Analysis
-
max time kernel
145s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
18/04/2024, 20:40
Static task
static1
Behavioral task
behavioral1
Sample
f8b3c28882744acc39f464b2ca20f747_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f8b3c28882744acc39f464b2ca20f747_JaffaCakes118.html
Resource
win10v2004-20240412-en
General
-
Target
f8b3c28882744acc39f464b2ca20f747_JaffaCakes118.html
-
Size
84KB
-
MD5
f8b3c28882744acc39f464b2ca20f747
-
SHA1
851b823e67664603540aae63ce16022200e34d56
-
SHA256
2f8fcfed3f86bdf72888a589515c0551bed9967c20ce586b97d9171974793b4a
-
SHA512
043967f2194316d5926dbd19a8bdf2130d2106148eda20e1f854a4bfc01469ca57c150eb2dd91fad0116ac6c85b3813283e4cba47d82b76611876c0ec8f5e55c
-
SSDEEP
1536:S7KnihBRo5A4H04XjRTkRmfbFyLmDJcN/oqCoSw61WSIdtcmNZJQbEhrM3Yv7fOC:SmYYA0s
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2004 msedge.exe 2004 msedge.exe 804 msedge.exe 804 msedge.exe 2632 identity_helper.exe 2632 identity_helper.exe 716 msedge.exe 716 msedge.exe 716 msedge.exe 716 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 804 wrote to memory of 4556 804 msedge.exe 87 PID 804 wrote to memory of 4556 804 msedge.exe 87 PID 804 wrote to memory of 2912 804 msedge.exe 88 PID 804 wrote to memory of 2912 804 msedge.exe 88 PID 804 wrote to memory of 2912 804 msedge.exe 88 PID 804 wrote to memory of 2912 804 msedge.exe 88 PID 804 wrote to memory of 2912 804 msedge.exe 88 PID 804 wrote to memory of 2912 804 msedge.exe 88 PID 804 wrote to memory of 2912 804 msedge.exe 88 PID 804 wrote to memory of 2912 804 msedge.exe 88 PID 804 wrote to memory of 2912 804 msedge.exe 88 PID 804 wrote to memory of 2912 804 msedge.exe 88 PID 804 wrote to memory of 2912 804 msedge.exe 88 PID 804 wrote to memory of 2912 804 msedge.exe 88 PID 804 wrote to memory of 2912 804 msedge.exe 88 PID 804 wrote to memory of 2912 804 msedge.exe 88 PID 804 wrote to memory of 2912 804 msedge.exe 88 PID 804 wrote to memory of 2912 804 msedge.exe 88 PID 804 wrote to memory of 2912 804 msedge.exe 88 PID 804 wrote to memory of 2912 804 msedge.exe 88 PID 804 wrote to memory of 2912 804 msedge.exe 88 PID 804 wrote to memory of 2912 804 msedge.exe 88 PID 804 wrote to memory of 2912 804 msedge.exe 88 PID 804 wrote to memory of 2912 804 msedge.exe 88 PID 804 wrote to memory of 2912 804 msedge.exe 88 PID 804 wrote to memory of 2912 804 msedge.exe 88 PID 804 wrote to memory of 2912 804 msedge.exe 88 PID 804 wrote to memory of 2912 804 msedge.exe 88 PID 804 wrote to memory of 2912 804 msedge.exe 88 PID 804 wrote to memory of 2912 804 msedge.exe 88 PID 804 wrote to memory of 2912 804 msedge.exe 88 PID 804 wrote to memory of 2912 804 msedge.exe 88 PID 804 wrote to memory of 2912 804 msedge.exe 88 PID 804 wrote to memory of 2912 804 msedge.exe 88 PID 804 wrote to memory of 2912 804 msedge.exe 88 PID 804 wrote to memory of 2912 804 msedge.exe 88 PID 804 wrote to memory of 2912 804 msedge.exe 88 PID 804 wrote to memory of 2912 804 msedge.exe 88 PID 804 wrote to memory of 2912 804 msedge.exe 88 PID 804 wrote to memory of 2912 804 msedge.exe 88 PID 804 wrote to memory of 2912 804 msedge.exe 88 PID 804 wrote to memory of 2912 804 msedge.exe 88 PID 804 wrote to memory of 2004 804 msedge.exe 89 PID 804 wrote to memory of 2004 804 msedge.exe 89 PID 804 wrote to memory of 4208 804 msedge.exe 90 PID 804 wrote to memory of 4208 804 msedge.exe 90 PID 804 wrote to memory of 4208 804 msedge.exe 90 PID 804 wrote to memory of 4208 804 msedge.exe 90 PID 804 wrote to memory of 4208 804 msedge.exe 90 PID 804 wrote to memory of 4208 804 msedge.exe 90 PID 804 wrote to memory of 4208 804 msedge.exe 90 PID 804 wrote to memory of 4208 804 msedge.exe 90 PID 804 wrote to memory of 4208 804 msedge.exe 90 PID 804 wrote to memory of 4208 804 msedge.exe 90 PID 804 wrote to memory of 4208 804 msedge.exe 90 PID 804 wrote to memory of 4208 804 msedge.exe 90 PID 804 wrote to memory of 4208 804 msedge.exe 90 PID 804 wrote to memory of 4208 804 msedge.exe 90 PID 804 wrote to memory of 4208 804 msedge.exe 90 PID 804 wrote to memory of 4208 804 msedge.exe 90 PID 804 wrote to memory of 4208 804 msedge.exe 90 PID 804 wrote to memory of 4208 804 msedge.exe 90 PID 804 wrote to memory of 4208 804 msedge.exe 90 PID 804 wrote to memory of 4208 804 msedge.exe 90
