Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
16-04-2024 12:03
Static task
static1
Behavioral task
behavioral1
Sample
f374ef0d7740ae10d06e24e4ec1cbcea_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
f374ef0d7740ae10d06e24e4ec1cbcea_JaffaCakes118.html
Resource
win10v2004-20240412-en
General
-
Target
f374ef0d7740ae10d06e24e4ec1cbcea_JaffaCakes118.html
-
Size
57KB
-
MD5
f374ef0d7740ae10d06e24e4ec1cbcea
-
SHA1
cd0e7b46ba69036b12f941b94cbcc77055bd7195
-
SHA256
da8f4df6b041302609883fbf3afae6f148aeaf5ac9bdd22d3779976eba05e2f5
-
SHA512
e4875c73b2b429fe8409fc6d43948d5b00ee253803dbabd4278385996814dc6496c2cd19ccb67bb44ee4e082ec530f39d582d9bc0db8f5fa522b0ef8236a8ba7
-
SSDEEP
1536:/7CUgbsjcXmNRS7ODCABEwCIYiRMrDO3+:uUcUcXmNRS77ABEwCBiOrDO3+
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 952 msedge.exe 952 msedge.exe 1204 msedge.exe 1204 msedge.exe 3988 identity_helper.exe 3988 identity_helper.exe 764 msedge.exe 764 msedge.exe 764 msedge.exe 764 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe 1204 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1204 wrote to memory of 5100 1204 msedge.exe 86 PID 1204 wrote to memory of 5100 1204 msedge.exe 86 PID 1204 wrote to memory of 1676 1204 msedge.exe 87 PID 1204 wrote to memory of 1676 1204 msedge.exe 87 PID 1204 wrote to memory of 1676 1204 msedge.exe 87 PID 1204 wrote to memory of 1676 1204 msedge.exe 87 PID 1204 wrote to memory of 1676 1204 msedge.exe 87 PID 1204 wrote to memory of 1676 1204 msedge.exe 87 PID 1204 wrote to memory of 1676 1204 msedge.exe 87 PID 1204 wrote to memory of 1676 1204 msedge.exe 87 PID 1204 wrote to memory of 1676 1204 msedge.exe 87 PID 1204 wrote to memory of 1676 1204 msedge.exe 87 PID 1204 wrote to memory of 1676 1204 msedge.exe 87 PID 1204 wrote to memory of 1676 1204 msedge.exe 87 PID 1204 wrote to memory of 1676 1204 msedge.exe 87 PID 1204 wrote to memory of 1676 1204 msedge.exe 87 PID 1204 wrote to memory of 1676 1204 msedge.exe 87 PID 1204 wrote to memory of 1676 1204 msedge.exe 87 PID 1204 wrote to memory of 1676 1204 msedge.exe 87 PID 1204 wrote to memory of 1676 1204 msedge.exe 87 PID 1204 wrote to memory of 1676 1204 msedge.exe 87 PID 1204 wrote to memory of 1676 1204 msedge.exe 87 PID 1204 wrote to memory of 1676 1204 msedge.exe 87 PID 1204 wrote to memory of 1676 1204 msedge.exe 87 PID 1204 wrote to memory of 1676 1204 msedge.exe 87 PID 1204 wrote to memory of 1676 1204 msedge.exe 87 PID 1204 wrote to memory of 1676 1204 msedge.exe 87 PID 1204 wrote to memory of 1676 1204 msedge.exe 87 PID 1204 wrote to memory of 1676 1204 msedge.exe 87 PID 1204 wrote to memory of 1676 1204 msedge.exe 87 PID 1204 wrote to memory of 1676 1204 msedge.exe 87 PID 1204 wrote to memory of 1676 1204 msedge.exe 87 PID 1204 wrote to memory of 1676 1204 msedge.exe 87 PID 1204 wrote to memory of 1676 1204 msedge.exe 87 PID 1204 wrote to memory of 1676 1204 msedge.exe 87 PID 1204 wrote to memory of 1676 1204 msedge.exe 87 PID 1204 wrote to memory of 1676 1204 msedge.exe 87 PID 1204 wrote to memory of 1676 1204 msedge.exe 87 PID 1204 wrote to memory of 1676 1204 msedge.exe 87 PID 1204 wrote to memory of 1676 1204 msedge.exe 87 PID 1204 wrote to memory of 1676 1204 msedge.exe 87 PID 1204 wrote to memory of 1676 1204 msedge.exe 87 PID 1204 