Analysis
-
max time kernel
145s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
27-05-2024 17:08
Static task
static1
Behavioral task
behavioral1
Sample
79daebf97dc9ac0416c70ec5d863c7c9_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
79daebf97dc9ac0416c70ec5d863c7c9_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
79daebf97dc9ac0416c70ec5d863c7c9_JaffaCakes118.html
-
Size
29KB
-
MD5
79daebf97dc9ac0416c70ec5d863c7c9
-
SHA1
3fc0d6f68e5919bdceddbbd311e782662a7cc74d
-
SHA256
1599e7b194ecb3d9cf48c55f132567ac855a8b2ba9bd54c2b858fbc3646f2eed
-
SHA512
de7d86540c528080432acbd46649a0a8cdc45d665e56e7b54f4c5410eb243b2bf837f2ac830624271dcccc8e6f2b65cd2ca02e2230b5be1280bee1a413fba545
-
SSDEEP
192:uW/bb5nXXnQjxn5Q/unQieFNnwnQOkEntSonQTbnpnQIMCbqA0H+OhgamdMZR9B5:eQ//5qz1xZ7BLP9QjfkisciOW
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 928 msedge.exe 928 msedge.exe 3652 msedge.exe 3652 msedge.exe 3544 identity_helper.exe 3544 identity_helper.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3652 wrote to memory of 4400 3652 msedge.exe 82 PID 3652 wrote to memory of 4400 3652 msedge.exe 82 PID 3652 wrote to memory of 4360 3652 msedge.exe 83 PID 3652 wrote to memory of 4360 3652 msedge.exe 83 PID 3652 wrote to memory of 4360 3652 msedge.exe 83 PID 3652 wrote to memory of 4360 3652 msedge.exe 83 PID 3652 wrote to memory of 4360 3652 msedge.exe 83 PID 3652 wrote to memory of 4360 3652 msedge.exe 83 PID 3652 wrote to memory of 4360 3652 msedge.exe 83 PID 3652 wrote to memory of 4360 3652 msedge.exe 83 PID 3652 wrote to memory of 4360 3652 msedge.exe 83 PID 3652 wrote to memory of 4360 3652 msedge.exe 83 PID 3652 wrote to memory of 4360 3652 msedge.exe 83 PID 3652 wrote to memory of 4360 3652 msedge.exe 83 PID 3652 wrote to memory of 4360 3652 msedge.exe 83 PID 3652 wrote to memory of 4360 3652 msedge.exe 83 PID 3652 wrote to memory of 4360 3652 msedge.exe 83 PID 3652 wrote to memory of 4360 3652 msedge.exe 83 PID 3652 wrote to memory of 4360 3652 msedge.exe 83 PID 3652 wrote to memory of 4360 3652 msedge.exe 83 PID 3652 wrote to memory of 4360 3652 msedge.exe 83 PID 3652 wrote to memory of 4360 3652 msedge.exe 83 PID 3652 wrote to memory of 4360 3652 msedge.exe 83 PID 3652 wrote to memory of 4360 3652 msedge.exe 83 PID 3652 wrote to memory of 4360 3652 msedge.exe 83 PID 3652 wrote to memory of 4360 3652 msedge.exe 83 PID 3652 wrote to memory of 4360 3652 msedge.exe 83 PID 3652 wrote to memory of 4360 3652 msedge.exe 83 PID 3652 wrote to memory of 4360 3652 msedge.exe 83 PID 3652 wrote to memory of 4360 3652 msedge.exe 83 PID 3652 wrote to memory of 4360 3652 msedge.exe 83 PID 3652 wrote to memory of 4360 3652 msedge.exe 83 PID 3652 wrote to memory of 4360 3652 msedge.exe 83 PID 3652 wrote to memory of 4360 3652 msedge.exe 83 PID 3652 wrote to memory of 4360 3652 msedge.exe 83 PID 3652 wrote to memory of 4360 3652 msedge.exe 83 PID 3652 wrote to memory of 4360 3652 msedge.exe 83 PID 3652 wrote to memory of 4360 3652 msedge.exe 83 PID 3652 wrote to memory of 4360 3652 msedge.exe 83 PID 3652 wrote to memory of 4360 3652 msedge.exe 83 PID 3652 wrote to memory of 4360 3652 msedge.exe 83 PID 3652 wrote to memory of 4360 3652 msedge.exe 83 PID 3652 wrote to memory of 928 3652 msedge.exe 84 PID 3652 wrote to memory of 928 3652 msedge.exe 84 PID 3652 wrote to memory of 2992 3652 msedge.exe 85 PID 3652 wrote to memory of 2992 3652 msedge.exe 85 PID 3652 wrote to memory of 2992 3652 msedge.exe 85 PID 3652 wrote to memory of 2992 3652 msedge.exe 85 PID 3652 wrote to memory of 2992 3652 msedge.exe 85 PID 3652 wrote to memory of 2992 3652 msedge.exe 85 PID 3652 wrote to memory of 2992 3652 msedge.exe 85 PID 3652 wrote to memory of 2992 3652 msedge.exe 85 PID 3652 wrote to memory of 2992 3652 msedge.exe 85 PID 3652 wrote to memory of 2992 3652 msedge.exe 85 PID 3652 wrote to memory of 2992 3652 msedge.exe 85 PID 3652 wrote to memory of 2992 3652 msedge.exe 85 PID 3652 wrote to memory of 2992 3652 msedge.exe 85 PID 3652 wrote to memory of 2992 3652 msedge.exe 85 PID 3652 wrote to memory of 2992 3652 msedge.exe 85 PID 3652 wrote to memory of 2992 3652 msedge.exe 85 PID 3652 wrote to memory of 2992 3652 msedge.exe 85 PID 3652 wrote to memory of 2992 3652 msedge.exe 85 PID 3652 wrote to memory of 2992 3652 msedge.exe 85 PID 3652 wrote to memory of 2992 3652 