Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
07/05/2024, 22:58
Static task
static1
Behavioral task
behavioral1
Sample
2219327e20432b5a2ba1202e0ed21762_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
2219327e20432b5a2ba1202e0ed21762_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
2219327e20432b5a2ba1202e0ed21762_JaffaCakes118.html
-
Size
33KB
-
MD5
2219327e20432b5a2ba1202e0ed21762
-
SHA1
b2f5e2e86ff1036decb7b4f7d8482fe93f9c8b34
-
SHA256
15f45d4438c625863d559777cd6c1520123d0c4e3a83b9a4f21987d60077b1f7
-
SHA512
c1a8cd47e1be17c1a8f5a00061770423883ab050d36932141757860371a8f2140610bc1a393c8c0699872c1d512b919c2899876e839334460d56126ec430cbda
-
SSDEEP
768:nFrbO1bunwb2vbZkF0F/I9bDo3IR/YoGe101J54JOYAX2V6yyP:nFrgynwS9kF0F+fo3IR/YfpDZG0bP
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4732 msedge.exe 4732 msedge.exe 4500 msedge.exe 4500 msedge.exe 5100 identity_helper.exe 5100 identity_helper.exe 5224 msedge.exe 5224 msedge.exe 5224 msedge.exe 5224 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4500 wrote to memory of 4648 4500 msedge.exe 86 PID 4500 wrote to memory of 4648 4500 msedge.exe 86 PID 4500 wrote to memory of 3556 4500 msedge.exe 87 PID 4500 wrote to memory of 3556 4500 msedge.exe 87 PID 4500 wrote to memory of 3556 4500 msedge.exe 87 PID 4500 wrote to memory of 3556 4500 msedge.exe 87 PID 4500 wrote to memory of 3556 4500 msedge.exe 87 PID 4500 wrote to memory of 3556 4500 msedge.exe 87 PID 4500 wrote to memory of 3556 4500 msedge.exe 87 PID 4500 wrote to memory of 3556 4500 msedge.exe 87 PID 4500 wrote to memory of 3556 4500 msedge.exe 87 PID 4500 wrote to memory of 3556 4500 msedge.exe 87 PID 4500 wrote to memory of 3556 4500 msedge.exe 87 PID 4500 wrote to memory of 3556 4500 msedge.exe 87 PID 4500 wrote to memory of 3556 4500 msedge.exe 87 PID 4500 wrote to memory of 3556 4500 msedge.exe 87 PID 4500 wrote to memory of 3556 4500 msedge.exe 87 PID 4500 wrote to memory of 3556 4500 msedge.exe 87 PID 4500 wrote to memory of 3556 4500 msedge.exe 87 PID 4500 wrote to memory of 3556 4500 msedge.exe 87 PID 4500 wrote to memory of 3556 4500 msedge.exe 87 PID 4500 wrote to memory of 3556 4500 msedge.exe 87 PID 4500 wrote to memory of 3556 4500 msedge.exe 87 PID 4500 wrote to memory of 3556 4500 msedge.exe 87 PID 4500 wrote to memory of 3556 4500 msedge.exe 87 PID 4500 wrote to memory of 3556 4500 msedge.exe 87 PID 4500 wrote to memory of 3556 4500 msedge.exe 87 PID 4500 wrote to memory of 3556 4500 msedge.exe 87 PID 4500 wrote to memory of 3556 4500 msedge.exe 87 PID 4500 wrote to memory of 3556 4500 msedge.exe 87 PID 4500 wrote to memory of 3556 4500 msedge.exe 87 PID 4500 wrote to memory of 3556 4500 msedge.exe 87 PID 4500 wrote to memory of 3556 4500 msedge.exe 87 PID 4500 wrote to memory of 3556 4500 msedge.exe 87 PID 4500 wrote to memory of 3556 4500 msedge.exe 87 PID 4500 wrote to memory of 3556 4500 msedge.exe 87 PID 4500 wrote to memory of 3556 4500 msedge.exe 87 PID 4500 wrote to memory of 3556 4500 msedge.exe 87 PID 4500 wrote to memory of 3556 4500 msedge.exe 87 PID 4500 wrote to memory of 3556 4500 msedge.exe 87 PID 4500 wrote to memory of 3556 4500 msedge.exe 87 PID 4500 wrote to memory of 3556 4500 msedge.exe 87 PID 4500 wrote to memory of 4732 4500 msedge.exe 88 PID 4500 wrote to memory of 4732 4500 msedge.exe 88 PID 4500 wrote to memory