Analysis
-
max time kernel
145s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
07-05-2024 05:43
Static task
static1
Behavioral task
behavioral1
Sample
1fa115589732b13b9f22072bcef116fd_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
1fa115589732b13b9f22072bcef116fd_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
1fa115589732b13b9f22072bcef116fd_JaffaCakes118.html
-
Size
252KB
-
MD5
1fa115589732b13b9f22072bcef116fd
-
SHA1
a90aaaeb885fdfc650106f0f189a026611d515a2
-
SHA256
3f61ca898c9463355136989314c2b5f3f003f541b20a63edf07808e43f40eaed
-
SHA512
83881602c1312a9b7a9b975852a2441de685cbe5bff8e7fd06e8e39451a6dbe74779f194476862697b1bf13359f286d6f473215e1be44ed67bd60360b30d0377
-
SSDEEP
1536:CfBHv7ynvCTSkjW6+DcDzPLHio2cZU312ZqxR2E2kDYUvASin9h0vAXKMtaQy:YBHTGCTbj7ZSPYUvAtr0vAXKMtaQy
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3456 msedge.exe 3456 msedge.exe 1032 msedge.exe 1032 msedge.exe 32 identity_helper.exe 32 identity_helper.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe 2796 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1032 wrote to memory of 2296 1032 msedge.exe 84 PID 1032 wrote to memory of 2296 1032 msedge.exe 84 PID 1032 wrote to memory of 1116 1032 msedge.exe 85 PID 1032 wrote to memory of 1116 1032 msedge.exe 85 PID 1032 wrote to memory of 1116 1032 msedge.exe 85 PID 1032 wrote to memory of 1116 1032 msedge.exe 85 PID 1032 wrote to memory of 1116 1032 msedge.exe 85 PID 1032 wrote to memory of 1116 1032 msedge.exe 85 PID 1032 wrote to memory of 1116 1032 msedge.exe 85 PID 1032 wrote to memory of 1116 1032 msedge.exe 85 PID 1032 wrote to memory of 1116 1032 msedge.exe 85 PID 1032 wrote to memory of 1116 1032 msedge.exe 85 PID 1032 wrote to memory of 1116 1032 msedge.exe 85 PID 1032 wrote to memory of 1116 1032 msedge.exe 85 PID 1032 wrote to memory of 1116 1032 msedge.exe 85 PID 1032 wrote to memory of 1116 1032 msedge.exe 85 PID 1032 wrote to memory of 1116 1032 msedge.exe 85 PID 1032 wrote to memory of 1116 1032 msedge.exe 85 PID 1032 wrote to memory of 1116 1032 msedge.exe 85 PID 1032 wrote to memory of 1116 1032 msedge.exe 85 PID 1032 wrote to memory of 1116 1032 msedge.exe 85 PID 1032 wrote to memory of 1116 1032 msedge.exe 85 PID 1032 wrote to memory of 1116 1032 msedge.exe 85 PID 1032 wrote to memory of 1116 1032 msedge.exe 85 PID 1032 wrote to memory of 1116 1032 msedge.exe 85 PID 1032 wrote to memory of 1116 1032 msedge.exe 85 PID 1032 wrote to memory of 1116 1032 msedge.exe 85 PID 1032 wrote to memory of 1116 1032 msedge.exe 85 PID 1032 wrote to memory of 1116 1032 msedge.exe 85 PID 1032 wrote to memory of 1116 1032 msedge.exe 85 PID 1032 wrote to memory of 1116 1032 msedge.exe 85 PID 1032 wrote to memory of 1116 1032 msedge.exe 85 PID 1032 wrote to memory of 1116 1032 msedge.exe 85 PID 1032 wrote to memory of 1116 1032 msedge.exe 85 PID 1032 wrote to memory of 1116 1032 msedge.exe 85 PID 1032 wrote to memory of 1116 1032 msedge.exe 85 PID 1032 wrote to memory of 1116 1032 msedge.exe 85 PID 1032 wrote to memory of 1116 1032 msedge.exe 85 PID 1032 wrote to memory of 1116 1032 msedge.exe 85 PID 1032 wrote to memory of 1116 1032 msedge.exe 85 PID 1032 wrote to memory of 1116 1032 msedge.exe 85 PID 1032 wrote to memory of 1116 1032 msedge.exe 85 PID 1032 wrote to memory of 3456 1032 msedge.exe 86 PID 1032 wrote to memory of 