Analysis
-
max time kernel
146s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
09-04-2024 07:26
Static task
static1
Behavioral task
behavioral1
Sample
e975cdd867c5343bc8591ab395634d35_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e975cdd867c5343bc8591ab395634d35_JaffaCakes118.html
Resource
win10v2004-20231215-en
General
-
Target
e975cdd867c5343bc8591ab395634d35_JaffaCakes118.html
-
Size
33KB
-
MD5
e975cdd867c5343bc8591ab395634d35
-
SHA1
9eb142cee6553be6aeec7d6e03748801b7e63d58
-
SHA256
72ce347e992915bdc4d45e1599400aa686da3f1163704d16dbc5e362bef9b8af
-
SHA512
51ac9b08f9e6dc94a4a02c94086e8f33a8db58130fc2a27336a5b85ab27a3017b6fbd4c9ff7c7955cae16f1ef55c32c443c4b456d3492dc42d746ff0728f4672
-
SSDEEP
768:UgdlIRIOITIwIgIiKZgNDfIwIGI5IVJ7SqIRIOITIwIgIiKZgNDfIwIGI5IVJ7So:TlIRIOITIwIgIiKZgNDfIwIGI5IVJ7SY
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4544 msedge.exe 4544 msedge.exe 3724 msedge.exe 3724 msedge.exe 1936 identity_helper.exe 1936 identity_helper.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe 4284 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe 3724 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3724 wrote to memory of 4108 3724 msedge.exe 85 PID 3724 wrote to memory of 4108 3724 msedge.exe 85 PID 3724 wrote to memory of 2228 3724 msedge.exe 86 PID 3724 wrote to memory of 2228 3724 msedge.exe 86 PID 3724 wrote to memory of 2228 3724 msedge.exe 86 PID 3724 wrote to memory of 2228 3724 msedge.exe 86 PID 3724 wrote to memory of 2228 3724 msedge.exe 86 PID 3724 wrote to memory of 2228 3724 msedge.exe 86 PID 3724 wrote to memory of 2228 3724 msedge.exe 86 PID 3724 wrote to memory of 2228 3724 msedge.exe 86 PID 3724 wrote to memory of 2228 3724 msedge.exe 86 PID 3724 wrote to memory of 2228 3724 msedge.exe 86 PID 3724 wrote to memory of 2228 3724 msedge.exe 86 PID 3724 wrote to memory of 2228 3724 msedge.exe 86 PID 3724 wrote to memory of 2228 3724 msedge.exe 86 PID 3724 wrote to memory of 2228 3724 msedge.exe 86 PID 3724 wrote to memory of 2228 3724 msedge.exe 86 PID 3724 wrote to memory of 2228 3724 msedge.exe 86 PID 3724 wrote to memory of 2228 3724 msedge.exe 86 PID 3724 wrote to memory of 2228 3724 msedge.exe 86 PID 3724 wrote to memory of 2228 3724 msedge.exe 86 PID 3724 wrote to memory of 2228 3724 msedge.exe 86 PID 3724 wrote to memory of 2228 3724 msedge.exe 86 PID 3724 wrote to memory of 2228 3724 msedge.exe 86 PID 3724 wrote to memory of 2228 3724 msedge.exe 86 PID 3724 wrote to memory of 2228 3724 msedge.exe 86 PID 3724 wrote to memory of 2228 3724 msedge.exe 86 PID 3724 wrote to memory of 2228 3724 msedge.exe 86 PID 3724 wrote to memory of 2228 3724 msedge.exe 86 PID 3724 wrote to memory of 2228 3724 msedge.exe 86 PID 3724 wrote to memory of 2228 3724 msedge.exe 86 PID 3724 wrote to memory of 2228 3724 msedge.exe 86 PID 3724 wrote to memory of 2228 3724 msedge.exe 86 PID 3724 wrote to memory of 2228 3724 msedge.exe 86 PID 3724 wrote to memory of 2228 3724 msedge.exe 86 PID 3724 wrote to memory of 2228 3724 msedge.exe 86 PID 3724 wrote to memory of 2228 3724 msedge.exe 86 PID 3724 wrote to memory of 2228 3724 msedge.exe 86 PID 3724 wrote to memory of 2228 3724 msedge.exe 86 PID 3724 wrote to memory of 2228 3724 msedge.exe 86 PID 3724 wrote to memory of 2228 3724 msedge.exe 86 PID 3724 wrote to memory of 2228 3724 msedge.exe 86 PID 