Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
26-05-2024 09:29
Static task
static1
Behavioral task
behavioral1
Sample
7508ff73bebadb873d6a6831dc3209d2_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
7508ff73bebadb873d6a6831dc3209d2_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
7508ff73bebadb873d6a6831dc3209d2_JaffaCakes118.html
-
Size
168KB
-
MD5
7508ff73bebadb873d6a6831dc3209d2
-
SHA1
06b3fc62e4884f4a28c29c68e5ff5776ff533cf4
-
SHA256
79a1673c440d5ff95c7fd9a0791b0faecbed1e27f74b8247097bfd3a07f49875
-
SHA512
c3a5c9576a2118c0dd3d22a6d9a96f926932f9ae4c883094516db6b38619eb2288a1830695e9d60be9631b614b4720fecb63271200a8e026772a4a719ce1e66a
-
SSDEEP
3072:maujrSM35KUP13G4k5QhLpOatVpwFG75vljcV22wOoS/0Ib+b+FmKgMx3uf9zShm:mauqE3G4k5QhL8atVpQ22wOoS/0Ib+bR
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3320 msedge.exe 3320 msedge.exe 2816 msedge.exe 2816 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2816 wrote to memory of 2312 2816 msedge.exe 83 PID 2816 wrote to memory of 2312 2816 msedge.exe 83 PID 2816 wrote to memory of 3976 2816 msedge.exe 84 PID 2816 wrote to memory of 3976 2816 msedge.exe 84 PID 2816 wrote to memory of 3976 2816 msedge.exe 84 PID 2816 wrote to memory of 3976 2816 msedge.exe 84 PID 2816 wrote to memory of 3976 2816 msedge.exe 84 PID 2816 wrote to memory of 3976 2816 msedge.exe 84 PID 2816 wrote to memory of 3976 2816 msedge.exe 84 PID 2816 wrote to memory of 3976 2816 msedge.exe 84 PID 2816 wrote to memory of 3976 2816 msedge.exe 84 PID 2816 wrote to memory of 3976 2816 msedge.exe 84 PID 2816 wrote to memory of 3976 2816 msedge.exe 84 PID 2816 wrote to memory of 3976 2816 msedge.exe 84 PID 2816 wrote to memory of 3976 2816 msedge.exe 84 PID 2816 wrote to memory of 3976 2816 msedge.exe 84 PID 2816 wrote to memory of 3976 2816 msedge.exe 84 PID 2816 wrote to memory of 3976 2816 msedge.exe 84 PID 2816 wrote to memory of 3976 2816 msedge.exe 84 PID 2816 wrote to memory of 3976 2816 msedge.exe 84 PID 2816 wrote to memory of 3976 2816 msedge.exe 84 PID 2816 wrote to memory of 3976 2816 msedge.exe 84 PID 2816 wrote to memory of 3976 2816 msedge.exe 84 PID 2816 wrote to memory of 3976 2816 msedge.exe 84 PID 2816 wrote to memory of 3976 2816 msedge.exe 84 PID 2816 wrote to memory of 3976 2816 msedge.exe 84 PID 2816 wrote to memory of 3976 2816 msedge.exe 84 PID 2816 wrote to memory of 3976 2816 msedge.exe 84 PID 2816 wrote to memory of 3976 2816 msedge.exe 84 PID 2816 wrote to memory of 3976 2816 msedge.exe 84 PID 2816 wrote to memory of 3976 2816 msedge.exe 84 PID 2816 wrote to memory of 3976 2816 msedge.exe 84 PID 2816 wrote to memory of 3976 2816 msedge.exe 84 PID 2816 wrote to memory of 3976 2816 msedge.exe 84 PID 2816 wrote to memory of 3976 2816 msedge.exe 84 PID 2816 wrote to memory of 3976 2816 msedge.exe 84 PID 2816 wrote to memory of 3976 2816 msedge.exe 84 PID 2816 wrote to memory of 3976 2816 msedge.exe 84 PID 2816 wrote to memory of 3976 2816 msedge.exe 84 PID 2816 wrote to memory of 3976 2816 msedge.exe 84 PID 2816 wrote to memory of 3976 2816 msedge.exe 84 PID 2816 wrote to memory of 3976 2816 msedge.exe 84 PID 2816 wrote to memory of 3320 2816 msedge.exe 85 PID 2816 wrote to memory of 3320 2816 msedge.exe 85 PID 2816 wrote to memory of 3844 2816 msedge.exe 86 PID 2816 wrote to memory of 3844 