Analysis
-
max time kernel
145s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
14-06-2024 07:49
Static task
static1
Behavioral task
behavioral1
Sample
a898fdb16155f73c385d7663c6818dc7_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
a898fdb16155f73c385d7663c6818dc7_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
a898fdb16155f73c385d7663c6818dc7_JaffaCakes118.html
-
Size
129KB
-
MD5
a898fdb16155f73c385d7663c6818dc7
-
SHA1
7211a17e74e5ad14257034d8c030dc07c4d6bfc9
-
SHA256
38768d60fc113267b5f1f1952e1930989c03606b57ef5a37704406017a5f63c9
-
SHA512
3b6de0a5ab8ab079bcfb0ca793d6b379676b329be165fc9f7b4f43871a152e3dd5586e7f4bc037ff44723f4eb8e600ffd6c186177d0431347e1eaafac7aa990b
-
SSDEEP
1536:STvb8cMyXgtqyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusG:SHMPgyfkMY+BES09JXAnyrZalI+YU
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 2892 msedge.exe 2892 msedge.exe 2424 msedge.exe 2424 msedge.exe 3312 identity_helper.exe 3312 identity_helper.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
Processes:
msedge.exepid process 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 2424 wrote to memory of 3024 2424 msedge.exe msedge.exe PID 2424 wrote to memory of 3024 2424 msedge.exe msedge.exe PID 2424 wrote to memory of 3352 2424 msedge.exe msedge.exe PID 2424 wrote to memory of 3352 2424 msedge.exe msedge.exe PID 2424 wrote to memory of 3352 2424 msedge.exe msedge.exe PID 2424 wrote to memory of 3352 2424 msedge.exe msedge.exe PID 2424 wrote to memory of 3352 2424 msedge.exe msedge.exe PID 2424 wrote to memory of 3352 2424 msedge.exe msedge.exe PID 2424 wrote to memory of 3352 2424 msedge.exe msedge.exe PID 2424 wrote to memory of 3352 2424 msedge.exe msedge.exe PID 2424 wrote to memory of 3352 2424 msedge.exe msedge.exe PID 2424 wrote to memory of 3352 2424 msedge.exe msedge.exe PID 2424 wrote to memory of 3352 2424 msedge.exe msedge.exe PID 2424 wrote to memory of 3352 2424 msedge.exe msedge.exe PID 2424 wrote to memory of 3352 2424 msedge.exe msedge.exe PID 2424 wrote to memory of 3352 2424 msedge.exe msedge.exe PID 2424 wrote to memory of 3352 2424 msedge.exe msedge.exe PID 2424 wrote to memory of 3352 2424 msedge.exe msedge.exe PID 2424 wrote to memory of 3352 2424 msedge.exe msedge.exe PID 2424 wrote to memory of 3352 2424 msedge.exe msedge.exe PID 2424 wrote to memory of 3352 2424 msedge.exe msedge.exe PID 2424 wrote to memory of 3352 2424 msedge.exe msedge.exe PID 2424 wrote to memory of 3352 2424 msedge.exe msedge.exe PID 2424 wrote to memory of 3352 2424 msedge.exe msedge.exe PID 2424 wrote to memory of 3352 2424 msedge.exe msedge.exe PID 2424 wrote to memory of 3352 2424 msedge.exe msedge.exe PID 2424 wrote to memory of 3352 2424 msedge.exe msedge.exe PID 2424 wrote to memory of 3352 2424 msedge.exe msedge.exe PID 2424 wrote to memory of 3352 2424 msedge.exe msedge.exe PID 2424 wrote to memory of 3352 2424 msedge.exe msedge.exe PID 2424 wrote to memory of 3352 2424 msedge.exe msedge.exe PID 2424 wrote to memory of 3352 2424 msedge.exe msedge.exe PID 2424 wrote to memory of 3352 2424 msedge.exe msedge.exe PID 2424 wrote to memory of 3352 2424 msedge.exe msedge.exe PID 2424 wrote to memory of 3352 2424 msedge.exe msedge.exe PID 2424 wrote to memory of 3352 2424 msedge.exe msedge.exe PID 2424 wrote to memory of 3352 2424 msedge.exe msedge.exe PID 2424 wrote to memory of 3352 2424 msedge.exe msedge.exe PID 2424 wrote to memory of 3352 2424 msedge.exe msedge.exe PID 2424 wrote to memory of 3352 2424 msedge.exe msedge.exe PID 2424 wrote to memory of 3352 2424 msedge.exe msedge.exe PID 2424 wrote to memory of 3352 2424 msedge.exe msedge.exe PID 2424 wrote to memory of 2892 2424 msedge.exe msedge.exe PID 2424 wrote to memory of 2892 2424 msedge.exe msedge.exe PID 2424 wrote to memory of 2928 2424 msedge.exe msedge.exe PID 2424 wrote to memory of 2928 2424 msedge.exe msedge.exe PID 2424 wrote to memory of 2928 2424 msedge.exe msedge.exe PID 2424 wrote to memory of 2928 2424 msedge.exe msedge.exe PID 2424 wrote to memory of 2928 2424 msedge.exe msedge.exe PID 2424 wrote to memory of 2928 2424 msedge.exe msedge.exe PID 2424 wrote to memory of 2928 2424 msedge.exe msedge.exe PID 2424 wrote to memory of 2928 2424 msedge.exe msedge.exe PID 2424 wrote to memory of 2928 2424 msedge.exe msedge.exe PID 2424 wrote to memory of 2928 2424 msedge.exe msedge.exe PID 2424 wrote to memory of 2928 2424 msedge.exe msedge.exe PID 2424 