Analysis
-
max time kernel
145s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
26/05/2024, 15:06
Static task
static1
Behavioral task
behavioral1
Sample
75dffdca19b6fed793a1d80e8e3cc8bc_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
75dffdca19b6fed793a1d80e8e3cc8bc_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
75dffdca19b6fed793a1d80e8e3cc8bc_JaffaCakes118.html
-
Size
56KB
-
MD5
75dffdca19b6fed793a1d80e8e3cc8bc
-
SHA1
db6662c0a3bcfc459049486bf954bc52f209eabf
-
SHA256
2682e73e9daa4f9c7b626c8ec346a45e0d2106756ad1f74dc2127f3d920f8cf1
-
SHA512
d959b78c6d637a0d6db5fb629e95be02a31362bea4300bccea7fcb14e297b9f032b11cc9b65ae8c3a4eb6816abec6ef30a45dfbbcbc96419566595b2c5bbdb8a
-
SSDEEP
1536:60dHv7o6nbkJWBYVDk3ZY6Ct0irrsj60O3JCz:zHTrOv0orsj60O+
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4332 msedge.exe 4332 msedge.exe 5084 msedge.exe 5084 msedge.exe 312 identity_helper.exe 312 identity_helper.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe 5084 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5084 wrote to memory of 3904 5084 msedge.exe 83 PID 5084 wrote to memory of 3904 5084 msedge.exe 83 PID 5084 wrote to memory of 3952 5084 msedge.exe 84 PID 5084 wrote to memory of 3952 5084 msedge.exe 84 PID 5084 wrote to memory of 3952 5084 msedge.exe 84 PID 5084 wrote to memory of 3952 5084 msedge.exe 84 PID 5084 wrote to memory of 3952 5084 msedge.exe 84 PID 5084 wrote to memory of 3952 5084 msedge.exe 84 PID 5084 wrote to memory of 3952 5084 msedge.exe 84 PID 5084 wrote to memory of 3952 5084 msedge.exe 84 PID 5084 wrote to memory of 3952 5084 msedge.exe 84 PID 5084 wrote to memory of 3952 5084 msedge.exe 84 PID 5084 wrote to memory of 3952 5084 msedge.exe 84 PID 5084 wrote to memory of 3952 5084 msedge.exe 84 PID 5084 wrote to memory of 3952 5084 msedge.exe 84 PID 5084 wrote to memory of 3952 5084 msedge.exe 84 PID 5084 wrote to memory of 3952 5084 msedge.exe 84 PID 5084 wrote to memory of 3952 5084 msedge.exe 84 PID 5084 wrote to memory of 3952 5084 msedge.exe 84 PID 5084 wrote to memory of 3952 5084 msedge.exe 84 PID 5084 wrote to memory of 3952 5084 msedge.exe 84 PID 5084 wrote to memory of 3952 5084 msedge.exe 84 PID 5084 wrote to memory of 3952 5084 msedge.exe 84 PID 5084 wrote to memory of 3952 5084 msedge.exe 84 PID 5084 wrote to memory of 3952 5084 msedge.exe 84 PID 5084 wrote to memory of 3952 5084 msedge.exe 84 PID 5084 wrote to memory of 3952 5084 msedge.exe 84 PID 5084 wrote to memory of 3952 5084 msedge.exe 84 PID 5084 wrote to memory of 3952 5084 msedge.exe 84 PID 5084 wrote to memory of 3952 5084 msedge.exe 84 PID 5084 wrote to memory of 3952 5084 msedge.exe 84 PID 5084 wrote to memory of 3952 5084 msedge.exe 84 PID 5084 wrote to memory of 3952 5084 msedge.exe 84 PID 5084 wrote to memory of 3952 5084 msedge.exe 84 PID 5084 wrote to memory of 3952 5084 msedge.exe 84 PID 5084 wrote to memory of 3952 5084 msedge.exe 84 PID 5084 wrote to memory of 3952 5084 msedge.exe 84 PID 5084 wrote to memory of 3952 5084 msedge.exe 84 PID 5084 wrote to memory of 3952 5084 msedge.exe 84 PID 5084 wrote to memory of 3952 5084 msedge.exe 84 PID 5084 wrote to memory of 3952 5084 msedge.exe 84 PID 5084 wrote to memory of 3952 5084 msedge.exe 84 PID 5084 wrote to memory of 4332 5084 msedge.exe 85 PID 5084 wrote to