Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
29/03/2024, 07:33
Static task
static1
Behavioral task
behavioral1
Sample
1c4ecd2a82141bf9433bad469618d97a_JaffaCakes118.html
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
1c4ecd2a82141bf9433bad469618d97a_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
1c4ecd2a82141bf9433bad469618d97a_JaffaCakes118.html
-
Size
209KB
-
MD5
1c4ecd2a82141bf9433bad469618d97a
-
SHA1
e85a000439885cc16e9935ba99c6a5c91d4fe6df
-
SHA256
47841968503319077adfcbb8e077817cdf8aed0de49fd06d79e49f98b7253707
-
SHA512
b7fbd32310ccf0133834cb26837113ce4d755b1bb8eef0c191ceb84798f9cb078125a1f310a642e44d09fab2210b27108f349179bb778cb969677001a91d27d7
-
SSDEEP
6144:Qx1u71iM5h6GXkPlAOWjRm9NHrC9D5DeM1ub86DHew3:Qx1u71iM5UekPlAOWjRm9NHrC9D5DeMq
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4064 msedge.exe 4064 msedge.exe 2760 msedge.exe 2760 msedge.exe 4124 identity_helper.exe 4124 identity_helper.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe 2760 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2760 wrote to memory of 2140 2760 msedge.exe 86 PID 2760 wrote to memory of 2140 2760 msedge.exe 86 PID 2760 wrote to memory of 1412 2760 msedge.exe 87 PID 2760 wrote to memory of 1412 2760 msedge.exe 87 PID 2760 wrote to memory of 1412 2760 msedge.exe 87 PID 2760 wrote to memory of 1412 2760 msedge.exe 87 PID 2760 wrote to memory of 1412 2760 msedge.exe 87 PID 2760 wrote to memory of 1412 2760 msedge.exe 87 PID 2760 wrote to memory of 1412 2760 msedge.exe 87 PID 2760 wrote to memory of 1412 2760 msedge.exe 87 PID 2760 wrote to memory of 1412 2760 msedge.exe 87 PID 2760 wrote to memory of 1412 2760 msedge.exe 87 PID 2760 wrote to memory of 1412 2760 msedge.exe 87 PID 2760 wrote to memory of 1412 2760 msedge.exe 87 PID 2760 wrote to memory of 1412 2760 msedge.exe 87 PID 2760 wrote to memory of 1412 2760 msedge.exe 87 PID 2760 wrote to memory of 1412 2760 msedge.exe 87 PID 2760 wrote to memory of 1412 2760 msedge.exe 87 PID 2760 wrote to memory of 1412 2760 msedge.exe 87 PID 2760 wrote to memory of 1412 2760 msedge.exe 87 PID 2760 wrote to memory of 1412 2760 msedge.exe 87 PID 2760 wrote to memory of 1412 2760 msedge.exe 87 PID 2760 wrote to memory of 1412 2760 msedge.exe 87 PID 2760 wrote to memory of 1412 2760 msedge.exe 87 PID 2760 wrote to memory of 1412 2760 msedge.exe 87 PID 2760 wrote to memory of 1412 2760 msedge.exe 87 PID 2760 wrote to memory of 1412 2760 msedge.exe 87 PID 2760 wrote to memory of 1412 2760 msedge.exe 87 PID 2760 wrote to memory of 1412 2760 msedge.exe 87 PID 2760 wrote to memory of 1412 2760 msedge.exe 87 PID 2760 wrote to memory of 1412 2760 msedge.exe 87 PID 2760 wrote to memory of 1412 2760 msedge.exe 87 PID 2760 wrote to memory of 1412 2760 msedge.exe 87 PID 2760 wrote to memory of 1412 2760 msedge.exe 87 PID 2760 wrote to memory of 1412 2760 msedge.exe 87 PID 2760 wrote to memory of 1412 2760 msedge.exe 87 PID 2760 wrote to memory of 1412 2760 msedge.exe 87 PID 2760 wrote to memory of 1412 2760 msedge.exe 87 PID 2760 wrote to memory of 1412 2760 msedge.exe 87 PID 2760 wrote to memory of 1412 2760 msedge.exe 87 PID 2760 wrote to memory of 1412 2760 msedge.exe 87 PID 2760 wrote to memory of 1412 2760 msedge.exe 87 PID 2760 wrote to memory of 4064 2760 msedge.exe 88 PID 2760 wrote to memory of 4064 2760 msedge.exe 88 PID 2760 wrote to memory of 4176 2760 msedge.exe 89 PID 2760 wrote to memory of 4176 2760 msedge.exe 89 PID 2760 wrote to memory of 4176 2760 msedge.exe 89 PID 2760 wrote to memory of 4176 2760 msedge.exe 89 PID 2760 wrote to memory of 4176 2760 msedge.exe 89 PID 2760 wrote to memory of 4176 2760 msedge.exe 89 PID 2760 wrote to memory of 4176 2760 msedge.exe 89 PID 2760 wrote to memory of 4176 2760 msedge.exe 89 PID 2760 wrote to memory of 4176 2760 msedge.exe 89 PID 2760 wrote to memory of 4176 2760 msedge.exe 89 PID 2760 wrote to memory of 4176 2760 msedge.exe 89 PID 2760 wrote to memory of 4176 2760 msedge.exe 89 PID 2760 wrote to memory of 4176 2760 msedge.exe 89 PID 2760 wrote to memory of 4176 2760 msedge.exe 89 PID 2760 wrote to memory of 4176 2760 msedge.exe 89 PID 2760 wrote to memory of 4176 2760 msedge.exe 89 PID 2760 wrote to memory of 4176 2760 msedge.exe 89 PID 2760 wrote to memory of 4176 2760 msedge.exe 89 PID 2760 wrote to memory of 4176 2760 msedge.exe 89 PID 2760 wrote to memory of 4176 2760 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\1c4ecd2a82141bf9433bad469618d97a_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd06d346f8,0x7ffd06d34708,0x7ffd06d347182⤵PID:2140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2192,9894977960757809509,13990952825303763629,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2204 /prefetch:22⤵PID:1412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2192,9894977960757809509,13990952825303763629,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2268 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2192,9894977960757809509,13990952825303763629,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2656 /prefetch:82⤵PID:4176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,9894977960757809509,13990952825303763629,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3156 /prefetch:12⤵PID:2500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,9894977960757809509,13990952825303763629,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3180 /prefetch:12⤵PID:1140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,9894977960757809509,13990952825303763629,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4664 /prefetch:12⤵PID:2956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,9894977960757809509,13990952825303763629,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5516 /prefetch:12⤵PID:964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,9894977960757809509,13990952825303763629,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5528 /prefetch:12⤵PID:4492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2192,9894977960757809509,13990952825303763629,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6008 /prefetch:82⤵PID:928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2192,9894977960757809509,13990952825303763629,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6008 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,9894977960757809509,13990952825303763629,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5388 /prefetch:12⤵PID:1116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,9894977960757809509,13990952825303763629,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4672 /prefetch:12⤵PID:3196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2192,9894977960757809509,13990952825303763629,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4912 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:632
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4816
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1280
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59ffb5f81e8eccd0963c46cbfea1abc20
SHA1a02a610afd3543de215565bc488a4343bb5c1a59
SHA2563a654b499247e59e34040f3b192a0069e8f3904e2398cbed90e86d981378e8bc
SHA5122d21e18ef3f800e6e43b8cf03639d04510433c04215923f5a96432a8aa361fdda282cd444210150d9dbf8f028825d5bc8a451fd53bd3e0c9528eeb80d6e86597
-
Filesize
152B
MD5e1b45169ebca0dceadb0f45697799d62
SHA1803604277318898e6f5c6fb92270ca83b5609cd5
SHA2564c0224fb7cc26ccf74f5be586f18401db57cce935c767a446659b828a7b5ee60
SHA512357965b8d5cfaf773dbd9b371d7e308d1c86a6c428e542adbfe6bac34a7d2061d0a2f59e84e5b42768930e9b109e9e9f2a87e95cf26b3a69cbff05654ee42b4e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD57b54c1f443d64b50c110b5af72388688
SHA13fb6d610146f66c99fe7fa0619b3afdeb8faea77
SHA256b84a6464101956f1ce202ae0b7a2772bbc8f9e645751e9e14aa2cc501da85f0d
SHA512290c180dd5a75bacb431323ec4e6b44bf9745ad545f99e0bfd398ee28242a9922d0498aed712da1823cb4c48dd0ee17038160d4b1eaecae4bf180f8c39e8e28b
-
Filesize
694B
MD590238bdfd9618de8cff52534ffd5f0c6
SHA11c8a8dc88d24f6ac94fb144e2f548ad259bcba47
SHA2568eafa494bc0a68693ea0e12ca626e0c0ff338195f62ffb5fc6ac997e4a67fc3b
SHA512bbd6432804677feb39046f43222ada35ca7b87067d5e3fa550ed2fafec57ce96c5d1ad581ecf897bf16dabeccd7809e14ac7fbe862c10c4435cbf93054a7a6b3
-
Filesize
6KB
MD5679e2fde5400086ba97be45335974eef
SHA13e0e82e189ff4ae887cb9f4a6bbd74bcea800023
SHA256944a9e13c237a1b5ae6bc319adba85a791f690eefd6b2352308abe8afd2b0172
SHA512dcc87628266ce97e4393f17f00c1ad30708f3f93b974fdd4db5aeb436e8fdb6261c9334a75f0fb4d45e382a9b1c790208c3d1b60b3eab70f20e2d3377ecb5940
-
Filesize
6KB
MD5cf34c8537743ff98560378ddb66d78bf
SHA17d95de079a55f944c061c22cf1db7b0ef7a1c2c4
SHA2564cb0cee158c7e87f569613806687ea11cec81823ef70036518dd17c3ccc38e1b
SHA512ee2eb0efdb43c85f63c5f82984a250dd508d48c3812d0d4566a3a83fb45c64af766a6e30e4d0ef5599ee270ede139d265f82d83e9012df3bd11b515d0e27b65b
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\f3d5ce2e-3826-426e-ae9d-1b5023f4a8ad.tmp
Filesize6KB
MD51b343b101abb34f169a672f07962d71d
SHA113c9479a88ffda5333b4a6a3dce8004c6fc3ded7
SHA256b16b9d6944f2740cd20e522d96c281e5c827c1ee06bed4aab02836ffae98ea2d
SHA51237b857b8f481d80c0ecb3a7c040b804b798d6b2e834079488feea23a63a32fdb883714f330a59d7cf9ec1c5761eae7bef537d928e7a1fa77d979f204647d94cc
-
Filesize
11KB
MD54ef02b3aa1199dc53eec94c602552629
SHA1a9a21f7259ce0d67d765849c380d180aee509442
SHA25690484692f8c81785d0162d056dce73cb4ce08e3694062a65e62ad28ec862cb89
SHA51204852222c3855a56a0b0255952f7abcf39d0a2452d8e17c847edfa3d65bb0b59cf31bada784de0ae026bada2ad3c2d1b1cd4475ab211ebe25da4ff542cad2114