Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
05/05/2024, 06:44
Static task
static1
Behavioral task
behavioral1
Sample
16744d75caeed1f90528af8fe0a8719c_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
16744d75caeed1f90528af8fe0a8719c_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
16744d75caeed1f90528af8fe0a8719c_JaffaCakes118.html
-
Size
222KB
-
MD5
16744d75caeed1f90528af8fe0a8719c
-
SHA1
f2cddf3f9db49fe7b2dde96ba97062c59adc05ad
-
SHA256
4ce9c104440482982ae70b6295b10dfc7079ebcd3db875146b8e035deab6e471
-
SHA512
d3a3a87516e002dddced6eb48b83d8020c73d9b72f778f371698bf9cf32fdec9f0af29e3a1e69db2dd20c8f203beb537397f360ce18d85b442db971d3aefc610
-
SSDEEP
1536:LG9FsWIKLKjSr3rGF3vRG0eqE9hTqs/b1ZFP8k0lcVKrQf87gmcQYl8SvI+UyEiu:+3dV2oeumMnztHdg21W8y
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2544 msedge.exe 2544 msedge.exe 1352 msedge.exe 1352 msedge.exe 868 identity_helper.exe 868 identity_helper.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe 3780 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1352 wrote to memory of 3040 1352 msedge.exe 83 PID 1352 wrote to memory of 3040 1352 msedge.exe 83 PID 1352 wrote to memory of 5048 1352 msedge.exe 84 PID 1352 wrote to memory of 5048 1352 msedge.exe 84 PID 1352 wrote to memory of 5048 1352 msedge.exe 84 PID 1352 wrote to memory of 5048 1352 msedge.exe 84 PID 1352 wrote to memory of 5048 1352 msedge.exe 84 PID 1352 wrote to memory of 5048 1352 msedge.exe 84 PID 1352 wrote to memory of 5048 1352 msedge.exe 84 PID 1352 wrote to memory of 5048 1352 msedge.exe 84 PID 1352 wrote to memory of 5048 1352 msedge.exe 84 PID 1352 wrote to memory of 5048 1352 msedge.exe 84 PID 1352 wrote to memory of 5048 1352 msedge.exe 84 PID 1352 wrote to memory of 5048 1352 msedge.exe 84 PID 1352 wrote to memory of 5048 1352 msedge.exe 84 PID 1352 wrote to memory of 5048 1352 msedge.exe 84 PID 1352 wrote to memory of 5048 1352 msedge.exe 84 PID 1352 wrote to memory of 5048 1352 msedge.exe 84 PID 1352 wrote to memory of 5048 1352 msedge.exe 84 PID 1352 wrote to memory of 5048 1352 msedge.exe 84 PID 1352 wrote to memory of 5048 1352 msedge.exe 84 PID 1352 wrote to memory of 5048 1352 msedge.exe 84 PID 1352 wrote to memory of 5048 1352 msedge.exe 84 PID 1352 wrote to memory of 5048 1352 msedge.exe 84 PID 1352 wrote to memory of 5048 1352 msedge.exe 84 PID 1352 wrote to memory of 5048 1352 msedge.exe 84 PID 1352 wrote to memory of 5048 1352 msedge.exe 84 PID 1352 wrote to memory of 5048 1352 msedge.exe 84 PID 1352 wrote to memory of 5048 1352 msedge.exe 84 PID 1352 wrote to memory of 5048 1352 msedge.exe 84 PID 1352 wrote to memory of 5048 1352 msedge.exe 84 PID 1352 wrote to memory of 5048 1352 msedge.exe 84 PID 1352 wrote to memory of 5048 1352 msedge.exe 84 PID 1352 wrote to memory of 5048 1352 msedge.exe 84 PID 1352 wrote to memory of 5048 1352 msedge.exe 84 PID 1352 wrote to memory of 5048 1352 msedge.exe 84 PID 1352 wrote to memory of 5048 1352 msedge.exe 84 PID 1352 wrote to memory of 5048 1352 msedge.exe 84 PID 1352 wrote to memory of 5048 1352 msedge.exe 84 PID 1352 wrote to memory of 5048 1352 msedge.exe 84 PID 1352 wrote to memory of 5048 1352 msedge.exe 84 PID 1352 wrote to memory of 5048 1352 msedge.exe 84 PID 1352 wrote to memory of 2544 1352 msedge.exe 85 PID 1352 wrote to memory of 2544 