Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
06-06-2024 01:10
Static task
static1
Behavioral task
behavioral1
Sample
99ad0b882f855d6918b6c2eb85fb4230_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
99ad0b882f855d6918b6c2eb85fb4230_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
99ad0b882f855d6918b6c2eb85fb4230_JaffaCakes118.html
-
Size
122KB
-
MD5
99ad0b882f855d6918b6c2eb85fb4230
-
SHA1
d1a55c1ce2f248cf4e05b55ef60cfe4718d04108
-
SHA256
6b1a04608e69ee8fdc75c030d78179e3f60b7cee594dc1aebcb8104713d889d5
-
SHA512
5c67b800672771a03f7a6b7936f0f5896a8344fb12b619f2284e5c5fbcd4dab8ef853a6397bff5042cc87694f0e4f03ed0219109ae8e95c1d12fc42dea9e8d7d
-
SSDEEP
3072:HHBgpt5BWfjRn+5EeotNt8aNEDGETmhyhhRTtwN:HHBoWfjRn+5EeotNt8aNEDGETmwhW
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4416 msedge.exe 4416 msedge.exe 3676 msedge.exe 3676 msedge.exe 2716 msedge.exe 2716 msedge.exe 2716 msedge.exe 2716 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3676 wrote to memory of 2708 3676 msedge.exe 83 PID 3676 wrote to memory of 2708 3676 msedge.exe 83 PID 3676 wrote to memory of 2568 3676 msedge.exe 84 PID 3676 wrote to memory of 2568 3676 msedge.exe 84 PID 3676 wrote to memory of 2568 3676 msedge.exe 84 PID 3676 wrote to memory of 2568 3676 msedge.exe 84 PID 3676 wrote to memory of 2568 3676 msedge.exe 84 PID 3676 wrote to memory of 2568 3676 msedge.exe 84 PID 3676 wrote to memory of 2568 3676 msedge.exe 84 PID 3676 wrote to memory of 2568 3676 msedge.exe 84 PID 3676 wrote to memory of 2568 3676 msedge.exe 84 PID 3676 wrote to memory of 2568 3676 msedge.exe 84 PID 3676 wrote to memory of 2568 3676 msedge.exe 84 PID 3676 wrote to memory of 2568 3676 msedge.exe 84 PID 3676 wrote to memory of 2568 3676 msedge.exe 84 PID 3676 wrote to memory of 2568 3676 msedge.exe 84 PID 3676 wrote to memory of 2568 3676 msedge.exe 84 PID 3676 wrote to memory of 2568 3676 msedge.exe 84 PID 3676 wrote to memory of 2568 3676 msedge.exe 84 PID 3676 wrote to memory of 2568 3676 msedge.exe 84 PID 3676 wrote to memory of 2568 3676 msedge.exe 84 PID 3676 wrote to memory of 2568 3676 msedge.exe 84 PID 3676 wrote to memory of 2568 3676 msedge.exe 84 PID 3676 wrote to memory of 2568 3676 msedge.exe 84 PID 3676 wrote to memory of 2568 3676 msedge.exe 84 PID 3676 wrote to memory of 2568 3676 msedge.exe 84 PID 3676 wrote to memory of 2568 3676 msedge.exe 84 PID 3676 wrote to memory of 2568 3676 msedge.exe 84 PID 3676 wrote to memory of 2568 3676 msedge.exe 84 PID 3676 wrote to memory of 2568 3676 msedge.exe 84 PID 3676 wrote to memory of 2568 3676 msedge.exe 84 PID 3676 wrote to memory of 2568 3676 msedge.exe 84 PID 3676 wrote to memory of 2568 3676 msedge.exe 84 PID 3676 wrote to memory of 2568 3676 msedge.exe 84 PID 3676 wrote to memory of 2568 3676 msedge.exe 84 PID 3676 wrote to memory of 2568 3676 msedge.exe 84 PID 3676 wrote to memory of 2568 3676 msedge.exe 84 PID 3676 wrote to memory of 2568 3676 msedge.exe 84 PID 3676 wrote to memory of 2568 3676 msedge.exe 84 PID 3676 wrote to memory of 2568 3676 msedge.exe 84 PID 3676 wrote to memory of 2568 3676 msedge.exe 84 PID 3676 wrote to memory of 2568 3676 msedge.exe 84 PID 3676 wrote to memory of 4416 3676 msedge.exe 85 PID 3676 wrote to memory of 4416 3676 msedge.exe 85 PID 3676 wrote to memory of 2184 3676 msedge.exe 86 PID 3676 wrote to memory of 2184 3676 msedge.exe 86 PID 3676 wrote to memory of 2184 3676 msedge.exe 86 PID 3676 wrote to memory of 2184 3676 msedge.exe 86 PID 3676 wrote to memory of 2184 3676 msedge.exe 86 PID 3676 wrote to memory of 2184 3676 msedge.exe 86 PID 3676 wrote to memory of 2184 3676 msedge.exe 86 PID 3676 wrote to memory of 2184 3676 msedge.exe 86 PID 3676 wrote to memory of 2184 3676 msedge.exe 86 PID 3676 wrote to memory of 2184 3676 msedge.exe 86 PID 3676 wrote to memory of 2184 3676 msedge.exe 86 PID 3676 wrote to memory of 2184 3676 msedge.exe 86 PID 3676 wrote to memory of 2184 3676 msedge.exe 86 PID 3676 wrote to memory of 2184 3676 msedge.exe 86 PID 3676 wrote to memory of 2184 3676 msedge.exe 86 PID 3676 wrote to memory of 2184 3676 msedge.exe 86 PID 3676 wrote to memory of 2184 3676 msedge.exe 86 PID 3676 wrote to memory of 2184 3676 msedge.exe 86 PID 3676 wrote to memory of 2184 3676 msedge.exe 86 PID 3676 wrote to memory of 2184 3676 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\99ad0b882f855d6918b6c2eb85fb4230_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3676 