Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
19/04/2024, 16:19
Static task
static1
Behavioral task
behavioral1
Sample
faaf11753427e2c11fd18cc8432e5267_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
faaf11753427e2c11fd18cc8432e5267_JaffaCakes118.html
Resource
win10v2004-20240412-en
General
-
Target
faaf11753427e2c11fd18cc8432e5267_JaffaCakes118.html
-
Size
53KB
-
MD5
faaf11753427e2c11fd18cc8432e5267
-
SHA1
82ce21fed4a6bfad89928e5d944c8909bbad959d
-
SHA256
f4f1b81a195420cb47b57fe638a5e7cdb9eb8a27623380a6d54b13e6fd4a39e4
-
SHA512
fa72680efe3eb833f294fd0422f076d60a5712b76e462dd3742d311769b6436b547548b142f94e608de73120e4de63a04e2e9c409df0975cdccff5cdd01c320a
-
SSDEEP
768:/7OT0EipBtMGUkpPKh303qyxyms4mEjYjMAjCJnDrR57:/aTupBtzUsKh303JSGsjZOJL
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 4204 msedge.exe 4204 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 3252 identity_helper.exe 3252 identity_helper.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5076 wrote to memory of 1380 5076 msedge.exe 86 PID 5076 wrote to memory of 1380 5076 msedge.exe 86 PID 5076 wrote to memory of 1208 5076 msedge.exe 87 PID 5076 wrote to memory of 1208 5076 msedge.exe 87 PID 5076 wrote to memory of 1208 5076 msedge.exe 87 PID 5076 wrote to memory of 1208 5076 msedge.exe 87 PID 5076 wrote to memory of 1208 5076 msedge.exe 87 PID 5076 wrote to memory of 1208 5076 msedge.exe 87 PID 5076 wrote to memory of 1208 5076 msedge.exe 87 PID 5076 wrote to memory of 1208 5076 msedge.exe 87 PID 5076 wrote to memory of 1208 5076 msedge.exe 87 PID 5076 wrote to memory of 1208 5076 msedge.exe 87 PID 5076 wrote to memory of 1208 5076 msedge.exe 87 PID 5076 wrote to memory of 1208 5076 msedge.exe 87 PID 5076 wrote to memory of 1208 5076 msedge.exe 87 PID 5076 wrote to memory of 1208 5076 msedge.exe 87 PID 5076 wrote to memory of 1208 5076 msedge.exe 87 PID 5076 wrote to memory of 1208 5076 msedge.exe 87 PID 5076 wrote to memory of 1208 5076 msedge.exe 87 PID 5076 wrote to memory of 1208 5076 msedge.exe 87 PID 5076 wrote to memory of 1208 5076 msedge.exe 87 PID 5076 wrote to memory of 1208 5076 msedge.exe 87 PID 5076 wrote to memory of 1208 5076 msedge.exe 87 PID 5076 wrote to memory of 1208 5076 msedge.exe 87 PID 5076 wrote to memory of 1208 5076 msedge.exe 87 PID 5076 wrote to memory of 1208 5076 msedge.exe 87 PID 5076 wrote to memory of 1208 5076 msedge.exe 87 PID 5076 wrote to memory of 1208 5076 msedge.exe 87 PID 5076 wrote to memory of 1208 5076 msedge.exe 87 PID 5076 wrote to memory of 1208 5076 msedge.exe 87 PID 5076 wrote to memory of 1208 5076 msedge.exe 87 PID 5076 wrote to memory of 1208 5076 msedge.exe 87 PID 5076 wrote to memory of 1208 5076 msedge.exe 87 PID 5076 wrote to memory of 1208 5076 msedge.exe 87 PID 5076 wrote to memory of 1208 5076 msedge.exe 87 PID 5076 wrote to memory of 1208 5076 msedge.exe 87 PID 5076 wrote to memory of 1208 5076 msedge.exe 87 PID 5076 wrote to memory of 1208 5076 msedge.exe 87 PID 5076 wrote to memory of 1208 5076 msedge.exe 87 PID 5076 wrote to memory of 1208 5076 msedge.exe 87 PID 5076 wrote to memory of 1208 5076 msedge.exe 87 PID 5076 wrote to memory of 1208 5076 msedge.exe 87 PID 5076 wrote to memory of 4204 5076 msedge.exe 88 PID 5076 wrote to memory of 4204 5076 msedge.exe 88 PID 5076 wrote to memory of 4076 5076 