f05747b1886d70b5fc3
-
SHA1
68b97c1dad00b8be5d84340535dd04734cee52d7
-
SHA256
696f1e44e86abef1b3ed5fe16967bc6de8669993d9223bfbda9e746c8f4dd3d2
-
SHA512
69506bdc923f4ba34a5c7fe56b0b2c2985afe634fd32c317efde2ab5b2b0ca487f26f7e2205f7a42fd3d133323380ac463dac4571ed758dc347dc1b7427429e9
-
SSDEEP
192:uW79b5njHnQjxn5Q/inQiehNnXnQOkEnt+gnQTbnVnQ0MC/AIbLU/IfyINcsitOp:YQ/WxHLuxVP2ZIAlkSOc
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 4208 msedge.exe 4208 msedge.exe 2364 msedge.exe 2364 msedge.exe 2508 identity_helper.exe 2508 identity_helper.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
Processes:
msedge.exepid process 2364 msedge.exe 2364 msedge.exe 2364 msedge.exe 2364 msedge.exe 2364 msedge.exe 2364 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 2364 msedge.exe 2364 msedge.exe 2364 msedge.exe 2364 msedge.exe 2364 msedge.exe 2364 msedge.exe 2364 msedge.exe 2364 msedge.exe 2364 msedge.exe 2364 msedge.exe 2364 msedge.exe 2364 msedge.exe 2364 msedge.exe 2364 msedge.exe 2364 msedge.exe 2364 msedge.exe 2364 msedge.exe 2364 msedge.exe 2364 msedge.exe 2364 msedge.exe 2364 msedge.exe 2364 msedge.exe 2364 msedge.exe 2364 msedge.exe 2364 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 2364 msedge.exe 2364 msedge.exe 2364 msedge.exe 2364 msedge.exe 2364 msedge.exe 2364 msedge.exe 2364 msedge.exe 2364 msedge.exe 2364 msedge.exe 2364 msedge.exe 2364 msedge.exe 2364 msedge.exe 2364 msedge.exe 2364 msedge.exe 2364 msedge.exe 2364 msedge.exe 2364 msedge.exe 2364 msedge.exe 2364 msedge.exe 2364 msedge.exe 2364 msedge.exe 2364 msedge.exe 2364 msedge.exe 2364 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 2364 wrote to memory of 4712 2364 msedge.exe msedge.exe PID 2364 wrote to memory of 4712 2364 msedge.exe msedge.exe PID 2364 wrote to memory of 4964 2364 msedge.exe msedge.exe PID 2364 wrote to memory of 4964 2364 msedge.exe msedge.exe PID 2364 wrote to memory of 4964 2364 msedge.exe msedge.exe PID 2364 wrote to memory of 4964 2364 msedge.exe msedge.exe PID 2364 wrote to memory of 4964 2364 msedge.exe msedge.exe PID 2364 wrote to memory of 4964 2364 msedge.exe msedge.exe PID 2364 wrote to memory of 4964 2364 msedge.exe msedge.exe PID 2364 wrote to memory of 4964 2364 msedge.exe msedge.exe PID 2364 wrote to memory of 4964 2364 msedge.exe msedge.exe PID 2364 wrote to memory of 4964 2364 msedge.exe msedge.exe PID 2364 wrote to memory of 4964 2364 msedge.exe msedge.exe PID 2364 wrote to memory of 4964 2364 msedge.exe msedge.exe PID 2364 wrote to memory of 4964 2364 msedge.exe msedge.exe PID 2364 wrote to memory of 4964 2364 msedge.exe msedge.exe PID 2364 wrote to memory of 4964 2364 msedge.exe msedge.exe PID 2364 wrote to memory of 4964 2364 msedge.exe msedge.exe PID 2364 wrote to memory of 4964 2364 msedge.exe msedge.exe PID 2364 wrote to memory of 4964 2364 msedge.exe msedge.exe PID 2364 wrote to memory of 4964 2364 msedge.exe msedge.exe PID 2364 wrote to memory of 4964 2364 msedge.exe msedge.exe PID 2364 wrote to memory of 4964 2364 msedge.exe msedge.exe PID 2364 wrote to memory of 4964 2364 msedge.exe msedge.exe PID 2364 wrote to memory of 4964 2364 msedge.exe msedge.exe PID 2364 wrote to memory of 4964 2364 msedge.exe msedge.exe PID 2364 wrote to memory of 4964 2364 msedge.exe msedge.exe PID 2364 wrote to memory of 4964 2364 msedge.exe msedge.exe PID 2364 wrote to memory of 4964 2364 msedge.exe msedge.exe PID 2364 wrote to memory of 4964 2364 msedge.exe msedge.exe PID 2364 wrote to memory of 4964 2364 msedge.exe msedge.exe PID 2364 wrote to memory of 4964 2364 msedge.exe msedge.exe PID 2364 wrote to memory of 4964 2364 msedge.exe msedge.exe PID 2364 wrote to memory of 4964 2364 msedge.exe msedge.exe PID 2364 wrote to memory of 4964 2364 msedge.exe msedge.exe PID 2364 wrote to memory of 4964 2364 msedge.exe msedge.exe PID 2364 wrote to memory of 4964 2364 msedge.exe msedge.exe PID 2364 wrote to memory of 4964 2364 msedge.exe msedge.exe PID 2364 wrote to memory of 4964 2364 msedge.exe msedge.exe PID 2364 wrote to memory of 4964 2364 msedge.exe msedge.exe PID 2364 wrote to memory of 4964 2364 msedge.exe msedge.exe PID 2364 wrote to memory of 4964 2364 msedge.exe msedge.exe PID 2364 wrote to memory of 4208 2364 msedge.exe msedge.exe PID 2364 wrote to memory of 4208 2364 msedge.exe msedge.exe PID 2364 wrote to memory of 3372 2364 msedge.exe msedge.exe PID 2364 wrote to memory of 3372 2364 msedge.exe msedge.exe PID 2364 wrote to memory of 3372 2364 msedge.exe msedge.exe PID 2364 wrote to memory of 3372 2364 msedge.exe msedge.exe PID 2364 wrote to memory of 3372 2364 msedge.exe msedge.exe PID 2364 wrote to memory