Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
02/05/2024, 03:09
Static task
static1
Behavioral task
behavioral1
Sample
0d537c33ece3553e44fbb7a14e30139e_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
0d537c33ece3553e44fbb7a14e30139e_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
0d537c33ece3553e44fbb7a14e30139e_JaffaCakes118.html
-
Size
77KB
-
MD5
0d537c33ece3553e44fbb7a14e30139e
-
SHA1
93e3bf1eaccad94723d3e5da74555b3dafee7f10
-
SHA256
8776c45f487434d82ec5feacf15b250a2cf9331ae27c93e0f212ae1942975393
-
SHA512
45cce26a9635936d787f0ff750581ee4cd3869e65716f7cc2aa5b0fcdbe9a5f089f02005ccca2a9460318c06a9bb40ebe3c398e023256c7315147c9a99a305e7
-
SSDEEP
1536:q/+v+KSalPPgcwicLLiZehJ8lIXcVV/oeT/oO/EX9dhySgq7LpsSckITCFr:cw+c9+qlQdhySb7LpsSckcCFr
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2932 msedge.exe 2932 msedge.exe 3764 msedge.exe 3764 msedge.exe 416 identity_helper.exe 416 identity_helper.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe 3372 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3764 wrote to memory of 1708 3764 msedge.exe 88 PID 3764 wrote to memory of 1708 3764 msedge.exe 88 PID 3764 wrote to memory of 632 3764 msedge.exe 89 PID 3764 wrote to memory of 632 3764 msedge.exe 89 PID 3764 wrote to memory of 632 3764 msedge.exe 89 PID 3764 wrote to memory of 632 3764 msedge.exe 89 PID 3764 wrote to memory of 632 3764 msedge.exe 89 PID 3764 wrote to memory of 632 3764 msedge.exe 89 PID 3764 wrote to memory of 632 3764 msedge.exe 89 PID 3764 wrote to memory of 632 3764 msedge.exe 89 PID 3764 wrote to memory of 632 3764 msedge.exe 89 PID 3764 wrote to memory of 632 3764 msedge.exe 89 PID 3764 wrote to memory of 632 3764 msedge.exe 89 PID 3764 wrote to memory of 632 3764 msedge.exe 89 PID 3764 wrote to memory of 632 3764 msedge.exe 89 PID 3764 wrote to memory of 632 3764 msedge.exe 89 PID 3764 wrote to memory of 632 3764 msedge.exe 89 PID 3764 wrote to memory of 632 3764 msedge.exe 89 PID 3764 wrote to memory of 632 3764 msedge.exe 89 PID 3764 wrote to memory of 632 3764 msedge.exe 89 PID 3764 wrote to memory of 632 3764 msedge.exe 89 PID 3764 wrote to memory of 632 3764 msedge.exe 89 PID 3764 wrote to memory of 632 3764 msedge.exe 89 PID 3764 wrote to memory of 632 3764 msedge.exe 89 PID 3764 wrote to memory of 632 3764 msedge.exe 89 PID 3764 wrote to memory of 632 3764 msedge.exe 89 PID 3764 wrote to memory of 632 3764 msedge.exe 89 PID 3764 wrote to memory of 632 3764 msedge.exe 89 PID 3764 wrote to memory of 632 3764 msedge.exe 89 PID 3764 wrote to memory of 632 3764 msedge.exe 89 PID 3764 wrote to memory of 632 3764 msedge.exe 89 PID 3764 wrote to memory of 632 3764 msedge.exe 89 PID 3764 wrote to memory of 632 3764 msedge.exe 89 PID 3764 wrote to memory of 632 3764 msedge.exe 89 PID 3764 wrote to memory of 632 3764 msedge.exe 89 PID 3764 wrote to memory of 632 3764 msedge.exe 89 PID 3764 wrote to memory of 632 3764 msedge.exe 89 PID 3764 wrote to memory of 632 3764 msedge.exe 89 PID 3764 wrote to memory of 632 3764 msedge.exe 89 PID 3764 wrote to memory of 632 3764 msedge.exe 89 PID 3764 wrote to memory of 632 3764 msedge.exe 89 PID 3764 wrote to memory of 632 3764 msedge.exe 89 PID 3764 wrote to memory of 2932 3764 msedge.exe 90 PID 3764 wrote to memory of 2932 3764 msedge.exe 90 PID 3764 wrote to memory of 2132 3764 msedge.exe 91 PID 3764 wrote to memory of 2132 3764 msedge.exe 91 PID 3764 wrote to memory of 2132 3764 msedge.exe 91 PID 3764 wrote to memory of 2132 3764 msedge.exe 91 PID 3764 wrote to memory of 2132 3764 msedge.exe 91 PID 3764 wrote to memory of 2132 3764 msedge.exe 91 PID 3764 wrote to memory of 2132 3764 msedge.exe 91 PID 3764 wrote to memory of 2132 3764 msedge.exe 91 PID 3764 wrote to memory of 2132 3764 msedge.exe 91 PID 3764 wrote to memory of 2132 3764 msedge.exe 91 PID 3764 wrote to memory of 2132 3764 msedge.exe 91 PID 3764 wrote to memory of 2132 3764 msedge.exe 91 PID 3764 wrote to memory of 2132 3764 msedge.exe 91 PID 3764 wrote to memory of 2132 3764 msedge.exe 91 PID 3764 wrote to memory of 2132 3764 msedge.exe 91 PID 3764 wrote to memory of 2132 3764 msedge.exe 91 PID 3764 wrote to memory of 2132 3764 msedge.exe 91 PID 3764 wrote to memory of 2132 3764 msedge.exe 91 PID 3764 wrote to memory of 2132 3764 msedge.exe 91 PID 3764 wrote to memory of 2132 3764 msedge.exe 91
