Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
27-04-2024 10:31
Static task
static1
Behavioral task
behavioral1
Sample
030d52dda1e16bbedc05b8f11204b37e_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
030d52dda1e16bbedc05b8f11204b37e_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
030d52dda1e16bbedc05b8f11204b37e_JaffaCakes118.html
-
Size
64KB
-
MD5
030d52dda1e16bbedc05b8f11204b37e
-
SHA1
9d1c7864283e38f0ecde24efdeeb9d57748779be
-
SHA256
d4e44fbab5f70200a96f082ef00bf3a39ca3e82feb7865b6fc3ca4de2cfbcada
-
SHA512
c7a5e7a7d603b981baca793003264bdc188683fa6f99767411eab93cf0694acaac79f6409fba410746dff0e68bb6f0977248f099e6684c6e945fa0e5f660e3aa
-
SSDEEP
1536:LDIHDImEI9m20jgGH86/OdiUxUFYayrzq/oD9k6uEVCJCEkCWe8kUvL4cSkXN:LDIHDI5E6/TUxUFYayrzqAycrSkXN
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 5024 msedge.exe 5024 msedge.exe 2492 msedge.exe 2492 msedge.exe 2984 identity_helper.exe 2984 identity_helper.exe 2716 msedge.exe 2716 msedge.exe 2716 msedge.exe 2716 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2492 msedge.exe 2492 msedge.exe 2492 msedge.exe 2492 msedge.exe 2492 msedge.exe 2492 msedge.exe 2492 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2492 msedge.exe 2492 msedge.exe 2492 msedge.exe 2492 msedge.exe 2492 msedge.exe 2492 msedge.exe 2492 msedge.exe 2492 msedge.exe 2492 msedge.exe 2492 msedge.exe 2492 msedge.exe 2492 msedge.exe 2492 msedge.exe 2492 msedge.exe 2492 msedge.exe 2492 msedge.exe 2492 msedge.exe 2492 msedge.exe 2492 msedge.exe 2492 msedge.exe 2492 msedge.exe 2492 msedge.exe 2492 msedge.exe 2492 msedge.exe 2492 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2492 msedge.exe 2492 msedge.exe 2492 msedge.exe 2492 msedge.exe 2492 msedge.exe 2492 msedge.exe 2492 msedge.exe 2492 msedge.exe 2492 msedge.exe 2492 msedge.exe 2492 msedge.exe 2492 msedge.exe 2492 msedge.exe 2492 msedge.exe 2492 msedge.exe 2492 msedge.exe 2492 msedge.exe 2492 msedge.exe 2492 msedge.exe 2492 msedge.exe 2492 msedge.exe 2492 msedge.exe 2492 msedge.exe 2492 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2492 wrote to memory of 2300 2492 msedge.exe 80 PID 2492 wrote to memory of 2300 2492 msedge.exe 80 PID 2492 wrote to memory of 524 2492 msedge.exe 82 PID 2492 wrote to memory of 524 2492 msedge.exe 82 PID 2492 wrote to memory of 524 2492 msedge.exe 82 PID 2492 wrote to memory of 524 2492 msedge.exe 82 PID 2492 wrote to memory of 524 2492 msedge.exe 82 PID 2492 wrote to memory of 524 2492 msedge.exe 82 PID 2492 wrote to memory of 524 2492 msedge.exe 82 PID 2492 wrote to memory of 524 2492 msedge.exe 82 PID 2492 wrote to memory of 524 2492 msedge.exe 82 PID 2492 wrote to memory of 524 2492 msedge.exe 82 PID 2492 wrote to memory of 524 2492 msedge.exe 82 PID 2492 wrote to memory of 524 2492 msedge.exe 82 PID 2492 wrote to memory of 524 2492 msedge.exe 82 PID 2492 wrote to memory of 524 2492 msedge.exe 82 PID 2492 wrote to memory of 524 2492 msedge.exe 82 PID 2492 wrote to memory of 524 2492 msedge.exe 82 PID 2492 wrote to memory of 524 2492 msedge.exe 82 PID 2492 wrote to memory of 524 2492 msedge.exe 82 PID 2492 wrote to memory of 524 2492 msedge.exe 82 PID 2492 wrote to memory of 524 2492 msedge.exe 82 PID 2492 wrote to memory of 524 2492 msedge.exe 82 PID 2492 wrote to memory of 524 2492 msedge.exe 82 PID 2492 wrote to memory of 524 2492 msedge.exe 82 PID 2492 wrote to memory of 524 2492 msedge.exe 82 PID 2492 wrote to memory of 524 2492 msedge.exe 82 PID 2492 wrote to memory of 