of 3372 2364 msedge.exe msedge.exe PID 2364 wrote to memory of 3372 2364 msedge.exe msedge.exe PID 2364 wrote to memory of 3372 2364 msedge.exe msedge.exe PID 2364 wrote to memory of 3372 2364 msedge.exe msedge.exe PID 2364 wrote to memory of 3372 2364 msedge.exe msedge.exe PID 2364 wrote to memory of 3372 2364 msedge.exe msedge.exe PID 2364 wrote to memory of 3372 2364 msedge.exe msedge.exe PID 2364 wrote to memory of 3372 2364 msedge.exe msedge.exe PID 2364 wrote to memory of 3372 2364 msedge.exe msedge.exe PID 2364 wrote to memory of 3372 2364 msedge.exe msedge.exe PID 2364 wrote to memory of 3372 2364 msedge.exe msedge.exe PID 2364 wrote to memory of 3372 2364 msedge.exe msedge.exe PID 2364 wrote to memory of 3372 2364 msedge.exe msedge.exe PID 2364 wrote to memory of 3372 2364 msedge.exe msedge.exe PID 2364 wrote to memory of 3372 2364 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\69233302a9b94f05747b1886d70b5fc3_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb44b146f8,0x7ffb44b14708,0x7ffb44b147182⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,4597389069314079887,17433210850711008845,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,4597389069314079887,17433210850711008845,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2144 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2080,4597389069314079887,17433210850711008845,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2804 /prefetch:82⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,4597389069314079887,17433210850711008845,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,4597389069314079887,17433210850711008845,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,4597389069314079887,17433210850711008845,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5092 /prefetch:82⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,4597389069314079887,17433210850711008845,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5092 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,4597389069314079887,17433210850711008845,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5160 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,4597389069314079887,17433210850711008845,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5184 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,4597389069314079887,17433210850711008845,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5408 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,4597389069314079887,17433210850711008845,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3964 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,4597389069314079887,17433210850711008845,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5540 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD51ac52e2503cc26baee4322f02f5b8d9c
SHA138e0cee911f5f2a24888a64780ffdf6fa72207c8
SHA256f65058c6f1a745b37a64d4c97a8e8ee940210273130cec97a67f568088b5d4d4
SHA5127670d606bc5197ecb7db3ddaecd6f74a80e6decae92b94e0e8145a7f463fa099058e89f9dfa1c45b9197c36e5e21994698186a2ec970bbdb0937fe28ca46a834
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD5b2a1398f937474c51a48b347387ee36a
SHA1922a8567f09e68a04233e84e5919043034635949
SHA2562dc0bf08246ddd5a32288c895d676017578d792349ca437b1b36e7b2f0ade6d6
SHA5124a660c0549f7a850e07d8d36dab33121af02a7bd7e9b2f0137930b4c8cd89b6c5630e408f882684e6935dcb0d5cb5e01a854950eeda252a4881458cafcc7ef7c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
5KB
MD56769738638e69b06453454494fd8d727
SHA1428b5df0921895ceb6cb281e6b77a7cc7e8ee001
SHA256958e023aadf2659c2f66354a0a05d5f1b6f824227b21f5fd7f78a2194052875c
SHA5122de72bcf59f252186f800be4c77e465a17b23342283e6b62f1245b51bd3bc633159cf90d25720e2cd408f57556580defbd0ceb914c4c3374e59c9a3d8f733a18
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
6KB
MD5e1a4f70a4036d7e761c8c907ee070415
SHA1053b36987f627ddac8cb487d068b75b672bc2aca
SHA2566e0ccaeeb49e8277531d862349f874b0d48e07afaa4457dfdf037deefa3254ca
SHA5125d3074fdf49af5809fe3ae57643710149e7af39da5dcaae72a72d91c175788ba020cbb479745aac9afe719ebe092fcb33156eeee39962d7dcde68e7aa4456349
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENTFilesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
11KB
MD56fd307856473a5dbbad550199c809ec6
SHA145227fa8960267edbe5747813c80f11aa08d9ecc
SHA25648ac36f63fde085a3d748476238333f2eca2c333648ff2cad346dd80a36b54b2
SHA512d521e3b20ef5812a3d3ff863ae8535ffbc37bc7c1a220eb4451d1474ab4c3a938b17bdeeec8c2bcd3f50230c9137a0ee5f187d3e87f6390348cbc03bf62f3b63
-
\??\pipe\LOCAL\crashpad_2364_EKBSJUFRBLGCIFVOMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e