Analysis
-
max time kernel
145s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
20/04/2024, 11:15
Static task
static1
Behavioral task
behavioral1
Sample
fca36f712a5e1649fa55bb76d535a333_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fca36f712a5e1649fa55bb76d535a333_JaffaCakes118.html
Resource
win10v2004-20240412-en
General
-
Target
fca36f712a5e1649fa55bb76d535a333_JaffaCakes118.html
-
Size
68KB
-
MD5
fca36f712a5e1649fa55bb76d535a333
-
SHA1
6f7d0628b5c217fad3b98ac449b008949c3dcf2a
-
SHA256
fc5638ad0e5d13232bf99bcc1f4e62c86f9f6253239b43202bce9b489d9c8278
-
SHA512
ba84035b088c8998e284f36a498db7d6e2269a16506bd25a69ebde7361629a751152db41aebdbf7e2a9e160ba051746c69aa2178b9c3a312e2a67c8b4e65d9dd
-
SSDEEP
1536:48Ddqo2T0rnidiiiielildi7m2nsJEmTH:428hwflilz2nmEmTH
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3604 msedge.exe 3604 msedge.exe 3048 msedge.exe 3048 msedge.exe 5996 identity_helper.exe 5996 identity_helper.exe 1500 msedge.exe 1500 msedge.exe 1500 msedge.exe 1500 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3048 wrote to memory of 1136 3048 msedge.exe 86 PID 3048 wrote to memory of 1136 3048 msedge.exe 86 PID 3048 wrote to memory of 1252 3048 msedge.exe 87 PID 3048 wrote to memory of 1252 3048 msedge.exe 87 PID 3048 wrote to memory of 1252 3048 msedge.exe 87 PID 3048 wrote to memory of 1252 3048 msedge.exe 87 PID 3048 wrote to memory of 1252 3048 msedge.exe 87 PID 3048 wrote to memory of 1252 3048 msedge.exe 87 PID 3048 wrote to memory of 1252 3048 msedge.exe 87 PID 3048 wrote to memory of 1252 3048 msedge.exe 87 PID 3048 wrote to memory of 1252 3048 msedge.exe 87 PID 3048 wrote to memory of 1252 3048 msedge.exe 87 PID 3048 wrote to memory of 1252 3048 msedge.exe 87 PID 3048 wrote to memory of 1252 3048 msedge.exe 87 PID 3048 wrote to memory of 1252 3048 msedge.exe 87 PID 3048 wrote to memory of 1252 3048 msedge.exe 87 PID 3048 wrote to memory of 1252 3048 msedge.exe 87 PID 3048 wrote to memory of 1252 3048 msedge.exe 87 PID 3048 wrote to memory of 1252 3048 msedge.exe 87 PID 3048 wrote to memory of 1252 3048 msedge.exe 87 PID 3048 wrote to memory of 1252 3048 msedge.exe 87 PID 3048 wrote to memory of 1252 3048 msedge.exe 87 PID 3048 wrote to memory of 1252 3048 msedge.exe 87 PID 3048 wrote to memory of 1252 3048 msedge.exe 87 PID 3048 wrote to memory of 1252 3048 msedge.exe 87 PID 3048 wrote to memory of 1252 3048 msedge.exe 87 PID 3048 wrote to memory of 1252 3048 msedge.exe 87 PID 3048 wrote to memory of 1252 3048 msedge.exe 87 PID 3048 wrote to memory of 1252 3048 msedge.exe 87 PID 3048 wrote to memory of 1252 3048 msedge.exe 87 PID 3048 wrote to memory of 1252 3048 msedge.exe 87 PID 3048 wrote to memory of 1252 3048 msedge.exe 87 PID 3048 wrote to memory of 1252 3048 msedge.exe 87 PID 3048 wrote to memory of 1252 3048 msedge.exe 87 PID 3048 wrote to memory of 1252 3048 msedge.exe 87 PID 3048 wrote to memory of 1252 3048 msedge.exe 87 PID 3048 wrote to memory of 1252 3048 msedge.exe 87 PID 3048 wrote to memory of 1252 3048 msedge.exe 87 PID 3048 wrote to memory of 1252 3048 msedge.exe 87 PID 3048 wrote to memory of 1252 3048 msedge.exe 87 PID 3048 wrote to memory of 1252 3048 msedge.exe 87 PID 3048 wrote to memory of 1252 3048 msedge.exe 87 PID 3048 wrote to memory of 3604 3048 msedge.exe 88 PID 3048 wrote to memory of 3604 3048 msedge.exe 88 PID 3048 wrote to memory of 1380 3048 msedge.exe 89 PID 3048 wrote to memory of 1380 3048 msedge.exe 89 PID 3048 wrote to memory of 1380 3048 msedge.exe 89 PID 3048 wrote to memory of 1380 3048 msedge.exe 89 PID 3048 wrote to memory of 1380 3048 msedge.exe 89 PID 3048 wrote to memory of 1380 3048 msedge.exe 89 PID 3048 wrote to memory of 1380 3048 msedge.exe 89 PID 3048 wrote to memory of 1380 3048 msedge.exe 89 PID 3048 wrote to memory of 1380 3048 msedge.exe 89 PID 3048 wrote to memory of 1380 3048 msedge.exe 89 PID 3048 wrote to memory of 1380 3048 msedge.exe 89 PID 3048 wrote to memory of 1380 3048 msedge.exe 89 PID 3048 wrote to memory of 1380 3048 msedge.exe 89 PID 3048 wrote to memory of 1380 3048 msedge.exe 89 PID 3048 wrote to memory of 1380 3048 msedge.exe 89 PID 3048 wrote to memory of 1380 3048 msedge.exe 89 PID 3048 wrote to memory of 1380 3048 msedge.exe 89 PID 3048 wrote to memory of 1380 3048 msedge.exe 89 PID 3048 wrote to memory of 1380 3048 msedge.exe 89 PID 3048 wrote to memory of 1380 3048 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\fca36f712a5e1649fa55bb76d535a333_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff80d6b46f8,0x7ff80d6b4708,0x7ff80d6b47182⤵PID:1136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2036,8776022337917015072,14497572579486870108,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2076 /prefetch:22⤵PID:1252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2036,8776022337917015072,14497572579486870108,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2428 