Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
07/05/2024, 09:57
Static task
static1
Behavioral task
behavioral1
Sample
20408b2e8debb557b7ac7f345defc6b8_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
20408b2e8debb557b7ac7f345defc6b8_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
20408b2e8debb557b7ac7f345defc6b8_JaffaCakes118.html
-
Size
115KB
-
MD5
20408b2e8debb557b7ac7f345defc6b8
-
SHA1
a9146d363e271b50360fdfa98ed36b718d82c214
-
SHA256
98f6a5f2a80573aff216375904525536e343ed4bce20c46cf99769508c4f47cf
-
SHA512
e72bfcbaec7b6d37ab02b2bffe3f68a1cc4b395bb0fba52b708dc2925338e0bc548826642492db4ab77d0e9cf827dc172062d19eaf1db3173fea3864680b41b3
-
SSDEEP
768:2ooOT0EipB5sNm5LOu2RSGiLyNLPvCGht08r9BuM1YD8rwNyF0VrVeD79bm:2ooOTupB5sb3B33jE/NyF0VrVam
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 816 msedge.exe 816 msedge.exe 1452 msedge.exe 1452 msedge.exe 4732 identity_helper.exe 4732 identity_helper.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe 1452 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1452 wrote to memory of 2052 1452 msedge.exe 83 PID 1452 wrote to memory of 2052 1452 msedge.exe 83 PID 1452 wrote to memory of 1156 1452 msedge.exe 84 PID 1452 wrote to memory of 1156 1452 msedge.exe 84 PID 1452 wrote to memory of 1156 1452 msedge.exe 84 PID 1452 wrote to memory of 1156 1452 msedge.exe 84 PID 1452 wrote to memory of 1156 1452 msedge.exe 84 PID 1452 wrote to memory of 1156 1452 msedge.exe 84 PID 1452 wrote to memory of 1156 1452 msedge.exe 84 PID 1452 wrote to memory of 1156 1452 msedge.exe 84 PID 1452 wrote to memory of 1156 1452 msedge.exe 84 PID 1452 wrote to memory of 1156 1452 msedge.exe 84 PID 1452 wrote to memory of 1156 1452 msedge.exe 84 PID 1452 wrote to memory of 1156 1452 msedge.exe 84 PID 1452 wrote to memory of 1156 1452 msedge.exe 84 PID 1452 wrote to memory of 1156 1452 msedge.exe 84 PID 1452 wrote to memory of 1156 1452 msedge.exe 84 PID 1452 wrote to memory of 1156 1452 msedge.exe 84 PID 1452 wrote to memory of 1156 1452 msedge.exe 84 PID 1452 wrote to memory of 1156 1452 msedge.exe 84 PID 1452 wrote to memory of 1156 1452 msedge.exe 84 PID 1452 wrote to memory of 1156 1452 msedge.exe 84 PID 1452 wrote to memory of 1156 1452 msedge.exe 84 PID 1452 wrote to memory of 1156 1452 msedge.exe 84 PID 1452 wrote to memory of 1156 1452 msedge.exe 84 PID 1452 wrote to memory of 1156 1452 msedge.exe 84 PID 1452 wrote to memory of 1156 1452 msedge.exe 84 PID 1452 wrote to memory of 1156 1452 msedge.exe 84 PID 1452 wrote to memory of 1156 1452 msedge.exe 84 PID 1452 wrote to memory of 1156 1452 msedge.exe 84 PID 1452 wrote to memory of 1156 1452 msedge.exe 84 PID 1452 wrote to memory of 1156 1452 msedge.exe 84 PID 1452 wrote to memory of 1156 1452 msedge.exe 84 PID 1452 wrote to memory of 1156 1452 msedge.exe 84 PID 1452 wrote to memory of 1156 1452 msedge.exe 84 PID 1452 wrote to memory of 1156 1452 msedge.exe 84 PID 1452 wrote to memory of 1156 1452 msedge.exe 84 PID 1452 wrote to memory of 1156 1452 msedge.exe 84 PID 1452 wrote to memory of 1156 1452 msedge.exe 84 PID 1452 wrote to memory of 1156 1452 msedge.exe 84 PID 1452 wrote to memory of 1156 1452 msedge.exe 84 PID 1452 wrote to memory of 1156 1452 msedge.exe 84 PID 1452 wrote to memory of 816 1452 msedge.exe 85 PID 1452 wrote to memory of 816 1452 msedge.exe 85 PID 1452 wrote to memory of 400 1452 msedge.exe 86 PID 1452 wrote to memory of 400 1452 msedge.exe 86 PID 1452 wrote to memory of 400 1452 