Analysis
-
max time kernel
148s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
16-04-2024 03:02
Static task
static1
Behavioral task
behavioral1
Sample
f289c95546d21492b694c95870ea8b6c_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f289c95546d21492b694c95870ea8b6c_JaffaCakes118.html
Resource
win10v2004-20240412-en
General
-
Target
f289c95546d21492b694c95870ea8b6c_JaffaCakes118.html
-
Size
69KB
-
MD5
f289c95546d21492b694c95870ea8b6c
-
SHA1
909a0789442b98c8766e5a0b54001b34837db625
-
SHA256
e29a33242588ab40119af06287d9717ba70de03dd954e575527d8d62fa9780f4
-
SHA512
90ce9c4a7ad90f4fae956cb5ce9ae139e5013e489b7d5f14481b12e6b68c407602839f7aea4ecc43b1957dc984a1f7279c591ebe89da168af387053c17419883
-
SSDEEP
1536:gQZBCCOdH0IxCbkA3NJkEusW+hUStjFMkrSMJY9KZZMhWf5Fqeh4V0I/vmlY/8Dh:gk2p0IxU3NJkEPW+hUStjFMkrSMJY9Kf
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4736 msedge.exe 4736 msedge.exe 672 msedge.exe 672 msedge.exe 3896 identity_helper.exe 3896 identity_helper.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 672 msedge.exe 672 msedge.exe 672 msedge.exe 672 msedge.exe 672 msedge.exe 672 msedge.exe 672 msedge.exe 672 msedge.exe 672 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 672 msedge.exe 672 msedge.exe 672 msedge.exe 672 msedge.exe 672 msedge.exe 672 msedge.exe 672 msedge.exe 672 msedge.exe 672 msedge.exe 672 msedge.exe 672 msedge.exe 672 msedge.exe 672 msedge.exe 672 msedge.exe 672 msedge.exe 672 msedge.exe 672 msedge.exe 672 msedge.exe 672 msedge.exe 672 msedge.exe 672 msedge.exe 672 msedge.exe 672 msedge.exe 672 msedge.exe 672 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 672 msedge.exe 672 msedge.exe 672 msedge.exe 672 msedge.exe 672 msedge.exe 672 msedge.exe 672 msedge.exe 672 msedge.exe 672 msedge.exe 672 msedge.exe 672 msedge.exe 672 msedge.exe 672 msedge.exe 672 msedge.exe 672 msedge.exe 672 msedge.exe 672 msedge.exe 672 msedge.exe 672 msedge.exe 672 msedge.exe 672 msedge.exe 672 msedge.exe 672 msedge.exe 672 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 672 wrote to memory of 3544 672 msedge.exe 86 PID 672 wrote to memory of 3544 672 msedge.exe 86 PID 672 wrote to memory of 3744 672 msedge.exe 87 PID 672 wrote to memory of 3744 672 msedge.exe 87 PID 672 wrote to memory of 3744 672 msedge.exe 87 PID 672 wrote to memory of 3744 672 msedge.exe 87 PID 672 wrote to memory of 3744 672 msedge.exe 87 PID 672 wrote to memory of 3744 672 msedge.exe 87 PID 672 wrote to memory of 3744 672 msedge.exe 87 PID 672 wrote to memory of 3744 672 msedge.exe 87 PID 672 wrote to memory of 3744 672 msedge.exe 87 PID 672 wrote to memory of 3744 672 msedge.exe 87 PID 672 wrote to memory of 3744 672 msedge.exe 87 PID 672 wrote to memory of 3744 672 msedge.exe 87 PID 672 wrote to memory of 3744 672 msedge.exe 87 PID 672 wrote to memory of 3744 672 msedge.exe 87 PID 672 wrote to memory of 3744 672 msedge.exe 87 PID 672 wrote to memory of 3744 672 msedge.exe 87 PID 672 wrote to memory of 3744 672 msedge.exe 87 PID 672 wrote to memory of 3744 672 msedge.exe 87 PID 672 wrote to memory of 3744 672 msedge.exe 87 PID 672 wrote to memory of 3744 672 msedge.exe 87 PID 672 wrote to memory of 3744 672 msedge.exe 87 PID 672 wrote to memory of 3744 672 msedge.exe 87 PID 672 wrote to memory of 3744 672 msedge.exe 87 PID 672 wrote to memory of 3744 672 msedge.exe 87 PID 672 wrote to memory of 3744 672 msedge.exe 87 PID 672 wrote to memory of 3744 672 msedge.exe 87 PID 672 wrote to memory of 3744 672 msedge.exe 87 PID 672 wrote to memory of 3744 672 msedge.exe 87 PID 672 wrote to memory of 3744 672 msedge.exe 