2816 msedge.exe 86 PID 2816 wrote to memory of 3844 2816 msedge.exe 86 PID 2816 wrote to memory of 3844 2816 msedge.exe 86 PID 2816 wrote to memory of 3844 2816 msedge.exe 86 PID 2816 wrote to memory of 3844 2816 msedge.exe 86 PID 2816 wrote to memory of 3844 2816 msedge.exe 86 PID 2816 wrote to memory of 3844 2816 msedge.exe 86 PID 2816 wrote to memory of 3844 2816 msedge.exe 86 PID 2816 wrote to memory of 3844 2816 msedge.exe 86 PID 2816 wrote to memory of 3844 2816 msedge.exe 86 PID 2816 wrote to memory of 3844 2816 msedge.exe 86 PID 2816 wrote to memory of 3844 2816 msedge.exe 86 PID 2816 wrote to memory of 3844 2816 msedge.exe 86 PID 2816 wrote to memory of 3844 2816 msedge.exe 86 PID 2816 wrote to memory of 3844 2816 msedge.exe 86 PID 2816 wrote to memory of 3844 2816 msedge.exe 86 PID 2816 wrote to memory of 3844 2816 msedge.exe 86 PID 2816 wrote to memory of 3844 2816 msedge.exe 86 PID 2816 wrote to memory of 3844 2816 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\7508ff73bebadb873d6a6831dc3209d2_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcca3d46f8,0x7ffcca3d4708,0x7ffcca3d47182⤵PID:2312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2200,1163100420506421518,1221126476054125726,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2220 /prefetch:22⤵PID:3976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2200,1163100420506421518,1221126476054125726,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2272 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2200,1163100420506421518,1221126476054125726,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2812 /prefetch:82⤵PID:3844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,1163100420506421518,1221126476054125726,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:1524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,1163100420506421518,1221126476054125726,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:2172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,1163100420506421518,1221126476054125726,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6136 /prefetch:12⤵PID:2452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2200,1163100420506421518,1221126476054125726,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4792 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,1163100420506421518,1221126476054125726,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4964 /prefetch:12⤵PID:4052
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4836
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1980
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD58fe1925c52af1e0938b92be3b400a01a
SHA1d3a12c0405fe4b75e24d6f2278df6c3c94d88846
SHA2562c661dd04d7a153d49acf635c3bb517cd69862db35a0c758dc457448197cc2ac
SHA5127ab0a9fdc23775f063f70c990adc02ebaa8133532bb62660bbd428ddfcce69aec7b7ff26e03126855129647f6ddbb944d14d4dd3b26b445f530a2edc909ef054
-
Filesize
152B
MD54b4f91fa1b362ba5341ecb2836438dea
SHA19561f5aabed742404d455da735259a2c6781fa07
SHA256d824b742eace197ddc8b6ed5d918f390fde4b0fbf0e371b8e1f2ed40a3b6455c
SHA512fef22217dcdd8000bc193e25129699d4b8f7a103ca4fe1613baf73ccf67090d9fbae27eb93e4bb8747455853a0a4326f2d0c38df41c8d42351cdcd4132418dac
-
Filesize
152B
MD5eaa3db555ab5bc0cb364826204aad3f0
SHA1a4cdfaac8de49e6e6e88b335cfeaa7c9e3c563ca
