Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
04-05-2024 20:15
Static task
static1
Behavioral task
behavioral1
Sample
14502eec633be5efdd26d5008b237c27_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
14502eec633be5efdd26d5008b237c27_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
14502eec633be5efdd26d5008b237c27_JaffaCakes118.html
-
Size
175KB
-
MD5
14502eec633be5efdd26d5008b237c27
-
SHA1
94e3afbc447ae91f5fd2fa5ea249ce0aaf3cec3b
-
SHA256
32d71924acfeb044c809c7ca37d716d0323e90a5a353bd509ce6cd56d68e0ac1
-
SHA512
dba14e58385f6d03fa5838e8e356c6123dff79c79d29d18819ca43330d2593eee18d5b9c5d57079b53f877ce1c100d7c84e05f660455caf96ac572ac1858bed7
-
SSDEEP
1536:Sqtz8hd8Wu8pI8Cd8hd8dQg0H//3oS30GNkFkYfBCJisB+aeTH+WK/Lf1/hmnVSV:SOoT30/FRBCJitm
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1960 msedge.exe 1960 msedge.exe 180 msedge.exe 180 msedge.exe 4208 identity_helper.exe 4208 identity_helper.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 180 msedge.exe 180 msedge.exe 180 msedge.exe 180 msedge.exe 180 msedge.exe 180 msedge.exe 180 msedge.exe 180 msedge.exe 180 msedge.exe 180 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 180 msedge.exe 180 msedge.exe 180 msedge.exe 180 msedge.exe 180 msedge.exe 180 msedge.exe 180 msedge.exe 180 msedge.exe 180 msedge.exe 180 msedge.exe 180 msedge.exe 180 msedge.exe 180 msedge.exe 180 msedge.exe 180 msedge.exe 180 msedge.exe 180 msedge.exe 180 msedge.exe 180 msedge.exe 180 msedge.exe 180 msedge.exe 180 msedge.exe 180 msedge.exe 180 msedge.exe 180 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 180 msedge.exe 180 msedge.exe 180 msedge.exe 180 msedge.exe 180 msedge.exe 180 msedge.exe 180 msedge.exe 180 msedge.exe 180 msedge.exe 180 msedge.exe 180 msedge.exe 180 msedge.exe 180 msedge.exe 180 msedge.exe 180 msedge.exe 180 msedge.exe 180 msedge.exe 180 msedge.exe 180 msedge.exe 180 msedge.exe 180 msedge.exe 180 msedge.exe 180 msedge.exe 180 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 180 wrote to memory of 2960 180 msedge.exe 85 PID 180 wrote to memory of 2960 180 msedge.exe 85 PID 180 wrote to memory of 4020 180 msedge.exe 86 PID 180 wrote to memory of 4020 180 msedge.exe 86 PID 180 wrote to memory of 4020 180 msedge.exe 86 PID 180 wrote to memory of 4020 180 msedge.exe 86 PID 180 wrote to memory of 4020 180 msedge.exe 86 PID 180 wrote to memory of 4020 180 msedge.exe 86 PID 180 wrote to memory of 4020 180 msedge.exe 86 PID 180 wrote to memory of 4020 180 msedge.exe 86 PID 180 wrote to memory of 4020 180 msedge.exe 86 PID 180 wrote to memory of 4020 180 msedge.exe 86 PID 180 wrote to memory of 4020 180 msedge.exe 86 PID 180 wrote to memory of 4020 180 msedge.exe 86 PID 180 wrote to memory of 4020 180 msedge.exe 86 PID 180 wrote to memory of 4020 180 msedge.exe 86 PID 180 wrote to memory of 4020 180 msedge.exe 86 PID 180 wrote to memory of 4020 180 msedge.exe 86 PID 180 wrote to memory of 4020 180 msedge.exe 86 PID 180 wrote to memory of 4020 180 msedge.exe 86 PID 180 wrote to memory of 4020 180 msedge.exe 86 PID 180 wrote to memory of 4020 180 msedge.exe 86 PID 180 wrote to memory of 4020 180 msedge.exe 86 PID 180 wrote to memory of 4020 180 msedge.exe 86 PID 180 wrote to memory of 4020 180 msedge.exe 86 PID 180 wrote to memory of 4020 180 msedge.exe 86 PID 180 wrote to memory of 4020 180 msedge.exe 86 PID 180 wrote to memory of 4020 180 msedge.exe 86 PID 180 wrote to memory of 4020 180 msedge.exe 86 PID 180 wrote to memory of 4020 180 msedge.exe 86 PID 180 wrote to memory of 4020 180 msedge.exe 86 PID 180 wrote to memory of 4020 180 msedge.exe 86 PID 180 wrote to memory of 4020 180 msedge.exe 86 PID 