Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 02:20
Static task
static1
Behavioral task
behavioral1
Sample
696d218ff65e986ac913265df8fdb0b7_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
696d218ff65e986ac913265df8fdb0b7_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
696d218ff65e986ac913265df8fdb0b7_JaffaCakes118.html
-
Size
139KB
-
MD5
696d218ff65e986ac913265df8fdb0b7
-
SHA1
10e3a3a40f08c0c22b84f13e8c1bf0de3619d277
-
SHA256
63acc0c850fccda3d389aa625a87a79e3fa639bfe16703b9662c61be643ee8d0
-
SHA512
3b2ed75fa85a7911879142e03f3b55b9c96145afaf7b7b37db99bfee60af78af5997b7a3eade6efa053f1ca0431b4a954e1e133bf8332c4e4bf9bca9a3900690
-
SSDEEP
1536:SPzT2ZqdaUtl72CMyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3om:SPG0DFMyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
msedge.exemsedge.exemsedge.exepid process 2164 msedge.exe 2164 msedge.exe 3048 msedge.exe 3048 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
Processes:
msedge.exepid process 3048 msedge.exe 3048 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 3048 wrote to memory of 2892 3048 msedge.exe msedge.exe PID 3048 wrote to memory of 2892 3048 msedge.exe msedge.exe PID 3048 wrote to memory of 3540 3048 msedge.exe msedge.exe PID 3048 wrote to memory of 3540 3048 msedge.exe msedge.exe PID 3048 wrote to memory of 3540 3048 msedge.exe msedge.exe PID 3048 wrote to memory of 3540 3048 msedge.exe msedge.exe PID 3048 wrote to memory of 3540 3048 msedge.exe msedge.exe PID 3048 wrote to memory of 3540 3048 msedge.exe msedge.exe PID 3048 wrote to memory of 3540 3048 msedge.exe msedge.exe PID 3048 wrote to memory of 3540 3048 msedge.exe msedge.exe PID 3048 wrote to memory of 3540 3048 msedge.exe msedge.exe PID 3048 wrote to memory of 3540 3048 msedge.exe msedge.exe PID 3048 wrote to memory of 3540 3048 msedge.exe msedge.exe PID 3048 wrote to memory of 3540 3048 msedge.exe msedge.exe PID 3048 wrote to memory of 3540 3048 msedge.exe msedge.exe PID 3048 wrote to memory of 3540 3048 msedge.exe msedge.exe PID 3048 wrote to memory of 3540 3048 msedge.exe msedge.exe PID 3048 wrote to memory of 3540 3048 msedge.exe msedge.exe PID 3048 wrote to memory of 3540 3048 msedge.exe msedge.exe PID 3048 wrote to memory of 3540 3048 msedge.exe msedge.exe PID 3048 wrote to memory of 3540 3048 msedge.exe msedge.exe PID 3048 wrote to memory of 3540 3048 msedge.exe msedge.exe PID 3048 wrote to memory of 3540 3048 msedge.exe msedge.exe PID 3048 wrote to memory of 3540 3048 msedge.exe msedge.exe PID 3048 wrote to memory of 3540 3048 msedge.exe msedge.exe PID 3048 wrote to memory of 3540 3048 msedge.exe msedge.exe PID 3048 wrote to memory of 3540 3048 msedge.exe msedge.exe PID 3048 wrote to memory of 3540 3048 msedge.exe msedge.exe PID 3048 wrote to memory of 3540 3048 msedge.exe msedge.exe PID 3048 wrote to memory of 3540 3048 msedge.exe msedge.exe PID 3048 wrote to memory of 3540 3048 msedge.exe msedge.exe PID 3048 wrote to memory of 3540 3048 msedge.exe msedge.exe PID 3048 wrote to memory of 3540 3048 msedge.exe msedge.exe PID 3048 wrote to memory of 3540 3048 msedge.exe msedge.exe PID 3048 wrote to memory of 3540 3048 msedge.exe msedge.exe PID 3048 wrote to memory of 3540 3048 msedge.exe msedge.exe PID 3048 wrote to memory of 3540 3048 msedge.exe msedge.exe PID 3048 wrote to memory of 3540 3048 msedge.exe msedge.exe PID 3048 wrote to memory of 3540 3048 msedge.exe msedge.exe PID 3048 wrote to memory of 3540 3048 msedge.exe msedge.exe PID 3048 wrote to memory of 3540 3048 msedge.exe msedge.exe PID 3048 wrote to memory of 3540 3048 msedge.exe msedge.exe PID 3048 wrote to memory of 2164 3048 msedge.exe msedge.exe PID 3048 wrote to memory of 2164 3048 msedge.exe msedge.exe PID 3048 wrote to memory of 2968 3048 msedge.exe msedge.exe PID 3048 wrote to memory of 2968 3048 msedge.exe msedge.exe PID 3048 wrote to memory of 2968 3048 msedge.exe msedge.exe PID 3048 wrote to memory of 2968 3048 msedge.exe msedge.exe PID 3048 wrote to memory of 2968 3048 msedge.exe msedge.exe PID 3048 wrote to memory of 2968 3048 msedge.exe