Analysis
-
max time kernel
147s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
11/04/2024, 08:18
Static task
static1
Behavioral task
behavioral1
Sample
ecf94f3bc8a449b58af4396c553b7321_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ecf94f3bc8a449b58af4396c553b7321_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
ecf94f3bc8a449b58af4396c553b7321_JaffaCakes118.html
-
Size
91KB
-
MD5
ecf94f3bc8a449b58af4396c553b7321
-
SHA1
c376daa69b049edb9da5405263a919cb5a31ca0b
-
SHA256
e13237a497873719e09e778732848eb0f9c707ec1aa1eebb6ffa9bdf668e56df
-
SHA512
179f5db08923ef6aeb64f40195137fd49f0ba004d8906073ab5a319a5c07a91f2537048ba6716ae327325a0a38e98a5655a757c7c05891df5a0b2c208d1714d7
-
SSDEEP
1536:gQZBCCOdR0IxCSmb/L3FOYaemVLBpI+I3pdP7QrVc1vItnqjaVeL+xzqAzRGqfgF:gk2D0IxIJPd
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4904 msedge.exe 4904 msedge.exe 1240 msedge.exe 1240 msedge.exe 3340 identity_helper.exe 3340 identity_helper.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1240 wrote to memory of 3384 1240 msedge.exe 84 PID 1240 wrote to memory of 3384 1240 msedge.exe 84 PID 1240 wrote to memory of 4404 1240 msedge.exe 85 PID 1240 wrote to memory of 4404 1240 msedge.exe 85 PID 1240 wrote to memory of 4404 1240 msedge.exe 85 PID 1240 wrote to memory of 4404 1240 msedge.exe 85 PID 1240 wrote to memory of 4404 1240 msedge.exe 85 PID 1240 wrote to memory of 4404 1240 msedge.exe 85 PID 1240 wrote to memory of 4404 1240 msedge.exe 85 PID 1240 wrote to memory of 4404 1240 msedge.exe 85 PID 1240 wrote to memory of 4404 1240 msedge.exe 85 PID 1240 wrote to memory of 4404 1240 msedge.exe 85 PID 1240 wrote to memory of 4404 1240 msedge.exe 85 PID 1240 wrote to memory of 4404 1240 msedge.exe 85 PID 1240 wrote to memory of 4404 1240 msedge.exe 85 PID 1240 wrote to memory of 4404 1240 msedge.exe 85 PID 1240 wrote to memory of 4404 1240 msedge.exe 85 PID 1240 wrote to memory of 4404 1240 msedge.exe 85 PID 1240 wrote to memory of 4404 1240 msedge.exe 85 PID 1240 wrote to memory of 4404 1240 msedge.exe 85 PID 1240 wrote to memory of 4404 1240 msedge.exe 85 PID 1240 wrote to memory of 4404 1240 msedge.exe 85 PID 1240 wrote to memory of 4404 1240 msedge.exe 85 PID 1240 wrote to memory of 4404 1240 msedge.exe 85 PID 1240 wrote to memory of 4404 1240 msedge.exe 85 PID 1240 wrote to memory of 4404 1240 msedge.exe 85 PID 1240 wrote to memory of 4404 1240 msedge.exe 85 PID 1240 wrote to memory of 4404 1240 msedge.exe 85 PID 1240 wrote to memory of 4404 1240 msedge.exe 85 PID 1240 wrote to memory of 4404 1240 msedge.exe 85 PID 1240 wrote to memory of 4404 1240 msedge.exe 85 PID 1240 wrote to memory of 4404 1240 msedge.exe 85 PID 1240 wrote to memory of 4404 1240 msedge.exe 85 PID 1240 wrote to memory of 4404 1240 msedge.exe 85 PID 1240 wrote to memory of 4404 1240 msedge.exe 85 PID 1240 wrote to memory of 4404 1240 msedge.exe 85 PID 1240 wrote to memory of 4404 1240 msedge.exe 85 PID 1240 wrote to memory of 4404 1240 msedge.exe 85 PID 1240 wrote to memory of 4404 1240 msedge.exe 85 PID 1240 wrote to memory of 4404 1240 msedge.exe 85 PID 1240 wrote to memory of 4404 1240 msedge.exe 85 PID 1240 wrote to memory of 4404 1240 msedge.exe 85 PID 1240 wrote to memory of 4904 1240 msedge.exe 86 PID 1240 wrote to memory of 4904 1240 msedge.exe 86 PID 1240 wrote to memory of 332 1240 msedge.exe 87 PID 1240 wrote to memory of 332 1240 msedge.exe 87 PID 1240 wrote to memory of 332 1240 msedge.exe 87 PID 1240 wrote to memory of 332 1240 msedge.exe 87 PID 1240 wrote to memory of 332 1240 msedge.exe 87 PID 1240 wrote to memory of 332 1240 msedge.exe 87 PID 1240 wrote to memory of 332 1240 msedge.exe 87 PID 1240 wrote to memory of 332 1240 msedge.exe 87 PID 1240 wrote to memory of 332 1240 msedge.exe 87 PID 1240 wrote to memory of 332 1240 msedge.exe 87 PID 1240 wrote to memory of 332 1240 msedge.exe 87 PID 1240 wrote to memory of 332 1240 msedge.exe 87 PID 1240 wrote to memory of 332 1240 msedge.exe 87 PID 1240 wrote to memory of 332 1240 msedge.exe 87 PID 1240 wrote to memory of 332 1240 msedge.exe 87 PID 1240 wrote to memory of 332 1240 msedge.exe 87 PID 1240 wrote to memory of 332 1240 msedge.exe 87 PID 1240 wrote to memory of 332 1240 msedge.exe 87 PID 1240 wrote to memory of 332 1240 msedge.exe 87 PID 1240 wrote to memory of 332 1240 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\ecf94f3bc8a449b58af4396c553b7321_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1240 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa141146f8,0x7ffa14114708,0x7ffa141147182⤵PID:3384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2212,1857069108613617458,17015095282724136510,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2236 /prefetch:22⤵PID:4404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2212,1857069108613617458,17015095282724136510,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2288 