Analysis
-
max time kernel
145s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
04/05/2024, 07:58
Static task
static1
Behavioral task
behavioral1
Sample
11c8de8b686a305f94059a1baca20bf2_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
11c8de8b686a305f94059a1baca20bf2_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
11c8de8b686a305f94059a1baca20bf2_JaffaCakes118.html
-
Size
43KB
-
MD5
11c8de8b686a305f94059a1baca20bf2
-
SHA1
3232d269aa54609257983e9edc2228f74e764a5f
-
SHA256
4997249d8f1688c9c12ea341a589865a09b8d63f5454b6ef7f9734b6d6555739
-
SHA512
97a0d8100b993df31207e6f967e4e8f0fc2c80072fb18bdb2bc7a3c216208b7b6ba3e4b94384e638a055a697cfc1d1fa5c9fce29a29e720d6e4c239bf0cc6a7b
-
SSDEEP
384:SEBWm6WzR0/eXBMsBM/BM5BM1BMTJ/zPTVWyCI6zBj/ld3Gc9:SEEWt02XCsC/C5C1CTdfVd6x
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2804 msedge.exe 2804 msedge.exe 4140 msedge.exe 4140 msedge.exe 3760 identity_helper.exe 3760 identity_helper.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4140 wrote to memory of 1452 4140 msedge.exe 83 PID 4140 wrote to memory of 1452 4140 msedge.exe 83 PID 4140 wrote to memory of 4348 4140 msedge.exe 84 PID 4140 wrote to memory of 4348 4140 msedge.exe 84 PID 4140 wrote to memory of 4348 4140 msedge.exe 84 PID 4140 wrote to memory of 4348 4140 msedge.exe 84 PID 4140 wrote to memory of 4348 4140 msedge.exe 84 PID 4140 wrote to memory of 4348 4140 msedge.exe 84 PID 4140 wrote to memory of 4348 4140 msedge.exe 84 PID 4140 wrote to memory of 4348 4140 msedge.exe 84 PID 4140 wrote to memory of 4348 4140 msedge.exe 84 PID 4140 wrote to memory of 4348 4140 msedge.exe 84 PID 4140 wrote to memory of 4348 4140 msedge.exe 84 PID 4140 wrote to memory of 4348 4140 msedge.exe 84 PID 4140 wrote to memory of 4348 4140 msedge.exe 84 PID 4140 wrote to memory of 4348 4140 msedge.exe 84 PID 4140 wrote to memory of 4348 4140 msedge.exe 84 PID 4140 wrote to memory of 4348 4140 msedge.exe 84 PID 4140 wrote to memory of 4348 4140 msedge.exe 84 PID 4140 wrote to memory of 4348 4140 msedge.exe 84 PID 4140 wrote to memory of 4348 4140 msedge.exe 84 PID 4140 wrote to memory of 4348 4140 msedge.exe 84 PID 4140 wrote to memory of 4348 4140 msedge.exe 84 PID 4140 wrote to memory of 4348 4140 msedge.exe 84 PID 4140 wrote to memory of 4348 4140 msedge.exe 84 PID 4140 wrote to memory of 4348 4140 msedge.exe 84 PID 4140 wrote to memory of 4348 4140 msedge.exe 84 PID 4140 wrote to memory of 4348 4140 msedge.exe 84 PID 4140 wrote to memory of 4348 4140 msedge.exe 84 PID 4140 wrote to memory of 4348 4140 msedge.exe 84 PID 4140 wrote to memory of 4348 4140 msedge.exe 84 PID 4140 wrote to memory of 4348 4140 msedge.exe 84 PID 4140 wrote to memory of 4348 4140 msedge.exe 84 PID 4140 wrote to memory of 4348 4140 msedge.exe 84 PID 4140 wrote to memory of 4348 4140 msedge.exe 84 PID 4140 wrote to memory of 4348 4140 msedge.exe 84 PID 4140 wrote to memory of 4348 4140 msedge.exe 84 PID 4140 wrote to memory of 4348 4140 msedge.exe 84 PID 4140 wrote to memory of 4348 4140 msedge.exe 84 PID 4140 wrote to memory of 4348 4140 msedge.exe 84 PID 4140 wrote to memory of 4348 4140 msedge.exe 84 PID 4140 wrote to memory of 4348 4140 msedge.exe 84 PID 4140 wrote to memory of 2804 4140 msedge.exe 85 PID 4140 wrote to memory of 2804 4140 msedge.exe 85 PID 4140 wrote to memory of 544 4140 msedge.exe 86 PID 4140 wrote to memory of 544 4140 msedge.exe 86 PID 4140 wrote to memory of 544 4140 msedge.exe 86 PID 4140 