Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
04-05-2024 14:19
Static task
static1
Behavioral task
behavioral1
Sample
1319e83a0a7c22ec68c7f65e1f34c60e_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1319e83a0a7c22ec68c7f65e1f34c60e_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
1319e83a0a7c22ec68c7f65e1f34c60e_JaffaCakes118.html
-
Size
4KB
-
MD5
1319e83a0a7c22ec68c7f65e1f34c60e
-
SHA1
1ae3804bf75426e820890d9195951ff933712ae9
-
SHA256
b2d9dd2c9324cbea0a9d983cbd233d84700d967f49f681e4875a470191f87e46
-
SHA512
0be1620d815f6ee4d001bfa1345efa5a1503065933ac36c4fbb6fdb79fad7d53d911f33a4cd426966b34f037532f9503cb000f32957e9bc216d471f8c401bc38
-
SSDEEP
96:ziEAemoFmV4MSEPBDvV0n47ej/hgOKiljXR1QnyneK3hb6Gc:zizZV4GD8/h/KiZXQn/spbc
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4412 msedge.exe 4412 msedge.exe 2220 msedge.exe 2220 msedge.exe 3652 identity_helper.exe 3652 identity_helper.exe 2404 msedge.exe 2404 msedge.exe 2404 msedge.exe 2404 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2220 wrote to memory of 4948 2220 msedge.exe 86 PID 2220 wrote to memory of 4948 2220 msedge.exe 86 PID 2220 wrote to memory of 1188 2220 msedge.exe 87 PID 2220 wrote to memory of 1188 2220 msedge.exe 87 PID 2220 wrote to memory of 1188 2220 msedge.exe 87 PID 2220 wrote to memory of 1188 2220 msedge.exe 87 PID 2220 wrote to memory of 1188 2220 msedge.exe 87 PID 2220 wrote to memory of 1188 2220 msedge.exe 87 PID 2220 wrote to memory of 1188 2220 msedge.exe 87 PID 2220 wrote to memory of 1188 2220 msedge.exe 87 PID 2220 wrote to memory of 1188 2220 msedge.exe 87 PID 2220 wrote to memory of 1188 2220 msedge.exe 87 PID 2220 wrote to memory of 1188 2220 msedge.exe 87 PID 2220 wrote to memory of 1188 2220 msedge.exe 87 PID 2220 wrote to memory of 1188 2220 msedge.exe 87 PID 2220 wrote to memory of 1188 2220 msedge.exe 87 PID 2220 wrote to memory of 1188 2220 msedge.exe 87 PID 2220 wrote to memory of 1188 2220 msedge.exe 87 PID 2220 wrote to memory of 1188 2220 msedge.exe 87 PID 2220 wrote to memory of 1188 2220 msedge.exe 87 PID 2220 wrote to memory of 1188 2220 msedge.exe 87 PID 2220 wrote to memory of 1188 2220 msedge.exe 87 PID 2220 wrote to memory of 1188 2220 msedge.exe 87 PID 2220 wrote to memory of 1188 2220 msedge.exe 87 PID 2220 wrote to memory of 1188 2220 msedge.exe 87 PID 2220 wrote to memory of 1188 2220 msedge.exe 87 PID 2220 wrote to memory of 1188 2220 msedge.exe 87 PID 2220 wrote to memory of 1188 2220 msedge.exe 87 PID 2220 wrote to memory of 1188 2220 msedge.exe 87 PID 2220 wrote to memory of 1188 2220 msedge.exe 87 PID 2220 wrote to memory of 1188 2220 msedge.exe 87 PID 2220 wrote to memory of 1188 2220 msedge.exe 87 PID 2220 wrote to memory of 1188 2220 msedge.exe 87 PID 2220 wrote to memory of 1188 2220 msedge.exe 87 PID 2220 wrote to memory of 1188 2220 msedge.exe 87 PID 2220 wrote to memory of 1188 2220 msedge.exe 87 PID 2220 wrote to memory of 1188 2220 msedge.exe 87 PID 2220 wrote to memory of 1188 2220 msedge.exe 87 PID 2220 wrote to memory of 1188 2220 msedge.exe 87 PID 2220 wrote to memory of 1188 2220 msedge.exe 87 PID 2220 wrote to memory of 1188 2220 msedge.exe 87 PID 2220 wrote to memory of 1188 2220 msedge.exe 87 PID 2220 wrote to memory of 4412 2220 msedge.exe 88 PID 2220 wrote to memory of 4412 2220 msedge.exe 88 PID 2220 wrote to memory of 432 2220 msedge.exe 89 PID 2220 wrote to memory of 432 2220 msedge.exe 89 PID 2220 wrote to memory of 432 2220 msedge.exe 89 PID 2220 wrote to memory of 432 2220 msedge.exe 89 PID 2220 wrote to memory of 432 2220 msedge.exe 89 PID 2220 wrote to memory of 432 2220 msedge.exe 89 PID 2220 wrote to memory of 432 2220 msedge.exe 89 PID 2220 wrote to memory of 432 2220 msedge.exe 89 PID 2220 wrote to memory of 432 2220 msedge.exe 89 PID 2220 wrote to memory of 432 2220 msedge.exe 89 PID 2220 wrote to memory of 432 2220 msedge.exe 89 PID 2220 wrote to memory of 432 2220 msedge.exe 89 PID 2220 wrote to memory of 432 2220 msedge.exe 89 PID 2220 wrote to memory of 432 2220 msedge.exe 89 PID 2220 wrote to memory of 432 2220 msedge.exe 89 PID 2220 wrote to memory of 432 2220 msedge.exe 89 PID 2220 wrote to memory of 432 2220 msedge.exe 89 PID 2220 wrote to memory of 432 2220 msedge.exe 89 PID 2220 wrote to memory of 432 2220 msedge.exe 89 PID 2220 wrote to memory of 432 2220 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\1319e83a0a7c22ec68c7f65e1f34c60e_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xfc,0xd8,0x7ffa26c646f8,0x7ffa26c64708,0x7ffa26c647182⤵PID:4948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2200,10428413962679946707,6821571722748313425,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2224 /prefetch:22⤵PID:1188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2200,10428413962679946707,6821571722748313425,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2284 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2200,10428413962679946707,6821571722748313425,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2532 /prefetch:82⤵PID:432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,10428413962679946707,6821571722748313425,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:2672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,10428413962679946707,6821571722748313425,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:4472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,10428413962679946707,6821571722748313425,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4920 /prefetch:12⤵PID:428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,10428413962679946707,6821571722748313425,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5208 /prefetch:12⤵PID:632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,10428413962679946707,6821571722748313425,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5240 /prefetch:12⤵PID:1896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2200,10428413962679946707,6821571722748313425,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5604 /prefetch:82⤵PID:3228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2200,10428413962679946707,6821571722748313425,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5604 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,10428413962679946707,6821571722748313425,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5124 /prefetch:12⤵PID:4820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,10428413962679946707,6821571722748313425,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3580 /prefetch:12⤵PID:4340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,10428413962679946707,6821571722748313425,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3556 /prefetch:12⤵PID:1040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2200,10428413962679946707,6821571722748313425,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1292 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2404
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4012
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2892
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD58b2290ca03b4ca5fe52d82550c7e7d69
SHA120583a7851a906444204ce8ba4fa51153e6cd494
SHA256f9ff4871fc5317299de907489d466e630be63d698c8f7cb77cc81faddbecc6d2
SHA512704ec8122cc1c263dff67ddbb5c20ee0db8a438674d716bc3be5b266ee5629a219b0049d721f9eb2dd8f2d8fda0163659eaa4d3e1f0a6e9072a8ffb92bb2b25d
-
Filesize
152B
MD5919c29d42fb6034fee2f5de14d573c63
SHA124a2e1042347b3853344157239bde3ed699047a8
SHA25617cd6de97a0c020cb4935739cfef4ec4e074e8d127ac4c531b6dc496580c8141
SHA512bb7eadd087bbcec8b1b8a49b102b454333f2f9708d36b6ffc3c82fdc52e46873398d967238c3bfe9ac6caef45b017a5fe3938ebf5f3053e4ef9be7b2752b563d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD50113b56074be4d27e0b80092aa9e6945
SHA18c4940f58f8858d417f87676969bd066bae2a172
SHA256aa5aa6fa326d225e82400d1e8935a6d267ffa029d90e136289beab3584e69ebf
SHA512212a54aeabac5a935db376416db413e236987229cf2e122e0dbe0916cfb528af815e5f8fd51b25d553b49fb15525623ce4edc40c273bc3d5fd5550ca26fcf664
-
Filesize
810B
MD5256202831b2a31761885a56a629bd0e8
SHA1800276c9a666ec4f6176275b47f0534b4ae49056
SHA25650228d8bddcddc2c8bcad7c044dc21dc04559b2fdd94485c2a6f9c0560aaab17
SHA5121bbb497cb49e397e5582a40b72d294070c0d23e8269de9c12b9673c0a47d2c702a527fd37f61813c4df51fb75d007ee25c207ddf48cc237069ef79d102e38eb5
-
Filesize
6KB
MD563fb0b9e0e53c22c64d9c5c7f2c7fb00
SHA1b000e3fb9f71abbfe245c78fb33183c2a39cd4a2
SHA256b29401f560d2bd4361c4bf8c3353f1cb6d2696067584e21e23fc6faa6bff7ce2
SHA5121beb2d79d69387d650a2557fc600836b4d532c6c8436c2deb80e181c3f12b57d923b70b890c922db8bdc29b89449ef54a0a9c54b9c54b0c69a5b9e1be9ef54c7
-
Filesize
5KB
MD583cbf6fe202cb5e7e4f659ee5256d1f6
SHA145ef4298bff8eb0ef8028a0f9036f5fea7b8748c
SHA25627ee01a6ad2148ce4fd1f678f1f0703bc1350aaea9bc847a23fd00b19c0c1b56
SHA51261856dc62b3eac420bf9a1c6277f57431a15702aae231d3f28bbb1dfa48cbb0e4dfc087cd856b70198ad51aef95db838559fb7e13ae5a59284b9a94234241273
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5d8f4eb1f06ab92f7c1391364fffbf711
SHA147f194229b1019544115cf35f4358c457f40f678
SHA2566f381a03628b1d13064cefcfc42d52af3806df2b912eaf36823c9fb850f4a044
SHA5127bf6031713679871f75907904719255243e339cd49abcb65792acaead446aa8b602c7c57738df7b8e0e50b4757e53293aaff988d00aca5a4e2588c05bb8f18a2