Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
11/06/2024, 03:29
Static task
static1
Behavioral task
behavioral1
Sample
9cdabbc61cbfc09fdbf356d65d3bab39_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
9cdabbc61cbfc09fdbf356d65d3bab39_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
9cdabbc61cbfc09fdbf356d65d3bab39_JaffaCakes118.html
-
Size
17KB
-
MD5
9cdabbc61cbfc09fdbf356d65d3bab39
-
SHA1
9733f2d48b26ae78d2ea340e9d5d7ec146dbd497
-
SHA256
bdf0f8ea8ee5718048fb145dbd4c03e63f278594c8b078ae09d7bcfe55551198
-
SHA512
96c612a09e0692def7bfc4b337998bb8bed4982520cefc8b9ece9beb5d02f35a3225722d1bdc2b0ef76afc28eb9cef6925ddf8ccffc835fc70a5a485181dedd9
-
SSDEEP
384:Szknila+BMkBMeBMT9JCMpAnst8iBxn8xYiq6Xl:uM+CkCeCPCMh8ipiq6l
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4712 msedge.exe 4712 msedge.exe 3208 msedge.exe 3208 msedge.exe 2192 identity_helper.exe 2192 identity_helper.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3208 wrote to memory of 4664 3208 msedge.exe 81 PID 3208 wrote to memory of 4664 3208 msedge.exe 81 PID 3208 wrote to memory of 5000 3208 msedge.exe 82 PID 3208 wrote to memory of 5000 3208 msedge.exe 82 PID 3208 wrote to memory of 5000 3208 msedge.exe 82 PID 3208 wrote to memory of 5000 3208 msedge.exe 82 PID 3208 wrote to memory of 5000 3208 msedge.exe 82 PID 3208 wrote to memory of 5000 3208 msedge.exe 82 PID 3208 wrote to memory of 5000 3208 msedge.exe 82 PID 3208 wrote to memory of 5000 3208 msedge.exe 82 PID 3208 wrote to memory of 5000 3208 msedge.exe 82 PID 3208 wrote to memory of 5000 3208 msedge.exe 82 PID 3208 wrote to memory of 5000 3208 msedge.exe 82 PID 3208 wrote to memory of 5000 3208 msedge.exe 82 PID 3208 wrote to memory of 5000 3208 msedge.exe 82 PID 3208 wrote to memory of 5000 3208 msedge.exe 82 PID 3208 wrote to memory of 5000 3208 msedge.exe 82 PID 3208 wrote to memory of 5000 3208 msedge.exe 82 PID 3208 wrote to memory of 5000 3208 msedge.exe 82 PID 3208 wrote to memory of 5000 3208 msedge.exe 82 PID 3208 wrote to memory of 5000 3208 msedge.exe 82 PID 3208 wrote to memory of 5000 3208 msedge.exe 82 PID 3208 wrote to memory of 5000 3208 msedge.exe 82 PID 3208 wrote to memory of 5000 3208 msedge.exe 82 PID 3208 wrote to memory of 5000 3208 msedge.exe 82 PID 3208 wrote to memory of 5000 3208 msedge.exe 82 PID 3208 wrote to memory of 5000 3208 msedge.exe 82 PID 3208 wrote to memory of 5000 3208 msedge.exe 82 PID 3208 wrote to memory of 5000 3208 msedge.exe 82 PID 3208 wrote to memory of 5000 3208 msedge.exe 82 PID 3208 wrote to memory of 5000 3208 msedge.exe 82 PID 3208 wrote to memory of 5000 3208 msedge.exe 82 PID 3208 wrote to memory of 5000 3208 msedge.exe 82 PID 3208 wrote to memory of 5000 3208 msedge.exe 82 PID 3208 wrote to memory of 5000 3208 msedge.exe 82 PID 3208 wrote to memory of 5000 3208 msedge.exe 82 PID 3208 wrote to memory of 5000 3208 msedge.exe 82 PID 3208 wrote to memory of 5000 3208 msedge.exe 82 PID 3208 wrote to memory of 5000 3208 msedge.exe 82 PID 3208 wrote to memory of 5000 3208 msedge.exe 82 PID 3208 wrote to memory of 5000 3208 msedge.exe 82 PID 3208 wrote to memory of 5000 3208 msedge.exe 82 PID 3208 wrote to memory of 4712 3208 msedge.exe 83 PID 3208 wrote to memory of 4712 3208 msedge.exe 83 PID 3208 wrote to memory of 3988 3208 msedge.exe 84 PID 3208 wrote to memory of 3988 3208 msedge.exe 84 PID 3208 wrote to memory of 3988 3208 msedge.exe 84 PID 3208 wrote to memory of 3988 3208 msedge.exe 84 PID 3208 wrote to memory of 3988 3208 msedge.exe 84 PID 3208 wrote to memory of 3988 3208 msedge.exe 84 PID 3208 wrote to memory of 3988 3208 msedge.exe 84 PID 3208 wrote to memory of 3988 3208 msedge.exe 84 PID 3208 wrote to memory of 3988 3208 msedge.exe 84 PID 3208 wrote to memory of 3988 3208 msedge.exe 84 PID 3208 wrote to memory of 3988 3208 msedge.exe 84 PID 3208 wrote to memory of 3988 3208 msedge.exe 84 PID 3208 wrote to memory of 3988 3208 msedge.exe 84 PID 3208 wrote to memory of 3988 3208 msedge.exe 84 PID 3208 wrote to memory of 3988 3208 msedge.exe 84 PID 3208 wrote to memory of 3988 3208 msedge.exe 84 PID 3208 wrote to memory of 3988 3208 msedge.exe 84 PID 3208 wrote to memory of 3988 3208 msedge.exe 84 PID 3208 wrote to memory of 3988 3208 msedge.exe 84 PID 3208 wrote to memory of 3988 3208 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\9cdabbc61cbfc09fdbf356d65d3bab39_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3208 