Analysis
-
max time kernel
145s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
03-05-2024 09:31
Static task
static1
Behavioral task
behavioral1
Sample
10324b3d2381483d85342347c64e9e5f_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
10324b3d2381483d85342347c64e9e5f_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
10324b3d2381483d85342347c64e9e5f_JaffaCakes118.html
-
Size
77KB
-
MD5
10324b3d2381483d85342347c64e9e5f
-
SHA1
aed54e35f5d0c28cfa1343edc483d10fa39d4683
-
SHA256
8d22b06112d12bb128a577d7499f361d3023db056cc2bf2445b29f0cca96158b
-
SHA512
4744d3fd05f397415cee5e3fc4357cb69d16a40a6f54bf5dd0dc0a09946780c57567c721c4027f654d97b7c0d99f91a3190eb6a8ed0fbb0f06d8bf2eba107be5
-
SSDEEP
1536:B+ycJIRcEj4I9tZoIkRpMXqpI9tMrVOIOII:r1AI979kYapI9Orc
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3516 msedge.exe 3516 msedge.exe 116 msedge.exe 116 msedge.exe 3868 identity_helper.exe 3868 identity_helper.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 116 wrote to memory of 2612 116 msedge.exe 84 PID 116 wrote to memory of 2612 116 msedge.exe 84 PID 116 wrote to memory of 3128 116 msedge.exe 85 PID 116 wrote to memory of 3128 116 msedge.exe 85 PID 116 wrote to memory of 3128 116 msedge.exe 85 PID 116 wrote to memory of 3128 116 msedge.exe 85 PID 116 wrote to memory of 3128 116 msedge.exe 85 PID 116 wrote to memory of 3128 116 msedge.exe 85 PID 116 wrote to memory of 3128 116 msedge.exe 85 PID 116 wrote to memory of 3128 116 msedge.exe 85 PID 116 wrote to memory of 3128 116 msedge.exe 85 PID 116 wrote to memory of 3128 116 msedge.exe 85 PID 116 wrote to memory of 3128 116 msedge.exe 85 PID 116 wrote to memory of 3128 116 msedge.exe 85 PID 116 wrote to memory of 3128 116 msedge.exe 85 PID 116 wrote to memory of 3128 116 msedge.exe 85 PID 116 wrote to memory of 3128 116 msedge.exe 85 PID 116 wrote to memory of 3128 116 msedge.exe 85 PID 116 wrote to memory of 3128 116 msedge.exe 85 PID 116 wrote to memory of 3128 116 msedge.exe 85 PID 116 wrote to memory of 3128 116 msedge.exe 85 PID 116 wrote to memory of 3128 116 msedge.exe 85 PID 116 wrote to memory of 3128 116 msedge.exe 85 PID 116 wrote to memory of 3128 116 msedge.exe 85 PID 116 wrote to memory of 3128 116 msedge.exe 85 PID 116 wrote to memory of 3128 116 msedge.exe 85 PID 116 wrote to memory of 3128 116 msedge.exe 85 PID 116 wrote to memory of 3128 116 msedge.exe 85 PID 116 wrote to memory of 3128 116 msedge.exe 85 PID 116 wrote to memory of 3128 116 msedge.exe 85 PID 116 wrote to memory of 3128 116 msedge.exe 85 PID 116 wrote to memory of 3128 116 msedge.exe 85 PID 116 wrote to memory of 3128 116 msedge.exe 85 PID 116 wrote to memory of 3128 116 msedge.exe 85 PID 116 wrote to memory of 3128 116 msedge.exe 85 PID 116 wrote to memory of 3128 116 msedge.exe 85 PID 116 wrote to memory of 3128 116 msedge.exe 85 PID 116 wrote to memory of 3128 116 msedge.exe 85 PID 116 wrote to memory of 3128 116 msedge.exe 85 PID 116 wrote to memory of 3128 116 msedge.exe 85 PID 116 wrote to memory of 3128 116 msedge.exe 85 PID 116 wrote to memory of 3128 116 msedge.exe 85 PID 116 wrote to memory of 3516 116 msedge.exe 86 PID 116 wrote to memory of 3516 116 msedge.exe 86 PID 116 wrote to memory of 4844 116 msedge.exe 87 PID 116 wrote to memory of 4844 116 msedge.exe 87 PID 116 wrote to memory of 4844 116 msedge.exe 87 PID 116 wrote to