Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
04-06-2024 18:59
Static task
static1
Behavioral task
behavioral1
Sample
95ed8665c8ad6001075c6a99d4f63df0_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
95ed8665c8ad6001075c6a99d4f63df0_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
95ed8665c8ad6001075c6a99d4f63df0_JaffaCakes118.html
-
Size
67KB
-
MD5
95ed8665c8ad6001075c6a99d4f63df0
-
SHA1
e480104aa53489d9765af766e11847ab734e87d2
-
SHA256
1a1520772a690077d02e79ad46dbb486c792483cc3fdc7e00bb2807f5eba6572
-
SHA512
ed921194eba88e1653c9a25e044f8009bb7b8d4a5a0f41d4dc4a0ec7a37015befcf1153d3fbe117bbc7d40b524304c9228e75082392f124a50f1eb0d3251417d
-
SSDEEP
768:JidgcMiR3sI2PDDnX0g6NWoBg4oTyv1wCZkoTyMdtbBnfBgN8/lboi2hcpQFVG8X:JDHkg1TcNen0tbrga94hcuNnQC
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1236 msedge.exe 1236 msedge.exe 3628 msedge.exe 3628 msedge.exe 1840 identity_helper.exe 1840 identity_helper.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe 1560 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3628 wrote to memory of 3560 3628 msedge.exe 82 PID 3628 wrote to memory of 3560 3628 msedge.exe 82 PID 3628 wrote to memory of 1152 3628 msedge.exe 83 PID 3628 wrote to memory of 1152 3628 msedge.exe 83 PID 3628 wrote to memory of 1152 3628 msedge.exe 83 PID 3628 wrote to memory of 1152 3628 msedge.exe 83 PID 3628 wrote to memory of 1152 3628 msedge.exe 83 PID 3628 wrote to memory of 1152 3628 msedge.exe 83 PID 3628 wrote to memory of 1152 3628 msedge.exe 83 PID 3628 wrote to memory of 1152 3628 msedge.exe 83 PID 3628 wrote to memory of 1152 3628 msedge.exe 83 PID 3628 wrote to memory of 1152 3628 msedge.exe 83 PID 3628 wrote to memory of 1152 3628 msedge.exe 83 PID 3628 wrote to memory of 1152 3628 msedge.exe 83 PID 3628 wrote to memory of 1152 3628 msedge.exe 83 PID 3628 wrote to memory of 1152 3628 msedge.exe 83 PID 3628 wrote to memory of 1152 3628 msedge.exe 83 PID 3628 wrote to memory of 1152 3628 msedge.exe 83 PID 3628 wrote to memory of 1152 3628 msedge.exe 83 PID 3628 wrote to memory of 1152 3628 msedge.exe 83 PID 3628 wrote to memory of 1152 3628 msedge.exe 83 PID 3628 wrote to memory of 1152 3628 msedge.exe 83 PID 3628 wrote to memory of 1152 3628 msedge.exe 83 PID 3628 wrote to memory of 1152 3628 msedge.exe 83 PID 3628 wrote to memory of 1152 3628 msedge.exe 83 PID 3628 wrote to memory of 1152 3628 msedge.exe 83 PID 3628 wrote to memory of 1152 3628 msedge.exe 83 PID 3628 wrote to memory of 1152 3628 msedge.exe 83 PID 3628 wrote to memory of 1152 3628 msedge.exe 83 PID 3628 wrote to memory of 1152 3628 msedge.exe 83 PID 3628 wrote to memory of 1152 3628 msedge.exe 83 PID 3628 wrote to memory of 1152 3628 msedge.exe 83 PID 3628 wrote to memory of 1152 3628 msedge.exe 83 PID 3628 wrote to memory of 1152 3628 msedge.exe 83 PID 3628 wrote to memory of 1152 3628 msedge.exe 83 PID 3628 wrote to memory of 1152 3628 msedge.exe 83 PID 3628 wrote to memory of 1152 3628 msedge.exe 83 PID 3628 wrote to memory of 1152 3628 msedge.exe 83 PID 3628 wrote to memory of 1152 3628 msedge.exe 83 PID 3628 wrote to memory of 1152 3628 msedge.exe 83 PID 3628 wrote to memory of 1152 3628 msedge.exe 83 PID 3628 wrote to memory of 1152 3628 msedge.exe 83 PID 3628 wrote to memory of 1236 3628 msedge.exe 84 PID 3628 wrote to memory of 1236 3628 msedge.exe 84 PID 3628 wrote to memory of 2000 3628 msedge.exe 85 PID 3628 wrote to memory of 2000 3628 msedge.exe 85 PID 3628 wrote to memory of 2000 3628 msedge.exe 85 PID 3628 wrote to memory of 2000 3628 msedge.exe 85 PID 3628 wrote to memory of 2000 3628 msedge.exe 85 PID 3628 wrote to memory of 2000 3628 msedge.exe 85 PID 3628 wrote to memory of 2000 3628 msedge.exe 85 PID 3628 wrote to memory of 2000 3628 msedge.exe 85 PID 3628 wrote to memory of 2000 3628 msedge.exe 85 PID 3628 wrote to memory of 2000 3628 msedge.exe 85 PID 3628 wrote to memory of 2000 3628 msedge.exe 85 PID 3628 wrote to memory of 2000 3628 msedge.exe 85 PID 3628 wrote to memory of 2000 3628 msedge.exe 85 PID 3628 wrote to memory of 2000 3628 msedge.exe 85 PID 3628 wrote to memory of 2000 3628 msedge.exe 85 PID 3628 wrote to memory of 2000 3628 msedge.exe 85 PID 3628 wrote to memory of 2000 3628 msedge.exe 85 PID 3628 wrote to memory of 2000 3628 msedge.exe 85 PID 