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcce9946f8,0x7ffcce994708,0x7ffcce9947182⤵PID:2708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2224,10621823833374746155,2713949060033803759,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2236 /prefetch:22⤵PID:2568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2224,10621823833374746155,2713949060033803759,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2288 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2224,10621823833374746155,2713949060033803759,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2884 /prefetch:82⤵PID:2184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,10621823833374746155,2713949060033803759,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:3704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,10621823833374746155,2713949060033803759,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:1280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,10621823833374746155,2713949060033803759,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,10621823833374746155,2713949060033803759,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4908 /prefetch:12⤵PID:2396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,10621823833374746155,2713949060033803759,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5212 /prefetch:12⤵PID:3108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2224,10621823833374746155,2713949060033803759,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4748 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2716
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1420
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:444
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54b4f91fa1b362ba5341ecb2836438dea
SHA19561f5aabed742404d455da735259a2c6781fa07
SHA256d824b742eace197ddc8b6ed5d918f390fde4b0fbf0e371b8e1f2ed40a3b6455c
SHA512fef22217dcdd8000bc193e25129699d4b8f7a103ca4fe1613baf73ccf67090d9fbae27eb93e4bb8747455853a0a4326f2d0c38df41c8d42351cdcd4132418dac
-
Filesize
152B
MD5eaa3db555ab5bc0cb364826204aad3f0
SHA1a4cdfaac8de49e6e6e88b335cfeaa7c9e3c563ca
SHA256ef7baeb1b2ab05ff3c5fbb76c2759db49294654548706c7c8e87f0cde855b86b
SHA512e13981da51b52c15261ecabb98af32f9b920651b46b10ce0cc823c5878b22eb1420258c80deef204070d1e0bdd3a64d875ac2522e3713a3cf11657aa55aeccd4
-
Filesize
23KB
MD5e1c71f7c04be834f5587230db2ad24b3
SHA1f3bab9cb99d9f343bf7ed3981aaa7450515d2424
SHA2569fb6c768068467b58cc773a3907f3f5ec170bfe02ca8f301f6a232a9daf5a899
SHA512205366b4a3ca0dae58722a19ba24088dd8db483db9d14b376434024b064715ade720347ff5de87db014e32d2ef8192e71bbbdd3c885d5a8581b4aafc6e88ce51
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize264B
MD5133ce0b0cbb9a9ade54ca6f12a5667c9
SHA12ddefb82f38d561cfd50f58af12f9aec92826d2b
SHA256a0bfda49d91c1deb43e0ded23eae6495fc761d80b47bde8c7f9615d4bee28717
SHA512946bf34e9def05a521d56a28aa968107d0495442dfa38352cef7a8af1b0a73238ac221254fdf2b5ace67b065fe02bcf4e75c4e2b47856e64d735c4894763e862
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize288B
MD5b7738735ece4177bc4067b2c5ed1ec0e
SHA10aed8b72f382c298bb00834e4a82edb6bc80aaf4
SHA256fdedf7f2dbcf5d6353c9d41ae0022f5c423f35264ebe953518e8be8946def90d
SHA512acbee7e8dca1a7a6c68b00dcfb27e0c7b042bf5d2a954eef75c313bcdb809dcf1b21946ea45120630b27201ece449581f24b31349ee02a3451800d386821d1e2
-
Filesize
2KB
MD5a29763a760002b3aeccc7538c2df915f
SHA1d8606a070b6ea85a6f0fd260e148c1b3347f7270
SHA2566b6f25c287f16c37aad6cb60f68f67481228ff0b5cbe6888973c83198f6ede94
SHA512ae916ce1d03a6f1ed2535b509627e43873fb80778c8f1bdfcb0d5cae3f3973be8e90ad74084df04315fa122f4fcf4725fa1aaca0e20ef898f11a827588b015bf
-
Filesize
5KB
MD5ad4a93c7812294cae119cce8fbdfdfc2
SHA1a5b584de9ec466a6c3642d416d866d3334f0f243
SHA256554d1ad7bf2eacac70a74021808bb9e04f242587ecb69894c267653b0d5d0101
SHA512e7d2d9810e01922cf249d836a353fa552dcff2129bb379d8a3df54463536c525a289f0953531d8271aee856d7bf07d3dd320d5c01b2b745fcf7a66aebde94919
-
Filesize
7KB
MD56178a3433b9bebb7041877be9bf4ef18
SHA18e1ac1ff1bf6b09afb10bc0be6c9be0ca71b404f
SHA256fa6c55101afaeb37f7fc150fc318247c18cd531ee3a5b24abec224b564166bae
SHA512f5ed23f29b5551ecc9b63ac751a1450491eff9ed75295e95ae2fc0616aa7a34a16f3ec2e83c04b8c6f02f2f6469f937d3d774a342e1c680157711b1eeb4c6872
-
Filesize
11KB
MD5c951c109670f77df30e951923688f091
SHA127cf39c75b584dfe00b1d1f83b4278bc11bc9fb4
SHA2561d8cfb2574b8271cdf98ccacfbb73988365cee18d5901e47ee92c7407e8b4f3a
SHA5124e55ac5e6722c50851eab05a5e70c4ca2e789b755bee7bf1de7fce2d77725996da5be8673d6fe26118834fc82f307ea54e515fcbd4fb2d6b8737bbe33e9c717b