Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
02/05/2024, 08:18
Static task
static1
Behavioral task
behavioral1
Sample
0df9a79f46493e08218caae3587f4277_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0df9a79f46493e08218caae3587f4277_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
0df9a79f46493e08218caae3587f4277_JaffaCakes118.html
-
Size
175KB
-
MD5
0df9a79f46493e08218caae3587f4277
-
SHA1
26c12014dc94ca610f0787cdc13c90cb28c03aa3
-
SHA256
7e2c6b00b4ab7d1a69f45c12681d70e941895fb65c3ca38f9694aa8062fa5b3a
-
SHA512
94ffd854cf959f748dff6be18041dffdb59770d8b0def940814f8befe58f57e58c8048aac13b8c6bbf00772c5e3412bd912b3f2a4b2390b0af0aaf699d9edc2c
-
SSDEEP
1536:SqtH8gd8Wu8pI8Cd8hd8dQgbH//WoS3pGNkFwYfBCJiZu+aeTH+WK/Lf1/hpnVSV:S9CT3p/FlBCJiRB
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 384 msedge.exe 384 msedge.exe 4380 msedge.exe 4380 msedge.exe 4056 identity_helper.exe 4056 identity_helper.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4380 wrote to memory of 1016 4380 msedge.exe 84 PID 4380 wrote to memory of 1016 4380 msedge.exe 84 PID 4380 wrote to memory of 2596 4380 msedge.exe 85 PID 4380 wrote to memory of 2596 4380 msedge.exe 85 PID 4380 wrote to memory of 2596 4380 msedge.exe 85 PID 4380 wrote to memory of 2596 4380 msedge.exe 85 PID 4380 wrote to memory of 2596 4380 msedge.exe 85 PID 4380 wrote to memory of 2596 4380 msedge.exe 85 PID 4380 wrote to memory of 2596 4380 msedge.exe 85 PID 4380 wrote to memory of 2596 4380 msedge.exe 85 PID 4380 wrote to memory of 2596 4380 msedge.exe 85 PID 4380 wrote to memory of 2596 4380 msedge.exe 85 PID 4380 wrote to memory of 2596 4380 msedge.exe 85 PID 4380 wrote to memory of 2596 4380 msedge.exe 85 PID 4380 wrote to memory of 2596 4380 msedge.exe 85 PID 4380 wrote to memory of 2596 4380 msedge.exe 85 PID 4380 wrote to memory of 2596 4380 msedge.exe 85 PID 4380 wrote to memory of 2596 4380 msedge.exe 85 PID 4380 wrote to memory of 2596 4380 msedge.exe 85 PID 4380 wrote to memory of 2596 4380 msedge.exe 85 PID 4380 wrote to memory of 2596 4380 msedge.exe 85 PID 4380 wrote to memory of 2596 4380 msedge.exe 85 PID 4380 wrote to memory of 2596 4380 msedge.exe 85 PID 4380 wrote to memory of 2596 4380 msedge.exe 85 PID 4380 wrote to memory of 2596 4380 msedge.exe 85 PID 4380 wrote to memory of 2596 4380 msedge.exe 85 PID 4380 wrote to memory of 2596 4380 msedge.exe 85 PID 4380 wrote to memory of 2596 4380 msedge.exe 85 PID 4380 wrote to memory of 2596 4380 msedge.exe 85 PID 4380 wrote to memory of 2596 4380 msedge.exe 85 PID 4380 wrote to memory of 2596 4380 msedge.exe 85 PID 4380 wrote to memory of 2596 4380 msedge.exe 85 PID 4380 wrote to memory of 2596 4380 msedge.exe 85 PID 4380 wrote to memory of 2596 4380 msedge.exe 85 PID 4380 wrote to memory of 2596 4380 msedge.exe 85 PID 4380 wrote to memory of 2596 4380 msedge.exe 85 PID 4380 wrote to memory of 2596 4380 msedge.exe 85 PID 4380 wrote to memory of 2596 4380 msedge.exe 85 PID 4380 wrote to memory of 2596 4380 msedge.exe 85 PID 4380 wrote to memory of 2596 4380 msedge.exe 85 PID 4380 wrote to memory of 2596 4380 msedge.exe 85 PID 4380 wrote to memory of 2596 4380 msedge.exe 85 PID 4380 wrote to memory of 384 4380 msedge.exe 86 PID 4380 wrote to memory of 384 4380 msedge.exe 86 PID 4380 wrote to memory of 2140 4380 msedge.exe 87 PID 4380 wrote to memory of 2140 4380 msedge.exe 87 PID 4380 wrote to memory of 2140 4380 msedge.exe 87 PID 4380 wrote to memory of 2140 4380 msedge.exe 87 PID 4380 wrote to memory of 2140 4380 msedge.exe 87 PID 4380 wrote to memory of 2140 4380 msedge.exe 87 PID 4380 wrote to memory of 2140 4380 msedge.exe 87 PID 4380 wrote to memory of 2140 4380 msedge.exe 87 PID 4380 wrote to memory of 2140 4380 msedge.exe 87 PID 4380 wrote to memory of 2140 4380 msedge.exe 87 PID 4380 wrote to memory of 2140 4380 msedge.exe 87 PID 4380 wrote to memory of 2140 4380 msedge.exe 87 PID 4380 wrote to memory of 2140 4380 msedge.exe 87 PID 4380 wrote to memory of 2140 4380 msedge.exe 87 PID 4380 wrote to memory of 2140 4380 msedge.exe 87 PID 4380 wrote to memory of 2140 4380 msedge.exe 87 PID 4380 wrote to memory of 2140 4380 msedge.exe 87 PID 4380 wrote to memory of 2140 4380 msedge.exe 87 PID 4380 wrote to memory of 2140 4380 msedge.exe 87 PID 4380 wrote to memory of 2140 4380 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\0df9a79f46493e08218caae3587f4277_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4380 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8130f46f8,0x7ff8130f4708,0x7ff8130f47182⤵PID:1016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2172,10435203341247630760,17893939217722774308,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2184 /prefetch:22⤵PID:2596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2172,10435203341247630760,17893939217722774308,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2236 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2172,10435203341247630760,17893939217722774308,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2808 /prefetch:82⤵PID:2140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,10435203341247630760,17893939217722774308,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:4036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,10435203341247630760,17893939217722774308,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:4744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,10435203341247630760,17893939217722774308,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4708 /prefetch:12⤵PID:632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,10435203341247630760,17893939217722774308,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4716 /prefetch:12⤵PID:512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,10435203341247630760,17893939217722774308,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5308 /prefetch:12⤵PID:5080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,10435203341247630760,17893939217722774308,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5012 /prefetch:12⤵PID:3996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2172,10435203341247630760,17893939217722774308,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5600 /prefetch:82⤵PID:3944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2172,10435203341247630760,17893939217722774308,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5600 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,10435203341247630760,17893939217722774308,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4816 /prefetch:12⤵PID:3412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,10435203341247630760,17893939217722774308,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4792 /prefetch:12⤵PID:3712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,10435203341247630760,17893939217722774308,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6048 /prefetch:12⤵PID:5304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,10435203341247630760,17893939217722774308,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5912 /prefetch:12⤵PID:5312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2172,10435203341247630760,17893939217722774308,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1848 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1464
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3836
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5048
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4608
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52a70f1bd4da893a67660d6432970788d
SHA1ddf4047e0d468f56ea0c0d8ff078a86a0bb62873
SHA256c550af5ba51f68ac4d18747edc5dea1a655dd212d84bad1e6168ba7a97745561
SHA51226b9a365e77df032fc5c461d85d1ba313eafead38827190608c6537ec12b2dfdbed4e1705bfd1e61899034791ad6fa88ea7490c3a48cdaec4d04cd0577b11343
-
Filesize
152B
MD5fbe1ce4d182aaffb80de94263be1dd35
SHA1bc6c9827aa35a136a7d79be9e606ff359e2ac3ea
SHA2560021f72dbca789f179762b0e17c28fe0b93a12539b08294800e47469905aeb51
SHA5123fb0a3b38e7d4a30f5560594b1d14e6e58419e274255fb68dfe0ca897aa181f9ce8cb2048403f851fd36a17b0e34d272d03927769d41a500b2fe64806354902f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize336B
MD5841856be236202a5f58edce813e8a89a
SHA1b117813303aa15204fa9954ac680b86a0d5e626a
SHA256a846514cc544cd4d4248f4b6fbd83779251656cab2213e7522b0941688d39d0a
SHA51284d172be3a2fec16c6bb331d4282c53e6761a6355037eae95f47ee95087564c5107ec7c5b6eec8e7e98b20d3ebc1be8dd1c2a8b5109b6f69335e65979a0713d1
-
Filesize
2KB
MD577c99b044c4c75920502f2b0a2788697
SHA1a9623988cf95e9467f490b70083dc636a9fca862
SHA256e86b18b63ad0ed8990d5f8343687f2048604ad440f5f8a0bd518615411984f58
SHA51218f3451423fe5e8846b1fa487dc898f1b664d47e57d7ae36bdb97a7fc4a043b8756831d4c5a91665787f81921fb34595a94475b1556be0c06af8a9b2da9cdb40
-
Filesize
2KB
MD54d6d467a3dc88c327063851195054036
SHA141befd2d9d4591fec41c2e0d92057a4b7eb5be4e
SHA25644ac0018baa86b5c27b574864d8977b1c65e198139bd24cc3f79f035056e1ce8
SHA512fac2db9c3f8579d495ce7a55fa77890f9726dea52f3b6ee92d1e557288399daeab7384ca58de930ec6e288ec46653e0f087fbb6bf9ee19e60426427f36aa4c18
-
Filesize
5KB
MD56e18657fa15918e926642c8efe60e8ce
SHA140156a6c776d3d7a881372e6106283e643f91592
SHA2563b55801cc0331575989d95ae091a74ab0f643683afda1272a6048780e5bb8b4f
SHA512f84b11eaae12610e955c6b9b0a46e93bba1e8bed3ed9ec95771bbada9f737f729dddf97872e96d06ef28394ad039f847dfbde157026d423906ad76de5978bcee
-
Filesize
7KB
MD56769d8d6c11c705da2ab2311fde8054b
SHA1ad7087070fb95726268ba59bac779769afdfe16a
SHA25695027ac54b98a86079c7e4bc0df6bc9d3e2cd02835c5b59ed35090e74dcd4073
SHA5120527b0085b31dacb1f707c2d490ca1a3612bd0c54ed3bd22cb8f55eecb70dbf5b2a91433d3a2ecdd60942708d209dddcb99c816105f4a09f6aef5dd32a142b25
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5ba2a9362322b324002e8a583ba7b575f
SHA1566e7ad6ce35bfc21f6f5ca9c3bd1c6f0d0b23ab
SHA2567cb3da64d325f028690687eb8214666c896be488fccc17e9fb315b9e872a10e1
SHA512b43072781b643b7936b50650ca05dc6f2121ad71da98466e158eb7dfc4e85161d5f4dd49b48217fe856fdefe9254e8fc9467f449f86a74bbfb6d6c095b5e5b84