3456 1032 msedge.exe 86 PID 1032 wrote to memory of 4424 1032 msedge.exe 87 PID 1032 wrote to memory of 4424 1032 msedge.exe 87 PID 1032 wrote to memory of 4424 1032 msedge.exe 87 PID 1032 wrote to memory of 4424 1032 msedge.exe 87 PID 1032 wrote to memory of 4424 1032 msedge.exe 87 PID 1032 wrote to memory of 4424 1032 msedge.exe 87 PID 1032 wrote to memory of 4424 1032 msedge.exe 87 PID 1032 wrote to memory of 4424 1032 msedge.exe 87 PID 1032 wrote to memory of 4424 1032 msedge.exe 87 PID 1032 wrote to memory of 4424 1032 msedge.exe 87 PID 1032 wrote to memory of 4424 1032 msedge.exe 87 PID 1032 wrote to memory of 4424 1032 msedge.exe 87 PID 1032 wrote to memory of 4424 1032 msedge.exe 87 PID 1032 wrote to memory of 4424 1032 msedge.exe 87 PID 1032 wrote to memory of 4424 1032 msedge.exe 87 PID 1032 wrote to memory of 4424 1032 msedge.exe 87 PID 1032 wrote to memory of 4424 1032 msedge.exe 87 PID 1032 wrote to memory of 4424 1032 msedge.exe 87 PID 1032 wrote to memory of 4424 1032 msedge.exe 87 PID 1032 wrote to memory of 4424 1032 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\1fa115589732b13b9f22072bcef116fd_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffedf1f46f8,0x7ffedf1f4708,0x7ffedf1f47182⤵PID:2296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,9613942375321907377,14633626711416375764,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵PID:1116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,9613942375321907377,14633626711416375764,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2296 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2080,9613942375321907377,14633626711416375764,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2464 /prefetch:82⤵PID:4424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,9613942375321907377,14633626711416375764,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3184 /prefetch:12⤵PID:1124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,9613942375321907377,14633626711416375764,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,9613942375321907377,14633626711416375764,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4656 /prefetch:12⤵PID:636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,9613942375321907377,14633626711416375764,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5072 /prefetch:12⤵PID:4896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,9613942375321907377,14633626711416375764,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5872 /prefetch:82⤵PID:4984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,9613942375321907377,14633626711416375764,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5872 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:32
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,9613942375321907377,14633626711416375764,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5624 /prefetch:12⤵PID:4400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,9613942375321907377,14633626711416375764,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5724 /prefetch:12⤵PID:2368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,9613942375321907377,14633626711416375764,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4568 /prefetch:12⤵PID:4960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,9613942375321907377,14633626711416375764,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5648 /prefetch:12⤵PID:1928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,9613942375321907377,14633626711416375764,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4980 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2796
