Analysis
-
max time kernel
145s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
05/06/2024, 13:45
Static task
static1
Behavioral task
behavioral1
Sample
9850980597dfaa09b3acd5ffcecd4c57_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
9850980597dfaa09b3acd5ffcecd4c57_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
9850980597dfaa09b3acd5ffcecd4c57_JaffaCakes118.html
-
Size
16KB
-
MD5
9850980597dfaa09b3acd5ffcecd4c57
-
SHA1
b1071380cb7b131b6635a28bc4dd0ce68b858ce6
-
SHA256
60f365f146980dcee65eacdf72a6dc62376c3c78b29e9815224c3033d4260ac7
-
SHA512
493fd749baddfa76beb484ec706f754c0b40f750885b71d77b78780998f6b9563cf81337b7f9b40d2d1d2a27be40d7b127476210cef5df3d65d49d9df02a30a9
-
SSDEEP
384:hfv4kY5yuiCtmyaznnLKWy8XA2v6LXs+B93e0SA:hfvUMc3aznnL8MAaEs+BBF
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 1136 msedge.exe 1136 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4528 identity_helper.exe 4528 identity_helper.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4696 wrote to memory of 2596 4696 msedge.exe 83 PID 4696 wrote to memory of 2596 4696 msedge.exe 83 PID 4696 wrote to memory of 4656 4696 msedge.exe 86 PID 4696 wrote to memory of 4656 4696 msedge.exe 86 PID 4696 wrote to memory of 4656 4696 msedge.exe 86 PID 4696 wrote to memory of 4656 4696 msedge.exe 86 PID 4696 wrote to memory of 4656 4696 msedge.exe 86 PID 4696 wrote to memory of 4656 4696 msedge.exe 86 PID 4696 wrote to memory of 4656 4696 msedge.exe 86 PID 4696 wrote to memory of 4656 4696 msedge.exe 86 PID 4696 wrote to memory of 4656 4696 msedge.exe 86 PID 4696 wrote to memory of 4656 4696 msedge.exe 86 PID 4696 wrote to memory of 4656 4696 msedge.exe 86 PID 4696 wrote to memory of 4656 4696 msedge.exe 86 PID 4696 wrote to memory of 4656 4696 msedge.exe 86 PID 4696 wrote to memory of 4656 4696 msedge.exe 86 PID 4696 wrote to memory of 4656 4696 msedge.exe 86 PID 4696 wrote to memory of 4656 4696 msedge.exe 86 PID 4696 wrote to memory of 4656 4696 msedge.exe 86 PID 4696 wrote to memory of 4656 4696 msedge.exe 86 PID 4696 wrote to memory of 4656 4696 msedge.exe 86 PID 4696 wrote to memory of 4656 4696 msedge.exe 86 PID 4696 wrote to memory of 4656 4696 msedge.exe 86 PID 4696 wrote to memory of 4656 4696 msedge.exe 86 PID 4696 wrote to memory of 4656 4696 msedge.exe 86 PID 4696 wrote to memory of 4656 4696 msedge.exe 86 PID 4696 wrote to memory of 4656 4696 msedge.exe 86 PID 4696 wrote to memory of 4656 4696 msedge.exe 86 PID 4696 wrote to memory of 4656 4696 msedge.exe 86 PID 4696 wrote to memory of 4656 4696 msedge.exe 86 PID 4696 wrote to memory of 4656 4696 msedge.exe 86 PID 4696 wrote to memory of 4656 4696 msedge.exe 86 PID 4696 wrote to memory of 4656 4696 msedge.exe 86 PID 4696 wrote to memory of 4656 4696 msedge.exe 86 PID 4696 wrote to memory of 4656 4696 msedge.exe 86 PID 4696 wrote to memory of 4656 4696 msedge.exe 86 PID 4696 wrote to memory of 4656 4696 msedge.exe 86 PID 4696 wrote to memory of 4656 4696 msedge.exe 86 PID 4696 wrote to memory of 4656 4696 msedge.exe 86 PID 4696 wrote to memory of 4656 4696 msedge.exe 86 PID 4696 wrote to memory of 4656 4696 msedge.exe 86 PID 4696 wrote to memory of 4656 4696 msedge.exe 86 PID 4696 wrote to memory of 1136 4696 msedge.exe 87 PID 4696 wrote to memory of 1136 4696 msedge.exe 87 PID 4696 wrote to memory of 4836 4696 msedge.exe 88 PID 4696 wrote to memory of 4836 4696 msedge.exe 88 PID 4696 wrote to memory of 4836 4696 msedge.exe 88 PID 4696 wrote to memory of 4836 4696 msedge.exe 88 PID 4696 wrote to memory of 4836 4696 msedge.exe 88 PID 4696 wrote to memory of 4836 4696 msedge.exe 88 PID 4696 wrote to memory of 4836 4696 msedge.exe 88 PID 4696 wrote to memory of 4836 4696 msedge.exe 88 PID 4696 wrote to memory of 4836 4696 msedge.exe 88 PID 4696 wrote to memory of 4836 4696 msedge.exe 88 PID 4696 wrote to memory of 4836 4696 msedge.exe 88 PID 4696 wrote to memory of 4836 4696 msedge.exe 88 PID 4696 wrote to memory of 4836 4696 msedge.exe 88 PID 4696 wrote to memory of 4836 4696 msedge.exe 88 PID 4696 wrote to memory of 4836 4696 msedge.exe 88 PID 4696 wrote to memory of 4836 4696 msedge.exe 88 PID 4696 wrote to memory of 4836 4696 msedge.exe 88 PID 4696 wrote to memory of 4836 4696 msedge.exe 88 PID 4696 wrote to memory of 4836 4696 msedge.exe 88 PID 4696 wrote to