Analysis
-
max time kernel
159s -
max time network
166s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
10/04/2024, 23:24
Static task
static1
Behavioral task
behavioral1
Sample
ec362aa42537c68cb22c9c6ad284b89d_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ec362aa42537c68cb22c9c6ad284b89d_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
ec362aa42537c68cb22c9c6ad284b89d_JaffaCakes118.html
-
Size
53KB
-
MD5
ec362aa42537c68cb22c9c6ad284b89d
-
SHA1
8013ff69c7f3ad9532b201cf96457c71e575efa8
-
SHA256
ea4dbc283c1f601d431d89472e09d4ba364368795f4fffdc585345ba2b7868a4
-
SHA512
b10f837acfc9433d575cada3b05854f208ce6c9bb71bc0035a321755074b8fd8b2bed43a2c6b10eb3abf51a7a45980d8a59e7b87712045be5b07685416248c48
-
SSDEEP
768:k+upHvvCIoo91oiJZQ10szT8sXNRhOFWNG:k+2Hv7oy1oeZQ1x8sXHhOFZ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4392 msedge.exe 4392 msedge.exe 4900 msedge.exe 4900 msedge.exe 1780 identity_helper.exe 1780 identity_helper.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe 4900 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4900 wrote to memory of 4632 4900 msedge.exe 83 PID 4900 wrote to memory of 4632 4900 msedge.exe 83 PID 4900 wrote to memory of 5016 4900 msedge.exe 84 PID 4900 wrote to memory of 5016 4900 msedge.exe 84 PID 4900 wrote to memory of 5016 4900 msedge.exe 84 PID 4900 wrote to memory of 5016 4900 msedge.exe 84 PID 4900 wrote to memory of 5016 4900 msedge.exe 84 PID 4900 wrote to memory of 5016 4900 msedge.exe 84 PID 4900 wrote to memory of 5016 4900 msedge.exe 84 PID 4900 wrote to memory of 5016 4900 msedge.exe 84 PID 4900 wrote to memory of 5016 4900 msedge.exe 84 PID 4900 wrote to memory of 5016 4900 msedge.exe 84 PID 4900 wrote to memory of 5016 4900 msedge.exe 84 PID 4900 wrote to memory of 5016 4900 msedge.exe 84 PID 4900 wrote to memory of 5016 4900 msedge.exe 84 PID 4900 wrote to memory of 5016 4900 msedge.exe 84 PID 4900 wrote to memory of 5016 4900 msedge.exe 84 PID 4900 wrote to memory of 5016 4900 msedge.exe 84 PID 4900 wrote to memory of 5016 4900 msedge.exe 84 PID 4900 wrote to memory of 5016 4900 msedge.exe 84 PID 4900 wrote to memory of 5016 4900 msedge.exe 84 PID 4900 wrote to memory of 5016 4900 msedge.exe 84 PID 4900 wrote to memory of 5016 4900 msedge.exe 84 PID 4900 wrote to memory of 5016 4900 msedge.exe 84 PID 4900 wrote to memory of 5016 4900 msedge.exe 84 PID 4900 wrote to memory of 5016 4900 msedge.exe 84 PID 4900 wrote to memory of 5016 4900 msedge.exe 84 PID 4900 wrote to memory of 5016 4900 msedge.exe 84 PID 4900 wrote to memory of 5016 4900 msedge.exe 84 PID 4900 wrote to memory of 5016 4900 msedge.exe 84 PID 4900 wrote to memory of 5016 4900 msedge.exe 84 PID 4900 wrote to memory of 5016 4900 msedge.exe 84 PID 4900 wrote to memory of 5016 4900 msedge.exe 84 PID 4900 wrote to memory of 5016 4900 msedge.exe 84 PID 4900 wrote to memory of 5016 4900 msedge.exe 84 PID 4900 wrote to memory of 5016 4900 msedge.exe 84 PID 4900 wrote to memory of 5016 4900 msedge.exe 84 PID 4900 wrote to memory of 5016 4900 msedge.exe 84 PID 4900 wrote to memory of 5016 4900 msedge.exe 84 PID 4900 wrote to memory of 5016 4900 msedge.exe 84 PID 4900 wrote to memory of 5016 4900 msedge.exe 84 PID 4900 wrote to memory of 5016 4900 msedge.exe 84 PID 4900 wrote to memory of 4392 