msedge.exe 89 PID 5076 wrote to memory of 4076 5076 msedge.exe 89 PID 5076 wrote to memory of 4076 5076 msedge.exe 89 PID 5076 wrote to memory of 4076 5076 msedge.exe 89 PID 5076 wrote to memory of 4076 5076 msedge.exe 89 PID 5076 wrote to memory of 4076 5076 msedge.exe 89 PID 5076 wrote to memory of 4076 5076 msedge.exe 89 PID 5076 wrote to memory of 4076 5076 msedge.exe 89 PID 5076 wrote to memory of 4076 5076 msedge.exe 89 PID 5076 wrote to memory of 4076 5076 msedge.exe 89 PID 5076 wrote to memory of 4076 5076 msedge.exe 89 PID 5076 wrote to memory of 4076 5076 msedge.exe 89 PID 5076 wrote to memory of 4076 5076 msedge.exe 89 PID 5076 wrote to memory of 4076 5076 msedge.exe 89 PID 5076 wrote to memory of 4076 5076 msedge.exe 89 PID 5076 wrote to memory of 4076 5076 msedge.exe 89 PID 5076 wrote to memory of 4076 5076 msedge.exe 89 PID 5076 wrote to memory of 4076 5076 msedge.exe 89 PID 5076 wrote to memory of 4076 5076 msedge.exe 89 PID 5076 wrote to memory of 4076 5076 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\faaf11753427e2c11fd18cc8432e5267_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5076 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe8b9b46f8,0x7ffe8b9b4708,0x7ffe8b9b47182⤵PID:1380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,1276409348776418110,14398926408716416907,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2196 /prefetch:22⤵PID:1208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,1276409348776418110,14398926408716416907,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2500 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,1276409348776418110,14398926408716416907,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2832 /prefetch:82⤵PID:4076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,1276409348776418110,14398926408716416907,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3168 /prefetch:12⤵PID:4852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,1276409348776418110,14398926408716416907,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3180 /prefetch:12⤵PID:3488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,1276409348776418110,14398926408716416907,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4632 /prefetch:12⤵PID:1576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,1276409348776418110,14398926408716416907,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4784 /prefetch:12⤵PID:1408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,1276409348776418110,14398926408716416907,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5960 /prefetch:82⤵PID:1540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,1276409348776418110,14398926408716416907,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5960 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,1276409348776418110,14398926408716416907,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5728 /prefetch:12⤵PID:1360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,1276409348776418110,14398926408716416907,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5664 /prefetch:12⤵PID:3440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,1276409348776418110,14398926408716416907,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4904 /prefetch:12⤵PID:1072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,1276409348776418110,14398926408716416907,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4072 /prefetch:12⤵PID:2448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,1276409348776418110,14398926408716416907,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5084 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5064
