Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
25-05-2024 10:12
Static task
static1
Behavioral task
behavioral1
Sample
719c34dd1979ca20367af1b8500d5502_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
719c34dd1979ca20367af1b8500d5502_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
719c34dd1979ca20367af1b8500d5502_JaffaCakes118.html
-
Size
48KB
-
MD5
719c34dd1979ca20367af1b8500d5502
-
SHA1
54a1bbf842cf4bc0ad7589505b8ec266970cfef6
-
SHA256
b1a0daaa7fa7d84a628735ab8b58815c9c647e13f300315ba593afa3d9b2a024
-
SHA512
f664118be202d7803273541a75431d0286ad9dc79bfab91847c9dfac1dae56200bcf8a076bf5342a849aefdd78528f4e266caa3079ed4e21984d918154b4e4e6
-
SSDEEP
1536:TuwW1RlSWQIaAkNnh9e4eIaedgePqv5ljeSAfasNdhN:jW1RAWBAfashN
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1168 msedge.exe 1168 msedge.exe 2156 msedge.exe 2156 msedge.exe 2924 identity_helper.exe 2924 identity_helper.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2156 wrote to memory of 3316 2156 msedge.exe 82 PID 2156 wrote to memory of 3316 2156 msedge.exe 82 PID 2156 wrote to memory of 4508 2156 msedge.exe 83 PID 2156 wrote to memory of 4508 2156 msedge.exe 83 PID 2156 wrote to memory of 4508 2156 msedge.exe 83 PID 2156 wrote to memory of 4508 2156 msedge.exe 83 PID 2156 wrote to memory of 4508 2156 msedge.exe 83 PID 2156 wrote to memory of 4508 2156 msedge.exe 83 PID 2156 wrote to memory of 4508 2156 msedge.exe 83 PID 2156 wrote to memory of 4508 2156 msedge.exe 83 PID 2156 wrote to memory of 4508 2156 msedge.exe 83 PID 2156 wrote to memory of 4508 2156 msedge.exe 83 PID 2156 wrote to memory of 4508 2156 msedge.exe 83 PID 2156 wrote to memory of 4508 2156 msedge.exe 83 PID 2156 wrote to memory of 4508 2156 msedge.exe 83 PID 2156 wrote to memory of 4508 2156 msedge.exe 83 PID 2156 wrote to memory of 4508 2156 msedge.exe 83 PID 2156 wrote to memory of 4508 2156 msedge.exe 83 PID 2156 wrote to memory of 4508 2156 msedge.exe 83 PID 2156 wrote to memory of 4508 2156 msedge.exe 83 PID 2156 wrote to memory of 4508 2156 msedge.exe 83 PID 2156 wrote to memory of 4508 2156 msedge.exe 83 PID 2156 wrote to memory of 4508 2156 msedge.exe 83 PID 2156 wrote to memory of 4508 2156 msedge.exe 83 PID 2156 wrote to memory of 4508 2156 msedge.exe 83 PID 2156 wrote to memory of 4508 2156 msedge.exe 83 PID 2156 wrote to memory of 4508 2156 msedge.exe 83 PID 2156 wrote to memory of 4508 2156 msedge.exe 83 PID 2156 wrote to memory of 4508 2156 msedge.exe 83 PID 2156 wrote to memory of 4508 2156 msedge.exe 83 PID 2156 wrote to memory of 4508 2156 msedge.exe 83 PID 2156 wrote to memory of 4508 2156 msedge.exe 83 PID 2156 wrote to memory of 4508 2156 msedge.exe 83 PID 2156 wrote to memory of 4508 2156 msedge.exe 83 PID 2156 wrote to memory of 4508 2156 msedge.exe 83 PID 2156 wrote to memory of 4508 2156 msedge.exe 83 PID 2156 wrote to memory of 4508 2156 msedge.exe 83 PID 2156 wrote to memory of 4508 2156 msedge.exe 83 PID 2156 wrote to memory of 4508 2156 msedge.exe 83 PID 2156 wrote to memory of 4508 2156 msedge.exe 83 PID 2156 wrote to memory of 4508 2156 msedge.exe 83 PID 2156 wrote to memory of 4508 2156 msedge.exe 83 PID 2156 wrote to memory of 1168 2156 msedge.exe 84 PID 2156 wrote to memory of 1168 2156 msedge.exe 84 PID 2156 wrote to memory of 1416 2156 msedge.exe 85 PID 2156 wrote to memory of 1416 2156 msedge.exe 85 PID 2156 wrote to memory of 1416 2156 msedge.exe 85 PID 2156 wrote