Analysis
-
max time kernel
149s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
01/05/2024, 11:54
Static task
static1
Behavioral task
behavioral1
Sample
0bbb1090bf028a173e0391745ed81da3_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
0bbb1090bf028a173e0391745ed81da3_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
0bbb1090bf028a173e0391745ed81da3_JaffaCakes118.html
-
Size
21KB
-
MD5
0bbb1090bf028a173e0391745ed81da3
-
SHA1
2b4bf1bfe8f004c4665d9fd1d66f15afe07c2a00
-
SHA256
2b75e51291d6f75f55bc67e1bb4fbc712db4be82d9a37b662168f91595fb6050
-
SHA512
70f916132fda6aca3e2325c1cab9a037d6c0c57820b86242cde68f1100708fd152c0c72f3b1a98bfe919a86da6803f91abcad0eef4491329fdc742078107772d
-
SSDEEP
384:hWF6aKuq1pIT8/djieqY0o4Geg+fH7XHNUyWr7drpAJxCsMN3bdedk7Gd3+pnKu6:hRNL1p08/F5j3+jXHNwdpA7CsMdYWKpz
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 432 msedge.exe 432 msedge.exe 1808 msedge.exe 1808 msedge.exe 2472 identity_helper.exe 2472 identity_helper.exe 3768 msedge.exe 3768 msedge.exe 3768 msedge.exe 3768 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1808 wrote to memory of 1048 1808 msedge.exe 83 PID 1808 wrote to memory of 1048 1808 msedge.exe 83 PID 1808 wrote to memory of 3512 1808 msedge.exe 84 PID 1808 wrote to memory of 3512 1808 msedge.exe 84 PID 1808 wrote to memory of 3512 1808 msedge.exe 84 PID 1808 wrote to memory of 3512 1808 msedge.exe 84 PID 1808 wrote to memory of 3512 1808 msedge.exe 84 PID 1808 wrote to memory of 3512 1808 msedge.exe 84 PID 1808 wrote to memory of 3512 1808 msedge.exe 84 PID 1808 wrote to memory of 3512 1808 msedge.exe 84 PID 1808 wrote to memory of 3512 1808 msedge.exe 84 PID 1808 wrote to memory of 3512 1808 msedge.exe 84 PID 1808 wrote to memory of 3512 1808 msedge.exe 84 PID 1808 wrote to memory of 3512 1808 msedge.exe 84 PID 1808 wrote to memory of 3512 1808 msedge.exe 84 PID 1808 wrote to memory of 3512 1808 msedge.exe 84 PID 1808 wrote to memory of 3512 1808 msedge.exe 84 PID 1808 wrote to memory of 3512 1808 msedge.exe 84 PID 1808 wrote to memory of 3512 1808 msedge.exe 84 PID 1808 wrote to memory of 3512 1808 msedge.exe 84 PID 1808 wrote to memory of 3512 1808 msedge.exe 84 PID 1808 wrote to memory of 3512 1808 msedge.exe 84 PID 1808 wrote to memory of 3512 1808 msedge.exe 84 PID 1808 wrote to memory of 3512 1808 msedge.exe 84 PID 1808 wrote to memory of 3512 1808 msedge.exe 84 PID 1808 wrote to memory of 3512 1808 msedge.exe 84 PID 1808 wrote to memory of 3512 1808 msedge.exe 84 PID 1808 wrote to memory of 3512 1808 msedge.exe 84 PID 1808 wrote to memory of 3512 1808 msedge.exe 84 PID 1808 wrote to memory of 3512 1808 msedge.exe 84 PID 1808 wrote to memory of 3512 1808 msedge.exe 84 PID 1808 wrote to memory of 3512 1808 msedge.exe 84 PID 1808 wrote to memory of 3512 1808 msedge.exe 84 PID 1808 wrote to memory of 3512 1808 msedge.exe 84 PID 1808 wrote to memory of 3512 1808 msedge.exe 84 PID 1808 wrote to memory of 3512 1808 msedge.exe 84 PID 1808 wrote to memory of 3512 1808 msedge.exe 84 PID 1808 wrote to memory of 3512 1808 msedge.exe 84 PID 1808 wrote to memory of 3512 1808 msedge.exe 84 PID 1808 wrote to memory of 3512 1808 msedge.exe 84 PID 1808 wrote to memory of 3512 1808 msedge.exe 84 PID 1808 wrote to memory of 3512 1808 msedge.exe 84 PID 1808 wrote to memory of 432 1808 msedge.exe 85 PID 1808 wrote to memory of 432 1808 msedge.exe 85 PID 1808 wrote to memory of 1920 1808 msedge.exe 86 PID 1808 wrote to memory of 1920 1808 msedge.exe 86 PID 1808 wrote to memory of 1920 1808 msedge.exe 86 PID 1808 wrote to memory of 1920 1808 msedge.exe 86 PID 1808 wrote to memory of 1920 1808 msedge.exe 86 PID 1808 wrote to memory of 1920 1808 msedge.exe 86 PID 1808 wrote to memory of 1920 1808 msedge.exe 86 PID 1808 wrote to memory of 1920 1808 msedge.exe 86 PID 1808 wrote to memory of 1920 1808 msedge.exe 86 PID 1808 wrote to memory of 1920 1808 msedge.exe 86 PID 1808 wrote to memory of 1920 1808 msedge.exe 86 PID 1808 wrote to memory of 1920 1808 msedge.exe 86 PID 1808 wrote to memory of 1920 1808 msedge.exe 86 PID 1808 wrote to memory of 1920 1808 msedge.exe 86 PID 1808 wrote to memory of 1920 1808 msedge.exe 86 PID 1808 wrote to memory of 1920 1808 msedge.exe 86 PID 1808 wrote to memory of 1920 1808 msedge.exe 86 PID 1808 wrote to memory of 1920 1808 msedge.exe 86 PID 1808 wrote to memory of 1920 1808 msedge.exe 86 PID 1808 wrote to memory of 1920 1808 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\0bbb1090bf028a173e0391745ed81da3_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc7d4d46f8,0x7ffc7d4d4708,0x7ffc7d4d47182⤵PID:1048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,10632363632104298300,4378447510290665222,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵PID:3512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2064,10632363632104298300,4378447510290665222,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2064,10632363632104298300,4378447510290665222,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2736 /prefetch:82⤵PID:1920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,10632363632104298300,4378447510290665222,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:3536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,10632363632104298300,4378447510290665222,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:2592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,10632363632104298300,4378447510290665222,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6096 /prefetch:12⤵PID:4708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,10632363632104298300,4378447510290665222,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4952 /prefetch:12⤵PID:4396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,10632363632104298300,4378447510290665222,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5656 /prefetch:82⤵PID:3148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,10632363632104298300,4378447510290665222,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5656 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,10632363632104298300,4378447510290665222,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5676 /prefetch:12⤵PID:2696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,10632363632104298300,4378447510290665222,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5068 /prefetch:12⤵PID:4884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,10632363632104298300,4378447510290665222,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4132 /prefetch:12⤵PID:5096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,10632363632104298300,4378447510290665222,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5400 /prefetch:12⤵PID:4616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,10632363632104298300,4378447510290665222,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3056 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3768
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4692
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4340
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD58b2290ca03b4ca5fe52d82550c7e7d69
SHA120583a7851a906444204ce8ba4fa51153e6cd494
SHA256f9ff4871fc5317299de907489d466e630be63d698c8f7cb77cc81faddbecc6d2
SHA512704ec8122cc1c263dff67ddbb5c20ee0db8a438674d716bc3be5b266ee5629a219b0049d721f9eb2dd8f2d8fda0163659eaa4d3e1f0a6e9072a8ffb92bb2b25d
-
Filesize
152B
MD5919c29d42fb6034fee2f5de14d573c63
SHA124a2e1042347b3853344157239bde3ed699047a8
SHA25617cd6de97a0c020cb4935739cfef4ec4e074e8d127ac4c531b6dc496580c8141
SHA512bb7eadd087bbcec8b1b8a49b102b454333f2f9708d36b6ffc3c82fdc52e46873398d967238c3bfe9ac6caef45b017a5fe3938ebf5f3053e4ef9be7b2752b563d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize240B
MD5dab014a7b7f6f1207c42ab881327fa0e
SHA1583d77dba910c4e84162b6dfcfdddd8d5c266f34
SHA2561dd8a82a7bfb452a1bfac2f4bc30ba403674cc30c38a618618d6952c99daa157
SHA512942ac8644385c132d0d8cb256a0b9a6632a91083e90c125c7935505d29783f8c8dcd7a8715f57c0aa6ccd73bde470b5bb79755e6a2b76d671ee0e958681fffa2
-
Filesize
787B
MD51c3170eafd87f7f6268f2d9924e67d8d
SHA1df760028a9206005061f3c324a7ac9f05ccdc0f1
SHA256caa9f46d3e71c445d85340317c3ed8f3df6a03ae74543f8dc19935b58e4fc449
SHA512b93e9db28e97c87f2bfaee6c36d4095648c97a252987bea1c8dacdbf019bdb0d5455d1096a5b1dd5e24488dcdcc2340a6dbf04e2ffbb8e848b315216fa880995
-
Filesize
6KB
MD57a4266e2dc15829689880f7617b854c6
SHA184ae3910ffde4ca0e78f1f92d9e00194e4e976f9
SHA2567b4439673426ad7e5a97b5dfa8ad22b78f8dc45a30274cf83b7948c94253f04e
SHA5123c42e0cb980aa97d7a2ce54e79eb788c6e0b8ead00cb90dfdf15504a77eb8af496b7cdf6eb45ccdb1ce137342ae4a2d2ca26a0f95921451f484d8f03907fd0ed
-
Filesize
6KB
MD550e6aec0b2420b31d82c7ca81634d2eb
SHA13fe4c4c54978dc403876d3fac1f9514d8ffbf797
SHA256d15370854d4916de92e4bf3a0bbf14fb90b2af7af99fed9cef0c0837b841311d
SHA5120ae9c5413be65ed110185b457065ed0c9d0fd4311703756dbc7561bc3babcb16363e1002184665e1f8dd5fe29ed02c779be40af3588292f7e25e23b0b3590fa4
-
Filesize
6KB
MD500b6248ce44f08795acc6b52ecb0e422
SHA158d63e8937214f42d41360217f597eff9526fbb8
SHA2564a1da0bd85ff25a1d43e4b6764df8c4f1b49731fd8fcc4959c2b869a7381a9d0
SHA5128e081bc3ee90ba04640b3a916798f91c2a3252ae3e2af33903340f6776c6037060389bac54a70eb07f9d2f6caca5ab715bbab901764be6faa54ca4c901f9f5e1
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD54710f8576623d975575cd40dc7a6901d
SHA1e16186c2afc09dbefbd277096a068255fd8759fc
SHA256d44fdff32d620518816f3eb540a8c32dd119a4e8b80b303f08acc039bef504c8
SHA5127830528c0f0d15a4bc93d9fe6cd7c4ec4bf5a0d59b4eaef2d9f60677d37c34f9f09ad748540cb0c53716d0fa2b597b5eb932b80405607c811fef18063ce28b5a