Analysis
-
max time kernel
146s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
16/04/2024, 15:18
Static task
static1
Behavioral task
behavioral1
Sample
f3c2ccc8c33a25a09dc42375843d926e_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
f3c2ccc8c33a25a09dc42375843d926e_JaffaCakes118.html
Resource
win10v2004-20240412-en
General
-
Target
f3c2ccc8c33a25a09dc42375843d926e_JaffaCakes118.html
-
Size
179KB
-
MD5
f3c2ccc8c33a25a09dc42375843d926e
-
SHA1
c6b361f84e8b7594d86a90e988c74cecba1aa527
-
SHA256
68bec08c92f049fae0a3f6ad3accb2a3feccc4e69d668bff2dd06de2eff3570f
-
SHA512
6e68220c4c5b25c3b2ac162039426056d55579038cfb1d3d6fedd24b3821c16f91039cd63a8326e463978bb0fb0363a12452e08aadf39f6e4dfccbab9349d021
-
SSDEEP
3072:LxDNvG8rm/GXmNJUNBVTXQUe+EJf6LIBD6cbbb/tY2FQngw1Z4R+:DVXmNJX2
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2328 msedge.exe 2328 msedge.exe 4000 msedge.exe 4000 msedge.exe 3228 msedge.exe 3228 msedge.exe 3228 msedge.exe 3228 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4000 wrote to memory of 2232 4000 msedge.exe 85 PID 4000 wrote to memory of 2232 4000 msedge.exe 85 PID 4000 wrote to memory of 1488 4000 msedge.exe 86 PID 4000 wrote to memory of 1488 4000 msedge.exe 86 PID 4000 wrote to memory of 1488 4000 msedge.exe 86 PID 4000 wrote to memory of 1488 4000 msedge.exe 86 PID 4000 wrote to memory of 1488 4000 msedge.exe 86 PID 4000 wrote to memory of 1488 4000 msedge.exe 86 PID 4000 wrote to memory of 1488 4000 msedge.exe 86 PID 4000 wrote to memory of 1488 4000 msedge.exe 86 PID 4000 wrote to memory of 1488 4000 msedge.exe 86 PID 4000 wrote to memory of 1488 4000 msedge.exe 86 PID 4000 wrote to memory of 1488 4000 msedge.exe 86 PID 4000 wrote to memory of 1488 4000 msedge.exe 86 PID 4000 wrote to memory of 1488 4000 msedge.exe 86 PID 4000 wrote to memory of 1488 4000 msedge.exe 86 PID 4000 wrote to memory of 1488 4000 msedge.exe 86 PID 4000 wrote to memory of 1488 4000 msedge.exe 86 PID 4000 wrote to memory of 1488 4000 msedge.exe 86 PID 4000 wrote to memory of 1488 4000 msedge.exe 86 PID 4000 wrote to memory of 1488 4000 msedge.exe 86 PID 4000 wrote to memory of 1488 4000 msedge.exe 86 PID 4000 wrote to memory of 1488 4000 msedge.exe 86 PID 4000 wrote to memory of 1488 4000 msedge.exe 86 PID 4000 wrote to memory of 1488 4000 msedge.exe 86 PID 4000 wrote to memory of 1488 4000 msedge.exe 86 PID 4000 wrote to memory of 1488 4000 msedge.exe 86 PID 4000 wrote to memory of 1488 4000 msedge.exe 86 PID 4000 wrote to memory of 1488 4000 msedge.exe 86 PID 4000 wrote to memory of 1488 4000 msedge.exe 86 PID 4000 wrote to memory of 1488 4000 msedge.exe 86 PID 4000 wrote to memory of 1488 4000 msedge.exe 86 PID 4000 wrote to memory of 1488 4000 msedge.exe 86 PID 4000 wrote to memory of 1488 4000 msedge.exe 86 PID 4000 wrote to memory of 1488 4000 msedge.exe 86 PID 4000 wrote to memory of 1488 4000 msedge.exe 86 PID 4000 wrote to memory of 1488 4000 msedge.exe 86 PID 4000 wrote to memory of 1488 4000 msedge.exe 86 PID 4000 wrote to memory of 1488 4000 msedge.exe 86 PID 4000 wrote to memory of 1488 4000 msedge.exe 86 PID 4000 wrote to memory of 1488 4000 msedge.exe 86 PID 4000 wrote to memory of 1488 4000 msedge.exe 86 PID 4000 wrote to memory of 2328 4000 msedge.exe 87 PID 4000 wrote to memory of 2328 4000 msedge.exe 87 PID 4000 wrote to memory of 3844 4000 