of 4316 4500 msedge.exe 89 PID 4500 wrote to memory of 4316 4500 msedge.exe 89 PID 4500 wrote to memory of 4316 4500 msedge.exe 89 PID 4500 wrote to memory of 4316 4500 msedge.exe 89 PID 4500 wrote to memory of 4316 4500 msedge.exe 89 PID 4500 wrote to memory of 4316 4500 msedge.exe 89 PID 4500 wrote to memory of 4316 4500 msedge.exe 89 PID 4500 wrote to memory of 4316 4500 msedge.exe 89 PID 4500 wrote to memory of 4316 4500 msedge.exe 89 PID 4500 wrote to memory of 4316 4500 msedge.exe 89 PID 4500 wrote to memory of 4316 4500 msedge.exe 89 PID 4500 wrote to memory of 4316 4500 msedge.exe 89 PID 4500 wrote to memory of 4316 4500 msedge.exe 89 PID 4500 wrote to memory of 4316 4500 msedge.exe 89 PID 4500 wrote to memory of 4316 4500 msedge.exe 89 PID 4500 wrote to memory of 4316 4500 msedge.exe 89 PID 4500 wrote to memory of 4316 4500 msedge.exe 89 PID 4500 wrote to memory of 4316 4500 msedge.exe 89 PID 4500 wrote to memory of 4316 4500 msedge.exe 89 PID 4500 wrote to memory of 4316 4500 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2219327e20432b5a2ba1202e0ed21762_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4500 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa3a8246f8,0x7ffa3a824708,0x7ffa3a8247182⤵PID:4648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,7673220462580881757,8400744202083155148,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2096 /prefetch:22⤵PID:3556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2084,7673220462580881757,8400744202083155148,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2084,7673220462580881757,8400744202083155148,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2768 /prefetch:82⤵PID:4316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,7673220462580881757,8400744202083155148,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:1692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,7673220462580881757,8400744202083155148,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:4712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,7673220462580881757,8400744202083155148,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4996 /prefetch:12⤵PID:1860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,7673220462580881757,8400744202083155148,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5344 /prefetch:82⤵PID:1224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,7673220462580881757,8400744202083155148,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5344 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,7673220462580881757,8400744202083155148,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5444 /prefetch:12⤵PID:1532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,7673220462580881757,8400744202083155148,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5460 /prefetch:12⤵PID:4660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,7673220462580881757,8400744202083155148,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5944 /prefetch:12⤵PID:5332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,7673220462580881757,8400744202083155148,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4996 /prefetch:12⤵PID:5340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,7673220462580881757,8400744202083155148,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5144 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5224