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2036,8776022337917015072,14497572579486870108,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2988 /prefetch:82⤵PID:1380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,8776022337917015072,14497572579486870108,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:2016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,8776022337917015072,14497572579486870108,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:2768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,8776022337917015072,14497572579486870108,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4776 /prefetch:12⤵PID:2360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,8776022337917015072,14497572579486870108,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4240 /prefetch:12⤵PID:4376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,8776022337917015072,14497572579486870108,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5792 /prefetch:12⤵PID:4472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2036,8776022337917015072,14497572579486870108,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5248 /prefetch:82⤵PID:5884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2036,8776022337917015072,14497572579486870108,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5248 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,8776022337917015072,14497572579486870108,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1812 /prefetch:12⤵PID:6112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,8776022337917015072,14497572579486870108,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6108 /prefetch:12⤵PID:6120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,8776022337917015072,14497572579486870108,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4172 /prefetch:12⤵PID:5380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,8776022337917015072,14497572579486870108,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5872 /prefetch:12⤵PID:5224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2036,8776022337917015072,14497572579486870108,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5280 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1500
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5104
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:864
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e36b219dcae7d32ec82cec3245512f80
SHA16b2bd46e4f6628d66f7ec4b5c399b8c9115a9466
SHA25616bc6f47bbfbd4e54c3163dafe784486b72d0b78e6ea3593122edb338448a27b
SHA512fc539c461d87141a180cf71bb6a636c75517e5e7226e76b71fd64e834dcacc88fcaaa92a9a00999bc0afc4fb93b7304b068000f14653c05ff03dd7baef3f225c
-
Filesize
152B
MD5559ff144c30d6a7102ec298fb7c261c4
SHA1badecb08f9a6c849ce5b30c348156b45ac9120b9
SHA2565444032cb994b90287c0262f2fba16f38e339073fd89aa3ab2592dfebc3e6f10
SHA5123a45661fc29e312aa643a12447bffdab83128fe5124077a870090081af6aaa4cf0bd021889ab1df5cd40f44adb055b1394b31313515c2929f714824c89fd0f04
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\520c2d8f-38e4-403c-abba-c23cfd6ddd13.tmp
Filesize6KB
MD5fed2881886eb3c67571a7651aa6a5243
SHA1c9bc2303901332e0c23d8b4cb7a6e9a645c13c54
SHA2562ce745e36670515188062f4c0a6f3faa7843a05ad5efda4fe7cb4b548d3fefd7
SHA512139b68c2fedb8006518bd77e6ade97416dc7eb2e2574bb007cac2d7f3f0af9aeb97c0151b7ef9c5bfae2e611bd580f9ef0b9e34a4ca77c7e21508278480e5bcc
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD571c5030c0b0ab2ee0875f1c318ef5d71
SHA1764fc97f7e6f253574dadab6db13459e4096e7ad
SHA25688164d3bbfba6fb46f7b74f63d4314882fab44f4790c5bcc9ca7306c5ead8c46
SHA5123897bf3331bec42a535bba612226f5fd38199001b8418bc67b292ba1e0bb715751e53bd4f06651276b2bbee4eac4c0d704d74abbd2068944039c08188de13796
-
Filesize
1KB
MD53610b11440f9367974efec4fc3246382
SHA1c0bf3fce1c53023324718c8e8bfb8db373866171
SHA256d9588dbc3a0f4024a2e303d0496f45f7577a123a6fa888f949c3ba76e7b2e452
SHA512f7d942bef65f148e28265a7eee5df1a33056929f6db50e5f4e81d7c2efcc1d6b7efa7ff57492b41632c36c7ab69e687ebdbd3fb41dab0cd7ab40e022aa023073
-
Filesize
6KB
MD5e41ecedaacb1930f4ecd994b96b69878
SHA1c973c845bb522b28176f6ff78655b1fdb194ada2
SHA256a9cfc26efc5ea58ba9217313dc2c22817f00eaa1126e475cf0db605d08d32fb7
SHA5129dd11741e28fed625b733557a6f8795c574fd5b0705dbb97d659a55d5d7d3425d920a41b1db188248e8603e3af3fc30f08b5a5e6e0c04bec3872146e36911a56
-
Filesize
6KB
MD5f31a0c06a5431cacbc2f85aca2af52b2
SHA1f13ca67891087c6072e6e775defd82b9eedaa958
SHA25613ceb9e01261d064c4a1bb97229c22183dd67380908a65e8d0379a305763e844
SHA512a0bb2a7e378a36fdd29bc20a9844e1cbb09f7afa6a84030903231242641dac404eedea9199d019d7ffae91c359a9e763ad6339355fd8800a7b4ba16b3ba5e180
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5b0b61b9274062a598427f7a808d65424
SHA19dc2928f92c8f11a89e302c8209a42831f7f6874
SHA2563fb3dc6a791337808891947845c5a3810b2fb17511129bc19f790ba2a6243648
SHA5120e013cec8a7098c46a3eb45eb843127cc2e295234bf8e9b3dd15d72433b3bbeee229209e681e69a441ef35d7d4d0adbfc3b8e796914da957fb9316b91de4bb98