3724 wrote to memory of 4544 3724 msedge.exe 87 PID 3724 wrote to memory of 4544 3724 msedge.exe 87 PID 3724 wrote to memory of 4940 3724 msedge.exe 88 PID 3724 wrote to memory of 4940 3724 msedge.exe 88 PID 3724 wrote to memory of 4940 3724 msedge.exe 88 PID 3724 wrote to memory of 4940 3724 msedge.exe 88 PID 3724 wrote to memory of 4940 3724 msedge.exe 88 PID 3724 wrote to memory of 4940 3724 msedge.exe 88 PID 3724 wrote to memory of 4940 3724 msedge.exe 88 PID 3724 wrote to memory of 4940 3724 msedge.exe 88 PID 3724 wrote to memory of 4940 3724 msedge.exe 88 PID 3724 wrote to memory of 4940 3724 msedge.exe 88 PID 3724 wrote to memory of 4940 3724 msedge.exe 88 PID 3724 wrote to memory of 4940 3724 msedge.exe 88 PID 3724 wrote to memory of 4940 3724 msedge.exe 88 PID 3724 wrote to memory of 4940 3724 msedge.exe 88 PID 3724 wrote to memory of 4940 3724 msedge.exe 88 PID 3724 wrote to memory of 4940 3724 msedge.exe 88 PID 3724 wrote to memory of 4940 3724 msedge.exe 88 PID 3724 wrote to memory of 4940 3724 msedge.exe 88 PID 3724 wrote to memory of 4940 3724 msedge.exe 88 PID 3724 wrote to memory of 4940 3724 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\e975cdd867c5343bc8591ab395634d35_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3724 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff7aef46f8,0x7fff7aef4708,0x7fff7aef47182⤵PID:4108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,10263434821766398093,7619706913040479728,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2080 /prefetch:22⤵PID:2228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2068,10263434821766398093,7619706913040479728,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2068,10263434821766398093,7619706913040479728,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2944 /prefetch:82⤵PID:4940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,10263434821766398093,7619706913040479728,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:2384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,10263434821766398093,7619706913040479728,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:3572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,10263434821766398093,7619706913040479728,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1780 /prefetch:12⤵PID:1220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,10263434821766398093,7619706913040479728,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5544 /prefetch:82⤵PID:572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,10263434821766398093,7619706913040479728,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5544 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,10263434821766398093,7619706913040479728,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4952 /prefetch:12⤵PID:3180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,10263434821766398093,7619706913040479728,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5320 /prefetch:12⤵PID:4340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,10263434821766398093,7619706913040479728,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5548 /prefetch:12⤵PID:3844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,10263434821766398093,7619706913040479728,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1884 /prefetch:12⤵PID:5080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,10263434821766398093,7619706913040479728,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4204 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4284
