Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
05/05/2024, 04:40
Static task
static1
Behavioral task
behavioral1
Sample
1604650d01c4b0f3b14c2abe1182b66f_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
1604650d01c4b0f3b14c2abe1182b66f_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
1604650d01c4b0f3b14c2abe1182b66f_JaffaCakes118.html
-
Size
117KB
-
MD5
1604650d01c4b0f3b14c2abe1182b66f
-
SHA1
2d321269050186ff6e2f0a7f39eeca03d47de5ed
-
SHA256
efb1c8849ff3525aee7050e0ebe3a08e28653aa1c29a7a17885c377febe786d9
-
SHA512
2d4aacb3de0922cbdbff8c3e2f9a9dfa4ad5b87ae93775e238d741c8573247d1fd4dc365a008ae1a33ed68ac926730dd7ae2fdf95d84fad189b1941070f14c4b
-
SSDEEP
3072:GtAc8sLZ1122PoMKbddtYdVNR8atkdvoSePh:GtAc8sLZ1122PoMKbddtYdVywR
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3964 msedge.exe 3964 msedge.exe 4668 msedge.exe 4668 msedge.exe 4004 identity_helper.exe 4004 identity_helper.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe 1416 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4668 wrote to memory of 848 4668 msedge.exe 82 PID 4668 wrote to memory of 848 4668 msedge.exe 82 PID 4668 wrote to memory of 2760 4668 msedge.exe 83 PID 4668 wrote to memory of 2760 4668 msedge.exe 83 PID 4668 wrote to memory of 2760 4668 msedge.exe 83 PID 4668 wrote to memory of 2760 4668 msedge.exe 83 PID 4668 wrote to memory of 2760 4668 msedge.exe 83 PID 4668 wrote to memory of 2760 4668 msedge.exe 83 PID 4668 wrote to memory of 2760 4668 msedge.exe 83 PID 4668 wrote to memory of 2760 4668 msedge.exe 83 PID 4668 wrote to memory of 2760 4668 msedge.exe 83 PID 4668 wrote to memory of 2760 4668 msedge.exe 83 PID 4668 wrote to memory of 2760 4668 msedge.exe 83 PID 4668 wrote to memory of 2760 4668 msedge.exe 83 PID 4668 wrote to memory of 2760 4668 msedge.exe 83 PID 4668 wrote to memory of 2760 4668 msedge.exe 83 PID 4668 wrote to memory of 2760 4668 msedge.exe 83 PID 4668 wrote to memory of 2760 4668 msedge.exe 83 PID 4668 wrote to memory of 2760 4668 msedge.exe 83 PID 4668 wrote to memory of 2760 4668 msedge.exe 83 PID 4668 wrote to memory of 2760 4668 msedge.exe 83 PID 4668 wrote to memory of 2760 4668 msedge.exe 83 PID 4668 wrote to memory of 2760 4668 msedge.exe 83 PID 4668 wrote to memory of 2760 4668 msedge.exe 83 PID 4668 wrote to memory of 2760 4668 msedge.exe 83 PID 4668 wrote to memory of 2760 4668 msedge.exe 83 PID 4668 wrote to memory of 2760 4668 msedge.exe 83 PID 4668 wrote to memory of 2760 4668 msedge.exe 83 PID 4668 wrote to memory of 2760 4668 msedge.exe 83 PID 4668 wrote to memory of 2760 4668 msedge.exe 83 PID 4668 wrote to memory of 2760 4668 msedge.exe 83 PID 4668 wrote to memory of 2760 4668 msedge.exe 83 PID 4668 wrote to memory of 2760 4668 msedge.exe 83 PID 4668 wrote to memory of 2760 4668 msedge.exe 83 PID 4668 wrote to memory of 2760 4668 msedge.exe 83 PID 4668 wrote to memory of 2760 4668 msedge.exe 83 PID 4668 wrote to memory of 2760 4668 msedge.exe 83 PID 4668 wrote to memory of 2760 4668 msedge.exe 83 PID 4668 wrote to memory of 2760 4668 msedge.exe 83 PID 4668 wrote to memory of 2760 4668 msedge.exe 83 PID 4668 wrote to memory of 2760 4668 msedge.exe 83 PID 4668 wrote to memory of 2760 4668 msedge.exe 83 PID 4668 wrote to memory of 3964 4668 msedge.exe 84 PID 4668 wrote to memory of 3964 4668 msedge.exe 84 PID 4668 wrote to memory of 4360 4668 msedge.exe 85 PID 4668 