memory of 4844 116 msedge.exe 87 PID 116 wrote to memory of 4844 116 msedge.exe 87 PID 116 wrote to memory of 4844 116 msedge.exe 87 PID 116 wrote to memory of 4844 116 msedge.exe 87 PID 116 wrote to memory of 4844 116 msedge.exe 87 PID 116 wrote to memory of 4844 116 msedge.exe 87 PID 116 wrote to memory of 4844 116 msedge.exe 87 PID 116 wrote to memory of 4844 116 msedge.exe 87 PID 116 wrote to memory of 4844 116 msedge.exe 87 PID 116 wrote to memory of 4844 116 msedge.exe 87 PID 116 wrote to memory of 4844 116 msedge.exe 87 PID 116 wrote to memory of 4844 116 msedge.exe 87 PID 116 wrote to memory of 4844 116 msedge.exe 87 PID 116 wrote to memory of 4844 116 msedge.exe 87 PID 116 wrote to memory of 4844 116 msedge.exe 87 PID 116 wrote to memory of 4844 116 msedge.exe 87 PID 116 wrote to memory of 4844 116 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\10324b3d2381483d85342347c64e9e5f_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:116 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffabc546f8,0x7fffabc54708,0x7fffabc547182⤵PID:2612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,5263748666165444668,14929878044154912650,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵PID:3128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2076,5263748666165444668,14929878044154912650,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2156 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2076,5263748666165444668,14929878044154912650,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2868 /prefetch:82⤵PID:4844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,5263748666165444668,14929878044154912650,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3176 /prefetch:12⤵PID:1284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,5263748666165444668,14929878044154912650,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3188 /prefetch:12⤵PID:4780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,5263748666165444668,14929878044154912650,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3076 /prefetch:12⤵PID:2956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,5263748666165444668,14929878044154912650,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5992 /prefetch:82⤵PID:4680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,5263748666165444668,14929878044154912650,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5992 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,5263748666165444668,14929878044154912650,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5576 /prefetch:12⤵PID:1972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,5263748666165444668,14929878044154912650,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5580 /prefetch:12⤵PID:2244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,5263748666165444668,14929878044154912650,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4524 /prefetch:12⤵PID:1492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,5263748666165444668,14929878044154912650,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3076 /prefetch:12⤵PID:3044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,5263748666165444668,14929878044154912650,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4976 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:228
