Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
17-06-2024 03:33
Static task
static1
Behavioral task
behavioral1
Sample
b68f32cdb6af2e7cd85dff81e82a0a37_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
b68f32cdb6af2e7cd85dff81e82a0a37_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
b68f32cdb6af2e7cd85dff81e82a0a37_JaffaCakes118.html
-
Size
68KB
-
MD5
b68f32cdb6af2e7cd85dff81e82a0a37
-
SHA1
4da9441c54a9a313a16f2d1a224ead7e0cb44cfd
-
SHA256
aecf59c35a9b7a7257e46f858a6d4b84840ca206da3639547ce2c8ef4465eb37
-
SHA512
65d461f485c3465709660a5b9f1941782321d751b6662eefd72ae20890ec9fd76ececb4625c4cf56a392ec1f8dce9934d309015b5cf1391226265436c4285bc5
-
SSDEEP
768:Ji5gcMiR3sI2PDDnX0g6oaS+YNAnNwOXoTyv1wCZkoTyMdtbBnfBgN8/lboi2hcc:Jt+rY+yOYTcNen0tbrga94hcuNnQC
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4040 msedge.exe 4040 msedge.exe 2536 msedge.exe 2536 msedge.exe 4400 identity_helper.exe 4400 identity_helper.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2536 msedge.exe 2536 msedge.exe 2536 msedge.exe 2536 msedge.exe 2536 msedge.exe 2536 msedge.exe 2536 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2536 msedge.exe 2536 msedge.exe 2536 msedge.exe 2536 msedge.exe 2536 msedge.exe 2536 msedge.exe 2536 msedge.exe 2536 msedge.exe 2536 msedge.exe 2536 msedge.exe 2536 msedge.exe 2536 msedge.exe 2536 msedge.exe 2536 msedge.exe 2536 msedge.exe 2536 msedge.exe 2536 msedge.exe 2536 msedge.exe 2536 msedge.exe 2536 msedge.exe 2536 msedge.exe 2536 msedge.exe 2536 msedge.exe 2536 msedge.exe 2536 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2536 msedge.exe 2536 msedge.exe 2536 msedge.exe 2536 msedge.exe 2536 msedge.exe 2536 msedge.exe 2536 msedge.exe 2536 msedge.exe 2536 msedge.exe 2536 msedge.exe 2536 msedge.exe 2536 msedge.exe 2536 msedge.exe 2536 msedge.exe 2536 msedge.exe 2536 msedge.exe 2536 msedge.exe 2536 msedge.exe 2536 msedge.exe 2536 msedge.exe 2536 msedge.exe 2536 msedge.exe 2536 msedge.exe 2536 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2536 wrote to memory of 5532 2536 msedge.exe 81 PID 2536 wrote to memory of 5532 2536 msedge.exe 81 PID 2536 wrote to memory of 3036 2536 msedge.exe 82 PID 2536 wrote to memory of 3036 2536 msedge.exe 82 PID 2536 wrote to memory of 3036 2536 msedge.exe 82 PID 2536 wrote to memory of 3036 2536 msedge.exe 82 PID 2536 wrote to memory of 3036 2536 msedge.exe 82 PID 2536 wrote to memory of 3036 2536 msedge.exe 82 PID 2536 wrote to memory of 3036 2536 msedge.exe 82 PID 2536 wrote to memory of 3036 2536 msedge.exe 82 PID 2536 wrote to memory of 3036 2536 msedge.exe 82 PID 2536 wrote to memory of 3036 2536 msedge.exe 82 PID 2536 wrote to memory of 3036 2536 msedge.exe 82 PID 2536 wrote to memory of 3036 2536 msedge.exe 82 PID 2536 wrote to memory of 3036 2536 msedge.exe 82 PID 2536 wrote to memory of 3036 2536 msedge.exe 82 PID 2536 wrote to memory of 3036 2536 msedge.exe 82 PID 2536 wrote to memory of 3036 2536 msedge.exe 82 PID 2536 wrote to memory of 3036 2536 msedge.exe 82 PID 2536 wrote to memory of 3036 2536 msedge.exe 82 PID 2536 wrote to memory of 3036 2536 msedge.exe 82 PID 2536 wrote to memory of 3036 2536 msedge.exe 82 PID 2536 wrote to memory of 3036 2536 msedge.exe 82 PID 2536 wrote to memory of 3036 2536 msedge.exe 82 PID 2536 wrote to memory of 3036 2536 msedge.exe 82 PID 2536 wrote to memory of 3036 2536 msedge.exe 82 PID 2536 