Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
27-05-2024 23:27
Static task
static1
Behavioral task
behavioral1
Sample
7aeae4d80f01e03f50436705885bffac_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7aeae4d80f01e03f50436705885bffac_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
7aeae4d80f01e03f50436705885bffac_JaffaCakes118.html
-
Size
53KB
-
MD5
7aeae4d80f01e03f50436705885bffac
-
SHA1
3322333f0ceefcbb62f65f48e23cf93dcd7fe68f
-
SHA256
d0a60404d0c27debdefd2e975e504f34a8562a4c3ebc53200681b19ed49c07c1
-
SHA512
c1ebff19226240aa8f99a60ef249d8e7e1b7decb84ef95279b13171826ade97360c3d3efe1ff1acae28c6e96dac0a66d3e24a026502850eb706a419f472cb48c
-
SSDEEP
1536:FXwCDWB3tQP1sdBTGe17gUnyrvyiSPkyZLFhq0Ij29Qw9dVe2977jVKLZ9BC0u9E:erdBTGe1nyrvyiSPksiqRk8EhEOFVv
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3916 msedge.exe 3916 msedge.exe 3572 msedge.exe 3572 msedge.exe 4004 identity_helper.exe 4004 identity_helper.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3572 wrote to memory of 860 3572 msedge.exe 83 PID 3572 wrote to memory of 860 3572 msedge.exe 83 PID 3572 wrote to memory of 1612 3572 msedge.exe 84 PID 3572 wrote to memory of 1612 3572 msedge.exe 84 PID 3572 wrote to memory of 1612 3572 msedge.exe 84 PID 3572 wrote to memory of 1612 3572 msedge.exe 84 PID 3572 wrote to memory of 1612 3572 msedge.exe 84 PID 3572 wrote to memory of 1612 3572 msedge.exe 84 PID 3572 wrote to memory of 1612 3572 msedge.exe 84 PID 3572 wrote to memory of 1612 3572 msedge.exe 84 PID 3572 wrote to memory of 1612 3572 msedge.exe 84 PID 3572 wrote to memory of 1612 3572 msedge.exe 84 PID 3572 wrote to memory of 1612 3572 msedge.exe 84 PID 3572 wrote to memory of 1612 3572 msedge.exe 84 PID 3572 wrote to memory of 1612 3572 msedge.exe 84 PID 3572 wrote to memory of 1612 3572 msedge.exe 84 PID 3572 wrote to memory of 1612 3572 msedge.exe 84 PID 3572 wrote to memory of 1612 3572 msedge.exe 84 PID 3572 wrote to memory of 1612 3572 msedge.exe 84 PID 3572 wrote to memory of 1612 3572 msedge.exe 84 PID 3572 wrote to memory of 1612 3572 msedge.exe 84 PID 3572 wrote to memory of 1612 3572 msedge.exe 84 PID 3572 wrote to memory of 1612 3572 msedge.exe 84 PID 3572 wrote to memory of 1612 3572 msedge.exe 84 PID 3572 wrote to memory of 1612 3572 msedge.exe 84 PID 3572 wrote to memory of 1612 3572 msedge.exe 84 PID 3572 wrote to memory of 1612 3572 msedge.exe 84 PID 3572 wrote to memory of 1612 3572 msedge.exe 84 PID 3572 wrote to memory of 1612 3572 msedge.exe 84 PID 3572 wrote to memory of 1612 3572 msedge.exe 84 PID 3572 wrote to memory of 1612 3572 msedge.exe 84 PID 3572 wrote to memory of 1612 3572 msedge.exe 84 PID 3572 wrote to memory of 1612 3572 msedge.exe 84 PID 3572 wrote to memory of 1612 3572 msedge.exe 84 PID 3572 wrote to memory of 1612 3572 msedge.exe 84 PID 3572 wrote to memory of 1612 3572 msedge.exe 84 PID 3572 wrote to memory of 1612 3572 msedge.exe 84 PID 3572 wrote to memory of 1612 3572 msedge.exe 84 PID 3572 wrote to memory of 1612 3572 msedge.exe 84 PID 3572 wrote to memory of 1612 3572 msedge.exe 84 PID 3572 wrote to memory of 1612 3572 msedge.exe 84 PID 3572 wrote to memory of 1612 3572 msedge.exe 84 PID 3572 wrote to memory of 3916 3572 msedge.exe 85 PID 3572 wrote to memory of 3916 3572 msedge.exe 85 PID 3572 wrote to memory of 392 3572 msedge.exe 86 PID 3572 wrote to memory of 392 3572 msedge.exe 86 PID 3572 wrote to memory of 392 3572 msedge.exe 86 PID 3572 wrote to memory of 392 3572 msedge.exe 86 PID 3572 wrote to memory of 392 3572 msedge.exe 86 PID 3572 wrote to memory of 392 3572 msedge.exe 86 PID 3572 wrote to memory of 392 3572 msedge.exe 86 PID 3572 wrote to memory of 392 3572 msedge.exe 86 PID 3572 wrote to memory of 392 3572 msedge.exe 86 PID 3572 wrote to memory of 392 3572 msedge.exe 86 PID 3572 wrote to memory of 392 3572 msedge.exe 86 PID 3572 wrote to memory of 392 3572 msedge.exe 86 PID 3572 wrote to memory of 392 3572 msedge.exe 86 PID 3572 wrote to memory of 392 3572 msedge.exe 86 PID 3572 wrote to memory of 392 3572 msedge.exe 86 PID 3572 wrote to memory of 392 3572 msedge.exe 86 PID 3572 wrote to memory of 392 3572 msedge.exe 86 PID 3572 wrote to memory of 392 3572 msedge.exe 86 PID 3572 wrote to memory of 392 3572 msedge.exe 86 PID 3572 wrote to memory of 392 3572 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\7aeae4d80f01e03f50436705885bffac_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3572 