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1352
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1364
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD58b2290ca03b4ca5fe52d82550c7e7d69
SHA120583a7851a906444204ce8ba4fa51153e6cd494
SHA256f9ff4871fc5317299de907489d466e630be63d698c8f7cb77cc81faddbecc6d2
SHA512704ec8122cc1c263dff67ddbb5c20ee0db8a438674d716bc3be5b266ee5629a219b0049d721f9eb2dd8f2d8fda0163659eaa4d3e1f0a6e9072a8ffb92bb2b25d
-
Filesize
152B
MD5919c29d42fb6034fee2f5de14d573c63
SHA124a2e1042347b3853344157239bde3ed699047a8
SHA25617cd6de97a0c020cb4935739cfef4ec4e074e8d127ac4c531b6dc496580c8141
SHA512bb7eadd087bbcec8b1b8a49b102b454333f2f9708d36b6ffc3c82fdc52e46873398d967238c3bfe9ac6caef45b017a5fe3938ebf5f3053e4ef9be7b2752b563d
-
Filesize
22KB
MD55e74c6d871232d6fe5d88711ece1408b
SHA11a5d3ac31e833df4c091f14c94a2ecd1c6294875
SHA256bcadf445d413314a44375c63418a0f255fbac7afae40be0a80c9231751176105
SHA5129d001eabce7ffdbf8e338725ef07f0033d0780ea474b7d33c2ad63886ff3578d818eb5c9b130d726353cd813160b49f572736dd288cece84e9bd8b784ce530d5
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD52b929232b10b103690881df017dda0f2
SHA18c9b95dc387802ce7d2e27faab1c857627a9b9f5
SHA2567e99b67fcd07ca92a27986c7b7e5ed9e7ab0c34e9db726ec567f7df158a114b1
SHA512da29134656c1f4d8709e6e4704a539dcb670a01568bb045dcf191ea947c87ecf90769541e45a028e05f47f60c805874eaee6ebcbdfb183af381c2720b2fe8016
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD53bda51b11824212bfb8ad389c5280ca3
SHA14080e717900e9f787045c7214fca9e279c1cbc61
SHA2568d695edd819217390b96ca54faa9fdceb735f1b01deb5a81ea174bbe9f173210
SHA5120e09d7c43276fdfca865a30dcc59564165465f992db5a9d42eed3c95cd19f8f17e7654b12018ff8047656cbd0980a1c4ecd562ade235999e464ba2957334bcde
-
Filesize
987B
MD54b8d31fd050a61116746c89cdfcb4908
SHA1c43268d1f3cc17128f067f9793f8f3c0840aa214
SHA2564a70bbba6677967b555706bc939fd56334b0383fcfdae012ca755f7650b91824
SHA51259681080616cd49173b3bee9a945bf34cdc4a36d3c2ab7f9d278aad31368b6c4470633ebd34a45af62e4927cd7df5a7c3845baefea085fbb7eabbb2dbd1c795e
-
Filesize
6KB
MD54f2055f78e87210bf2526426625446b3
SHA11ceb7f9c90f1b0e9b32cd5449ec9c8d0960d0182
SHA2564f1fe1a56290726b242954fe26c16f1d03a7a7cc7e7af8d45d37b2ca90420e1a
SHA512b25dcc9ba083c65f7f340a023bf184e416fa92fc0de14c6379e7f21560bf70010b5dd32ff9a57a3a3ed1468d46cf59ec7f3dfacbd3fc477d79cf07df40619557
-
Filesize
5KB
MD514b78bce7df8f5dd50ca192f3e14b793
SHA1734bec26cca53e26f6b7d4ae7f7c97510b64653a
SHA2561484f843cd10d0694713c7a6002a3a2435acac150b8f7dc8d94ed89761d1be16
SHA51231a1582ff183b61d1ec6971d12e9561dac77dec5c09de9ce7136c41e22e1489d1d123db8cd1df6c8df33f0b329abcaa319f36c8456c08692e8b9750776061424
-
Filesize
6KB
MD581fd06bef1c5805649a75b00067f3eb2
SHA176bd266725d5a931632122be6089bef8e5d6ea23
SHA25635649d09f57e21f031dcb1210173711865fd188817698ca052afeef33d154f4d
SHA512f0754ce1baddcc34fff94cd6e6a259f096b7bc52f67bb168e254120b51091f9856371518144339a88f11b568519dce1c1413d9f227dd0a2a1d7ccad9ce7447c1
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5f87f030823557adf0459f9c15e5ba4f0
SHA134817d197711bebf9e74204bbea28eac154ee0a0
SHA256493ae5102e99f3321d4e1400b88d29b5795af2a08e4c95fc341dee4df9845184
SHA5122e2e2da5be23431f88b7d4cfc8240532b39c97036a822b9a20ff94dd1347439ea518f313bba0a64d04e9187b509d255c5908d7f8c9fb7f1ddb2dea0091e198dc