wrote to memory of 3036 2536 msedge.exe 82 PID 2536 wrote to memory of 3036 2536 msedge.exe 82 PID 2536 wrote to memory of 3036 2536 msedge.exe 82 PID 2536 wrote to memory of 3036 2536 msedge.exe 82 PID 2536 wrote to memory of 3036 2536 msedge.exe 82 PID 2536 wrote to memory of 3036 2536 msedge.exe 82 PID 2536 wrote to memory of 3036 2536 msedge.exe 82 PID 2536 wrote to memory of 3036 2536 msedge.exe 82 PID 2536 wrote to memory of 3036 2536 msedge.exe 82 PID 2536 wrote to memory of 3036 2536 msedge.exe 82 PID 2536 wrote to memory of 3036 2536 msedge.exe 82 PID 2536 wrote to memory of 3036 2536 msedge.exe 82 PID 2536 wrote to memory of 3036 2536 msedge.exe 82 PID 2536 wrote to memory of 3036 2536 msedge.exe 82 PID 2536 wrote to memory of 3036 2536 msedge.exe 82 PID 2536 wrote to memory of 3036 2536 msedge.exe 82 PID 2536 wrote to memory of 4040 2536 msedge.exe 83 PID 2536 wrote to memory of 4040 2536 msedge.exe 83 PID 2536 wrote to memory of 2688 2536 msedge.exe 84 PID 2536 wrote to memory of 2688 2536 msedge.exe 84 PID 2536 wrote to memory of 2688 2536 msedge.exe 84 PID 2536 wrote to memory of 2688 2536 msedge.exe 84 PID 2536 wrote to memory of 2688 2536 msedge.exe 84 PID 2536 wrote to memory of 2688 2536 msedge.exe 84 PID 2536 wrote to memory of 2688 2536 msedge.exe 84 PID 2536 wrote to memory of 2688 2536 msedge.exe 84 PID 2536 wrote to memory of 2688 2536 msedge.exe 84 PID 2536 wrote to memory of 2688 2536 msedge.exe 84 PID 2536 wrote to memory of 2688 2536 msedge.exe 84 PID 2536 wrote to memory of 2688 2536 msedge.exe 84 PID 2536 wrote to memory of 2688 2536 msedge.exe 84 PID 2536 wrote to memory of 2688 2536 msedge.exe 84 PID 2536 wrote to memory of 2688 2536 msedge.exe 84 PID 2536 wrote to memory of 2688 2536 msedge.exe 84 PID 2536 wrote to memory of 2688 2536 msedge.exe 84 PID 2536 wrote to memory of 2688 2536 msedge.exe 84 PID 2536 wrote to memory of 2688 2536 msedge.exe 84 PID 2536 wrote to memory of 2688 2536 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\b68f32cdb6af2e7cd85dff81e82a0a37_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbb53f46f8,0x7ffbb53f4708,0x7ffbb53f47182⤵PID:5532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2192,8461841251303623436,9020482522738079306,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2240 /prefetch:22⤵PID:3036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2192,8461841251303623436,9020482522738079306,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2296 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2192,8461841251303623436,9020482522738079306,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2948 /prefetch:82⤵PID:2688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,8461841251303623436,9020482522738079306,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3204 /prefetch:12⤵PID:5372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,8461841251303623436,9020482522738079306,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:5388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,8461841251303623436,9020482522738079306,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3636 /prefetch:12⤵PID:1564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2192,8461841251303623436,9020482522738079306,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5252 /prefetch:82⤵PID:2756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2192,8461841251303623436,9020482522738079306,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5252 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,8461841251303623436,9020482522738079306,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5332 /prefetch:12⤵PID:4060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,8461841251303623436,9020482522738079306,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5344 /prefetch:12⤵PID:4824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,8461841251303623436,9020482522738079306,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4716 /prefetch:12⤵PID:5208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,8461841251303623436,9020482522738079306,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4656 /prefetch:12⤵PID:4440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2192,8461841251303623436,9020482522738079306,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2656 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2040
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3968
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1456
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5477462b6ad8eaaf8d38f5e3a4daf17b0
SHA186174e670c44767c08a39cc2a53c09c318326201
SHA256e6bbd4933b9baa1df4bb633319174de07db176ec215e71c8568d27c5c577184d
SHA512a0acc2ef7fd0fcf413572eeb94d1e38aa6a682195cc03d6eaaaa0bc9e5f4b2c0033da0b835f4617aebc52069d0a10b52fc31ed53c2fe7943a480b55b7481dd4e
-
Filesize
152B
MD5b704c9ca0493bd4548ac9c69dc4a4f27
SHA1a3e5e54e630dabe55ca18a798d9f5681e0620ba7
SHA2562ebd5229b9dc642afba36a27c7ac12d90196b1c50985c37e94f4c17474e15411
SHA51269c8116fb542b344a8c55e2658078bd3e0d3564b1e4c889b072dbc99d2b070dacbc4394dedbc22a4968a8cf9448e71f69ec71ded018c1bacc0e195b3b3072d32
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD512b101c8b65f93514f30286787d5d114
SHA1c51d7d2ad139979a66112545727ee6b4a0c3962b
SHA256fd40cb8c09b9c88b1e1aeab3cf2cd5b1414b5d4c654dcbaab79bdb9593c181ff
SHA512e3dc360a27f013970214c1c20b2413bc63ae2a4c0358e31bbb63fbb0c548deff09cd0725dc0d24776296a773ee1983dd44c72b690352ce201214e1015e07df91
-
Filesize
410B
MD512b04e2a1493d424e26830bebd45ad1b
SHA12de2891dfba618a46b500907692d135c37e78fe7
SHA256aff7af7e0818a9850346f082cba6a740a9019fdcf8f5ae4148eeaaaa9d41dbf4
SHA512cee08897d253f07859fdc00e4ea26b71c12ff0e2d1eca05e027799fbb2e13612dcfa8e1c8e70c123d08f42cfab94f2003bafff4d15ae7ca285c3e46c5db66cf2
-
Filesize
6KB
MD5bbf8896e597ff99a3bc537a8ed3529b3
SHA1c44b2852634b23f4bc49246f892259976be3414a
SHA2564dc42d2f23467950e6670405e97b861699161d9ef5b7f2bfb979569c381f6436
SHA5126a324efeaad1c0e7d2e9fcfad524859d95ce3c9d77e2beebc07bca6859a7e8101e2ce62d9ce35f18d9725c641784b0ca66b15a254486ee90b87cd36664d87caf
-
Filesize
6KB
MD598a869c00fc91ce701f06da3165ceae2
SHA10d87767c65221f5e968ff9dfc2e5444ca82b045c
SHA2561f9ce3de6f6d63341e88e9e5e21c7b34ce7ce24118cbd35122d7f5115ee11383
SHA5122afa02641ffa7cfe411c549915d143675ddaed3088e1473c394e1cfdced38569993ecc25ff2950106e873e317748d707edff0f1a8b9614c7dd2343c2d585ad57
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD529ee5db03580142604ecaf6cbe6f777c
SHA1ae8faad8c06b77d71656bb267f6c493aa850ca0b
SHA256c5c6f2bae79c993dd43c46ecc49da70ebe0eedff210af08b5bd61d597011252b
SHA512e80564889a3ff1a9b51ad1ea4d76bb7b8bfa633128b0534c500ddcbfa91b8f41d6c12042f9f123193a4ff8a6d425821619831ea364c4bcf2302ceac2469801d0