Analysis
-
max time kernel
147s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
30/04/2024, 18:11
Static task
static1
Behavioral task
behavioral1
Sample
0a4baaf0c31b032f737689a53175eeec_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0a4baaf0c31b032f737689a53175eeec_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
0a4baaf0c31b032f737689a53175eeec_JaffaCakes118.html
-
Size
127KB
-
MD5
0a4baaf0c31b032f737689a53175eeec
-
SHA1
621f48b00ba317922dbe5649e09b7474e464ca89
-
SHA256
78d6467088171ee17e3a83a6ad4833b33e66fe36fe96321e21b5ccd77909cbf8
-
SHA512
bfdff7765da3d5d95fa13a1787363097e7e307c3d31ef791b18377d042809f99fa674bdf4ac3ba15d6ade34a2f52657ba7d66927a4138ac719686b760a780cb3
-
SSDEEP
3072:YLZhcN7M9WbtENOdM1sDuHI0YW+MFM1sDuHI0YW+MnM1sDuHI0YW+MbM1sDuHI0P:Y9RSoEj77
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4492 msedge.exe 4492 msedge.exe 752 msedge.exe 752 msedge.exe 4872 identity_helper.exe 4872 identity_helper.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 752 wrote to memory of 1196 752 msedge.exe 83 PID 752 wrote to memory of 1196 752 msedge.exe 83 PID 752 wrote to memory of 5040 752 msedge.exe 84 PID 752 wrote to memory of 5040 752 msedge.exe 84 PID 752 wrote to memory of 5040 752 msedge.exe 84 PID 752 wrote to memory of 5040 752 msedge.exe 84 PID 752 wrote to memory of 5040 752 msedge.exe 84 PID 752 wrote to memory of 5040 752 msedge.exe 84 PID 752 wrote to memory of 5040 752 msedge.exe 84 PID 752 wrote to memory of 5040 752 msedge.exe 84 PID 752 wrote to memory of 5040 752 msedge.exe 84 PID 752 wrote to memory of 5040 752 msedge.exe 84 PID 752 wrote to memory of 5040 752 msedge.exe 84 PID 752 wrote to memory of 5040 752 msedge.exe 84 PID 752 wrote to memory of 5040 752 msedge.exe 84 PID 752 wrote to memory of 5040 752 msedge.exe 84 PID 752 wrote to memory of 5040 752 msedge.exe 84 PID 752 wrote to memory of 5040 752 msedge.exe 84 PID 752 wrote to memory of 5040 752 msedge.exe 84 PID 752 wrote to memory of 5040 752 msedge.exe 84 PID 752 wrote to memory of 5040 752 msedge.exe 84 PID 752 wrote to memory of 5040 752 msedge.exe 84 PID 752 wrote to memory of 5040 752 msedge.exe 84 PID 752 wrote to memory of 5040 752 msedge.exe 84 PID 752 wrote to memory of 5040 752 msedge.exe 84 PID 752 wrote to memory of 5040 752 msedge.exe 84 PID 752 wrote to memory of 5040 752 msedge.exe 84 PID 752 wrote to memory of 5040 752 msedge.exe 84 PID 752 wrote to memory of 5040 752 msedge.exe 84 PID 752 wrote to memory of 5040 752 msedge.exe 84 PID 752 wrote to memory of 5040 752 msedge.exe 84 PID 752 wrote to memory of 5040 752 msedge.exe 84 PID 752 wrote to memory of 5040 752 msedge.exe 84 PID 752 wrote to memory of 5040 752 msedge.exe 84 PID 752 wrote to memory of 5040 752 msedge.exe 84 PID 752 wrote to memory of 5040 752 msedge.exe 84 PID 752 wrote to memory of 5040 752 msedge.exe 84 PID 752 wrote to memory of 5040 752 msedge.exe 84 PID 752 wrote to memory of 5040 752 msedge.exe 84 PID 752 wrote to memory of 5040 752 msedge.exe 84 PID 752 wrote to memory of 5040 752 msedge.exe 84 PID 752 wrote to memory of 5040 752 msedge.exe 84 PID 752 wrote to memory of 4492 752 msedge.exe 85 PID 752 wrote to memory of 4492 752 msedge.exe 85 PID 752 wrote to memory of 4072 752 msedge.exe 86 PID 752 wrote to memory of 4072 752 msedge.exe 86 PID 752 wrote to memory of 4072 752 msedge.exe 86 PID 752 wrote to memory of 4072 752 msedge.exe 86 PID 752 wrote to memory of 4072 752 msedge.exe 86 PID 752 wrote to memory of 4072 752 msedge.exe 86 PID 752 wrote to memory of 4072 752 msedge.exe 86 PID 752 wrote to memory of 4072 752 msedge.exe 86 PID 752 wrote to memory of 4072 752 msedge.exe 86 PID 752 wrote to memory of 4072 752 msedge.exe 86 PID 752 wrote to memory of 4072 752 msedge.exe 86 PID 752 wrote to memory of 4072 752 msedge.exe 86 PID 752 wrote to memory of 4072 752 msedge.exe 86 PID 752 wrote to memory of 4072 752 msedge.exe 86 PID 752 wrote to memory of 4072 752 msedge.exe 86 PID 752 wrote to memory of 4072 752 msedge.exe 86 PID 752 wrote to memory of 4072 752 msedge.exe 86 PID 752 wrote to memory of 4072 752 msedge.exe 86 PID 752 wrote to memory of 4072 752 msedge.exe 86 PID 752 wrote to memory of 4072 752 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\0a4baaf0c31b032f737689a53175eeec_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:752 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xdc,0x108,0x7ffa763c46f8,0x7ffa763c4708,0x7ffa763c47182⤵PID:1196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,7176807324672024776,12154286406500096880,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2072 /prefetch:22⤵PID:5040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2056,7176807324672024776,12154286406500096880,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2056,7176807324672024776,12154286406500096880,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2792 /prefetch:82⤵PID:4072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,7176807324672024776,12154286406500096880,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:3424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,7176807324672024776,12154286406500096880,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:4700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,7176807324672024776,12154286406500096880,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5068 /prefetch:12⤵PID:2156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,7176807324672024776,12154286406500096880,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6104 /prefetch:12⤵PID:3124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,7176807324672024776,12154286406500096880,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3456 /prefetch:12⤵PID:1396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,7176807324672024776,12154286406500096880,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5248 /prefetch:82⤵PID:2904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,7176807324672024776,12154286406500096880,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5248 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,7176807324672024776,12154286406500096880,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5880 /prefetch:12⤵PID:2620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,7176807324672024776,12154286406500096880,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5932 /prefetch:12⤵PID:732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,7176807324672024776,12154286406500096880,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4512 /prefetch:12⤵PID:3392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,7176807324672024776,12154286406500096880,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3952 /prefetch:12⤵PID:4184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,7176807324672024776,12154286406500096880,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4960
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1032
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2288
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD58b2290ca03b4ca5fe52d82550c7e7d69
SHA120583a7851a906444204ce8ba4fa51153e6cd494
SHA256f9ff4871fc5317299de907489d466e630be63d698c8f7cb77cc81faddbecc6d2
SHA512704ec8122cc1c263dff67ddbb5c20ee0db8a438674d716bc3be5b266ee5629a219b0049d721f9eb2dd8f2d8fda0163659eaa4d3e1f0a6e9072a8ffb92bb2b25d
-
Filesize
152B
MD5919c29d42fb6034fee2f5de14d573c63
SHA124a2e1042347b3853344157239bde3ed699047a8
SHA25617cd6de97a0c020cb4935739cfef4ec4e074e8d127ac4c531b6dc496580c8141
SHA512bb7eadd087bbcec8b1b8a49b102b454333f2f9708d36b6ffc3c82fdc52e46873398d967238c3bfe9ac6caef45b017a5fe3938ebf5f3053e4ef9be7b2752b563d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD5f0fd31eb74da7c3263bf460d8af532cf
SHA1a365586df062ad2b8509253e681ecdb753368351
SHA2565dfa07b030b28773b672fbf6d1c5b61e5e617cf556f2c5203dac6da29f3a36ba
SHA512d7d761b8f66c7e09194e59ccd4047d4ed9d09bc150ba2934583433ba6fd304947bddbe1b9728128f5618f6d2f476ed79ed7ba7fb7565f1b36eba8002aeff5ad9
-
Filesize
1KB
MD57cb6c937939ac5057bc056b0297af465
SHA143defdc2147523ec75f76da189e46b42f838e72c
SHA256b24bdd70d29ff3849054ce1e8f2900e24e265a0fc02920fec977382ab0ca8185
SHA512239e2b8bb622a480a13fbce51296c907d69c4e482f39216d16da1507a86b0fa991d5102b3cea913e7788f647fa491099000315248b9eb0af8063671042a4227f
-
Filesize
6KB
MD5ff132213816eb288245f6548e940e8f9
SHA11df73a48a16af10bc9076f55ac9c1f365801143f
SHA2563cbbdc49134814d5d7dae687c62fd284fc6ed33ab6492c26006a0810406b5843
SHA512a57055a5dad6c08e7006a71dd032511ee73e7a3ac935f828209b1a819135f8d713a54365f90fa6cbd241f619154fe8b1957ad99ca2b1f07abb7d8827752ffb61
-
Filesize
6KB
MD54aed22d4880e072b6c99c7de5968e43f
SHA11432b6d7337874ac4f2b6838f842ed99dac9573e
SHA2567ad71627071f78d80dae843466c528471b857e4aa504606f2a1df769dcbd8529
SHA5125be92c9b1ceef74ae7e977f961fe5d6e37804ec3c2e1c523867a8f3abf0041f8dc42e171957462c854bb0b079d6e462bcf37602ca98bb8e77712b0b1f2d0613f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD516de3fbbc41c8e37cd77ca833107d83d
SHA1ca9ab13e5ffc6717fd454d05bf5fa79be85fe6a4
SHA2567048e12671658c5bb186d064aaa93e53c4367d01d3266d0cca978a8982bbaef7
SHA512976a5cc92801b69215f58b643b8f5680d2557aac9b9a4ff282a29e32bd000eb0ec0f53bfa3b7692530d2b8cf82bf29db71779e5cea2c57059eb07c22f4b3169d