Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
26-04-2024 07:48
Static task
static1
Behavioral task
behavioral1
Sample
004f351341335fe29affdb6bc2ffde24_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
004f351341335fe29affdb6bc2ffde24_JaffaCakes118.html
Resource
win10v2004-20240412-en
General
-
Target
004f351341335fe29affdb6bc2ffde24_JaffaCakes118.html
-
Size
175KB
-
MD5
004f351341335fe29affdb6bc2ffde24
-
SHA1
e7f4de8976cde4af660cf6c4c20eb9f8c2cac6eb
-
SHA256
b232c3401b25be72590a6692eea729bafea25be4295280697c18423653c22766
-
SHA512
051cd1721659664b466e864590595eecef7b938de50d4e73009c09c4ae9321d044af421367cb79bf1fceee67960383b1cfa8a5ec2e149f4ad2df13b4415333af
-
SSDEEP
1536:Sqtd8hd8Wu8pI8Cd8hd8dQg0H//3oS3MGNkF4YfBCJisN+aeTH+WK/Lf1/hmnVSV:S4oT3M/FdBCJihm
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2104 msedge.exe 2104 msedge.exe 404 msedge.exe 404 msedge.exe 1408 identity_helper.exe 1408 identity_helper.exe 5428 msedge.exe 5428 msedge.exe 5428 msedge.exe 5428 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 404 wrote to memory of 3604 404 msedge.exe 84 PID 404 wrote to memory of 3604 404 msedge.exe 84 PID 404 wrote to memory of 1788 404 msedge.exe 85 PID 404 wrote to memory of 1788 404 msedge.exe 85 PID 404 wrote to memory of 1788 404 msedge.exe 85 PID 404 wrote to memory of 1788 404 msedge.exe 85 PID 404 wrote to memory of 1788 404 msedge.exe 85 PID 404 wrote to memory of 1788 404 msedge.exe 85 PID 404 wrote to memory of 1788 404 msedge.exe 85 PID 404 wrote to memory of 1788 404 msedge.exe 85 PID 404 wrote to memory of 1788 404 msedge.exe 85 PID 404 wrote to memory of 1788 404 msedge.exe 85 PID 404 wrote to memory of 1788 404 msedge.exe 85 PID 404 wrote to memory of 1788 404 msedge.exe 85 PID 404 wrote to memory of 1788 404 msedge.exe 85 PID 404 wrote to memory of 1788 404 msedge.exe 85 PID 404 wrote to memory of 1788 404 msedge.exe 85 PID 404 wrote to memory of 1788 404 msedge.exe 85 PID 404 wrote to memory of 1788 404 msedge.exe 85 PID 404 wrote to memory of 1788 404 msedge.exe 85 PID 404 wrote to memory of 1788 404 msedge.exe 85 PID 404 wrote to memory of 1788 404 msedge.exe 85 PID 404 wrote to memory of 1788 404 msedge.exe 85 PID 404 wrote to memory of 1788 404 msedge.exe 85 PID 404 wrote to memory of 1788 404 msedge.exe 85 PID 404 wrote to memory of 1788 404 msedge.exe 85 PID 404 wrote to memory of 1788 404 msedge.exe 85 PID 404 wrote to memory of 1788 404 msedge.exe 85 PID 404 wrote to memory of 1788 404 msedge.exe 85 PID 404 wrote to memory of 1788 404 msedge.exe 85 PID 404 wrote to memory of 1788 404 msedge.exe 85 PID 404 wrote to memory of 1788 404 msedge.exe 85 PID 404 wrote to memory of 1788 404 msedge.exe 85 PID 404 wrote to memory of 1788 404 msedge.exe 85 PID 404 wrote to memory of 1788 404 msedge.exe 85 PID 404 wrote to memory of 1788 404 msedge.exe 85 PID 404 wrote to memory of 1788 404 msedge.exe 85 PID 404 wrote to memory of 1788 404 msedge.exe 85 PID 404 wrote to memory of 1788 404 msedge.exe 85 PID 404 wrote to memory of 1788 404 msedge.exe 85 PID 404 wrote to memory of 1788 404 msedge.exe 85 PID 404 wrote to memory of 1788 404 msedge.exe 85 PID 404 wrote to memory of 2104 404 msedge.exe 86 PID 404 wrote to memory of 2104 404 msedge.exe 86 PID 404 wrote to memory of 1932 404 msedge.exe 87 PID 404 wrote to memory of 1932 404 msedge.exe 87 PID 404 wrote to memory of 1932 404 msedge.exe 87 PID 404 wrote to memory of 1932 404 msedge.exe 87 PID 404 wrote to memory of 1932 404 msedge.exe 87 PID 404 wrote to memory of 1932 404 msedge.exe 87 PID 404 wrote to memory of 1932 404 msedge.exe 87 PID 404 wrote to memory of 1932 404 msedge.exe 87 PID 404 wrote to memory of 1932 404 msedge.exe 87 PID 404 wrote to memory of 1932 404 msedge.exe 87 PID 404 wrote to memory of 1932 404 msedge.exe 87 PID 404 wrote to memory of 1932 404 msedge.exe 87 PID 404 wrote to memory of 1932 404 msedge.exe 87 PID 404 wrote to memory of 1932 404 msedge.exe 87 PID 404 wrote to memory of 1932 404 msedge.exe 87 PID 404 wrote to memory of 1932 404 msedge.exe 87 PID 404 wrote to memory of 1932 404 msedge.exe 87 PID 404 wrote to memory of 1932 404 msedge.exe 87 PID 404 wrote to memory of 1932 404 msedge.exe 87 PID 404 wrote to memory of 1932 404 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\004f351341335fe29affdb6bc2ffde24_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:404 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9675246f8,0x7ff967524708,0x7ff9675247182⤵PID:3604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,14241272610419656819,4474061295215839204,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2172 /prefetch:22⤵PID:1788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,14241272610419656819,4474061295215839204,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2224 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,14241272610419656819,4474061295215839204,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2780 /prefetch:82⤵PID:1932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,14241272610419656819,4474061295215839204,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:4284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,14241272610419656819,4474061295215839204,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:4600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,14241272610419656819,4474061295215839204,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4196 /prefetch:12⤵PID:4924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,14241272610419656819,4474061295215839204,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4380 /prefetch:12⤵PID:1928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,14241272610419656819,4474061295215839204,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4560 /prefetch:12⤵PID:1984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,14241272610419656819,4474061295215839204,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4544 /prefetch:12⤵PID:2484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,14241272610419656819,4474061295215839204,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5236 /prefetch:82⤵PID:4924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,14241272610419656819,4474061295215839204,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5236 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,14241272610419656819,4474061295215839204,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5592 /prefetch:12⤵PID:5140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,14241272610419656819,4474061295215839204,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6132 /prefetch:12⤵PID:5148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,14241272610419656819,4474061295215839204,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4020 /prefetch:12⤵PID:5464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,14241272610419656819,4474061295215839204,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4528 /prefetch:12⤵PID:5472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,14241272610419656819,4474061295215839204,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2684 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5428
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4888
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4324
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2848
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5cff358b013d6f9f633bc1587f6f54ffa
SHA16cb7852e096be24695ff1bc213abde42d35bb376
SHA25639205cdf989e3a86822b3f473c5fc223d7290b98c2a3fb7f75e366fc8e3ecbe9
SHA5128831c223a1f0cf5f71fa851cdd82f4a9f03e5f267513e05b936756c116997f749ffa563623b4724de921d049de34a8f277cc539f58997cda4d178ea205be2259
-
Filesize
152B
MD5dc629a750e345390344524fe0ea7dcd7
SHA15f9f00a358caaef0321707c4f6f38d52bd7e0399
SHA25638b634f3fedcf2a9dc3280aa76bd1ea93e192200b8a48904664fac5c9944636a
SHA5122a941fe90b748d0326e011258fa9b494dc2f47ac047767455ed16a41d523f04370f818316503a5bad0ff5c5699e92a0aaf3952748b09287c5328354bfa6cc902
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\48747657-dcb5-427b-adc6-00ae0839fe9f.tmp
Filesize2KB
MD58dfc8bfb1125527106b01898d08eca25
SHA16d0c9589aa2c7d0be3ce3711b65c78674070b702
SHA256eb6a1980299345e1e949bc5762c34ecf2c1a37cd3f9b561fd2cc6122b82a5cd7
SHA512006d69319858265847fd3bf6dc19ec922cccb3aa2c30b37cdfd6724604184a75bdd228ca8235c56b73b4d1051bedcedc7e6539c985938e60a85f33f22299e7d7
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize336B
MD51d586cab67ee13a02c3b75d1f17c7870
SHA1d5effd47a4bfba6c7277dbe4b56ce2e7127af9f6
SHA256df7c34bc9a36a6a68dc1c2025dcaa2c0aaf107efa36b9adbb6aed4d88a69e9a1
SHA512910f860aee6ee29e2b8c7feb650b38a333786ad28de46130371be2babc6748ab9d20d35721fb41647c2e87227bd297fd20b55e4bee99a0d39cd3f472ef30c736
-
Filesize
2KB
MD59cea98ca59c8d36727b183bf071e6e6f
SHA13d6322ad3f04b52355a95a28dc1c716fa3c1c40f
SHA256c8ebb2ec76b2bc978128710d76d7fce8f8572187ddf02214d51204437f8b0079
SHA512027be6cb0d2a6adc02fda0c0dde3ae44e2f9f043a99bd3be63440dc170849a9cbc0fdc9157f9cb69074c8d7a265ffd411495364fd1ff5fa212bc71186207b17a
-
Filesize
5KB
MD5eee3b320137f14168f796285cace0f28
SHA1d100ab124bdf7a76ceade5462ca5fd8bc22beaec
SHA2560af195b32f91299d795565383ca5ec2ae4cfbbaaec0fa0a32469d7d7ae46f679
SHA5129bdcc49ef76b415f119d289c4cf24f426eb10d77f22c410f8baced09ffb401315a043bded9a67a9103c2cf3b0962690497d437c780f716e04082bd1f1e92264b
-
Filesize
7KB
MD5afacdc598055a30a676ff71893ea96e1
SHA11ee4660505dbd496035c4e89c520483cfd75257f
SHA256ebed09ac542b6c22686216bdf4abed023cdcf46fb0053a385fa24d1046d204df
SHA512b2855a61d9bf5d8a9119593fcfd676934850d79442c46977c698a600c01130cb5c26ff1e4e7eeef418aff43f528abd2d6c31cd1ac6adfb872066e91b762335ba
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD504d1f8eeaabde573fc0b1ba62aa563b3
SHA1706de057f304ce5124fcda531832f1b084b8ae4a
SHA256d96f74f1b7939ce025798b9a5e5eefe540522ec68ff899f2b65c4ea604b91834
SHA512e0c22aef40d4a36c8a45d108192fc928b96cefcc8449385cf909f7924f6b6d48c3245b3d2b3fcf002ffc0c844ca06ac8964f0fb12cbec3f848bce878644fd9ac