wrote to memory of 4360 4668 msedge.exe 85 PID 4668 wrote to memory of 4360 4668 msedge.exe 85 PID 4668 wrote to memory of 4360 4668 msedge.exe 85 PID 4668 wrote to memory of 4360 4668 msedge.exe 85 PID 4668 wrote to memory of 4360 4668 msedge.exe 85 PID 4668 wrote to memory of 4360 4668 msedge.exe 85 PID 4668 wrote to memory of 4360 4668 msedge.exe 85 PID 4668 wrote to memory of 4360 4668 msedge.exe 85 PID 4668 wrote to memory of 4360 4668 msedge.exe 85 PID 4668 wrote to memory of 4360 4668 msedge.exe 85 PID 4668 wrote to memory of 4360 4668 msedge.exe 85 PID 4668 wrote to memory of 4360 4668 msedge.exe 85 PID 4668 wrote to memory of 4360 4668 msedge.exe 85 PID 4668 wrote to memory of 4360 4668 msedge.exe 85 PID 4668 wrote to memory of 4360 4668 msedge.exe 85 PID 4668 wrote to memory of 4360 4668 msedge.exe 85 PID 4668 wrote to memory of 4360 4668 msedge.exe 85 PID 4668 wrote to memory of 4360 4668 msedge.exe 85 PID 4668 wrote to memory of 4360 4668 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\1604650d01c4b0f3b14c2abe1182b66f_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4668 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff95ffe46f8,0x7ff95ffe4708,0x7ff95ffe47182⤵PID:848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,11028129325607886170,10055718332904524439,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 /prefetch:22⤵PID:2760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2144,11028129325607886170,10055718332904524439,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2204 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2144,11028129325607886170,10055718332904524439,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2736 /prefetch:82⤵PID:4360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,11028129325607886170,10055718332904524439,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:4908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,11028129325607886170,10055718332904524439,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:1704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,11028129325607886170,10055718332904524439,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5032 /prefetch:12⤵PID:3476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,11028129325607886170,10055718332904524439,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5820 /prefetch:82⤵PID:4492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,11028129325607886170,10055718332904524439,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5820 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,11028129325607886170,10055718332904524439,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5816 /prefetch:12⤵PID:4680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,11028129325607886170,10055718332904524439,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5480 /prefetch:12⤵PID:4608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,11028129325607886170,10055718332904524439,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5404 /prefetch:12⤵PID:1600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,11028129325607886170,10055718332904524439,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5164 /prefetch:12⤵PID:4516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,11028129325607886170,10055718332904524439,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5840 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1416
