Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
13-06-2024 10:14
Static task
static1
Behavioral task
behavioral1
Sample
a507b4b380077f5f520c8b10bd3f191c_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
a507b4b380077f5f520c8b10bd3f191c_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
a507b4b380077f5f520c8b10bd3f191c_JaffaCakes118.html
-
Size
56KB
-
MD5
a507b4b380077f5f520c8b10bd3f191c
-
SHA1
f3a3ce278f9763d3d19d67f4a6f20a96d3e96b17
-
SHA256
8a7c7a225a69b7ec89e43b97d06a41cb90b69358a5e7c44957106e5cefce7188
-
SHA512
8dc62d51e3ca5c401b56b0390b98179392d28a12375c724ec9655c3f7233efbcf6247e4df79bf0cc07b999f4746e82ebbe068fa3a03dcb196559c870d9d5c9f9
-
SSDEEP
768:wL3xpHvvCIoo1HHzpeQMXrWB5tNqc/p+Xu+9gVup:wzzHv7oaHHoQMXrWB5zp+XuA
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4868 msedge.exe 4868 msedge.exe 3448 msedge.exe 3448 msedge.exe 1604 identity_helper.exe 1604 identity_helper.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3448 wrote to memory of 2184 3448 msedge.exe 81 PID 3448 wrote to memory of 2184 3448 msedge.exe 81 PID 3448 wrote to memory of 4536 3448 msedge.exe 83 PID 3448 wrote to memory of 4536 3448 msedge.exe 83 PID 3448 wrote to memory of 4536 3448 msedge.exe 83 PID 3448 wrote to memory of 4536 3448 msedge.exe 83 PID 3448 wrote to memory of 4536 3448 msedge.exe 83 PID 3448 wrote to memory of 4536 3448 msedge.exe 83 PID 3448 wrote to memory of 4536 3448 msedge.exe 83 PID 3448 wrote to memory of 4536 3448 msedge.exe 83 PID 3448 wrote to memory of 4536 3448 msedge.exe 83 PID 3448 wrote to memory of 4536 3448 msedge.exe 83 PID 3448 wrote to memory of 4536 3448 msedge.exe 83 PID 3448 wrote to memory of 4536 3448 msedge.exe 83 PID 3448 wrote to memory of 4536 3448 msedge.exe 83 PID 3448 wrote to memory of 4536 3448 msedge.exe 83 PID 3448 wrote to memory of 4536 3448 msedge.exe 83 PID 3448 wrote to memory of 4536 3448 msedge.exe 83 PID 3448 wrote to memory of 4536 3448 msedge.exe 83 PID 3448 wrote to memory of 4536 3448 msedge.exe 83 PID 3448 wrote to memory of 4536 3448 msedge.exe 83 PID 3448 wrote to memory of 4536 3448 msedge.exe 83 PID 3448 wrote to memory of 4536 3448 msedge.exe 83 PID 3448 wrote to memory of 4536 3448 msedge.exe 83 PID 3448 wrote to memory of 4536 3448 msedge.exe 83 PID 3448 wrote to memory of 4536 3448 msedge.exe 83 PID 3448 wrote to memory of 4536 3448 msedge.exe 83 PID 3448 wrote to memory of 4536 3448 msedge.exe 83 PID 3448 wrote to memory of 4536 3448 msedge.exe 83 PID 3448 wrote to memory of 4536 3448 msedge.exe 83 PID 3448 wrote to memory of 4536 3448 msedge.exe 83 PID 3448 wrote to memory of 4536 3448 msedge.exe 83 PID 3448 wrote to memory of 4536 3448 msedge.exe 83 PID 3448 wrote to memory of 4536 3448 msedge.exe 83 PID 3448 wrote to memory of 4536 3448 msedge.exe 83 PID 3448 wrote to memory of 4536 3448 msedge.exe 83 PID 3448 wrote to memory of 4536 3448 msedge.exe 83 PID 3448 wrote to memory of 4536 3448 msedge.exe 83 PID 3448 wrote to memory of 4536 3448 msedge.exe 83 PID 3448 wrote to memory of 4536 3448 msedge.exe 83 PID 3448 wrote to memory of 4536 3448 msedge.exe 83 PID 3448 wrote to memory of 4536 3448 msedge.exe 83 PID 3448 wrote to memory of 4868 3448 msedge.exe 84 PID 3448 wrote to memory of 4868 3448 msedge.exe 84 PID 3448 wrote to memory of 4408 3448 msedge.exe 85 PID 3448 wrote to memory of 4408 3448 msedge.exe 85 PID 3448 wrote to memory of 4408 3448 msedge.exe 85 PID 3448 wrote to memory of 4408 3448 msedge.exe 85 PID 3448 wrote to memory of 4408 3448 msedge.exe 85 PID 3448 wrote to memory of 4408 3448 msedge.exe 85 PID 3448 wrote to memory of 4408 3448 msedge.exe 85 PID 3448 wrote to memory of 4408 3448 msedge.exe 85 PID 3448 wrote to memory of 4408 3448 msedge.exe 85 PID 3448 wrote to memory of 4408 3448 msedge.exe 85 PID 3448 wrote to memory of 4408 3448 msedge.exe 85 PID 3448 wrote to memory of 4408 3448 msedge.exe 85 PID 3448 wrote to memory of 4408 3448 msedge.exe 85 PID 3448 wrote to memory of 4408 3448 msedge.exe 85 PID 3448 wrote to memory of 4408 3448 msedge.exe 85 PID 3448 wrote to memory of 4408 3448 msedge.exe 85 PID 3448 wrote to memory of 4408 3448 msedge.exe 85 PID 3448 wrote to memory of 4408 3448 msedge.exe 85 PID 3448 wrote to memory of 4408 3448 msedge.exe 85 PID 3448 wrote to memory of 4408 3448 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\a507b4b380077f5f520c8b10bd3f191c_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3448 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8216e46f8,0x7ff8216e4708,0x7ff8216e47182⤵PID:2184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,17628078665721811390,6435857245359508042,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2076 /prefetch:22⤵PID:4536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2060,17628078665721811390,6435857245359508042,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2060,17628078665721811390,6435857245359508042,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2808 /prefetch:82⤵PID:4408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,17628078665721811390,6435857245359508042,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:1460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,17628078665721811390,6435857245359508042,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:5024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,17628078665721811390,6435857245359508042,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4752 /prefetch:12⤵PID:4392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,17628078665721811390,6435857245359508042,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2280 /prefetch:82⤵PID:3876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,17628078665721811390,6435857245359508042,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2280 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,17628078665721811390,6435857245359508042,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4196 /prefetch:12⤵PID:3880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,17628078665721811390,6435857245359508042,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4888 /prefetch:12⤵PID:4396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,17628078665721811390,6435857245359508042,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4152 /prefetch:12⤵PID:1732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,17628078665721811390,6435857245359508042,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5232 /prefetch:12⤵PID:2176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,17628078665721811390,6435857245359508042,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5612 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1640
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2644
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2056
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5dabfafd78687947a9de64dd5b776d25f
SHA116084c74980dbad713f9d332091985808b436dea
SHA256c7658f407cbe799282ef202e78319e489ed4e48e23f6d056b505bc0d73e34201
SHA512dae1de5245cd9b72117c430250aa2029eb8df1b85dc414ac50152d8eba4d100bcf0320ac18446f865dc96949f8b06a5b9e7a0c84f9c1b0eada318e80f99f9d2b
-
Filesize
152B
MD5c39b3aa574c0c938c80eb263bb450311
SHA1f4d11275b63f4f906be7a55ec6ca050c62c18c88
SHA25666f8d413a30451055d4b6fa40e007197a4bb93a66a28ca4112967ec417ffab6c
SHA512eeca2e21cd4d66835beb9812e26344c8695584253af397b06f378536ca797c3906a670ed239631729c96ebb93acfb16327cf58d517e83fb8923881c5fdb6d232
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\30148706-2a9e-4c18-bf8b-67053f77bdd2.tmp
Filesize6KB
MD529ac0072e9b3afb60a0fc56349055842
SHA1d5c833be488671d6db2ebbbcde775387e34c7418
SHA25629b67114720a748ec58ae46e6ae0b5ad96dc351d3186d1c454659ef70eff94b1
SHA512cd4d444d6df968cbc66ed66a33ccfbe09462bdb9cf872a23c49d3b23a5b77cb8786341ef79ebce25e8f741f0cb1963eb477d73994853f65b5be3c0be30c4fdda
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD5147baac709fc4ef3708dc42582c81c36
SHA1ea1d2fe16b9a735eab2c992e60b6fea6c391cfa7
SHA256b12bac105bcb9904cc97703c84519812702631c57ca7b2bdee824a5b5b2753d2
SHA5125301cfdadc98b39a532fd9fba7eaceba2c85d9eaebd7195b7129178ad92f6689898d7a1a7fbb8c9a1b52846c81823f05e8da4a558bfb5b5194c9632650695be3
-
Filesize
1KB
MD5924a6b2d75a44a713866a6f81436167c
SHA1ecae009adc6c962914603f169b5b47695c3d7ec4
SHA25676c0622ab66091da3c8450608d0af9dfe9a8fef74be4423d2a0ed1bb9d2c205e
SHA5120d4b682506a2f4e27b192c075d0910c79bb4ca546070e8a64df9488962ddf6e958d21e1e9b4c2e1dcc9f4d548e47cb0856a0d34911828e713949c0494e7dbe85
-
Filesize
7KB
MD52b1219a0c4180635edf72a1606809703
SHA12b51b191c1249035a7e72a34da5701d5a8130ba2
SHA256dfefe57ff47bbb9150a6bf1eb8b2d872d598cd5a1195e4a1bbe8c3b8ec05e4e9
SHA51227fdb638b61fa1eda799c2e8c33c12285f0a886cb03d83127887d5356128e969a417c76253b71ef7ccc054379cf01581ddf4cacffa5f98be634423b2279a4741
-
Filesize
6KB
MD523ad2c23f18cb8c1e7ce9beff9e0069e
SHA1ebfca5a96e593d8beddb0cb13ee648b5c078671f
SHA2569ac5a444974345ec79b1c43a8f92702b55406a370a59c0d1b7e064ad26ef8440
SHA5124c513984e834258344f4c91b06aee0877c96f1f361a13debe406204b4f1679716b723246e7a0b7496331a20983321355a07af1ae5efe0f0cfd65627e8753846b
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD58acf06be8cb144f9cc0c35ef939f3b92
SHA124a4338036e06a6a9a7b20f8888f62fc9839621d
SHA25662c42496024f02b85623eefc4f6df823f260bd9750077fde0d987c3879a29471
SHA5123f66072d4e9521850d99010a54e177582081a542a5985ffe9a5d215d2e03e1e068b85d87a5e7ae9b4cd717229545e7750cf6158d5c6925458f4863afc45ec1e0