Analysis
-
max time kernel
146s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
17/04/2024, 16:13
Static task
static1
Behavioral task
behavioral1
Sample
f62b1f58d283aa6e153ad57c21f43ba6_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f62b1f58d283aa6e153ad57c21f43ba6_JaffaCakes118.html
Resource
win10v2004-20240412-en
General
-
Target
f62b1f58d283aa6e153ad57c21f43ba6_JaffaCakes118.html
-
Size
68KB
-
MD5
f62b1f58d283aa6e153ad57c21f43ba6
-
SHA1
eeb7d87f3b6ffd80edcecb6d8f4857da683e2353
-
SHA256
e8b942d8212e3da3774511612c29ceba4c0a259ae3154ddcf235676e7075f818
-
SHA512
d5bec260a13af4216f241414d9a5908f33ce218dde9abcafbaed5de22ab97a68d448c5fa1e898560610ec14c28461e1419c401a92a21763fa957324c920f4d1b
-
SSDEEP
768:Sw0hqGbIiP//mdvsYSgLj/DVWmTMYq8Dfr7Vq3t40MSxjfLD+PHgkyMrj3DZ+/Vh:SGIk/OtnwOHrqRucc
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1412 msedge.exe 1412 msedge.exe 1812 msedge.exe 1812 msedge.exe 4384 identity_helper.exe 4384 identity_helper.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe 4564 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe 1812 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1812 wrote to memory of 1948 1812 msedge.exe 85 PID 1812 wrote to memory of 1948 1812 msedge.exe 85 PID 1812 wrote to memory of 4032 1812 msedge.exe 86 PID 1812 wrote to memory of 4032 1812 msedge.exe 86 PID 1812 wrote to memory of 4032 1812 msedge.exe 86 PID 1812 wrote to memory of 4032 1812 msedge.exe 86 PID 1812 wrote to memory of 4032 1812 msedge.exe 86 PID 1812 wrote to memory of 4032 1812 msedge.exe 86 PID 1812 wrote to memory of 4032 1812 msedge.exe 86 PID 1812 wrote to memory of 4032 1812 msedge.exe 86 PID 1812 wrote to memory of 4032 1812 msedge.exe 86 PID 1812 wrote to memory of 4032 1812 msedge.exe 86 PID 1812 wrote to memory of 4032 1812 msedge.exe 86 PID 1812 wrote to memory of 4032 1812 msedge.exe 86 PID 1812 wrote to memory of 4032 1812 msedge.exe 86 PID 1812 wrote to memory of 4032 1812 msedge.exe 86 PID 1812 wrote to memory of 4032 1812 msedge.exe 86 PID 1812 wrote to memory of 4032 1812 msedge.exe 86 PID 1812 wrote to memory of 4032 1812 msedge.exe 86 PID 1812 wrote to memory of 4032 1812 msedge.exe 86 PID 1812 wrote to memory of 4032 1812 msedge.exe 86 PID 1812 wrote to memory of 4032 1812 msedge.exe 86 PID 1812 wrote to memory of 4032 1812 msedge.exe 86 PID 1812 wrote to memory of 4032 1812 msedge.exe 86 PID 1812 wrote to memory of 4032 1812 msedge.exe 86 PID 1812 wrote to memory of 4032 1812 msedge.exe 86 PID 1812 wrote to memory of 4032 1812 msedge.exe 86 PID 1812 wrote to memory of 4032 1812 msedge.exe 86 PID 1812 wrote to memory of 4032 1812 msedge.exe 86 PID 1812 wrote to memory of 4032 1812 msedge.exe 86 PID 1812 wrote to memory of 4032 1812 msedge.exe 86 PID 1812 wrote to memory of 4032 1812 msedge.exe 86 PID 1812 wrote to memory of 4032 1812 msedge.exe 86 PID 1812 wrote to memory of 4032 1812 msedge.exe 86 PID 1812 wrote to memory of 4032 1812 msedge.exe 86 PID 1812 wrote to memory of 4032 1812 msedge.exe 86 PID 1812 wrote to memory of 4032 1812 msedge.exe 86 PID 1812 wrote to memory of 4032 1812 msedge.exe 86 PID 1812 wrote to memory of 4032 1812 msedge.exe 86 PID 1812 wrote to memory of 4032 1812 msedge.exe 86 PID 1812 wrote to memory of 4032 1812 msedge.exe 86 PID 1812 wrote to memory of 4032 1812 msedge.exe 86 PID 1812 wrote to memory of 1412 1812 msedge.exe 87 PID 1812 wrote to memory of 1412 1812 msedge.exe 87 PID 1812 wrote to memory of 400 1812 msedge.exe 88 PID 1812 wrote to memory of 400 1812 msedge.exe 88 PID 1812 wrote to memory of 400 1812 msedge.exe 88 PID 1812 wrote to memory of 400 1812 msedge.exe 88 PID 1812 wrote to memory of 400 1812 msedge.exe 88 PID 1812 wrote to memory of 400 1812 msedge.exe 88 PID 1812 wrote to memory of 400 1812 msedge.exe 88 PID 1812 wrote to memory of 400 1812 msedge.exe 88 PID 1812 wrote to memory of 400 1812 msedge.exe 88 PID 1812 wrote to memory of 400 1812 msedge.exe 88 PID 1812 wrote to memory of 400 1812 msedge.exe 88 PID 1812 wrote to memory of 400 1812 msedge.exe 88 PID 1812 wrote to memory of 400 1812 msedge.exe 88 PID 1812 wrote to memory of 400 1812 msedge.exe 88 PID 1812 wrote to memory of 400 1812 msedge.exe 88 PID 1812 wrote to memory of 400 1812 msedge.exe 88 PID 1812 wrote to memory of 400 1812 msedge.exe 88 PID 1812 wrote to memory of 400 1812 msedge.exe 88 PID 1812 wrote to memory of 400 1812 msedge.exe 88 PID 1812 wrote to memory of 400 1812 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\f62b1f58d283aa6e153ad57c21f43ba6_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd1d4946f8,0x7ffd1d494708,0x7ffd1d4947182⤵PID:1948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,10906065978447884753,16729579409513360775,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2056 /prefetch:22⤵PID:4032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,10906065978447884753,16729579409513360775,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2080,10906065978447884753,16729579409513360775,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2824 /prefetch:82⤵PID:400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,10906065978447884753,16729579409513360775,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:4628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,10906065978447884753,16729579409513360775,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:4940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,10906065978447884753,16729579409513360775,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6132 /prefetch:12⤵PID:3448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,10906065978447884753,16729579409513360775,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5744 /prefetch:12⤵PID:64
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,10906065978447884753,16729579409513360775,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5340 /prefetch:82⤵PID:3344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,10906065978447884753,16729579409513360775,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5340 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,10906065978447884753,16729579409513360775,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5100 /prefetch:12⤵PID:2872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,10906065978447884753,16729579409513360775,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5076 /prefetch:12⤵PID:4320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,10906065978447884753,16729579409513360775,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5732 /prefetch:12⤵PID:4864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,10906065978447884753,16729579409513360775,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5660 /prefetch:12⤵PID:4816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,10906065978447884753,16729579409513360775,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6124 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4564
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3220
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4848
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD58c91c8582b0c918416d14bd7eedd686e
SHA1b2ff8149bc21144fdcec64111afda492965c6621
SHA2561e839706b748c04adf8efa2790564ca1efd707fdf6451e71af6862e07123717e
SHA512a93be868d9f08097bff39069378a0bfa0f5c78e74e9e8df820be9b0426cbfe84e03e9638b329b6142279ed140a120c4c4c21857f410fc4789a370445c3919dcf
-
Filesize
152B
MD52579d07b98bbefadc929d80fb3dbd32a
SHA11ceb57c4b81f0f23500e118a4b9a225116a467de
SHA256b8443c289ad36568a2bf794ac9ec1f259a9dd930c36680dafc8d0cb4de81feb6
SHA51253522ad5e8e2a272d5b1bff9b9226b7d976d47413891c60d7efebd4365baff12b6891e3f79b20e14892ec7c654ad2d437941014290c428c6b1bd78a7b3e557de
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD586891c25248be477fb3e612b412e36f1
SHA1b5ec8e7e2be9ede593eba1ca74489bd6fb0e3dee
SHA256acf89ca7ae165477281b82598cfc54907d6da7d3cdf05e204c6879e6b3188e98
SHA5122914a38e35bbe007ccf65f7d8ed5b245e211257570549c04e3834fe1fff1ab5a6d9321f91e310f139841de4002d15d85b90079e64dbc1c6804a065fd90ff534d
-
Filesize
603B
MD57716d00226b07b3c8ee1acb6d990b82f
SHA166f3715aa5f46ecf0bac597b028350bd8a4f92ac
SHA25696aef01a661a206c1b4180f2ccbec36ae28431c07281c67c155a226f795d4aa5
SHA51291e983d554bc2e9fde9b528574f77715c2631e7f0a02464632c603c0274f7a582cecba2f62cce48b30d167fd056d965debdf1262147b8d5707d67c7a75afced0
-
Filesize
6KB
MD56d52adbaa0d9f83ff8a6393e057961fa
SHA19299cc2bf30e6f05af4dc01af9300a96445ef986
SHA25647a37faf50861176e61671ce641b02e91b53b08e4fe962dffe178c46b6c8fe87
SHA5123c3f1cec6ce5de518c7c6d12e23a26d24601cbdfe0919596477af5c7389a01a6449b5b0d777b89e8f304fca73a40832a8ad191df4b92238be745f340b293c0fc
-
Filesize
6KB
MD5105898cb5ced3604b4ee38ab75552c29
SHA133b3a00b5dba2917e56055d025b906cce767097f
SHA2563978ce2ba9729759f00ed2ae00146f9de3bbd61feba39757e320020f9042ab25
SHA512735adec72bb1cfea7ba2c7e2409faa8a88d5fabf1a3a5ef381f15863059e3ad7d67d652cf77d5a405dc5866cd4ab3014591f92d06a17cb79f775c50c1863c899
-
Filesize
6KB
MD529feec476663ef766be9189159f22934
SHA11b6c55c7d163344df9c92c7b2f30d218e25248da
SHA2568ae957051461a30aa8b8397404f6b5715dae53048c42f9b1813711597cc6c763
SHA5129343d18a1e350b9f20337864b66040830414b4036eb638c53c9ed7b6a287d189f688a1272579b768fac9a0f969e45bd5a07962c8215b5875574ae2945568f530
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD563aa73daa3f05b44ab507173c6d3707c
SHA1e1e7be6c22a4dced11c4c122f67119e3bb745f43
SHA2567f53d9aaa76b9151a908d840745c368d69883831ee520c3254d4a697482f35bd
SHA512af47419a697051cff7f9c2c70e9a6aaa77c5f4d88dd1971527199bc9f059854782ba5ca3d86dc9f84d94c9401ff2cc66548cb69bbcbd8c14d9729d7c04545148