Analysis
-
max time kernel
149s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
05-06-2024 22:51
Static task
static1
Behavioral task
behavioral1
Sample
99742545b01c6adecd88811acb90e0f4_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
99742545b01c6adecd88811acb90e0f4_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
99742545b01c6adecd88811acb90e0f4_JaffaCakes118.html
-
Size
51KB
-
MD5
99742545b01c6adecd88811acb90e0f4
-
SHA1
03ac55d215f4b4fce343d4762e6c234acff09367
-
SHA256
87e01bb9ccca231d07ee7dc64845a52174a8d7c3b62d768665c2a61433370774
-
SHA512
45b54605e9cfe808b94c64b152b3066043e9045da8aeea103876f7d28b00c1de7c6cd1ad654ea72133e26e6b2cd3c397d3a8ec5ffa6ce67e322f1246519439c0
-
SSDEEP
768:SSSWbVGdm9Wlnrc5N9VaU3CcOefKjI3JI3Te5F2P:SDy+rsNfaUScOefKreb0
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 5940 msedge.exe 5940 msedge.exe 4660 msedge.exe 4660 msedge.exe 4984 identity_helper.exe 4984 identity_helper.exe 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4660 wrote to memory of 4892 4660 msedge.exe 81 PID 4660 wrote to memory of 4892 4660 msedge.exe 81 PID 4660 wrote to memory of 2676 4660 msedge.exe 85 PID 4660 wrote to memory of 2676 4660 msedge.exe 85 PID 4660 wrote to memory of 2676 4660 msedge.exe 85 PID 4660 wrote to memory of 2676 4660 msedge.exe 85 PID 4660 wrote to memory of 2676 4660 msedge.exe 85 PID 4660 wrote to memory of 2676 4660 msedge.exe 85 PID 4660 wrote to memory of 2676 4660 msedge.exe 85 PID 4660 wrote to memory of 2676 4660 msedge.exe 85 PID 4660 wrote to memory of 2676 4660 msedge.exe 85 PID 4660 wrote to memory of 2676 4660 msedge.exe 85 PID 4660 wrote to memory of 2676 4660 msedge.exe 85 PID 4660 wrote to memory of 2676 4660 msedge.exe 85 PID 4660 wrote to memory of 2676 4660 msedge.exe 85 PID 4660 wrote to memory of 2676 4660 msedge.exe 85 PID 4660 wrote to memory of 2676 4660 msedge.exe 85 PID 4660 wrote to memory of 2676 4660 msedge.exe 85 PID 4660 wrote to memory of 2676 4660 msedge.exe 85 PID 4660 wrote to memory of 2676 4660 msedge.exe 85 PID 4660 wrote to memory of 2676 4660 msedge.exe 85 PID 4660 wrote to memory of 2676 4660 msedge.exe 85 PID 4660 wrote to memory of 2676 4660 msedge.exe 85 PID 4660 wrote to memory of 2676 4660 msedge.exe 85 PID 4660 wrote to memory of 2676 4660 msedge.exe 85 PID 4660 wrote to memory of 2676 4660 msedge.exe 85 PID 4660 wrote to memory of 2676 4660 msedge.exe 85 PID 4660 wrote to memory of 2676 4660 msedge.exe 85 PID 4660 wrote to memory of 2676 4660 msedge.exe 85 PID 4660 wrote to memory of 2676 4660 msedge.exe 85 PID 4660 wrote to memory of 2676 4660 msedge.exe 85 PID 4660 wrote to memory of 2676 4660 msedge.exe 85 PID 4660 wrote to memory of 2676 4660 msedge.exe 85 PID 4660 wrote to memory of 2676 4660 msedge.exe 85 PID 4660 wrote to memory of 2676 4660 msedge.exe 85 PID 4660 wrote to memory of 2676 4660 msedge.exe 85 PID 4660 wrote to memory of 2676 4660 msedge.exe 85 PID 4660 wrote to memory of 2676 4660 msedge.exe 85 PID 4660 wrote to memory of 2676 4660 msedge.exe 85 PID 4660 wrote to memory of 2676 4660 msedge.exe 85 PID 4660 wrote to memory of 2676 4660 msedge.exe 85 PID 4660 wrote to memory of 2676 4660 msedge.exe 85 PID 4660 wrote to memory of 5940 4660 msedge.exe 86 PID 4660 wrote to memory of 5940 4660 msedge.exe 86 PID 4660 wrote to memory of 5772 4660 msedge.exe 87 PID 4660 wrote to memory of 5772 4660 msedge.exe 87 PID 4660 wrote to memory of 5772 4660 msedge.exe 87 PID 4660 wrote to memory of 5772 4660 msedge.exe 87 PID 4660 wrote to memory of 5772 4660 msedge.exe 87 PID 4660 wrote to memory of 5772 4660 msedge.exe 87 PID 4660 wrote to memory of 5772 4660 msedge.exe 87 PID 4660 wrote to memory of 5772 4660 msedge.exe 87 PID 4660 wrote to memory of 5772 4660 msedge.exe 87 PID 4660 wrote to memory of 5772 4660 msedge.exe 87 PID 4660 wrote to memory of 5772 4660 msedge.exe 87 PID 4660 wrote to memory of 5772 4660 msedge.exe 87 PID 4660 wrote to memory of 5772 4660 msedge.exe 87 PID 4660 wrote to memory of 5772 4660 msedge.exe 87 PID 4660 wrote to memory of 5772 4660 msedge.exe 87 PID 4660 wrote to memory of 5772 4660 msedge.exe 87 PID 4660 wrote to memory of 5772 4660 msedge.exe 87 PID 4660 wrote to memory of 5772 4660 msedge.exe 87 PID 4660 wrote to memory of 5772 4660 msedge.exe 87 PID 4660 wrote to memory of 5772 4660 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\99742545b01c6adecd88811acb90e0f4_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4660 