Analysis
-
max time kernel
145s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
04/05/2024, 15:39
Static task
static1
Behavioral task
behavioral1
Sample
13609c94dec5e1efda25caf1f138b30f_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
13609c94dec5e1efda25caf1f138b30f_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
13609c94dec5e1efda25caf1f138b30f_JaffaCakes118.html
-
Size
140KB
-
MD5
13609c94dec5e1efda25caf1f138b30f
-
SHA1
59403d152be4508dcba039bd94cec7879a43b454
-
SHA256
5f2bf8a81310189f64bc5b0a3f5b9c5bf1332ba929b5f9029929441d700cee41
-
SHA512
a265297abda48de04835a63a32b6ce6426ee56583986e316e4fa025ad1d8396fa3c7b304720c2c0f42e3a03d605e6a058181acadb8690130fbc1dfe6cc84b293
-
SSDEEP
3072:/x4gooyRjfL2BnaGoWw9GkpCuNzCGMUoyor8/YVu0p7SK5yyNRk1ldGt8KNqzFs3:/x4gooyRjP9GkpCuNzCGdoyor8/YVu0x
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4128 msedge.exe 4128 msedge.exe 3092 msedge.exe 3092 msedge.exe 4576 identity_helper.exe 4576 identity_helper.exe 5928 msedge.exe 5928 msedge.exe 5928 msedge.exe 5928 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe 3092 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3092 wrote to memory of 3184 3092 msedge.exe 83 PID 3092 wrote to memory of 3184 3092 msedge.exe 83 PID 3092 wrote to memory of 4872 3092 msedge.exe 84 PID 3092 wrote to memory of 4872 3092 msedge.exe 84 PID 3092 wrote to memory of 4872 3092 msedge.exe 84 PID 3092 wrote to memory of 4872 3092 msedge.exe 84 PID 3092 wrote to memory of 4872 3092 msedge.exe 84 PID 3092 wrote to memory of 4872 3092 msedge.exe 84 PID 3092 wrote to memory of 4872 3092 msedge.exe 84 PID 3092 wrote to memory of 4872 3092 msedge.exe 84 PID 3092 wrote to memory of 4872 3092 msedge.exe 84 PID 3092 wrote to memory of 4872 3092 msedge.exe 84 PID 3092 wrote to memory of 4872 3092 msedge.exe 84 PID 3092 wrote to memory of 4872 3092 msedge.exe 84 PID 3092 wrote to memory of 4872 3092 msedge.exe 84 PID 3092 wrote to memory of 4872 3092 msedge.exe 84 PID 3092 wrote to memory of 4872 3092 msedge.exe 84 PID 3092 wrote to memory of 4872 3092 msedge.exe 84 PID 3092 wrote to memory of 4872 3092 msedge.exe 84 PID 3092 wrote to memory of 4872 3092 msedge.exe 84 PID 3092 wrote to memory of 4872 3092 msedge.exe 84 PID 3092 wrote to memory of 4872 3092 msedge.exe 84 PID 3092 wrote to memory of 4872 3092 msedge.exe 84 PID 3092 wrote to memory of 4872 3092 msedge.exe 84 PID 3092 wrote to memory of 4872 3092 msedge.exe 84 PID 3092 wrote to memory of 4872 3092 msedge.exe 84 PID 3092 wrote to memory of 4872 3092 msedge.exe 84 PID 3092 wrote to memory of 4872 3092 msedge.exe 84 PID 3092 wrote to memory of 4872 3092 msedge.exe 84 PID 3092 wrote to memory of 4872 3092 msedge.exe 84 PID 3092 wrote to memory of 4872 3092 msedge.exe 84 PID 3092 wrote to memory of 4872 3092 msedge.exe 84 PID 3092 wrote to memory of 4872 3092 msedge.exe 84 PID 3092 wrote to memory of 4872 3092 msedge.exe 84 PID 3092 wrote to memory of 4872 3092 msedge.exe 84 PID 3092 wrote to memory of 4872 3092 msedge.exe 84 PID 3092 wrote to memory of 4872 3092 msedge.exe 84 PID 3092 wrote to memory of 4872 3092 msedge.exe 84 PID 3092 wrote to memory of 4872 3092 msedge.exe 84 PID 3092 wrote to memory of 4872 3092 msedge.exe 84 PID 3092 wrote to memory of 4872 3092 msedge.exe 84 PID 3092 wrote to memory of 4872 3092 msedge.exe 84 PID 3092 wrote to memory of 4128 3092 msedge.exe 85 PID 3092 wrote to memory of 4128 3092 msedge.exe 85 PID 3092 wrote to memory of 3840 3092 msedge.exe 86 PID 3092 wrote to memory of 3840 3092 msedge.exe 86 PID 3092 wrote to memory of 3840 3092 msedge.exe 86 PID 3092 wrote to memory of 3840 3092 msedge.exe 86 PID 3092 wrote to memory of 3840 3092 msedge.exe 86 PID 3092 wrote to memory of 3840 3092 msedge.exe 86 PID 3092 wrote to memory of 3840 3092 msedge.exe 86 PID 3092 wrote to memory of 3840 3092 msedge.exe 86 PID 3092 wrote to memory of 3840 3092 msedge.exe 86 PID 3092 wrote to memory of 3840 3092 msedge.exe 86 PID 3092 wrote to memory of 3840 3092 msedge.exe 86 PID 3092 wrote to memory of 3840 3092 msedge.exe 86 PID 3092 wrote to memory of 3840 3092 msedge.exe 86 PID 3092 wrote to memory of 3840 3092 msedge.exe 86 PID 3092 wrote to memory of 3840 3092 msedge.exe 86 PID 3092 wrote to memory of 3840 3092 msedge.exe 86 PID 3092 wrote to memory of 3840 3092 msedge.exe 86 PID 3092 wrote to memory of 3840 3092 msedge.exe 86 PID 3092 wrote to memory of 3840 3092 msedge.exe 86 PID 3092 wrote to memory of 3840 3092 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\13609c94dec5e1efda25caf1f138b30f_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3092 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe4c6746f8,0x7ffe4c674708,0x7ffe4c6747182⤵PID:3184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,17466761342926795242,640088618382266466,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2276 /prefetch:22⤵PID:4872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,17466761342926795242,640088618382266466,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2304 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,17466761342926795242,640088618382266466,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2816 /prefetch:82⤵PID:3840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,17466761342926795242,640088618382266466,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3188 /prefetch:12⤵PID:4588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,17466761342926795242,640088618382266466,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3204 /prefetch:12⤵PID:1920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,17466761342926795242,640088618382266466,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4656 /prefetch:12⤵PID:3892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,17466761342926795242,640088618382266466,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3848 /prefetch:12⤵PID:3024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,17466761342926795242,640088618382266466,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6024 /prefetch:12⤵PID:884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,17466761342926795242,640088618382266466,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6040 /prefetch:12⤵PID:3540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,17466761342926795242,640088618382266466,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5444 /prefetch:82⤵PID:3792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,17466761342926795242,640088618382266466,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5444 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,17466761342926795242,640088618382266466,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5108 /prefetch:12⤵PID:3028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,17466761342926795242,640088618382266466,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5548 /prefetch:12⤵PID:3924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,17466761342926795242,640088618382266466,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5084 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5928
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2992
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2352
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD562c02dda2bf22d702a9b3a1c547c5f6a
SHA18f42966df96bd2e8c1f6b31b37c9a19beb6394d6
SHA256cb8a0964605551ed5a0668c08ab888044bbd845c9225ffee5a28e0b847ede62b
SHA512a7ce2c0946382188e1d8480cfb096b29bd0dcb260ccdc74167cc351160a1884d04d57a2517eb700b3eef30eaf4a01bfbf31858365b1e624d4b0960ffd0032fa9
-
Filesize
152B
MD5850f27f857369bf7fe83c613d2ec35cb
SHA17677a061c6fd2a030b44841bfb32da0abc1dbefb
SHA256a7db700e067222e55e323a9ffc71a92f59829e81021e2607cec0d2ec6faf602a
SHA5127b1efa002b7a1a23973bff0618fb4a82cd0c5193df55cd960c7516caa63509587fd8b36f3aea6db01ece368065865af6472365b820fadce720b64b561ab5f401
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize240B
MD59f8a8f22d870226700ee5b4f4b92f6b1
SHA1102dea687f18577a23119d01264ddfabc3ded117
SHA2567a104d5ae840548a911a878b2dabc68f29490a53fdff1390f26c5e165d10c810
SHA512d6702361d735961aca81d7a631d93a5d155c57460d57824660d62b2cef7223824932728a05838245445f9d134ca8de677ba71c46f6ea82f5ff4b108bc20f3dd0
-
Filesize
1KB
MD5881e21cbbafba34c122d493dd60375a4
SHA12dfdea6ef2a49f45c5d5b17bae26b34aa1f87bc4
SHA2562a407e4ce87eb3c61ee6bc162a02b4e78906694518e0ee547f198a2780c7988f
SHA512ae3962d6076706d35d69077a893d343a3a87670b096f58cc1ff6a6a7d7a34d2217a66188cc7f6fa71ccf7c9ac187d7a762731e670c5a02fca20e937da7437c0e
-
Filesize
5KB
MD5dc2d80cfd8a6951f8cdf589f761eb240
SHA1bfac361533a6617e66cc88d65dccb70af374d78f
SHA256e9b155c610be7078d89d48f5b497609f4138d0e52a9ac462e57a00387ae5a628
SHA512ebc5fe159a5934a9468be6637d8d38e7581ef8a143ff6610dcc64d77af73fe1ebd21f9f7bc7e608d9d0ca554170a72825474869b4a0a1a2321fadf564d6909bc
-
Filesize
7KB
MD555a7a92cc190942107addeab7c6a9866
SHA13ae666a00a854630a9693f5e7f5962e0686de115
SHA25671d57f7b9b3b2b155f5c1fbaeba2e2880f298e91be1818bfb6cf50b2ac38460d
SHA5124218d91cc0d2a685d9210762b0fc949e34cbc707f5dd2c613502c58728be2e6de6267adc9969e7e16f231c06b7431efdd60f189c59937eb9e36c8a1de59c69e2
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5f3662ac2b814ce40b1d02a16f841b451
SHA1aa33a2d8e11d6e31477681218d87415098103745
SHA256ea72de57e2b75038edbe906b2ffa51cbef51692e78ee4e135d7c204c3dc90b94
SHA51297443a9cbf95e00d992e70e1051ee4033de05e0c04951498ca8887f02613542e0284556b352ac6ef694c0f0f07ca88d8db3726680c8a1fe10977adff03493e33