Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
03/05/2024, 04:11
Static task
static1
Behavioral task
behavioral1
Sample
0fa311ecee4745755ed25edaf3098288_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0fa311ecee4745755ed25edaf3098288_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
0fa311ecee4745755ed25edaf3098288_JaffaCakes118.html
-
Size
120KB
-
MD5
0fa311ecee4745755ed25edaf3098288
-
SHA1
43f084bdb358d64e9d4e2498bdade6af7967e0af
-
SHA256
34b364b1b86af56214f94991ce1d6bfbe49c98990bbb1fb501d45c2b07c1afa4
-
SHA512
feeb5a78726f568817db47c89543546a8c2e35955584948564767d5d008897d25cb08de80c7a5d25e4fe034c8fa0db23caf4d5ea4b96a0b7281b005a97663bf4
-
SSDEEP
3072:CFqSF3zKUP13G4k5QhLpOatVVoLdbL8aljcV22wOoS/0Ib+b+FmKgMx3uf9zSht1:WzL3G4k5QhL8atVH22wOoS/0Ib+b+FmE
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4876 msedge.exe 4876 msedge.exe 2308 msedge.exe 2308 msedge.exe 2176 identity_helper.exe 2176 identity_helper.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe 3288 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe 2308 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2308 wrote to memory of 1376 2308 msedge.exe 83 PID 2308 wrote to memory of 1376 2308 msedge.exe 83 PID 2308 wrote to memory of 4000 2308 msedge.exe 84 PID 2308 wrote to memory of 4000 2308 msedge.exe 84 PID 2308 wrote to memory of 4000 2308 msedge.exe 84 PID 2308 wrote to memory of 4000 2308 msedge.exe 84 PID 2308 wrote to memory of 4000 2308 msedge.exe 84 PID 2308 wrote to memory of 4000 2308 msedge.exe 84 PID 2308 wrote to memory of 4000 2308 msedge.exe 84 PID 2308 wrote to memory of 4000 2308 msedge.exe 84 PID 2308 wrote to memory of 4000 2308 msedge.exe 84 PID 2308 wrote to memory of 4000 2308 msedge.exe 84 PID 2308 wrote to memory of 4000 2308 msedge.exe 84 PID 2308 wrote to memory of 4000 2308 msedge.exe 84 PID 2308 wrote to memory of 4000 2308 msedge.exe 84 PID 2308 wrote to memory of 4000 2308 msedge.exe 84 PID 2308 wrote to memory of 4000 2308 msedge.exe 84 PID 2308 wrote to memory of 4000 2308 msedge.exe 84 PID 2308 wrote to memory of 4000 2308 msedge.exe 84 PID 2308 wrote to memory of 4000 2308 msedge.exe 84 PID 2308 wrote to memory of 4000 2308 msedge.exe 84 PID 2308 wrote to memory of 4000 2308 msedge.exe 84 PID 2308 wrote to memory of 4000 2308 msedge.exe 84 PID 2308 wrote to memory of 4000 2308 msedge.exe 84 PID 2308 wrote to memory of 4000 2308 msedge.exe 84 PID 2308 wrote to memory of 4000 2308 msedge.exe 84 PID 2308 wrote to memory of 4000 2308 msedge.exe 84 PID 2308 wrote to memory of 4000 2308 msedge.exe 84 PID 2308 wrote to memory of 4000 2308 msedge.exe 84 PID 2308 wrote to memory of 4000 2308 msedge.exe 84 PID 2308 wrote to memory of 4000 2308 msedge.exe 84 PID 2308 wrote to memory of 4000 2308 msedge.exe 84 PID 2308 wrote to memory of 4000 2308 msedge.exe 84 PID 2308 wrote to memory of 4000 2308 msedge.exe 84 PID 2308 wrote to memory of 4000 2308 msedge.exe 84 PID 2308 wrote to memory of 4000 2308 msedge.exe 84 PID 2308 wrote to memory of 4000 2308 msedge.exe 84 PID 2308 wrote to memory of 4000 2308 msedge.exe 84 PID 2308 wrote to memory of 4000 2308 msedge.exe 84 PID 2308 wrote to memory of 4000 2308 msedge.exe 84 PID 2308 wrote to memory of 4000 2308 msedge.exe 84 PID 2308 wrote to memory of 4000 2308 msedge.exe 84 PID 2308 wrote to memory of 4876 2308 msedge.exe 85 PID 2308 wrote to memory of 4876 2308 msedge.exe 85 PID 2308 wrote to memory of 1224 2308 msedge.exe 86 PID 2308 wrote to memory of 1224 2308 msedge.exe 86 PID 2308 wrote to memory of 1224 2308 msedge.exe 86 PID 2308 wrote to memory of 1224 2308 msedge.exe 86 PID 2308 wrote to memory of 1224 2308 msedge.exe 86 PID 2308 wrote to memory of 1224 2308 msedge.exe 86 PID 2308 wrote to memory of 1224 2308 msedge.exe 86 PID 2308 wrote to memory of 1224 2308 msedge.exe 86 PID 2308 wrote to memory of 1224 2308 msedge.exe 86 PID 2308 wrote to memory of 1224 2308 msedge.exe 86 PID 2308 wrote to memory of 1224 2308 msedge.exe 86 PID 2308 wrote to memory of 1224 2308 msedge.exe 86 PID 2308 wrote to memory of 1224 2308 msedge.exe 86 PID 2308 wrote to memory of 1224 2308 msedge.exe 86 PID 2308 wrote to memory of 1224 2308 msedge.exe 86 PID 2308 wrote to memory of 1224 2308 msedge.exe 86 PID 2308 wrote to memory of 1224 2308 msedge.exe 86 PID 2308 wrote to memory of 1224 2308 msedge.exe 86 PID 2308 wrote to memory of 1224 2308 msedge.exe 86 PID 2308 wrote to memory of 1224 2308 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\0fa311ecee4745755ed25edaf3098288_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa98e546f8,0x7ffa98e54708,0x7ffa98e547182⤵PID:1376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,13815638299718898589,11115815520497292336,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:22⤵PID:4000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,13815638299718898589,11115815520497292336,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2116,13815638299718898589,11115815520497292336,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2788 /prefetch:82⤵PID:1224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,13815638299718898589,11115815520497292336,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:12⤵PID:1328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,13815638299718898589,11115815520497292336,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:12⤵PID:2616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,13815638299718898589,11115815520497292336,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4992 /prefetch:12⤵PID:4888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,13815638299718898589,11115815520497292336,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6056 /prefetch:12⤵PID:5104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,13815638299718898589,11115815520497292336,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6040 /prefetch:12⤵PID:4592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,13815638299718898589,11115815520497292336,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5676 /prefetch:82⤵PID:1032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,13815638299718898589,11115815520497292336,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5676 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,13815638299718898589,11115815520497292336,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4344 /prefetch:12⤵PID:3968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,13815638299718898589,11115815520497292336,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5084 /prefetch:12⤵PID:3408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,13815638299718898589,11115815520497292336,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4896 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3288
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4280
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4828
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52a70f1bd4da893a67660d6432970788d
SHA1ddf4047e0d468f56ea0c0d8ff078a86a0bb62873
SHA256c550af5ba51f68ac4d18747edc5dea1a655dd212d84bad1e6168ba7a97745561
SHA51226b9a365e77df032fc5c461d85d1ba313eafead38827190608c6537ec12b2dfdbed4e1705bfd1e61899034791ad6fa88ea7490c3a48cdaec4d04cd0577b11343
-
Filesize
152B
MD5fbe1ce4d182aaffb80de94263be1dd35
SHA1bc6c9827aa35a136a7d79be9e606ff359e2ac3ea
SHA2560021f72dbca789f179762b0e17c28fe0b93a12539b08294800e47469905aeb51
SHA5123fb0a3b38e7d4a30f5560594b1d14e6e58419e274255fb68dfe0ca897aa181f9ce8cb2048403f851fd36a17b0e34d272d03927769d41a500b2fe64806354902f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD51ed8f88d44b9cfe0ca834e7ce1b7ea92
SHA16895135420a28d4bdc6e21310feac936f3d74b39
SHA25676d7c339214dab6bf94eddad166487c6e31277cd0d772f1c4d866bf8e321bdde
SHA512ed546e1a01bcc2fdc197d1bf1c19a37a3959b77d4285cd5020e795508333a173664c7d8804afbf5e63db742b2b881eaac7cb0eb70d495f54aad0327dd153a7c8
-
Filesize
1KB
MD55d33a02b166c8e39db37814c959d57b4
SHA160bde24ecf2460241ea485b066d3ac2b89f15639
SHA256bb59f8aa86f600fa04038bc9b87faeb3d8601d8ee5af6b02bd543b2c2126abf7
SHA512236e1d00c78c56b178fdbbf9de59af941a5eca8b2b8e3f1024341c94182f09a4d8a5f5d03485931ffe09cb1ca04faac912e18459a7cb3618c3b4caab7c45e671
-
Filesize
5KB
MD5596f869f7237acc0048fa15b5afc02d8
SHA15ddad7433f04c0a2df9ec1e05d6384368b4a2558
SHA256112ec2ad308a160ef116397aec08bee595504ac44a1a44f9aa56b4de4789c246
SHA512f1adc4b2b948ab934252a738716026f00afa6fbba090593e9115710c72eaebb245602a579a9f024006e05063a4b56323c5f309b310e5ef61cb37c67c0cadfb8b
-
Filesize
6KB
MD5aaaf2fbe84aa4ff5062ba5f8ba3631c7
SHA10590cb86a22a0a8e5d6169f18a05f494d4930be2
SHA256b30698bfb4add9ead732ddfd7e8f49b4119c08af02c60f962172f5538766f9ac
SHA512f4e036db024eccd8e2fcc9d66936c9610789775061de2d29022de81327716b1f115b85aa5760fb5b1fc4133a893380ed794bbecafa71d6c62255ef24fd3e45c2
-
Filesize
6KB
MD53504e4145e64c91430c2958207f645fb
SHA1946eca29b212a3bcf63d72e8262a344df390fbba
SHA2568298b1b46cc87815a261ac8f921ccb1166302eb208bfc78cf28008d66421e5c1
SHA5122e19f8dc45d5f60b6964c3fe307e4e0f8c8571b251fef29cee9a8c4559fe0a6fc286b4023065f5bba510242fa575bc782d056b7af02754a62aa0fb8dace90d9a
-
Filesize
6KB
MD5e28630b8059d8ce6ca94eca14d0408a3
SHA18c7fbc88e768bb3d39aeff59a1ea1376272d6c94
SHA2565c0303d9dff7ae850e7d8b6f1fac3bfd83e0bf3ca97723d63568a3cbdee7a7a0
SHA51212bf05e9c2052110d59472cf881e39d8b9ec1330f8eecbadea8c900a75bf84bcdf42b8e82c618a31c574665d25cab1273662d2c139aeccece787814a947f71a0
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD562b33c613176a17be9a359306d48b9e7
SHA1e43b41b7b1921a401dea1e3adbd2b310acb40edc
SHA256fafdc1ff320897fa423985512182fa32adc98725db4e0c008160b7d6342699c7
SHA512be5d735e330bbc8e876109c9c07bbe988cb6440dff0655727d4ad54690be8bab36b8337e7a3df1a34c64790dd5f20f1a2baf3c5d13ecdf874ce0d0771921ed53