Analysis
-
max time kernel
145s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
15-06-2024 13:17
Static task
static1
Behavioral task
behavioral1
Sample
ae9829440dfddcc6c55ec035ee2dea09_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
ae9829440dfddcc6c55ec035ee2dea09_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
ae9829440dfddcc6c55ec035ee2dea09_JaffaCakes118.html
-
Size
55KB
-
MD5
ae9829440dfddcc6c55ec035ee2dea09
-
SHA1
628fe037aa6fd259aa0c460d22a2377f449f9207
-
SHA256
22977d1ba7617eb63a33ba9dde256b4785e405068b229d1eb4bb9e1459951b3b
-
SHA512
0c5138d68682697e397def9d03a24c2e701193c18998fed1de6dc3e8e4c04c75c25ce08c393666b93fc7c7f6667632c7df522102456d7bbca46f4ca787763532
-
SSDEEP
768:9r4pHvvCIooZXFIsPz2bMjj8txzq+/wEp8DgV5:9cHv7oWXFJz2bMnQrwEp1
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4800 msedge.exe 4800 msedge.exe 1504 msedge.exe 1504 msedge.exe 5100 identity_helper.exe 5100 identity_helper.exe 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe 3560 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1504 wrote to memory of 3308 1504 msedge.exe 82 PID 1504 wrote to memory of 3308 1504 msedge.exe 82 PID 1504 wrote to memory of 1668 1504 msedge.exe 83 PID 1504 wrote to memory of 1668 1504 msedge.exe 83 PID 1504 wrote to memory of 1668 1504 msedge.exe 83 PID 1504 wrote to memory of 1668 1504 msedge.exe 83 PID 1504 wrote to memory of 1668 1504 msedge.exe 83 PID 1504 wrote to memory of 1668 1504 msedge.exe 83 PID 1504 wrote to memory of 1668 1504 msedge.exe 83 PID 1504 wrote to memory of 1668 1504 msedge.exe 83 PID 1504 wrote to memory of 1668 1504 msedge.exe 83 PID 1504 wrote to memory of 1668 1504 msedge.exe 83 PID 1504 wrote to memory of 1668 1504 msedge.exe 83 PID 1504 wrote to memory of 1668 1504 msedge.exe 83 PID 1504 wrote to memory of 1668 1504 msedge.exe 83 PID 1504 wrote to memory of 1668 1504 msedge.exe 83 PID 1504 wrote to memory of 1668 1504 msedge.exe 83 PID 1504 wrote to memory of 1668 1504 msedge.exe 83 PID 1504 wrote to memory of 1668 1504 msedge.exe 83 PID 1504 wrote to memory of 1668 1504 msedge.exe 83 PID 1504 wrote to memory of 1668 1504 msedge.exe 83 PID 1504 wrote to memory of 1668 1504 msedge.exe 83 PID 1504 wrote to memory of 1668 1504 msedge.exe 83 PID 1504 wrote to memory of 1668 1504 msedge.exe 83 PID 1504 wrote to memory of 1668 1504 msedge.exe 83 PID 1504 wrote to memory of 1668 1504 msedge.exe 83 PID 1504 wrote to memory of 1668 1504 msedge.exe 83 PID 1504 wrote to memory of 1668 1504 msedge.exe 83 PID 1504 wrote to memory of 1668 1504 msedge.exe 83 PID 1504 wrote to memory of 1668 1504 msedge.exe 83 PID 1504 wrote to memory of 1668 1504 msedge.exe 83 PID 1504 wrote to memory of 1668 1504 msedge.exe 83 PID 1504 wrote to memory of 1668 1504 msedge.exe 83 PID 1504 wrote to memory of 1668 1504 msedge.exe 83 PID 1504 wrote to memory of 1668 1504 msedge.exe 83 PID 1504 wrote to memory of 1668 1504 msedge.exe 83 PID 1504 wrote to memory of 1668 1504 msedge.exe 83 PID 1504 wrote to memory of 1668 1504 msedge.exe 83 PID 1504 wrote to memory of 1668 1504 msedge.exe 83 PID 1504 wrote to memory of 1668 1504 msedge.exe 83 PID 1504 wrote to memory of 1668 1504 msedge.exe 83 PID 1504 wrote to memory of 1668 1504 msedge.exe 83 PID 1504 wrote to memory of 4800 1504 msedge.exe 84 PID 1504 wrote to memory of 4800 1504 msedge.exe 84 PID 1504 wrote to memory of 916 1504 msedge.exe 85 PID 1504 wrote to memory of 916 1504 msedge.exe 85 PID 1504 wrote to memory of 916 1504 msedge.exe 85 PID 1504 wrote to memory of 916 1504 msedge.exe 85 PID 1504 wrote to memory of 916 1504 msedge.exe 85 PID 1504 wrote to memory of 916 1504 msedge.exe 85 PID 1504 wrote to memory of 916 1504 msedge.exe 85 PID 1504 wrote to memory of 916 1504 msedge.exe 85 PID 1504 wrote to memory of 916 1504 msedge.exe 85 PID 1504 wrote to memory of 916 1504 msedge.exe 85 PID 1504 wrote to memory of 916 1504 msedge.exe 85 PID 1504 wrote to memory of 916 1504 msedge.exe 85 PID 1504 wrote to memory of 916 1504 msedge.exe 85 PID 1504 wrote to memory of 916 1504 msedge.exe 85 PID 1504 wrote to memory of 916 1504 msedge.exe 85 PID 1504 wrote to memory of 916 1504 msedge.exe 85 PID 1504 wrote to memory of 916 1504 msedge.exe 85 PID 1504 wrote to memory of 916 1504 msedge.exe 85 PID 1504 wrote to memory of 916 1504 msedge.exe 85 PID 1504 wrote to memory of 916 1504 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\ae9829440dfddcc6c55ec035ee2dea09_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9fdf746f8,0x7ff9fdf74708,0x7ff9fdf747182⤵PID:3308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,17541586539472606409,3676459106637013059,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2096 /prefetch:22⤵PID:1668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2060,17541586539472606409,3676459106637013059,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2500 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2060,17541586539472606409,3676459106637013059,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2892 /prefetch:82⤵PID:916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,17541586539472606409,3676459106637013059,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3124 /prefetch:12⤵PID:3844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,17541586539472606409,3676459106637013059,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3152 /prefetch:12⤵PID:2588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,17541586539472606409,3676459106637013059,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4164 /prefetch:12⤵PID:4952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,17541586539472606409,3676459106637013059,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5560 /prefetch:82⤵PID:4796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,17541586539472606409,3676459106637013059,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5560 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,17541586539472606409,3676459106637013059,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5464 /prefetch:12⤵PID:4280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,17541586539472606409,3676459106637013059,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5348 /prefetch:12⤵PID:3584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,17541586539472606409,3676459106637013059,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5024 /prefetch:12⤵PID:3528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,17541586539472606409,3676459106637013059,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5008 /prefetch:12⤵PID:3412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,17541586539472606409,3676459106637013059,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1260 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3560
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1792
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4536
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c5abc082d9d9307e797b7e89a2f755f4
SHA154c442690a8727f1d3453b6452198d3ec4ec13df
SHA256a055d69c6aba59e97e632d118b7960a5fdfbe35cfdfaa0de14f194fc6f874716
SHA512ad765cddbf89472988de5356db5e0ee254ca3475491c6034fba1897c373702ab7cfa4bd21662ab862eebb48a757c3eb86b1f8ed58629751f71863822a59cd26c
-
Filesize
152B
MD5b4a74bc775caf3de7fc9cde3c30ce482
SHA1c6ed3161390e5493f71182a6cb98d51c9063775d
SHA256dfad4e020a946f85523604816a0a9781091ee4669c870db2cabab027f8b6f280
SHA51255578e254444a645f455ea38480c9e02599ebf9522c32aca50ff37aad33976db30e663d35ebe31ff0ecafb4007362261716f756b3a0d67ac3937ca62ff10e25f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD55c1eb68eb60dcba87e09a1cb486efaa1
SHA1e2b3e7736cac3fe552884b3bd653466ed37e3f01
SHA2565185d964d950ef7fa030f76c4388e2360f4ff3f3dec7a1e2af975fe8e814ac3f
SHA512ee8ddf1e2b36d1c1c2968459c210dc18132f6c5b058ec7298d134314903f530c6f8e6ebc773478246ad2ac980c1a3e1af986a8196711de06240bf7aab0b29e63
-
Filesize
1KB
MD558ec7997feaa55579b56297912a843f3
SHA13611ffb0840470e4a6f979555bc228fbe2f446df
SHA25605b9b8a34e879e60ade07cacb028b440fffb91dbd9bfc6376d62e11c0ed3480b
SHA512d3aded9556b172deefb822e99a43bb80988b7f6997b31fbb7905dcc67bfdb809049ad22520196be84f88a8ceaef7997063bd4c7273e6a04e6cf9ee0ebe92d93d
-
Filesize
6KB
MD55e4274810ec7400461498c7b3fe6d3a2
SHA121d3149bd6c5d71832c6d1d40d36ff19d4a0904b
SHA2565b506a19f7ff670e28785cbd80fefe62c02971379fcefa893e524ae300b4870c
SHA5124724c9556f0898f49b29ba013646a35f967519403d78934c9a4aedd0fca8647cbc42800e26e6df204011caa04728ed50d6d604315995f30e21f82db6f6e13192
-
Filesize
7KB
MD56a618b0314e20da917de5151f8131305
SHA10b086ea3783d0615843a8b9af94dbdaac027feb9
SHA2560d5bf8788cebb15f2346284307e24947acd68b9fa72b5670801f9ccef9a729d5
SHA512878e928798a63a6b4d9cefd124530c88203328f043f6b3b43b9c0f7620dfd9727edf700f947ea53fa847b1c6993143b749419995c49148ee769fbc54025163a2
-
Filesize
6KB
MD5189c73d18b21974bc9aeef791d077b7f
SHA125044e3e68a4d1e9e4df93edb91e1145b6d40930
SHA25625da6be5b666f53aa75ac57468cd1bc7a5bc9cf19a1fb418469eab1c499a2d83
SHA512c184e0759f849f736a75f57de9db91af3691a9bd63d51ae00554d2c5bf1cae543dd1edb23859ae4d0925ba7834d3deec04b2d446f0709d57ea3755db04a678bd
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD58982473b47087d58298341e0d4523e9b
SHA1d5c21eba90769e3b8381c38c82ff179565d4e918
SHA2566da24d4bc0cb3a6f37496eafae6c9150901c1bc1df602f5a2373c01b4da53229
SHA5123480122c5f04465c8d7aba5bddfdf5dc7374c02c7399a7470fb14acd1e7866ec3485646f0dc1985e92a63c381e93b4e0c8b8f3181a3b4bc0284144548d443d42