msedge.exe 86 PID 1452 wrote to memory of 400 1452 msedge.exe 86 PID 1452 wrote to memory of 400 1452 msedge.exe 86 PID 1452 wrote to memory of 400 1452 msedge.exe 86 PID 1452 wrote to memory of 400 1452 msedge.exe 86 PID 1452 wrote to memory of 400 1452 msedge.exe 86 PID 1452 wrote to memory of 400 1452 msedge.exe 86 PID 1452 wrote to memory of 400 1452 msedge.exe 86 PID 1452 wrote to memory of 400 1452 msedge.exe 86 PID 1452 wrote to memory of 400 1452 msedge.exe 86 PID 1452 wrote to memory of 400 1452 msedge.exe 86 PID 1452 wrote to memory of 400 1452 msedge.exe 86 PID 1452 wrote to memory of 400 1452 msedge.exe 86 PID 1452 wrote to memory of 400 1452 msedge.exe 86 PID 1452 wrote to memory of 400 1452 msedge.exe 86 PID 1452 wrote to memory of 400 1452 msedge.exe 86 PID 1452 wrote to memory of 400 1452 msedge.exe 86 PID 1452 wrote to memory of 400 1452 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\20408b2e8debb557b7ac7f345defc6b8_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1452 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa2df146f8,0x7ffa2df14708,0x7ffa2df147182⤵PID:2052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2180,4860481622606473395,13776371697682541279,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2224 /prefetch:22⤵PID:1156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2180,4860481622606473395,13776371697682541279,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2276 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2180,4860481622606473395,13776371697682541279,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2904 /prefetch:82⤵PID:400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,4860481622606473395,13776371697682541279,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3204 /prefetch:12⤵PID:2004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,4860481622606473395,13776371697682541279,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:2744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,4860481622606473395,13776371697682541279,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4732 /prefetch:12⤵PID:4360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2180,4860481622606473395,13776371697682541279,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6028 /prefetch:82⤵PID:844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2180,4860481622606473395,13776371697682541279,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6028 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,4860481622606473395,13776371697682541279,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5476 /prefetch:12⤵PID:3808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,4860481622606473395,13776371697682541279,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5548 /prefetch:12⤵PID:2692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,4860481622606473395,13776371697682541279,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5432 /prefetch:12⤵PID:3076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,4860481622606473395,13776371697682541279,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5416 /prefetch:12⤵PID:4524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2180,4860481622606473395,13776371697682541279,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4964 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3980
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1516
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2180