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2784
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4776
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD55e2f0fe48e7ee1aad1c24db5c01c354a
SHA15bfeb862e107dd290d87385dc9369bd7a1006b36
SHA256f13b3ebe8d71bd0086d5bb82364c35f59a95d32b39753af251e8639360e291a9
SHA512140d026437fd5e8a874cd00b03950c8f010e1a0732a0a1cc5bdde477e7f8315ccb95790bb4c15b8dbaab9468ad532eb885b6c429300a64e39412d976d079324e
-
Filesize
152B
MD57e0880992c640aca08737893588a0010
SHA16ceec5cb125a52751de8aeda4bab7112f68ae0fe
SHA2568649a39877c190ec740a5422284ec5f9ff509b30b2d7896635476873dd8824e2
SHA51252bd0a38ca7f43b26731966035045b1cbd8b60b2d81bdf9aad791cf444da8af8b722ebf3cb364a6e660bebdf23084eb0e30bc23562575b704801669817549f8a
-
Filesize
20KB
MD50c537a82da568b1528a5b4c5db95f169
SHA1cbce4bdcd79433b66466b9fe3c0fec730b1a5bb4
SHA25673279553e1043b5a1f12766aadf552ffdaeb0a22bff842e68a299dbb7af01ec8
SHA51276ed9ad0826f246c6a3b1b00215625e38437d477e1df4c57c2a56071a4c2d80465a62062b44e33de2ba58f90e664f0c9bdedc2b274ab54706209b812c0d95485
-
Filesize
44KB
MD557ae46a87a9955c7c61ce5cfebde0bf6
SHA12a9297a0e2ee5f4e0a9b1de88ffd2121d5d2ca77
SHA256891dc8b9999ba1b2d25c1a044b49330b66b86f986478282f4e5950b726e9878f
SHA51234e51215e347df35ae4cf8420e2148420780f78123a37450682ed92841c6e1dd1635317cae1ef925a001bda733228db0f5de87faa0a10c36cb967e9b70691689
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize192B
MD57e059b62ce8fc3b08e1445414d384680
SHA1119d8eb5d55de5fa0e8b97655a2aa27b38183768
SHA2560473b41973e56277ab235d7aaffae307e58257246b5e728b3e5e377dc70fbe82
SHA512ff5659d30d624ff51769e4fd87fca1c54fc26fe034335203f1dacf016bd7b5b574360853279afc9a74de640a0ef1f829d53a71a1889db7bb72bb6a3c43651692
-
Filesize
1KB
MD585fb7c752a86043c249041efa5718b3f
SHA164046b7bb3f33b7b66f72c673df53be27ca61037
SHA256268744ed43995797f63cc25a81a1104cc26276539d3b66ac45e32f451bcf4c2c
SHA512a1c5efab369f0865d6401ef502c9b3962f96dc1f608ee852f5d6b10c8cade991288d83eb9fc93770e71503e1d7e46292c836492da47020851449f34cbec17010
-
Filesize
6KB
MD5ff0daa7f001bcbc0e318f414986c058f
SHA1c32c696b2390d4a373712b87d9cfbb99e2f231cd
SHA2562b6b9620ae8aedcbeba62be345088c3a218f6168e86ef2d198e58de170e3b55e
SHA512ecf209f351c06dbfe7114ae16084ff47845c9d6d892e3ddfc2e563e3bb41e2cdcdf06a8e05913e4e43c72972749f1e062aebf91341e55b5a2a6baf47640d9aac
-
Filesize
6KB
MD5cc7e80d98c6244db75d7485efd4c1995
SHA128a4759ef29a31a55ce2d99ad2f99846b6e159d2
SHA256166c0b27daea8a89eed22ac62eac7c59e739067a2588e4594772877c2bb4feb6
SHA512d18560726750bd30a2354f424f2f55c7967b08b3876ab235bf8f2d5fa38f1620d6b78d952a58fec2203d7de3b2b7786e1d740824d22b83eab0b9d1a745d4692a
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD5ca4cd1412038353f3ddc07cfe9e8303a
SHA107ccb3efcb039f472eaec46d49873271fc8b7ce6
SHA2560bd3eeb995d53482c15df9e026e58104384ddc930555c36f1a0444a9f54a54d4
SHA512152429747d03a4f9493d35f5edd6f1cee9fefd99270d2a5b3c2f4046f055d06a5148dff18566d1d5c01a3707721f16bd31edf7253925d44c222fe24704558691