Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
11-06-2024 20:22
Static task
static1
Behavioral task
behavioral1
Sample
9f6d16d8b724cde6ab555d769fbc187f_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
9f6d16d8b724cde6ab555d769fbc187f_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
9f6d16d8b724cde6ab555d769fbc187f_JaffaCakes118.html
-
Size
361KB
-
MD5
9f6d16d8b724cde6ab555d769fbc187f
-
SHA1
88030908bdd876e9ac5039dd5792ac7f71ef0802
-
SHA256
e27273f53ffaada107a0272ca59d92a550161a4574f23a179dadd51800e3b1c0
-
SHA512
fdcee2515adcf8aa4d95ea7b4528a894ade4a5683883030db9fd917983d6ab1547cc432c9d15f8125ca239e727fe3b96a9749b947a8514f46a2adc45fc4d02b6
-
SSDEEP
3072:Lnu2RE0bl2/K/CRh6T8/Z/BQhpI5e7oQgwNRmt:3oQgwNRmt
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3200 msedge.exe 3200 msedge.exe 2464 msedge.exe 2464 msedge.exe 3980 identity_helper.exe 3980 identity_helper.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2464 wrote to memory of 4848 2464 msedge.exe 80 PID 2464 wrote to memory of 4848 2464 msedge.exe 80 PID 2464 wrote to memory of 1384 2464 msedge.exe 81 PID 2464 wrote to memory of 1384 2464 msedge.exe 81 PID 2464 wrote to memory of 1384 2464 msedge.exe 81 PID 2464 wrote to memory of 1384 2464 msedge.exe 81 PID 2464 wrote to memory of 1384 2464 msedge.exe 81 PID 2464 wrote to memory of 1384 2464 msedge.exe 81 PID 2464 wrote to memory of 1384 2464 msedge.exe 81 PID 2464 wrote to memory of 1384 2464 msedge.exe 81 PID 2464 wrote to memory of 1384 2464 msedge.exe 81 PID 2464 wrote to memory of 1384 2464 msedge.exe 81 PID 2464 wrote to memory of 1384 2464 msedge.exe 81 PID 2464 wrote to memory of 1384 2464 msedge.exe 81 PID 2464 wrote to memory of 1384 2464 msedge.exe 81 PID 2464 wrote to memory of 1384 2464 msedge.exe 81 PID 2464 wrote to memory of 1384 2464 msedge.exe 81 PID 2464 wrote to memory of 1384 2464 msedge.exe 81 PID 2464 wrote to memory of 1384 2464 msedge.exe 81 PID 2464 wrote to memory of 1384 2464 msedge.exe 81 PID 2464 wrote to memory of 1384 2464 msedge.exe 81 PID 2464 wrote to memory of 1384 2464 msedge.exe 81 PID 2464 wrote to memory of 1384 2464 msedge.exe 81 PID 2464 wrote to memory of 1384 2464 msedge.exe 81 PID 2464 wrote to memory of 1384 2464 msedge.exe 81 PID 2464 wrote to memory of 1384 2464 msedge.exe 81 PID 2464 wrote to memory of 1384 2464 msedge.exe 81 PID 2464 wrote to memory of 1384 2464 msedge.exe 81 PID 2464 wrote to memory of 1384 2464 msedge.exe 81 PID 2464 wrote to memory of 1384 2464 msedge.exe 81 PID 2464 wrote to memory of 1384 2464 msedge.exe 81 PID 2464 wrote to memory of 1384 2464 msedge.exe 81 PID 2464 wrote to memory of 1384 2464 msedge.exe 81 PID 2464 wrote to memory of 1384 2464 msedge.exe 81 PID 2464 wrote to memory of 1384 2464 msedge.exe 81 PID 2464 wrote to memory of 1384 2464 msedge.exe 81 PID 2464 wrote to memory of 1384 2464 msedge.exe 81 PID 2464 wrote to memory of 1384 2464 msedge.exe 81 PID 2464 wrote to memory of 1384 2464 msedge.exe 81 PID 2464 wrote to memory of 1384 2464 msedge.exe 81 PID 2464 wrote to memory of 1384 2464 msedge.exe 81 PID 2464 wrote to memory of 1384 2464 msedge.exe 81 PID 2464 wrote to memory of 3200 2464 msedge.exe 82 PID 2464 wrote to memory of 3200 2464 msedge.exe 82 PID 2464 wrote to memory of 4312 2464 msedge.exe 83 PID 2464 wrote to memory of 4312 2464 msedge.exe 83 PID 2464 wrote to memory of 4312 2464 msedge.exe 83 PID 2464 wrote to memory of 4312 2464 msedge.exe 83 PID 2464 wrote to memory of 4312 2464 msedge.exe 83 PID 2464 wrote to memory of 4312 2464 msedge.exe 83 PID 2464 wrote to memory of 4312 2464 msedge.exe 83 PID 2464 wrote to memory of 4312 2464 msedge.exe 83 PID 2464 wrote to memory of 4312 2464 msedge.exe 83 PID 2464 wrote to memory of 4312 2464 msedge.exe 83 PID 2464 wrote to memory of 4312 2464 msedge.exe 83 PID 2464 wrote to memory of 4312 2464 msedge.exe 83 PID 2464 wrote to memory of 4312 2464 msedge.exe 83 PID 2464 wrote to memory of 4312 2464 msedge.exe 83 PID 2464 wrote to memory of 4312 2464 msedge.exe 83 PID 2464 wrote to memory of 4312 2464 msedge.exe 83 PID 2464 wrote to memory of 4312 2464 msedge.exe 83 PID 2464 wrote to memory of 4312 2464 msedge.exe 83 PID 2464 wrote to memory of 4312 2464 msedge.exe 83 PID 2464 wrote to memory of 4312 2464 msedge.exe 83
