Analysis
-
max time kernel
147s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
16/04/2024, 22:08
Static task
static1
Behavioral task
behavioral1
Sample
f46f6ad4549a1f7ada081a3ea0474cd8_JaffaCakes118.html
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
f46f6ad4549a1f7ada081a3ea0474cd8_JaffaCakes118.html
Resource
win10v2004-20240412-en
General
-
Target
f46f6ad4549a1f7ada081a3ea0474cd8_JaffaCakes118.html
-
Size
22KB
-
MD5
f46f6ad4549a1f7ada081a3ea0474cd8
-
SHA1
414d0a1dafe6986e75c088ff076676767dd41fec
-
SHA256
47690380e2573e7ef2885ff0d597653c7345b808193b509ae54ccaef3c18ccf8
-
SHA512
12df61042c72071969962138fc19cd5f62dee0b5758afa0d1ef924387e0bcca8e8bad1d6ee86096e9b0a6483275a89dcc625b30a8fb1a0f4ae4efbe068d250ef
-
SSDEEP
384:F8an/qH69JrhnflvP5LEfqiSiDfQ3anVc1mcCYwhKZwnAwskkUgVLRd:F8an/qa9BhnflvP5LEL7DfQ0qYFOvVLP
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 976 msedge.exe 976 msedge.exe 3396 msedge.exe 3396 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe 3396 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3396 wrote to memory of 4936 3396 msedge.exe 86 PID 3396 wrote to memory of 4936 3396 msedge.exe 86 PID 3396 wrote to memory of 1948 3396 msedge.exe 88 PID 3396 wrote to memory of 1948 3396 msedge.exe 88 PID 3396 wrote to memory of 1948 3396 msedge.exe 88 PID 3396 wrote to memory of 1948 3396 msedge.exe 88 PID 3396 wrote to memory of 1948 3396 msedge.exe 88 PID 3396 wrote to memory of 1948 3396 msedge.exe 88 PID 3396 wrote to memory of 1948 3396 msedge.exe 88 PID 3396 wrote to memory of 1948 3396 msedge.exe 88 PID 3396 wrote to memory of 1948 3396 msedge.exe 88 PID 3396 wrote to memory of 1948 3396 msedge.exe 88 PID 3396 wrote to memory of 1948 3396 msedge.exe 88 PID 3396 wrote to memory of 1948 3396 msedge.exe 88 PID 3396 wrote to memory of 1948 3396 msedge.exe 88 PID 3396 wrote to memory of 1948 3396 msedge.exe 88 PID 3396 wrote to memory of 1948 3396 msedge.exe 88 PID 3396 wrote to memory of 1948 3396 msedge.exe 88 PID 3396 wrote to memory of 1948 3396 msedge.exe 88 PID 3396 wrote to memory of 1948 3396 msedge.exe 88 PID 3396 wrote to memory of 1948 3396 msedge.exe 88 PID 3396 wrote to memory of 1948 3396 msedge.exe 88 PID 3396 wrote to memory of 1948 3396 msedge.exe 88 PID 3396 wrote to memory of 1948 3396 msedge.exe 88 PID 3396 wrote to memory of 1948 3396 msedge.exe 88 PID 3396 wrote to memory of 1948 3396 msedge.exe 88 PID 3396 wrote to memory of 1948 3396 msedge.exe 88 PID 3396 wrote to memory of 1948 3396 msedge.exe 88 PID 3396 wrote to memory of 1948 3396 msedge.exe 88 PID 3396 wrote to memory of 1948 3396 msedge.exe 88 PID 3396 wrote to memory of 1948 3396 msedge.exe 88 PID 3396 wrote to memory of 1948 3396 msedge.exe 88 PID 3396 wrote to memory of 1948 3396 msedge.exe 88 PID 3396 wrote to memory of 1948 3396 msedge.exe 88 PID 3396 wrote to memory of 1948 3396 msedge.exe 88 PID 3396 wrote to memory of 1948 3396 msedge.exe 88 PID 3396 wrote to memory of 1948 3396 msedge.exe 88 PID 3396 wrote to memory of 1948 3396 msedge.exe 88 PID 3396 wrote to memory of 1948 3396 msedge.exe 88 PID 3396 wrote to memory of 1948 3396 msedge.exe 88 PID 3396 wrote to memory of 1948 3396 msedge.exe 88 PID 3396 wrote to memory of 1948 3396 msedge.exe 88 PID 3396 wrote to memory of 976 3396 msedge.exe 89 PID 3396 wrote to memory of 976 3396 msedge.exe 89 PID 3396 wrote to memory of 1492 3396 msedge.exe 90 PID 3396 wrote to memory of 1492 3396 msedge.exe 90 PID 3396 wrote to memory of 1492 3396 msedge.exe 90 PID 3396 wrote to memory of 1492 3396 msedge.exe 90 PID 3396 wrote to memory of 1492 3396 msedge.exe 90 PID 3396 wrote to memory of 1492 3396 msedge.exe 90 PID 3396 wrote to memory of 1492 3396 msedge.exe 90 PID 3396 wrote to memory of 1492 3396 msedge.exe 90 PID 3396 wrote to memory of 1492 3396 msedge.exe 90 PID 3396 wrote to memory of 1492 3396 msedge.exe 90 PID 3396 wrote to memory of 1492 3396 msedge.exe 90 PID 3396 wrote to memory of 1492 3396 msedge.exe 90 PID 3396 wrote to memory of 1492 3396 msedge.exe 90 PID 3396 wrote to memory of 1492 3396 msedge.exe 90 PID 3396 wrote to memory of 1492 3396 msedge.exe 90 PID 3396 wrote to memory of 1492 3396 msedge.exe 90 PID 3396 wrote to memory of 1492 3396 msedge.exe 90 PID 3396 wrote to memory of 1492 3396 msedge.exe 90 PID 3396 wrote to memory of 1492 3396 msedge.exe 90 PID 3396 wrote to memory of 1492 3396 msedge.exe 90