3628 wrote to memory of 2000 3628 msedge.exe 85 PID 3628 wrote to memory of 2000 3628 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\95ed8665c8ad6001075c6a99d4f63df0_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3628 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffaa37e46f8,0x7ffaa37e4708,0x7ffaa37e47182⤵PID:3560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2188,10891620255067025528,2016974973278275835,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2196 /prefetch:22⤵PID:1152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2188,10891620255067025528,2016974973278275835,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2252 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2188,10891620255067025528,2016974973278275835,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2820 /prefetch:82⤵PID:2000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,10891620255067025528,2016974973278275835,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:2752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,10891620255067025528,2016974973278275835,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:2908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,10891620255067025528,2016974973278275835,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4640 /prefetch:12⤵PID:1084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2188,10891620255067025528,2016974973278275835,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5500 /prefetch:82⤵PID:336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2188,10891620255067025528,2016974973278275835,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5500 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,10891620255067025528,2016974973278275835,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5180 /prefetch:12⤵PID:2004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,10891620255067025528,2016974973278275835,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4900 /prefetch:12⤵PID:4764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,10891620255067025528,2016974973278275835,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5808 /prefetch:12⤵PID:5456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,10891620255067025528,2016974973278275835,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5204 /prefetch:12⤵PID:5464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2188,10891620255067025528,2016974973278275835,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2700 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1560
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4936
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4196
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD5749e3421afee12fb31e237c606ab0331
SHA1c5c72d87fa4bd9baf2103043c6854ec13a99c100
SHA25657f70b451b09c79e5853e85304f1212863ad1421bf51a09e64a3f72c726326f5
SHA512ebfbe5d2904ac2c7fdec72845a40e7f83aeb00e0fffc27b19ef2eb6d61e18c1d67698b937efdc9196bfef297fce5c526238266a1d5be1ecee2437262b5bb97e7
-
Filesize
410B
MD5f7ea0e22aa2c31e3f22a27f53d086731
SHA1554aeaa27dfc0c0056a9dbee38e04e470ab974ca
SHA2563d1afd03f15f4e4ed8a3669e9b8db209aa9cbd2ae4b354d0048c9ab4038c8c88
SHA5121b008b32136a12fb12f380414cfb290590e1a7002833b3a75fd14295793abdd45f38e71fb902228b6e1967b0f7e0316a95cc97700d2a61eee84e884c500764c4
-
Filesize
5KB
MD55762735cc26032cc7aaf560a2e40a4ce
SHA190a3b982879f4ffb927b646a2d1b02cc66aa9a32
SHA2561bf3845c0061f3071dfc6a4c387cef1d787a4c22764d91f6d559df981bf4166b
SHA5123273b5a79a8d448806875bbcf3aa2d2266f42a87c9e8aba2e878406be178caaa004d6dd6f1e7ed880118de3a18bbf244020eb20dee6f1bbc173eebc22bfb8cc6
-
Filesize
6KB
MD5640bb3f98ab9559b10ed939fcbd365c5
SHA195f3effb1d21485746e1d452cc36f90955e47737
SHA25648d3c3adf23c7f18f66749b6d734d32751eb7334fbbd5def599e78a5b884067a
SHA5120f75cd2f95def9cf760257c6e5306fc8db67bc9c6d34354cbf503850e41bf9af606f331179085423ff27899a7381101e74795a388865b8c9e54e702b48952e20
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD508f0b9fdc1a2a85e9d537c282fda58e4
SHA15a1bb2582625b186f160232c3eebd090bb14b3d6
SHA2568edfa5c05cbb018386745905ba1b4942c8f62f0f429664e6510df472f0b7d9af
SHA51242b7687226b322b32cd421ef3f85b8191422a507263b293d108c26ee8196f146860ba09c60cc0b7636445ad874b62960b43c597d3018fed4739eca4087bfa342