msedge.exe 88 PID 4000 wrote to memory of 3844 4000 msedge.exe 88 PID 4000 wrote to memory of 3844 4000 msedge.exe 88 PID 4000 wrote to memory of 3844 4000 msedge.exe 88 PID 4000 wrote to memory of 3844 4000 msedge.exe 88 PID 4000 wrote to memory of 3844 4000 msedge.exe 88 PID 4000 wrote to memory of 3844 4000 msedge.exe 88 PID 4000 wrote to memory of 3844 4000 msedge.exe 88 PID 4000 wrote to memory of 3844 4000 msedge.exe 88 PID 4000 wrote to memory of 3844 4000 msedge.exe 88 PID 4000 wrote to memory of 3844 4000 msedge.exe 88 PID 4000 wrote to memory of 3844 4000 msedge.exe 88 PID 4000 wrote to memory of 3844 4000 msedge.exe 88 PID 4000 wrote to memory of 3844 4000 msedge.exe 88 PID 4000 wrote to memory of 3844 4000 msedge.exe 88 PID 4000 wrote to memory of 3844 4000 msedge.exe 88 PID 4000 wrote to memory of 3844 4000 msedge.exe 88 PID 4000 wrote to memory of 3844 4000 msedge.exe 88 PID 4000 wrote to memory of 3844 4000 msedge.exe 88 PID 4000 wrote to memory of 3844 4000 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\f3c2ccc8c33a25a09dc42375843d926e_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4000 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8dba546f8,0x7ff8dba54708,0x7ff8dba547182⤵PID:2232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1776,1184499823517310961,17510469301478110661,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2012 /prefetch:22⤵PID:1488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1776,1184499823517310961,17510469301478110661,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2428 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1776,1184499823517310961,17510469301478110661,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2772 /prefetch:82⤵PID:3844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1776,1184499823517310961,17510469301478110661,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:2156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1776,1184499823517310961,17510469301478110661,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:4964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1776,1184499823517310961,17510469301478110661,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4520 /prefetch:12⤵PID:3096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1776,1184499823517310961,17510469301478110661,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4944 /prefetch:12⤵PID:2896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1776,1184499823517310961,17510469301478110661,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5264 /prefetch:12⤵PID:3288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1776,1184499823517310961,17510469301478110661,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4636 /prefetch:12⤵PID:4928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1776,1184499823517310961,17510469301478110661,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5388 /prefetch:12⤵PID:3088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1776,1184499823517310961,17510469301478110661,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3228
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5116
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2140
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e2ece0fcb9f6256efba522462a9a9288
SHA1ccc599f64d30e15833b45c7e52924d4bd2f54acb
