Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
30-04-2024 12:46
Static task
static1
Behavioral task
behavioral1
Sample
09cb2d121e57b32b66dc9b7d1175eb04_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
09cb2d121e57b32b66dc9b7d1175eb04_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
09cb2d121e57b32b66dc9b7d1175eb04_JaffaCakes118.html
-
Size
10KB
-
MD5
09cb2d121e57b32b66dc9b7d1175eb04
-
SHA1
d8ac283d01a32575ebdafa0ab405836cf4661e21
-
SHA256
c440f0973abfe745702a1bc1efc7396d967d51a2b78ca43f31b6454481160bc6
-
SHA512
245079c6bc5a60f73ca9491b20008f5a8098bffff1c43a4dca79897dd3b5dcb672047b378fb0e0d7a5d8e5399e2ba96a18b2069e6f1376ba6eebcf997cbf4552
-
SSDEEP
192:8YFZOAlQnn5I+xIvjwc40WaqaQanaraRagabaBa+4eEnU4aPOaQOaJNDqg2kgwxY:UAla5IA4jFenV2kPM
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4696 msedge.exe 4696 msedge.exe 1980 msedge.exe 1980 msedge.exe 3384 identity_helper.exe 3384 identity_helper.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe 1980 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1980 wrote to memory of 3460 1980 msedge.exe 83 PID 1980 wrote to memory of 3460 1980 msedge.exe 83 PID 1980 wrote to memory of 2056 1980 msedge.exe 84 PID 1980 wrote to memory of 2056 1980 msedge.exe 84 PID 1980 wrote to memory of 2056 1980 msedge.exe 84 PID 1980 wrote to memory of 2056 1980 msedge.exe 84 PID 1980 wrote to memory of 2056 1980 msedge.exe 84 PID 1980 wrote to memory of 2056 1980 msedge.exe 84 PID 1980 wrote to memory of 2056 1980 msedge.exe 84 PID 1980 wrote to memory of 2056 1980 msedge.exe 84 PID 1980 wrote to memory of 2056 1980 msedge.exe 84 PID 1980 wrote to memory of 2056 1980 msedge.exe 84 PID 1980 wrote to memory of 2056 1980 msedge.exe 84 PID 1980 wrote to memory of 2056 1980 msedge.exe 84 PID 1980 wrote to memory of 2056 1980 msedge.exe 84 PID 1980 wrote to memory of 2056 1980 msedge.exe 84 PID 1980 wrote to memory of 2056 1980 msedge.exe 84 PID 1980 wrote to memory of 2056 1980 msedge.exe 84 PID 1980 wrote to memory of 2056 1980 msedge.exe 84 PID 1980 wrote to memory of 2056 1980 msedge.exe 84 PID 1980 wrote to memory of 2056 1980 msedge.exe 84 PID 1980 wrote to memory of 2056 1980 msedge.exe 84 PID 1980 wrote to memory of 2056 1980 msedge.exe 84 PID 1980 wrote to memory of 2056 1980 msedge.exe 84 PID 1980 wrote to memory of 2056 1980 msedge.exe 84 PID 1980 wrote to memory of 2056 1980 msedge.exe 84 PID 1980 wrote to memory of 2056 1980 msedge.exe 84 PID 1980 wrote to memory of 2056 1980 msedge.exe 84 PID 1980 wrote to memory of 2056 1980 msedge.exe 84 PID 1980 wrote to memory of 2056 1980 msedge.exe 84 PID 1980 wrote to memory of 2056 1980 msedge.exe 84 PID 1980 wrote to memory of 2056 1980 msedge.exe 84 PID 1980 wrote to memory of 2056 1980 msedge.exe 84 PID 1980 wrote to memory of 2056 1980 msedge.exe 84 PID 1980 wrote to memory of 2056 1980 msedge.exe 84 PID 1980 wrote to memory of 2056 1980 msedge.exe 84 PID 1980 wrote to memory of 2056 1980 msedge.exe 84 PID 1980 wrote to memory of 2056 1980 msedge.exe 84 PID 1980 wrote to memory of 2056 1980 msedge.exe 84 PID 1980 wrote to memory of 2056 1980 msedge.exe 84 PID 1980 wrote to memory of 2056 1980 msedge.exe 84 PID 1980 wrote to memory of 2056 1980 msedge.exe 84 PID 1980 wrote to