Analysis
-
max time kernel
146s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
05-05-2024 14:38
Static task
static1
Behavioral task
behavioral1
Sample
1823992f5f3945ce10f6b4f1d6fc5eab_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1823992f5f3945ce10f6b4f1d6fc5eab_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
1823992f5f3945ce10f6b4f1d6fc5eab_JaffaCakes118.html
-
Size
57KB
-
MD5
1823992f5f3945ce10f6b4f1d6fc5eab
-
SHA1
c60bb4d42a6b92bad416e880ea14c375d8fc74c3
-
SHA256
662d0fa32619ebdb8410af415c7c8784e0a9830083600ad525da1f5ee1418c5d
-
SHA512
813f16efcbc08ed8998f49821f30585f89bf00ea06b5f2b81174940833ad6e089edb0376b86d77e19e04911e10e1c233c68c8f60efbee3202b7e810de0dc5763
-
SSDEEP
768:wL/pHvvCIooxC6LItVOkQUAmmZPhtF/ieqv/HqfFcWgV6:wtHv7omC6wOkQiiPnF/wKfFf
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 5004 msedge.exe 5004 msedge.exe 4032 msedge.exe 4032 msedge.exe 1340 identity_helper.exe 1340 identity_helper.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe 3956 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4032 wrote to memory of 4860 4032 msedge.exe 84 PID 4032 wrote to memory of 4860 4032 msedge.exe 84 PID 4032 wrote to memory of 2360 4032 msedge.exe 85 PID 4032 wrote to memory of 2360 4032 msedge.exe 85 PID 4032 wrote to memory of 2360 4032 msedge.exe 85 PID 4032 wrote to memory of 2360 4032 msedge.exe 85 PID 4032 wrote to memory of 2360 4032 msedge.exe 85 PID 4032 wrote to memory of 2360 4032 msedge.exe 85 PID 4032 wrote to memory of 2360 4032 msedge.exe 85 PID 4032 wrote to memory of 2360 4032 msedge.exe 85 PID 4032 wrote to memory of 2360 4032 msedge.exe 85 PID 4032 wrote to memory of 2360 4032 msedge.exe 85 PID 4032 wrote to memory of 2360 4032 msedge.exe 85 PID 4032 wrote to memory of 2360 4032 msedge.exe 85 PID 4032 wrote to memory of 2360 4032 msedge.exe 85 PID 4032 wrote to memory of 2360 4032 msedge.exe 85 PID 4032 wrote to memory of 2360 4032 msedge.exe 85 PID 4032 wrote to memory of 2360 4032 msedge.exe 85 PID 4032 wrote to memory of 2360 4032 msedge.exe 85 PID 4032 wrote to memory of 2360 4032 msedge.exe 85 PID 4032 wrote to memory of 2360 4032 msedge.exe 85 PID 4032 wrote to memory of 2360 4032 msedge.exe 85 PID 4032 wrote to memory of 2360 4032 msedge.exe 85 PID 4032 wrote to memory of 2360 4032 msedge.exe 85 PID 4032 wrote to memory of 2360 4032 msedge.exe 85 PID 4032 wrote to memory of 2360 4032 msedge.exe 85 PID 4032 wrote to memory of 2360 4032 msedge.exe 85 PID 4032 wrote to memory of 2360 4032 msedge.exe 85 PID 4032 wrote to memory of 2360 4032 msedge.exe 85 PID 4032 wrote to memory of 2360 4032 msedge.exe 85 PID 4032 wrote to memory of 2360 4032 msedge.exe 85 PID 4032 wrote to memory of 2360 4032 msedge.exe 85 PID 4032 wrote to memory of 2360 4032 msedge.exe 85 PID 4032 wrote to memory of 2360 4032 msedge.exe 85 PID 4032 wrote to memory of 2360 4032 msedge.exe 85 PID 4032 wrote to memory of 2360 4032 msedge.exe 85 PID 4032 wrote to memory of 2360 4032 msedge.exe 85 PID 4032 wrote to memory of 2360 4032 msedge.exe 85 PID 4032 wrote to memory of 2360 4032 msedge.exe 85 PID 4032 wrote to memory of 2360 4032 msedge.exe 85 PID 4032 wrote to memory of 2360 4032 msedge.exe 85 PID 4032 wrote to memory of 2360 4032 msedge.exe 85 PID 4032 wrote to memory of 5004 4032 msedge.exe 86 PID 4032 wrote to memory of 5004 4032 msedge.exe 86 PID 4032 wrote to memory of 2140 4032 msedge.exe 87 PID 4032 wrote to memory of 2140 4032 msedge.exe 87 PID 4032 wrote to memory of 2140 4032 msedge.exe 87 PID 4032 wrote to memory of 2140 4032 msedge.exe 87 PID 4032 wrote to memory of 2140 4032 msedge.exe 87 PID 4032 wrote to memory of 2140 4032 msedge.exe 87 PID 4032 wrote to memory of 2140 4032 msedge.exe 87 PID 4032 wrote to memory of 2140 4032 msedge.exe 87 PID 4032 wrote to memory of 2140 4032 msedge.exe 87 PID 4032 wrote to memory of 2140 4032 msedge.exe 87 PID 4032 wrote to memory of 2140 4032 msedge.exe 87 PID 4032 wrote to memory of 2140 4032 msedge.exe 87 PID 4032 wrote to memory of 2140 4032 msedge.exe 87 PID 4032 wrote to memory of 2140 4032 msedge.exe 87 PID 4032 wrote to memory of 2140 4032 msedge.exe 87 PID 4032 wrote to memory of 2140 4032 msedge.exe 87 PID 4032 wrote to memory of 2140 4032 msedge.exe 87 PID 4032 wrote to memory of 2140 4032 msedge.exe 87 PID 4032 wrote to memory of 2140 4032 msedge.exe 87 PID 4032 wrote to memory of 2140 4032 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\1823992f5f3945ce10f6b4f1d6fc5eab_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4032 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8130f46f8,0x7ff8130f4708,0x7ff8130f47182⤵PID:4860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,5655103814837756303,4525985705681999102,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2200 /prefetch:22⤵PID:2360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,5655103814837756303,4525985705681999102,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2256 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2136,5655103814837756303,4525985705681999102,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2904 /prefetch:82⤵PID:2140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,5655103814837756303,4525985705681999102,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:4844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,5655103814837756303,4525985705681999102,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:3500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,5655103814837756303,4525985705681999102,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4804 /prefetch:12⤵PID:3992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,5655103814837756303,4525985705681999102,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2820 /prefetch:82⤵PID:2560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,5655103814837756303,4525985705681999102,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2820 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,5655103814837756303,4525985705681999102,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5380 /prefetch:12⤵PID:2944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,5655103814837756303,4525985705681999102,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2272 /prefetch:12⤵PID:3388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,5655103814837756303,4525985705681999102,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4216 /prefetch:12⤵PID:2560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,5655103814837756303,4525985705681999102,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5908 /prefetch:12⤵PID:5016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,5655103814837756303,4525985705681999102,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5940 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3956
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3848
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1156
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52a70f1bd4da893a67660d6432970788d
SHA1ddf4047e0d468f56ea0c0d8ff078a86a0bb62873
SHA256c550af5ba51f68ac4d18747edc5dea1a655dd212d84bad1e6168ba7a97745561
SHA51226b9a365e77df032fc5c461d85d1ba313eafead38827190608c6537ec12b2dfdbed4e1705bfd1e61899034791ad6fa88ea7490c3a48cdaec4d04cd0577b11343
-
Filesize
152B
MD5fbe1ce4d182aaffb80de94263be1dd35
SHA1bc6c9827aa35a136a7d79be9e606ff359e2ac3ea
SHA2560021f72dbca789f179762b0e17c28fe0b93a12539b08294800e47469905aeb51
SHA5123fb0a3b38e7d4a30f5560594b1d14e6e58419e274255fb68dfe0ca897aa181f9ce8cb2048403f851fd36a17b0e34d272d03927769d41a500b2fe64806354902f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD5246c924eca4211f802366fe6944a217c
SHA1e35534b40b32a5154a8e2186508ba30b2b64e073
SHA25604731994ab3ac6a55340e690bb44ab80b9bc980bbfb0729b37acee1275daa807
SHA51272e4c17db7a48735bb9d42a2a9054ad44e1ed5d3ca6846b237f578ad4a15370677d9c8f7739d48b6e7f879edb8011c54344935d82a254d26879c67cf26729006
-
Filesize
1KB
MD5c7c5b45028c0b1b390a3ac4697787710
SHA181ed30717ace9f3886079a809ae139d1783fdbb3
SHA25620a8e25c621ab374e70d8499caefcdab514cf0638ab4656eec26a18dfb0249c2
SHA512e7ad328dd989df44210ad4730003bc26a3c9e38a70cea373b1190278ef63920dec6dbccb02fe7ceae937441475d489fbfe626a7482b1679d770b752c79281766
-
Filesize
5KB
MD5163d267bdb8c1c04c07fba3a7f195167
SHA17926397bd578a5c46e2618aa9e1831a4aa954928
SHA25654e27e61f861a4f050a134da7e51a43649d7327cb2ee121589eb33d532e6112a
SHA512f165ae36d2571d4e49ffbeafc4cafd13e2a1e58ebca9dff0524b3c812d3ffcf0a7b4efe31836611f73fd9217060a8c23b38a5796dc21ae582439ea42ae0154d8
-
Filesize
6KB
MD59f771a357b8f381a28b1b8d7fb8296ed
SHA1be59a846e9b5cdea901137090db6c530730bfc1a
SHA256e8906feef488b83bb1892251745a6c562023fa70707795c309902d22de7667cc
SHA51243bc732bd0e888e55959bc440df877b16d86823c26db41ebc201427a761dbeab786b0accd9a408d3b2c42c853a8c37747a01dd169821a455ab6830427a866a1f
-
Filesize
6KB
MD56b78efe0b907a764a7fc1f221fd3b254
SHA16d2de8c84a2f55f8c0abf3d4b66171c463c586a4
SHA256d99d1ffb8a17d4870a9913af0f5fb5b8a2485d69c10f2f185a2c4a7d162e7b56
SHA512b4231d2f57f1a3f843f545bb15f70badb446fe8552de6e2204d2502a944b1b9d892c4af0691c260d967386e530d49733f35bdc7a93f9d368b961de116ec6e601
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5b1f431f44988d4f279201d23f7361477
SHA16d9875a883060ab27cc15a85603996bf60cac7ae
SHA25611a28036c310b70b66c509acd32a84bb637ee936df7c2413a974d6c094cc0956
SHA512ca54e66507d711726ced1b06f55d853d2a6ad95e09362444dad3f27404d21a8c447b444014a34c27a59a0beb55f0a872cdc6be8a178744f615a2dfbd00a6fd3e