to memory of 1416 2156 msedge.exe 85 PID 2156 wrote to memory of 1416 2156 msedge.exe 85 PID 2156 wrote to memory of 1416 2156 msedge.exe 85 PID 2156 wrote to memory of 1416 2156 msedge.exe 85 PID 2156 wrote to memory of 1416 2156 msedge.exe 85 PID 2156 wrote to memory of 1416 2156 msedge.exe 85 PID 2156 wrote to memory of 1416 2156 msedge.exe 85 PID 2156 wrote to memory of 1416 2156 msedge.exe 85 PID 2156 wrote to memory of 1416 2156 msedge.exe 85 PID 2156 wrote to memory of 1416 2156 msedge.exe 85 PID 2156 wrote to memory of 1416 2156 msedge.exe 85 PID 2156 wrote to memory of 1416 2156 msedge.exe 85 PID 2156 wrote to memory of 1416 2156 msedge.exe 85 PID 2156 wrote to memory of 1416 2156 msedge.exe 85 PID 2156 wrote to memory of 1416 2156 msedge.exe 85 PID 2156 wrote to memory of 1416 2156 msedge.exe 85 PID 2156 wrote to memory of 1416 2156 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\719c34dd1979ca20367af1b8500d5502_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffceba246f8,0x7ffceba24708,0x7ffceba247182⤵PID:3316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,9534301712278237367,11818171066844938716,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:22⤵PID:4508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,9534301712278237367,11818171066844938716,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2204 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,9534301712278237367,11818171066844938716,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2684 /prefetch:82⤵PID:1416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,9534301712278237367,11818171066844938716,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3192 /prefetch:12⤵PID:4632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,9534301712278237367,11818171066844938716,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,9534301712278237367,11818171066844938716,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5156 /prefetch:12⤵PID:1432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,9534301712278237367,11818171066844938716,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5628 /prefetch:82⤵PID:744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,9534301712278237367,11818171066844938716,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5628 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,9534301712278237367,11818171066844938716,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5064 /prefetch:12⤵PID:1228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,9534301712278237367,11818171066844938716,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5032 /prefetch:12⤵PID:4208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,9534301712278237367,11818171066844938716,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4060 /prefetch:12⤵PID:3748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,9534301712278237367,11818171066844938716,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4704 /prefetch:12⤵PID:3588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,9534301712278237367,11818171066844938716,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2068 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1788
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1448
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4440
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ae54e9db2e89f2c54da8cc0bfcbd26bd
