Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
04/05/2024, 14:53
Static task
static1
Behavioral task
behavioral1
Sample
13365aab9243511619720390ec993fb9_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
13365aab9243511619720390ec993fb9_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
13365aab9243511619720390ec993fb9_JaffaCakes118.html
-
Size
162KB
-
MD5
13365aab9243511619720390ec993fb9
-
SHA1
8c19e96af0e0f247f30e831474f6f5fdc8b480f9
-
SHA256
bf0d7f853d66a4c88f1756e09fbdad3dec54c2b1da081a193c35b73ee0c7bd63
-
SHA512
bea9468d419ef47f16bec968545b1c5ce67b039d7a3c0da857c2391a658462a995dce26faa4663ef9613e0e426333de73783a2cafaf03dbbcaf1e4208af169ed
-
SSDEEP
3072:ewbmcVBRdlxcCAxDomfGFjdLt2jdpCIQpQKtWks8sMyKMpyrnS:ewPWCyomfGFgpCB+Km
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 836 msedge.exe 836 msedge.exe 1660 msedge.exe 1660 msedge.exe 3456 identity_helper.exe 3456 identity_helper.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe 1660 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1660 wrote to memory of 3416 1660 msedge.exe 83 PID 1660 wrote to memory of 3416 1660 msedge.exe 83 PID 1660 wrote to memory of 316 1660 msedge.exe 84 PID 1660 wrote to memory of 316 1660 msedge.exe 84 PID 1660 wrote to memory of 316 1660 msedge.exe 84 PID 1660 wrote to memory of 316 1660 msedge.exe 84 PID 1660 wrote to memory of 316 1660 msedge.exe 84 PID 1660 wrote to memory of 316 1660 msedge.exe 84 PID 1660 wrote to memory of 316 1660 msedge.exe 84 PID 1660 wrote to memory of 316 1660 msedge.exe 84 PID 1660 wrote to memory of 316 1660 msedge.exe 84 PID 1660 wrote to memory of 316 1660 msedge.exe 84 PID 1660 wrote to memory of 316 1660 msedge.exe 84 PID 1660 wrote to memory of 316 1660 msedge.exe 84 PID 1660 wrote to memory of 316 1660 msedge.exe 84 PID 1660 wrote to memory of 316 1660 msedge.exe 84 PID 1660 wrote to memory of 316 1660 msedge.exe 84 PID 1660 wrote to memory of 316 1660 msedge.exe 84 PID 1660 wrote to memory of 316 1660 msedge.exe 84 PID 1660 wrote to memory of 316 1660 msedge.exe 84 PID 1660 wrote to memory of 316 1660 msedge.exe 84 PID 1660 wrote to memory of 316 1660 msedge.exe 84 PID 1660 wrote to memory of 316 1660 msedge.exe 84 PID 1660 wrote to memory of 316 1660 msedge.exe 84 PID 1660 wrote to memory of 316 1660 msedge.exe 84 PID 1660 wrote to memory of 316 1660 msedge.exe 84 PID 1660 wrote to memory of 316 1660 msedge.exe 84 PID 1660 wrote to memory of 316 1660 msedge.exe 84 PID 1660 wrote to memory of 316 1660 msedge.exe 84 PID 1660 wrote to memory of 316 1660 msedge.exe 84 PID 1660 wrote to memory of 316 1660 msedge.exe 84 PID 1660 wrote to memory of 316 1660 msedge.exe 84 PID 1660 wrote to memory of 316 1660 msedge.exe 84 PID 1660 wrote to memory of 316 1660 msedge.exe 84 PID 1660 wrote to memory of 316 1660 msedge.exe 84 PID 1660 wrote to memory of 316 1660 msedge.exe 84 PID 1660 wrote to memory of 316 1660 msedge.exe 84 PID 1660 wrote to memory of 316 1660 msedge.exe 84 PID 1660 wrote to memory of 316 1660 msedge.exe 84 PID 1660 wrote to memory of 316 1660 msedge.exe 84 PID 1660 wrote to memory of 316 1660 msedge.exe 84 PID 1660 wrote to memory of 316 1660 msedge.exe 84 PID 1660 wrote to memory of 836 1660 msedge.exe 85 PID 1660 wrote to memory of 836 1660 msedge.exe 85 PID 1660 wrote to memory of 4416 1660 msedge.exe 86 PID 1660 wrote to memory of 4416 1660 msedge.exe 86 PID 1660 wrote to memory of 4416 1660 msedge.exe 86 PID 1660 wrote to memory of 4416 1660 msedge.exe 86 PID 1660 wrote to memory of 4416 1660 msedge.exe 86 PID 1660 wrote to memory of 4416 1660 msedge.exe 86 PID 1660 wrote to memory of 4416 1660 msedge.exe 86 PID 1660 wrote to memory of 4416 1660 msedge.exe 86 PID 1660 wrote to memory of 4416 1660 msedge.exe 86 PID 1660 wrote to memory of 4416 1660 msedge.exe 86 PID 1660 wrote to memory of 4416 1660 msedge.exe 86 PID 1660 wrote to memory of 4416 1660 msedge.exe 86 PID 1660 wrote to memory of 4416 1660 msedge.exe 86 PID 1660 wrote to memory of 4416 1660 msedge.exe 86 PID 1660 wrote to memory of 4416 1660 msedge.exe 86 PID 1660 wrote to memory of 4416 1660 msedge.exe 86 PID 1660 wrote to memory of 4416 1660 msedge.exe 86 PID 1660 wrote to memory of 4416 1660 msedge.exe 86 PID 1660 wrote to memory of 4416 1660 msedge.exe 86 PID 1660 wrote to memory of 4416 1660 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\13365aab9243511619720390ec993fb9_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe3bd946f8,0x7ffe3bd94708,0x7ffe3bd947182⤵PID:3416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2200,17646781201619570153,12533499224515495344,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2164 /prefetch:22⤵PID:316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2200,17646781201619570153,12533499224515495344,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2276 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2200,17646781201619570153,12533499224515495344,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2704 /prefetch:82⤵PID:4416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,17646781201619570153,12533499224515495344,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:1560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,17646781201619570153,12533499224515495344,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:2748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,17646781201619570153,12533499224515495344,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4680 /prefetch:12⤵PID:3172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,17646781201619570153,12533499224515495344,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:12⤵PID:3652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,17646781201619570153,12533499224515495344,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5016 /prefetch:12⤵PID:4856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,17646781201619570153,12533499224515495344,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5236 /prefetch:12⤵PID:4732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2200,17646781201619570153,12533499224515495344,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5912 /prefetch:82⤵PID:4744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2200,17646781201619570153,12533499224515495344,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5912 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,17646781201619570153,12533499224515495344,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5728 /prefetch:12⤵PID:4524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,17646781201619570153,12533499224515495344,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5784 /prefetch:12⤵PID:4860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,17646781201619570153,12533499224515495344,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5936 /prefetch:12⤵PID:4864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,17646781201619570153,12533499224515495344,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5492 /prefetch:12⤵PID:404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2200,17646781201619570153,12533499224515495344,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3088 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2268
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2904
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4564
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52a70f1bd4da893a67660d6432970788d
SHA1ddf4047e0d468f56ea0c0d8ff078a86a0bb62873
SHA256c550af5ba51f68ac4d18747edc5dea1a655dd212d84bad1e6168ba7a97745561
SHA51226b9a365e77df032fc5c461d85d1ba313eafead38827190608c6537ec12b2dfdbed4e1705bfd1e61899034791ad6fa88ea7490c3a48cdaec4d04cd0577b11343
-
Filesize
152B
MD5fbe1ce4d182aaffb80de94263be1dd35
SHA1bc6c9827aa35a136a7d79be9e606ff359e2ac3ea
SHA2560021f72dbca789f179762b0e17c28fe0b93a12539b08294800e47469905aeb51
SHA5123fb0a3b38e7d4a30f5560594b1d14e6e58419e274255fb68dfe0ca897aa181f9ce8cb2048403f851fd36a17b0e34d272d03927769d41a500b2fe64806354902f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD54fb1c499cbb44b7929373e587a469f17
SHA1d74cbb298fd46b552080be6077672ccd22d1bbcd
SHA2566865b2d24d8030c86b6a7d2d59d0a18efc257c97688c8adc6ea54d0fe9fcd0d5
SHA512ec38d4af03fbbfc6ab0f6152de6f6dd996c9ab97f1f973a67fb458a4524d90245dc8d0b5cdd387ba9f21c719b9aa9486fe4eafd65063f00dd43345c4c5b1f210
-
Filesize
1KB
MD54ded3709220462634660cfdd82651fb7
SHA16ddbc6c42e62af95c797a43e68e573b52dce2d1c
SHA2561fccab6349b5bcc8459248f6720564df1d0fe839e074da8005ab4631c84a1ff2
SHA5122d036010fb2692e1682fbcf3b2e8b375f9ba996fea9381fa9f4635d5b080193d519e451ca1b458203a03d07410621dcf86228f2df3f26a99493438ba391d0876
-
Filesize
5KB
MD52d775cf9b3266b63e431984e6cc7835e
SHA1ba28d863b9ca911c1dbfaa7fc202d2fd0780700f
SHA256a5762a97b5f0b88ae6dd6c06be80c85562a71be56da9cde544c0156775ca5f77
SHA512bfda0da325c07bc06b3f8562dc5ea5b3f9a9aeea6184113feed288ef1a1206ef03f0df68f42050ba5c0048289d24eb9076b6f184c068977b99ab2ea32bee6fbb
-
Filesize
6KB
MD5ef3b4fc946de7941fd1b70a588f7a6db
SHA155f2a679ed50e10215a3a811b652f881382b4874
SHA2568ea422743ce8d9216c46359daf5b15eb9b2de5c21d53da90d0e367eb22dcab79
SHA5123658f50bad7dffd29e4babd1cdce847934b0019d5547af35a3d84c03032b6912f0af49faa4f86a29629436754dd4afdd9bd776631975f9059a65ba913398efc0
-
Filesize
6KB
MD5a3bb25320b0349e0e2dd73386ac6af4f
SHA1df32ae8f7cbe5e2359bec8d257540d322d0c2a1c
SHA25668ae4e0c7045c64a737429f1ccd12a8d1317b3ab72a06e3e7bbebc71c3e560f9
SHA5126082182dead88976a4c12335580e0c76332cdebae38d4d0c3c46ca1394e73461919ebd1b5d69f1667b94f0a214b7bbbf99d25072807110b03e98c652c789f630
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5f050f786202654c7d82f49285f6c6721
SHA155e07a4c3126d6f25e8964271d92f980fd050062
SHA25638206de9f657ee97ff7033f524ee89b4ddc71ab0040360b44ab82c82f23b7e3a
SHA5129b4253ac6d7bbf04a3bea6e24060929eccfc6423e10dc308465ce32a89cf8be147233e26b012c6b6feb131c7154494450075c0c2020981120d5b27892c5ca39f