Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
26/05/2024, 15:36
Static task
static1
Behavioral task
behavioral1
Sample
75f2dd885ea53dce7d4006ed62045628_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
75f2dd885ea53dce7d4006ed62045628_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
75f2dd885ea53dce7d4006ed62045628_JaffaCakes118.html
-
Size
36KB
-
MD5
75f2dd885ea53dce7d4006ed62045628
-
SHA1
f71752e98b8ea1ac12374460a234f14c50d3d6a2
-
SHA256
cd720951c5689adb4339fb9d21250fec3a93c246ccad7c4e7b2a9225cdb36ad3
-
SHA512
2fb5efaea96081685ad359390c821849ed0b441c898c39e2178d5e3781477e504e2c17d8eea754266941931510b7a4445246fe8cd8ab46c75bd5f563e6f9ce08
-
SSDEEP
768:zwx/MDTHoy88hARtZPXEE1XnXrFLxNLlDNoPqkPTHlnkM3Gr6ThZOg6f9U56lLRK:Q/TbJxNVNufSM/P8TK
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2364 msedge.exe 2364 msedge.exe 2512 msedge.exe 2512 msedge.exe 2932 identity_helper.exe 2932 identity_helper.exe 5832 msedge.exe 5832 msedge.exe 5832 msedge.exe 5832 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2512 wrote to memory of 2192 2512 msedge.exe 81 PID 2512 wrote to memory of 2192 2512 msedge.exe 81 PID 2512 wrote to memory of 4324 2512 msedge.exe 82 PID 2512 wrote to memory of 4324 2512 msedge.exe 82 PID 2512 wrote to memory of 4324 2512 msedge.exe 82 PID 2512 wrote to memory of 4324 2512 msedge.exe 82 PID 2512 wrote to memory of 4324 2512 msedge.exe 82 PID 2512 wrote to memory of 4324 2512 msedge.exe 82 PID 2512 wrote to memory of 4324 2512 msedge.exe 82 PID 2512 wrote to memory of 4324 2512 msedge.exe 82 PID 2512 wrote to memory of 4324 2512 msedge.exe 82 PID 2512 wrote to memory of 4324 2512 msedge.exe 82 PID 2512 wrote to memory of 4324 2512 msedge.exe 82 PID 2512 wrote to memory of 4324 2512 msedge.exe 82 PID 2512 wrote to memory of 4324 2512 msedge.exe 82 PID 2512 wrote to memory of 4324 2512 msedge.exe 82 PID 2512 wrote to memory of 4324 2512 msedge.exe 82 PID 2512 wrote to memory of 4324 2512 msedge.exe 82 PID 2512 wrote to memory of 4324 2512 msedge.exe 82 PID 2512 wrote to memory of 4324 2512 msedge.exe 82 PID 2512 wrote to memory of 4324 2512 msedge.exe 82 PID 2512 wrote to memory of 4324 2512 msedge.exe 82 PID 2512 wrote to memory of 4324 2512 msedge.exe 82 PID 2512 wrote to memory of 4324 2512 msedge.exe 82 PID 2512 wrote to memory of 4324 2512 msedge.exe 82 PID 2512 wrote to memory of 4324 2512 msedge.exe 82 PID 2512 wrote to memory of 4324 2512 msedge.exe 82 PID 2512 wrote to memory of 4324 2512 msedge.exe 82 PID 2512 wrote to memory of 4324 2512 msedge.exe 82 PID 2512 wrote to memory of 4324 2512 msedge.exe 82 PID 2512 wrote to memory of 4324 2512 msedge.exe 82 PID 2512 wrote to memory of 4324 2512 msedge.exe 82 PID 2512 wrote to memory of 4324 2512 msedge.exe 82 PID 2512 wrote to memory of 4324 2512 msedge.exe 82 PID 2512 wrote to memory of 4324 2512 msedge.exe 82 PID 2512 wrote to memory of 4324 2512 msedge.exe 82 PID 2512 wrote to memory of 4324 2512 msedge.exe 82 PID 2512 wrote to memory of 4324 2512 msedge.exe 82 PID 2512 wrote to memory of 4324 2512 msedge.exe 82 PID 2512 wrote to memory of 4324 2512 msedge.exe 82 PID 2512 wrote to memory of 4324 2512 msedge.exe 82 PID 2512 wrote to memory of 4324 2512 msedge.exe 82 PID 2512 wrote to memory of 2364 2512 msedge.exe 83 PID 2512 wrote to memory of 2364 2512 msedge.exe 83 PID 2512 wrote to memory of 1032 2512 msedge.exe 84 PID 2512 wrote to memory of 1032 2512 msedge.exe 84 PID 2512 wrote to memory of 1032 2512 msedge.exe 84 PID 2512 wrote to memory of 1032 2512 msedge.exe 84 PID 2512 wrote to memory of 1032 2512 msedge.exe 84 PID 2512 wrote to memory of 1032 2512 msedge.exe 84 PID 2512 wrote to memory of 1032 2512 msedge.exe 84 PID 2512 wrote to memory of 1032 2512 msedge.exe 84 PID 2512 wrote to memory of 1032 2512 msedge.exe 84 PID 2512 wrote to memory of 1032 2512 msedge.exe 84 PID 2512 wrote to memory of 1032 2512 msedge.exe 84 PID 2512 wrote to memory of 1032 2512 msedge.exe 84 PID 2512 wrote to memory of 1032 2512 msedge.exe 84 PID 2512 wrote to memory of 1032 2512 msedge.exe 84 PID 2512 wrote to memory of 1032 2512 msedge.exe 84 PID 2512 wrote to memory of 1032 2512 msedge.exe 84 PID 2512 wrote to memory of 1032 2512 msedge.exe 84 PID 2512 wrote to memory of 1032 2512 msedge.exe 84 PID 2512 wrote to memory of 1032 2512 msedge.exe 84 PID 2512 wrote to memory of 1032 2512 