Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
03-05-2024 11:13
Static task
static1
Behavioral task
behavioral1
Sample
10612392252f06d4107b4985c8b5c6aa_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
10612392252f06d4107b4985c8b5c6aa_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
10612392252f06d4107b4985c8b5c6aa_JaffaCakes118.html
-
Size
175KB
-
MD5
10612392252f06d4107b4985c8b5c6aa
-
SHA1
a3b1b64337c6cf864fa63df86535865d0aa2b9f5
-
SHA256
717c11130f3bf5ce4483c2067abe61abc5c32b1f53fb190def50549a72fe9c31
-
SHA512
bd1cdd5944475e4dbe0427e26076bb316889e6eac87a3982dbffabac1927dec24403b66951f614cd24d1cacf514dad04d6c8df3343a4a8436dbf4febdb3a1cf9
-
SSDEEP
1536:SqtH8gd8Wu8pI8Cd8hd8dQgbH//WoS3WGNkFzYfBCJiZL+aeTH+WK/Lf1/hpnVSV:S9CT3W/FKBCJiKB
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3560 msedge.exe 3560 msedge.exe 336 msedge.exe 336 msedge.exe 4592 identity_helper.exe 4592 identity_helper.exe 5408 msedge.exe 5408 msedge.exe 5408 msedge.exe 5408 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 336 msedge.exe 336 msedge.exe 336 msedge.exe 336 msedge.exe 336 msedge.exe 336 msedge.exe 336 msedge.exe 336 msedge.exe 336 msedge.exe 336 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 336 msedge.exe 336 msedge.exe 336 msedge.exe 336 msedge.exe 336 msedge.exe 336 msedge.exe 336 msedge.exe 336 msedge.exe 336 msedge.exe 336 msedge.exe 336 msedge.exe 336 msedge.exe 336 msedge.exe 336 msedge.exe 336 msedge.exe 336 msedge.exe 336 msedge.exe 336 msedge.exe 336 msedge.exe 336 msedge.exe 336 msedge.exe 336 msedge.exe 336 msedge.exe 336 msedge.exe 336 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 336 msedge.exe 336 msedge.exe 336 msedge.exe 336 msedge.exe 336 msedge.exe 336 msedge.exe 336 msedge.exe 336 msedge.exe 336 msedge.exe 336 msedge.exe 336 msedge.exe 336 msedge.exe 336 msedge.exe 336 msedge.exe 336 msedge.exe 336 msedge.exe 336 msedge.exe 336 msedge.exe 336 msedge.exe 336 msedge.exe 336 msedge.exe 336 msedge.exe 336 msedge.exe 336 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 336 wrote to memory of 216 336 msedge.exe 84 PID 336 wrote to memory of 216 336 msedge.exe 84 PID 336 wrote to memory of 592 336 msedge.exe 85 PID 336 wrote to memory of 592 336 msedge.exe 85 PID 336 wrote to memory of 592 336 msedge.exe 85 PID 336 wrote to memory of 592 336 msedge.exe 85 PID 336 wrote to memory of 592 336 msedge.exe 85 PID 336 wrote to memory of 592 336 msedge.exe 85 PID 336 wrote to memory of 592 336 msedge.exe 85 PID 336 wrote to memory of 592 336 msedge.exe 85 PID 336 wrote to memory of 592 336 msedge.exe 85 PID 336 wrote to memory of 592 336 msedge.exe 85 PID 336 wrote to memory of 592 336 msedge.exe 85 PID 336 wrote to memory of 592 336 msedge.exe 85 PID 336 wrote to memory of 592 336 msedge.exe 85 PID 336 wrote to memory of 592 336 msedge.exe 85 PID 336 wrote to memory of 592 336 msedge.exe 85 PID 336 wrote to memory of 592 336 msedge.exe 85 PID 336 wrote to memory of 592 336 msedge.exe 85 PID 336 wrote to memory of 592 336 msedge.exe 85 PID 336 wrote to memory of 592 336 msedge.exe 85 PID 336 wrote to memory of 592 336 msedge.exe 85 PID 336 wrote to memory of 592 336 msedge.exe 85 PID 336 wrote to memory of 592 336 msedge.exe 85 PID 336 wrote to memory of 592 336 msedge.exe 85 PID 336 wrote to memory of 592 336 msedge.exe 85 PID 336 wrote to memory of 592 336 msedge.exe 85 PID 336 wrote to memory of 592 336 msedge.exe 85 PID 336 wrote to memory of 592 336 msedge.exe 85 PID 336 wrote to memory of 592 336 msedge.exe 85 PID 336 wrote to memory of 592 336 msedge.exe 85 PID 336 wrote to memory of 592 336 msedge.exe 85 PID 336 wrote