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3752
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3696
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5537815e7cc5c694912ac0308147852e4
SHA12ccdd9d9dc637db5462fe8119c0df261146c363c
SHA256b4b69d099507d88abdeff4835e06cc6711e1c47464c963d013cef0a278e52d4f
SHA51263969a69af057235dbdecddc483ef5ce0058673179a3580c5aa12938c9501513cdb72dd703a06fa7d4fc08d074f17528283338c795334398497c771ecbd1350a
-
Filesize
152B
MD58b167567021ccb1a9fdf073fa9112ef0
SHA13baf293fbfaa7c1e7cdacb5f2975737f4ef69898
SHA25626764cedf35f118b55f30b3a36e0693f9f38290a5b2b6b8b83a00e990ae18513
SHA512726098001ef1acf1dd154a658752fa27dea32bca8fbb66395c142cb666102e71632adbad1b7e2f717071cd3e3af3867471932a71707f2ae97b989f4be468ab54
-
Filesize
22KB
MD55e74c6d871232d6fe5d88711ece1408b
SHA11a5d3ac31e833df4c091f14c94a2ecd1c6294875
SHA256bcadf445d413314a44375c63418a0f255fbac7afae40be0a80c9231751176105
SHA5129d001eabce7ffdbf8e338725ef07f0033d0780ea474b7d33c2ad63886ff3578d818eb5c9b130d726353cd813160b49f572736dd288cece84e9bd8b784ce530d5
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD56fb11d4edad06f126784ca1b85c37258
SHA1fc043402a8dfd770864a69137d59b28642d09de8
SHA256315670e57ffaf2a30e07fd818720b4787a7e0fbabf4f197559337752af723b4f
SHA512bacfcb23b9c67e0b310ffd2eb3147fe17c09b6d19b642d72e131bb861fde1f82f71baf5316579449470d527276a11cfb4d2bbbfaed7bf1eb78ca770fdfc4cd7d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD57fa03b73cd7ef23e04ee3cf6f80463f2
SHA15a13d67c98535e4a4bc33173c854f117f630fe9c
SHA256b35a95feab0d5ad74f30f7b5d0238b55f4d45c5562a74ed2ec5a9683269d1da6
SHA5129b23b829eda6f23a4ef33983b01c55961c2976fa15532b79adb4ca4523464712040b8f1e02cd309229bd789839ffd79d99472f7e9946ebb310e1862c55c4c4a8
-
Filesize
2KB
MD5b19d276e5e3212bd4505e722f65510e2
SHA1a218cae4f178dd6b6f17d097d2043fe99161e877
SHA25672af4cfbdfdf7cb35bfc3ff3b0340d3702facbb3090311826602e53b8b0e42ee
SHA512014554f05239538cf3bdb160d4398d5d17ed55abc4fcbb3544441db4114d1a91671e84959c383aa4f863b05d9c53cae60bed369e5e8b16f26633fe58d78ea7ff
-
Filesize
6KB
MD58005009a209d51d7d43109095c09c242
SHA160797015f8c3579342b3fde4b6c8ae609d274d08
SHA2568e756a801c5ce4cbc18f0a6c07cac6e80ea9065ebfaa37aaa7f9aae0db3890da
SHA5123bfe0f553c3236ee3361d5afaed26246388b1d9589d009a1ac72d56df287c3c11c1b6f2c7843614f699745e02ba7fc1689dd1b2e4646566eb6d29197ae317e90
-
Filesize
7KB
MD5c812ffa4dd7a7b105a0fc2e4c6b3a574
SHA1d3525f39fcbb4220bc2089513215aae02150823f
SHA25689deea23faad35498c1b073a350ae56b8f21ea60905cb82883125715a29ff800
SHA512fab971977dc90945c76e7e66f9b2f558b59b5d4b31881b7c7118faee307b9fb170416955358c59bb5a54321cff73ac5e271788501714b80e73aea2d8aef78673
-
Filesize
7KB
MD5304fea877939bfcf94e31474f8c26769
SHA12c6e48b39302772c0c734e1cc1fe3ca77c9241f9
SHA25658d2e3329c72f19edbcf6831f61719dfdb17746c29002b7b7a8976e45e056850
SHA5121138e970db17cdce517006afa3214438e5dfeb7594d2d7629e05d916f1186c7689334e6b8a5d7b5b67f5f8e00fdfb1ba41a615bf52d0d4f550f59f8aef1d13e1
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD57f7d0405763c7e0c1862a2418fda40a0
SHA1cf3e01886833112f56aca9a0b4d2830e70c53ed8
SHA256e7e20b9feeff17115d57b9935452d16682ca2ae943631b78bdee0fb01d486256
SHA5125cd1c652bb34217c8283f38c74351ccdcaf62d0966b469000756ed28d7fc4a8dcfb325252b34f8ba036a04e809fd4bbbcde394346110418e6498f0271bbd3875