Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
06/06/2024, 02:32
Static task
static1
Behavioral task
behavioral1
Sample
99d1ff46589a5f381e17a20a3c545572_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
99d1ff46589a5f381e17a20a3c545572_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
99d1ff46589a5f381e17a20a3c545572_JaffaCakes118.html
-
Size
12KB
-
MD5
99d1ff46589a5f381e17a20a3c545572
-
SHA1
cf765935cb120e57c629594c66b5ac5a0a0bc55c
-
SHA256
07d304fdedf18344d82a50f47040652142cd174ad46ea429fb8ddff28c5573a5
-
SHA512
34f684e13ee462407f29ebcef315324ef42e8e578519e4a96f806e910eb04d3bfc1661df61fe104d998a89ee34eab6d6e17ef88b8bc47e20359f46db696e48ff
-
SSDEEP
384:S/Cs5FzxmsNb8hzjSGTILr0z1HPYsOwim7:Sd5FdPNQlOwiM
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3736 msedge.exe 3736 msedge.exe 3004 msedge.exe 3004 msedge.exe 4044 identity_helper.exe 4044 identity_helper.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3004 wrote to memory of 2220 3004 msedge.exe 83 PID 3004 wrote to memory of 2220 3004 msedge.exe 83 PID 3004 wrote to memory of 864 3004 msedge.exe 86 PID 3004 wrote to memory of 864 3004 msedge.exe 86 PID 3004 wrote to memory of 864 3004 msedge.exe 86 PID 3004 wrote to memory of 864 3004 msedge.exe 86 PID 3004 wrote to memory of 864 3004 msedge.exe 86 PID 3004 wrote to memory of 864 3004 msedge.exe 86 PID 3004 wrote to memory of 864 3004 msedge.exe 86 PID 3004 wrote to memory of 864 3004 msedge.exe 86 PID 3004 wrote to memory of 864 3004 msedge.exe 86 PID 3004 wrote to memory of 864 3004 msedge.exe 86 PID 3004 wrote to memory of 864 3004 msedge.exe 86 PID 3004 wrote to memory of 864 3004 msedge.exe 86 PID 3004 wrote to memory of 864 3004 msedge.exe 86 PID 3004 wrote to memory of 864 3004 msedge.exe 86 PID 3004 wrote to memory of 864 3004 msedge.exe 86 PID 3004 wrote to memory of 864 3004 msedge.exe 86 PID 3004 wrote to memory of 864 3004 msedge.exe 86 PID 3004 wrote to memory of 864 3004 msedge.exe 86 PID 3004 wrote to memory of 864 3004 msedge.exe 86 PID 3004 wrote to memory of 864 3004 msedge.exe 86 PID 3004 wrote to memory of 864 3004 msedge.exe 86 PID 3004 wrote to memory of 864 3004 msedge.exe 86 PID 3004 wrote to memory of 864 3004 msedge.exe 86 PID 3004 wrote to memory of 864 3004 msedge.exe 86 PID 3004 wrote to memory of 864 3004 msedge.exe 86 PID 3004 wrote to memory of 864 3004 msedge.exe 86 PID 3004 wrote to memory of 864 3004 msedge.exe 86 PID 3004 wrote to memory of 864 3004 msedge.exe 86 PID 3004 wrote to memory of 864 3004 msedge.exe 86 PID 3004 wrote to memory of 864 3004 msedge.exe 86 PID 3004 wrote to memory of 864 3004 msedge.exe 86 PID 3004 wrote to memory of 864 3004 msedge.exe 86 PID 3004 wrote to memory of 864 3004 msedge.exe 86 PID 3004 wrote to memory of 864 3004 msedge.exe 86 PID 3004 wrote to memory of 864 3004 msedge.exe 86 PID 3004 wrote to memory of 864 3004 msedge.exe 86 PID 3004 wrote to memory of 864 3004 msedge.exe 86 PID 3004 wrote to memory of 864 3004 msedge.exe 86 PID 3004 wrote to memory of 864 3004 msedge.exe 86 PID 3004 wrote to memory of 864 3004 msedge.exe 86 PID 3004 wrote to memory of 3736 3004 msedge.exe 87 PID 3004 wrote to memory of 3736 3004 msedge.exe 87 PID 3004 wrote to memory of 3220 3004 msedge.exe 88 PID 3004 wrote to memory of 3220 3004 msedge.exe 88 PID 3004 wrote to memory of 3220 3004 msedge.exe 88 PID 3004 wrote to memory of 3220 3004 msedge.exe 88 PID 3004 wrote to memory of 3220 3004 msedge.exe 88 PID 3004 wrote to memory of 3220 3004 msedge.exe 88 PID 3004 wrote to memory of 3220 3004 msedge.exe 88 PID 3004 wrote to memory of 3220 3004 msedge.exe 88 PID 3004 wrote to memory of 3220 3004 msedge.exe 88 PID 3004 wrote to memory of 3220 3004 msedge.exe 88 PID 3004 wrote to memory of 3220 3004 msedge.exe 88 PID 3004 wrote to memory of 3220 3004 msedge.exe 88 PID 3004 wrote to memory of 3220 3004 msedge.exe 88 PID 3004 wrote to memory of 3220 3004 msedge.exe 88 PID 3004 wrote to memory of 3220 3004 msedge.exe 88 PID 3004 wrote to memory of 3220 3004 msedge.exe 88 PID 3004 wrote to memory of 