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xdc,0x108,0x7ffab50846f8,0x7ffab5084708,0x7ffab50847182⤵PID:4892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,11521570616102683324,5368660876984775744,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:22⤵PID:2676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,11521570616102683324,5368660876984775744,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,11521570616102683324,5368660876984775744,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2656 /prefetch:82⤵PID:5772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,11521570616102683324,5368660876984775744,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,11521570616102683324,5368660876984775744,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:3260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,11521570616102683324,5368660876984775744,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5280 /prefetch:82⤵PID:3020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,11521570616102683324,5368660876984775744,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5280 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,11521570616102683324,5368660876984775744,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4704 /prefetch:12⤵PID:2708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,11521570616102683324,5368660876984775744,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5028 /prefetch:12⤵PID:5668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,11521570616102683324,5368660876984775744,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3920 /prefetch:12⤵PID:2060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,11521570616102683324,5368660876984775744,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3436 /prefetch:12⤵PID:4924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,11521570616102683324,5368660876984775744,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4652 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1484
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:6112
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1572
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ae54e9db2e89f2c54da8cc0bfcbd26bd
SHA1a88af6c673609ecbc51a1a60dfbc8577830d2b5d
SHA2565009d3c953de63cfd14a7d911156c514e179ff07d2b94382d9caac6040cb72af
SHA512e3b70e5eb7321b9deca6f6a17424a15b9fd5c4008bd3789bd01099fd13cb2f4a2f37fe4b920fb51c50517745b576c1f94df83efd1a7e75949551163985599998
-
Filesize
152B
MD5f53207a5ca2ef5c7e976cbb3cb26d870
SHA149a8cc44f53da77bb3dfb36fc7676ed54675db43
SHA25619ab4e3c9da6d9cedda7461efdba9a2085e743513ab89f1dd0fd5a8f9486ad23
SHA512be734c7e8afda19f445912aef0d78f9941add29baebd4a812bff27f10a1d78b52aeb11c551468c8644443c86e1a2a6b2e4aead3d7f81d39925e3c20406ac1499
-
Filesize
190B
MD51c7b7ecb983c284796fd394355db90d7
SHA1bb4f24567f32481b6efbcc5a124f685e7a9172cb
SHA256b8bdee0284fd6029fde2355c23d43d4ef3b2469111487b6c4daa10ef09a925f1
SHA5127390e473b35ad18ad7c244d5260d44bc6a01fed8336c0bf4474e4b0b3aaa2fe610cbe93120cc86a40e8abd4397569e4504d42dfa09eac343db7f71bd8c0645db
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
5KB
MD5ad185ab294a1083c57a80fbc333c680c
SHA101ed3d8bd4ee4eff89848ce8f8b5469afc9bf256
SHA256018850f313253a04fa0ae3f1a49951ab6d9c529c4cf5f554cb7eb332366d51e6
SHA512409be4ff8c68a007cb2c68b930cabf873de0315d765d8b81b8294f7f9a985eb148267cb956c9f767312fe48bf3498a5a51174cc587dbb07abee30998c60abecc
-
Filesize
6KB
MD567cf03ba967294ff2e97218031bd2707
SHA1ca615db07309e64c9c170cf89aaccbc84adf1745
SHA256924120b8504179e36017358cf3d38ae35727fd1b673497d2f78ea4744c57da4f
SHA512e77970fe7173f54ff49132565742ab6511dbe052c7aab1265d99e1352dd66bd7df1507f56f4dafa907b2cc3abc30be240ee8c246a3998d30cc589a1f5e17baf8
-
Filesize
6KB
MD588674680d03d846de2ec5f3300ce595d
SHA1038c34e6a29f3e2d589651abfa2fefa8cc38f04f
SHA256e85ea486bd507f04dab5c77d998f6588011c607f0d6a491e924ac09656128037
SHA512ea782d6956d549c245bc8e5ce16d477977935960f82aa5e119ba4e3b5c90b89925e49d9153486066598f722214a2a325f2ca579bd0b6de929d2cc557209162ab
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD59b4a7639c9ebb0a3123f177839a518cf
SHA1d0bb0a589527b7cd03cf42ff4e790f7279b2ec91
SHA2563fa5ee69f2694e95849a2ec459a71b73097e018199814728322057e12cbb5d23
SHA512f8867fffb76e85a9c53e6236d48d77f7e1f03858f41b90cca7c58b9bc17204bd2bc9378b44f657688eab76e3079284098954a71edfcf00f7a0469b8c382ccb32