to memory of 592 336 msedge.exe 85 PID 336 wrote to memory of 592 336 msedge.exe 85 PID 336 wrote to memory of 592 336 msedge.exe 85 PID 336 wrote to memory of 592 336 msedge.exe 85 PID 336 wrote to memory of 592 336 msedge.exe 85 PID 336 wrote to memory of 592 336 msedge.exe 85 PID 336 wrote to memory of 592 336 msedge.exe 85 PID 336 wrote to memory of 592 336 msedge.exe 85 PID 336 wrote to memory of 592 336 msedge.exe 85 PID 336 wrote to memory of 592 336 msedge.exe 85 PID 336 wrote to memory of 3560 336 msedge.exe 86 PID 336 wrote to memory of 3560 336 msedge.exe 86 PID 336 wrote to memory of 2304 336 msedge.exe 87 PID 336 wrote to memory of 2304 336 msedge.exe 87 PID 336 wrote to memory of 2304 336 msedge.exe 87 PID 336 wrote to memory of 2304 336 msedge.exe 87 PID 336 wrote to memory of 2304 336 msedge.exe 87 PID 336 wrote to memory of 2304 336 msedge.exe 87 PID 336 wrote to memory of 2304 336 msedge.exe 87 PID 336 wrote to memory of 2304 336 msedge.exe 87 PID 336 wrote to memory of 2304 336 msedge.exe 87 PID 336 wrote to memory of 2304 336 msedge.exe 87 PID 336 wrote to memory of 2304 336 msedge.exe 87 PID 336 wrote to memory of 2304 336 msedge.exe 87 PID 336 wrote to memory of 2304 336 msedge.exe 87 PID 336 wrote to memory of 2304 336 msedge.exe 87 PID 336 wrote to memory of 2304 336 msedge.exe 87 PID 336 wrote to memory of 2304 336 msedge.exe 87 PID 336 wrote to memory of 2304 336 msedge.exe 87 PID 336 wrote to memory of 2304 336 msedge.exe 87 PID 336 wrote to memory of 2304 336 msedge.exe 87 PID 336 wrote to memory of 2304 336 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\10612392252f06d4107b4985c8b5c6aa_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:336 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff848f846f8,0x7ff848f84708,0x7ff848f847182⤵PID:216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,9651696513288999528,11439711067357260626,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2056 /prefetch:22⤵PID:592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2052,9651696513288999528,11439711067357260626,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2284 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2052,9651696513288999528,11439711067357260626,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2640 /prefetch:82⤵PID:2304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,9651696513288999528,11439711067357260626,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:4072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,9651696513288999528,11439711067357260626,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:1588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,9651696513288999528,11439711067357260626,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4648 /prefetch:12⤵PID:1172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,9651696513288999528,11439711067357260626,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4780 /prefetch:12⤵PID:1600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,9651696513288999528,11439711067357260626,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5260 /prefetch:12⤵PID:3108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,9651696513288999528,11439711067357260626,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4948 /prefetch:12⤵PID:4316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,9651696513288999528,11439711067357260626,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5756 /prefetch:82⤵PID:3904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,9651696513288999528,11439711067357260626,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5756 