1352 msedge.exe 85 PID 1352 wrote to memory of 872 1352 msedge.exe 86 PID 1352 wrote to memory of 872 1352 msedge.exe 86 PID 1352 wrote to memory of 872 1352 msedge.exe 86 PID 1352 wrote to memory of 872 1352 msedge.exe 86 PID 1352 wrote to memory of 872 1352 msedge.exe 86 PID 1352 wrote to memory of 872 1352 msedge.exe 86 PID 1352 wrote to memory of 872 1352 msedge.exe 86 PID 1352 wrote to memory of 872 1352 msedge.exe 86 PID 1352 wrote to memory of 872 1352 msedge.exe 86 PID 1352 wrote to memory of 872 1352 msedge.exe 86 PID 1352 wrote to memory of 872 1352 msedge.exe 86 PID 1352 wrote to memory of 872 1352 msedge.exe 86 PID 1352 wrote to memory of 872 1352 msedge.exe 86 PID 1352 wrote to memory of 872 1352 msedge.exe 86 PID 1352 wrote to memory of 872 1352 msedge.exe 86 PID 1352 wrote to memory of 872 1352 msedge.exe 86 PID 1352 wrote to memory of 872 1352 msedge.exe 86 PID 1352 wrote to memory of 872 1352 msedge.exe 86 PID 1352 wrote to memory of 872 1352 msedge.exe 86 PID 1352 wrote to memory of 872 1352 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\16744d75caeed1f90528af8fe0a8719c_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffeea9c46f8,0x7ffeea9c4708,0x7ffeea9c47182⤵PID:3040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,9095052004032225075,9106759135975254709,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵PID:5048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,9095052004032225075,9106759135975254709,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,9095052004032225075,9106759135975254709,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2888 /prefetch:82⤵PID:872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,9095052004032225075,9106759135975254709,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3208 /prefetch:12⤵PID:2976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,9095052004032225075,9106759135975254709,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:1904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,9095052004032225075,9106759135975254709,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4576 /prefetch:12⤵PID:2568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,9095052004032225075,9106759135975254709,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5400 /prefetch:82⤵PID:4936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,9095052004032225075,9106759135975254709,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5400 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,9095052004032225075,9106759135975254709,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5436 /prefetch:12⤵PID:2208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,9095052004032225075,9106759135975254709,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5452 /prefetch:12⤵PID:3128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,9095052004032225075,9106759135975254709,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5848 /prefetch:12⤵PID:4404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,9095052004032225075,9106759135975254709,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5832 /prefetch:12⤵PID:1492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,9095052004032225075,9106759135975254709,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2240 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3780
