Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
02/05/2024, 07:08
Static task
static1
Behavioral task
behavioral1
Sample
0dd5be709adad977e620f02068e687d8_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
0dd5be709adad977e620f02068e687d8_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
0dd5be709adad977e620f02068e687d8_JaffaCakes118.html
-
Size
39KB
-
MD5
0dd5be709adad977e620f02068e687d8
-
SHA1
9ab842a842ecd5960c8afff46b34f46ea38d2a79
-
SHA256
1a2b1ddcf0519d82c85f4807d1ee88e7bc2135bdd9c9a16487f58a41935cff82
-
SHA512
177e6e4f82573c05475696de72a281ffaa9be5ad5c3c04265a553f0a3cdd31a31b89fef3687c1e7c2549a5465b9a1361baa64c8f7c1eec58a7032269dc784a05
-
SSDEEP
768:ooPY5kJa0Jw8taj3MOuDpIMa92F99pB9f0khZr63MlukIC4SuapDFHuX:ooPY5kJa0Jw8taj3MOypIL9cvBPhXlup
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2044 msedge.exe 2044 msedge.exe 1620 msedge.exe 1620 msedge.exe 1068 identity_helper.exe 1068 identity_helper.exe 5652 msedge.exe 5652 msedge.exe 5652 msedge.exe 5652 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 1620 msedge.exe 1620 msedge.exe 1620 msedge.exe 1620 msedge.exe 1620 msedge.exe 1620 msedge.exe 1620 msedge.exe 1620 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1620 msedge.exe 1620 msedge.exe 1620 msedge.exe 1620 msedge.exe 1620 msedge.exe 1620 msedge.exe 1620 msedge.exe 1620 msedge.exe 1620 msedge.exe 1620 msedge.exe 1620 msedge.exe 1620 msedge.exe 1620 msedge.exe 1620 msedge.exe 1620 msedge.exe 1620 msedge.exe 1620 msedge.exe 1620 msedge.exe 1620 msedge.exe 1620 msedge.exe 1620 msedge.exe 1620 msedge.exe 1620 msedge.exe 1620 msedge.exe 1620 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1620 msedge.exe 1620 msedge.exe 1620 msedge.exe 1620 msedge.exe 1620 msedge.exe 1620 msedge.exe 1620 msedge.exe 1620 msedge.exe 1620 msedge.exe 1620 msedge.exe 1620 msedge.exe 1620 msedge.exe 1620 msedge.exe 1620 msedge.exe 1620 msedge.exe 1620 msedge.exe 1620 msedge.exe 1620 msedge.exe 1620 msedge.exe 1620 msedge.exe 1620 msedge.exe 1620 msedge.exe 1620 msedge.exe 1620 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1620 wrote to memory of 4468 1620 msedge.exe 84 PID 1620 wrote to memory of 4468 1620 msedge.exe 84 PID 1620 wrote to memory of 4116 1620 msedge.exe 85 PID 1620 wrote to memory of 4116 1620 msedge.exe 85 PID 1620 wrote to memory of 4116 1620 msedge.exe 85 PID 1620 wrote to memory of 4116 1620 msedge.exe 85 PID 1620 wrote to memory of 4116 1620 msedge.exe 85 PID 1620 wrote to memory of 4116 1620 msedge.exe 85 PID 1620 wrote to memory of 4116 1620 msedge.exe 85 PID 1620 wrote to memory of 4116 1620 msedge.exe 85 PID 1620 wrote to memory of 4116 1620 msedge.exe 85 PID 1620 wrote to memory of 4116 1620 msedge.exe 85 PID 1620 wrote to memory of 4116 1620 msedge.exe 85 PID 1620 wrote to memory of 4116 1620 msedge.exe 85 PID 1620 wrote to memory of 4116 1620 msedge.exe 85 PID 1620 wrote to memory of 4116 1620 msedge.exe 85 PID 1620 wrote to memory of 4116 1620 msedge.exe 85 PID 1620 wrote to memory of 4116 1620 msedge.exe 85 PID 1620 wrote to memory of 4116 1620 msedge.exe 85 PID 1620 wrote to memory of 4116 1620 msedge.exe 85 PID 1620 wrote to memory of 4116 1620 msedge.exe 85 PID 1620 wrote to memory of 4116 1620 msedge.exe 85 PID 1620 wrote to memory of 4116 1620 msedge.exe 85 PID 1620 wrote to memory of 4116 1620 msedge.exe 85 PID 1620 wrote to memory of 4116 1620 msedge.exe 85 PID 1620 wrote to memory of 4116 1620 msedge.exe 85 PID 1620 wrote to memory of 4116 