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\75f2dd885ea53dce7d4006ed62045628_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffae23946f8,0x7ffae2394708,0x7ffae23947182⤵PID:2192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,5976063960095874190,12345664526076186735,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:22⤵PID:4324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,5976063960095874190,12345664526076186735,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2248 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,5976063960095874190,12345664526076186735,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2792 /prefetch:82⤵PID:1032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,5976063960095874190,12345664526076186735,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:1576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,5976063960095874190,12345664526076186735,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:2296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,5976063960095874190,12345664526076186735,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5400 /prefetch:82⤵PID:5392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,5976063960095874190,12345664526076186735,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5400 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,5976063960095874190,12345664526076186735,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5244 /prefetch:12⤵PID:1440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,5976063960095874190,12345664526076186735,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5240 /prefetch:12⤵PID:2812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,5976063960095874190,12345664526076186735,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4124 /prefetch:12⤵PID:3848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,5976063960095874190,12345664526076186735,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3404 /prefetch:12⤵PID:4328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,5976063960095874190,12345664526076186735,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3120 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5832
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5012
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:6084
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52daa93382bba07cbc40af372d30ec576
SHA1c5e709dc3e2e4df2ff841fbde3e30170e7428a94
SHA2561826d2a57b1938c148bf212a47d947ed1bfb26cfc55868931f843ee438117f30
SHA51265635cb59c81548a9ef8fdb0942331e7f3cd0c30ce1d4dba48aed72dbb27b06511a55d2aeaadfadbbb4b7cb4b2e2772bbabba9603b3f7d9c8b9e4a7fbf3d6b6b
-
Filesize
152B
MD5ecdc2754d7d2ae862272153aa9b9ca6e
SHA1c19bed1c6e1c998b9fa93298639ad7961339147d
SHA256a13d791473f836edcab0e93451ce7b7182efbbc54261b2b5644d319e047a00a7
SHA512cd4fb81317d540f8b15f1495a381bb6f0f129b8923a7c06e4b5cf777d2625c30304aee6cc68aa20479e08d84e5030b43fbe93e479602400334dfdd7297f702f2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\5fc63872-4d4b-48af-9156-6f88eec29284.tmp
Filesize5KB
MD5381ee4cd6878bcc371c46f55f776f7e2
SHA1acbb86982d03b45e859ff0c06edb2077d030276c
SHA25608da95f05800651f7e7958cdc586642a34d8e871d7d13dd0d842f80d68e96c27
SHA5124f7556ac8ce168d4172c29ce6b5e22087482ea9b0244918c747e375e6d1d7015e4cfbcbf473c60157a61f415f2d2015748b9ee74832a72caa054336e2a9ee0ad
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
613B
MD5c4ca2c54a4bf0b1cf8bb8334ee417f9e
SHA15067e8f41c33c94baf602881266be8565ae0557d
SHA25612044c136e1216e6752a0884904259218549673309e9bd27acc7bf6f49dec798
SHA512f1892b6ba65c0bb59775b0e1fab91bc9c746e887e680baa07c486a63aaff89717d57a0d822852f2c5ff891c1c3d01427cb71f290ad7d2184cbd1e9e15bdbee59
-
Filesize
6KB
MD5ce1e72403d85460f6c594d158cb0a6e6
SHA1733df0a3614efe7d07b53bd097a87e945ccee732
SHA256a5ff615aa6b2b74fc032c339b0b3c87691748ae5f9a7ce9bf60826a0808fe8d2
SHA512235aa4ed6dc26e9286ccbc2c8e2a8247beb79363e7bc736d951d293dfbaf3517964ffbe8dc193e467536553295a00ca57dd48d37cdf5d5320f250acbe0286b52
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5890c7bd312c95eb44e195d7803868c05
SHA1da03ad238f066c7ee83c7b5cb637a5b8e9172803
SHA256a8c00ca62d3fb4df376ca94b2dd60b2ecb3acd0926285a49536f5201de44592d
SHA5124ee9aa68e5fdbe22d6146e49319a1206e32787452310e0ebcee23ca5b0c1960cd08a4526edbdcb3c3574270d590fc27fdb66ec26590deecd8173ea235dc4c7bf