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4076
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5008
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2444
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54d6e17218d9a99976d1a14c6f6944c96
SHA19e54a19d6c61d99ac8759c5f07b2f0d5faab447f
SHA25632e343d2794af8bc6f2f7c905b5df11d53db4ad8922b92ad5e7cc9c856509d93
SHA5123fa166b3e2d1236298d8dda7071a6fcf2bde283f181b8b0a07c0bb8ba756d6f55fa8a847ca5286d4dbabc6dace67e842a118866320ac01bd5f93cccd3a032e47
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD5f03d0cac8d5736c2315b82c8b0680d77
SHA14b21edc7332b3aa038d03068f01cab905d1ed71f
SHA2561851c62c84a54a5c27dacf9ffd62cabcbcee97a0608237f08949aef3be26c956
SHA51224bdd1b4e563f387f3b53aaa4045cb31dea28817175ca2c9d78388b1014e95258c1ab0b3273bfcbc2fcaae2e909516aaf04b165bb60a0021fd7089edff1a373b
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
1KB
MD50c93bdba896d5802da5df6525ba19b3a
SHA16a2612591baea3b9136f6f03643e8d591910327a
SHA2562073678399f361f3048f7caeae7c303ed781ba45f8c6f2936a868f4697a1e3c8
SHA512f5c98c3708e65f479e7e020a1403107e30637f8b271fa6f690b8b6190b5d51630921c707b67c9265297b288ffc0b2fdc9efe2004eeda1c4b1a38819a8ad9c56a
-
Filesize
5KB
MD5f3521a1fac1dadc57e54e7491af17d7c
SHA183ff45adbe6e80446fd4793a1838acc61cd44730
SHA2565f480a5a5aa3356eefad7f41bd7e64da37d3bb2a9d8daa5055bf034b57ae81aa
SHA512bca1a9fae3a9c930fd8c3730883d7a705dd3d0468643d3b86e509ff2a8353e133102ce41e84aa9f52b5bafb10158917693ef265e510661fbe12569179d4e590d
-
Filesize
5KB
MD5dbe5ec3def5cb86702b2976a7d7d4987
SHA15a74eed4c93d7856cf5073db251dc8c2def1d6cb
SHA256c9c7d2b2cb4567b4884c33e35819ed18626324ea69c29237235be28baa95ef38
SHA51268970ca113c3cf9133631e92ef74dbd038336446a38ebfb94c17aed24212fec3d1ae0d5f8f94ae467ecaeea98ca7169d917325578d761b5043bb890e94f7f954
-
Filesize
6KB
MD52b2b96fc15cd40c9cd8c0f2f12ea17f6
SHA1c7ed14067a8eeb6e269b4401d49b221c1182a71a
SHA25641309a2231b3c3c9fcfb96d264274be1e8546b0648d5cdc80f7d2b05f080817a
SHA5122c498e05c1f0c2450a398daf99df4c2c3e4719c31354ac1b58da78b2a1bbdbf55b0f00c068a54b8c146fc0c21e1a71409918d182bb3daf34bf7d121bd1916d1f
-
Filesize
24KB
MD5c2ef1d773c3f6f230cedf469f7e34059
SHA1e410764405adcfead3338c8d0b29371fd1a3f292
SHA256185450d538a894e4dcf55b428f506f3d7baa86664fbbc67afd6c255b65178521
SHA5122ef93803da4d630916bed75d678382fd1c72bff1700a1a72e2612431c6d5e11410ced4eaf522b388028aeadb08e8a77513e16594e6ab081f6d6203e4caa7d549
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\bbc17b18-8369-4783-8074-5a6480991971.tmp
Filesize1KB
MD55a1995f66b42a5530500bc91185b9704
SHA14110213df32b050df5b2f289a095dc2b45541d2e
SHA256780144f376f89d3ed659e5df55f32101aef37dbbb2d032b9190b635374115a04
SHA51220392c43a9967e3684324c62f1858e92e73063348e0187ac2e3c6c641d537baf0a1ab6a3b1c43d2f2095c72763beaf2b3460bcc3eed3ba2af2cb240aa4728367
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD58f66f4ad5939ccb062342530eed5297c
SHA10f2cbb1de2056e0cad4575aa5f1a52dca90e9ab1
SHA2566c459a4b38e2f47ba7ad7924c5e66fa895dec4e37ee684a1154adef403e3bb90
SHA512d1427f0b4fccb77c856004ac2ea4c198ea22ffa4c0d78325af922dcd298ba679d9104e71bff01be0967a44d503de3660a140f9f99a729539f482d52200eac034