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\79daebf97dc9ac0416c70ec5d863c7c9_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3652 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff16cc46f8,0x7fff16cc4708,0x7fff16cc47182⤵PID:4400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1464,4359885922158223020,14423439865115219063,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2028 /prefetch:22⤵PID:4360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1464,4359885922158223020,14423439865115219063,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2276 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1464,4359885922158223020,14423439865115219063,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2844 /prefetch:82⤵PID:2992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1464,4359885922158223020,14423439865115219063,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:3096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1464,4359885922158223020,14423439865115219063,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:5040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1464,4359885922158223020,14423439865115219063,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5956 /prefetch:82⤵PID:2948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1464,4359885922158223020,14423439865115219063,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5956 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1464,4359885922158223020,14423439865115219063,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4712 /prefetch:12⤵PID:1656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1464,4359885922158223020,14423439865115219063,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4736 /prefetch:12⤵PID:4776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1464,4359885922158223020,14423439865115219063,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4668 /prefetch:12⤵PID:2980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1464,4359885922158223020,14423439865115219063,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3372 /prefetch:12⤵PID:4488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1464,4359885922158223020,14423439865115219063,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5036 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2860
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3660
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4564
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c9c4c494f8fba32d95ba2125f00586a3
SHA18a600205528aef7953144f1cf6f7a5115e3611de
SHA256a0ca609205813c307df9122c0c5b0967c5472755700f615b0033129cf7d6b35b
SHA5129d30cea6cfc259e97b0305f8b5cd19774044fb78feedfcef2014b2947f2e6a101273bc4ad30db9cc1724e62eb441266d7df376e28ac58693f128b9cce2c7d20d
-
Filesize
152B
MD54dc6fc5e708279a3310fe55d9c44743d
SHA1a42e8bdf9d1c25ef3e223d59f6b1d16b095f46d2
SHA256a1c5f48659d4b3af960971b3a0f433a95fee5bfafe5680a34110c68b342377d8
SHA5125874b2310187f242b852fa6dcded244cc860abb2be4f6f5a6a1db8322e12e1fef8f825edc0aae75adbb7284a2cd64730650d0643b1e2bb7ead9350e50e1d8c13
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
5KB
MD590d5f2dd4fe4d5f9d875b957a70224a9
SHA118b9260f2ff388af324216149b981339ce65f556
SHA25674c3ad866daf8fad9e91d8a309033069d7c4b20a6549a20a2efead804804dc11
SHA5123c74871cad12171e59df073fe8369ea94b788b755e8c69863a980b05a71bf45ea5dc738e8dab42759c84f5dfcf8bbc77935d9d94f22d9f0f8055175df1cfc6df
-
Filesize
6KB
MD57f524face2ca41cae1016de2bff522e2
SHA1548730760abc2806f8d3af0a03679dc1c3fa698a
SHA256644aca6e687a1f72299521ef3b0ca46ec1b927a6cdcf8935a8970a0c3c7323a1
SHA512427d75774bb7ab69997498c08246e2259d09d188fe93a9c8a9e92a855eb2f4c4b5e1f9f4a19c85fbd4fe2151875f85315ab999af6cc9c8aa8f3196c9f702f816
-
Filesize
6KB
MD5612b665fea9e85a9c445434215300e18
SHA1b1682d7eed6e4f5f8fe75240c649d74281c17014
SHA256b212bef14a1e0781117f85c9e4f491f47d6a8d03c1b8bfc9329c3aae66b81c8e
SHA5129b6844e806b8c4173fa345df10d97861cdbebbfda34a23fbaf43f4adb6641084d50cad2e169da7bf9068db9c12ab228892954a851d89f2b06b4a8270fed46b2e
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD5c3d537c69dfee0083fac710080464e95
SHA14214cc403283de645d3191eae7758f66740849fa
SHA2562779384a4c5ef93ae77573e7eec85c89785b2f025091153d0ef6334daaaffa7d
SHA5125d0f2901ec5cce47cc22bbec230827d741605eae626a546371234630fc76309e792cfc8cc8c0e0186cb0147cd14d0a3670fb3323c49093d0ad7695d5a982c82e