Analysis
-
max time kernel
145s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25-09-2024 03:12
Static task
static1
Behavioral task
behavioral1
Sample
f50be0475303f1f2e6c9d5cfaeeffea7_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f50be0475303f1f2e6c9d5cfaeeffea7_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f50be0475303f1f2e6c9d5cfaeeffea7_JaffaCakes118.html
-
Size
50KB
-
MD5
f50be0475303f1f2e6c9d5cfaeeffea7
-
SHA1
4373770add1bab0b59c7799233606b633de90676
-
SHA256
e671b7c0a4309ebedef8ecd8b3d886b0c0eb23b358a2d9c825b5b41ee37ea205
-
SHA512
1afd5e6e74873facc4ce1b6bafc1c831b9d39c8c6e39d76b7744be23972165ace8538e73e09ad6576e13530905a01abfe9ad302a8336084bf2c0f2b0fafdab64
-
SSDEEP
1536:uPOKqUU0EeyGKgQigpcjWID8y2iuMoirDZaMkvww26rGrJ:uPOK+0+2gpcySD02E0
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1992 msedge.exe 1992 msedge.exe 4960 msedge.exe 4960 msedge.exe 3124 identity_helper.exe 3124 identity_helper.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4960 wrote to memory of 5016 4960 msedge.exe 84 PID 4960 wrote to memory of 5016 4960 msedge.exe 84 PID 4960 wrote to memory of 1776 4960 msedge.exe 85 PID 4960 wrote to memory of 1776 4960 msedge.exe 85 PID 4960 wrote to memory of 1776 4960 msedge.exe 85 PID 4960 wrote to memory of 1776 4960 msedge.exe 85 PID 4960 wrote to memory of 1776 4960 msedge.exe 85 PID 4960 wrote to memory of 1776 4960 msedge.exe 85 PID 4960 wrote to memory of 1776 4960 msedge.exe 85 PID 4960 wrote to memory of 1776 4960 msedge.exe 85 PID 4960 wrote to memory of 1776 4960 msedge.exe 85 PID 4960 wrote to memory of 1776 4960 msedge.exe 85 PID 4960 wrote to memory of 1776 4960 msedge.exe 85 PID 4960 wrote to memory of 1776 4960 msedge.exe 85 PID 4960 wrote to memory of 1776 4960 msedge.exe 85 PID 4960 wrote to memory of 1776 4960 msedge.exe 85 PID 4960 wrote to memory of 1776 4960 msedge.exe 85 PID 4960 wrote to memory of 1776 4960 msedge.exe 85 PID 4960 wrote to memory of 1776 4960 msedge.exe 85 PID 4960 wrote to memory of 1776 4960 msedge.exe 85 PID 4960 wrote to memory of 1776 4960 msedge.exe 85 PID 4960 wrote to memory of 1776 4960 msedge.exe 85 PID 4960 wrote to memory of 1776 4960 msedge.exe 85 PID 4960 wrote to memory of 1776 4960 msedge.exe 85 PID 4960 wrote to memory of 1776 4960 msedge.exe 85 PID 4960 wrote to memory of 1776 4960 msedge.exe 85 PID 4960 wrote to memory of 1776 4960 msedge.exe 85 PID 4960 wrote to memory of 1776 4960 msedge.exe 85 PID 4960 wrote to memory of 1776 4960 msedge.exe 85 PID 4960 wrote to memory of 1776 4960 msedge.exe 85 PID 4960 wrote to memory of 1776 4960 msedge.exe 85 PID 4960 wrote to memory of 1776 4960 msedge.exe 85 PID 4960 wrote to memory of 1776 4960 msedge.exe 85 PID 4960 wrote to memory of 1776 4960 msedge.exe 85 PID 4960 wrote to memory of 1776 4960 msedge.exe 85 PID 4960 wrote to memory of 1776 4960 msedge.exe 85 PID 4960 wrote to memory of 1776 4960 msedge.exe 85 PID 4960 wrote to memory of 1776 4960 msedge.exe 85 PID 4960 wrote to memory of 1776 4960 msedge.exe 85 PID 4960 wrote to memory of 1776 4960 msedge.exe 85 PID 4960 wrote to memory of 1776 4960 msedge.exe 85 PID 4960 wrote to memory of 1776 4960 msedge.exe 85 PID 4960 wrote to memory of 1992 4960 msedge.exe 86 PID 4960 wrote to memory of 1992 4960 msedge.exe 86 PID 4960 wrote to memory of 2296 4960 msedge.exe 87 PID 4960 wrote to memory of 2296 4960 msedge.exe 87 PID 4960 wrote to memory of 2296 4960 msedge.exe 87 PID 4960 wrote to memory of 2296 4960 msedge.exe 87 PID 4960 wrote to memory of 2296 4960 msedge.exe 87 PID 4960 wrote to memory of 2296 4960 msedge.exe 87 PID 4960 wrote to memory of 2296 4960 msedge.exe 87 PID 4960 wrote to memory of 2296 4960 msedge.exe 87 PID 4960 wrote to memory of 2296 4960 msedge.exe 87 PID 4960 wrote to memory of 2296 4960 msedge.exe 87 PID 4960 wrote to memory of 2296 4960 msedge.exe 87 PID 4960 wrote to memory of 2296 4960 msedge.exe 87 PID 4960 wrote to memory of 2296 4960 msedge.exe 87 PID 4960 wrote to memory of 2296 4960 msedge.exe 87 PID 4960 wrote to memory of 2296 4960 msedge.exe 87 PID 4960 wrote to memory of 2296 4960 msedge.exe 87 PID 4960 wrote to memory of 2296 4960 msedge.exe 87 PID 4960 wrote to memory of 2296 4960 msedge.exe 87 PID 4960 wrote to memory of 2296 4960 msedge.exe 87 PID 4960 wrote to memory of 2296 4960 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\f50be0475303f1f2e6c9d5cfaeeffea7_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4960 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffde94a46f8,0x7ffde94a4708,0x7ffde94a47182⤵PID:5016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,15712969191452203702,15450571630400462316,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵PID:1776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2076,15712969191452203702,15450571630400462316,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2076,15712969191452203702,15450571630400462316,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2840 /prefetch:82⤵PID:2296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,15712969191452203702,15450571630400462316,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:1960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,15712969191452203702,15450571630400462316,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:4816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,15712969191452203702,15450571630400462316,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5636 /prefetch:82⤵PID:736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,15712969191452203702,15450571630400462316,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5636 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,15712969191452203702,15450571630400462316,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5252 /prefetch:12⤵PID:4480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,15712969191452203702,15450571630400462316,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5652 /prefetch:12⤵PID:3012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,15712969191452203702,15450571630400462316,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4092 /prefetch:12⤵PID:4036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,15712969191452203702,15450571630400462316,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3396 /prefetch:12⤵PID:3332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,15712969191452203702,15450571630400462316,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5196 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3916
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2216
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:672
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59e3fc58a8fb86c93d19e1500b873ef6f
SHA1c6aae5f4e26f5570db5e14bba8d5061867a33b56
SHA256828f4eacac1c40b790fd70dbb6fa6ba03dcc681171d9b2a6579626d27837b1c4
SHA512e5e245b56fa82075e060f468a3224cf2ef43f1b6d87f0351a2102d85c7c897e559be4caeaecfdc4059af29fdc674681b61229319dda95cb2ee649b2eb98d313e
-
Filesize
152B
MD527304926d60324abe74d7a4b571c35ea
SHA178b8f92fcaf4a09eaa786bbe33fd1b0222ef29c1
SHA2567039ad5c2b40f4d97c8c2269f4942be13436d739b2e1f8feb7a0c9f9fdb931de
SHA512f5b6181d3f432238c7365f64fc8a373299e23ba8178bcc419471916ef8b23e909787c7c0617ab22e4eb90909c02bd7b84f1386fbc61e2bdb5a0eb474175da4bd
-
Filesize
588B
MD52dc057dfa288010b4d3c88756facad65
SHA126046629d0a25b83f25af0324843eda230f7c964
SHA25607a034e6042e6c4d858ea9720eeda9a7520eaa34e4e7779511321457e16e9dc3
SHA5120470ed970755d7992badf15a6212314890cae6f14f02bfe7cb6809ef19ec995c44e8ad84052fbfd493cab72ce0b05fa5bbbd87bb32e46418919144ca7b69b5ea
-
Filesize
6KB
MD5db371f957480039f11132288db4e7019
SHA175bee160c75dcf1625ab1287972bb970fdaf4b32
SHA25640150de36f5eb670e17fe5073bfc7296824a10703dab62d56a7ec09cb7f3a674
SHA5125a59f6bb11c80b73733ac28bf45768fc78ae3b034532b3aa2e2237632430651a06132569f8235939304af44b63be966a2eaf9e2f039bfc2aa02dcbcf891dd45a
-
Filesize
6KB
MD5ec6018e584467a77a54301893859aa92
SHA1185d4164a741b9b5161ba98ce04309de3078bfa3
SHA256fd08f77c5420c986ada86d6862aa529bda162a4c10983f7218564caf1b547c39
SHA51220ee9c6a7f7f699de21570c22e65cb94dedf3e954372d356314223995c3991103ad4d459c80a8e4a734ae786ed1de8092009a6c62f4b30d8ac18a261c416e97d
-
Filesize
6KB
MD5ce060bab1fe148cc0da3053da7152ac2
SHA1e70d57fee091ede1a088a4158a718234f11e0067
SHA25678352a0ec4f1735a8fd89ec6bac68ff9787e83b2ff2e6397f40f23d0cc3194ed
SHA512112446a2ebf73006bd13e2716d1c2a39cc7ccde6e81429231b9e7574d0eecb49f2a2054159df20c51306e8a2ed40952289835ce09fc5c672be76f50816b50414
-
Filesize
706B
MD52a237f31fea7ccc7fb60f036abbd5ecc
SHA1fada03ecc68f7363e7f1773ce5c6663d4242e4ac
SHA256ad408bf01eec19b31eafa854e6d940781b4efdf5d24b7b179558d82fecfcdd85
SHA512f08e3e4482a778e692ae9392755aeeadd2d1a174b4b1da02f3089e96cc605cfe73aeb047a587502e7657766412c6000038e83341dfe9b05c4ca1d781025958f0
-
Filesize
706B
MD5abac6e0043a7f0c9262fd1b880f12438
SHA1bd6c1d0a41415fcd48d6703cc646f6ec9d68be9b
SHA2562583054568c7d99dcbccfc33dc370489ef9b211815982ec9b71fc980c329b6c3
SHA5122b4413233d290aca854eacfa5fec4b12a8a470cce7d0a778b71d3d9ca18aa3665480c4177551ba0580501c4269d1cb1d38acfc42026184b0ec3533d07c30fb0e
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5e05eeab35eb0e76fa2215572b8d6a366
SHA1298d36ce8ec236d9e38cb466b1d7c5188073d9ba
SHA256a2c26f4eca5a99a0c6676429554b1f3a73ee0351a00a13322c214d6f7cc235c2
SHA51251abe3e561128092e7f312f17dd50455f66252d4f2085d52c5b4e196a47edc69f0a61d5963b00beaf8d02796ee31cbdea192764263b5ba053396008bf1501458