Analysis
-
max time kernel
145s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
11-06-2024 02:07
Static task
static1
Behavioral task
behavioral1
Sample
9cacaa282087daa72050ca82d6df7260_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
9cacaa282087daa72050ca82d6df7260_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
9cacaa282087daa72050ca82d6df7260_JaffaCakes118.html
-
Size
2KB
-
MD5
9cacaa282087daa72050ca82d6df7260
-
SHA1
c7adaddeac454858e4768f9e4b67d817447e8316
-
SHA256
440904f862a7f9e3fba78d18d321379af3fdeedcbadd39c74efe208d4e0aa043
-
SHA512
0e8b119551ac87dd51652431bfed2141df8686163aee7b3246e84334a240d7f4a7e88f2d681fed13a907c80929b6b0d134038317f33e52ee347e6ba0258c5876
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2848 msedge.exe 2848 msedge.exe 3004 msedge.exe 3004 msedge.exe 1476 identity_helper.exe 1476 identity_helper.exe 4760 msedge.exe 4760 msedge.exe 4760 msedge.exe 4760 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3004 wrote to memory of 3948 3004 msedge.exe 82 PID 3004 wrote to memory of 3948 3004 msedge.exe 82 PID 3004 wrote to memory of 2376 3004 msedge.exe 83 PID 3004 wrote to memory of 2376 3004 msedge.exe 83 PID 3004 wrote to memory of 2376 3004 msedge.exe 83 PID 3004 wrote to memory of 2376 3004 msedge.exe 83 PID 3004 wrote to memory of 2376 3004 msedge.exe 83 PID 3004 wrote to memory of 2376 3004 msedge.exe 83 PID 3004 wrote to memory of 2376 3004 msedge.exe 83 PID 3004 wrote to memory of 2376 3004 msedge.exe 83 PID 3004 wrote to memory of 2376 3004 msedge.exe 83 PID 3004 wrote to memory of 2376 3004 msedge.exe 83 PID 3004 wrote to memory of 2376 3004 msedge.exe 83 PID 3004 wrote to memory of 2376 3004 msedge.exe 83 PID 3004 wrote to memory of 2376 3004 msedge.exe 83 PID 3004 wrote to memory of 2376 3004 msedge.exe 83 PID 3004 wrote to memory of 2376 3004 msedge.exe 83 PID 3004 wrote to memory of 2376 3004 msedge.exe 83 PID 3004 wrote to memory of 2376 3004 msedge.exe 83 PID 3004 wrote to memory of 2376 3004 msedge.exe 83 PID 3004 wrote to memory of 2376 3004 msedge.exe 83 PID 3004 wrote to memory of 2376 3004 msedge.exe 83 PID 3004 wrote to memory of 2376 3004 msedge.exe 83 PID 3004 wrote to memory of 2376 3004 msedge.exe 83 PID 3004 wrote to memory of 2376 3004 msedge.exe 83 PID 3004 wrote to memory of 2376 3004 msedge.exe 83 PID 3004 wrote to memory of 2376 3004 msedge.exe 83 PID 3004 wrote to memory of 2376 3004 msedge.exe 83 PID 3004 wrote to memory of 2376 3004 msedge.exe 83 PID 3004 wrote to memory of 2376 3004 msedge.exe 83 PID 3004 wrote to memory of 2376 3004 msedge.exe 83 PID 3004 wrote to memory of 2376 3004 msedge.exe 83 PID 3004 wrote to memory of 2376 3004 msedge.exe 83 PID 3004 wrote to memory of 2376 3004 msedge.exe 83 PID 3004 wrote to memory of 2376 3004 msedge.exe 83 PID 3004 wrote to memory of 2376 3004 msedge.exe 83 PID 3004 wrote to memory of 2376 3004 msedge.exe 83 PID 3004 wrote to memory of 2376 3004 msedge.exe 83 PID 3004 wrote to memory of 2376 3004 msedge.exe 83 PID 3004 wrote to memory of 2376 3004 msedge.exe 83 PID 3004 wrote to memory of 2376 3004 msedge.exe 83 PID 3004 wrote to memory of 2376 3004 msedge.exe 83 PID 3004 wrote to memory of 2848 3004 msedge.exe 84 PID 3004 wrote to memory of 2848 3004 msedge.exe 84 PID 3004 wrote to memory of 3692 3004 msedge.exe 85 PID 3004 wrote to memory of 3692 3004 msedge.exe 85 PID 3004 wrote to memory of 3692 3004 msedge.exe 85 PID 3004 wrote to memory of 3692 3004 msedge.exe 85 PID 3004 wrote to memory of 3692 3004 msedge.exe 85 PID 3004 wrote to memory of 3692 3004 msedge.exe 85 PID 3004 wrote to memory of 3692 3004 msedge.exe 85 PID 3004 wrote to memory of 3692 3004 msedge.exe 85 PID 3004 wrote to memory of 3692 3004 msedge.exe 85 PID 3004 wrote to memory of 3692 3004 msedge.exe 85 PID 3004 wrote to memory of 3692 3004 msedge.exe 85 PID 3004 wrote to memory of 3692 3004 msedge.exe 85 PID 3004 wrote to memory of 3692 3004 msedge.exe 85 PID 3004 wrote to memory of 3692 3004 msedge.exe 85 PID 3004 wrote to memory of 3692 3004 msedge.exe 85 PID 3004 wrote to memory of 3692 3004 msedge.exe 85 PID 3004 wrote to memory of 3692 3004 msedge.exe 85 PID 3004 wrote to memory of 3692 3004 msedge.exe 85 PID 3004 wrote to memory of 3692 3004 msedge.exe 85 PID 3004 wrote to memory of 3692 3004 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\9cacaa282087daa72050ca82d6df7260_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe4d6046f8,0x7ffe4d604708,0x7ffe4d6047182⤵PID:3948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,981793415742936668,9884051188591110990,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2196 /prefetch:22⤵PID:2376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,981793415742936668,9884051188591110990,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2248 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,981793415742936668,9884051188591110990,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2816 /prefetch:82⤵PID:3692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,981793415742936668,9884051188591110990,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:3260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,981793415742936668,9884051188591110990,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,981793415742936668,9884051188591110990,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4248 /prefetch:12⤵PID:4216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,981793415742936668,9884051188591110990,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4868 /prefetch:12⤵PID:2100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,981793415742936668,9884051188591110990,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:12⤵PID:1552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,981793415742936668,9884051188591110990,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4936 /prefetch:82⤵PID:3932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,981793415742936668,9884051188591110990,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4936 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,981793415742936668,9884051188591110990,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4880 /prefetch:12⤵PID:1332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,981793415742936668,9884051188591110990,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4260 /prefetch:12⤵PID:4032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,981793415742936668,9884051188591110990,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5652 /prefetch:12⤵PID:4380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,981793415742936668,9884051188591110990,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5296 /prefetch:12⤵PID:3316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,981793415742936668,9884051188591110990,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2672 /prefetch:12⤵PID:1796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,981793415742936668,9884051188591110990,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5440 /prefetch:12⤵PID:5116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,981793415742936668,9884051188591110990,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6060 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4760
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3208
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2904
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52daa93382bba07cbc40af372d30ec576
SHA1c5e709dc3e2e4df2ff841fbde3e30170e7428a94
SHA2561826d2a57b1938c148bf212a47d947ed1bfb26cfc55868931f843ee438117f30
SHA51265635cb59c81548a9ef8fdb0942331e7f3cd0c30ce1d4dba48aed72dbb27b06511a55d2aeaadfadbbb4b7cb4b2e2772bbabba9603b3f7d9c8b9e4a7fbf3d6b6b
-
Filesize
152B
MD5ecdc2754d7d2ae862272153aa9b9ca6e
SHA1c19bed1c6e1c998b9fa93298639ad7961339147d
SHA256a13d791473f836edcab0e93451ce7b7182efbbc54261b2b5644d319e047a00a7
SHA512cd4fb81317d540f8b15f1495a381bb6f0f129b8923a7c06e4b5cf777d2625c30304aee6cc68aa20479e08d84e5030b43fbe93e479602400334dfdd7297f702f2
-
Filesize
5KB
MD5f4cde1c436344f8e10338125ff44cf07
SHA1168df57d219179dc819849e7694ab1e868ec67b4
SHA256d8f0ce5cd199b1cdd47531b2511c1572968c2cdcefd868bfeb0f4bb4bc0f93f4
SHA51208e1303f41abdaf9693bd2192925e967598db369f908a182b8b36250c795e96a1ce4667269d733888e1758c920763282391f52030bcee886bbf3c4691dd484a0
-
Filesize
6KB
MD5fef19b26292abd8421b05a603113000d
SHA1f10053d5d7f037cc5b7bec369cadc9a0f0e88316
SHA25622e01c0b6d350bfb07cccf59456b88cf0c37d276ab7e677cf30ea2e91964de3d
SHA512a6b212367c67c9fecd238c639ab207e3135a3573b1c83c03a0253f71b43180a1a8f85815e7637e1895be6a06cfbc1943ae0debb94efea1e254fb14a2f8500722
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5ec7466aa8fd8879fccd65577d08cea39
SHA18c09f454b82f7bc674ff4a569b25ac1d8f4b8dfc
SHA2568d9443ecd5bcc2ea50df892f0a8f0871af3a43e484d48ffb23c6c5476828254c
SHA512d8368ce5665e267199c3f08f00f7a69a7d74c20b76bf9c8fd0425b26194be7cd7490240f322ce3c604ec21438fe3734de9f769c0120d213f204681921ab2c46c