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2936
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4368
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD562c02dda2bf22d702a9b3a1c547c5f6a
SHA18f42966df96bd2e8c1f6b31b37c9a19beb6394d6
SHA256cb8a0964605551ed5a0668c08ab888044bbd845c9225ffee5a28e0b847ede62b
SHA512a7ce2c0946382188e1d8480cfb096b29bd0dcb260ccdc74167cc351160a1884d04d57a2517eb700b3eef30eaf4a01bfbf31858365b1e624d4b0960ffd0032fa9
-
Filesize
152B
MD5850f27f857369bf7fe83c613d2ec35cb
SHA17677a061c6fd2a030b44841bfb32da0abc1dbefb
SHA256a7db700e067222e55e323a9ffc71a92f59829e81021e2607cec0d2ec6faf602a
SHA5127b1efa002b7a1a23973bff0618fb4a82cd0c5193df55cd960c7516caa63509587fd8b36f3aea6db01ece368065865af6472365b820fadce720b64b561ab5f401
-
Filesize
22KB
MD55e74c6d871232d6fe5d88711ece1408b
SHA11a5d3ac31e833df4c091f14c94a2ecd1c6294875
SHA256bcadf445d413314a44375c63418a0f255fbac7afae40be0a80c9231751176105
SHA5129d001eabce7ffdbf8e338725ef07f0033d0780ea474b7d33c2ad63886ff3578d818eb5c9b130d726353cd813160b49f572736dd288cece84e9bd8b784ce530d5
-
Filesize
144B
MD5267434cb64408a3190db0f10708bc36d
SHA1e324d4c643d735f80e1735810b4e18d813b66414
SHA2561939a85aa591606a6461c3f43fc5475d93058f434eb233e784bb79f5510f73e7
SHA512da627b0bdb308b2c50a7adfe5cd6a16e563a8c1375fe7424b78bb4a344a0665a17ff1df2e047abf462bdb52c69b079a7770e30462cff0c9875d29818bc51d83d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD5a05dc5531aec79d902ffeea7bc9a2b07
SHA1ad3d0e54cc7919232c8ac7549c9afd8959a7e68b
SHA256003b521ecdb4886dfac2fc6638bdb498c1d8d10c64827ab43051ccb84451ca56
SHA512be454e510c9fb39dc34283906d6ac665e14e00b0bbc9c779c403901a8fa172fc98f6d0bbf43e530cddcc47271565c1a42fdd0b41ecf4c415bc9e8a2d2a21be2e
-
Filesize
1KB
MD55138518deca60869f4a8f13acea99df5
SHA1ea17d11200134aab820f69f83c17bb49bd93dff3
SHA256c17e04447cbcb43be4bab4bb240ca59d2757e9f43734e1c7cd9c5e25fb97b0a5
SHA5125b167e564acd7e8aadebd97e213cf6d65403f3ebe3bd7022e88528dfca290b7b0e9c8a3ea0aa303a62d01807ad6a51d612545d6c36929cd6fb0c67618545c77c
-
Filesize
6KB
MD5c04dd7258d0e483e651fa148b3c4638c
SHA15fa6347889b4719119c490a1b16adc1d764c3d1a
SHA25613e31ae5925e56718338f9850b9d3e9046339f70670458ddcc9d7190fe717155
SHA512303ad2a3921a8d35124f1d4dbbcb9d29fcadef7649fba5ff0bffb7550211d5e5817404351ca9454854109e8163f34f62ee1ed7c90f81507d4196bf61e28b62ce
-
Filesize
5KB
MD59c0feb4b1e98c45190db038636d6d3ce
SHA1c0728a9c99d05d8d6961221b1a8eeea75118b05f
SHA25631c02b1fef2f9945583041b5d47765e32470c9d14976c45946d31565d9ad98ba
SHA512893b04a2605748d76f94d366a6a960201342367c7ae6d357154072aa091e907e530e8b898c7fddd9d4248cef0818e74a9322a45637f5d980e673eaf4e3417c4b
-
Filesize
6KB
MD5e1429cf213b695af4f9a9529a5f9f87d
SHA1adaa12dd8b1935f4192d536a15b074d6df71b561
SHA2569226872799abdca10c74961eb6d21e15cae70758ef6083713e5a49be3e639a8a
SHA512b6d62af0a9cba455102501667c143ce1bf01a7a59ea143cc9650f4c56c11917d6b8a46ead8223af66e3d6321d59df6a509d576c82c8dde761bd8e11d0e6474db
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5fd3dea6c95d3e186f312782f97d6f949
SHA116c9f06900c7c51c3b8f4a103b907095e859ec3f
SHA2567dfdd31e95e6c2c12f25745dd0611912096d73e9b391eb55f335dc2d3f1181e3
SHA512dfd785c07ec7c35041a5b0ecefd1e504b0e9bf8dc02a81d9b85549a39af5e58a0c0929ff7a159b24fdd767a9c03092f321492eb1eac104cfff8d004fb43a85f0