Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
17/04/2024, 18:17
Static task
static1
Behavioral task
behavioral1
Sample
f661b0374a005a28093d35cd121f5fef_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f661b0374a005a28093d35cd121f5fef_JaffaCakes118.html
Resource
win10v2004-20240412-en
General
-
Target
f661b0374a005a28093d35cd121f5fef_JaffaCakes118.html
-
Size
108KB
-
MD5
f661b0374a005a28093d35cd121f5fef
-
SHA1
139334e107c57b08ccdf1ff5dafa39ddebe3ff61
-
SHA256
386c95ce5bf205f54e2d4381b8d8ec12171e761981bb0316bbfa3f09f27d7d25
-
SHA512
458cf4421806626da03625ff4830d37b83169db02992189db5bd3377c59ea3418b1dc8766eebbcdd17a8cbbc89114afd1ec7b387383f5e7f81e35dd8bd2ec583
-
SSDEEP
1536:1hB9dycnZAoMVQ4EBfVhmKg4ZNfG37z5Xt3PKSkyLJ+xPnPHR5a/tktgqpGpTc:1hc4mVQ4EBf9jfG37z5XdCP7gqpGpTc
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4724 msedge.exe 4724 msedge.exe 3616 msedge.exe 3616 msedge.exe 4516 identity_helper.exe 4516 identity_helper.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe 740 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3616 wrote to memory of 4592 3616 msedge.exe 85 PID 3616 wrote to memory of 4592 3616 msedge.exe 85 PID 3616 wrote to memory of 4064 3616 msedge.exe 86 PID 3616 wrote to memory of 4064 3616 msedge.exe 86 PID 3616 wrote to memory of 4064 3616 msedge.exe 86 PID 3616 wrote to memory of 4064 3616 msedge.exe 86 PID 3616 wrote to memory of 4064 3616 msedge.exe 86 PID 3616 wrote to memory of 4064 3616 msedge.exe 86 PID 3616 wrote to memory of 4064 3616 msedge.exe 86 PID 3616 wrote to memory of 4064 3616 msedge.exe 86 PID 3616 wrote to memory of 4064 3616 msedge.exe 86 PID 3616 wrote to memory of 4064 3616 msedge.exe 86 PID 3616 wrote to memory of 4064 3616 msedge.exe 86 PID 3616 wrote to memory of 4064 3616 msedge.exe 86 PID 3616 wrote to memory of 4064 3616 msedge.exe 86 PID 3616 wrote to memory of 4064 3616 msedge.exe 86 PID 3616 wrote to memory of 4064 3616 msedge.exe 86 PID 3616 wrote to memory of 4064 3616 msedge.exe 86 PID 3616 wrote to memory of 4064 3616 msedge.exe 86 PID 3616 wrote to memory of 4064 3616 msedge.exe 86 PID 3616 wrote to memory of 4064 3616 msedge.exe 86 PID 3616 wrote to memory of 4064 3616 msedge.exe 86 PID 3616 wrote to memory of 4064 3616 msedge.exe 86 PID 3616 wrote to memory of 4064 3616 msedge.exe 86 PID 3616 wrote to memory of 4064 3616 msedge.exe 86 PID 3616 wrote to memory of 4064 3616 msedge.exe 86 PID 3616 wrote to memory of 4064 3616 msedge.exe 86 PID 3616 wrote to memory of 4064 3616 msedge.exe 86 PID 3616 wrote to memory of 4064 3616 msedge.exe 86 PID 3616 wrote to memory of 4064 3616 msedge.exe 86 PID 3616 wrote to memory of 4064 3616 msedge.exe 86 PID 3616 wrote to memory of 4064 3616 msedge.exe 86 PID 3616 wrote to memory of 4064 3616 msedge.exe 86 PID 3616 wrote to memory of 4064 3616 msedge.exe 86 PID 3616 wrote to memory of 4064 3616 msedge.exe 86 PID 3616 wrote to memory of 4064 3616 msedge.exe 86 PID 3616 wrote to memory of 4064 3616 msedge.exe 86 PID 3616 wrote to memory of 4064 3616 msedge.exe 86 PID 3616 wrote to memory of 4064 3616 msedge.exe 86 PID 3616 wrote to memory of 4064 3616 msedge.exe 86 PID 3616 wrote to memory of 4064 3616 msedge.exe 86 PID 3616 wrote to memory of 4064 3616 msedge.exe 86 PID 3616 wrote to memory of 4724 3616 msedge.exe 