wrote to memory of 952 1204 msedge.exe 88 PID 1204 wrote to memory of 952 1204 msedge.exe 88 PID 1204 wrote to memory of 1712 1204 msedge.exe 89 PID 1204 wrote to memory of 1712 1204 msedge.exe 89 PID 1204 wrote to memory of 1712 1204 msedge.exe 89 PID 1204 wrote to memory of 1712 1204 msedge.exe 89 PID 1204 wrote to memory of 1712 1204 msedge.exe 89 PID 1204 wrote to memory of 1712 1204 msedge.exe 89 PID 1204 wrote to memory of 1712 1204 msedge.exe 89 PID 1204 wrote to memory of 1712 1204 msedge.exe 89 PID 1204 wrote to memory of 1712 1204 msedge.exe 89 PID 1204 wrote to memory of 1712 1204 msedge.exe 89 PID 1204 wrote to memory of 1712 1204 msedge.exe 89 PID 1204 wrote to memory of 1712 1204 msedge.exe 89 PID 1204 wrote to memory of 1712 1204 msedge.exe 89 PID 1204 wrote to memory of 1712 1204 msedge.exe 89 PID 1204 wrote to memory of 1712 1204 msedge.exe 89 PID 1204 wrote to memory of 1712 1204 msedge.exe 89 PID 1204 wrote to memory of 1712 1204 msedge.exe 89 PID 1204 wrote to memory of 1712 1204 msedge.exe 89 PID 1204 wrote to memory of 1712 1204 msedge.exe 89 PID 1204 wrote to memory of 1712 1204 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\f374ef0d7740ae10d06e24e4ec1cbcea_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8126946f8,0x7ff812694708,0x7ff8126947182⤵PID:5100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2284,18304650117703521148,16810904590163820775,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2296 /prefetch:22⤵PID:1676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2284,18304650117703521148,16810904590163820775,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2348 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2284,18304650117703521148,16810904590163820775,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2744 /prefetch:82⤵PID:1712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2284,18304650117703521148,16810904590163820775,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:4348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2284,18304650117703521148,16810904590163820775,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:3948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2284,18304650117703521148,16810904590163820775,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4996 /prefetch:12⤵PID:4796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2284,18304650117703521148,16810904590163820775,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5860 /prefetch:82⤵PID:5008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2284,18304650117703521148,16810904590163820775,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5860 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2284,18304650117703521148,16810904590163820775,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5420 /prefetch:12⤵PID:2348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2284,18304650117703521148,16810904590163820775,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5348 /prefetch:12⤵PID:4868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2284,18304650117703521148,16810904590163820775,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4164 /prefetch:12⤵PID:2296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2284,18304650117703521148,16810904590163820775,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4996 /prefetch:12⤵PID:2852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2284,18304650117703521148,16810904590163820775,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2236 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:764