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\9f6d16d8b724cde6ab555d769fbc187f_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd944946f8,0x7ffd94494708,0x7ffd944947182⤵PID:4848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,17558137767860953723,2883828086557958740,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2080 /prefetch:22⤵PID:1384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2056,17558137767860953723,2883828086557958740,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2272 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2056,17558137767860953723,2883828086557958740,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2724 /prefetch:82⤵PID:4312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,17558137767860953723,2883828086557958740,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3208 /prefetch:12⤵PID:2232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,17558137767860953723,2883828086557958740,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:2168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,17558137767860953723,2883828086557958740,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5380 /prefetch:82⤵PID:3968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,17558137767860953723,2883828086557958740,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5380 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,17558137767860953723,2883828086557958740,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4968 /prefetch:12⤵PID:3176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,17558137767860953723,2883828086557958740,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4976 /prefetch:12⤵PID:872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,17558137767860953723,2883828086557958740,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5504 /prefetch:12⤵PID:3668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,17558137767860953723,2883828086557958740,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2612 /prefetch:12⤵PID:4084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,17558137767860953723,2883828086557958740,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4852 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3444
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2308
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4976
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52daa93382bba07cbc40af372d30ec576
SHA1c5e709dc3e2e4df2ff841fbde3e30170e7428a94
SHA2561826d2a57b1938c148bf212a47d947ed1bfb26cfc55868931f843ee438117f30
SHA51265635cb59c81548a9ef8fdb0942331e7f3cd0c30ce1d4dba48aed72dbb27b06511a55d2aeaadfadbbb4b7cb4b2e2772bbabba9603b3f7d9c8b9e4a7fbf3d6b6b
-
Filesize
152B
MD5ecdc2754d7d2ae862272153aa9b9ca6e
SHA1c19bed1c6e1c998b9fa93298639ad7961339147d
SHA256a13d791473f836edcab0e93451ce7b7182efbbc54261b2b5644d319e047a00a7
SHA512cd4fb81317d540f8b15f1495a381bb6f0f129b8923a7c06e4b5cf777d2625c30304aee6cc68aa20479e08d84e5030b43fbe93e479602400334dfdd7297f702f2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\8dc7c9ce-5fdb-4524-999d-afb315a2235c.tmp
Filesize6KB
MD56ca1f61887d7e048082638dd448356ee
SHA10f2e5b0fa03b0a0f38c6478ffafc048a9c3ec80a
SHA2568b04f78e7fa7f4190e83bedce502882df5921efad624a6dbcef6e4236733a216
SHA512b28cf4b2262e9c9ad367b7c2101a519f031b3df4be8eed752d40c96aa64194ca803c1337c19d608e5833cdaa38016a878c875cef0ab7a0b29ca5c6703e8ad580
-
Filesize
188B
MD506b053870aeafb9626a3b5811ccd994a
SHA1d88305e47ea47e234be3659546db33e5bfae8717
SHA256c3fdeb105b90eacca573ba56b3c14fa5a8690400884388cc0c789d20b9a4cd42
SHA512f2b890bd469f7f2cbeebe1e3aa1c6ae5aa01d73e21b60a55cff405ee4bc236ab8d1d494b555772b2ec1370f5b508b1aa6edbaf30024df01910e28b4c40b66627
-
Filesize
5KB
MD56d685c0504fb8866c6223433d7c3cc31
SHA13965b7642e25ae83c07ffe6d30d0c355cd9f6456
SHA256e1fda0b8f76cc12982ad32913f8d04dcb596590721deb0b360efb5f2d4f17c02
SHA512eecebdb10e583569251934997a27adda07c2cf673ae8f8de2fa1a0a4654b1699c39d605999411d13b1ffc489a9acf947230c50059dc4443c7dce80491f6b1bd5
-
Filesize
203B
MD58f245fc49cb789bb8375a4fc37e54988
SHA13b2bdc92c89bbb62b10d8885d27db25cb7641a5c
SHA256849b40bfae3a2d02a821b87dfb5a621e9fb71640c74b75d0f8fd170bd8c6b884
SHA512b415298b0c87b01046c1bacbf30c9bf14fa31b1bcb39aa165d223f6f30b65176dca742c94de3dcdf6ad38d27e66c2f1ec45ff44556bac94dae90ee49c8a0d6c6
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\dddc6d01-a4a0-4978-9b27-8048a8cc3744.tmp
Filesize203B
MD5b35db1affedfeb422a834b9e722bbb11
SHA111cd05c3a4de231685285e9045f7c22c9f63fde8
SHA25647800ef5366279525b47b8861f1b2d97ebaa69f89b5747a4b0c9590560c2f9ec
SHA512032d292c7ec794d8f776c221fd5f97566a64464268c76cc93362f94f7284ca9082d1d33c9d46ff1bdca7f2cda8da9b295a03f13e59246b75b4c1f409eb2cebe2
-
Filesize
10KB
MD5bd689d73e22cc138c0899d96825a0867
SHA1229950f95d7098dcdbeefd45681f5390f4d0fea2
SHA256f062dd8a6d0b44aedb514943e3c22111411d9015cb4e4e2f74c78fade4db49fb
SHA512af0576fd4153e5f58375a2ed54b798d44a16573f153e3e3c2b6a9ce663ed46925942d95e30be8540d42fa3cdcb1b2dd263556884b3c8d1edf0bca206c3dcfea8