Analysis
-
max time kernel
145s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
13-06-2024 10:23
Static task
static1
Behavioral task
behavioral1
Sample
a51038526d9d9d59f44629c6ccaf0837_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
a51038526d9d9d59f44629c6ccaf0837_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
a51038526d9d9d59f44629c6ccaf0837_JaffaCakes118.html
-
Size
347KB
-
MD5
a51038526d9d9d59f44629c6ccaf0837
-
SHA1
13e52193af259c6788632b46f5c5fb28da8b2dbc
-
SHA256
717f86559561605783366a788b39ad6dfd267bbdbd691894bf9a75562673dfb6
-
SHA512
ca147743c2e75c5b0afae50b6ce2fbf16a753f80b98948f1c92bac3c353f23635bbe2b507e4234d3698042ae6d76ea5356a54e950fad5d0ee44e4b82a2c9cb2d
-
SSDEEP
6144:DsMYod+X3oI+Yy7sMYod+X3oI+Y5sMYod+X3oI+YQ:X5d+X3e5d+X3f5d+X3+
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 4040 msedge.exe 4040 msedge.exe 2696 msedge.exe 2696 msedge.exe 1524 identity_helper.exe 1524 identity_helper.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
Processes:
msedge.exepid process 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 2696 wrote to memory of 2452 2696 msedge.exe msedge.exe PID 2696 wrote to memory of 2452 2696 msedge.exe msedge.exe PID 2696 wrote to memory of 4624 2696 msedge.exe msedge.exe PID 2696 wrote to memory of 4624 2696 msedge.exe msedge.exe PID 2696 wrote to memory of 4624 2696 msedge.exe msedge.exe PID 2696 wrote to memory of 4624 2696 msedge.exe msedge.exe PID 2696 wrote to memory of 4624 2696 msedge.exe msedge.exe PID 2696 wrote to memory of 4624 2696 msedge.exe msedge.exe PID 2696 wrote to memory of 4624 2696 msedge.exe msedge.exe PID 2696 wrote to memory of 4624 2696 msedge.exe msedge.exe PID 2696 wrote to memory of 4624 2696 msedge.exe msedge.exe PID 2696 wrote to memory of 4624 2696 msedge.exe msedge.exe PID 2696 wrote to memory of 4624 2696 msedge.exe msedge.exe PID 2696 wrote to memory of 4624 2696 msedge.exe msedge.exe PID 2696 wrote to memory of 4624 2696 msedge.exe msedge.exe PID 2696 wrote to memory of 4624 2696 msedge.exe msedge.exe PID 2696 wrote to memory of 4624 2696 msedge.exe msedge.exe PID 2696 wrote to memory of 4624 2696 msedge.exe msedge.exe PID 2696 wrote to memory of 4624 2696 msedge.exe msedge.exe PID 2696 wrote to memory of 4624 2696 msedge.exe msedge.exe PID 2696 wrote to memory of 4624 2696 msedge.exe msedge.exe PID 2696 wrote to memory of 4624 2696 msedge.exe msedge.exe PID 2696 wrote to memory of 4624 2696 msedge.exe msedge.exe PID 2696 wrote to memory of 4624 2696 msedge.exe msedge.exe PID 2696 wrote to memory of 4624 2696 msedge.exe msedge.exe PID 2696 wrote to memory of 4624 2696 msedge.exe msedge.exe PID 2696 wrote to memory of 4624 2696 msedge.exe msedge.exe PID 2696 wrote to memory of 4624 2696 msedge.exe msedge.exe PID 2696 wrote to memory of 4624 2696 msedge.exe msedge.exe PID 2696 wrote to memory of 4624 2696 msedge.exe msedge.exe PID 2696 wrote to memory of 4624 2696 msedge.exe msedge.exe PID 2696 wrote to memory of 4624 2696 msedge.exe msedge.exe PID 2696 wrote to memory of 4624 2696 msedge.exe msedge.exe PID 2696 wrote to memory of 4624 2696 msedge.exe msedge.exe PID 2696 wrote to memory of 4624 2696 msedge.exe msedge.exe PID 2696 wrote to memory of 4624 2696 msedge.exe msedge.exe PID 2696 wrote to memory of 4624 2696 msedge.exe msedge.exe PID 2696 wrote to memory of 4624 2696 msedge.exe msedge.exe PID 2696 wrote to memory of 4624 2696 msedge.exe msedge.exe PID 2696 wrote to memory of 4624 2696 msedge.exe msedge.exe PID 2696 wrote to memory of 4624 2696 msedge.exe msedge.exe PID 2696 wrote to memory of 4624 2696 msedge.exe msedge.exe PID 2696 wrote to memory of 4040 2696 msedge.exe msedge.exe PID 2696 wrote to memory of 4040 2696 msedge.exe msedge.exe PID 2696 wrote to memory of 4180 2696 msedge.exe msedge.exe PID 2696 wrote to memory of 4180 2696 msedge.exe msedge.exe PID 2696 wrote to memory of 4180 2696 msedge.exe msedge.exe PID 2696 wrote to memory of 4180 2696 msedge.exe msedge.exe PID 2696 wrote to memory of 4180 2696 msedge.exe msedge.exe PID 2696 wrote to memory of 4180 2696 msedge.exe msedge.exe PID 2696 wrote to memory of 4180 2696 msedge.exe msedge.exe PID 2696 wrote to memory of 4180 2696 msedge.exe msedge.exe PID 2696 wrote to memory of 4180 2696 msedge.exe msedge.exe PID 2696 wrote to memory of 4180 2696 msedge.exe msedge.exe PID 2696 wrote to memory of 4180 2696 msedge.exe msedge.exe PID 2696 wrote to memory of 4180 2696 msedge.exe msedge.exe PID 2696 wrote to memory of 4180 2696 msedge.exe msedge.exe PID 2696 wrote to memory of 4180 2696 