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd5eb246f8,0x7ffd5eb24708,0x7ffd5eb247182⤵PID:860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2168,6609598392886561336,17789954129106856937,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2184 /prefetch:22⤵PID:1612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2168,6609598392886561336,17789954129106856937,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2268 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2168,6609598392886561336,17789954129106856937,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2248 /prefetch:82⤵PID:392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,6609598392886561336,17789954129106856937,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:4436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,6609598392886561336,17789954129106856937,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:1068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,6609598392886561336,17789954129106856937,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4948 /prefetch:12⤵PID:4248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,6609598392886561336,17789954129106856937,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2984 /prefetch:12⤵PID:2168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2168,6609598392886561336,17789954129106856937,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6044 /prefetch:82⤵PID:1212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2168,6609598392886561336,17789954129106856937,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6044 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,6609598392886561336,17789954129106856937,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5544 /prefetch:12⤵PID:220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,6609598392886561336,17789954129106856937,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5880 /prefetch:12⤵PID:2044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,6609598392886561336,17789954129106856937,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4124 /prefetch:12⤵PID:4192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,6609598392886561336,17789954129106856937,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5908 /prefetch:12⤵PID:3484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2168,6609598392886561336,17789954129106856937,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2700 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:740
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2696
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1488
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\158a1bf0-79f4-4085-9904-1d403a9855d4.tmp
Filesize6KB
MD5fbde310f680d818d813c03faada466ce
SHA1ecf9c2765ae670335a2ad78e76d25ca2b45f4ef8
SHA2560835794ec5731877796d45d0ae95aa220cedd71b30884335b94e40e56f7eada8
SHA512f155ed7faba5269e6e8642a2dded61dc5ddcaeb7abe17cb4ab04ebd34ab54869f59bca52728df55e0d1003a7b0a5ad581438ea935000016d059ec43c2dc54aab
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD5027a61f442a4730435620ab661219c49
SHA103c8a45da8aa4cf6df501edd8d4bccae51ff2243
SHA25672fe91121eda05c90bc67d10b6f4817fa00ec8b188d52953370de3d69680940f
SHA512e378cb2ca545d91b6523d0c83a865cba424b7a9d30161fdba7b957cf867e709e0eecb292430381427d40b16afc314b91366e9c60becc1429b2bbb21183b34fba
-
Filesize
1KB
MD5d1a71a9be4b7bbcfd8efab8312c3fb00
SHA1d0a977a279c6ce1c352c2848c92aec0ebc834b3c
SHA25614cad2b47384ba95c98c55c19e3aab8e417d37df297787d43d5d33fe0e7819a1
SHA512531715e618a232841efc34b7b50a4f63b6ac0edadf6a87019e65a4048b2a3bfdfc5d6fba606e7b0c9027d68b9a00fb68daf7b5442243d7c9c6700c0d67c34265
-
Filesize
5KB
MD56688113edfaeda97a6fa0a210f30633e
SHA1e316810f2a285c454696c232cf9320fea4f539e5
SHA2563baa543a7a8e56d7e8476505906c621badda1d815988887f20a4fc1526704a52
SHA51232257c92bf4ac1f4e5e06a666c7fc0b10257c2164f6b80e95894aeda975fbed86efcdc16665d5f194256fa2a2fdae5f2bd0ccda1fbbabd520ff09f84df30819b
-
Filesize
7KB
MD5054a0a8e44a1f2f5c2ba981f98fbda27
SHA1b6609ce7c7243fa66e0eded23300e097c37421c4
SHA256e3836d19c3c89275de8e6e45d603cd385974c00bafa8c452f00947a875b9ac6f
SHA512747024ed08fe51f69767597966b11ee0125d27bfc25525f4711e623a4bf80a052fd079c322e26ccc77cf07e87cb77abf755fa82e21ffc8ac0d4aaad4599e406b
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD58e60ce8645cc4110b0fdba9253292d9e
SHA166100bc429d0db20530de3c25a70aaceb0a26b47
SHA256d53d308fb2cc2f5b4cab52379f6899e7f909c9800a0990bb670e543033910c40
SHA512e0f19b0d1f1790421b869dc08e9451806228b14ae05eb43732db1e585c972d3c961de86d186057f40dbca3951e432e93445fcd637a98491383ec8bad66d4556c