Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
05/05/2024, 07:06
Static task
static1
Behavioral task
behavioral1
Sample
168845f91a3404a867eeaaf352cab851_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
168845f91a3404a867eeaaf352cab851_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
168845f91a3404a867eeaaf352cab851_JaffaCakes118.html
-
Size
76KB
-
MD5
168845f91a3404a867eeaaf352cab851
-
SHA1
50c1325dd7b52728e58868a857b3239d9cf0f512
-
SHA256
812af7bb6e5423ee1abde53230fd49f02909a51b35f782b80f30fe8dbafb9d88
-
SHA512
1a3ecac793ed58b6321d58af3c4054ea7d4933d5d34f65b0e7e182c058c35eba725cd0adf5154898dc9cb9b379e35276cad1e8fee65ffcefad47c100cdf3508c
-
SSDEEP
1536:5y+YFDcDaS4fRnxuv9maghWK8ZEeHu1wgptS7honD:mFragh8HubptS7hoD
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3524 msedge.exe 3524 msedge.exe 3592 msedge.exe 3592 msedge.exe 3608 msedge.exe 3608 msedge.exe 3608 msedge.exe 3608 msedge.exe 4144 identity_helper.exe 4144 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe 3592 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3592 wrote to memory of 4624 3592 msedge.exe 84 PID 3592 wrote to memory of 4624 3592 msedge.exe 84 PID 3592 wrote to memory of 4884 3592 msedge.exe 85 PID 3592 wrote to memory of 4884 3592 msedge.exe 85 PID 3592 wrote to memory of 4884 3592 msedge.exe 85 PID 3592 wrote to memory of 4884 3592 msedge.exe 85 PID 3592 wrote to memory of 4884 3592 msedge.exe 85 PID 3592 wrote to memory of 4884 3592 msedge.exe 85 PID 3592 wrote to memory of 4884 3592 msedge.exe 85 PID 3592 wrote to memory of 4884 3592 msedge.exe 85 PID 3592 wrote to memory of 4884 3592 msedge.exe 85 PID 3592 wrote to memory of 4884 3592 msedge.exe 85 PID 3592 wrote to memory of 4884 3592 msedge.exe 85 PID 3592 wrote to memory of 4884 3592 msedge.exe 85 PID 3592 wrote to memory of 4884 3592 msedge.exe 85 PID 3592 wrote to memory of 4884 3592 msedge.exe 85 PID 3592 wrote to memory of 4884 3592 msedge.exe 85 PID 3592 wrote to memory of 4884 3592 msedge.exe 85 PID 3592 wrote to memory of 4884 3592 msedge.exe 85 PID 3592 wrote to memory of 4884 3592 msedge.exe 85 PID 3592 wrote to memory of 4884 3592 msedge.exe 85 PID 3592 wrote to memory of 4884 3592 msedge.exe 85 PID 3592 wrote to memory of 4884 3592 msedge.exe 85 PID 3592 wrote to memory of 4884 3592 msedge.exe 85 PID 3592 wrote to memory of 4884 3592 msedge.exe 85 PID 3592 wrote to memory of 4884 3592 msedge.exe 85 PID 3592 wrote to memory of 4884 3592 msedge.exe 85 PID 3592 wrote to memory of 4884 3592 msedge.exe 85 PID 3592 wrote to memory of 4884 3592 msedge.exe 85 PID 3592 wrote to memory of 4884 3592 msedge.exe 85 PID 3592 wrote to memory of 4884 3592 msedge.exe 85 PID 3592 wrote to memory of 4884 3592 msedge.exe 85 PID 3592 wrote to memory of 4884 3592 msedge.exe 85 PID 3592 wrote to memory of 4884 3592 msedge.exe 85 PID 3592 wrote to memory of 4884 3592 msedge.exe 85 PID 3592 wrote to memory of 4884 3592 msedge.exe 85 PID 3592 wrote to memory of 4884 3592 msedge.exe 85 PID 3592 wrote to memory of 4884 3592 msedge.exe 85 PID 3592 wrote to memory of 4884 3592 msedge.exe 85 PID 3592 wrote to memory of 4884 3592 msedge.exe 85 PID 3592 wrote to memory of 4884 3592 msedge.exe 85 PID 3592 wrote to memory of 4884 3592 msedge.exe 85 PID 3592 wrote to memory of 3524 3592 msedge.exe 86 PID 3592 wrote to memory of 3524 3592 msedge.exe 86 PID 3592 wrote to memory of 3964 3592 msedge.exe 87 PID 3592 wrote to memory of 3964 3592 msedge.exe 87 PID 3592 wrote to memory of 3964 3592 msedge.exe 87 PID 3592 wrote to memory of 3964 3592 msedge.exe 87 PID 3592 wrote to memory of 3964 3592 msedge.exe 87 PID 3592 wrote to memory of 3964 3592 msedge.exe 87 PID 3592 wrote to memory of 3964 3592 msedge.exe 87 PID 3592 wrote to memory of 3964 3592 msedge.exe 87 PID 3592 wrote to memory of 3964 3592 msedge.exe 87 PID 3592 wrote to memory of 3964 3592 msedge.exe 87 PID 3592 wrote to memory of 3964 3592 msedge.exe 87 PID 3592 wrote to memory of 3964 3592 msedge.exe 87 PID 3592 wrote to memory of 3964 3592 msedge.exe 87 PID 3592 wrote to memory of 3964 3592 msedge.exe 87 PID 3592 wrote to memory of 3964 3592 msedge.exe 87 PID 3592 wrote to memory of 3964 3592 msedge.exe 87 PID 3592 wrote to memory of 3964 3592 msedge.exe 87 PID 3592 wrote to memory of 3964 3592 msedge.exe 87 PID 3592 wrote to memory of 3964 3592 msedge.exe 87 PID 3592 wrote to memory of 3964 3592 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\168845f91a3404a867eeaaf352cab851_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3592 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8130f46f8,0x7ff8130f4708,0x7ff8130f47182⤵PID:4624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2172,296728385410484366,9792801917214025068,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2212 /prefetch:22⤵PID:4884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2172,296728385410484366,9792801917214025068,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2268 