SHA256ef7baeb1b2ab05ff3c5fbb76c2759db49294654548706c7c8e87f0cde855b86b
SHA512e13981da51b52c15261ecabb98af32f9b920651b46b10ce0cc823c5878b22eb1420258c80deef204070d1e0bdd3a64d875ac2522e3713a3cf11657aa55aeccd4
-
Filesize
22KB
MD55e74c6d871232d6fe5d88711ece1408b
SHA11a5d3ac31e833df4c091f14c94a2ecd1c6294875
SHA256bcadf445d413314a44375c63418a0f255fbac7afae40be0a80c9231751176105
SHA5129d001eabce7ffdbf8e338725ef07f0033d0780ea474b7d33c2ad63886ff3578d818eb5c9b130d726353cd813160b49f572736dd288cece84e9bd8b784ce530d5
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD56c494692d4412f9a0efea61fb47548a9
SHA1f40c9f334c8b90a6b35b79bf3ce014b5ccb86e1f
SHA256e7cd042066f56ab336a806078acc7120982512593a49108a1155f4da2e78f7b8
SHA5124d56029ca64d57b50be7a9bc30516a0f9ba85d877bf42566ba6c635697d2593b505af01966493a893c4b25f55fe9bf6cecc6fdbbca156a2967e34bc5cad8635f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD56cdc39bfe75133e4f8177c67916e92bb
SHA169ac0c7091a291dc31feb04bc1fa60b9958c03f0
SHA25681680400eed3cabc34e19c99582de94be55e27066b858a89020c645305232f43
SHA51272986d1c98c079194153479904ee6c4554fe8414dfcf170af020a9a042df977122a6396d68097a00aaca00430e99273ead9b7a8bfd6de1d99f183043560a6768
-
Filesize
3KB
MD5d31d579d4b24cbc230a412b0b912d44d
SHA193efb21a797581427761c5c6d2bb6a175ab3b6c1
SHA2568e87624608498e2fc13cdbaede3aa7e8f1a983c410ae1907afa8c89c843ee8d9
SHA512d2ce998ee19d50bcfaf8bc5db990ec2e0bb5610dd2215037ea952354d86b2b2690e3dcca83e51be7cd48c3d6904439fb273f8c1eb5de23aaee03d99b1e9f2d28
-
Filesize
5KB
MD5eeda7a31b1c296be5c92298513cdd438
SHA11502c5538049cdc80fd34174baa730c22a207ee2
SHA256e47cb8452f4d90cd7f0b3a80a3dfbfc1c1ddab83b3d8a874b8fc0fdf4824efa5
SHA512809b487818a4c361559e1196d3b6a4588d7d61300910be5db150aa8f4ca06092ecbb97793ea43d54562b07398f1a7892df23ce6e44c4069ab67ff2720690ef28
-
Filesize
6KB
MD56c07a59a2d0dbdabf0d58503c9f36938
SHA1c66ca1afcf2a057d6f660e5c743850715378df4f
SHA2562355ee8988f689a3e2db01fb587c34464e69641011d51c2e10e51340791c4ca6
SHA51243f4f92e8a92a19e94c8cdef246ecf30cb9ccf9513330e419b99d675ac3f68d946567fe26242cb005a1d6f884def64bf726e230ac6aebeaad26a7e87ccd7c6ed
-
Filesize
371B
MD5cf3ca2ef0745e98eb0c8228f2b54201c
SHA1c4a552bddfd699d557b2ffe4ec4f8dcd9ad2f798
SHA256ceee6c15ca4ce95708439d2499a0b174910ac091655ba7c96954ec789057ce1f
SHA512850700477f6bfa98a60df483694abbb4228cfcd6b403486579b239929c476ae97c8490f2a53264a9a3c6e5e4c47c5ed0c754540f6f85eb8c723adae8aa4c3077
-
Filesize
371B
MD5e68ea77d506d0a126614ae8d857db9ea
SHA1cfcb6b6746a3655d3799d24a23e93d266f5aa494
SHA256ac8686d0499597a1d767aed55690562f2ecb1c6c56e1b52a85f2a9b1515ace60
SHA51268c6560cd63f06a57e440b847df6bb6c1e639cf515750c72917d4eff535a69527a1abde9ff973f133813cfe3dd0971fbd024bcd4e20f9cad651e74e14b32e925
-
Filesize
706B
MD500bbdb7bdb3a0f801f0f84d30252416b
SHA12e377ffd179b96a0fb3b229a6a85f6277e97c1e3
SHA256c01dbe8d407f69db0ae1d3ed8f766d4597d41d1b02d30751a1bf281502263ea6
SHA5124a325ada7f9c917e7d1493f54a822835ee1f494e6d6917edb72a5cfb80a633acef1a3f322f601169f0453398652f2ee30a958f9200e2784a1a48290d3edb5480
-
Filesize
204B
MD515010935db90dfc39a8c49714ff07181
SHA1132b5ba2ae3d3ab33df4e8b275f1d41405086b6e
SHA2562057e56fd3157cc47430c1b2637b4a15169f3dea0ef9cc1317a7b9298a47d849
SHA512f446e445dce14f2cc8540e979cddec91c158d38a6d8a9378a64982c919290830d799c6aa6ffa7476a482f008830f71f2ac94816ba1f2e63b72ace130e352fef8