Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
11/06/2024, 19:33
Static task
static1
Behavioral task
behavioral1
Sample
9f510a9dd279320af7f413963ff7d1e3_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
9f510a9dd279320af7f413963ff7d1e3_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
9f510a9dd279320af7f413963ff7d1e3_JaffaCakes118.html
-
Size
660B
-
MD5
9f510a9dd279320af7f413963ff7d1e3
-
SHA1
82e666e0ddfea0e432d91031b5bddb5431bb1703
-
SHA256
d0b1a9bdac5eb5755c899c4fe93cda09dc1dae9ccbbc6424e6117d9c22f4fc7c
-
SHA512
0dbb0541c1c38746958008310c3d69584b4c4457b0036e0268701c08e5d304e1c945003db63d5174dba196b0d44a7c79f590a688db6933eb8b0f8a884aff68c2
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3504 msedge.exe 3504 msedge.exe 4612 msedge.exe 4612 msedge.exe 2944 identity_helper.exe 2944 identity_helper.exe 2256 msedge.exe 2256 msedge.exe 2256 msedge.exe 2256 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 12 IoCs
pid Process 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4612 wrote to memory of 1552 4612 msedge.exe 80 PID 4612 wrote to memory of 1552 4612 msedge.exe 80 PID 4612 wrote to memory of 4780 4612 msedge.exe 81 PID 4612 wrote to memory of 4780 4612 msedge.exe 81 PID 4612 wrote to memory of 4780 4612 msedge.exe 81 PID 4612 wrote to memory of 4780 4612 msedge.exe 81 PID 4612 wrote to memory of 4780 4612 msedge.exe 81 PID 4612 wrote to memory of 4780 4612 msedge.exe 81 PID 4612 wrote to memory of 4780 4612 msedge.exe 81 PID 4612 wrote to memory of 4780 4612 msedge.exe 81 PID 4612 wrote to memory of 4780 4612 msedge.exe 81 PID 4612 wrote to memory of 4780 4612 msedge.exe 81 PID 4612 wrote to memory of 4780 4612 msedge.exe 81 PID 4612 wrote to memory of 4780 4612 msedge.exe 81 PID 4612 wrote to memory of 4780 4612 msedge.exe 81 PID 4612 wrote to memory of 4780 4612 msedge.exe 81 PID 4612 wrote to memory of 4780 4612 msedge.exe 81 PID 4612 wrote to memory of 4780 4612 msedge.exe 81 PID 4612 wrote to memory of 4780 4612 msedge.exe 81 PID 4612 wrote to memory of 4780 4612 msedge.exe 81 PID 4612 wrote to memory of 4780 4612 msedge.exe 81 PID 4612 wrote to memory of 4780 4612 msedge.exe 81 PID 4612 wrote to memory of 4780 4612 msedge.exe 81 PID 4612 wrote to memory of 4780 4612 msedge.exe 81 PID 4612 wrote to memory of 4780 4612 msedge.exe 81 PID 4612 wrote to memory of 4780 4612 msedge.exe 81 PID 4612 wrote to memory of 4780 4612 msedge.exe 81 PID 4612 wrote to memory of 4780 4612 msedge.exe 81 PID 4612 wrote to memory of 4780 4612 msedge.exe 81 PID 4612 wrote to memory of 4780 4612 msedge.exe 81 PID 4612 wrote to memory of 4780 4612 msedge.exe 81 PID 4612 wrote to memory of 4780 4612 msedge.exe 81 PID 4612 wrote to memory of 4780 4612 msedge.exe 81 PID 4612 wrote to memory of 4780 4612 msedge.exe 81 PID 4612 wrote to memory of 4780 4612 msedge.exe 81 PID 4612 wrote to memory of 4780 4612 msedge.exe 81 PID 4612 wrote to memory of 4780 4612 msedge.exe 81 PID 4612 wrote to memory of 4780 4612 msedge.exe 81 PID 4612 wrote to memory of 4780 4612 msedge.exe 81 PID 4612 wrote to memory of 4780 4612 msedge.exe 81 PID 4612 wrote to memory of 4780 4612 msedge.exe 81 PID 4612 wrote to memory of 4780 4612 msedge.exe 81 PID 4612 wrote to memory of 3504 4612 msedge.exe 82 PID 4612 wrote to memory of 3504 4612 msedge.exe 82 PID 4612 wrote to memory of 3204 4612 msedge.exe 83 PID 4612 wrote to memory of 3204 4612 msedge.exe 83 PID 4612 wrote to memory of 3204 4612 msedge.exe 83 PID 4612 wrote to memory of 3204 4612 msedge.exe 83 PID 4612 wrote to memory of 3204 4612 msedge.exe 83 PID 4612 wrote to memory of 3204 4612 msedge.exe 83 PID 4612 wrote to memory of 3204 4612 msedge.exe 83 PID 4612 wrote to memory of 3204 4612 msedge.exe 83 PID 4612 wrote to memory of 3204 4612 msedge.exe 83 PID 4612 wrote to memory of 3204 4612 msedge.exe 83 PID 4612 wrote to memory of 3204 4612 msedge.exe 83 PID 4612 wrote to memory of 3204 4612 msedge.exe 83 PID 4612 wrote to memory of 3204 4612 msedge.exe 83 PID 4612 wrote to memory of 3204 4612 msedge.exe 83 PID 4612 wrote to memory of 3204 4612 msedge.exe 83 PID 4612 wrote to memory of 3204 4612 msedge.exe 83 PID 4612 wrote to memory of 3204 4612 msedge.exe 83 PID 4612 wrote to memory of 3204 4612 msedge.exe 83 PID 4612 wrote to memory of 3204 4612 msedge.exe 83 PID 4612 wrote to memory of 3204 4612 msedge.exe 83
