Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
20-04-2024 21:10
Static task
static1
Behavioral task
behavioral1
Sample
fda76ee9e2e62b2f5a31545aa1f977c1_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
fda76ee9e2e62b2f5a31545aa1f977c1_JaffaCakes118.html
Resource
win10v2004-20240412-en
General
-
Target
fda76ee9e2e62b2f5a31545aa1f977c1_JaffaCakes118.html
-
Size
16KB
-
MD5
fda76ee9e2e62b2f5a31545aa1f977c1
-
SHA1
d5452af861d78e752be5d9b34834a409eafc36c6
-
SHA256
e6bde3fc4db9700ac4d13f4111a3bac07f2b88756ae0fefeb97bc346300165fe
-
SHA512
cb66e243b703e2d369ea08db4ff324ceeb2c55ae209861b02eea408581bfff540a81c5f5e1c1cfe947c2646f0a66da01745440ef11bd043ced8e2eaaa33aa36b
-
SSDEEP
384:dtztc3qFHj87+stNQsNTghfuwQhn7KH2V:tc3qFHj8htNQsNT08pK8
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4844 msedge.exe 4844 msedge.exe 2908 msedge.exe 2908 msedge.exe 760 identity_helper.exe 760 identity_helper.exe 5256 msedge.exe 5256 msedge.exe 5256 msedge.exe 5256 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2908 wrote to memory of 2204 2908 msedge.exe 86 PID 2908 wrote to memory of 2204 2908 msedge.exe 86 PID 2908 wrote to memory of 1912 2908 msedge.exe 87 PID 2908 wrote to memory of 1912 2908 msedge.exe 87 PID 2908 wrote to memory of 1912 2908 msedge.exe 87 PID 2908 wrote to memory of 1912 2908 msedge.exe 87 PID 2908 wrote to memory of 1912 2908 msedge.exe 87 PID 2908 wrote to memory of 1912 2908 msedge.exe 87 PID 2908 wrote to memory of 1912 2908 msedge.exe 87 PID 2908 wrote to memory of 1912 2908 msedge.exe 87 PID 2908 wrote to memory of 1912 2908 msedge.exe 87 PID 2908 wrote to memory of 1912 2908 msedge.exe 87 PID 2908 wrote to memory of 1912 2908 msedge.exe 87 PID 2908 wrote to memory of 1912 2908 msedge.exe 87 PID 2908 wrote to memory of 1912 2908 msedge.exe 87 PID 2908 wrote to memory of 1912 2908 msedge.exe 87 PID 2908 wrote to memory of 1912 2908 msedge.exe 87 PID 2908 wrote to memory of 1912 2908 msedge.exe 87 PID 2908 wrote to memory of 1912 2908 msedge.exe 87 PID 2908 wrote to memory of 1912 2908 msedge.exe 87 PID 2908 wrote to memory of 1912 2908 msedge.exe 87 PID 2908 wrote to memory of 1912 2908 msedge.exe 87 PID 2908 wrote to memory of 1912 2908 msedge.exe 87 PID 2908 wrote to memory of 1912 2908 msedge.exe 87 PID 2908 wrote to memory of 1912 2908 msedge.exe 87 PID 2908 wrote to memory of 1912 2908 msedge.exe 87 PID 2908 wrote to memory of 1912 2908 msedge.exe 87 PID 2908 wrote to memory of 1912 2908 msedge.exe 87 PID 2908 wrote to memory of 1912 2908 msedge.exe 87 PID 2908 wrote to memory of 1912 2908 msedge.exe 87 PID 2908 wrote to memory of 1912 2908 msedge.exe 87 PID 2908 wrote to memory of 1912 2908 msedge.exe 87 PID 2908 wrote to memory of 1912 2908 msedge.exe 87 PID 2908 wrote to memory of 1912 2908 msedge.exe 87 PID 2908 wrote to memory of 1912 2908 msedge.exe 87 PID 2908 wrote to memory of 1912 2908 msedge.exe 87 PID 2908 wrote to memory of 1912 2908 msedge.exe 87 PID 2908 wrote to memory of 1912 2908 msedge.exe 87 PID 2908 wrote to memory of 1912 2908 msedge.exe 87 PID 2908 wrote to memory of 1912 2908 msedge.exe 87 PID 2908 wrote to memory of 1912 2908 msedge.exe 87 PID 2908 wrote to memory of 1912 2908 msedge.exe 87 PID 2908 wrote to memory of 4844 2908 msedge.exe 88 PID 2908 wrote to memory of 4844 2908 msedge.exe 88 PID 2908 wrote to memory of 3284 2908 msedge.exe 89 PID 2908 wrote to memory of 3284 2908 msedge.exe 89 PID 2908 wrote to memory of 3284 2908 msedge.exe 89 PID 2908 wrote to memory of 3284 2908 msedge.exe 89 PID 2908 wrote to memory of 3284 2908 msedge.exe 89 PID 2908 wrote to memory of 3284 2908 msedge.exe 89 PID 2908 wrote to memory of 3284 2908 msedge.exe 89 PID 2908 wrote to memory of 3284 2908 msedge.exe 89 PID 2908 wrote to memory of 3284 2908 msedge.exe 89 PID 2908 wrote to memory of 3284 2908 msedge.exe 89 PID 2908 wrote to memory of 3284 2908 msedge.exe 89 PID 2908 wrote to memory of 3284 2908 msedge.exe 89 PID 2908 wrote to memory of 3284 2908 msedge.exe 89 PID 2908 wrote to memory of 3284 2908 msedge.exe 89 PID 2908 wrote to memory of 3284 2908 msedge.exe 89 PID 2908 wrote to memory of 3284 2908 msedge.exe 89 PID 2908 wrote to memory of 3284 2908 msedge.exe 89 PID 2908 wrote to memory of 3284 2908 msedge.exe 89 PID 2908 wrote to memory of 3284 2908 msedge.exe 89 PID 2908 wrote to memory of 3284 2908 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\fda76ee9e2e62b2f5a31545aa1f977c1_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xd8,0x100,0x104,0xdc,0x108,0x7ffffb9046f8,0x7ffffb904708,0x7ffffb9047182⤵PID:2204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1960,8564080834731005365,18114082035685324203,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2072 /prefetch:22⤵PID:1912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1960,8564080834731005365,18114082035685324203,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2468 