wrote to memory of 544 4140 msedge.exe 86 PID 4140 wrote to memory of 544 4140 msedge.exe 86 PID 4140 wrote to memory of 544 4140 msedge.exe 86 PID 4140 wrote to memory of 544 4140 msedge.exe 86 PID 4140 wrote to memory of 544 4140 msedge.exe 86 PID 4140 wrote to memory of 544 4140 msedge.exe 86 PID 4140 wrote to memory of 544 4140 msedge.exe 86 PID 4140 wrote to memory of 544 4140 msedge.exe 86 PID 4140 wrote to memory of 544 4140 msedge.exe 86 PID 4140 wrote to memory of 544 4140 msedge.exe 86 PID 4140 wrote to memory of 544 4140 msedge.exe 86 PID 4140 wrote to memory of 544 4140 msedge.exe 86 PID 4140 wrote to memory of 544 4140 msedge.exe 86 PID 4140 wrote to memory of 544 4140 msedge.exe 86 PID 4140 wrote to memory of 544 4140 msedge.exe 86 PID 4140 wrote to memory of 544 4140 msedge.exe 86 PID 4140 wrote to memory of 544 4140 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\11c8de8b686a305f94059a1baca20bf2_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4140 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff88c4c46f8,0x7ff88c4c4708,0x7ff88c4c47182⤵PID:1452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2036,9328736956575873677,289497106782113631,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2068 /prefetch:22⤵PID:4348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2036,9328736956575873677,289497106782113631,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2204 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2036,9328736956575873677,289497106782113631,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2812 /prefetch:82⤵PID:544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,9328736956575873677,289497106782113631,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:2440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,9328736956575873677,289497106782113631,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:1536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,9328736956575873677,289497106782113631,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5132 /prefetch:12⤵PID:1220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2036,9328736956575873677,289497106782113631,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5376 /prefetch:82⤵PID:3128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2036,9328736956575873677,289497106782113631,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5376 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,9328736956575873677,289497106782113631,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5048 /prefetch:12⤵PID:4468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,9328736956575873677,289497106782113631,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4788 /prefetch:12⤵PID:1868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,9328736956575873677,289497106782113631,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4084 /prefetch:12⤵PID:3328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,9328736956575873677,289497106782113631,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5872 /prefetch:12⤵PID:1788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2036,9328736956575873677,289497106782113631,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5968 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2496
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4008
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4216