180 wrote to memory of 4020 180 msedge.exe 86 PID 180 wrote to memory of 4020 180 msedge.exe 86 PID 180 wrote to memory of 4020 180 msedge.exe 86 PID 180 wrote to memory of 4020 180 msedge.exe 86 PID 180 wrote to memory of 4020 180 msedge.exe 86 PID 180 wrote to memory of 4020 180 msedge.exe 86 PID 180 wrote to memory of 4020 180 msedge.exe 86 PID 180 wrote to memory of 4020 180 msedge.exe 86 PID 180 wrote to memory of 4020 180 msedge.exe 86 PID 180 wrote to memory of 1960 180 msedge.exe 87 PID 180 wrote to memory of 1960 180 msedge.exe 87 PID 180 wrote to memory of 4920 180 msedge.exe 88 PID 180 wrote to memory of 4920 180 msedge.exe 88 PID 180 wrote to memory of 4920 180 msedge.exe 88 PID 180 wrote to memory of 4920 180 msedge.exe 88 PID 180 wrote to memory of 4920 180 msedge.exe 88 PID 180 wrote to memory of 4920 180 msedge.exe 88 PID 180 wrote to memory of 4920 180 msedge.exe 88 PID 180 wrote to memory of 4920 180 msedge.exe 88 PID 180 wrote to memory of 4920 180 msedge.exe 88 PID 180 wrote to memory of 4920 180 msedge.exe 88 PID 180 wrote to memory of 4920 180 msedge.exe 88 PID 180 wrote to memory of 4920 180 msedge.exe 88 PID 180 wrote to memory of 4920 180 msedge.exe 88 PID 180 wrote to memory of 4920 180 msedge.exe 88 PID 180 wrote to memory of 4920 180 msedge.exe 88 PID 180 wrote to memory of 4920 180 msedge.exe 88 PID 180 wrote to memory of 4920 180 msedge.exe 88 PID 180 wrote to memory of 4920 180 msedge.exe 88 PID 180 wrote to memory of 4920 180 msedge.exe 88 PID 180 wrote to memory of 4920 180 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\14502eec633be5efdd26d5008b237c27_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:180 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff4d0346f8,0x7fff4d034708,0x7fff4d0347182⤵PID:2960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,6904673543589268775,11878736505239037853,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2164 /prefetch:22⤵PID:4020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2144,6904673543589268775,11878736505239037853,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2252 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2144,6904673543589268775,11878736505239037853,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2788 /prefetch:82⤵PID:4920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,6904673543589268775,11878736505239037853,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2248 /prefetch:12⤵PID:1516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,6904673543589268775,11878736505239037853,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3208 /prefetch:12⤵PID:3156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,6904673543589268775,11878736505239037853,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4648 /prefetch:12⤵PID:2300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,6904673543589268775,11878736505239037853,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4660 /prefetch:12⤵PID:3724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,6904673543589268775,11878736505239037853,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5236 /prefetch:12⤵PID:2020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,6904673543589268775,11878736505239037853,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4988 /prefetch:12⤵PID:4048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,6904673543589268775,11878736505239037853,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3428 /prefetch:82⤵PID:2632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,6904673543589268775,11878736505239037853,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3428 