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2212,1857069108613617458,17015095282724136510,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2932 /prefetch:82⤵PID:332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,1857069108613617458,17015095282724136510,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:12⤵PID:4924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,1857069108613617458,17015095282724136510,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3364 /prefetch:12⤵PID:4708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,1857069108613617458,17015095282724136510,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4244 /prefetch:12⤵PID:3904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,1857069108613617458,17015095282724136510,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4948 /prefetch:12⤵PID:4216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,1857069108613617458,17015095282724136510,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6016 /prefetch:12⤵PID:3864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2212,1857069108613617458,17015095282724136510,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6728 /prefetch:82⤵PID:1548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2212,1857069108613617458,17015095282724136510,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6728 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,1857069108613617458,17015095282724136510,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6504 /prefetch:12⤵PID:2724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,1857069108613617458,17015095282724136510,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6456 /prefetch:12⤵PID:1176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,1857069108613617458,17015095282724136510,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4196 /prefetch:12⤵PID:4332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,1857069108613617458,17015095282724136510,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6016 /prefetch:12⤵PID:4028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2212,1857069108613617458,17015095282724136510,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1844 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4488
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:8
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4392
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD57c6136bc98a5aedca2ea3004e9fbe67d
SHA174318d997f4c9c351eef86d040bc9b085ce1ad4f
SHA25650c3bd40caf7e9a82496a710f58804aa3536b44d57e2ee5e2af028cbebc6c2f2
SHA5122d2fb839321c56e4cb80562e9a1daa4baf48924d635729dc5504a26462796919906f0097dd1fc7fd053394c0eea13c25219dec54ffe6e9abb6e8cb9afa66bada
-
Filesize
152B
MD55c6aef82e50d05ffc0cf52a6c6d69c91
SHA1c203efe5b45b0630fee7bd364fe7d63b769e2351
SHA256d9068cf3d04d62a9fb1cdd4c3cf7c263920159171d1b84cb49eff7cf4ed5bc32
SHA51277ad48936e8c3ee107a121e0b2d1216723407f76872e85c36413237ca1c47b8c40038b8a6349b072bbcc6a29e27ddda77cf686fa97569f4d86531e6b2ac485ed
-
Filesize
198KB
MD5319e0c36436ee0bf24476acbcc83565c
SHA1fb2658d5791fe5b37424119557ab8cee30acdc54
SHA256f6562ea52e056b979d6f52932ae57b7afb04486b10b0ebde22c5b51f502c69d1
SHA512ad902b9a010cf99bdedba405cad0387890a9ff90a9c91f6a3220cdceec1b08ecb97a326aef01b28d8d0aacb5f2a16f02f673e196bdb69fc68b3f636139059902
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize504B
MD5059b65ab4351d94ed9ec6fad928be166
SHA1fdbf24e56ab3e46c893aa125c0147e01f2ed6e63
SHA256d297b73e4ff0b47f1795922c269542af4d6e9770e5491bbf0545e97ef46eebea
SHA51244bc5b1f7c3249111125531ebe47eb3010ecc045c92d9d4ecccb4ab0f9555c3d29151db4b5bb281cb4eace5ab430d60d1396e9aa7a7174108d9768d24f25a280
-
Filesize
1KB
MD5af0deffbddf1d956a31eabfc93b4d9d0
SHA13d182990209ff439f7ee453f19de946bc524dbae
SHA256211ab8f0f067c82dcce31404a69f31322bff372bf6108c876f768a8f17d49dc3
SHA5125dcb39e47ec95966004fa699819ae2149e77ce08da04d1a60bcb53a0750ea9e22beaea7d953a4a312be61a05b766d35d6d6ba43e75fec0e0689b437052b17d87
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
6KB
MD596836d37ead557b4fd1c97a7bc060513
SHA14dc97e12268af46d70fda05821c6ff952c7e94f5
SHA25695e3952c389fbe40e064142abfa8f9679e9dd0b43a9c923c8771f903e82ad8b4
SHA51231f8516cbd8919a5fd8e547416a720d5527e236060a55511da3d1a4015675bd4957ad570424798c33d88a9d125240ebd8839c723b0da87e6ada0760b023ee866
-
Filesize
6KB
MD54e8249d6f663d4e27949b8243933249f
SHA16ef73693dc30389a6bfdcbf9d1dff6d65902a346
SHA2567344c1a6ffbf6b827fce50b580486f469d5e3fc915093df9f32cd1d5c2cadfb8
SHA512fcb8cf350f145bdff8eb1f7bbf2f3867dcd0c9f3fba605ee8a8c31822c0696c3c2436fb237720ef7e187d82d1f109bbf81adfc024d35d8ec0b42bd3793ea1afd
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD553f2279860e07c82447785b68ba4288b
SHA14929f75f928d54242b57a165ebac13fadb4ca482
SHA256e3f67bb002e44ff2955f89a35562cd02f1d45df6a9b3303b095448d3fd23b86c
SHA512fa80bbd3140a7d87a456738497964e3f030c3814b2a045d5bbc095ba2d556d40bab0c8c1d311171106a198ec80c7b2083cb8422904c8122899f7ada81cb605e7