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54e96ed67859d0bafd47d805a71041f49
SHA17806c54ae29a6c8d01dcbc78e5525ddde321b16b
SHA256bd13ddab4dc4bbf01ed50341953c9638f6d71faf92bc79fbfe93687432c2292d
SHA512432201c3119779d91d13da55a26d4ff4ce4a9529e00b44ec1738029f92610d4e6e25c05694adf949c3e9c70fbbbbea723f63c29287906729f5e88a046a2edcb7
-
Filesize
152B
MD51cbd0e9a14155b7f5d4f542d09a83153
SHA127a442a921921d69743a8e4b76ff0b66016c4b76
SHA256243d05d6af19bfe3e06b1f7507342ead88f9d87b84e239ad1d144e9e454b548c
SHA51217e5217d5bf67571afb0e7ef30ac21c11ea6553f89457548d96ee4461011f641a7872a37257239fa5f25702f027afb85d5bd9faf2f2f183992b8879407e56a0d
-
Filesize
20KB
MD5b6c8122025aff891940d1d5e1ab95fce
SHA1a0c7ca41d0922d085c358f5dde81ae3e85a8c9c4
SHA2569954c64c68000f615e5066bc255eced1195d1f8b7dbc715f9062ddf9f147e87e
SHA512e62a37b55b6b8d95c24fb624105ff6ff72f118e31760d0da1e8df8e8acf627ec6327c26dfa26df8535585877604c7948d2f621ccabc39beec49787e22c302c10
-
Filesize
44KB
MD588477d32f888c2b8a3f3d98deb460b3d
SHA11fae9ac6c1082fc0426aebe4e683eea9b4ba898c
SHA2561b1f0b5ef5f21d5742d84f331def7116323365c3dd4aec096a55763e310879d8
SHA512e0c0588ff27a989cac47797e5a8044983d0b3c75c44416c5f977e0e93e9d3a9321b9283ea077e6dcad0619ac960ee45fe8570f1d5cc7d5d4117fee4f2f0c96b3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD59e4d4009f16bee0fcff6d977b031d083
SHA1205ded215492f1a2d557a307cdf58dc44e3446d2
SHA256814a0dc67e2bcdb6470f5ea4814648fd765425a3d20d4c73bdc428409a7fa52c
SHA5122440d0bcd8ae115a66596597ec18757b42899f090807b8a81e44ffa2bd23577e1a82737aa020c66d2cc65bdbe4e2a9dd5e5d0037b73feeeaee498497bdef4513
-
Filesize
1KB
MD515ea766e4cb028ac348c6c5b87463ee4
SHA11ed7505b0aa2b5f3a6975b242dfb06b11a16392b
SHA25659e87e77f8f790ab365035006b35ac561e8b11443a7cede58325a067d3092d45
SHA5121318f4d4832f19de288d8515ce6beb25298292c8ed3a6399eb3ce372be057343ce95997e33948a58212deb460807a36b16169e0d1bb2b9da080238cb548dedcd
-
Filesize
5KB
MD522786ed0fe4ef5386df9a2eaa7b18d93
SHA192c317f9c49e8a0074e844d1adf666d8aaeabe75
SHA2565b0f4b6147318886e4dcd417497b64486f394d52713e8974c156fb078ba8ddb8
SHA5121ba910b46ea1bc6ac571151ab31f2a14ac5ccf937b49ce356fe15748ecd1bd92eba73ffc8b50f31a25e11ec00be1cd27eb93591d2a84116f3f28365a09aa6464
-
Filesize
6KB
MD55f4b230e34d7a02370514ef9446bcd3a
SHA15e128e07eae2c8d78640a7ae010428f7f0350b62
SHA256cdcfd286ecc70785b6ae462f409e3fd93fd2d5b15add00f7e8f945156d8fdcf5
SHA5126ba0c5fb9e58a8ee9a452b27fd0128ff60d022edf343092fba9cc43b548c32b4f89e2e14886f3f2eaecafb1f44968b634e622bbab9bf2111f81882b7a29e30e7
-
Filesize
6KB
MD50f82ca45389f85f811aecfc5bee3cb69
SHA1efa5891cac080ccc56b83cd2e6b95bad93fb351d
SHA2566b2843d8602f4515351ad7aed41bd7caca77b13dcd9dc902a6d4b80e07627260
SHA512f4e869ba7ccf363c507a01638cc820cddaf9c20ceeda196d280f0647cf785879109df619d7f208c48d0e1c86306d3e1b57fdd8d1360396825f274ff6a3dde04e
-
Filesize
6KB
MD5eb9a1ccae1523d8aa8e25636710c0001
SHA127ad3303f94f761175a64343cd13366c63a90c6f
SHA2565a881c27c4b73b131bc7a40a5936215ae8225d2ac72898221eb2b2a9b0d1459b
SHA5121e61e243c61686e405894e5274c827d908b53d48b7602a918f737281152f2ba98e48dc62529b06e1974d745fdb5dddd635cc4429e66a6c1ace14719c824521a8
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD51af812f96064f69c77aa1a90fe650040
SHA1c50a2cde056b1d2bc32199403dae43ab253da4bb
SHA25673abd9aadb385385c3fe6f24675939bed9f154d5fbcb3ad6c5e2ed9d28f89235
SHA512b40e78d0f485ec4eaf4bd906785733253897aa5ddadc2eac7e4611f58754d79ced8eb3aea33d04679ffdebd97bf64f1e524b32cd9ed99a9628183933782189c3