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2172,296728385410484366,9792801917214025068,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2592 /prefetch:82⤵PID:3964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,296728385410484366,9792801917214025068,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:1204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,296728385410484366,9792801917214025068,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:3924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,296728385410484366,9792801917214025068,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4520 /prefetch:12⤵PID:2404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,296728385410484366,9792801917214025068,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:5068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,296728385410484366,9792801917214025068,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4640 /prefetch:12⤵PID:4112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2172,296728385410484366,9792801917214025068,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5580 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2172,296728385410484366,9792801917214025068,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5840 /prefetch:82⤵PID:4584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2172,296728385410484366,9792801917214025068,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5840 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,296728385410484366,9792801917214025068,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5856 /prefetch:12⤵PID:3648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,296728385410484366,9792801917214025068,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5336 /prefetch:12⤵PID:1016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,296728385410484366,9792801917214025068,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5176 /prefetch:12⤵PID:2264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,296728385410484366,9792801917214025068,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5192 /prefetch:12⤵PID:5052
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4384
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3220
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52a70f1bd4da893a67660d6432970788d
SHA1ddf4047e0d468f56ea0c0d8ff078a86a0bb62873
SHA256c550af5ba51f68ac4d18747edc5dea1a655dd212d84bad1e6168ba7a97745561
SHA51226b9a365e77df032fc5c461d85d1ba313eafead38827190608c6537ec12b2dfdbed4e1705bfd1e61899034791ad6fa88ea7490c3a48cdaec4d04cd0577b11343
-
Filesize
152B
MD5fbe1ce4d182aaffb80de94263be1dd35
SHA1bc6c9827aa35a136a7d79be9e606ff359e2ac3ea
SHA2560021f72dbca789f179762b0e17c28fe0b93a12539b08294800e47469905aeb51
SHA5123fb0a3b38e7d4a30f5560594b1d14e6e58419e274255fb68dfe0ca897aa181f9ce8cb2048403f851fd36a17b0e34d272d03927769d41a500b2fe64806354902f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD52e0a992671e97a681c663872a77aeb38
SHA18b0d254e965b12e4bd8dbc6a65dcfec5ddbf78a5
SHA25647eaaff128445294b1313eea3cba1ff591856717a1db81f133591f412b19666a
SHA512fd53e9e38bf1af58014a9fb988e18dc5ff15b8602b44d284f89ebc6f89c7a9d78d502e7474ae077719fb0f58838d7fb72ce8d9195219df821a07b8a11b46bc68
-
Filesize
377B
MD5875b1501d710ceb21c80afa57743234b
SHA17a3bcc626123f76e848ed71049869342d058ceae
SHA25692d212f933f1ec2a75f9cb5dd13abe9dd649a5b0e228bcaaeb0071cad30cf155
SHA512753105a8060f6373e5f9a5f2b627c3b2e9c1f682b12735d9d3af0fe0aa2875ee6a08ff89250ed7d671edcb84ef0b06552513ccd05e160f90c66f1e6acfbabcdf
-
Filesize
5KB
MD5cc91d31a1dcd2b181fc5e3c04fe5afd7
SHA1eac0d3c93891d87341ebdd20a0893f3a5caabf41
SHA256d4eb6f08874ba36431238c2ff082cea586306c5157e0426c665f1f29e9c3cd7d
SHA5124fd1c3a10b1d4b2abd19bd8f643ff1d9bd30661481deabd94cbe9597d9af8336b9b7dbf322735d3684419063e707c94beddc4f207b0b6e21adc4666d5ee16986
-
Filesize
6KB
MD538d28fd3ed30e2f825af3c3af06efc28
SHA168973903194fd1346d064033c8f8f9df67cfdaaa
SHA256c13585858064f474d249e8b7c3f5fa4c1000af7e381bf6847c33f209b5cf4611
SHA51277db5ce614eb52e4222f7669fab5ba7e9465609ee9ec16bae449f59a76e97fd9a0aa9b0e36dbb6973b6f792975d545305ac419d7c6fd429a7786042bbab55389
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\cc7ed0f5-cc65-4359-b96b-01f80c7e0b67.tmp
Filesize6KB
MD5d6b096be88179e33d578f7f27618f0a3
SHA1474f9f257c6181bfe212b3b8f5d8c75a7c0470f4
SHA2561171bd9ee88fc2ad92dbc17dbf39d4332d5d7f4753cb677ba48c88acd05782cf
SHA51227574d65a27c3a3eb637f1f7d7f5cd17a9651b8d6c096cf31e022bd92da187de88eb05f5dae78998ef49a0b498f545341451ef6492eaa472b0e4259d93372a71
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5c4095796ec9793d69774c464a1c76d10
SHA1673c0b0ab50787625574783ebdb06aee0e709a86
SHA2560050dc04d6dbf0a2e49532b9c9e12eaddc5f86365abf4676627ece82384cc1f6
SHA512509c52685c4f991c547c84222dbd408e1d2406eff4eb0533a64402dbbfa32b9dd7944148e3404dd1efc0b4de56d8032fc5774de61dad9f4ac867aa1aed0fbd84