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0x40,0x108,0x7ff9fad346f8,0x7ff9fad34708,0x7ff9fad347182⤵PID:4664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,17929893699300601238,2910022824262118843,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:22⤵PID:5000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2068,17929893699300601238,2910022824262118843,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2224 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2068,17929893699300601238,2910022824262118843,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2928 /prefetch:82⤵PID:3988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,17929893699300601238,2910022824262118843,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:1140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,17929893699300601238,2910022824262118843,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,17929893699300601238,2910022824262118843,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5124 /prefetch:82⤵PID:4700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,17929893699300601238,2910022824262118843,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5124 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,17929893699300601238,2910022824262118843,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5192 /prefetch:12⤵PID:624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,17929893699300601238,2910022824262118843,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5208 /prefetch:12⤵PID:4704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,17929893699300601238,2910022824262118843,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5572 /prefetch:12⤵PID:3716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,17929893699300601238,2910022824262118843,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:12⤵PID:4752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,17929893699300601238,2910022824262118843,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4912 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:644
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2708
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3648
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c9c4c494f8fba32d95ba2125f00586a3
SHA18a600205528aef7953144f1cf6f7a5115e3611de
SHA256a0ca609205813c307df9122c0c5b0967c5472755700f615b0033129cf7d6b35b
SHA5129d30cea6cfc259e97b0305f8b5cd19774044fb78feedfcef2014b2947f2e6a101273bc4ad30db9cc1724e62eb441266d7df376e28ac58693f128b9cce2c7d20d
-
Filesize
152B
MD54dc6fc5e708279a3310fe55d9c44743d
SHA1a42e8bdf9d1c25ef3e223d59f6b1d16b095f46d2
SHA256a1c5f48659d4b3af960971b3a0f433a95fee5bfafe5680a34110c68b342377d8
SHA5125874b2310187f242b852fa6dcded244cc860abb2be4f6f5a6a1db8322e12e1fef8f825edc0aae75adbb7284a2cd64730650d0643b1e2bb7ead9350e50e1d8c13
-
Filesize
256B
MD596ff37bbf065b8c26c05a56c7511cc63
SHA19990f3320c9a3092fc769038563f0560e6bef03f
SHA256366d5b7b49c5d4b549387ae39607660b62622b0261185792df441528ac0081c7
SHA512597db0efc9ee028c2f7d19904af29c7bb41bd82000256a5dafb730bc566082a7dfece865f29ed02388268f8fe49e33e903dec71e1e71a8c2ec847b0279513868
-
Filesize
5KB
MD58486e6202670ed81b88b3412a575c2d4
SHA15a0871571e24a41cd8ae6c531599489f2f590c20
SHA2567e6d09b33686b12a40eac4ed7f4cc206db4889b0c7a4358b3b1923f2502ae7fc
SHA512d95b78067eee8c002cd6c487a147816c9dc714952d2e645c7daf27e438bb8bdc1491edb14ca0aeb79f58cd38d9e158eb2078cb75c40797b73bde8e3fec119b40
-
Filesize
6KB
MD523106348a47578ffe0d7085341258637
SHA1cf26002a3d0308f94e3eb8712be7853beecc1fc8
SHA2564e45b7438c00b7ec8f8454e006ca08ee04b73401ef2ab5f856fe8092e631f8e7
SHA512bd900c7aa50d1d4845ad5845579139bba10337154fddab04329785a68e619eaf5bda61eaa6a25a4fcf03d9593cd973a02a70e4a0316d70c5045ee3eb57d30cf5
-
Filesize
372B
MD5a98b49ca6da024fd7f9e9ccc679cac1f
SHA196cb634bd7e1893bdade9d5028e3486152c01628
SHA2562e1460ff42ed1142e997eaa0d5a82138629c9644be960615d2876cebdbf21490
SHA5129c0571a6097959c650e6923c252518005999d29065da5af9ff21e88e3e3bc6e3f01e657a366578d6cc662220e5a9776794e549ceacca4468e5318dd433c9f23a
-
Filesize
372B
MD5fdfaf4cc28bc8887ced2c862fd93adaf
SHA1fa2581e4a79cd161aa267ee540509737ae6ac8d1
SHA256de4cd7f96feca05761715dad93780c166da234bcaf266de7ada2314038d7d980
SHA512cbbff6ed4c03508a66596c637d45ca2fdc1f43b638776e9441ceddb08977b6d0aae72cffbceffd849c6cff7c48b38d699806578e513b74cb906609915330c892
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD5d2852393bda1f64f7638fbb5a74d266b
SHA1569cbb9a8536670a54dac0ffd992fd356519369a
SHA256e7ff9d242c3d1e2bda23dcf5c222fbbba35d5d2dff99359d43521b5aadb47904
SHA5127f0a365a28579f22b837321d31e84425f9eaacd6f25508c9e7a22fd314d2387d92eb842c42e654d39fb1be07c9d57c8c941d628ae118cb5c0c9d833b5582e75d