87 PID 672 wrote to memory of 3744 672 msedge.exe 87 PID 672 wrote to memory of 3744 672 msedge.exe 87 PID 672 wrote to memory of 3744 672 msedge.exe 87 PID 672 wrote to memory of 3744 672 msedge.exe 87 PID 672 wrote to memory of 3744 672 msedge.exe 87 PID 672 wrote to memory of 3744 672 msedge.exe 87 PID 672 wrote to memory of 3744 672 msedge.exe 87 PID 672 wrote to memory of 3744 672 msedge.exe 87 PID 672 wrote to memory of 3744 672 msedge.exe 87 PID 672 wrote to memory of 3744 672 msedge.exe 87 PID 672 wrote to memory of 3744 672 msedge.exe 87 PID 672 wrote to memory of 4736 672 msedge.exe 88 PID 672 wrote to memory of 4736 672 msedge.exe 88 PID 672 wrote to memory of 4028 672 msedge.exe 89 PID 672 wrote to memory of 4028 672 msedge.exe 89 PID 672 wrote to memory of 4028 672 msedge.exe 89 PID 672 wrote to memory of 4028 672 msedge.exe 89 PID 672 wrote to memory of 4028 672 msedge.exe 89 PID 672 wrote to memory of 4028 672 msedge.exe 89 PID 672 wrote to memory of 4028 672 msedge.exe 89 PID 672 wrote to memory of 4028 672 msedge.exe 89 PID 672 wrote to memory of 4028 672 msedge.exe 89 PID 672 wrote to memory of 4028 672 msedge.exe 89 PID 672 wrote to memory of 4028 672 msedge.exe 89 PID 672 wrote to memory of 4028 672 msedge.exe 89 PID 672 wrote to memory of 4028 672 msedge.exe 89 PID 672 wrote to memory of 4028 672 msedge.exe 89 PID 672 wrote to memory of 4028 672 msedge.exe 89 PID 672 wrote to memory of 4028 672 msedge.exe 89 PID 672 wrote to memory of 4028 672 msedge.exe 89 PID 672 wrote to memory of 4028 672 msedge.exe 89 PID 672 wrote to memory of 4028 672 msedge.exe 89 PID 672 wrote to memory of 4028 672 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\f289c95546d21492b694c95870ea8b6c_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:672 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffac73846f8,0x7ffac7384708,0x7ffac73847182⤵PID:3544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,17128306788937577573,8074250836972353461,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2060 /prefetch:22⤵PID:3744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,17128306788937577573,8074250836972353461,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2176 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,17128306788937577573,8074250836972353461,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2660 /prefetch:82⤵PID:4028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,17128306788937577573,8074250836972353461,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3168 /prefetch:12⤵PID:1200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,17128306788937577573,8074250836972353461,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3180 /prefetch:12⤵PID:4884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,17128306788937577573,8074250836972353461,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3904 /prefetch:12⤵PID:4236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,17128306788937577573,8074250836972353461,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5132 /prefetch:12⤵PID:1504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,17128306788937577573,8074250836972353461,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4944 /prefetch:12⤵PID:2532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,17128306788937577573,8074250836972353461,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6360 /prefetch:82⤵PID:224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,17128306788937577573,8074250836972353461,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6360 