Analysis
-
max time kernel
145s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
16-04-2024 14:15
Static task
static1
Behavioral task
behavioral1
Sample
f3a9af879bd635eea369ab8755b68e5f_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
f3a9af879bd635eea369ab8755b68e5f_JaffaCakes118.html
Resource
win10v2004-20240412-en
General
-
Target
f3a9af879bd635eea369ab8755b68e5f_JaffaCakes118.html
-
Size
430B
-
MD5
f3a9af879bd635eea369ab8755b68e5f
-
SHA1
b957ee006e8ab3da2f19749c5c9a639c7c4632c8
-
SHA256
fd49704719c793191596211cc8a12097d9d0d80f5360a9969aea03c31cd793b1
-
SHA512
4c2a0c27702f2d789467a7f4be54d0621ce339f3147669e7f8e375a35b13ecbe6d9a18912232c61c90b76f04a8d04c64f9ed9d044eade7917660da2642cd1a48
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4424 msedge.exe 4424 msedge.exe 644 msedge.exe 644 msedge.exe 4980 identity_helper.exe 4980 identity_helper.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe 1684 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe 644 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 644 wrote to memory of 3148 644 msedge.exe 85 PID 644 wrote to memory of 3148 644 msedge.exe 85 PID 644 wrote to memory of 2208 644 msedge.exe 86 PID 644 wrote to memory of 2208 644 msedge.exe 86 PID 644 wrote to memory of 2208 644 msedge.exe 86 PID 644 wrote to memory of 2208 644 msedge.exe 86 PID 644 wrote to memory of 2208 644 msedge.exe 86 PID 644 wrote to memory of 2208 644 msedge.exe 86 PID 644 wrote to memory of 2208 644 msedge.exe 86 PID 644 wrote to memory of 2208 644 msedge.exe 86 PID 644 wrote to memory of 2208 644 msedge.exe 86 PID 644 wrote to memory of 2208 644 msedge.exe 86 PID 644 wrote to memory of 2208 644 msedge.exe 86 PID 644 wrote to memory of 2208 644 msedge.exe 86 PID 644 wrote to memory of 2208 644 msedge.exe 86 PID 644 wrote to memory of 2208 644 msedge.exe 86 PID 644 wrote to memory of 2208 644 msedge.exe 86 PID 644 wrote to memory of 2208 644 msedge.exe 86 PID 644 wrote to memory of 2208 644 msedge.exe 86 PID 644 wrote to memory of 2208 644 msedge.exe 86 PID 644 wrote to memory of 2208 644 msedge.exe 86 PID 644 wrote to memory of 2208 644 msedge.exe 86 PID 644 wrote to memory of 2208 644 msedge.exe 86 PID 644 wrote to memory of 2208 644 msedge.exe 86 PID 644 wrote to memory of 2208 644 msedge.exe 86 PID 644 wrote to memory of 2208 644 msedge.exe 86 PID 644 wrote to memory of 2208 644 msedge.exe 86 PID 644 wrote to memory of 2208 644 msedge.exe 86 PID 644 wrote to memory of 2208 644 msedge.exe 86 PID 644 wrote to memory of 2208 644 msedge.exe 86 PID 644 wrote to memory of 2208 644 msedge.exe 86 PID 644 wrote to memory of 2208 644 msedge.exe 86 PID 644 wrote to memory of 2208 644 msedge.exe 86 PID 644 wrote to memory of 2208 644 msedge.exe 86 PID 644 wrote to memory of 2208 644 msedge.exe 86 PID 644 wrote to memory of 2208 644 msedge.exe 86 PID 644 wrote to memory of 2208 644 msedge.exe 86 PID 644 wrote to memory of 2208 644 msedge.exe 86 PID 644 wrote to memory of 2208 644 msedge.exe 86 PID 644 wrote to memory of 2208 644 msedge.exe 86 PID 644 wrote to memory of 2208 644 msedge.exe 86 PID 644 wrote to memory of 2208 644 msedge.exe 86 PID 644 wrote to memory of 4424 644 msedge.exe 87 PID 644 wrote to memory of 4424 644 msedge.exe 87 PID 644 wrote to memory of 5068 644 msedge.exe 88 PID 644 wrote to memory of 5068 644 msedge.exe 88 PID 644 wrote to memory of 5068 644 msedge.exe 88 PID 644 wrote to memory of 5068 644 msedge.exe 88 PID 644 wrote to memory of 5068 644 msedge.exe 88 PID 644 wrote to memory of 5068 644 msedge.exe 88 PID 644 wrote to memory of 5068 644 msedge.exe 88 PID 644 wrote to memory of 5068 644 msedge.exe 88 PID 644 wrote to memory of 5068 644 msedge.exe 88 PID 644 wrote to memory of 5068 644 msedge.exe 88 PID 644 wrote to memory of 5068 644 msedge.exe 88 PID 644 wrote to memory of 5068 644 msedge.exe 88 PID 644 wrote to memory of 5068 644 msedge.exe 88 PID 644 wrote to memory of 5068 644 msedge.exe 88 PID 644 wrote to memory of 5068 644 msedge.exe 88 PID 644 wrote to memory of 5068 644 msedge.exe 88 PID 644 wrote to memory of 5068 644 msedge.exe 88 PID 644 wrote to memory of 5068 644 msedge.exe 88 PID 644 wrote to memory of 5068 644 msedge.exe 88 PID 644 wrote to memory of 5068 644 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\f3a9af879bd635eea369ab8755b68e5f_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:644 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe2b9c46f8,0x7ffe2b9c4708,0x7ffe2b9c47182⤵PID:3148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2296,11549055772902164341,1487989132203708007,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2304 /prefetch:22⤵PID:2208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2296,11549055772902164341,1487989132203708007,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2356 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2296,11549055772902164341,1487989132203708007,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2568 /prefetch:82⤵PID:5068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2296,11549055772902164341,1487989132203708007,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:4272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2296,11549055772902164341,1487989132203708007,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:3432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2296,11549055772902164341,1487989132203708007,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4628 /prefetch:12⤵PID:2472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2296,11549055772902164341,1487989132203708007,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4844 /prefetch:12⤵PID:3140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2296,11549055772902164341,1487989132203708007,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5328 /prefetch:12⤵PID:1716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2296,11549055772902164341,1487989132203708007,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5744 /prefetch:82⤵PID:2204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2296,11549055772902164341,1487989132203708007,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5744 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2296,11549055772902164341,1487989132203708007,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5896 /prefetch:12⤵PID:2064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2296,11549055772902164341,1487989132203708007,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5912 /prefetch:12⤵PID:452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2296,11549055772902164341,1487989132203708007,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5500 /prefetch:12⤵PID:1128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2296,11549055772902164341,1487989132203708007,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5480 /prefetch:12⤵PID:1380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2296,11549055772902164341,1487989132203708007,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4660 /prefetch:12⤵PID:2372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2296,11549055772902164341,1487989132203708007,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3872 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1684
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2444
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1000
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e36b219dcae7d32ec82cec3245512f80
SHA16b2bd46e4f6628d66f7ec4b5c399b8c9115a9466
SHA25616bc6f47bbfbd4e54c3163dafe784486b72d0b78e6ea3593122edb338448a27b
SHA512fc539c461d87141a180cf71bb6a636c75517e5e7226e76b71fd64e834dcacc88fcaaa92a9a00999bc0afc4fb93b7304b068000f14653c05ff03dd7baef3f225c
-
Filesize
152B
MD5559ff144c30d6a7102ec298fb7c261c4
SHA1badecb08f9a6c849ce5b30c348156b45ac9120b9
SHA2565444032cb994b90287c0262f2fba16f38e339073fd89aa3ab2592dfebc3e6f10
SHA5123a45661fc29e312aa643a12447bffdab83128fe5124077a870090081af6aaa4cf0bd021889ab1df5cd40f44adb055b1394b31313515c2929f714824c89fd0f04
-
Filesize
360B
MD56e1943f5a783b2412c667b828592af5c
SHA1983becf61c44577a68cbc6f75993f411a46884d7
SHA256934af73b3ef7ca400e625fbd37cdbe89439c25a5fd7349c206a82b99f3d61969
SHA512e397286603cce28ee158163246d9a788ba47c4fe340e5825f9b4b0fd7154f77663f6235bbe5e8adf18a4e1a576260186b4e29b4223c6a7f82e801fbc74351175
-
Filesize
6KB
MD506740ef97fa6793410663ed3a2ed88cd
SHA1716a25b884b32dea9760f111f92384fa88acffd7
SHA256b0746a2619560561f79b41ea4f4a113073279d96109f4d784ddd870cf7968e48
SHA512ce1e3d7ff7e02867de27fce40a459a3ea3379b1f71cd2ce4a79b07c3d73ea43436b2aa2d1df1fe91788407590377c3b1442fab2c4abd38e3a8dc22150c6ac60f
-
Filesize
7KB
MD5b9424c4af0f788a93e59478a4e96b623
SHA196b60a55da5256f3023a9c83092485763e852f07
SHA2566b6e14c611d8cabcb959eda58ab80fcbf3c1f584966cf36465e16b2c3b1a9c8e
SHA5123dbfd9b1bb83515ad1bc29484d1e2b427a4c5bad92246a9fed1516d825c19a27b24f80432f3cb4ee321a27d9a05222f971069efc49245868830b102e890eb818
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD5882a2a08063dc20f0b1ede2d6152899c
SHA1493a2c5637591ed106ef85fa56acd5b6faaa01a6
SHA256e18ea5759488b92eed80e29d7fc57f32d75e76309440af01e0f08e698c284a01
SHA5121683fbdb6618e8258fdd0beea92f441148b8d16e89f267994da81d24aafd5e72dd7fb6ed9aa0485d1a9750749d7239efd46c9d5c205702c68ceb59c16ed7cdb4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe578405.TMP
Filesize48B
MD582304929f99d4f6e83cd12a6ff4f60d3
SHA1488439e3d635bd374d6620ca872de0d2984accd0
SHA2566c629482cb5c336fd4e3f60a5530e07e8260d66718d920156829f27aa5433cea
SHA51267a438d6a1f4e6719b4aa941a114d9fff537aac5b2b155e3efe7442f2925a4e2f69933ca5d4e8f927760f1c227ff4eecaa121b6e74714a2604e29170a4d4ac16
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5105a646a49bf7206e02150e196a600ab
SHA15e3f0968057be4e34a3d2d7222243fa190509e0f
SHA256769180d7d5df65b92f6146c60dfd122d8d26a801fc2cadb76716a8471aae77bb
SHA51240c43303f80a09605d151c710d49c695e65ee4ab65de28adfb327b50a9297241029293e7a2ed0acfebc7c68ad3f7dd373532ef455d093319f84590b4a83acf29
-
Filesize
11KB
MD587bf0adfdc1721f423472df3f220f846
SHA122c9c09ea63163960da15c7d7113ed1e378710f6
SHA2569749ecb9570e23a9fa32b4c50902a095d36ff4284a51f1f036e2722819357d3f
SHA512df463d110ffd25bdce70bf577a36ae431814e0096a6fe5a186858175ba3a7915a1bc87e9a39892a049e5c4924426e39e6eb6211fb80d0ea6495e83e4aa0b2346