Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
26-05-2024 09:23
Static task
static1
Behavioral task
behavioral1
Sample
75042aabc9d266ddc25c07cd5f051e54_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
75042aabc9d266ddc25c07cd5f051e54_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
75042aabc9d266ddc25c07cd5f051e54_JaffaCakes118.html
-
Size
4KB
-
MD5
75042aabc9d266ddc25c07cd5f051e54
-
SHA1
4d9bfd03d63b696d7f1a4457508bb4ee26f2b86a
-
SHA256
b76142a895da565d0e844b1d02da6a1b80d8afde6e4bb23713d244dd194fc455
-
SHA512
ad6a9ba2068a9efc1df0cb84ba57fec424681b6f8d271c994e1701b21a309adb3751be57f66685d37256a0a35e737d13234bc12512742d813128472c7981dd93
-
SSDEEP
48:CbOoLv+J8ByVTgekV5govmZzKN/vo3xJYqk6bRASTCY1dTd//43BZY4vmCksOU/l:Ci8Pg8OzoW4sGSTLWwC5Xs54mC8Tk9
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2636 msedge.exe 2636 msedge.exe 3376 msedge.exe 3376 msedge.exe 4368 identity_helper.exe 4368 identity_helper.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe 3600 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3376 wrote to memory of 3084 3376 msedge.exe 82 PID 3376 wrote to memory of 3084 3376 msedge.exe 82 PID 3376 wrote to memory of 1164 3376 msedge.exe 83 PID 3376 wrote to memory of 1164 3376 msedge.exe 83 PID 3376 wrote to memory of 1164 3376 msedge.exe 83 PID 3376 wrote to memory of 1164 3376 msedge.exe 83 PID 3376 wrote to memory of 1164 3376 msedge.exe 83 PID 3376 wrote to memory of 1164 3376 msedge.exe 83 PID 3376 wrote to memory of 1164 3376 msedge.exe 83 PID 3376 wrote to memory of 1164 3376 msedge.exe 83 PID 3376 wrote to memory of 1164 3376 msedge.exe 83 PID 3376 wrote to memory of 1164 3376 msedge.exe 83 PID 3376 wrote to memory of 1164 3376 msedge.exe 83 PID 3376 wrote to memory of 1164 3376 msedge.exe 83 PID 3376 wrote to memory of 1164 3376 msedge.exe 83 PID 3376 wrote to memory of 1164 3376 msedge.exe 83 PID 3376 wrote to memory of 1164 3376 msedge.exe 83 PID 3376 wrote to memory of 1164 3376 msedge.exe 83 PID 3376 wrote to memory of 1164 3376 msedge.exe 83 PID 3376 wrote to memory of 1164 3376 msedge.exe 83 PID 3376 wrote to memory of 1164 3376 msedge.exe 83 PID 3376 wrote to memory of 1164 3376 msedge.exe 83 PID 3376 wrote to memory of 1164 3376 msedge.exe 83 PID 3376 wrote to memory of 1164 3376 msedge.exe 83 PID 3376 wrote to memory of 1164 3376 msedge.exe 83 PID 3376 wrote to memory of 1164 3376 msedge.exe 83 PID 3376 wrote to memory of 1164 3376 msedge.exe 83 PID 3376 wrote to memory of 1164 3376 msedge.exe 83 PID 3376 wrote to memory of 1164 3376 msedge.exe 83 PID 3376 wrote to memory of 1164 3376 msedge.exe 83 PID 3376 wrote to memory of 1164 3376 msedge.exe 83 PID 3376 wrote to memory of 1164 3376 msedge.exe 83 PID 3376 wrote to memory of 1164 3376 msedge.exe 83 PID 3376 wrote to memory of 1164 3376 msedge.exe 83 PID 3376 wrote to memory of 1164 3376 msedge.exe 83 PID 3376 wrote to memory of 1164 3376 msedge.exe 83 PID 3376 wrote to memory of 1164 3376 msedge.exe 83 PID 3376 wrote to memory of 1164 3376 msedge.exe 83 PID 3376 wrote to memory of 1164 3376 msedge.exe 83 PID 3376 wrote to memory of 1164 3376 msedge.exe 83 PID 3376 wrote to memory of 1164 3376 msedge.exe 83 PID 3376 wrote to memory of 1164 3376 msedge.exe 83 PID 3376 wrote to memory of 2636 3376 msedge.exe 84 PID 3376 wrote to memory of 2636 3376 msedge.exe 84 PID 3376 wrote to memory of 5036 3376 msedge.exe 85 PID 3376 wrote to memory of 5036 3376 msedge.exe 85 PID 3376 wrote to memory of 5036 3376 msedge.exe 85 PID 3376 wrote to memory of 5036 3376 msedge.exe 85 PID 3376 wrote to memory of 5036 3376 msedge.exe 85 PID 3376 wrote to memory of 5036 3376 msedge.exe 85 PID 3376 wrote to memory of 5036 3376 msedge.exe 85 PID 3376 wrote to memory of 5036 3376 msedge.exe 85 PID 3376 wrote to memory of 5036 3376 msedge.exe 85 PID 3376 wrote to memory of 5036 3376 msedge.exe 85 PID 3376 wrote to memory of 5036 3376 msedge.exe 85 PID 3376 wrote to memory of 5036 3376 msedge.exe 85 PID 3376 wrote to memory of 5036 3376 msedge.exe 85 PID 3376 wrote to memory of 5036 3376 msedge.exe 85 PID 3376 wrote to memory of 5036 3376 msedge.exe 85 PID 3376 wrote to memory of 5036 3376 msedge.exe 85 PID 3376 wrote to memory of 5036 3376 msedge.exe 85 PID 3376 wrote to memory of 5036 3376 msedge.exe 85 PID 3376 wrote to memory of 5036 3376 msedge.exe 85 PID 3376 wrote to memory of 5036 3376 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\75042aabc9d266ddc25c07cd5f051e54_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3376 