Analysis
-
max time kernel
145s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
07/05/2024, 07:42
Static task
static1
Behavioral task
behavioral1
Sample
1febc895817530bd755c55a29ba64ed2_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1febc895817530bd755c55a29ba64ed2_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
1febc895817530bd755c55a29ba64ed2_JaffaCakes118.html
-
Size
6KB
-
MD5
1febc895817530bd755c55a29ba64ed2
-
SHA1
ad778db2d6755559110f99a17f2e90dec0bd2efd
-
SHA256
1aa0389f348084decd336ce6125f347f98196cbad90ab9acb27cde733ba8f71e
-
SHA512
24e04ad1206f9a19cd748d5570e5f33a80c4d7f88949ceab3336253df667d7bfb105011a3c74813f9e9b2e74aa7e282a4c8a38341c4f4d79d5cc881270420278
-
SSDEEP
96:GBWym27vFWyC27vl48uPUUKp89oHKo01p537LWs:al7vFZ7vO8KMHKPUs
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4944 msedge.exe 4944 msedge.exe 4848 msedge.exe 4848 msedge.exe 3660 identity_helper.exe 3660 identity_helper.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe 4140 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4848 wrote to memory of 1320 4848 msedge.exe 83 PID 4848 wrote to memory of 1320 4848 msedge.exe 83 PID 4848 wrote to memory of 4640 4848 msedge.exe 84 PID 4848 wrote to memory of 4640 4848 msedge.exe 84 PID 4848 wrote to memory of 4640 4848 msedge.exe 84 PID 4848 wrote to memory of 4640 4848 msedge.exe 84 PID 4848 wrote to memory of 4640 4848 msedge.exe 84 PID 4848 wrote to memory of 4640 4848 msedge.exe 84 PID 4848 wrote to memory of 4640 4848 msedge.exe 84 PID 4848 wrote to memory of 4640 4848 msedge.exe 84 PID 4848 wrote to memory of 4640 4848 msedge.exe 84 PID 4848 wrote to memory of 4640 4848 msedge.exe 84 PID 4848 wrote to memory of 4640 4848 msedge.exe 84 PID 4848 wrote to memory of 4640 4848 msedge.exe 84 PID 4848 wrote to memory of 4640 4848 msedge.exe 84 PID 4848 wrote to memory of 4640 4848 msedge.exe 84 PID 4848 wrote to memory of 4640 4848 msedge.exe 84 PID 4848 wrote to memory of 4640 4848 msedge.exe 84 PID 4848 wrote to memory of 4640 4848 msedge.exe 84 PID 4848 wrote to memory of 4640 4848 msedge.exe 84 PID 4848 wrote to memory of 4640 4848 msedge.exe 84 PID 4848 wrote to memory of 4640 4848 msedge.exe 84 PID 4848 wrote to memory of 4640 4848 msedge.exe 84 PID 4848 wrote to memory of 4640 4848 msedge.exe 84 PID 4848 wrote to memory of 4640 4848 msedge.exe 84 PID 4848 wrote to memory of 4640 4848 msedge.exe 84 PID 4848 wrote to memory of 4640 4848 msedge.exe 84 PID 4848 wrote to memory of 4640 4848 msedge.exe 84 PID 4848 wrote to memory of 4640 4848 msedge.exe 84 PID 4848 wrote to memory of 4640 4848 msedge.exe 84 PID 4848 wrote to memory of 4640 4848 msedge.exe 84 PID 4848 wrote to memory of 4640 4848 msedge.exe 84 PID 4848 wrote to memory of 4640 4848 msedge.exe 84 PID 4848 wrote to memory of 4640 4848 msedge.exe 84 PID 4848 wrote to memory of 4640 4848 msedge.exe 84 PID 4848 wrote to memory of 4640 4848 msedge.exe 84 PID 4848 wrote to memory of 4640 4848 msedge.exe 84 PID 4848 wrote to memory of 4640 4848 msedge.exe 84 PID 4848 wrote to memory of 4640 4848 msedge.exe 84 PID 4848 wrote to memory of 4640 4848 msedge.exe 84 PID 4848 wrote to memory of 4640 4848 msedge.exe 84 PID 4848 wrote to memory of 4640 4848 msedge.exe 84 PID 4848 wrote to memory of 4944 4848 msedge.exe 85 PID 4848 wrote to memory of 4944 4848 msedge.exe 85 PID 4848 wrote to memory of 4904 4848 msedge.exe 86 PID 4848 wrote to memory of 4904 4848 msedge.exe 86 PID 4848 wrote to memory of 4904 4848 msedge.exe 86 PID 4848 wrote to memory of 4904 4848 msedge.exe 86 PID 4848 wrote to memory of 4904 4848 msedge.exe 86 PID 4848 wrote to memory of 4904 4848 msedge.exe 86 PID 4848 wrote to memory of 4904 4848 msedge.exe 86 PID 4848 wrote to memory of 4904 4848 msedge.exe 86 PID 4848 wrote to memory of 4904 4848 msedge.exe 86 PID 4848 wrote to memory of 4904 4848 msedge.exe 86 PID 4848 wrote to memory of 4904 4848 msedge.exe 86 PID 4848 wrote to memory of 4904 4848 msedge.exe 86 PID 4848 wrote to memory of 4904 4848 msedge.exe 86 PID 4848 wrote to memory of 4904 4848 msedge.exe 86 PID 4848 wrote to memory of 4904 4848 msedge.exe 86 PID 4848 wrote to memory of 4904 4848 msedge.exe 86 PID 4848 wrote to memory of 4904 4848 msedge.exe 86 PID 4848 wrote to memory of 4904 4848 msedge.exe 86 PID 4848 wrote to memory of 4904 4848 msedge.exe 86 PID 4848 wrote to memory of 4904 4848 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\1febc895817530bd755c55a29ba64ed2_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4848 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc966f46f8,0x7ffc966f4708,0x7ffc966f47182⤵PID:1320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1800,14901658576886198270,3545887959072858516,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2236 /prefetch:22⤵PID:4640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1800,14901658576886198270,3545887959072858516,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2444 