3220 3004 msedge.exe 88 PID 3004 wrote to memory of 3220 3004 msedge.exe 88 PID 3004 wrote to memory of 3220 3004 msedge.exe 88 PID 3004 wrote to memory of 3220 3004 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\99d1ff46589a5f381e17a20a3c545572_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb649446f8,0x7ffb64944708,0x7ffb649447182⤵PID:2220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,7622762051578718088,8173640836452109269,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2064 /prefetch:22⤵PID:864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2052,7622762051578718088,8173640836452109269,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2528 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2052,7622762051578718088,8173640836452109269,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2808 /prefetch:82⤵PID:3220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,7622762051578718088,8173640836452109269,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,7622762051578718088,8173640836452109269,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:3112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,7622762051578718088,8173640836452109269,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5264 /prefetch:82⤵PID:2252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,7622762051578718088,8173640836452109269,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5264 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,7622762051578718088,8173640836452109269,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4736 /prefetch:12⤵PID:3108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,7622762051578718088,8173640836452109269,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4696 /prefetch:12⤵PID:1968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,7622762051578718088,8173640836452109269,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3772 /prefetch:12⤵PID:4980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,7622762051578718088,8173640836452109269,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3992 /prefetch:12⤵PID:620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,7622762051578718088,8173640836452109269,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1260 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1028
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4092
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3412
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
Filesize
259B
MD50925cce19d681d519008e04bbc91ed06
SHA1c8b542ed9d3b84f72eb2c00be268ba2d217c9ea3
SHA256eb7494ef76e523372c22aab317d87442d5eb37013db65fc86e9a4332947d323d
SHA512e8e002b1cca1cefe27312bfabd8437db63e3eadef428e37746710e1a33cf6d9b2694eae508ac8b77b404a2c2d92caed8b321da0bb8e40b3691b0336a856306c2
-
Filesize
5KB
MD5cac6667239cd6b2dc2ec1e3d130bec9b
SHA1c0ba0bff6728a92aab2d37bd09459bd2b65e0d95
SHA25673ffb0dc6fa663a12e39d75fbafeb82519acff07a7d14d44cf3c44626bae9d86
SHA512b5d1e4d6c78f5a98482127379f98cc1641cea8c8502774b9cb5ac36de608b77dc5df04ca1366bfc1913f676c589c174d102f1c9225bc8b57bfa570be698c6a51
-
Filesize
6KB
MD551840a7eeb9c46dd836aae0610895cc6
SHA1c10b7683e5bcc9cf68186d24c60737e22158fd60
SHA256c96aa4a609cae4ce8cabddef841fb95913552845c96d9ac276c06b3d85e77ad9
SHA512a16fe04db37465d8efa93b096cf382cc41e666fcec2e68c6c2919dd626a80db46db48de786202ea5f1acff2ea3c7def1bc7b5fd41c9c887580abf1afab4e4cc3
-
Filesize
6KB
MD53918f2472416574091c5a7652ffca6ff
SHA1469b2cb342d66d2ec0a5ce3e1e5606c7c734f7a6
SHA256802b0332ede407026fd2cb1ebda2bbc2fb9ace780670760f0eea9d37272d7c60
SHA5125d26069642ba1881353b7cc752ed6912fecc6b1519f423ae838113f9d94f25bf845d78fbf224de9d1773056e94a82cf1c258abde0d916b3f4fb3f8ed43d91b4b
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD50d7f565512d61cf7b30bbc53156f5eab
SHA1da509280edfddb9573ce3cc0db7130192c0c1aa2
SHA25656018f475fa6ed937f95d848b58c16cd4afe3ff41695908a796f78d3050628ea
SHA512dd6f6f96ed116256fa6440a10494f7adfcc9d278800019b2e794f7c40044290db93e4ba16bd7179355f9531ef55d15fef3c3066234977bf76133ba19d9307372