Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
30-05-2024 21:47
Static task
static1
Behavioral task
behavioral1
Sample
8502827a02b12ff2b4ccffc5d67fb34f_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
8502827a02b12ff2b4ccffc5d67fb34f_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
8502827a02b12ff2b4ccffc5d67fb34f_JaffaCakes118.html
-
Size
148KB
-
MD5
8502827a02b12ff2b4ccffc5d67fb34f
-
SHA1
95f64fb87294a987b7c0b304418799d32eb24dec
-
SHA256
3b90d9225bfc33fb2a646c40b898e503fff22fd44307a0e6f2e11f4ceeaeb97f
-
SHA512
883b0434da8d78c943d316cde2cde137429885a768cfdf741c6c7605a1b94d55f5fc0448863be58744fb7ebb6702882233e1a9a1ef29e1196f1edbda5b73f6ee
-
SSDEEP
1536:UCqMVuFO+JpQrPiWjg0v6C0gZ9kPl2P9HBwHCH3HBqHgHhH9gBFHtHUH+HzHlHzX:UCDgywHHX75FhF
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3972 msedge.exe 3972 msedge.exe 5020 msedge.exe 5020 msedge.exe 2112 identity_helper.exe 2112 identity_helper.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5020 wrote to memory of 1868 5020 msedge.exe 81 PID 5020 wrote to memory of 1868 5020 msedge.exe 81 PID 5020 wrote to memory of 1484 5020 msedge.exe 82 PID 5020 wrote to memory of 1484 5020 msedge.exe 82 PID 5020 wrote to memory of 1484 5020 msedge.exe 82 PID 5020 wrote to memory of 1484 5020 msedge.exe 82 PID 5020 wrote to memory of 1484 5020 msedge.exe 82 PID 5020 wrote to memory of 1484 5020 msedge.exe 82 PID 5020 wrote to memory of 1484 5020 msedge.exe 82 PID 5020 wrote to memory of 1484 5020 msedge.exe 82 PID 5020 wrote to memory of 1484 5020 msedge.exe 82 PID 5020 wrote to memory of 1484 5020 msedge.exe 82 PID 5020 wrote to memory of 1484 5020 msedge.exe 82 PID 5020 wrote to memory of 1484 5020 msedge.exe 82 PID 5020 wrote to memory of 1484 5020 msedge.exe 82 PID 5020 wrote to memory of 1484 5020 msedge.exe 82 PID 5020 wrote to memory of 1484 5020 msedge.exe 82 PID 5020 wrote to memory of 1484 5020 msedge.exe 82 PID 5020 wrote to memory of 1484 5020 msedge.exe 82 PID 5020 wrote to memory of 1484 5020 msedge.exe 82 PID 5020 wrote to memory of 1484 5020 msedge.exe 82 PID 5020 wrote to memory of 1484 5020 msedge.exe 82 PID 5020 wrote to memory of 1484 5020 msedge.exe 82 PID 5020 wrote to memory of 1484 5020 msedge.exe 82 PID 5020 wrote to memory of 1484 5020 msedge.exe 82 PID 5020 wrote to memory of 1484 5020 msedge.exe 82 PID 5020 wrote to memory of 1484 5020 msedge.exe 82 PID 5020 wrote to memory of 1484 5020 msedge.exe 82 PID 5020 wrote to memory of 1484 5020 msedge.exe 82 PID 5020 wrote to memory of 1484 5020 msedge.exe 82 PID 5020 wrote to memory of 1484 5020 msedge.exe 82 PID 5020 wrote to memory of 1484 5020 msedge.exe 82 PID 5020 wrote to memory of 1484 5020 msedge.exe 82 PID 5020 wrote to memory of 1484 5020 msedge.exe 82 PID 5020 wrote to memory of 1484 5020 msedge.exe 82 PID 5020 wrote to memory of 1484 5020 msedge.exe 82 PID 5020 wrote to memory of 1484 5020 msedge.exe 82 PID 5020 wrote to memory of 1484 5020 msedge.exe 82 PID 5020 wrote to memory of 1484 5020 msedge.exe 82 PID 5020 wrote to memory of 1484 5020 msedge.exe 82 PID 5020 wrote to memory of 1484 5020 msedge.exe 82 PID 5020 wrote to memory of 1484 5020 msedge.exe 82 PID 5020 wrote to memory of 3972 5020 msedge.exe 83 PID 5020 wrote to memory of 3972 5020 msedge.exe 