Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
04/05/2024, 16:55
Static task
static1
Behavioral task
behavioral1
Sample
13a3f36d9a5aba18c58e1701c26821db_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
13a3f36d9a5aba18c58e1701c26821db_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
13a3f36d9a5aba18c58e1701c26821db_JaffaCakes118.html
-
Size
82KB
-
MD5
13a3f36d9a5aba18c58e1701c26821db
-
SHA1
e903317954e0ee5bfa4fcaf908a0c27b69058ed6
-
SHA256
0c215bf8fcabc10751098e0c4b52bc843771736a125de7816c644cc3dd2dea77
-
SHA512
6d7bd2e07b8951fccec8f1088ef8034815d866e2f567af415e92487c560dc7e4128375a5ddfdacf333a8924a1bbcf0b8c46ff9a7121f8caaf8c1434811a0e6dc
-
SSDEEP
768:/lkSgOriWNQuavoBgG0qZUcDGJBmD7VcG6yByDceADDv4+yYGPG8vvMNTTtts29S:+aCqZUc6/zUvb8vvYnttJe
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4824 msedge.exe 4824 msedge.exe 876 msedge.exe 876 msedge.exe 2940 identity_helper.exe 2940 identity_helper.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe 876 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 876 wrote to memory of 1252 876 msedge.exe 84 PID 876 wrote to memory of 1252 876 msedge.exe 84 PID 876 wrote to memory of 1408 876 msedge.exe 85 PID 876 wrote to memory of 1408 876 msedge.exe 85 PID 876 wrote to memory of 1408 876 msedge.exe 85 PID 876 wrote to memory of 1408 876 msedge.exe 85 PID 876 wrote to memory of 1408 876 msedge.exe 85 PID 876 wrote to memory of 1408 876 msedge.exe 85 PID 876 wrote to memory of 1408 876 msedge.exe 85 PID 876 wrote to memory of 1408 876 msedge.exe 85 PID 876 wrote to memory of 1408 876 msedge.exe 85 PID 876 wrote to memory of 1408 876 msedge.exe 85 PID 876 wrote to memory of 1408 876 msedge.exe 85 PID 876 wrote to memory of 1408 876 msedge.exe 85 PID 876 wrote to memory of 1408 876 msedge.exe 85 PID 876 wrote to memory of 1408 876 msedge.exe 85 PID 876 wrote to memory of 1408 876 msedge.exe 85 PID 876 wrote to memory of 1408 876 msedge.exe 85 PID 876 wrote to memory of 1408 876 msedge.exe 85 PID 876 wrote to memory of 1408 876 msedge.exe 85 PID 876 wrote to memory of 1408 876 msedge.exe 85 PID 876 wrote to memory of 1408 876 msedge.exe 85 PID 876 wrote to memory of 1408 876 msedge.exe 85 PID 876 wrote to memory of 1408 876 msedge.exe 85 PID 876 wrote to memory of 1408 876 msedge.exe 85 PID 876 wrote to memory of 1408 876 msedge.exe 85 PID 876 wrote to memory of 1408 876 msedge.exe 85 PID 876 wrote to memory of 1408 876 msedge.exe 85 PID 876 wrote to memory of 1408 876 msedge.exe 85 PID 876 wrote to memory of 1408 876 msedge.exe 85 PID 876 wrote to memory of 1408 876 msedge.exe 85 PID 876 wrote to memory of 1408 876 msedge.exe 85 PID 876 wrote to memory of 1408 876 msedge.exe 85 PID 876 wrote to memory of 1408 876 msedge.exe 85 PID 876 wrote to memory of 1408 876 msedge.exe 85 PID 876 wrote to memory of 1408 876 msedge.exe 85 PID 876 wrote to memory of 1408 876 msedge.exe 85 PID 876 wrote to memory of 1408 876 msedge.exe 85 PID 876 wrote to memory of 1408 876 msedge.exe 85 PID 876 wrote to memory of 1408 876 msedge.exe 85 PID 876 wrote to memory of 1408 876 msedge.exe 85 PID 876 wrote to memory of 1408 876 msedge.exe 85 PID 876 wrote to memory of 4824 876 msedge.exe 86 PID 876 wrote to memory of 4824 876 msedge.exe 86 PID 876 wrote to memory of 4968 876 msedge.exe 87 PID 876 wrote to memory of 4968 876 msedge.exe 87 PID 876 wrote to memory of 4968 876 msedge.exe 87 PID 876 wrote to memory of 4968 876 msedge.exe 87 PID 876 wrote to memory of 4968 876 msedge.exe 87 PID 876 wrote to memory of 4968 876 msedge.exe 87 PID 876 wrote to memory of 4968 876 msedge.exe 87 PID 876 wrote to memory of 4968 876 msedge.exe 87 PID 876 wrote to memory of 4968 876 msedge.exe 87 PID 876 wrote to memory of 4968 876 msedge.exe 87 PID 876 wrote to memory of 4968 876 msedge.exe 87 PID 876 wrote to memory of 4968 876 msedge.exe 87 PID 876 wrote to memory of 4968 876 msedge.exe 87 PID 876 wrote to memory of 4968 876 msedge.exe 87 PID 876 wrote to memory of 4968 876 msedge.exe 87 PID 876 wrote to memory of 4968 876 msedge.exe 87 PID 876 wrote to memory of 4968 876 msedge.exe 87 PID 876 wrote to memory of 4968 876 msedge.exe 87 PID 876 wrote to memory of 4968 876 msedge.exe 87 PID 876 wrote to memory of 4968 876 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\13a3f36d9a5aba18c58e1701c26821db_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:876 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffed99846f8,0x7ffed9984708,0x7ffed99847182⤵PID:1252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,14384485357863479190,17640836265444859840,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2080 /prefetch:22⤵PID:1408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2052,14384485357863479190,17640836265444859840,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2204 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2052,14384485357863479190,17640836265444859840,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2884 /prefetch:82⤵PID:4968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,14384485357863479190,17640836265444859840,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2424 /prefetch:12⤵PID:3348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,14384485357863479190,17640836265444859840,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:5112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,14384485357863479190,17640836265444859840,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4996 /prefetch:12⤵PID:3648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,14384485357863479190,17640836265444859840,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4588 /prefetch:82⤵PID:4468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,14384485357863479190,17640836265444859840,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4588 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,14384485357863479190,17640836265444859840,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5276 /prefetch:12⤵PID:3864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,14384485357863479190,17640836265444859840,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3944 /prefetch:12⤵PID:3140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,14384485357863479190,17640836265444859840,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5004 /prefetch:12⤵PID:3088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,14384485357863479190,17640836265444859840,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5088 /prefetch:12⤵PID:1156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,14384485357863479190,17640836265444859840,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2768 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3056
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1344
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:456
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5bcea78449b16597295d8cc5461be9758
SHA16a7dd18dbb893361616af310c21680c023e9bcb8
SHA256c7d8f834c6e605be4942a1dac77730f5b9f6e3e49c78969afd3f282e7518ba60
SHA512b3eee70de1927978467339d4bf2e94cf0b0d585ba9f771f3419d1dc8d22458016c43dd3f6681ad5bd260f2dd9b9aa0dad5ef352f2880d04599be0311d0a962f2
-
Filesize
152B
MD54e96ed67859d0bafd47d805a71041f49
SHA17806c54ae29a6c8d01dcbc78e5525ddde321b16b
SHA256bd13ddab4dc4bbf01ed50341953c9638f6d71faf92bc79fbfe93687432c2292d
SHA512432201c3119779d91d13da55a26d4ff4ce4a9529e00b44ec1738029f92610d4e6e25c05694adf949c3e9c70fbbbbea723f63c29287906729f5e88a046a2edcb7
-
Filesize
152B
MD51cbd0e9a14155b7f5d4f542d09a83153
SHA127a442a921921d69743a8e4b76ff0b66016c4b76
SHA256243d05d6af19bfe3e06b1f7507342ead88f9d87b84e239ad1d144e9e454b548c
SHA51217e5217d5bf67571afb0e7ef30ac21c11ea6553f89457548d96ee4461011f641a7872a37257239fa5f25702f027afb85d5bd9faf2f2f183992b8879407e56a0d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD5eef7dc1b9e99cd196737396db4f3cf4e
SHA1d6b480e5db56fa8583ed36c4c78cb47c971f732e
SHA25676b5619037d87d6eb1382d776ccfe43bce40600c752bf9d94303e4661290700b
SHA5121f509abb2bad8d07869ccbea08adb77fe9febbe1f98cd63a583aad3215bb2f1efefe61c7b14e53139b23e90a9d58cfb81eca296bc0ca8f58df9e49f829744acd
-
Filesize
1KB
MD56da43fbaa6309e0895405f7a2cacdfb2
SHA10d28f9ff40b06bb7183a011414947b120a657f7f
SHA2561b313cdfcb13969c78fb1af9379bc44f8db4b85009655d491a035d4c113eeff0
SHA5122a0fe5a7a1b6026dc23f0f4fcd54036825695bcc6687f688bbeb134822300e4554a62b6b5449ae41e779ccddfe79cf8abea0da57afdcb26e6f032f25f075701f
-
Filesize
5KB
MD5b63ed5f8b1e64b7d34a7a7c1bc032794
SHA1a8a05147a04224901aacdf4005fbd38e2e40de94
SHA256656a26425bbd73db333836efc0b58434d365a5c447b3985eba4e67e64713f6dc
SHA512eb3ea0b82e632726d3ea701a78855aa6b658a8e2d963ac9ae7a8053ade276c3e0aaa2c34925ecc9076382bd58931167c83d1a02c5c26b2064289ba31afe8475a
-
Filesize
6KB
MD588cac1c47db59784f96674b8692a7511
SHA1337c22b6a9fb3d011c33794b45373ec69726223f
SHA2564d3ec96b785656aa8a98a0204f87f37d6f9094844aa2d18045659d69e89666e0
SHA512754eda3e534febb22e6b4e841b99710d436af3a54b3cdb5b288eac2ad46f8c81465f1841e2783da72d335af2f3e3368d2fbb961de5cede74686197e5a3044013
-
Filesize
6KB
MD5ea00e2329b0b3a89d75b6eab8e4f3b60
SHA13aa69f10f7e09a843da7dee63dfab2c5a9ff4b53
SHA2560856a63f0891f43f8a488c8b8f3233c53c8344700ccec4fb7157d51415ab77fc
SHA5127a0d7ec316fb8159584f380bc5f63cff22579ee9e9364617f7f315c0669709dd211a0bf184f68163637a2d214b809110e58bdb364acf9d9dc936afdb6f668b22
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389