524 2492 msedge.exe 82 PID 2492 wrote to memory of 524 2492 msedge.exe 82 PID 2492 wrote to memory of 524 2492 msedge.exe 82 PID 2492 wrote to memory of 524 2492 msedge.exe 82 PID 2492 wrote to memory of 524 2492 msedge.exe 82 PID 2492 wrote to memory of 524 2492 msedge.exe 82 PID 2492 wrote to memory of 524 2492 msedge.exe 82 PID 2492 wrote to memory of 524 2492 msedge.exe 82 PID 2492 wrote to memory of 524 2492 msedge.exe 82 PID 2492 wrote to memory of 524 2492 msedge.exe 82 PID 2492 wrote to memory of 524 2492 msedge.exe 82 PID 2492 wrote to memory of 524 2492 msedge.exe 82 PID 2492 wrote to memory of 524 2492 msedge.exe 82 PID 2492 wrote to memory of 524 2492 msedge.exe 82 PID 2492 wrote to memory of 524 2492 msedge.exe 82 PID 2492 wrote to memory of 5024 2492 msedge.exe 83 PID 2492 wrote to memory of 5024 2492 msedge.exe 83 PID 2492 wrote to memory of 4916 2492 msedge.exe 84 PID 2492 wrote to memory of 4916 2492 msedge.exe 84 PID 2492 wrote to memory of 4916 2492 msedge.exe 84 PID 2492 wrote to memory of 4916 2492 msedge.exe 84 PID 2492 wrote to memory of 4916 2492 msedge.exe 84 PID 2492 wrote to memory of 4916 2492 msedge.exe 84 PID 2492 wrote to memory of 4916 2492 msedge.exe 84 PID 2492 wrote to memory of 4916 2492 msedge.exe 84 PID 2492 wrote to memory of 4916 2492 msedge.exe 84 PID 2492 wrote to memory of 4916 2492 msedge.exe 84 PID 2492 wrote to memory of 4916 2492 msedge.exe 84 PID 2492 wrote to memory of 4916 2492 msedge.exe 84 PID 2492 wrote to memory of 4916 2492 msedge.exe 84 PID 2492 wrote to memory of 4916 2492 msedge.exe 84 PID 2492 wrote to memory of 4916 2492 msedge.exe 84 PID 2492 wrote to memory of 4916 2492 msedge.exe 84 PID 2492 wrote to memory of 4916 2492 msedge.exe 84 PID 2492 wrote to memory of 4916 2492 msedge.exe 84 PID 2492 wrote to memory of 4916 2492 msedge.exe 84 PID 2492 wrote to memory of 4916 2492 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\030d52dda1e16bbedc05b8f11204b37e_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff84b6d46f8,0x7ff84b6d4708,0x7ff84b6d47182⤵PID:2300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2212,15123847032639441617,4417588557169999989,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2224 /prefetch:22⤵PID:524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2212,15123847032639441617,4417588557169999989,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2276 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2212,15123847032639441617,4417588557169999989,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2920 /prefetch:82⤵PID:4916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,15123847032639441617,4417588557169999989,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:1952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,15123847032639441617,4417588557169999989,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:1448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,15123847032639441617,4417588557169999989,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6120 /prefetch:12⤵PID:220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2212,15123847032639441617,4417588557169999989,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5696 /prefetch:82⤵PID:3388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2212,15123847032639441617,4417588557169999989,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5696 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,15123847032639441617,4417588557169999989,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5880 /prefetch:12⤵PID:3056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,15123847032639441617,4417588557169999989,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5836 /prefetch:12⤵PID:2716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,15123847032639441617,4417588557169999989,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6112 /prefetch:12⤵PID:4752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,15123847032639441617,4417588557169999989,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6020 /prefetch:12⤵PID:444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2212,15123847032639441617,4417588557169999989,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4792 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2716
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3272
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4672
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54f7152bc5a1a715ef481e37d1c791959
SHA1c8a1ed674c62ae4f45519f90a8cc5a81eff3a6d7
SHA256704dd4f98d8ca34ec421f23ba1891b178c23c14b3301e4655efc5c02d356c2bc
SHA5122e6b02ca35d76a655a17a5f3e9dbd8d7517c7dae24f0095c7350eb9e7bdf9e1256a7009aa8878f96c89d1ea4fe5323a41f72b8c551806dda62880d7ff231ff5c
-
Filesize
152B
MD5ea98e583ad99df195d29aa066204ab56
SHA1f89398664af0179641aa0138b337097b617cb2db
SHA256a7abb51435909fa2d75c6f2ff5c69a93d4a0ab276ed579e7d8733b2a63ffbee6
SHA512e109be3466e653e5d310b3e402e1626298b09205d223722a82344dd78504f3c33e1e24e8402a02f38cd2c9c50d96a303ce4846bea5a583423937ab018cd5782f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD50e4f2bf45be24ccd159f9ef48591c3c9
SHA1e635ff87169246281c8828c2d44add04e099494b
SHA256f40b84620e37dd3928da0d50f7840050f69318fedfdb0e4e6d1338afeb2dd480
SHA512bda5c4cd82d60deeffb24a3723fdae5c76d73655282b7f9b11890f2daa7e542e864591388785b16565f02e41dcd86777b450c6d77f8fa7a082f421f40dcdde50
-
Filesize
1KB
MD534621164ec7d8035ea829710df254d36
SHA134716c360fb3cb73bcc0b40e140aff789ac38237
SHA25671f6180877261048bdc120ae376c8d5f4c5b3a5098aab50d0b96894b5290c803
SHA512e5757d7198e02af2c4206dff843245e91bfe78de9a9c13d48c9bbb369162cd9fa02b0eb371912a756effe6b2a6d37ff8b4324df733563c2dd54b5d33736517d4
-
Filesize
6KB
MD5a9880a11a727947911e0d54121b57dda
SHA1ff6ea94c1747254a3a468550ce98a7d8af87ae23
SHA2560caaaea4477ba98f0d3baba71914fd6e2534f470fc707fbf8228e643cc84e853
SHA512373c7e5afa3418a8d67ee94a6d0502cad91d435634b3afc037022ce14fbfc93da44828188c5e4885a530684714492970db86ec05e8dde9cbbdb641618335ebe2
-
Filesize
6KB
MD58422a8f9a8ccbcc8447fe57ef1ac1383
SHA196129b7171dcd6163a1347c7dfb7ba24cce855b0
SHA25664eb9bd74fe54b0d123bfc8b7f563e70bcec4ddfb15233141164405d47905bda
SHA512545d468b0b84e533af4cd8f84ac49c1ac44929c44af54459409c1466d519697c4b5d73d20ba56d57c36608386ebe8bd5a6e5cd3b4be70ae63ccf7109c83fc6de
-
Filesize
6KB
MD52b53a2a078e03aabaee362eb19840f31
SHA1cbd38f70b6e599ff0bfabc07a8007a4aedbb97fd
SHA256463171eb364e924e498603a5ee7dd8a5b70ee92b3dc6db412341f13786b35dab
SHA512b6e4a9f58839b47e62624b381a20c8ce55411ffc678e06764cbf94a1d6ef81512fd2d89c7890846f069e9e45aaf925054142882a53dd5b3ae3bfb6639321b680
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5835f13e42c6e23a81ffff9e24e4f07f5
SHA1d2c779ffaff58fc2fc1a063f7a722b49defbdc44
SHA256931b8993aa9b170388302ad7a90542a77df9bf1e223e2c4f68204997939e9cfb
SHA51230f501ff07897eca301183297b6c9e38b625844c6b903eb67e823786e07ad0d0e3db85ef5a7fa702f48bc36729ff91bcf3fc3ff0a61368d1fde345e3a2d83c37