83 PID 5020 wrote to memory of 2620 5020 msedge.exe 84 PID 5020 wrote to memory of 2620 5020 msedge.exe 84 PID 5020 wrote to memory of 2620 5020 msedge.exe 84 PID 5020 wrote to memory of 2620 5020 msedge.exe 84 PID 5020 wrote to memory of 2620 5020 msedge.exe 84 PID 5020 wrote to memory of 2620 5020 msedge.exe 84 PID 5020 wrote to memory of 2620 5020 msedge.exe 84 PID 5020 wrote to memory of 2620 5020 msedge.exe 84 PID 5020 wrote to memory of 2620 5020 msedge.exe 84 PID 5020 wrote to memory of 2620 5020 msedge.exe 84 PID 5020 wrote to memory of 2620 5020 msedge.exe 84 PID 5020 wrote to memory of 2620 5020 msedge.exe 84 PID 5020 wrote to memory of 2620 5020 msedge.exe 84 PID 5020 wrote to memory of 2620 5020 msedge.exe 84 PID 5020 wrote to memory of 2620 5020 msedge.exe 84 PID 5020 wrote to memory of 2620 5020 msedge.exe 84 PID 5020 wrote to memory of 2620 5020 msedge.exe 84 PID 5020 wrote to memory of 2620 5020 msedge.exe 84 PID 5020 wrote to memory of 2620 5020 msedge.exe 84 PID 5020 wrote to memory of 2620 5020 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\8502827a02b12ff2b4ccffc5d67fb34f_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5020 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb55f646f8,0x7ffb55f64708,0x7ffb55f647182⤵PID:1868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1844,18092337308935408145,11110029452256348540,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2088 /prefetch:22⤵PID:1484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1844,18092337308935408145,11110029452256348540,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2176 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1844,18092337308935408145,11110029452256348540,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2828 /prefetch:82⤵PID:2620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1844,18092337308935408145,11110029452256348540,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:3052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1844,18092337308935408145,11110029452256348540,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:2868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1844,18092337308935408145,11110029452256348540,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4212 /prefetch:12⤵PID:3628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1844,18092337308935408145,11110029452256348540,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5760 /prefetch:82⤵PID:4736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1844,18092337308935408145,11110029452256348540,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5760 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1844,18092337308935408145,11110029452256348540,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5464 /prefetch:12⤵PID:2368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1844,18092337308935408145,11110029452256348540,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5468 /prefetch:12⤵PID:2820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1844,18092337308935408145,11110029452256348540,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4100 /prefetch:12⤵PID:3844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1844,18092337308935408145,11110029452256348540,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4792 /prefetch:12⤵PID:1580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1844,18092337308935408145,11110029452256348540,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1504 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4024
