Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
07/05/2024, 07:09
Static task
static1
Behavioral task
behavioral1
Sample
1fd551fe1b1da29d971337ea6f5cf34d_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1fd551fe1b1da29d971337ea6f5cf34d_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
1fd551fe1b1da29d971337ea6f5cf34d_JaffaCakes118.html
-
Size
64KB
-
MD5
1fd551fe1b1da29d971337ea6f5cf34d
-
SHA1
012db57d9219c508bb3fb97de8f1a0a33aa67f66
-
SHA256
152e1a0538b269a6cdfec2d42d7d277e5f6768a6bd624fc6d9a7e28a6b5f8ce0
-
SHA512
cc0ff6d4d4edcca7b9f6ffb95e2dc6e2ccaa8822cd89113c6b667c8a35f817e415e6aba50249dd7516f2547b870bb0dc834534529e78fa3ab9dd8aa1a75a663d
-
SSDEEP
1536:FnWkADkAmckABKQ+ZkAXhTcr0IPGNMxZPdJXxPTQakAkPvFShRWKpGyJwOKNcqNx:FWkADkAZkAIDZkARTcr0uGNMxZPdJXxu
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3404 msedge.exe 3404 msedge.exe 872 msedge.exe 872 msedge.exe 4536 identity_helper.exe 4536 identity_helper.exe 2516 msedge.exe 2516 msedge.exe 2516 msedge.exe 2516 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 872 wrote to memory of 2096 872 msedge.exe 85 PID 872 wrote to memory of 2096 872 msedge.exe 85 PID 872 wrote to memory of 3044 872 msedge.exe 86 PID 872 wrote to memory of 3044 872 msedge.exe 86 PID 872 wrote to memory of 3044 872 msedge.exe 86 PID 872 wrote to memory of 3044 872 msedge.exe 86 PID 872 wrote to memory of 3044 872 msedge.exe 86 PID 872 wrote to memory of 3044 872 msedge.exe 86 PID 872 wrote to memory of 3044 872 msedge.exe 86 PID 872 wrote to memory of 3044 872 msedge.exe 86 PID 872 wrote to memory of 3044 872 msedge.exe 86 PID 872 wrote to memory of 3044 872 msedge.exe 86 PID 872 wrote to memory of 3044 872 msedge.exe 86 PID 872 wrote to memory of 3044 872 msedge.exe 86 PID 872 wrote to memory of 3044 872 msedge.exe 86 PID 872 wrote to memory of 3044 872 msedge.exe 86 PID 872 wrote to memory of 3044 872 msedge.exe 86 PID 872 wrote to memory of 3044 872 msedge.exe 86 PID 872 wrote to memory of 3044 872 msedge.exe 86 PID 872 wrote to memory of 3044 872 msedge.exe 86 PID 872 wrote to memory of 3044 872 msedge.exe 86 PID 872 wrote to memory of 3044 872 msedge.exe 86 PID 872 wrote to memory of 3044 872 msedge.exe 86 PID 872 wrote to memory of 3044 872 msedge.exe 86 PID 872 wrote to memory of 3044 872 msedge.exe 86 PID 872 wrote to memory of 3044 872 msedge.exe 86 PID 872 wrote to memory of 3044 872 msedge.exe 86 PID 872 wrote to memory of 3044 872 msedge.exe 86 PID 872 wrote to memory of 3044 872 msedge.exe 86 PID 872 wrote to memory of 3044 872 msedge.exe 86 PID 872 wrote to memory of 3044 872 msedge.exe 86 PID 872 wrote to memory of 3044 872 msedge.exe 86 PID 872 wrote to memory of 3044 872 msedge.exe 86 PID 872 wrote to memory of 3044 872 msedge.exe 86 PID 872 wrote to memory of 3044 872 msedge.exe 86 PID 872 wrote to memory of 3044 872 msedge.exe 86 PID 872 wrote to memory of 3044 872 msedge.exe 86 PID 872 wrote to memory of 3044 872 msedge.exe 86 PID 872 wrote to memory of 3044 872 msedge.exe 86 PID 872 wrote to memory of 3044 872 msedge.exe 86 PID 872 wrote to memory of 3044 872 msedge.exe 86 PID 872 wrote to memory of 3044 872 msedge.exe 86 PID 872 wrote to memory of 3404 872 msedge.exe 87 PID 872 wrote to memory of 3404 872 msedge.exe 87 PID 872 wrote to memory of 4532 872 msedge.exe 88 PID 872 wrote to memory of 4532 872 msedge.exe 88 PID 872 wrote to memory of 4532 872 msedge.exe 88 PID 872 wrote to memory of 4532 872 msedge.exe 88 PID 872 wrote to memory of 4532 872 msedge.exe 88 PID 872 wrote to memory of 4532 872 msedge.exe 88 PID 872 wrote to memory of 4532 872 msedge.exe 88 PID 872 wrote to memory of 4532 872 msedge.exe 88 PID 872 wrote to memory of 4532 872 msedge.exe 88 PID 872 wrote to memory of 4532 872 msedge.exe 88 PID 872 wrote to memory of 4532 872 msedge.exe 88 PID 872 wrote to memory of 4532 872 msedge.exe 88 PID 872 wrote to memory of 4532 872 msedge.exe 88 PID 872 wrote to memory of 4532 872 msedge.exe 88 PID 872 wrote to memory of 4532 872 msedge.exe 88 PID 872 wrote to memory of 4532 872 msedge.exe 88 PID 872 wrote to memory of 4532 872 msedge.exe 88 PID 872 wrote to memory of 4532 872 msedge.exe 88 PID 872 wrote to memory of 4532 872 msedge.exe 88 PID 872 wrote to memory of 4532 872 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\1fd551fe1b1da29d971337ea6f5cf34d_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:872 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff98cd046f8,0x7ff98cd04708,0x7ff98cd047182⤵PID:2096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2224,5695040828724300918,3363836155036313808,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2248 /prefetch:22⤵PID:3044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2224,5695040828724300918,3363836155036313808,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2300 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2224,5695040828724300918,3363836155036313808,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2736 /prefetch:82⤵PID:4532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,5695040828724300918,3363836155036313808,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:4388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,5695040828724300918,3363836155036313808,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:1996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,5695040828724300918,3363836155036313808,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4724 /prefetch:12⤵PID:368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,5695040828724300918,3363836155036313808,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4904 /prefetch:12⤵PID:5024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,5695040828724300918,3363836155036313808,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4912 /prefetch:12⤵PID:1232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,5695040828724300918,3363836155036313808,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5412 /prefetch:12⤵PID:4900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2224,5695040828724300918,3363836155036313808,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5924 /prefetch:82⤵PID:4528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2224,5695040828724300918,3363836155036313808,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5924 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,5695040828724300918,3363836155036313808,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5920 /prefetch:12⤵PID:1180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,5695040828724300918,3363836155036313808,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5716 /prefetch:12⤵PID:4296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,5695040828724300918,3363836155036313808,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4576 /prefetch:12⤵PID:2196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,5695040828724300918,3363836155036313808,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5000 /prefetch:12⤵PID:1728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2224,5695040828724300918,3363836155036313808,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5336 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2516
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2428
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2736
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD562c02dda2bf22d702a9b3a1c547c5f6a
SHA18f42966df96bd2e8c1f6b31b37c9a19beb6394d6
SHA256cb8a0964605551ed5a0668c08ab888044bbd845c9225ffee5a28e0b847ede62b
SHA512a7ce2c0946382188e1d8480cfb096b29bd0dcb260ccdc74167cc351160a1884d04d57a2517eb700b3eef30eaf4a01bfbf31858365b1e624d4b0960ffd0032fa9
-
Filesize
152B
MD5850f27f857369bf7fe83c613d2ec35cb
SHA17677a061c6fd2a030b44841bfb32da0abc1dbefb
SHA256a7db700e067222e55e323a9ffc71a92f59829e81021e2607cec0d2ec6faf602a
SHA5127b1efa002b7a1a23973bff0618fb4a82cd0c5193df55cd960c7516caa63509587fd8b36f3aea6db01ece368065865af6472365b820fadce720b64b561ab5f401
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD5175a2dd81559ea80a904b07bb4cc51c0
SHA152b248a8ee955aa0fa8b7fb64a5806f69e87274a
SHA2565f54e67e4dd2223377fca9c94453e0dd705805360ed5b55b32360b771ddf3888
SHA5123ef5b88bcc1c93074100f43edea105d1d47b930a33732b2941c5d818f2eaa6d77e664d0be43aa1ae10cbbb92662cbc577d81c44000c77909238b9552bc203d06
-
Filesize
2KB
MD504a856ad6ccc678493af2c1d6e7b96cc
SHA132183722abadacb3708f338f9c670ed382b74015
SHA256de0fa9217b60ddf291bad397f3f0a3fbe0406f51f5379b8e43c6948e5ad07b50
SHA5129748a0f7b9f8b96d02be361decc195b1d2cb7379bca08847484e3eb867a3b18d390218c2544c0fb7cfafd3c2141ee089fea707af5ed1b9ef13e0347b5411b3e5
-
Filesize
5KB
MD5955b755190b01764bf95c13cfd0d181e
SHA163328375ac9ff9899369f1eef2286f11fbc01e85
SHA25600717063ac3f7bdddeec66cebf4d12632d7f4b39fc53c9b414dac77e27e109e7
SHA5127850e54d16db2659a8de93e068340845388fd5f79178a93325df87b4a30b107708e6c9ea7e75453dc4d4bcb11ca66da9f306fa70565b4d06f5c9d9ba6126a4df
-
Filesize
6KB
MD560265ab964f407971d89a074ec9baa6e
SHA1ac089b7034f0435d5efca7c5db9e4999c9a95e23
SHA256517974b7d4f5138869a8c6e7fb7744c9e7a5cd7ae693c18145b742c5b812055b
SHA5129810b2fc73064e205e72cc41e4debe63fcd2970c6e52e9cce424350a90cfc99534d5448cb86c4fa10e45ef8d46302d4b6241e92129ac0acdfd752c7f7a5a7699
-
Filesize
6KB
MD5136494e0e95c8d68ed47f46bbc4869e2
SHA1d346fa354253461758264cc64c995bce314551c0
SHA25610e08c785fe54c275340faa0ecd69b407b0774c42d853dcda2cdeb648e91fb3a
SHA512d56e9f820a6c7ad2d3d57b1f56fc8e72e0e5e2d4cb18e39946e9ce118328ed6fa816db5559e41891b0a24eae16cf5612386b7d26573a431706b1ab806893456b
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5e9a92df76ca60fb9eb8976cbb7aa5de4
SHA12ad031ce1b4110f4087596be95e60fccd30003a8
SHA256bf864e1cd76806741653ee271089da1e795493f66e48931f9f68a82fc6173746
SHA512054f3c6e2b196f6ecdfa8fee142f6317bbc443bdf647d40e0f3912dc28a2f8d10dff259d0e34bbeb2354bbfb7111b4aebc7854615a55778983467b297259b38f