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1272
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2728
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52a70f1bd4da893a67660d6432970788d
SHA1ddf4047e0d468f56ea0c0d8ff078a86a0bb62873
SHA256c550af5ba51f68ac4d18747edc5dea1a655dd212d84bad1e6168ba7a97745561
SHA51226b9a365e77df032fc5c461d85d1ba313eafead38827190608c6537ec12b2dfdbed4e1705bfd1e61899034791ad6fa88ea7490c3a48cdaec4d04cd0577b11343
-
Filesize
152B
MD5fbe1ce4d182aaffb80de94263be1dd35
SHA1bc6c9827aa35a136a7d79be9e606ff359e2ac3ea
SHA2560021f72dbca789f179762b0e17c28fe0b93a12539b08294800e47469905aeb51
SHA5123fb0a3b38e7d4a30f5560594b1d14e6e58419e274255fb68dfe0ca897aa181f9ce8cb2048403f851fd36a17b0e34d272d03927769d41a500b2fe64806354902f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD5ebca51fa588f4aea66bd09eed824f87f
SHA161d99bea42987f4125003fa99d10bc0ec5d986ca
SHA2563fbc00433d7165609e8061f0ea3460ad02526971f3a0237311638c78bfb96dcb
SHA512b88f0f821037dadc4ad1b49640cd780694636a5d5ffa5749620834c30be5f5e5a0519c0a7cc5ae63d29c1347b188bb333661e39912d01d15c75da495e99e2992
-
Filesize
851B
MD516491b663e7df165376984acb4721a10
SHA1b3a929abf20bc5f913651a74fc376c87af96a4c5
SHA2565173cde481d4aca8e4a80c7f9afc90f57b726dbfa25b80ee7a370c2e412616da
SHA512fcd161bf8b52e15d4a315f075c5505fee7c3ddce853705900fe16b78ae3fd735c45fbf8d915198ee50d2321704613165d15251ed91ead93ff52f6539e958c12b
-
Filesize
851B
MD5deb6374e69bc24f3687b18396a96f163
SHA10a26168973fb91e02cecc5567e5481ea27f79730
SHA2560beca0b39712e58b981f250bd555e8db29a78e1017bd9efa8d9eb2ecd744a349
SHA512db701602b76b5806d8b852081e49bf626026fba8d30d448296a71ed59f3871bfe70d083772c31c983df456c6a955718e20c272660fe7bc6cbb59762fd13cadf8
-
Filesize
6KB
MD55e9948c8ef8c83e22dfe2dca98084243
SHA1e1ac91fe8278350873e043a74c43e8f8c398f801
SHA256794927e9b5b02b0d6a7d23a91101a50428ad6e8d62c52b7f08a4dc28e65b8076
SHA51274fe704b9ba5f8d374d4c215e57cbd4bd566719fcf5d35566105c41cbc9d8fa5f09987c5ed5991258b10798615a840ba0fcffdfa211e008057aebfdeef9fe918
-
Filesize
6KB
MD5d55ebd8a23d98eb2a1ad33a134974cfe
SHA13ae57ddde2b0f807b1d4d9489414d5a27a7660ed
SHA25698156c4a43702afb5ddf2416992a10960cca9435b71a766e2dfc4dabd64b359e
SHA5126880003c6d19f6207f4675bc5d1dd95919b4cb4be9260e6508c4a71eb51ab2ee52d8305a2de14913a5a17b4580d80bd368bf965d3713666c9d4cda9c6e7a7a24
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\bf483ff2-5c94-46ac-b052-15bd7479ece2.tmp
Filesize5KB
MD5245b69b11221745da5c32aff347cc377
SHA18aa235b4627e710a4975ea427f9f6a89d909fb0d
SHA256ebd0a1a0cfc5c8001521f034a40e50252677c5f7afd8600baaafacbb51e8fa14
SHA5126e05aa51bdf1b40bfd8bca3b6e390e8fbcc0f5b435a9730402cad0b1823dbee5c0cdb1edf320ff0ad82cf2379b060d9a2e659e7c78ccb15b26a46d60fd117c8f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5b6eecb3d535f7ba1dec9a898c2d3d5ae
SHA139c144c70fdc0850a9b25558cf4dbda1b5b2edd8
SHA256a6959847eb2b5f4da25473681093e51f677b28b604152bed80b77a560e4acc0b
SHA5129411a365c58667249ad203bb49567ee2891c2379baf8b6734872d84da2f9d36a5d76734455d604ad0100d803143f63cd2f37d7b19ab297bdb648d0926b47884a