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2544
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4520
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51ac52e2503cc26baee4322f02f5b8d9c
SHA138e0cee911f5f2a24888a64780ffdf6fa72207c8
SHA256f65058c6f1a745b37a64d4c97a8e8ee940210273130cec97a67f568088b5d4d4
SHA5127670d606bc5197ecb7db3ddaecd6f74a80e6decae92b94e0e8145a7f463fa099058e89f9dfa1c45b9197c36e5e21994698186a2ec970bbdb0937fe28ca46a834
-
Filesize
152B
MD5b2a1398f937474c51a48b347387ee36a
SHA1922a8567f09e68a04233e84e5919043034635949
SHA2562dc0bf08246ddd5a32288c895d676017578d792349ca437b1b36e7b2f0ade6d6
SHA5124a660c0549f7a850e07d8d36dab33121af02a7bd7e9b2f0137930b4c8cd89b6c5630e408f882684e6935dcb0d5cb5e01a854950eeda252a4881458cafcc7ef7c
-
Filesize
44KB
MD523536ccfe05b737ae639fe63ee4cc435
SHA16d2e9822835dc3e6117a4d2addfc8f241fbdbc82
SHA2566ae9edfc411ede03661a3d910fafddab3d6b313d1f4668dc8c5a84c5ab23a3ce
SHA512f416e36b2322bbebd211fd1ea69c88883f00c7b00f14474a5fcce4a408840c0d1b0304eb8941509a38157d0583485f638959eb7d5b9ae668aa88c1d3eee8dd0d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD570f7cdb18f5cdef3d02725a78fdb37a7
SHA118f6b51bbe79b49b18579bddffcc6d116ad6f115
SHA256e86656e1f46e815797c165c91acf6444793428359b29261eb117114ebfe83f9d
SHA512d3efc742d5a93a8bee7bd7beb91b304bca4b79a7953aaa08b14e6a52d90b88e467d8eb5cf14827157738a027ec8e87481b99889571886ff0574aa2bf54da3eee
-
Filesize
1KB
MD570e89f7a44887531bbcdff115b7ef0a7
SHA1efeaff7e13fdefae269f480ba800f14c1c2cfea0
SHA25675a9fa54564328b0e8bffc708d92454a089b129f0ffecc398f47edcb39bef83e
SHA51214812681447ed775a0add5564b7488f445ea4fa332b86cc95a542d446ff84a592be8fec6ad041d80778cc19ac5552847a85c11bb0557e0cd238a5fe0db7fca86
-
Filesize
5KB
MD55fee285b65ecbda1b0e3a30f15857222
SHA1d37d555f65cfa49126d3b7dcffb7904328ae40ee
SHA2567581927920f4611db50c44c66ac606a7e69f5fd80d7f27113668eff05992a109
SHA512b4db90326c06c9de71b0522d59726fd70584ddee7bdeb4f50f7fd9a6397ce5a36edcd5f6a98f99e34d5503e6c3e29aad56ee96c70d049ee9f9d75447811288b1
-
Filesize
6KB
MD5d791ba2c24ff5a340274e3bf6d9fb4a3
SHA1b13e355b027f099a42ae96762b0fe15fd72fe012
SHA2562792075f51aee4f4fe363f5ebfacb797b9f6a3cce377b1ce18fe3d379158296a
SHA5123f6f5141a0596f957a871cd7ea18777111be53f214ff414410749fc6ab1f4e505911e0e72313d251d6d08b5a69a7b5bc6817ab10e54566100eaf108e7c2eeda9
-
Filesize
6KB
MD5f2fc50cbd45f86f0645025975d3c70f7
SHA17b24d7b38dd0b605d3a0bf6564175316988b95b6
SHA25639d77ca7b9b7b28939664fa9bf370e5238ebf7ff55e51b0ab79e15f7f67ca945
SHA5122477e759b8ee9b04bcedc3d2ac26cfd6a4bcab6e1b7130a87b52720bc79cc8afc265cc1c46ff75835bd54604f75b0514f2fe04c6c28160b691849febde1660ff
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD53273142b6612d4fabc59cdaea9ed26f8
SHA11da120cf14a007226c81fa9555d514be95ddf837
SHA256c1129e5678d2a83e5d35db02ccf924da70f1b8345b6934f8668acda7c62df0a8
SHA51287213d0e1825dac31380337a2526aa05efee1c75fdb3a4a81f3fa08bcad0d7fe6d76253c6e527fa487e2ed6802736b87711abfeb69b35dd9c56f3d2790a533f4