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xe0,0x108,0x7ffc8b8946f8,0x7ffc8b894708,0x7ffc8b8947182⤵PID:3084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2216,13614438765561777671,8045757641872462087,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2236 /prefetch:22⤵PID:1164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2216,13614438765561777671,8045757641872462087,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2312 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2216,13614438765561777671,8045757641872462087,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2928 /prefetch:82⤵PID:5036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,13614438765561777671,8045757641872462087,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:2588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,13614438765561777671,8045757641872462087,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:1540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2216,13614438765561777671,8045757641872462087,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5888 /prefetch:82⤵PID:1528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2216,13614438765561777671,8045757641872462087,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5888 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,13614438765561777671,8045757641872462087,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5420 /prefetch:12⤵PID:4644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,13614438765561777671,8045757641872462087,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5444 /prefetch:12⤵PID:4960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,13614438765561777671,8045757641872462087,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5652 /prefetch:12⤵PID:3836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,13614438765561777671,8045757641872462087,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5560 /prefetch:12⤵PID:1904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2216,13614438765561777671,8045757641872462087,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1124 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3600
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3112
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4936
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
Filesize330B
MD5790fad8f4959df7cd46ad4eace280ab5
SHA1bd7b55875d1acdcffc1f422a5e9be39b6a8b0134
SHA25695fba1e89976022f755d093603073f247fd46b2dd1464709d094cf8a875519af
SHA512ae94b19c12ad71accc51c3017afd50b93af91cb306947fe69e3dd4b739d694c2db0ea26f379208fa4f5247fa1d1a6906f425400a3eb26e2ebc425c5fbe021c1d
-
Filesize
152B
MD51ac52e2503cc26baee4322f02f5b8d9c
SHA138e0cee911f5f2a24888a64780ffdf6fa72207c8
SHA256f65058c6f1a745b37a64d4c97a8e8ee940210273130cec97a67f568088b5d4d4
SHA5127670d606bc5197ecb7db3ddaecd6f74a80e6decae92b94e0e8145a7f463fa099058e89f9dfa1c45b9197c36e5e21994698186a2ec970bbdb0937fe28ca46a834
-
Filesize
152B
MD5b2a1398f937474c51a48b347387ee36a
SHA1922a8567f09e68a04233e84e5919043034635949
SHA2562dc0bf08246ddd5a32288c895d676017578d792349ca437b1b36e7b2f0ade6d6
SHA5124a660c0549f7a850e07d8d36dab33121af02a7bd7e9b2f0137930b4c8cd89b6c5630e408f882684e6935dcb0d5cb5e01a854950eeda252a4881458cafcc7ef7c
-
Filesize
754B
MD5757e0a7080f84f8ad4565122f6d6b384
SHA1620fa818030710d0f2f1a76ba891dc0f7fad3101
SHA256cca6bee0b393286f7a977b804d83438e0a6168db19f5e379f5ea3d1328d65729
SHA512e0b0f71aa2edca99e5de031af70f3703e868253b43d6cdcd7ef92a1f17818bbd2a05d1a8a4443013d4dcf7d5b28e07884d15d974aaf504db042e93fe0315e4bf
-
Filesize
5KB
MD54fb6f04cd7743fcc5beb6607fde1e72e
SHA1b6c0c7737441f0b36499a602b3aa35f00816bf33
SHA256ce805898ba37d76223aba0588a8b72ee09c40c3baf5983a12cbf37749f52532f
SHA51257f507e524b923472090b15727ffb850bb93f2676360dd79670da5235275c11b4938209d54c141c5029d19908df6739e91f992708e2467fc43dd7ed1597a12e7
-
Filesize
6KB
MD5919acf199e2608195c755f7cf964dab5
SHA1fb1801f4c24f2947e11ff9bc7692f8e65b1951b2
SHA25635627357579b91de9eb0b6ebc6fa51f75eab0cecee0664f8786550debc027b53
SHA5120c5fd2be88a6d1e8000c1c1cffed742deef4631910492386475cfdb793a9f4c82395e43f4b64dfb70c4216156ca496ab7211409f2fe9e83d9fabbdb2594f6bdb
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD56a18b03f605d84dbc2f57717c17a32fc
SHA11855acdf2571119105880eb1ce693c46c6a43606
SHA256f680d4565bf4bce147700b36fa621053b17ace834bf8facb4baa95d89496f732
SHA51277ef53fd09e99d35cec818bc41e1b32aea94e5b4f9ec244b56160651637198bfd6f840e3842257cd657cf901e0c81d7e84a1140ef2475c1f0fb084de426e4332