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\f46f6ad4549a1f7ada081a3ea0474cd8_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3396 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9841446f8,0x7ff984144708,0x7ff9841447182⤵PID:4936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,7722345539968239677,2573374478647384737,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2156 /prefetch:22⤵PID:1948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2144,7722345539968239677,2573374478647384737,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2208 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2144,7722345539968239677,2573374478647384737,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2836 /prefetch:82⤵PID:1492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,7722345539968239677,2573374478647384737,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:4576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,7722345539968239677,2573374478647384737,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:2784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,7722345539968239677,2573374478647384737,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4156 /prefetch:12⤵PID:1308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,7722345539968239677,2573374478647384737,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5300 /prefetch:12⤵PID:1792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,7722345539968239677,2573374478647384737,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5248 /prefetch:12⤵PID:1992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,7722345539968239677,2573374478647384737,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2300 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5024
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2436
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1844
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD58c91c8582b0c918416d14bd7eedd686e
SHA1b2ff8149bc21144fdcec64111afda492965c6621
SHA2561e839706b748c04adf8efa2790564ca1efd707fdf6451e71af6862e07123717e
SHA512a93be868d9f08097bff39069378a0bfa0f5c78e74e9e8df820be9b0426cbfe84e03e9638b329b6142279ed140a120c4c4c21857f410fc4789a370445c3919dcf
-
Filesize
152B
MD52579d07b98bbefadc929d80fb3dbd32a
SHA11ceb57c4b81f0f23500e118a4b9a225116a467de
SHA256b8443c289ad36568a2bf794ac9ec1f259a9dd930c36680dafc8d0cb4de81feb6
SHA51253522ad5e8e2a272d5b1bff9b9226b7d976d47413891c60d7efebd4365baff12b6891e3f79b20e14892ec7c654ad2d437941014290c428c6b1bd78a7b3e557de
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize672B
MD594a8646f9c06206fbb428bb077463c82
SHA1a9522617fba48e3dd970271c851b67a73340542c
SHA256e1f63a8e4d588dd3b1da4d82ac2d5f52facf59d4e03f6869803a09f228e3e6c4
SHA51246a49a80185009bc5948f56ba47295f5b6b8eaa3c14b4d1a6372a309093dc88794e9773d200b74928e7ea3b8d1664b56904260634c548630e3c01398d7b22a8e
-
Filesize
2KB
MD50b93bb9a77df5d1ed764fecb5fe5d70e
SHA168f226244ac62164ae750a3a8f844b46c848db3a
SHA256937eea12e8cc34484b617840db123ad3c072a9faeb1ba038eca654418a0e3a88
SHA5120b093d01aed8ba5019c4fa661e3db29988adb13ab323e14eee48059d814e8324a9119449aae5449ed30d8491f7e4ec84bb864b4c34936e2f3713de80b16c629c
-
Filesize
6KB
MD52a020e11524e0ef40beedd46231f40c8
SHA10ba6300799bf510eeba30b9d758db3392ffe70ef
SHA256f166285d7601f87857d52b02c64b90e48683bd63db91a392b672f0e724bb18a3
SHA512771349da67a44d8790c38d698cb6917767392fd1448198ec1732e2bb3281dec8245d08182f0395f59c9e8a6853feea1e7038640460851d28b2204f75425df58c
-
Filesize
6KB
MD564cf9e0c6746e8a581485cdd31497e72
SHA1ddd8c326d5e83d17485754ecc62f7278582ecc79
SHA2566b5754b467968c6d32ed2a20f80d7f397a0adcad41c587ce3b805d84d220272b
SHA51281d071c120d0c132fd48c60638919597ec9c7e580023d066da2bf2e55bb7aafc2b68ffc57b1fd09f21ae520fd2bc098ad88d62c9ab6a8e4540669866c40c8eaf
-
Filesize
11KB
MD5f967075575119373c528b5449a2f74d9
SHA144a887e62bf8070288eb3af52e198f051aac2d20
SHA256c05ec528adc9322e843483480dd3cfd86b914731a49034020a31ade52be6d1d2
SHA51286eb05de9581585fd55c0b41eb387e7d08b6dcec6995ff2e7ae96d9800aa1b5ff2544015dd9ec70436b57d148be8946af2f7ed9f5e83a53f52f5b2dbd2b4968d