Analysis
-
max time kernel
145s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
12-06-2024 19:53
Static task
static1
Behavioral task
behavioral1
Sample
a213bc705d68ea9d8a1ab9ff9decea37_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
a213bc705d68ea9d8a1ab9ff9decea37_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
a213bc705d68ea9d8a1ab9ff9decea37_JaffaCakes118.html
-
Size
347KB
-
MD5
a213bc705d68ea9d8a1ab9ff9decea37
-
SHA1
a59b19a43ff980801cc746baef744260c767d23a
-
SHA256
934b6dd095fa7a688322c47fa57fa405f8c30c0daccc579829e94db3f43695f5
-
SHA512
23af25ef881741bb9cf896df69c81b869a965641b61672221559701e804201aba2896a8036746a4ec9eb34b99d8b7a6ae2579118546ad6c5e828d0d1b8eb9b44
-
SSDEEP
6144:SR0DvwGyHjZZvosMYod+X3oI+YRGDe1sMYod+X3oI+YRGDev:W0DvwGyHjZZv25d+X3vGDG5d+X3vGDc
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 4340 msedge.exe 4340 msedge.exe 3220 msedge.exe 3220 msedge.exe 4848 identity_helper.exe 4848 identity_helper.exe 2384 msedge.exe 2384 msedge.exe 2384 msedge.exe 2384 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
Processes:
msedge.exepid process 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 3220 wrote to memory of 4660 3220 msedge.exe msedge.exe PID 3220 wrote to memory of 4660 3220 msedge.exe msedge.exe PID 3220 wrote to memory of 4372 3220 msedge.exe msedge.exe PID 3220 wrote to memory of 4372 3220 msedge.exe msedge.exe PID 3220 wrote to memory of 4372 3220 msedge.exe msedge.exe PID 3220 wrote to memory of 4372 3220 msedge.exe msedge.exe PID 3220 wrote to memory of 4372 3220 msedge.exe msedge.exe PID 3220 wrote to memory of 4372 3220 msedge.exe msedge.exe PID 3220 wrote to memory of 4372 3220 msedge.exe msedge.exe PID 3220 wrote to memory of 4372 3220 msedge.exe msedge.exe PID 3220 wrote to memory of 4372 3220 msedge.exe msedge.exe PID 3220 wrote to memory of 4372 3220 msedge.exe msedge.exe PID 3220 wrote to memory of 4372 3220 msedge.exe msedge.exe PID 3220 wrote to memory of 4372 3220 msedge.exe msedge.exe PID 3220 wrote to memory of 4372 3220 msedge.exe msedge.exe PID 3220 wrote to memory of 4372 3220 msedge.exe msedge.exe PID 3220 wrote to memory of 4372 3220 msedge.exe msedge.exe PID 3220 wrote to memory of 4372 3220 msedge.exe msedge.exe PID 3220 wrote to memory of 4372 3220 msedge.exe msedge.exe PID 3220 wrote to memory of 4372 3220 msedge.exe msedge.exe PID 3220 wrote to memory of 4372 3220 msedge.exe msedge.exe PID 3220 wrote to memory of 4372 3220 msedge.exe msedge.exe PID 3220 wrote to memory of 4372 3220 msedge.exe msedge.exe PID 3220 wrote to memory of 4372 3220 msedge.exe msedge.exe PID 3220 wrote to memory of 4372 3220 msedge.exe msedge.exe PID 3220 wrote to memory of 4372 3220 msedge.exe msedge.exe PID 3220 wrote to memory of 4372 3220 msedge.exe msedge.exe PID 3220 wrote to memory of 4372 3220 msedge.exe msedge.exe PID 3220 wrote to memory of 4372 3220 msedge.exe msedge.exe PID 3220 wrote to memory of 4372 3220 msedge.exe msedge.exe PID 3220 wrote to memory of 4372 3220 msedge.exe msedge.exe PID 3220 wrote to memory of 4372 3220 msedge.exe msedge.exe PID 3220 wrote to memory of 4372 3220 msedge.exe msedge.exe PID 3220 wrote to memory of 4372 3220 msedge.exe msedge.exe PID 3220 wrote to memory of 4372 3220 msedge.exe msedge.exe PID 3220 wrote to memory of 4372 3220 msedge.exe msedge.exe PID 3220 wrote to memory of 4372 3220 msedge.exe msedge.exe PID 3220 wrote to memory of 4372 3220 msedge.exe msedge.exe PID 3220 wrote to memory of 4372 3220 msedge.exe msedge.exe PID 3220 wrote to memory of 4372 3220 msedge.exe msedge.exe PID 3220 wrote to memory of 4372 3220 msedge.exe msedge.exe PID 3220 wrote to memory of 4372 3220 msedge.exe msedge.exe PID 3220 wrote to memory of 4340 3220 msedge.exe msedge.exe PID 3220 wrote to memory of 4340 3220 msedge.exe msedge.exe PID 3220 wrote to memory of 3348 3220 msedge.exe msedge.exe PID 3220 wrote to memory of 3348 3220 msedge.exe msedge.exe PID 3220 wrote to memory of 3348 3220 msedge.exe msedge.exe PID 3220 wrote to memory of 3348 3220 msedge.exe msedge.exe PID 3220 wrote to memory of 3348 3220 msedge.exe