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\9f510a9dd279320af7f413963ff7d1e3_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4612 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbb2aa46f8,0x7ffbb2aa4708,0x7ffbb2aa47182⤵PID:1552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2008,4495730282888334104,8608686575157893185,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2028 /prefetch:22⤵PID:4780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2008,4495730282888334104,8608686575157893185,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2236 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2008,4495730282888334104,8608686575157893185,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2868 /prefetch:82⤵PID:3204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,4495730282888334104,8608686575157893185,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:4764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,4495730282888334104,8608686575157893185,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:2200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,4495730282888334104,8608686575157893185,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4124 /prefetch:12⤵PID:1276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2008,4495730282888334104,8608686575157893185,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5420 /prefetch:82⤵PID:208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2008,4495730282888334104,8608686575157893185,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5420 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,4495730282888334104,8608686575157893185,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4528 /prefetch:12⤵PID:4216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,4495730282888334104,8608686575157893185,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4652 /prefetch:12⤵PID:4856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,4495730282888334104,8608686575157893185,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4736 /prefetch:12⤵PID:3184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,4495730282888334104,8608686575157893185,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4792 /prefetch:12⤵PID:2448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,4495730282888334104,8608686575157893185,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5712 /prefetch:12⤵PID:1148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,4495730282888334104,8608686575157893185,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5528 /prefetch:12⤵PID:2256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,4495730282888334104,8608686575157893185,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,4495730282888334104,8608686575157893185,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3124 /prefetch:12⤵PID:976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2008,4495730282888334104,8608686575157893185,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6036 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,4495730282888334104,8608686575157893185,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2624 /prefetch:12⤵PID:2160
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4996
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:968
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556641592f6e69f5f5fb06f2319384490
SHA16a86be42e2c6d26b7830ad9f4e2627995fd91069
SHA25602d4984e590e947265474d592e64edde840fdca7eb881eebde3e220a1d883455
SHA512c75e689b2bbbe07ebf72baf75c56f19c39f45d5593cf47535eb722f95002b3ee418027047c0ee8d63800f499038db5e2c24aff9705d830c7b6eaa290d9adc868
-
Filesize
152B
MD5612a6c4247ef652299b376221c984213
SHA1d306f3b16bde39708aa862aee372345feb559750
SHA2569d8e24c91cff338e56b518a533cb2e49a2803356bbf6e04892fb168a7ce2844a
SHA51234a14d63abb1e3fe0f9927a94393043d458fe0624843e108d290266f554018e6379cba924cb5388735abdd6c5f1e2e318478a673f3f9b762815a758866d10973
-
Filesize
5KB
MD5ce02e016c7f9669b75db84e4e423dba1
SHA13968085ff60dde937dff57933a95cfbb4b1aa593
SHA2566ceaf8d69cd4aaeed6e7c8b77276cf7dcaaaa554fa4fa628e333bdacbf82475f
SHA5122af1f8f3c50e7742f4779289ce6d2ad0aa8c1c7ebacee4756f281fa5bfe01ed7378cd049330fd99d3218f9bca7f750420272c36bde1687618e9cc091161ed7a6
-
Filesize
6KB
MD5410912e2a07ef7badd9e99642b35c86a
SHA1205d24050aff3a8a1ab2ab42f68953a2291b8351
SHA2566028517df0d3b47bbaccd5aecc748c9be170880798997221c0eefa663185b66e
SHA512d25778c26ea48066bcc946be5baae482810f270b5dd5b0d52da044ff103255ba2e9d64d9a869eaf7036da179a9cf301665945962fa07dcbbac873ad99538eb7c
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
8KB
MD5ecdf9bac6ab4e91d2e99a9a5463e7051
SHA198765411f481f6b32e398c54d9e61db837a2368c
SHA2568056df6a4a47b1e914da0c5dfdfb172e190f20651d93ed166a674d46a63e3eaf
SHA5121719d09f8cb2538aa07133c95c3bcacdc2185f9cb8fb0dc362b09cb63131150a992cdbfea14d008fa79a1df8fb3b98497db4a1c5534f0c13044eaf50e51fb909