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,17128306788937577573,8074250836972353461,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4968 /prefetch:12⤵PID:2340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,17128306788937577573,8074250836972353461,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5372 /prefetch:12⤵PID:1304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,17128306788937577573,8074250836972353461,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4084 /prefetch:12⤵PID:4308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,17128306788937577573,8074250836972353461,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5644 /prefetch:12⤵PID:828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,17128306788937577573,8074250836972353461,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4988 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3868
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3452
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1272
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5120a75f233314ba1fe34e9d6c09f30b9
SHA1a9f92f2d3f111eaadd9bcf8fceb3c9553753539c
SHA256e04101215c3534dbc77c0b5df2e1d1ff74c277d2946f391f939c9a7948a22dd0
SHA5123c4eb93e425b50e8bcc1712f4cc2be11888a0273c3a619fc6bf72ccab876a427158f661bfc80d0c1e47ef4116febf76a3aaa31a60ec662eae0e51c7f1d3d89b3
-
Filesize
152B
MD5bc2edd0741d97ae237e9f00bf3244144
SHA17c1e5d324f5c7137a3c4ec85146659f026c11782
SHA256dbce3287c7ae69ccbd1d780c39f3ffa3c98bd4609a939fff8ee9c99f14265041
SHA51200f505a0b4ea0df626175bf9d39a205f18f9754b62e4dba6fbb5b4a716b3539e7809723e1596bcfe1ba3041e22342e3a9cbaad88e84ce9c8c6531331bbc25093
-
Filesize
198KB
MD5319e0c36436ee0bf24476acbcc83565c
SHA1fb2658d5791fe5b37424119557ab8cee30acdc54
SHA256f6562ea52e056b979d6f52932ae57b7afb04486b10b0ebde22c5b51f502c69d1
SHA512ad902b9a010cf99bdedba405cad0387890a9ff90a9c91f6a3220cdceec1b08ecb97a326aef01b28d8d0aacb5f2a16f02f673e196bdb69fc68b3f636139059902
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize504B
MD5e2c7f17f34e572a99d5a92b39f19126b
SHA1530336a40905329e3796dd7d261782e5a9ad5c1f
SHA25657410d063d52c844d53aa3aaeab56d22c3abb9a4e8126c74a20738ca58e95bf0
SHA5126ae9b8b528f1e97f86c327961d14ed1abe505b3a7c3c2c8b58e39ed2d5c90ccaf9f497368ea5201d05574936e07c03446a4685273361358844135c13fe36882e
-
Filesize
1KB
MD5a716925381b351f034d208d8dfdb6c75
SHA1b68b0dbd9370c0fa20ac678d4a023784a3f304f7
SHA256d39f55c5f09f5ed59b163ffbae5591344a693f7a45a1f2d2e8952be0ec5fa547
SHA512488def49c377b8d75927ffd4004d38dd123ae35aee4a133b5692c2297010c6c32b3784b1ad58a42b6339f4c02132735e988ba325bbcf84211e014714ef569069
-
Filesize
6KB
MD545705895eb56aabbaa4ec1e06b4914f5
SHA13e2b38d4a4195e7ce4cd2b7f180e3d6c07d21eb4
SHA2568fc429b8b77be1ee883d330cd199f1db78f0928922df29638e03f94aa2da58bd
SHA512fbe58095c24abc317c0b6ae73f6e707e476f01a1030c5ba2d0cccb6fd47d63855d45e6f13466140f3c9e6e49729a975b2babed81a5c02357abe53eef35520fff
-
Filesize
6KB
MD52faec32b199435b7f983c2989f633596
SHA1d796b294a14e4fc4b1564ced3d13ce1fab384d1e
SHA25666e1d1b8fc63bd935773c8b190386c6b1c33709ca9c32e2f4adcd611c7bd250b
SHA512975a240601014c5d191ff7cafb38e8e216452d17e4a102955fd37e93ce4278b02e9435e090826478dbe651eaa8ab43eac2dbb71b7342c0395aa7372ba9bdde1e
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD566e43e69ed1a9f9b97f98efc419c2b29
SHA16733172c8b49f83744fb8bf62f26912192e256cc
SHA256133418402e869b079f9d996ece69b5b6728a347ffc0e957b0789bff53930a102
SHA512c02aec8aa79ec863013212f0822da72504b79b6db67bce2997f2d651b53ef8543f511ce32811fad73f565068ba48b3a99144a314a7f06ac46c16d5f6e95d3601