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54e96ed67859d0bafd47d805a71041f49
SHA17806c54ae29a6c8d01dcbc78e5525ddde321b16b
SHA256bd13ddab4dc4bbf01ed50341953c9638f6d71faf92bc79fbfe93687432c2292d
SHA512432201c3119779d91d13da55a26d4ff4ce4a9529e00b44ec1738029f92610d4e6e25c05694adf949c3e9c70fbbbbea723f63c29287906729f5e88a046a2edcb7
-
Filesize
152B
MD51cbd0e9a14155b7f5d4f542d09a83153
SHA127a442a921921d69743a8e4b76ff0b66016c4b76
SHA256243d05d6af19bfe3e06b1f7507342ead88f9d87b84e239ad1d144e9e454b548c
SHA51217e5217d5bf67571afb0e7ef30ac21c11ea6553f89457548d96ee4461011f641a7872a37257239fa5f25702f027afb85d5bd9faf2f2f183992b8879407e56a0d
-
Filesize
22KB
MD55e74c6d871232d6fe5d88711ece1408b
SHA11a5d3ac31e833df4c091f14c94a2ecd1c6294875
SHA256bcadf445d413314a44375c63418a0f255fbac7afae40be0a80c9231751176105
SHA5129d001eabce7ffdbf8e338725ef07f0033d0780ea474b7d33c2ad63886ff3578d818eb5c9b130d726353cd813160b49f572736dd288cece84e9bd8b784ce530d5
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD5f4684a357539046c2c127cd3a210fe27
SHA1fd41654b47f4a1f9c26d48646ec5170f4a0602f3
SHA256511c413c99618007a5834c94939c341f5b6cfdb8cd7ddf72c9ec44094635b88a
SHA51255b849d450d2dcaaa177a97963fc45a8142d609fda6e53caf95ac8db4d03f1c990a9a1ed5e2784c3d25199a46264ad630c4d642cd1bfa0d77047f9f329a86bf3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD521261b7da096f914fc5b942aa74305cf
SHA186ea9793df661b7b0057716e6b0ab5b2ed637f54
SHA2567839fb668cf10d4984b363e9b464c2d715371df9f695472ee846666b42d01e77
SHA51293b2913ec67004801f9413b1f8b7a6f492d952074273688bb200762af13ed49e81197874d19287594a1f6cce1c556bd21eb7040006356fda05a2083ce530fdda
-
Filesize
986B
MD55497fc14df76f338dbcecaed66c441ac
SHA171bae2075c28b29c632eb80af6a42b3073413400
SHA25630bd5e62f3ccf9654754da99ee9b363dd8e542a95f78b6f4767a0473082bc5c0
SHA5125c2250581d469d895619ddf1f8f9e76ec5e078d1b986df9a3e014212b7bcad21761a3ab6b52e49dee5481b013d847a88f103a1325cbe928ca13f30dc166b31e5
-
Filesize
6KB
MD5fcd4bfae9e86e96a6b16ceadd928c4b8
SHA1843f45d6438ef9b4cb3c988781853a635b36f87b
SHA256d553c80b1d4443bcc8e686e6a3b11d974bbecae75ca97f52e2a6ca6fb1186543
SHA51264ef70c1acf305fa4e9c1e5fa1d0c7f56771d81aac2d041a7995e0e6825906b38bd06b5f83e4241d3b341735699476a36aec35099e68cce0d389dcd3ca118180
-
Filesize
5KB
MD5ab051a2542830f3134e8121cf2d0aa23
SHA156aae49450d0ab9df82be0b998a4b193f55f922a
SHA256f28a94ede516a54df81a0edf78873890ae8c70cae966d5f158a21d266e0f1603
SHA512af647672be23eb3e06f32b7eed96413853b9ce5cc8ba96c3a24ee60096873749794506fac6ebf028d5b5de04122bfb267f694be7c7e286daec519242a81d916a
-
Filesize
6KB
MD5c8a0f6f5b73d1d6e48715e426165f3ef
SHA1a2b1487dc06e31e1db9fc9c38d11964c04261edf
SHA25691cc757418098c2c560a344887c5cd230db2ab33c7cd8965b7470a47d702bfbe
SHA512c76a03dba940bfa0bc47d363b03823ee81b5278ab8aabb8f647ac381c0be0f482e059dff3a661ed339a9184ff9f8bce524405b5f36f566458de6bac20572ac4d
-
Filesize
6KB
MD5e34319e457132407f98e5ca5137e2f88
SHA1c195af2d14dac439f3cfa103e7a851b087280314
SHA256428f69a729b269978dd02d6f0b7208def047322bdc84351fd23874aceb3499bf
SHA512424cc935644029d17773ba72414e9673bfe3b0877cc6a9e34fb634d1c5e035c21bfd287fb285ba8e0a6da4292fa90a668891a9deebc50f83e7cc9302b12201c2
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5a05e31bc8f014ecd1c67bd4c74054d25
SHA1042bc074a3bc22a542c624ff5e2ec78379109398
SHA25690ddb3341c264e6618d4d0b2fc1c3b7ca13f8b0073e2e23fa2ebe5d55442aa97
SHA512f2cda02bc9b0022e873dd3920a04944164b68608690b6f799e1af74adf21e25addf79e2860cf885ffe3b68b34f3529915cc5756b5efc91c38c806a4622d4e3fd