Analysis
-
max time kernel
143s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
05-05-2024 01:52
Static task
static1
Behavioral task
behavioral1
Sample
1571757eb7cfaf429a0266c55e031728_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1571757eb7cfaf429a0266c55e031728_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
1571757eb7cfaf429a0266c55e031728_JaffaCakes118.html
-
Size
62KB
-
MD5
1571757eb7cfaf429a0266c55e031728
-
SHA1
494e6a56f6e13d05cca81c5708133595d9e0d64f
-
SHA256
81017ee7ec6f2ac106856d12ebadbc5f2015cf6972e00266be0031c3c199cf7b
-
SHA512
1d24e46fa344ba27b1ff1591c7ca88e99de930a1d2bc77d43244ce38cc753e2ba99e2a1f760725ef61d2e3d20e9ea3c20c60657fe8af48b09652a71734a18ea7
-
SSDEEP
1536:iTupBBvLayUXUYeu+j9Tz/LzxhLXL6iCap0YA2ioUvz1R2/nWIvVH1xULq9:HpBBzAUYeu+j9Tz/LzxhLXL6iCapd1+E
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4252 msedge.exe 4252 msedge.exe 4316 msedge.exe 4316 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3472 identity_helper.exe 3472 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4316 wrote to memory of 4916 4316 msedge.exe 83 PID 4316 wrote to memory of 4916 4316 msedge.exe 83 PID 4316 wrote to memory of 4736 4316 msedge.exe 84 PID 4316 wrote to memory of 4736 4316 msedge.exe 84 PID 4316 wrote to memory of 4736 4316 msedge.exe 84 PID 4316 wrote to memory of 4736 4316 msedge.exe 84 PID 4316 wrote to memory of 4736 4316 msedge.exe 84 PID 4316 wrote to memory of 4736 4316 msedge.exe 84 PID 4316 wrote to memory of 4736 4316 msedge.exe 84 PID 4316 wrote to memory of 4736 4316 msedge.exe 84 PID 4316 wrote to memory of 4736 4316 msedge.exe 84 PID 4316 wrote to memory of 4736 4316 msedge.exe 84 PID 4316 wrote to memory of 4736 4316 msedge.exe 84 PID 4316 wrote to memory of 4736 4316 msedge.exe 84 PID 4316 wrote to memory of 4736 4316 msedge.exe 84 PID 4316 wrote to memory of 4736 4316 msedge.exe 84 PID 4316 wrote to memory of 4736 4316 msedge.exe 84 PID 4316 wrote to memory of 4736 4316 msedge.exe 84 PID 4316 wrote to memory of 4736 4316 msedge.exe 84 PID 4316 wrote to memory of 4736 4316 msedge.exe 84 PID 4316 wrote to memory of 4736 4316 msedge.exe 84 PID 4316 wrote to memory of 4736 4316 msedge.exe 84 PID 4316 wrote to memory of 4736 4316 msedge.exe 84 PID 4316 wrote to memory of 4736 4316 msedge.exe 84 PID 4316 wrote to memory of 4736 4316 msedge.exe 84 PID 4316 wrote to memory of 4736 4316 msedge.exe 84 PID 4316 wrote to memory of 4736 4316 msedge.exe 84 PID 4316 wrote to memory of 4736 4316 msedge.exe 84 PID 4316 wrote to memory of 4736 4316 msedge.exe 84 PID 4316 wrote to memory of 4736 4316 msedge.exe 84 PID 4316 wrote to memory of 4736 4316 msedge.exe 84 PID 4316 wrote to memory of 4736 4316 msedge.exe 84 PID 4316 wrote to memory of 4736 4316 msedge.exe 84 PID 4316 wrote to memory of 4736 4316 msedge.exe 84 PID 4316 wrote to memory of 4736 4316 msedge.exe 84 PID 4316 wrote to memory of 4736 4316 msedge.exe 84 PID 4316 wrote to memory of 4736 4316 msedge.exe 84 PID 4316 wrote to memory of 4736 4316 msedge.exe 84 PID 4316 wrote to memory of 4736 4316 msedge.exe 84 PID 4316 wrote to memory of 4736 4316 msedge.exe 84 PID 4316 wrote to memory of 4736 4316 msedge.exe 84 PID 4316 wrote to memory of 4736 4316 msedge.exe 84 PID 4316 wrote to memory of 4252 4316 msedge.exe 85 PID 4316 wrote to memory of 4252 4316 msedge.exe 85 PID 4316 wrote to memory of 3316 4316 