87 PID 3616 wrote to memory of 4724 3616 msedge.exe 87 PID 3616 wrote to memory of 2568 3616 msedge.exe 88 PID 3616 wrote to memory of 2568 3616 msedge.exe 88 PID 3616 wrote to memory of 2568 3616 msedge.exe 88 PID 3616 wrote to memory of 2568 3616 msedge.exe 88 PID 3616 wrote to memory of 2568 3616 msedge.exe 88 PID 3616 wrote to memory of 2568 3616 msedge.exe 88 PID 3616 wrote to memory of 2568 3616 msedge.exe 88 PID 3616 wrote to memory of 2568 3616 msedge.exe 88 PID 3616 wrote to memory of 2568 3616 msedge.exe 88 PID 3616 wrote to memory of 2568 3616 msedge.exe 88 PID 3616 wrote to memory of 2568 3616 msedge.exe 88 PID 3616 wrote to memory of 2568 3616 msedge.exe 88 PID 3616 wrote to memory of 2568 3616 msedge.exe 88 PID 3616 wrote to memory of 2568 3616 msedge.exe 88 PID 3616 wrote to memory of 2568 3616 msedge.exe 88 PID 3616 wrote to memory of 2568 3616 msedge.exe 88 PID 3616 wrote to memory of 2568 3616 msedge.exe 88 PID 3616 wrote to memory of 2568 3616 msedge.exe 88 PID 3616 wrote to memory of 2568 3616 msedge.exe 88 PID 3616 wrote to memory of 2568 3616 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\f661b0374a005a28093d35cd121f5fef_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3616 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff07a746f8,0x7fff07a74708,0x7fff07a747182⤵PID:4592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,9005646202404028814,5408985652847813673,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:22⤵PID:4064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,9005646202404028814,5408985652847813673,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,9005646202404028814,5408985652847813673,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2812 /prefetch:82⤵PID:2568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,9005646202404028814,5408985652847813673,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:4968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,9005646202404028814,5408985652847813673,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:3940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,9005646202404028814,5408985652847813673,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4980 /prefetch:12⤵PID:2812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,9005646202404028814,5408985652847813673,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5184 /prefetch:12⤵PID:860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,9005646202404028814,5408985652847813673,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5836 /prefetch:12⤵PID:4820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,9005646202404028814,5408985652847813673,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6096 /prefetch:12⤵PID:4688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,9005646202404028814,5408985652847813673,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6396 /prefetch:82⤵PID:220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,9005646202404028814,5408985652847813673,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6396 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,9005646202404028814,5408985652847813673,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4124 /prefetch:12⤵PID:4324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,9005646202404028814,5408985652847813673,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5928 /prefetch:12⤵PID:4164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,9005646202404028814,5408985652847813673,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:740
