Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
06-06-2024 04:17
Static task
static1
Behavioral task
behavioral1
Sample
99f344327e9124b7bc94df8fab650361_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
99f344327e9124b7bc94df8fab650361_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
99f344327e9124b7bc94df8fab650361_JaffaCakes118.html
-
Size
56KB
-
MD5
99f344327e9124b7bc94df8fab650361
-
SHA1
8c79c9610fb8a7a92211cfae86d39d8919268a1d
-
SHA256
f52d74c3d0eb8b5c203743c352252db4f5a0cdb057a08239f40d207072573485
-
SHA512
d9f6f5d063371eceb5dce2b84f0fbea1856f4f7f165a1a8b1136e3c65fb7150304e468f82e0327273177cb4a6573a9b9ce92bae6a71bf2e5e7eb564a556dfb86
-
SSDEEP
1536:NQi7+bayiBQoyGFNeveHC3IEdxndQ1w7pe:S7ayXvC5CjxndQ1wte
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4952 msedge.exe 4952 msedge.exe 4388 msedge.exe 4388 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe 1036 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4388 wrote to memory of 2240 4388 msedge.exe 82 PID 4388 wrote to memory of 2240 4388 msedge.exe 82 PID 4388 wrote to memory of 1536 4388 msedge.exe 85 PID 4388 wrote to memory of 1536 4388 msedge.exe 85 PID 4388 wrote to memory of 1536 4388 msedge.exe 85 PID 4388 wrote to memory of 1536 4388 msedge.exe 85 PID 4388 wrote to memory of 1536 4388 msedge.exe 85 PID 4388 wrote to memory of 1536 4388 msedge.exe 85 PID 4388 wrote to memory of 1536 4388 msedge.exe 85 PID 4388 wrote to memory of 1536 4388 msedge.exe 85 PID 4388 wrote to memory of 1536 4388 msedge.exe 85 PID 4388 wrote to memory of 1536 4388 msedge.exe 85 PID 4388 wrote to memory of 1536 4388 msedge.exe 85 PID 4388 wrote to memory of 1536 4388 msedge.exe 85 PID 4388 wrote to memory of 1536 4388 msedge.exe 85 PID 4388 wrote to memory of 1536 4388 msedge.exe 85 PID 4388 wrote to memory of 1536 4388 msedge.exe 85 PID 4388 wrote to memory of 1536 4388 msedge.exe 85 PID 4388 wrote to memory of 1536 4388 msedge.exe 85 PID 4388 wrote to memory of 1536 4388 msedge.exe 85 PID 4388 wrote to memory of 1536 4388 msedge.exe 85 PID 4388 wrote to memory of 1536 4388 msedge.exe 85 PID 4388 wrote to memory of 1536 4388 msedge.exe 85 PID 4388 wrote to memory of 1536 4388 msedge.exe 85 PID 4388 wrote to memory of 1536 4388 msedge.exe 85 PID 4388 wrote to memory of 1536 4388 msedge.exe 85 PID 4388 wrote to memory of 1536 4388 msedge.exe 85 PID 4388 wrote to memory of 1536 4388 msedge.exe 85 PID 4388 wrote to memory of 1536 4388 msedge.exe 85 PID 4388 wrote to memory of 1536 4388 msedge.exe 85 PID 4388 wrote to memory of 1536 4388 msedge.exe 85 PID 4388 wrote to memory of 1536 4388 msedge.exe 85 PID 4388 wrote to memory of 1536 4388 msedge.exe 85 PID 4388 wrote to memory of 1536 4388 msedge.exe 85 PID 4388 wrote to memory of 1536 4388 msedge.exe 85 PID 4388 wrote to memory of 1536 4388 msedge.exe 85 PID 4388 wrote to memory of 1536 4388 msedge.exe 85 PID 4388 wrote to memory of 1536 4388 msedge.exe 85 PID 4388 wrote to memory of 1536 4388 msedge.exe 85 PID 4388 wrote to memory of 1536 4388 msedge.exe 85 PID 4388 wrote to memory of 1536 4388 msedge.exe 85 PID 4388 wrote to memory of 1536 4388 msedge.exe 85 PID 4388 wrote to memory of 4952 4388 msedge.exe 86 PID 4388 wrote to memory of 4952 4388 msedge.exe 86 PID 4388 wrote to memory of 3740 4388 msedge.exe 87 PID 4388 wrote to memory of 3740 4388 msedge.exe 87 PID 4388 wrote to memory of 3740 4388 msedge.exe 87 PID 4388 wrote to memory of 3740 4388 msedge.exe 87 PID 4388 wrote to memory of 3740 4388 msedge.exe 87 PID 4388 wrote to memory of 3740 4388 msedge.exe 87 PID 4388 wrote to memory of 3740 4388 msedge.exe 87 PID 4388 wrote to memory of 3740 4388 msedge.exe 87 PID 4388 wrote to memory of 3740 4388 msedge.exe 87 PID 4388 wrote to memory of 3740 4388 msedge.exe 87 PID 4388 wrote to memory of 3740 4388 msedge.exe 87 PID 4388 wrote to memory of 3740 4388 msedge.exe 87 PID 4388 wrote to memory of 3740 4388 msedge.exe 87 PID 4388 wrote to memory of 3740 4388 msedge.exe 87 PID 4388 wrote to memory of 3740 4388 msedge.exe 87 PID 4388 wrote to memory of 3740 4388 msedge.exe 87 PID 4388 wrote to memory of 3740 4388 msedge.exe 87 PID 4388 wrote to memory of 3740 4388 msedge.exe 87 PID 4388 wrote to memory of 3740 4388 msedge.exe 87 PID 4388 wrote to memory of 3740 4388 