memory of 4332 5084 msedge.exe 85 PID 5084 wrote to memory of 228 5084 msedge.exe 86 PID 5084 wrote to memory of 228 5084 msedge.exe 86 PID 5084 wrote to memory of 228 5084 msedge.exe 86 PID 5084 wrote to memory of 228 5084 msedge.exe 86 PID 5084 wrote to memory of 228 5084 msedge.exe 86 PID 5084 wrote to memory of 228 5084 msedge.exe 86 PID 5084 wrote to memory of 228 5084 msedge.exe 86 PID 5084 wrote to memory of 228 5084 msedge.exe 86 PID 5084 wrote to memory of 228 5084 msedge.exe 86 PID 5084 wrote to memory of 228 5084 msedge.exe 86 PID 5084 wrote to memory of 228 5084 msedge.exe 86 PID 5084 wrote to memory of 228 5084 msedge.exe 86 PID 5084 wrote to memory of 228 5084 msedge.exe 86 PID 5084 wrote to memory of 228 5084 msedge.exe 86 PID 5084 wrote to memory of 228 5084 msedge.exe 86 PID 5084 wrote to memory of 228 5084 msedge.exe 86 PID 5084 wrote to memory of 228 5084 msedge.exe 86 PID 5084 wrote to memory of 228 5084 msedge.exe 86 PID 5084 wrote to memory of 228 5084 msedge.exe 86 PID 5084 wrote to memory of 228 5084 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\75dffdca19b6fed793a1d80e8e3cc8bc_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5084 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffd6b7d46f8,0x7ffd6b7d4708,0x7ffd6b7d47182⤵PID:3904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2028,4872353797583340992,4804266126633855497,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2088 /prefetch:22⤵PID:3952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2028,4872353797583340992,4804266126633855497,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2116 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2028,4872353797583340992,4804266126633855497,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2792 /prefetch:82⤵PID:228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,4872353797583340992,4804266126633855497,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3204 /prefetch:12⤵PID:440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,4872353797583340992,4804266126633855497,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:3692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,4872353797583340992,4804266126633855497,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5164 /prefetch:12⤵PID:2008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2028,4872353797583340992,4804266126633855497,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6108 /prefetch:82⤵PID:2612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2028,4872353797583340992,4804266126633855497,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6108 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,4872353797583340992,4804266126633855497,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6112 /prefetch:12⤵PID:4504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,4872353797583340992,4804266126633855497,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4856 /prefetch:12⤵PID:1776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,4872353797583340992,4804266126633855497,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5196 /prefetch:12⤵PID:3732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,4872353797583340992,4804266126633855497,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5912 /prefetch:12⤵PID:2036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2028,4872353797583340992,4804266126633855497,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4904 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3728