msedge.exe PID 3220 wrote to memory of 3348 3220 msedge.exe msedge.exe PID 3220 wrote to memory of 3348 3220 msedge.exe msedge.exe PID 3220 wrote to memory of 3348 3220 msedge.exe msedge.exe PID 3220 wrote to memory of 3348 3220 msedge.exe msedge.exe PID 3220 wrote to memory of 3348 3220 msedge.exe msedge.exe PID 3220 wrote to memory of 3348 3220 msedge.exe msedge.exe PID 3220 wrote to memory of 3348 3220 msedge.exe msedge.exe PID 3220 wrote to memory of 3348 3220 msedge.exe msedge.exe PID 3220 wrote to memory of 3348 3220 msedge.exe msedge.exe PID 3220 wrote to memory of 3348 3220 msedge.exe msedge.exe PID 3220 wrote to memory of 3348 3220 msedge.exe msedge.exe PID 3220 wrote to memory of 3348 3220 msedge.exe msedge.exe PID 3220 wrote to memory of 3348 3220 msedge.exe msedge.exe PID 3220 wrote to memory of 3348 3220 msedge.exe msedge.exe PID 3220 wrote to memory of 3348 3220 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\a213bc705d68ea9d8a1ab9ff9decea37_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8f40f46f8,0x7ff8f40f4708,0x7ff8f40f47182⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,9941466128708369948,2704550535582034433,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:22⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2140,9941466128708369948,2704550535582034433,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2252 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2140,9941466128708369948,2704550535582034433,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2708 /prefetch:82⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,9941466128708369948,2704550535582034433,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,9941466128708369948,2704550535582034433,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,9941466128708369948,2704550535582034433,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4992 /prefetch:82⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,9941466128708369948,2704550535582034433,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4992 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,9941466128708369948,2704550535582034433,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4672 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,9941466128708369948,2704550535582034433,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4676 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,9941466128708369948,2704550535582034433,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4704 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,9941466128708369948,2704550535582034433,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5068 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,9941466128708369948,2704550535582034433,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4436 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
5KB
MD50fc51c3c2a453b1d6b3f2468be1fb51b
SHA1ae430fd4999a7e05582291536eb9df3b67033809
SHA256fcdee583a8315e4c7d7385b7be6272b423a29a45b5cd74e95274f195078041f8
SHA512a959680369db7ca1e6bbdf461f56f798f6c64e8934335db44e5a3ff4658c1b2dd94efc2b12793eb87de5d294fe56fdd7f4b99fd37a65be06465c7116384fef73
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
6KB
MD566b61ef08938d8c5381cad4c316cfa5a
SHA19ef5f0f4d1662328f603060be70f28d9b690b0f1
SHA256020253987f8e52e8f87deb8d8f854d271aafaae4beab7ec850a99541bba97e5b
SHA51227b60eebc4bd1b275c63ef3add7ecc427307528d3956aa5f892376b8e3d93d35d27e6f606aa56e177924f6a2f85149ab88bf1d70ed0033667326b4f161c5fd58
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENTFilesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENTFilesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
8KB
MD5b1ee3301cc8eef420d3358aee64c442e
SHA1b7ce2928914903f10f96e6a56d328c1e718e8862
SHA25677cede4b129db5df8c4f9cee38d0b7758a2fa35b7c822df166f2ed7a025d1729
SHA512c383e5659b81a9a1978628f01918f26b45ce28c7f5ac38d84512bf67e260eeccb2ade4d7e3e26293ce801d0d85cff92745403c25edecb90b475b7558b8107fa6
-
\??\pipe\LOCAL\crashpad_3220_HRGEWIDMELUSSZGEMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e