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\99f344327e9124b7bc94df8fab650361_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4388 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffff2ca46f8,0x7ffff2ca4708,0x7ffff2ca47182⤵PID:2240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,10084713567936869278,4299736440877081734,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 /prefetch:22⤵PID:1536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,10084713567936869278,4299736440877081734,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2212 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,10084713567936869278,4299736440877081734,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2928 /prefetch:82⤵PID:3740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,10084713567936869278,4299736440877081734,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,10084713567936869278,4299736440877081734,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:1016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,10084713567936869278,4299736440877081734,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5160 /prefetch:12⤵PID:1572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,10084713567936869278,4299736440877081734,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1260 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1036
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1896
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4776
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c9c4c494f8fba32d95ba2125f00586a3
SHA18a600205528aef7953144f1cf6f7a5115e3611de
SHA256a0ca609205813c307df9122c0c5b0967c5472755700f615b0033129cf7d6b35b
SHA5129d30cea6cfc259e97b0305f8b5cd19774044fb78feedfcef2014b2947f2e6a101273bc4ad30db9cc1724e62eb441266d7df376e28ac58693f128b9cce2c7d20d
-
Filesize
152B
MD54dc6fc5e708279a3310fe55d9c44743d
SHA1a42e8bdf9d1c25ef3e223d59f6b1d16b095f46d2
SHA256a1c5f48659d4b3af960971b3a0f433a95fee5bfafe5680a34110c68b342377d8
SHA5125874b2310187f242b852fa6dcded244cc860abb2be4f6f5a6a1db8322e12e1fef8f825edc0aae75adbb7284a2cd64730650d0643b1e2bb7ead9350e50e1d8c13
-
Filesize
44KB
MD523536ccfe05b737ae639fe63ee4cc435
SHA16d2e9822835dc3e6117a4d2addfc8f241fbdbc82
SHA2566ae9edfc411ede03661a3d910fafddab3d6b313d1f4668dc8c5a84c5ab23a3ce
SHA512f416e36b2322bbebd211fd1ea69c88883f00c7b00f14474a5fcce4a408840c0d1b0304eb8941509a38157d0583485f638959eb7d5b9ae668aa88c1d3eee8dd0d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize192B
MD5b4ea10afc8abed6af1e84774b1457950
SHA1ae12ab87be8b6cd7ef9ab303de8e116ae4fe6778
SHA2569e7b2fee4e71aeabda4a76098aa47cf20efb9457409115b53e800da98b39dfd6
SHA512686d4d2822b03f641018f96f03628b194f2ad8fde69234bfc9dbb10b14c64f771719a7e5fb228d04530984c7786ff982d054da07fcb74700e95f509adbbca90c
-
Filesize
2KB
MD5c528afa4f62aa01b48bfce3ab83a4089
SHA124c0c0e9feff804bd43ef49fa4252fe73aec3e64
SHA256b2e20d45f7e464a866eca99d9874c061a44791f391640c7e75a41127b278e86d
SHA51271c2eb5cddd6c5bf678e2257bde9930b3e6461ef47d934560a9b75557f50c3d994f7173dabdd4714fd2884489c76075f17961cdf0a23efc0f75cfba4161452c0
-
Filesize
7KB
MD53a75f9a585950ed95f7bb433a8c430b7
SHA1919380f28a5210970e24bf2b52cf87b976c44c2a
SHA256d9041a31c47154780f9466e890e0137a58d127466c788771fb69663a252a6bd4
SHA512c7752fedf94f13cc5bc9ed088d06388d22f45da10bce47f06d4d650d8fc79e6239c2ac8355a0aac0494048bb5014bef2c3bb4bfd6aac489af05cd5b914dc9ecb
-
Filesize
5KB
MD51858219eb96def08dec861a193dc8d34
SHA1d40b551de0bca9e3f7ea4bf2939fd89313aa6d71
SHA2566c71b67b3b50b51108e80579aa78d15443e46d37657950682939406bb8624a39
SHA512c3ffffcf0fad4d65a59eaae52cbcbd9b7e6fb167432ce556745bcd4a07b6a97f15ae5b86f803db3c0ff979273964f9e5818b8ad831b92c8a7c371d51df4b48b3
-
Filesize
6KB
MD5b6d3b5eb88ab869d5dc9e72687dff795
SHA1c9e06105d833d3bcc186e71bdad89193fbc4b088
SHA2566e9094642d71ae2d0bbfd086ee3e65fe5f44534fd4ebbc6dfe8b8e391cf8416e
SHA51278d5f3ff86eb05e66d9bddb4d2650984371697918e4c3508699f95b7199e8723bc66a4cbfd3c218ba55468b1db3b7f5d2ae61f2a3a2fa09b7d28af3553a74786
-
Filesize
10KB
MD5d25357a389181b0a6a90b87521225444
SHA1594fbb1219ac1bc51143a01708e4583fd2c91196
SHA256149ed6a3b46aa39172237adf9417fde4f7af699c9cdfe02203a934003a2d9b39
SHA512ddcc67475147c00b28069bad004257e3d47cd6ee7ccadeb2cf5603996bce191ab3460531eeabdaffb3a8da190979fbd85239f5069c6de411f441b54398b66985