4900 msedge.exe 85 PID 4900 wrote to memory of 4392 4900 msedge.exe 85 PID 4900 wrote to memory of 3812 4900 msedge.exe 86 PID 4900 wrote to memory of 3812 4900 msedge.exe 86 PID 4900 wrote to memory of 3812 4900 msedge.exe 86 PID 4900 wrote to memory of 3812 4900 msedge.exe 86 PID 4900 wrote to memory of 3812 4900 msedge.exe 86 PID 4900 wrote to memory of 3812 4900 msedge.exe 86 PID 4900 wrote to memory of 3812 4900 msedge.exe 86 PID 4900 wrote to memory of 3812 4900 msedge.exe 86 PID 4900 wrote to memory of 3812 4900 msedge.exe 86 PID 4900 wrote to memory of 3812 4900 msedge.exe 86 PID 4900 wrote to memory of 3812 4900 msedge.exe 86 PID 4900 wrote to memory of 3812 4900 msedge.exe 86 PID 4900 wrote to memory of 3812 4900 msedge.exe 86 PID 4900 wrote to memory of 3812 4900 msedge.exe 86 PID 4900 wrote to memory of 3812 4900 msedge.exe 86 PID 4900 wrote to memory of 3812 4900 msedge.exe 86 PID 4900 wrote to memory of 3812 4900 msedge.exe 86 PID 4900 wrote to memory of 3812 4900 msedge.exe 86 PID 4900 wrote to memory of 3812 4900 msedge.exe 86 PID 4900 wrote to memory of 3812 4900 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\ec362aa42537c68cb22c9c6ad284b89d_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9d16646f8,0x7ff9d1664708,0x7ff9d16647182⤵PID:4632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2188,1808371536877728437,16086354994331865353,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2200 /prefetch:22⤵PID:5016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2188,1808371536877728437,16086354994331865353,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2252 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2188,1808371536877728437,16086354994331865353,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2712 /prefetch:82⤵PID:3812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,1808371536877728437,16086354994331865353,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:5080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,1808371536877728437,16086354994331865353,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:4888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,1808371536877728437,16086354994331865353,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5176 /prefetch:12⤵PID:1380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,1808371536877728437,16086354994331865353,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5584 /prefetch:12⤵PID:1360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,1808371536877728437,16086354994331865353,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5484 /prefetch:12⤵PID:2136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2188,1808371536877728437,16086354994331865353,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6288 /prefetch:82⤵PID:2160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2188,1808371536877728437,16086354994331865353,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6288 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,1808371536877728437,16086354994331865353,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3872 /prefetch:12⤵PID:2156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,1808371536877728437,16086354994331865353,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4528 /prefetch:12⤵PID:3048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2188,1808371536877728437,16086354994331865353,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1964 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4832