memory of 4696 1980 msedge.exe 85 PID 1980 wrote to memory of 4696 1980 msedge.exe 85 PID 1980 wrote to memory of 4416 1980 msedge.exe 86 PID 1980 wrote to memory of 4416 1980 msedge.exe 86 PID 1980 wrote to memory of 4416 1980 msedge.exe 86 PID 1980 wrote to memory of 4416 1980 msedge.exe 86 PID 1980 wrote to memory of 4416 1980 msedge.exe 86 PID 1980 wrote to memory of 4416 1980 msedge.exe 86 PID 1980 wrote to memory of 4416 1980 msedge.exe 86 PID 1980 wrote to memory of 4416 1980 msedge.exe 86 PID 1980 wrote to memory of 4416 1980 msedge.exe 86 PID 1980 wrote to memory of 4416 1980 msedge.exe 86 PID 1980 wrote to memory of 4416 1980 msedge.exe 86 PID 1980 wrote to memory of 4416 1980 msedge.exe 86 PID 1980 wrote to memory of 4416 1980 msedge.exe 86 PID 1980 wrote to memory of 4416 1980 msedge.exe 86 PID 1980 wrote to memory of 4416 1980 msedge.exe 86 PID 1980 wrote to memory of 4416 1980 msedge.exe 86 PID 1980 wrote to memory of 4416 1980 msedge.exe 86 PID 1980 wrote to memory of 4416 1980 msedge.exe 86 PID 1980 wrote to memory of 4416 1980 msedge.exe 86 PID 1980 wrote to memory of 4416 1980 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\09cb2d121e57b32b66dc9b7d1175eb04_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc7d4d46f8,0x7ffc7d4d4708,0x7ffc7d4d47182⤵PID:3460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2004,633734597030831149,4772594817823618583,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2044 /prefetch:22⤵PID:2056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2004,633734597030831149,4772594817823618583,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2004,633734597030831149,4772594817823618583,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2780 /prefetch:82⤵PID:4416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,633734597030831149,4772594817823618583,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:1892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,633734597030831149,4772594817823618583,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:2500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,633734597030831149,4772594817823618583,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4572 /prefetch:12⤵PID:844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2004,633734597030831149,4772594817823618583,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5860 /prefetch:82⤵PID:468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2004,633734597030831149,4772594817823618583,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5860 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,633734597030831149,4772594817823618583,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5536 /prefetch:12⤵PID:1640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,633734597030831149,4772594817823618583,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5612 /prefetch:12⤵PID:3468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,633734597030831149,4772594817823618583,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4080 /prefetch:12⤵PID:5012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,633734597030831149,4772594817823618583,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4912 /prefetch:12⤵PID:3712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2004,633734597030831149,4772594817823618583,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4992 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1448