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2076
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5048
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556641592f6e69f5f5fb06f2319384490
SHA16a86be42e2c6d26b7830ad9f4e2627995fd91069
SHA25602d4984e590e947265474d592e64edde840fdca7eb881eebde3e220a1d883455
SHA512c75e689b2bbbe07ebf72baf75c56f19c39f45d5593cf47535eb722f95002b3ee418027047c0ee8d63800f499038db5e2c24aff9705d830c7b6eaa290d9adc868
-
Filesize
152B
MD5612a6c4247ef652299b376221c984213
SHA1d306f3b16bde39708aa862aee372345feb559750
SHA2569d8e24c91cff338e56b518a533cb2e49a2803356bbf6e04892fb168a7ce2844a
SHA51234a14d63abb1e3fe0f9927a94393043d458fe0624843e108d290266f554018e6379cba924cb5388735abdd6c5f1e2e318478a673f3f9b762815a758866d10973
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\976efa96-e765-4e75-943e-0e66863c2504.tmp
Filesize6KB
MD52232fbd76d5ecd2e51b76b3270e7821c
SHA1a357fbf3fbf33c56795d363b1207542c7bb43b25
SHA2566f9c1d45fa1141651a6d2ebc252a2b6d61fa129795b93fa0a7f715b3a98ea74a
SHA5125b8d3c961cb880b56d96195513ae17a64d05cd81a708aa760cfe006dd29f0c995c438977f882e4807262cf17ed8e0ce750ce5f76d477108a22825c88bd8d3187
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD5a9da631caf4665a1818854ac54f9c085
SHA1c86b78e6f2b7fc5a9498ee72df1e6ce02d55eaa1
SHA2560c6643ea7e1cf16722bd80ddfd3941b631b69deaf59c8825b42311a5800113a7
SHA512a35e813c9295480c51ecf0d49b6cb1c307be9cc70206a91d704d27c2d04b48d79176741f31da469729bff6506ad82b8a18ce90a1c9239846c1523bbf80164cf7
-
Filesize
1KB
MD5a50347ecfc460cd394932d942ad0c8df
SHA1dd8db7e243ea9c0c176365f76cedca7f0e717205
SHA256f4a408ec98cf63d8f3a6db1237478fb5903210de427e0facdd16bb4e25df3712
SHA51210dbc5e9a15c24b1c268b3d8e23aac874f6dea6c2058b28f3face330e4d3fa0b2f4be5d75389d7c76452dc0d5218444efeb5c25ecf212dbb57ebba483768b790
-
Filesize
5KB
MD5726196e433a5c96f0eb38fa7e9585c97
SHA1513f1203e9b3b1ea2a7e53e655faadc6d0822c8c
SHA25653c5f9211d36fd35897029be431316181bc9c7a12afa60c3d7cc03a4f15e7cf4
SHA5127a68db24abb016b4bf11c7d0e0b619d247c729a8e4fbba25c9902abf635e520256479cadd00917ee29f6882f873712cb1b21c0f8349260d4cc53dedd861ca58e
-
Filesize
6KB
MD5881c6c83081b5320903dd7bf14bad1a4
SHA13aa8423f2e0aebb396537a19d4443a2e87f37e9b
SHA2565c04a49445c81f21aec77ae7b18076a5108cc33f5628ffc416d5a9d31cdb7536
SHA512da81569c36ac302515abe3a6bb2e93d621ac05f99829c725f15567bd4838c9967634cecef325c5b62d29f74b7bcc5feb402cf639c334b13b5d26f56a725ba920
-
Filesize
6KB
MD5b3b3bd3506180a30fc20ff077ba1f78d
SHA1541cb065a2f13a1ab4dc262c54e57e1141d87f40
SHA256cac98fcc1b71b37ad1f7e76ac11fecde9325ca08cd37c0235c2bc7d69ab863ee
SHA512c85e1a3e5d7a6ddce1701b698959f975069fe01348056ed7cd6daa844221fb6b04a480115afbb7f20ad07a1d240a09fc2c3ddf1b0f7430303e85c14f25fe16b7
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD54b2cabf992408b096a37bb1d1b021349
SHA198bfaed8bce8fbe7243a8dedb1bc7ca26c78cf3e
SHA256d71814b55c0308d7598e48bcf079366b62a0b9213144e44ba4e2e5ce8b88e0ee
SHA5128c2250150ab076e1561e7d83b44404d48b5cae4f063e745f5e71c73a69ba81a87c9912d69ca45cca8857819156a699213e81ccdab6c538d1b850fdc01cbe89e2