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5100
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4680
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD536bb45cb1262fcfcab1e3e7960784eaa
SHA1ab0e15841b027632c9e1b0a47d3dec42162fc637
SHA2567c6b0de6f9b4c3ca1f5d6af23c3380f849825af00b58420b76c72b62cfae44ae
SHA51202c54c919f8cf3fc28f5f965fe1755955636d7d89b5f0504a02fcd9d94de8c50e046c7c2d6cf349fabde03b0fbbcc61df6e9968f2af237106bf7edd697e07456
-
Filesize
152B
MD51e3dc6a82a2cb341f7c9feeaf53f466f
SHA1915decb72e1f86e14114f14ac9bfd9ba198fdfce
SHA256a56135007f4dadf6606bc237cb75ff5ff77326ba093dff30d6881ce9a04a114c
SHA5120a5223e8cecce77613b1c02535c79b3795e5ad89fc0a934e9795e488712e02b527413109ad1f94bbd4eb35dd07b86dd6e9f4b57d4d7c8a0a57ec3f7f76c7890a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\5cdc5654-0040-4f5b-860a-cdb73ed82f9f.tmp
Filesize6KB
MD52a27580e4d3cf31eb1e8568fca62b491
SHA134eb5608c20e7c0127d35be0f6f30f090389a1c3
SHA2561e5e6c1cd2431d6da155bcdae59b03a86933a3a5498a4fecaf9f138d7a674abb
SHA512ef59bbde31fac97252322315c7b77fbfa7b1c11ca0cc262aae94b04e2e6739e42c2b85452b65dd7839d55afc9c8f8d712f26c4a135a082c06bda662ba95a0603
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD5fd9c6c0926034742bbdad3135c9f5552
SHA1816b6651549713e8fb251f7b33316f9fae488b64
SHA2563a2bd23290b57af66a5bc2e80ae9e54083613c8b26cb3727f26cde9dd574e315
SHA51246220904bd2ebe373feeb08d13f2c5158c10a3233170ed6439bc83673125958b1ee4f912839515a136b79ae24a251e46d0dbca16700172da2975a83675a4302b
-
Filesize
1KB
MD5477817c39fb58b1039e21d3c535aa909
SHA1da77ead4e550ff27468e9b4dc49821ad488fe46f
SHA2567ba1bd8387416681a038cf5e643c29284f441f7ebef8920b5c0e0f9600bb9bd9
SHA512f3fa3856ec88afac06f3e4181f39c081a4fe65f25cb978a437a1f8c03037a748bd095d0c7b15a1c8750e855d7d32f7d16f6c365ef809a441b283d052f174d219
-
Filesize
6KB
MD5b9aae1767df9eb74ddf3145e9a06edf8
SHA1f9cc1b66a21c5822a2e392deae7ad2d52e202b45
SHA256c8d42bf63942f03337b97881b6848e27520f9c66dd0a38bc057c8fd6b3b73bba
SHA5120386e4086af98646908aacfa85aca1a60221ce3ea49dd244ca8d462c54c4fd556d97f9e4637cc6dc0a02b43e24701c63e6f550676f81ad8800482d284dab7727
-
Filesize
6KB
MD5eff6d97debd3260d9a7274395f9bf7dd
SHA10fef2d0b42d62f792e1563e568498e1a406ae27c
SHA256c3dd9b086d75f30b9d93aec6561a130758f211b0fd3acb0bece773bce41d19b9
SHA512250e3174822ebf3da491e4067a44a7c56bab2c26e4985151bb85980d5a5246bc2903bf76cdc58f0c0866d378e60c625a182351b8017e529c4e24ec10b60f97f6
-
Filesize
6KB
MD59bc58cd64d0f957d3deec715bf23d4ae
SHA1794d6e120cd9df5be68f6fb10ce13bf3780cea9b
SHA2564a5dc47acdd776c7d858467273c7274a4eeeb757b2d301799dcd63125929f661
SHA51258e9b4fadf6adbf4e3db0671094ec322f56c560cb433fefc8c5b1f61c34dacc478f07c4cf688549da8d59295f0be69ac6c8d682e05172e9ee0d79a8dee3df652
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5685fab183cf7172a83173f7593087d02
SHA14c2660da1034dfc614efed83d2482f8605df28f1
SHA2562f6a216c2a13e81bba368ec46942cd55cc0b7e8bcd42c6a727d7874e4e0ee1fb
SHA51224ec180ea55a3cb4156d2464f8ad0a0c276408d2924025c09b981cae00cd57bd870b101d9b225ba15fddf3bcf3c302709b9fc65728d5ea80b105217e2b5e4f1b