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1960,8564080834731005365,18114082035685324203,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2916 /prefetch:82⤵PID:3284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1960,8564080834731005365,18114082035685324203,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:3876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1960,8564080834731005365,18114082035685324203,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1960,8564080834731005365,18114082035685324203,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4212 /prefetch:12⤵PID:744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1960,8564080834731005365,18114082035685324203,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5064 /prefetch:12⤵PID:2424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1960,8564080834731005365,18114082035685324203,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5688 /prefetch:12⤵PID:2352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1960,8564080834731005365,18114082035685324203,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4928 /prefetch:12⤵PID:4800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1960,8564080834731005365,18114082035685324203,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5856 /prefetch:82⤵PID:2276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1960,8564080834731005365,18114082035685324203,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5856 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1960,8564080834731005365,18114082035685324203,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5524 /prefetch:12⤵PID:3728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1960,8564080834731005365,18114082035685324203,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5504 /prefetch:12⤵PID:3900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1960,8564080834731005365,18114082035685324203,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5388 /prefetch:12⤵PID:5176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1960,8564080834731005365,18114082035685324203,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3544 /prefetch:12⤵PID:5184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1960,8564080834731005365,18114082035685324203,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5256
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2428
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3480
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD548cff1baabb24706967de3b0d6869906
SHA1b0cd54f587cd4c88e60556347930cb76991e6734
SHA256f6b5fbc610a71b3914753feb2bd4475a7c77d0d785cc36255bf93b3fe3ccb775
SHA512fd0c848f3f9de81aca81af999262f96ea4c1cd1d1f32d304f56c7382f3b1bb604e5fbe9f209ad6e4b38988d92357ef82e9668806d0727f2856c7dc1f07aae2b6
-
Filesize
198KB
MD5319e0c36436ee0bf24476acbcc83565c
SHA1fb2658d5791fe5b37424119557ab8cee30acdc54
SHA256f6562ea52e056b979d6f52932ae57b7afb04486b10b0ebde22c5b51f502c69d1
SHA512ad902b9a010cf99bdedba405cad0387890a9ff90a9c91f6a3220cdceec1b08ecb97a326aef01b28d8d0aacb5f2a16f02f673e196bdb69fc68b3f636139059902
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize312B
MD5552ebd325d325c41518324408b77fbd5
SHA1d6ebf4886e6b1873e95861629e48587d76dadee4
SHA2561eec25386a745e9758078a395c9ef5ca31ce0dbd8602ad00e21b621b8d262f23
SHA5126175e803821686d767191f85fad1305991381abbdd93c230f6ecd4eb2c9cb9d0498531ccfef8c247bbdfdfab9a58a8389f378c0dc49f9520217be57e62f2e9ec
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
1KB
MD5bf59e3b102775b5c827bc745e7f5d342
SHA1b4ab7ed0d72a7d7b441bcc7fd9278faa0e85aed8
SHA2565fde1451aa677d9a26577a0ab02753db5a4a751795e93509071019bd3c48bc20
SHA512886c5a7949c91bff635b10c7e3ae041d409b41c25d1a19bd187f2d5845a0957818d482aec6f977a0ea206000cbb63a3742496fb541c687a52b702b8848a37bcf
-
Filesize
6KB
MD5412b1e325831d5e538d24b7caa44ab81
SHA1a93c06be1a6b22921b7683d4538a963c314aacb1
SHA256dc34f6084fdf8e28330cdfa51ac436694a024bd771617e6496c79bfe69b961d5
SHA512342e99c86282f69f1cf0c5574e7bcf4b1977e08753b7db7646ae1e235c7485fb704b9c56dbc121e4eee7de03a6cad4d01250575196955dc871f8a02e8ae37277
-
Filesize
6KB
MD572b163aae45f2b6af9e9ba1f666f64f5
SHA1d6fb9e579bbda6c4dd4c82d868d86298e8854609
SHA2568d2b5dba2b1f780307c90e7ee99c51f8afaa4fa299bbbcb9975be4241cf2e870
SHA51293969defd8d3ef0be1bc27e1c48948f33dfe71476d7520da3cd3e2d0d059a87352b06ce5b8222e68fcf4b5b0d6b79b0e53860479109a503f9f01f2b666eafa0c
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5940ad6744b6ff66737169ca8a16e8bc3
SHA108bd45aadbf9855e8b9b17adaecd47941a538dd9
SHA25656099bf16d6e9bb56249360554916e4bb90dd41bfa43f235a857c34bd06b5032
SHA5122abe95456891cc42e2d522bc437f1aa7655f88a66ada8615d9570254fe6700da4c3f7e3df3501ef9eaaa700cbf7a8585e23f918a8e011afdfc60c345519c3e11