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\f8b3c28882744acc39f464b2ca20f747_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:804 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa92ff46f8,0x7ffa92ff4708,0x7ffa92ff47182⤵PID:4556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,15727514723400699024,6623036018619916113,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2144 /prefetch:22⤵PID:2912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,15727514723400699024,6623036018619916113,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2268 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2080,15727514723400699024,6623036018619916113,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2636 /prefetch:82⤵PID:4208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,15727514723400699024,6623036018619916113,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:1120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,15727514723400699024,6623036018619916113,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:5068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,15727514723400699024,6623036018619916113,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4928 /prefetch:12⤵PID:4628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,15727514723400699024,6623036018619916113,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5224 /prefetch:12⤵PID:3060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,15727514723400699024,6623036018619916113,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4748 /prefetch:12⤵PID:3284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,15727514723400699024,6623036018619916113,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5892 /prefetch:82⤵PID:2972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,15727514723400699024,6623036018619916113,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5892 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,15727514723400699024,6623036018619916113,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5168 /prefetch:12⤵PID:2660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,15727514723400699024,6623036018619916113,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3028 /prefetch:12⤵PID:2824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,15727514723400699024,6623036018619916113,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5360 /prefetch:12⤵PID:4668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,15727514723400699024,6623036018619916113,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5676 /prefetch:12⤵PID:4628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,15727514723400699024,6623036018619916113,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3056 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:716
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4668
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1904
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e36b219dcae7d32ec82cec3245512f80
SHA16b2bd46e4f6628d66f7ec4b5c399b8c9115a9466
SHA25616bc6f47bbfbd4e54c3163dafe784486b72d0b78e6ea3593122edb338448a27b
SHA512fc539c461d87141a180cf71bb6a636c75517e5e7226e76b71fd64e834dcacc88fcaaa92a9a00999bc0afc4fb93b7304b068000f14653c05ff03dd7baef3f225c
-
Filesize
152B
MD5559ff144c30d6a7102ec298fb7c261c4
SHA1badecb08f9a6c849ce5b30c348156b45ac9120b9
SHA2565444032cb994b90287c0262f2fba16f38e339073fd89aa3ab2592dfebc3e6f10
SHA5123a45661fc29e312aa643a12447bffdab83128fe5124077a870090081af6aaa4cf0bd021889ab1df5cd40f44adb055b1394b31313515c2929f714824c89fd0f04
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD563ee32c371f30467dfd70d4f9a6b7966
SHA1b710fe27fb527961b456ee774582eb6c39ce54a0
SHA256c466e49c8f603947dd0f70eb8075a17d503d48b8eae44a0dc50abf0227218b94
SHA5127c95085f4b0d27d56a667325337a1cb964dc63df1193d7e06defeb25ef84eb239346da030569ebed06eb9d4ce8ccdc88f1905b412f738b0b98b2fe9536cebaa5
-
Filesize
1KB
MD5ca9e7f7e75626b7b762aba0ad29619ed
SHA189c7b48085d786dbc5d3ad1f66a76006702865b6
SHA256ffe9a93e6b38fcf4ee6aa702ba8898b377a345a42c7219a10e2387cde2423acc
SHA512cca5e3cfdb447c10501d5dd41d2d9b97d35cc883c4419f19c0f7e282834da56b5d336696379ae2f88490039f11113bad8f828a604fe4bdf6ab8d04cc1c4dec2a
-
Filesize
6KB
MD5664cf5fcc4ba52072b35cbe8cdf73de3
SHA1173577648429a84edc515e37fbc4428370d32568
SHA25616290f94814dec1d0df3b856bf5b76f53910f1e0f1fa627c7392058815fe62b9
SHA51247d6683bb4a459031cb346229912a44c95fe36201a885af76e2963b7e119ed129e57ddeac8dced9cd6da45738a74d5263a36afc0934a9c615793a3252ca355d2
-
Filesize
6KB
MD510ba42e6dcfa55a6ac622301452627a8
SHA151816e26fec477a02c7247ac19dd096f297c10e9
SHA25663caa947493646ee70303ff40b928777ddef1f2c60b6b269b45ee91a0c5eb1d3
SHA512f5ff9396897acc4aab244973eb0230b517ace700ed8e3ff3754e574bfac244773a167b82d71ad5e278e6e845f88b14cd4ceeb2c312729391b11297be33b3230c
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5e433d597a644743074cfdf650eaf9107
SHA1b07dcf2dbbd108b6a4eb929b4c5c7b2c0e30c1fd
SHA2566d5d4ba64261ccf82ce29f2d0df0f0078fe5db88fa5147e94f6a8bca57d34735
SHA512174c4e09f7fe6b18d35b286e1b00dc1d307c9a1253b8512aa05ccbd9c9eb2f4974c541f6c85cb4b0ced7fdce805a5bdc20663e76d90394a32f678aefada721f9