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3484
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5040
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4152
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD58b2290ca03b4ca5fe52d82550c7e7d69
SHA120583a7851a906444204ce8ba4fa51153e6cd494
SHA256f9ff4871fc5317299de907489d466e630be63d698c8f7cb77cc81faddbecc6d2
SHA512704ec8122cc1c263dff67ddbb5c20ee0db8a438674d716bc3be5b266ee5629a219b0049d721f9eb2dd8f2d8fda0163659eaa4d3e1f0a6e9072a8ffb92bb2b25d
-
Filesize
152B
MD5919c29d42fb6034fee2f5de14d573c63
SHA124a2e1042347b3853344157239bde3ed699047a8
SHA25617cd6de97a0c020cb4935739cfef4ec4e074e8d127ac4c531b6dc496580c8141
SHA512bb7eadd087bbcec8b1b8a49b102b454333f2f9708d36b6ffc3c82fdc52e46873398d967238c3bfe9ac6caef45b017a5fe3938ebf5f3053e4ef9be7b2752b563d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize288B
MD54f28b0738f6375427d6d063ef66e7a5c
SHA1923b62fcd9ad8fadc645c3c971408cf3c64a9401
SHA256682eb51577f4fc42871f21ce4bf4c94abefca28fbe0b4882beb31cf8765c2bf5
SHA512d4a1f6df05e86a34bbef0c052e2df3150761f80bea289a03f2cd43c11f7e31a04d439da7b9664371c7f6847e580abe1d3f2ed606532f8650a763b4f8ffc56754
-
Filesize
2KB
MD554e3210c744164836e2beed5a60a9285
SHA18e522bc1c00943aab6cd16d6124af900250c527d
SHA2566407804b2a94184721e387a951abc7785723e3f1c0e08f27974462200f25d753
SHA5127b3f71719f1694b15ddef459275c4c02141c6215afcf00dcd9b72651d0fadcabbc4dec57f2b0e17ee70b28f00b3739a54bfae8f6b938d46ef59af0e2c48bcd75
-
Filesize
2KB
MD54f64048cbc25873677132f8cfb0307d5
SHA16a2f7c0df6fc21718089c9554e3b26262540185b
SHA256741fc2ae450fe0c96f840f6cf75f59ca07954d93168a2a6eb2529216c9a89c74
SHA512f7a2e1e8a8b096b1dadb59ab9ae38ff5ded40dddbdc27f8d18de3451c78fbfd5d32532f70da0a74bd7aab03677fb8f50d81cc6c9757bbebb2f4ff2093a797415
-
Filesize
7KB
MD582f25143d33bed748001602b009c769a
SHA18e92627f378b2d866ab4baa561870c0a6368641c
SHA256b761bb42f1b29504d56c98301dc5f570f1be45c7c633573b8fc5a93298e3915d
SHA5126caedbb3d219227984e24a39447e707de0a292459f531730811e649e07d2dd56e91e54db4ad7d1171663252f8b31b9f86df34cbc861a0e75b7e0463f40a7befb
-
Filesize
6KB
MD5a8e87b959f34ee031130b542ae210cf7
SHA1684ab8705e779708fbbbcec3ad7e71a3b16f3aa8
SHA256adece0b3efbae7b0c8e5a635317fd7a947c3e7f4d351bb0b25c340346328de72
SHA512a2cc85e5082b5d2a95c2125cb2b2a2d3b93bc2e0481ce352f312116e2c9255e50938a9ec5166713014c808e823f9b2c9e75826a7708ef60618a0108dc632809c
-
Filesize
7KB
MD541d69ddd420cfe73910aa821013db052
SHA1d251443a7ac9e3b97b4eb75e793e1ecec3cb7106
SHA2567cad4938de9b4473ca32ff6d1a4b749f4bc8004ceec1d6ab29b378f1b96e2dde
SHA5122a8267fe5ac990565255a4b9dc735ef6add78b5430a36e7f361be088f0f1f2bdd7d49d5e5a11546f5d3af3b9d14ee5edffd5884006c382d5aee380ab1a99ba58
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
8KB
MD5d5c3cf70fa30682265c9debc1be41506
SHA1c2e3530dbb96f9b4305f495b7713cf205f1e7f81
SHA256ccea0072913e5c324df995dfabe79411d98682f0bee6477361e8f011f3973f1b
SHA5120f97479187fdb75294444ecdf496bde5000d641b299120c6fd8d2eb3b3a00a2870fec823ff62dc8b00bb1058d08e6f88282444cca966e638b83cf9e92c20e700