SHA1a88af6c673609ecbc51a1a60dfbc8577830d2b5d
SHA2565009d3c953de63cfd14a7d911156c514e179ff07d2b94382d9caac6040cb72af
SHA512e3b70e5eb7321b9deca6f6a17424a15b9fd5c4008bd3789bd01099fd13cb2f4a2f37fe4b920fb51c50517745b576c1f94df83efd1a7e75949551163985599998
-
Filesize
152B
MD5f53207a5ca2ef5c7e976cbb3cb26d870
SHA149a8cc44f53da77bb3dfb36fc7676ed54675db43
SHA25619ab4e3c9da6d9cedda7461efdba9a2085e743513ab89f1dd0fd5a8f9486ad23
SHA512be734c7e8afda19f445912aef0d78f9941add29baebd4a812bff27f10a1d78b52aeb11c551468c8644443c86e1a2a6b2e4aead3d7f81d39925e3c20406ac1499
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD575c47759900019fcbecc24294aa46cd6
SHA1079e69f4ae11a297ef0f8f1955d0fb38e4e73ca1
SHA256f11c2c893c454c149d526b7c0a77128da0926c9925de18cc29dbc7b752c909b1
SHA512566ce66e4487faac98f07a41b098a2a0252a88e08126991778bf41a8a4987b74a6ae88f72641784ad4fa473755f8ebcb0ea1348a1f539978156f6c73c19a165c
-
Filesize
5KB
MD54992dcf901630797775d2b64c812ece2
SHA1322f7a955d12c6247e2f6cc1bc892e2ad44e8044
SHA256c223cdf8a79b3eda29c10e53052447e3f8a6d3039347b83644e83ef7cb9991dd
SHA51241c775b8c19c38c92120e4235b95bceb8b76907c9ca04a518d5f7daf413d255fdb0f192c70482b5da68a5000b9209961484b0a74e9a9d4e3bbc902974b55f27c
-
Filesize
6KB
MD5933f8179bc87b9f219c48c2c704ec465
SHA126da9c994693ff2353804d116b93d623217970a3
SHA256e78f9dc0131e0e4dbc13d63f8443f0887d7d3731806fd1d06ff7f981c94d3bfb
SHA51236d3fbb4058f1e2d1a65566f4866d838a6d90a49613726f34d33b75da93fdfd9b61a3a5b85b6d109b0ad8e03d5ecc6643bb42f057fd278e3e2c94684c039e4b8
-
Filesize
6KB
MD51b8e6a5c0a6c134efd01ed095b90a337
SHA18994cbde55be1875d90ef75b2b7578d57db6dd6f
SHA256c82a939b9f5d8d0f2fed239ec3a3ad14beaf5edfe3836ba69eadfab64818e54f
SHA51269903926c6ec39a494c398e52b61f8ae6857ff4d73a014128e1b6164b981d63aa73b5380eb09b8762ade45541d4faed315583b30bffb046cb74aacd51818c41c
-
Filesize
372B
MD554315c3c14626fd596f38e9dbfb1bc09
SHA1166aecfd978a9bbdb197a7c0ad4495345340edb4
SHA256d518b3b0a4712059e62b4829818e3a6316bb5bb95d45572390d6427b1c2559bb
SHA512c20a84a1fc1e701b0974acce79aae624dc09f5890429e9077adcdd93f24baa186ca1907c983ee5c6ea2cf60768f9a9b92c124f286405136fca8ac90fa90266e9
-
Filesize
372B
MD590c5f682f1a1658c72c9b7071e799b34
SHA183e1e645ba974acd3952cfe6793a36311b9c6ea8
SHA2560015cade2ab02d5d4dae691cbe589a23580506d6bd4b84ef2dce8ca8cefa28f7
SHA5125785ec7fd15a6e7cf5373848ad198297312d311f24bd7de4255568aba3a26a9257994f6d6464a540b704985cdafda69408a0864bfb7e1ebde42c31826aa92678
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\e2b6a2ea-d108-40a1-95a3-50df68b9ec63.tmp
Filesize314B
MD537c3314b7b65083114d824ff9d5336b6
SHA1877480c27df21c4a30c9be272da13d058396e7c4
SHA256b233957e09b8505afa40228df8e9c677eb15bab5d060b186780b941f49f783cc
SHA5129736bd3b460a1db32dae44785ec71143aa22958ebaff31cbda700dd331b9bd4d738d311ffd175b77ca5bf66c2fe8cddb48d0f8c10c503c6854f042c7c9524bf4
-
Filesize
20KB
MD5e8e1f8273c10625d8b5e1541f8cab8fd
SHA118d7a3b3362fc592407e5b174a8fb60a128ce544
SHA25645870d39eb491375c12251d35194e916ace795b1a67e02841e1bbcb14f1a0e44
SHA512ca77d40ec247d16bc50302f8b13c79b37ab1fcf81c1f8ab50f2fc5430d4fabc74f5845c781bd11bb55840184e6765c2f18b28af72e1f7800fe0bb0b1f3f23b24
-
Filesize
11KB
MD5f04611d62c3cd42e134e25bc76ad31ee
SHA176f62365e5ea56f87ba1ebf086908d74f3f1c586
SHA2562af4b7287b8a64d2cea012713481b740a7f206759febbc1ddec4789d3c6d021f
SHA5128a7b8205dde9c8781491f7bcb85289067beae9a0f5c4f30ca9f5e48d77cf1075857bacc01a25953620852d7d72f9f60f9731624ce5d3cad5cf2185b0b9a3ae72