msedge.exe msedge.exe PID 2696 wrote to memory of 4180 2696 msedge.exe msedge.exe PID 2696 wrote to memory of 4180 2696 msedge.exe msedge.exe PID 2696 wrote to memory of 4180 2696 msedge.exe msedge.exe PID 2696 wrote to memory of 4180 2696 msedge.exe msedge.exe PID 2696 wrote to memory of 4180 2696 msedge.exe msedge.exe PID 2696 wrote to memory of 4180 2696 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\a51038526d9d9d59f44629c6ccaf0837_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0x40,0x108,0x7ffb18af46f8,0x7ffb18af4708,0x7ffb18af47182⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,7178836072343961134,5034247600686568197,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,7178836072343961134,5034247600686568197,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2492 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2080,7178836072343961134,5034247600686568197,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2656 /prefetch:82⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,7178836072343961134,5034247600686568197,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,7178836072343961134,5034247600686568197,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,7178836072343961134,5034247600686568197,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5144 /prefetch:82⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,7178836072343961134,5034247600686568197,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5144 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,7178836072343961134,5034247600686568197,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5228 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,7178836072343961134,5034247600686568197,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5148 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,7178836072343961134,5034247600686568197,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3352 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,7178836072343961134,5034247600686568197,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5464 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,7178836072343961134,5034247600686568197,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3012 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD5257c0005d0c4d0bb282cb470925e4376
SHA1f9b8efb511ed64292568977c9f2ec255509e8f7d
SHA2568185c36aaacfc71e42f94fad8e198fe7fb2d868398ceabb89261cae94341cb22
SHA5122f3e8f352ed3ef88e8c28650390f93f98c92174d268330b886f3ebd1ba0163999051298ee12a054606b4986005452a241c6864cd292e69492d79c37d500556f4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD54819fbc4513c82d92618f50a379ee232
SHA1ab618827ff269655283bf771fc957c8798ab51ee
SHA25605e479e8ec96b7505e01e5ec757ccfe35cb73cd46b27ff4746dce90d43d9237c
SHA512bc24fb972d04b55505101300e268f91b11e5833f1a18e925b5ded7e758b5e3e08bee1aa8f3a0b65514d6df981d0cbfa8798344db7f2a3675307df8de12ae475b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
5KB
MD57ab1c94b3fe1ca1254904e481a5021f1
SHA17131b7013c1e21656f3a418cecd9f46c08ad5d08
SHA256b333dae346da3c5d19895997a3f0eaa84bc102838f83f7c3d9c44d46f488c3bd
SHA5126d8e91349562faf65585fe69d58ae5c6bdf4a1aa356eb36397b0415f1553f6313fc2b15a31c06806eeda169480513ca172d3464d5a43e2b3caf15aa7ee0724d7
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
5KB
MD5ded719722c64de88497fe36619fa95ca
SHA106f46e6f5e0d6e9f52af0617bd878a1a7b5e7a97
SHA25635e984bb4bb64a38812c51b4df44ab6d957bfb9e736262ccff5c6988970764f1
SHA51268e5c62a7703ad8eb215974fb7f7ccf40b69bd2552048d45882ffd7dc70eddf1d09d2998d1a81dc67707dc0b5c8a344e8d294168c6cbc6ae3d73458e9ae586ac
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Secure PreferencesFilesize
24KB
MD595cd1581c30a5c26f698a8210bcab430
SHA15e8e551a47dd682ec51a7d6808fe8e0f2af39e86
SHA256d58162c5ae5e18fc06604c285e024c01686093d70994dc93b4ae9d85b4c3f7b9
SHA512e49403df10177053634c431203a91d26df5dfb23cbbb88847459ecdf4b6107040d0944a3e84ee6bb26cb4e8017a35c8c31b658387cd1b6938ba4cb9f59606ece
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENTFilesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\b49d009b-ed1b-4b10-95df-60f82cb95b41.tmpFilesize
10KB
MD54fc8324ae6df4a71eee3612df2867884
SHA1b7b61bb50c8e292c1f2c94f5b5c4503176a919a5
SHA256c9ed7eb7a9b618e44736c096c820a2e00d593ca6542b83a1d24b009b566425f8
SHA512f9b2dc0b6932cc12b9f43537304e3d32858e5a20174017160ae4aac2202b537fda95ffa8958cbd50b9577ff0fcbe3ddc753399bf974287dd45770ffea0c9732b
-
\??\pipe\LOCAL\crashpad_2696_VWGNJOKMUVCYZHLJMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e