wrote to memory of 2928 2424 msedge.exe msedge.exe PID 2424 wrote to memory of 2928 2424 msedge.exe msedge.exe PID 2424 wrote to memory of 2928 2424 msedge.exe msedge.exe PID 2424 wrote to memory of 2928 2424 msedge.exe msedge.exe PID 2424 wrote to memory of 2928 2424 msedge.exe msedge.exe PID 2424 wrote to memory of 2928 2424 msedge.exe msedge.exe PID 2424 wrote to memory of 2928 2424 msedge.exe msedge.exe PID 2424 wrote to memory of 2928 2424 msedge.exe msedge.exe PID 2424 wrote to memory of 2928 2424 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\a898fdb16155f73c385d7663c6818dc7_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xdc,0x108,0x7ffcdb8546f8,0x7ffcdb854708,0x7ffcdb8547182⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1988,7400378715808891514,2105962951890550775,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2268 /prefetch:22⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1988,7400378715808891514,2105962951890550775,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2336 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1988,7400378715808891514,2105962951890550775,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2780 /prefetch:82⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1988,7400378715808891514,2105962951890550775,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1988,7400378715808891514,2105962951890550775,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1988,7400378715808891514,2105962951890550775,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5016 /prefetch:82⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1988,7400378715808891514,2105962951890550775,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5016 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1988,7400378715808891514,2105962951890550775,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4772 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1988,7400378715808891514,2105962951890550775,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5044 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1988,7400378715808891514,2105962951890550775,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4144 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1988,7400378715808891514,2105962951890550775,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3480 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1988,7400378715808891514,2105962951890550775,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1820 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD54b4f91fa1b362ba5341ecb2836438dea
SHA19561f5aabed742404d455da735259a2c6781fa07
SHA256d824b742eace197ddc8b6ed5d918f390fde4b0fbf0e371b8e1f2ed40a3b6455c
SHA512fef22217dcdd8000bc193e25129699d4b8f7a103ca4fe1613baf73ccf67090d9fbae27eb93e4bb8747455853a0a4326f2d0c38df41c8d42351cdcd4132418dac
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD5eaa3db555ab5bc0cb364826204aad3f0
SHA1a4cdfaac8de49e6e6e88b335cfeaa7c9e3c563ca
SHA256ef7baeb1b2ab05ff3c5fbb76c2759db49294654548706c7c8e87f0cde855b86b
SHA512e13981da51b52c15261ecabb98af32f9b920651b46b10ce0cc823c5878b22eb1420258c80deef204070d1e0bdd3a64d875ac2522e3713a3cf11657aa55aeccd4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\400204c6-e7ee-4042-b469-53f915b86d10.tmpFilesize
6KB
MD56eba31d30490aff94f9c3b549f069547
SHA156c0c44739673397453dc291f93dc87da4f1f59b
SHA25608f26e8351a99579a90c9c70e94d56573bc1a9d310093b9737f3a35b04332bcb
SHA512ddbe1b2a28110394047abae2bdef4e7051a423de79e89ea16e74195b6d4ad4f5a651b4f588c6f87c8ecdea28a2a3fe758e449e996a64cb5264ae730ce0740e70
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
5KB
MD57ffe280fafa6be5982c352bb457319ee
SHA1966190007e25711e25a0743490712da8ca69b6d3
SHA2569ff5b209372f4fc8dc090369ea191bc06b5e818e80cdccc89c98decbbaac2a38
SHA512a4fbad5af265f3f7a6a498536cd34735b53851ff5cd3b169509977d5b24b2b6d6331dd3a1098bc4466d7d671105855645f5fe9ea6ae732a6899a15d6829e402a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENTFilesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
8KB
MD55de471530c0856012a5920001ac3c807
SHA1194e7a82c89856eb590eb6f3642d46bb23c18fde
SHA25623f895c6358781ef2ca38b108c4252fdf567b871d5f8f9b82359d703631a0ca7
SHA512ea77e16f61fc8d5ed25d6e28fd6ab1917e014f7f4fa495a0e6f800d27e6ac59a5efd17c998a1ae58a1bd3ae29516e78f07fe4ac2046069fc0c25566b9530a0d7
-
\??\pipe\LOCAL\crashpad_2424_MALFDFDIKUVZHDCCMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e