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1232
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2040
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4492
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD562c02dda2bf22d702a9b3a1c547c5f6a
SHA18f42966df96bd2e8c1f6b31b37c9a19beb6394d6
SHA256cb8a0964605551ed5a0668c08ab888044bbd845c9225ffee5a28e0b847ede62b
SHA512a7ce2c0946382188e1d8480cfb096b29bd0dcb260ccdc74167cc351160a1884d04d57a2517eb700b3eef30eaf4a01bfbf31858365b1e624d4b0960ffd0032fa9
-
Filesize
152B
MD5850f27f857369bf7fe83c613d2ec35cb
SHA17677a061c6fd2a030b44841bfb32da0abc1dbefb
SHA256a7db700e067222e55e323a9ffc71a92f59829e81021e2607cec0d2ec6faf602a
SHA5127b1efa002b7a1a23973bff0618fb4a82cd0c5193df55cd960c7516caa63509587fd8b36f3aea6db01ece368065865af6472365b820fadce720b64b561ab5f401
-
Filesize
32KB
MD5eda13c6b6a5166489f77c8d20050d7eb
SHA183d1706bc1bb4b7e491045b945c3b50db09f58dd
SHA2566031816aca7ea5570e205613e1d9ca27f99dafad04dfaa478b78b7127acbb637
SHA512b8cf001a29d1c1a1d9d075e7e695cd913d946ab657b77ef1e23bcb452cf301f7c6a7d7c6da921e49b56108e7794ec974ce44c0fe058180aa5c9e7771f2906357
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize216B
MD55b81a4288e2910c1ce8df0ab1182b8b2
SHA1b12b247fb116c18bf68f75aeb2926dd7745b648d
SHA256bf41f6789a075fb2843bea1f9829a087cd7c4b6cc64bdb35730b1830bd508660
SHA51224b0fcd8fbbb9112bb47696b8e5c676e81ec575f2a090a3bb2370f219ade5ed141a3b4dba6eaaa23ed8839b42a422f12332591aa5d3b2864eced1416edddb04c
-
Filesize
2KB
MD5ad404ea7dd7a33550eaf04e52f70a5f4
SHA1be2ba21c87d432bb459763ee2b9e5cf53bd7ec8b
SHA25609dd305fd06b73e3d6bc1804d171b2cbe9cd64d56a80745a185a507117554b78
SHA512bd9475b387586e9cbd7640c51c702d02cac2fe5a3a1d5e7620fdf33d37813290523836637b19bbbd7ab622f61afeb0fc5cf77c64daa44d266bef29bb78afef4c
-
Filesize
2KB
MD53772e920e4a8ad1c7b3008e8071c61fc
SHA1577daa78308fcaeafdf37017808896dc9f3ddf90
SHA256be62c9ea32a351afc0e6b1a7454920cbead9d4d716c1feef1337b9cad3dd4330
SHA512d28c0f66fc7bb8eea7b9b981b9c9a90fc6e8669594362ff85ddf14c3663f08670591c90a1f25824e5a5314b03099b492d4b22b072b0ad7a26ba7a10b6dc5ada4
-
Filesize
7KB
MD5eda956563a785bb9ac7f056c8d907b8e
SHA12cd622e3d82f0606ee741370e9af1a82201c38bb
SHA25605b837f272123dc7a3de06a9ed9eb3663786cee1b20d11ee3e2d760cb7332f5f
SHA512c0b6bf3539aadd1d972caa60ab3493cd80aa5943c7800935d8957b593b54f83ce8e5eca22d56091fbbba1440a54fe62b570c243f5d80622b6f37289f4b0d346f
-
Filesize
5KB
MD50c0d7cc35683f6935415afdc36b8a4fd
SHA1f72f2ffef5475d579428d4a295be93dec1b574ac
SHA256c0d819c6387e7fc9ee2d0bedea8f5dd850b552bc0514a660f0229aefcffab1cb
SHA5123064f7742a3a124a7c295e0b959bf9a7bbcdba877fca070258f5658d9f6149a78d27617ddfa3ba08625a898489b547fdf53a29af0dbb3a5c3ddac8b9ad5fd661
-
Filesize
7KB
MD53a21058540c59761cff87ff6e3d7f125
SHA1b226560fc4c9aa681af229b1f3e042af4762610c
SHA2565e2a30c6f10d79edd8be3edf275557a5394988d8398173153800499aade755fa
SHA51297fc1bce0915396238c8cc046e6e1c41bb3f60725525259f01412e028568c464c22a16937c842a198de0c09497b28079b5d7822c26cae85c3b380210f742c5cb
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5b9e4d32a7a609941e2eaee98fe4fe1ca
SHA1d21970294cab05650137c7da82af76bf3cf4d65f
SHA256cdca89659808df7c0e3e54be6877b23f34e686c428389bbd67c339dfdc8e6124
SHA512e8eb7d1f9a3952488c39bd5cf320a60e394e169ceef8f5487cd57a3b520cddfa07b47cf88a663ce05e955919cba8e551adfe4dadef984c4390a5ffd0b9fca3b8
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e