msedge.exe PID 3048 wrote to memory of 2968 3048 msedge.exe msedge.exe PID 3048 wrote to memory of 2968 3048 msedge.exe msedge.exe PID 3048 wrote to memory of 2968 3048 msedge.exe msedge.exe PID 3048 wrote to memory of 2968 3048 msedge.exe msedge.exe PID 3048 wrote to memory of 2968 3048 msedge.exe msedge.exe PID 3048 wrote to memory of 2968 3048 msedge.exe msedge.exe PID 3048 wrote to memory of 2968 3048 msedge.exe msedge.exe PID 3048 wrote to memory of 2968 3048 msedge.exe msedge.exe PID 3048 wrote to memory of 2968 3048 msedge.exe msedge.exe PID 3048 wrote to memory of 2968 3048 msedge.exe msedge.exe PID 3048 wrote to memory of 2968 3048 msedge.exe msedge.exe PID 3048 wrote to memory of 2968 3048 msedge.exe msedge.exe PID 3048 wrote to memory of 2968 3048 msedge.exe msedge.exe PID 3048 wrote to memory of 2968 3048 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\696d218ff65e986ac913265df8fdb0b7_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xfc,0x10c,0x7ffc114846f8,0x7ffc11484708,0x7ffc114847182⤵PID:2892
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,8260394794262197056,16375358586601170762,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:22⤵PID:3540
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2132,8260394794262197056,16375358586601170762,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2240 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2164 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2132,8260394794262197056,16375358586601170762,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2676 /prefetch:82⤵PID:2968
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,8260394794262197056,16375358586601170762,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:1452
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,8260394794262197056,16375358586601170762,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:4148
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,8260394794262197056,16375358586601170762,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4800 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4380
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1692
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1028
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD51ac52e2503cc26baee4322f02f5b8d9c
SHA138e0cee911f5f2a24888a64780ffdf6fa72207c8
SHA256f65058c6f1a745b37a64d4c97a8e8ee940210273130cec97a67f568088b5d4d4
SHA5127670d606bc5197ecb7db3ddaecd6f74a80e6decae92b94e0e8145a7f463fa099058e89f9dfa1c45b9197c36e5e21994698186a2ec970bbdb0937fe28ca46a834
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD5b2a1398f937474c51a48b347387ee36a
SHA1922a8567f09e68a04233e84e5919043034635949
SHA2562dc0bf08246ddd5a32288c895d676017578d792349ca437b1b36e7b2f0ade6d6
SHA5124a660c0549f7a850e07d8d36dab33121af02a7bd7e9b2f0137930b4c8cd89b6c5630e408f882684e6935dcb0d5cb5e01a854950eeda252a4881458cafcc7ef7c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
6KB
MD55366195cbeeda1382b944fb207e3366b
SHA158a17b5fdc99ac87392128966067a41ba19f7bc7
SHA2569c893d720cf81f283fc559e727a14274e36d7e53df8af4d464fba5179375b7bc
SHA512c8d33eda44cbdf4fbe0a1bc5df05e89c348fe93e2330040c5a12ff6f8e65057711cee29dbb99c03574dab769d0bc65494cecc0612fa9abc41856b74b36772199
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
6KB
MD5c6771cba7e3a9f4d86e5635adb87d69b
SHA1649b02d7775e1051fd48c64e00d71797869b120e
SHA25673183e18c25f00962a0c92beece1e2b7bba2dc70119eeb549f3981a0bb8a8dfb
SHA512e35f9433dfc7c63a80092198850a053866c9c09ef9dd8ee3f11cede8f83d095c13dabe22ceef2521237619fd3f5f21c765ab28cfca9e6dd3dc229c641359bcd9
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
11KB
MD5465e5061c26b62cdf787a4e8aa4028e6
SHA118f2d5ba2b4f330916bbfc1e10554240183b47e2
SHA256f4e686ae12c5f9d4d404b50707ba679c2aa59d3ce32f0addd92fc2ff6297a5fa
SHA512e4521cf9a2f907b1302eabef3dd36925a1144705435075f03cceb9f7bd0d973aa55fdbd62f5bd63568a902518927bf400be3f44f18def21c25b71ca8bfa917be
-
\??\pipe\LOCAL\crashpad_3048_MYWWXUWSFKELMRCHMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e