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,6904673543589268775,11878736505239037853,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5988 /prefetch:12⤵PID:912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,6904673543589268775,11878736505239037853,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5980 /prefetch:12⤵PID:1936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,6904673543589268775,11878736505239037853,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3396 /prefetch:12⤵PID:5172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,6904673543589268775,11878736505239037853,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3420 /prefetch:12⤵PID:5180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,6904673543589268775,11878736505239037853,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3084 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3440
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2640
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3036
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1224
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD58b2290ca03b4ca5fe52d82550c7e7d69
SHA120583a7851a906444204ce8ba4fa51153e6cd494
SHA256f9ff4871fc5317299de907489d466e630be63d698c8f7cb77cc81faddbecc6d2
SHA512704ec8122cc1c263dff67ddbb5c20ee0db8a438674d716bc3be5b266ee5629a219b0049d721f9eb2dd8f2d8fda0163659eaa4d3e1f0a6e9072a8ffb92bb2b25d
-
Filesize
152B
MD5919c29d42fb6034fee2f5de14d573c63
SHA124a2e1042347b3853344157239bde3ed699047a8
SHA25617cd6de97a0c020cb4935739cfef4ec4e074e8d127ac4c531b6dc496580c8141
SHA512bb7eadd087bbcec8b1b8a49b102b454333f2f9708d36b6ffc3c82fdc52e46873398d967238c3bfe9ac6caef45b017a5fe3938ebf5f3053e4ef9be7b2752b563d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize360B
MD5a3491d8cc29dc74ab6397866d56daee7
SHA1f45772c5e33be7af3e611498278dfcbed6484ffd
SHA256edd607a006f1e968726966ad901bb657aad02a1c2911723667c4b06ca123f7b3
SHA512539c6d9b27b1698b6c1d0eedbf982a20efe0db73a01ef55400626746864000989ad4ddf02112007bcd7000df29f2e8070b13f0aafe4a4f67174a2dd6b2c885d1
-
Filesize
2KB
MD52fabff7fa8c4b5f61e2db589a07675c6
SHA1b5db6ccb762d51e18570fed533c2f597776ec9b3
SHA256422f907abbc92c21c4d251be096197fb03ca360f27a365ce47415f390b157fb4
SHA512b96ae84c9645082518f1383d57ed68be6540c0355aef9296dd65b4a4ebdad42a76fd183dba9c43a9ca699286be3db782e3c087efb28092905ecf83b2f9f68bba
-
Filesize
2KB
MD5b20f56a3190d98a91675c5374011c2ab
SHA15759a33236483704ac93b2fe1cedee55191ab68c
SHA256e8fba3c26109bc30d2f925bf01d3d3f4b56ac2103a1fd141d9a482c4feb949d1
SHA5128f7509f883b8247856a8383fad084173d1b2f8b96dc93e0174be7c9335dd0c1dc153a9f10c531979bd8e7db8423821f9b036dc1b4c0e3ab8f6e29cae2d3545fe
-
Filesize
5KB
MD5c91f53de3c58e29070672037f3657570
SHA12fe1a211dbd1217298af7fa631425cbffc4611fc
SHA2561aab6e430acaf6fa17d6c2c35619ecaae69d812b9eadaf24e483857ca6dd03e7
SHA5127ac9e39b6bcbf8cba45d4a1b5714007533943a3c0b47910f5a91b32987e39cde09e7648ef66e3a97f117f71ca10870a50cc13d834b66386f3777596f89309a04
-
Filesize
7KB
MD593c6c8ce37d13f94c7610d0a083f539e
SHA1950f41d0ffbb2daca024799aaca18c6a0374f553
SHA256691979c6ad943b86e3114d131fc711d22cfc3666595e71d162ce1c7f11e90fab
SHA512a6bbe70b37e2f30ee6a7b4af7eaf659aebafe9e62f955757bf851321a7aea8a959bab7631062d2ebbd9a56e55b786d95dada815ba64f2b60daa82ae2fe893c8f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD513b7963a8877bb9c5e8f422690203dcf
SHA11aba47321c16af12acf40af3bc1849107b68384c
SHA256d0d8b8eea2425221cde312c13c6c7c24386ba4786bc30f7e7a19e8e75c06fd0f
SHA5127f0584b869aa8f21e14966eccaccd1035b6c071eb177573757a43d8a117284bf4639263f23c21f46caf579ae983db958c25805ae13eebba8537692522dd83d36