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1800,14901658576886198270,3545887959072858516,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2880 /prefetch:82⤵PID:4904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1800,14901658576886198270,3545887959072858516,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:3288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1800,14901658576886198270,3545887959072858516,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1800,14901658576886198270,3545887959072858516,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1700 /prefetch:12⤵PID:4288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1800,14901658576886198270,3545887959072858516,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5548 /prefetch:12⤵PID:1976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1800,14901658576886198270,3545887959072858516,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5644 /prefetch:82⤵PID:608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1800,14901658576886198270,3545887959072858516,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5644 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1800,14901658576886198270,3545887959072858516,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2644 /prefetch:12⤵PID:3796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1800,14901658576886198270,3545887959072858516,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5640 /prefetch:12⤵PID:3620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1800,14901658576886198270,3545887959072858516,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:2660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1800,14901658576886198270,3545887959072858516,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5452 /prefetch:12⤵PID:1796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1800,14901658576886198270,3545887959072858516,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4768 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4140
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3260
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3356
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5dbac49e66219979194c79f1cf1cb3dd1
SHA14ef87804a04d51ae1fac358f92382548b27f62f2
SHA256f24ed6c5bf4b734a9af4d64e14a80a160bea569f50849f70bf7b7277c4f48562
SHA512bb314d61f53cf7774f6dfb6b772c72f5daf386bc3d27d2bb7a14c65848ee86e6c48e9c5696693ded31846b69b9372a530175df48494e3d61a228e49d43401ad1
-
Filesize
152B
MD5a9e55f5864d6e2afd2fd84e25a3bc228
SHA1a5efcff9e3df6252c7fe8535d505235f82aab276
SHA2560f4df3120e4620555916be8e51c29be8d600d68ae5244efad6a0268aabc8c452
SHA51212f45fa73a6de6dfe17acc8b52b60f2d79008da130730b74cc138c1dcd73ccc99487165e3c8c90dc247359fde272f1ec6b3cf2c5fcb04e5093936144d0558b75
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize312B
MD55e024ecde973958712c0dda6c5fda8b7
SHA17592076cddfa91eb7d455cfd7925f178f25763f4
SHA256b9c1e7a2056ba1bec2b495781ffb68570a9613af8fa9f96325112db2b1721995
SHA5128e356bccf6664a47526cfe1d80599fec8f2bd4274cde99500942b7a8efe76b182ec0d1424c2b398b081b8e458894efd50cd2a48770f4e0b0f1730d0ee7dba24d
-
Filesize
1KB
MD55b4d155f57b0559b50a1a0eb0b1680f9
SHA111576e40ccf317fdb1de38c6b307cf6bad3a4d52
SHA2563e90585a6a1b25623348b81670301f7ca44c31c9b6d5d0965fda809a1a34beaf
SHA512080da4bc8e2275ebca038a0d01e40675de48ff5ece404a96fe94c8068691fc26cf50450ddaa02ec1c6409bc8659d2796934766e1edd240868a33cff597714fa0
-
Filesize
6KB
MD5630c66f8808f7b8966d1e7c2fcbd23be
SHA1341c795122f2675c5fd68281043fed42219f2f63
SHA2567e759c4d4adba299c345e77920725cb0d448ca59ed855f6a1e8422c999adfe02
SHA512024ef719c05a5293869816f043c2fd35c4784bc254c0dd1a232b5565abb266984a1b0227dbc75d28077074ee4c15fc6faf90f5a3f6ddedc0642d4e4b68e17828
-
Filesize
6KB
MD5a38ca63ce63e64835b6a5b47ccf967d1
SHA15a9f7c9819b7d0593c342dfcf863cde15b82de90
SHA2563feae66c460f59fe5aa8f1f5645245936fc7b02dd16580eb59e05823a9db07d0
SHA512de7078c11f0003527ce3da29d4b1f51773318861bed98af5e45377c43aaa1727d68f3698ebb754a3a50a21ae461f2fe8807ded12ccf6c1e6fef582370cc69209
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\a75430f1-f112-4f5b-9da3-9d82a354a855.tmp
Filesize5KB
MD5da552ef209d4655c6a4f2d01571a66b8
SHA1ad8b925b7b9b485e16ad893b79e3ea0348909ef2
SHA256f82e429b93f548279f05b6b7aa3faaa3a0ec6580433ddb66f8782eca763d6dd7
SHA512a6f5422392498a17ae9286540506c04062e43cb4c51ff0367d4ac9bf7bd83f3f8fce2c5995c86daa967d36f1a767120b802abb18aaf3e9a461b1922fb69a9b16
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD56954ef9990faaf42b3f228dd02eb612d
SHA11028b0a7abce40d24efd632236db47fdfab7aac0
SHA256d2d141d8c958553e6e97f73ad9a1b1311ce547be91648e0ffecddbe5c474f545
SHA51246f926e05f5173b3f9f535d2f7ba4b472f8c9c87c08f671f940bdd6948b9489c9482d5a6424c70866787a327118cce8f89a76eb541af858faf96fce8b0ece1c9