msedge.exe 86 PID 4316 wrote to memory of 3316 4316 msedge.exe 86 PID 4316 wrote to memory of 3316 4316 msedge.exe 86 PID 4316 wrote to memory of 3316 4316 msedge.exe 86 PID 4316 wrote to memory of 3316 4316 msedge.exe 86 PID 4316 wrote to memory of 3316 4316 msedge.exe 86 PID 4316 wrote to memory of 3316 4316 msedge.exe 86 PID 4316 wrote to memory of 3316 4316 msedge.exe 86 PID 4316 wrote to memory of 3316 4316 msedge.exe 86 PID 4316 wrote to memory of 3316 4316 msedge.exe 86 PID 4316 wrote to memory of 3316 4316 msedge.exe 86 PID 4316 wrote to memory of 3316 4316 msedge.exe 86 PID 4316 wrote to memory of 3316 4316 msedge.exe 86 PID 4316 wrote to memory of 3316 4316 msedge.exe 86 PID 4316 wrote to memory of 3316 4316 msedge.exe 86 PID 4316 wrote to memory of 3316 4316 msedge.exe 86 PID 4316 wrote to memory of 3316 4316 msedge.exe 86 PID 4316 wrote to memory of 3316 4316 msedge.exe 86 PID 4316 wrote to memory of 3316 4316 msedge.exe 86 PID 4316 wrote to memory of 3316 4316 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\1571757eb7cfaf429a0266c55e031728_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4316 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb83dd46f8,0x7ffb83dd4708,0x7ffb83dd47182⤵PID:4916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2008,14057793590633944122,12129781484878118460,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2032 /prefetch:22⤵PID:4736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2008,14057793590633944122,12129781484878118460,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2276 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2008,14057793590633944122,12129781484878118460,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2716 /prefetch:82⤵PID:3316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,14057793590633944122,12129781484878118460,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:2172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,14057793590633944122,12129781484878118460,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:2816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,14057793590633944122,12129781484878118460,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4680 /prefetch:12⤵PID:4692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,14057793590633944122,12129781484878118460,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5028 /prefetch:12⤵PID:2900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,14057793590633944122,12129781484878118460,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5620 /prefetch:12⤵PID:3824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2008,14057793590633944122,12129781484878118460,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1376 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2008,14057793590633944122,12129781484878118460,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3716 /prefetch:82⤵PID:3752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2008,14057793590633944122,12129781484878118460,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3716 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,14057793590633944122,12129781484878118460,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6156 /prefetch:12⤵PID:3744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,14057793590633944122,12129781484878118460,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6104 /prefetch:12⤵PID:3660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,14057793590633944122,12129781484878118460,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6004 /prefetch:12⤵PID:4556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,14057793590633944122,12129781484878118460,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4380 /prefetch:12⤵PID:384