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:684
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2332
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4356
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5120a75f233314ba1fe34e9d6c09f30b9
SHA1a9f92f2d3f111eaadd9bcf8fceb3c9553753539c
SHA256e04101215c3534dbc77c0b5df2e1d1ff74c277d2946f391f939c9a7948a22dd0
SHA5123c4eb93e425b50e8bcc1712f4cc2be11888a0273c3a619fc6bf72ccab876a427158f661bfc80d0c1e47ef4116febf76a3aaa31a60ec662eae0e51c7f1d3d89b3
-
Filesize
152B
MD5bc2edd0741d97ae237e9f00bf3244144
SHA17c1e5d324f5c7137a3c4ec85146659f026c11782
SHA256dbce3287c7ae69ccbd1d780c39f3ffa3c98bd4609a939fff8ee9c99f14265041
SHA51200f505a0b4ea0df626175bf9d39a205f18f9754b62e4dba6fbb5b4a716b3539e7809723e1596bcfe1ba3041e22342e3a9cbaad88e84ce9c8c6531331bbc25093
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize216B
MD574764ec3a0d3242064bf5439fed45d04
SHA1f337fa5b6be0adc95a0d694b628da820076d16ca
SHA256ccce1b86f0fee28b6f786bec627ce57a7b53ae01d92767de432926a3d325472d
SHA5126bf275685275073fb0d322576f221574230162227db12b77984f4afa3d53c9bd406b62a7aa57b7fb4b40838feb7648e721d2b496778eec12bf72c0e1792abcab
-
Filesize
3KB
MD51cf5cd6dcebf0659c9f5c7f89465bc90
SHA11dff372cb8f755e2b18ce754f7deca648d8e712d
SHA256600d38b4bf1580ce779a5cc1486500b969c7bcbaf4fad48a498fb3e33d56b9cc
SHA512f4faf2fbe3dbdb38287a1bb71ab29ed391e062e087bdbad92d00b9846b17ba9d3ec6ab9aaca7e1f880900ef81a2adb548af865a2192421e8537523d94b243ae6
-
Filesize
3KB
MD5601299351738037750789c43ffb25da2
SHA1b281fd0589b2436579fe893c0d6c80757be10e8c
SHA25643bfd8b97b1fc5c15bb2738f796e44603960eb65393a7d626b40f11b77f6e861
SHA512dbbf968ce0fed38668088b1bd8a6bc43a02be735b66c0a90f919e5f7092c13e291025a54688e556027b123a94607331b85b3e278f1b21e2c4f08145e81cd244a
-
Filesize
6KB
MD5d2df3c0208bbb17d6d2a3093ffc35b6a
SHA1162d8f430db9939fc33c29d669f4fb70780cec2f
SHA256ed1b3694998180fb4a24d1a6559a017f31b896a060e57baf3a9662e2d8625219
SHA512c7543bd26d94ca839815fe606fe1f738117fad352da607df0db3c50ea5e8a94fe0755f7d2811a64afef6e5393ad53bb6b930e2460211959dd6bffde048f6fe3b
-
Filesize
7KB
MD54670b49c99cdf3b81fe656ca0b98591c
SHA1091b919c6569fdf96976d6520b01148eaf48f5f4
SHA2567394649346e64d31db8bd066f44aabf9ac0720afc7e28ca2b6cca5db92b60def
SHA512ab318b48a01b5b54e004f8145c72dbb7b618a11d21b772f0cc15439f57defc6dbea37cd969a8914702a1ebed0e1c39cece371e884e667be8678f1d7367a32f9f
-
Filesize
7KB
MD54054a97db0856173989f4649e092a529
SHA1bc82d9db94f26b9bb050e32131ae5871d6fd62b7
SHA256cdbe383d2762d38850d3d71b54001cf492fd5c66056f7b033da9b85b4a27e589
SHA5120df322f13d1cac365539769689b1533ae2e9519e8c8e8b438d33e7bb6e39f052defcf7ada9824210e2abf4819da4baa5c3666127486a4fbe54fba52e3340591c
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD598a6e8bc2df0b5be19bd5d972217023d
SHA127d055a7c2735d0951aa8463dce6f159c2eb9a88
SHA25605ce7aa0e1855d6e68ed6f651849e3c4633ccf79d50f267b73a35061b8946bb5
SHA512abd5806adf11b60292ecdd6d398044821357543d0001741f8476865bfd127b39740e4ce1a4ddb53ba4cdc029ec1affa2ea253501aea5a4f5a1f238a51d9cfc2e