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\0d537c33ece3553e44fbb7a14e30139e_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3764 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe317946f8,0x7ffe31794708,0x7ffe317947182⤵PID:1708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2228,13236606798752517404,12422625352715427807,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2244 /prefetch:22⤵PID:632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2228,13236606798752517404,12422625352715427807,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2348 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2228,13236606798752517404,12422625352715427807,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2696 /prefetch:82⤵PID:2132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,13236606798752517404,12422625352715427807,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:4808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,13236606798752517404,12422625352715427807,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:12⤵PID:4852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,13236606798752517404,12422625352715427807,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4740 /prefetch:12⤵PID:4100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2228,13236606798752517404,12422625352715427807,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6200 /prefetch:82⤵PID:1420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2228,13236606798752517404,12422625352715427807,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6200 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,13236606798752517404,12422625352715427807,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5504 /prefetch:12⤵PID:1184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,13236606798752517404,12422625352715427807,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5456 /prefetch:12⤵PID:3988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,13236606798752517404,12422625352715427807,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5396 /prefetch:12⤵PID:4488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,13236606798752517404,12422625352715427807,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5604 /prefetch:12⤵PID:4056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2228,13236606798752517404,12422625352715427807,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3372
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3504
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4864
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD58b2290ca03b4ca5fe52d82550c7e7d69
SHA120583a7851a906444204ce8ba4fa51153e6cd494
SHA256f9ff4871fc5317299de907489d466e630be63d698c8f7cb77cc81faddbecc6d2
SHA512704ec8122cc1c263dff67ddbb5c20ee0db8a438674d716bc3be5b266ee5629a219b0049d721f9eb2dd8f2d8fda0163659eaa4d3e1f0a6e9072a8ffb92bb2b25d
-
Filesize
152B
MD5919c29d42fb6034fee2f5de14d573c63
SHA124a2e1042347b3853344157239bde3ed699047a8
SHA25617cd6de97a0c020cb4935739cfef4ec4e074e8d127ac4c531b6dc496580c8141
SHA512bb7eadd087bbcec8b1b8a49b102b454333f2f9708d36b6ffc3c82fdc52e46873398d967238c3bfe9ac6caef45b017a5fe3938ebf5f3053e4ef9be7b2752b563d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD5c7751842a8d7dc4988ca07e6178c6810
SHA15980bf9431433a6681e13c6e87edc8c554888bfa
SHA25677869b988a7bb0471b73498ffd79d538eb13e5e2a5b256aebf39c506df77ec61
SHA5125a4f14137d83f7b384baa9b474986ec0cdfd742a63f2f7b27fc06fbd6cd60dcdc8a3c37109c12df61df2b48a4bc66885ae866e03c4219c679aefaf090d6761bc
-
Filesize
716B
MD56141c5249384d7db09448ac98f5b2d64
SHA1f876c973e1336f20c279c8d4c6f7c350820e2776
SHA2563b267717073cf23815af14b8264fcb7fe7b7f2c1c27ceb42817287aaa2ed25ce
SHA512ac3def3ec889860f0981f19cf1b7ad527607cafbcc2d621d7edc4798d07e7a025b2fb0a3567436eea51802e0d41806e142cd1dbafd9702465934100a7717fa6f
-
Filesize
6KB
MD5565a29f97ebe296ab281a05e8188dd6a
SHA1eb35b23fcab4869ea7b29f036b333266d9f193be
SHA2565354d87096371399b30d81e400049adc6a9725ae3ad7a832fc47d93daa664d49
SHA5126bdb6ed3af0104b48974aff7ea79b4f32f4fdd44cd166a3f92c776665b83ef5e898dc27e3876ec489f8b6fc1cbff5c2ed52f253a590f26abbaf398087fd6feea
-
Filesize
5KB
MD58b9bb3ca72804155cd0b8ff695eea277
SHA18d4c587f65532e4211dd0e6afb140d0dd3494584
SHA2561ac5aff0e09929df7923ea928bdaee90443e13a0790101c9daaecf1f842da05e
SHA512af99396b440d32c3902883bf073dc0e2822a59d947b983457f6a31d688156c33bace1679aff113d3f77e7dae59da96b4ccd685f794eca98a9b9a1df38ef818e1
-
Filesize
6KB
MD59f8b5bd4ab1f0281942706118a8f570f
SHA1a69f2675e0aba551d04df21870b7ae3ecd7b9336
SHA2568bfb5bfe5a0aa4e502e5daf08f8a6df892df009e402f2a293e00db81934a3b12
SHA512085a96f5507ec37ab043e03e7301e8a25eb38baad5f5151d6828bd0016d6c868ea5642d57bc127f7c063ad772562990fbcea5ceb3ee7143500eed13ee3c4708e
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5491a0cee92784d5e9412cd2cb0ef1e45
SHA1396ee2a31a59e220b3119dfd4d0d6120ebf2ad80
SHA2565b9c2012c09685d10b2b7b21a1baec3ff3e056c715fcd4970e61d79be8c6b193
SHA51226df7fe220b8d37ea5de72189d17c664f61f190b4b5b6436657f87a60d4aced33621ab87bc0938509bd04bca31d532bf39c13bf0cd29b9e7bd6fa43c275ffb93