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4136
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4804
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD55e2f0fe48e7ee1aad1c24db5c01c354a
SHA15bfeb862e107dd290d87385dc9369bd7a1006b36
SHA256f13b3ebe8d71bd0086d5bb82364c35f59a95d32b39753af251e8639360e291a9
SHA512140d026437fd5e8a874cd00b03950c8f010e1a0732a0a1cc5bdde477e7f8315ccb95790bb4c15b8dbaab9468ad532eb885b6c429300a64e39412d976d079324e
-
Filesize
152B
MD57e0880992c640aca08737893588a0010
SHA16ceec5cb125a52751de8aeda4bab7112f68ae0fe
SHA2568649a39877c190ec740a5422284ec5f9ff509b30b2d7896635476873dd8824e2
SHA51252bd0a38ca7f43b26731966035045b1cbd8b60b2d81bdf9aad791cf444da8af8b722ebf3cb364a6e660bebdf23084eb0e30bc23562575b704801669817549f8a
-
Filesize
20KB
MD51dac6f455c0c8e812b43bcbecc7e2096
SHA173044b19b864d1bbb2e2b729f1e40284607fec2d
SHA256f514415dc65f46ac46688541931f2745fa92290f883a4f5ba2c4ad46b2089533
SHA5122b3e40b6fcca3c5eb82b9200626a932099c85f1eb56f0ac11f562340ca0f0153f73866847bdfb84adb8896b2480ef03add4c6faf3b0c250fdfb2171eb9759e45
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD5b92e98e9317186e130c6244247c1e925
SHA1fd320d4f6d1ff3d4cd8188d4f6fc4fd2652373c9
SHA2566f9ce198db3d79c008909bd78f9033f8801521950be50c875b84064044ea8423
SHA5120cc830708f07220af927808999048184132a899cc17b7dbc60d9832090e354f7feff19eabdc876ad5a36cef06cf8c04220f243a8a8e7032798df96b74a9ed211
-
Filesize
817B
MD5ed5fbdf3471d4472ca8af4367529d31a
SHA12f7c96d00e697f816f4ca9dd5e213b77d2fd959a
SHA256d37748dd310f785baff71cc1a88bfaf6ab641e898504c4f4f8b6180d749bd27c
SHA5127330502cdbf3a22ed3d314a93c04df356b569fc1d7f3a6c8b152647cb703cdda00c24fbaea5fd3b056b45d03faa9cd7963cf48d29ac90f30eaf23490f08d0179
-
Filesize
6KB
MD5b5596976492e88131116049c84e790e0
SHA166e0b93b7dbe713762aa24aaf077e6a488348dfa
SHA256810cb8e6f7c6e11b8022f4faf9e925f24cc9e78076636209b121cc903b51db91
SHA512b71f7e48000e97bf9e64a276b24590a126481cd5b9a16ffb9a00e48e3d977968e822ea5459f1f8fc4f8548b84293c39b4bc254c4c4a24389e2c082c63126daa6
-
Filesize
6KB
MD5c7312ee382b6b690ec4c6162951e86c3
SHA11b56ad2993da1e63311a600c276bb5bc991d8e4d
SHA2561903256810913c1cda9f57c7d60944fb0ed5cc28dc987531e9f17c456dab9d13
SHA5126586dd4092a4757bc5eb9ab24475e35e0a4bcaeb2aabd122861d6810f9e35359ab330c3af6869ec503c49411c99798cb0f89d05b615180c0b3a956bb0a7d36f5
-
Filesize
6KB
MD5ef7755e1ce33871ee2fb3455544daf9d
SHA17b3393e87de6a963a89fe68d8ee6e2c9108c9e65
SHA25630ffdf6033ce7e344a5a5aa2d3e0df39e198a729ee8139a703c735c25154077e
SHA512d0786ee6ab4d3fee247e7a61362c9ff56ce9b22b18d828fe721c4d74594cfe140bfb91d2748f78e3bad2c3beaffd0612012430890b5d3e37264c563782105caa
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD5870059af29b1f7ad3ef41cef92f00ecc
SHA1c719137fa2e586df5c623bfc93ac8dabb2ccf9b9
SHA256add9186eb9feaa6f3ef905b3d572487f33e0c90378c10fc07ff66fab082b3052
SHA512a9e9106e64a52216d7dfef10674265b7f8712cdfd163f7b14d77f8b1bf87c0762b4063138437d36bffd979830f005d3b2a8a2237e52df30b6ed0bb78f3b95121