1620 msedge.exe 85 PID 1620 wrote to memory of 4116 1620 msedge.exe 85 PID 1620 wrote to memory of 4116 1620 msedge.exe 85 PID 1620 wrote to memory of 4116 1620 msedge.exe 85 PID 1620 wrote to memory of 4116 1620 msedge.exe 85 PID 1620 wrote to memory of 4116 1620 msedge.exe 85 PID 1620 wrote to memory of 4116 1620 msedge.exe 85 PID 1620 wrote to memory of 4116 1620 msedge.exe 85 PID 1620 wrote to memory of 4116 1620 msedge.exe 85 PID 1620 wrote to memory of 4116 1620 msedge.exe 85 PID 1620 wrote to memory of 4116 1620 msedge.exe 85 PID 1620 wrote to memory of 4116 1620 msedge.exe 85 PID 1620 wrote to memory of 4116 1620 msedge.exe 85 PID 1620 wrote to memory of 4116 1620 msedge.exe 85 PID 1620 wrote to memory of 4116 1620 msedge.exe 85 PID 1620 wrote to memory of 4116 1620 msedge.exe 85 PID 1620 wrote to memory of 2044 1620 msedge.exe 86 PID 1620 wrote to memory of 2044 1620 msedge.exe 86 PID 1620 wrote to memory of 4732 1620 msedge.exe 87 PID 1620 wrote to memory of 4732 1620 msedge.exe 87 PID 1620 wrote to memory of 4732 1620 msedge.exe 87 PID 1620 wrote to memory of 4732 1620 msedge.exe 87 PID 1620 wrote to memory of 4732 1620 msedge.exe 87 PID 1620 wrote to memory of 4732 1620 msedge.exe 87 PID 1620 wrote to memory of 4732 1620 msedge.exe 87 PID 1620 wrote to memory of 4732 1620 msedge.exe 87 PID 1620 wrote to memory of 4732 1620 msedge.exe 87 PID 1620 wrote to memory of 4732 1620 msedge.exe 87 PID 1620 wrote to memory of 4732 1620 msedge.exe 87 PID 1620 wrote to memory of 4732 1620 msedge.exe 87 PID 1620 wrote to memory of 4732 1620 msedge.exe 87 PID 1620 wrote to memory of 4732 1620 msedge.exe 87 PID 1620 wrote to memory of 4732 1620 msedge.exe 87 PID 1620 wrote to memory of 4732 1620 msedge.exe 87 PID 1620 wrote to memory of 4732 1620 msedge.exe 87 PID 1620 wrote to memory of 4732 1620 msedge.exe 87 PID 1620 wrote to memory of 4732 1620 msedge.exe 87 PID 1620 wrote to memory of 4732 1620 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\0dd5be709adad977e620f02068e687d8_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffed99846f8,0x7ffed9984708,0x7ffed99847182⤵PID:4468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,17063091571875480054,13592363255570416512,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2252 /prefetch:22⤵PID:4116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2160,17063091571875480054,13592363255570416512,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2304 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2160,17063091571875480054,13592363255570416512,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2604 /prefetch:82⤵PID:4732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,17063091571875480054,13592363255570416512,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3164 /prefetch:12⤵PID:3344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,17063091571875480054,13592363255570416512,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3176 /prefetch:12⤵PID:3504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,17063091571875480054,13592363255570416512,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4596 /prefetch:12⤵PID:468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,17063091571875480054,13592363255570416512,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4156 /prefetch:12⤵PID:2708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,17063091571875480054,13592363255570416512,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4824 /prefetch:12⤵PID:1084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,17063091571875480054,13592363255570416512,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5312 /prefetch:12⤵PID:4064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,17063091571875480054,13592363255570416512,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5256 /prefetch:82⤵PID:700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,17063091571875480054,13592363255570416512,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5256 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,17063091571875480054,13592363255570416512,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4072 /prefetch:12⤵PID:4080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,17063091571875480054,13592363255570416512,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6012 /prefetch:12⤵PID:2340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,17063091571875480054,13592363255570416512,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1912 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5652
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:992
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3268
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54e96ed67859d0bafd47d805a71041f49
SHA17806c54ae29a6c8d01dcbc78e5525ddde321b16b
SHA256bd13ddab4dc4bbf01ed50341953c9638f6d71faf92bc79fbfe93687432c2292d
SHA512432201c3119779d91d13da55a26d4ff4ce4a9529e00b44ec1738029f92610d4e6e25c05694adf949c3e9c70fbbbbea723f63c29287906729f5e88a046a2edcb7
-
Filesize
152B
MD51cbd0e9a14155b7f5d4f542d09a83153
SHA127a442a921921d69743a8e4b76ff0b66016c4b76
SHA256243d05d6af19bfe3e06b1f7507342ead88f9d87b84e239ad1d144e9e454b548c
SHA51217e5217d5bf67571afb0e7ef30ac21c11ea6553f89457548d96ee4461011f641a7872a37257239fa5f25702f027afb85d5bd9faf2f2f183992b8879407e56a0d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize192B
MD5bf20b3da2ce9ba53f4ca13904b4190f5
SHA1efbde2293d2e9a2a1f671afb51662361ac233dd2
SHA25627749e1389f453d74e0f344fedaa9cca60e4a43770f81ac4e2ed4d7f69509f94
SHA5126a25faaae37a2e08c4fecd83899bb736f02f3e4bb508410b39641695889d2d803ef218ff92dc741a58fb4392ed9cb0a9963c0b913051e0cc1f6612647f25bbe5
-
Filesize
179B
MD5fb3dcf6dbcf0e64f04deeed7a06dcb2e
SHA17d237118c0a9139810efaacabc8eabc68816a9cd
SHA256632ebf86061464cb788dfe4aff0052892d5d06b0e9e516152d695ce55ec1ab7e
SHA5122810ff16251db8d90522e14fd7f484df23955c3650cf0b7fecf9d97f8c1d22ab958175563d5d43b187f2edab1e25f87c6e46dea00b34b2f563d925fd2173e61e
-
Filesize
5KB
MD5d867889f96fb70b484ae7f192090bd94
SHA16e16d7b48eb50d25c76f2c30cf30e8328dc1506e
SHA25681697add06bb6bcd37438034c26275573ec1178c4eda1e335c56ee2fd9f2bd6b
SHA512a821dcbc64a08e4a21d645191426da01bfc72eea836486756725c9dfdf3bf9fe8b6b989046b6144f4e57209824b780987292214eeb4117c3ee405eb73d8a90fd
-
Filesize
6KB
MD5a26a8fc1a02035b013cab25cd06a585a
SHA148173572d7545c54af9c93ba573bace0f3da68f3
SHA256f520ca891fc35b56ab15000e4d58ccd24c1dfd46c16f1c733a37d69af0ca9a2c
SHA512f672fbe1daf1003542468b17d2b61384527f34ad3a6305665f75c2546fd6444a1f2e9334caa1de4fbdf06aca14dfbd395e1ea96df0e9c7e97699586d96e77ae5
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD50529a8580fcdcd77f149b6fd22df4320
SHA127d0f648a1beec66c2b21146bf74e83852c17e84
SHA256ad952dc2ddc866f5a35d25bab28ddd614f38a2bb61cac46b09b3d09bf2f4c7a3
SHA512d7f75cc070df50a36ffb746d2f7ad199e804a78e4fd393b6b783dddd715e7fcaff9e846c35975eed3d47e55eb6887e460f6100a905863dbaea5fda8f0f1b143f