memory of 4836 4696 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\9850980597dfaa09b3acd5ffcecd4c57_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4696 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd6b7d46f8,0x7ffd6b7d4708,0x7ffd6b7d47182⤵PID:2596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,14572694520507354222,4914432636594358913,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:22⤵PID:4656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,14572694520507354222,4914432636594358913,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2284 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,14572694520507354222,4914432636594358913,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2928 /prefetch:82⤵PID:4836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,14572694520507354222,4914432636594358913,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:5072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,14572694520507354222,4914432636594358913,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:1012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,14572694520507354222,4914432636594358913,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5244 /prefetch:82⤵PID:3136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,14572694520507354222,4914432636594358913,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5244 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,14572694520507354222,4914432636594358913,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4788 /prefetch:12⤵PID:4000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,14572694520507354222,4914432636594358913,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4780 /prefetch:12⤵PID:2716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,14572694520507354222,4914432636594358913,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4976 /prefetch:12⤵PID:2252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,14572694520507354222,4914432636594358913,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5356 /prefetch:12⤵PID:4232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,14572694520507354222,4914432636594358913,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4884 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5048
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3264
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4936
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556641592f6e69f5f5fb06f2319384490
SHA16a86be42e2c6d26b7830ad9f4e2627995fd91069
SHA25602d4984e590e947265474d592e64edde840fdca7eb881eebde3e220a1d883455
SHA512c75e689b2bbbe07ebf72baf75c56f19c39f45d5593cf47535eb722f95002b3ee418027047c0ee8d63800f499038db5e2c24aff9705d830c7b6eaa290d9adc868
-
Filesize
152B
MD5612a6c4247ef652299b376221c984213
SHA1d306f3b16bde39708aa862aee372345feb559750
SHA2569d8e24c91cff338e56b518a533cb2e49a2803356bbf6e04892fb168a7ce2844a
SHA51234a14d63abb1e3fe0f9927a94393043d458fe0624843e108d290266f554018e6379cba924cb5388735abdd6c5f1e2e318478a673f3f9b762815a758866d10973
-
Filesize
5KB
MD569129d03ecaff59e8e036214dc013e25
SHA1a865de6999154b60373b44073a7b51d246b0af0c
SHA2565c409ae49996db3d06e3df34f752df4eae463fb5bfb3cc3c7870cf09fb990a55
SHA512777b0b3b55a3a752dc6e6434541ee29dfe96ca4bdff1e526e37e5bdfad874d188db60f70eca4a1901ba12954f6b7dda275f321c7f343e6a333b29720654ccb1f
-
Filesize
6KB
MD55bee049845416c32d81ae112fdf0ad20
SHA13563844f92497b639e3ae096a42cf9768eca5f00
SHA2567fcec152bb2b9d3568be0e30ca9fd02b4fd6d9c1a1846197c95d5e09e0d8a274
SHA512a2fe64d622db400264a9e5607373683634309d891bf81a22a7686b236551b76af1ab76bc2a8e5bdd5a218d753bd40de0863f034df95bd3d615088cb3c33aa78f
-
Filesize
6KB
MD5a28ec3eba321d5274b94aabeba7a94cf
SHA131711472de8f114221336d1a19d8628c3e29c1dd
SHA2561c1211065533c44b4da2b25ec72a769173f5dfcba5b0075889971b3c2b6ebab2
SHA512d9ea86896a3b05a9c88f2bcde55bd62affa817e1d258a77dfc096d29a265313e198f4c2dadf0a42457a64e5bd00513601ce92ce73247593b5d5b0c87248c1457
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5eb64e37126b4f6a937cc979d29c03d95
SHA18c676bbdd020b29b6c3166ffa3e225f7aa1b7513
SHA256659e7220be923eb60266187edca226d58ba1c35754c0a72b98b1554cbeef61a3
SHA5126a5b31ff37c9a5545f48268a540f771d0c3e76ac0dd51e0d2a2cc5a98e5c2edd315d0473f16dfaaa3cacceb0f7d8bd0f74b1fdb15434c99eacdafdea76a76e78