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:684
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3304
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5dbac49e66219979194c79f1cf1cb3dd1
SHA14ef87804a04d51ae1fac358f92382548b27f62f2
SHA256f24ed6c5bf4b734a9af4d64e14a80a160bea569f50849f70bf7b7277c4f48562
SHA512bb314d61f53cf7774f6dfb6b772c72f5daf386bc3d27d2bb7a14c65848ee86e6c48e9c5696693ded31846b69b9372a530175df48494e3d61a228e49d43401ad1
-
Filesize
152B
MD5a9e55f5864d6e2afd2fd84e25a3bc228
SHA1a5efcff9e3df6252c7fe8535d505235f82aab276
SHA2560f4df3120e4620555916be8e51c29be8d600d68ae5244efad6a0268aabc8c452
SHA51212f45fa73a6de6dfe17acc8b52b60f2d79008da130730b74cc138c1dcd73ccc99487165e3c8c90dc247359fde272f1ec6b3cf2c5fcb04e5093936144d0558b75
-
Filesize
20KB
MD5b6c8122025aff891940d1d5e1ab95fce
SHA1a0c7ca41d0922d085c358f5dde81ae3e85a8c9c4
SHA2569954c64c68000f615e5066bc255eced1195d1f8b7dbc715f9062ddf9f147e87e
SHA512e62a37b55b6b8d95c24fb624105ff6ff72f118e31760d0da1e8df8e8acf627ec6327c26dfa26df8535585877604c7948d2f621ccabc39beec49787e22c302c10
-
Filesize
44KB
MD588477d32f888c2b8a3f3d98deb460b3d
SHA11fae9ac6c1082fc0426aebe4e683eea9b4ba898c
SHA2561b1f0b5ef5f21d5742d84f331def7116323365c3dd4aec096a55763e310879d8
SHA512e0c0588ff27a989cac47797e5a8044983d0b3c75c44416c5f977e0e93e9d3a9321b9283ea077e6dcad0619ac960ee45fe8570f1d5cc7d5d4117fee4f2f0c96b3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize264B
MD585864b6febeb72eadac366f4b3583951
SHA15f35e015155848dc73cf9ba61195d36dd95769bc
SHA2561121e2c50814ce64535c6d58f040a7b90ea57e103a3fe70389ba9791ce1085a3
SHA512ce0b593df329d56db2f9832c330d9a9b59fafa5e2dd43ffbcd7e5d17bb4f34b37cb053bbeca0e32f2c269074f07e4f043b793bb21d488dd7a994b7562d1dbd5e
-
Filesize
2KB
MD52d815c0911c7cda6580f9a7dfbec4ae8
SHA16ab617c659e032a5a6653414be8afa657b5eb49b
SHA2566ee241c2bdf76e57abca354c178a013fb31d4f75403575724aa260ddfa4a7836
SHA512abd6fa70b178b082b8fdcd3df5bdd9cf9626dd8e880f515649b81401bc6db9360678630ff1b1985112dd701a33fd98e7b6f0b7dd1e1bf775da7f1178e573b2e7
-
Filesize
5KB
MD57aeac4ebc98bf5c42e726595121c55b4
SHA118c819aec24cec2c89fd705766cb097318030210
SHA2562134b9c595a5cac342b9279d7c4eec274e5397823c5cf7b3bed5dc5fa5308ffc
SHA512c99ca00f45dc6bbfc303f6fccf27dea15f2ef567017750e3ed5d97e7d81a939e09fcb64855a9cc26f7318131ed7d37015254260b3495cd2a66993e67acf422cf
-
Filesize
6KB
MD519ddd6c4ae74021cb2c9e43304e64397
SHA14d9679e42626e76e43e86e3ff32528af4a9ca8ee
SHA256b22368cd582b29a42c1b0ed9056ff0204c9141a0876b74c009c7f114a7ae3900
SHA512349a4a09c6ff02cfe2da6115dc775b6d020fda014b1fe61bf20d96a822f619e9b68c11160505dfdbb7d3448a80152450caa75b7a2ef26016dd432c0821b36ae0
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD52fd73bba841931109393e2bc9dc47497
SHA1d59bacf2f85b07afedf8367db5c73c79a566541a
SHA256292704dc4e83398276d1d3e8231780b37e8fa00a958daa10d9a117d9c23f40c4
SHA512653538974027cae63cf919f75878620eb0196f3002f17be9781bab3d12e76bcfa12a963519fef365bbea9187dc8a750da17da37647db26bc6bf11ad85d8fca47