SHA2560eff6f3011208a312a1010db0620bb6680fe49d4fa3344930302e950b74ad005
SHA512ead68dd972cfb1eccc194572279ae3e4ac989546bfb9e8d511c6bc178fc12aaebd20b49860d2b70ac1f5d4236b0df1b484a979b926edbe23f281b8139ff1a9ac
-
Filesize
152B
MD5864aa9768ef47143c455b31fd314d660
SHA109d879e0e77698f28b435ed0e7d8e166e28fafa2
SHA2563118d55d1f04ecdd849971d8c49896b5c874bdbea63e5288547b9812c0640e10
SHA51275dce411fce8166c8905ed8da910adb1dd08ab1c9d7cd5431ef905531f2f0374caf73dedd5d238b457ece61273f6c81e632d23eb8409efbb6bf0d01442008488
-
Filesize
20KB
MD50c537a82da568b1528a5b4c5db95f169
SHA1cbce4bdcd79433b66466b9fe3c0fec730b1a5bb4
SHA25673279553e1043b5a1f12766aadf552ffdaeb0a22bff842e68a299dbb7af01ec8
SHA51276ed9ad0826f246c6a3b1b00215625e38437d477e1df4c57c2a56071a4c2d80465a62062b44e33de2ba58f90e664f0c9bdedc2b274ab54706209b812c0d95485
-
Filesize
44KB
MD557ae46a87a9955c7c61ce5cfebde0bf6
SHA12a9297a0e2ee5f4e0a9b1de88ffd2121d5d2ca77
SHA256891dc8b9999ba1b2d25c1a044b49330b66b86f986478282f4e5950b726e9878f
SHA51234e51215e347df35ae4cf8420e2148420780f78123a37450682ed92841c6e1dd1635317cae1ef925a001bda733228db0f5de87faa0a10c36cb967e9b70691689
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize456B
MD5e2fb037d8c9903d34fdfa56ef601c3de
SHA1e1638d9a4d2d0d504f029b14b3472094e4add41e
SHA2561e15df6a8dc3f0779c4792916c803343bb2efd384d91febcb9b1ac20004a033d
SHA5125c2b6de0d09b2d3453c7d046a059b3920261a5bd3f13a3c1abf132faaa23def1786e1fd252283b24cc48f53d35b6472c18709f0996b76349fb8a757aef29ae50
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize432B
MD5517007373d9e684af3e1ab24458ed3a6
SHA1b4c27502936d162d523810118b0207f916e547d9
SHA25638514d097f83980b2e1ada59e14e9f24cf9bcb73a6b9ff77b8a290f2b47cc83b
SHA512406d27d729817be9f178881ca8d75949764701e93dc5d024d61b72fc1331af72a4db696322b65281efc9071784af567acb2bb0336092123d78452c7b979b5dad
-
Filesize
3KB
MD560349c8afa6abcfe1b66969254d3b3ff
SHA19aac73920742ff9daad4ab109b48845339a799b7
SHA2562e93dfe7a3eeec8168626d0c7415068bd03dd50dadc7caaf954d7439401efeb5
SHA5120064b78e8ef1cb89eef52bc0ddad1f3e94396b7581af5867ba9c5385aa9afbbc013899dde4996b9fc43261d8cbd714e1b827efe8cc8bb7b450f06b2b6d64ed80
-
Filesize
6KB
MD5258674165ab7af805282203e02f56734
SHA1753c716b0d0c98c55ba94ebcfdd67e05260de751
SHA256923c5e8554af2554eb9849343dd753666b6121a05b53cd9638f71f633a1cb723
SHA51214bb2f22cb6a1e30f5c8c183f65c29ab2fff59127e928bce8125cdbd1c8093721370a98a9420c921a5b7e6a8baf8574c44f1efbceeafd07a332fc9c6cbfcf5b1
-
Filesize
8KB
MD52eae0edfc964cc372967734446ba0da8
SHA10e6d99b09fc1011c80e078ce1619a0c8839bbd00
SHA25690e4a810535b682cf19708a99113842e539321967a84886d72d9ef7a91a958fb
SHA512d9b389ee8c34cbc06aba168b872aa68658c673bde68b45305ceb2762c11ae40fc67a511c1d9f128d236e8521b2c14293d107e120dbde60b5a2b77573b3cac929
-
Filesize
11KB
MD5acd8415e4b0fa8bc45b6a513840d8e83
SHA19f9edbf68754b8ded17d902dd27b879751ec1b13
SHA2562f0d29eb10b8e7bdcc8f918deb3a1807effdf84be970b8cd7f889eafa7fdc9e2
SHA512c479241de86addae976094bf7d3572107a6d2c773b04429185468dd4deb5cdffe16cea6a90b6ae4e96e7ebf05a04d3662c6fb4d358e8d3246019983d7ca818c2
-
Filesize
11KB
MD5830307d0566e04fbef39366d9ec4ad15
SHA181a3398bcdfe2e068933ab19f8ea9e8427f8a2fd
SHA2565723a93ba17857611f907eccd57bfd8798e34858d845ed38e21cbfcf58c18ec7
SHA512f348cd25f77bacc8c31eda5b96c6987d3c26ed4331576c0359fe4e4372d598b16ab2007e5df32b1a07f090576ae1173da45a1e68f4dbdc0a1de4c2b51ef9a401