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,9651696513288999528,11439711067357260626,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5796 /prefetch:12⤵PID:4216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,9651696513288999528,11439711067357260626,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5848 /prefetch:12⤵PID:548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,9651696513288999528,11439711067357260626,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5888 /prefetch:12⤵PID:5468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,9651696513288999528,11439711067357260626,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:5476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,9651696513288999528,11439711067357260626,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1712 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5408
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1604
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2528
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1860
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59dc60aef38e7832217e7fa02d6f0d9f6
SHA14f8539dc7d5739b36fe976a932338f459d066db6
SHA2568a0ee0b6fafabb256571b691c2faf77c7244945faa749c72124d5eb43a197a32
SHA51218371541811910992c2b84a8eae7e997e8627640bdb60b9e82751389e50931db9b3e206d31f4d9d2dc3ca25ea3a82c0be413ecb0ef3ac227a14e54f406eaa7e7
-
Filesize
152B
MD57ac03b15b68af2d5cb5c8063057cc83e
SHA19b2d4db737f57322ff5c4bbddd765b3177f930ab
SHA256b90d7596301470b389842eecb46bd3a8e614260b0d374d5c35a36afb9c71a700
SHA512a5e9f40dd9040803046b0218fab6b058d49e5e2a3ada315e161fe9fc80ebb8d6d4442ccc1c98d19e561fc7c61bcf43d662fe2231cacacb447876a2113c2e3732
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize336B
MD5db3b2eebcd5e5d20bc70fc53c180908b
SHA1c44f4e5adc843b9121eef46ca9efa4d29f26dfce
SHA2568108ced4e87bf491a2eec1c08a844ee312771093eeb8ad6ff5611beb2c7e1396
SHA5122a5284761890e017a3c0fb429df904718b4a7e9f105427ff7e8392dd9d809eb7821f36752873d721f009b2bd44a1047ef32d9cdd458f0bdefe302403fa618354
-
Filesize
2KB
MD533492a8f5c1d85c0798de5b02b4fe11b
SHA1650876571de2dc9f38c7a668ccd6deda58308b6a
SHA256e913bcaafd7da7fd44f98e6b8315bd3dcbfdff187838d6e5018afd62ee46f50d
SHA512a8c064d735df85579a4ec536bad9dd3199a6aa9aa2469f2ce01a2176a06efc48311e9d8f2e2ab48a3f4c53c9bb2a0fd7a793b766b56b0b458abdf09033cbcf5b
-
Filesize
2KB
MD5b9f67b3c5cafd39be8154046a0857a51
SHA10b12f4c73a5e789cd054aaca84880c25db4bd83c
SHA2563243f3c1a09d5670347a2b7ce4cc9a26b2e67e56d920fc6fe67e3c2270c5c96f
SHA5127ac511b0b1f98d7045c90a8430442d7c7827986159f3de3cb8bbba09c701ca7d6431b85ae4051d64dff160c5d23dfee18fab2204b57936233208c3d0f6d8f529
-
Filesize
5KB
MD511a8b47cf30548981f1e329f0932db77
SHA1995a20bcc1d458428834e273026dfe0bf5dfac9d
SHA256628a13ba384f6bc0e7dba2c0f03534fb8eb32666cd0be4a8daa13ca81c0d7a53
SHA512d39178ea8caed5750a79a7a374dfb84d80c96c3e766e472a7231c832f6aec278d322248b7394c81b55f89847c78e2fd7fd467e922b27a2471169aadb4bebfebe
-
Filesize
7KB
MD5cf08c550c6f92febe7d8945e1b716177
SHA1f1ede73cce9755053f458ec68c731f055f060c62
SHA256a0b214d5bc305f1340c00559a35affc60c29f21792c735273258df09eb689ca6
SHA5120ca4cdb2c47584324a528675e310289dd0c97b91ee2203a2a588f19c47e078af5516a4b911a7f4d36205eae2ac9bcdba64e9178ef6fbe64901523c4290385c31
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD578ef5e72c45602dc7c63447bfb61a43a
SHA15f1019729da1d106cb0c6db8748212a89ebdf920
SHA2561d45c34b8254018468b7ece2afb70048a5498f8ae42be04f04138a4442b9d1fa
SHA512005ded921fcf7d2f986c4ad4d1874f1fd536ef2b2ad250bc2ae19edb04496c6f934644d66d4715e72b80b11b6f1dc62e7c4d8e0ff20b71a87d7937d003127048