Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
07/05/2024, 13:08
Static task
static1
Behavioral task
behavioral1
Sample
20a81cacc83f7034e42b83be6c8219f9_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
20a81cacc83f7034e42b83be6c8219f9_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
20a81cacc83f7034e42b83be6c8219f9_JaffaCakes118.html
-
Size
40KB
-
MD5
20a81cacc83f7034e42b83be6c8219f9
-
SHA1
ee800bbe6e42bd53944b89df988d78d643fccd90
-
SHA256
e03916f2afefeb2c9c5f8bdc0c304bd98b7a0a65a0a65e7d14a62f62839bfc7b
-
SHA512
2998d2f671b4611be07b28cbcb7d2a4b9be7f4a418485ee76ef31a249f97e2f032a62617de6ca723399339bfa0e60d0a7d70c6f4c5d73adb4cfc3fb7d3965278
-
SSDEEP
768:woPY5kJa0Jw8taj3MOulQBY+a92F99qB9f0xg9LgB4uPldhOEX:woPY5kJa0Jw8taj3MOIQE9cUB6gm4uPv
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2768 msedge.exe 2768 msedge.exe 2520 msedge.exe 2520 msedge.exe 820 identity_helper.exe 820 identity_helper.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2520 wrote to memory of 2208 2520 msedge.exe 83 PID 2520 wrote to memory of 2208 2520 msedge.exe 83 PID 2520 wrote to memory of 1820 2520 msedge.exe 84 PID 2520 wrote to memory of 1820 2520 msedge.exe 84 PID 2520 wrote to memory of 1820 2520 msedge.exe 84 PID 2520 wrote to memory of 1820 2520 msedge.exe 84 PID 2520 wrote to memory of 1820 2520 msedge.exe 84 PID 2520 wrote to memory of 1820 2520 msedge.exe 84 PID 2520 wrote to memory of 1820 2520 msedge.exe 84 PID 2520 wrote to memory of 1820 2520 msedge.exe 84 PID 2520 wrote to memory of 1820 2520 msedge.exe 84 PID 2520 wrote to memory of 1820 2520 msedge.exe 84 PID 2520 wrote to memory of 1820 2520 msedge.exe 84 PID 2520 wrote to memory of 1820 2520 msedge.exe 84 PID 2520 wrote to memory of 1820 2520 msedge.exe 84 PID 2520 wrote to memory of 1820 2520 msedge.exe 84 PID 2520 wrote to memory of 1820 2520 msedge.exe 84 PID 2520 wrote to memory of 1820 2520 msedge.exe 84 PID 2520 wrote to memory of 1820 2520 msedge.exe 84 PID 2520 wrote to memory of 1820 2520 msedge.exe 84 PID 2520 wrote to memory of 1820 2520 msedge.exe 84 PID 2520 wrote to memory of 1820 2520 msedge.exe 84 PID 2520 wrote to memory of 1820 2520 msedge.exe 84 PID 2520 wrote to memory of 1820 2520 msedge.exe 84 PID 2520 wrote to memory of 1820 2520 msedge.exe 84 PID 2520 wrote to memory of 1820 2520 msedge.exe 84 PID 2520 wrote to memory of 1820 2520 msedge.exe 84 PID 2520 wrote to memory of 1820 2520 msedge.exe 84 PID 2520 wrote to memory of 1820 2520 msedge.exe 84 PID 2520 wrote to memory of 1820 2520 msedge.exe 84 PID 2520 wrote to memory of 1820 2520 msedge.exe 84 PID 2520 wrote to memory of 1820 2520 msedge.exe 84 PID 2520 wrote to memory of 1820 2520 msedge.exe 84 PID 2520 wrote to memory of 1820 2520 msedge.exe 84 PID 2520 wrote to memory of 1820 2520 msedge.exe 84 PID 2520 wrote to memory of 1820 2520 msedge.exe 84 PID 2520 wrote to memory of 1820 2520 msedge.exe 84 PID 2520 wrote to memory of 1820 2520 msedge.exe 84 PID 2520 wrote to memory of 1820 2520 msedge.exe 84 PID 2520 wrote to memory of 1820 2520 msedge.exe 84 PID 2520 wrote to memory of 1820 2520 msedge.exe 84 PID 2520 wrote to memory of 1820 2520 msedge.exe 84 PID 2520 wrote to memory of 2768 2520 msedge.exe 85 PID 2520 wrote to memory of 2768 2520 msedge.exe 85 PID 2520 wrote to memory of 2412 2520 msedge.exe 86 PID 2520 wrote to memory of 2412 2520 msedge.exe 86 PID 2520 wrote to memory of 2412 2520 msedge.exe 86 PID 2520 wrote to memory of 2412 2520 msedge.exe 86 PID 2520 wrote to memory of 2412 2520 msedge.exe 86 PID 2520 wrote to memory of 2412 2520 msedge.exe 86 PID 2520 wrote to memory of 2412 2520 msedge.exe 86 PID 2520 wrote to memory of 2412 2520 msedge.exe 86 PID 2520 wrote to memory of 2412 2520 msedge.exe 86 PID 2520 wrote to memory of 2412 2520 msedge.exe 86 PID 2520 wrote to memory of 2412 2520 msedge.exe 86 PID 2520 wrote to memory of 2412 2520 msedge.exe 86 PID 2520 wrote to memory of 2412 2520 msedge.exe 86 PID 2520 wrote to memory of 2412 2520 msedge.exe 86 PID 2520 wrote to memory of 2412 2520 msedge.exe 86 PID 2520 wrote to memory of 2412 2520 msedge.exe 86 PID 2520 wrote to memory of 2412 2520 msedge.exe 86 PID 2520 wrote to memory of 2412 2520 msedge.exe 86 PID 2520 wrote to memory of 2412 2520 msedge.exe 86 PID 2520 wrote to memory of 2412 2520 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\20a81cacc83f7034e42b83be6c8219f9_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe1ce946f8,0x7ffe1ce94708,0x7ffe1ce947182⤵PID:2208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2184,14732099393246141259,7115097235565772706,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2192 /prefetch:22⤵PID:1820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2184,14732099393246141259,7115097235565772706,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2264 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2184,14732099393246141259,7115097235565772706,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2928 /prefetch:82⤵PID:2412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,14732099393246141259,7115097235565772706,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:5052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,14732099393246141259,7115097235565772706,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3376 /prefetch:12⤵PID:4876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,14732099393246141259,7115097235565772706,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4744 /prefetch:12⤵PID:3756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,14732099393246141259,7115097235565772706,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6136 /prefetch:12⤵PID:3056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2184,14732099393246141259,7115097235565772706,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5656 /prefetch:82⤵PID:1696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2184,14732099393246141259,7115097235565772706,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5656 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,14732099393246141259,7115097235565772706,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5920 /prefetch:12⤵PID:4392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,14732099393246141259,7115097235565772706,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5912 /prefetch:12⤵PID:3940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,14732099393246141259,7115097235565772706,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5532 /prefetch:12⤵PID:2704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,14732099393246141259,7115097235565772706,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5880 /prefetch:12⤵PID:3528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2184,14732099393246141259,7115097235565772706,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5100 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1100
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4480
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2536
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c9c4c494f8fba32d95ba2125f00586a3
SHA18a600205528aef7953144f1cf6f7a5115e3611de
SHA256a0ca609205813c307df9122c0c5b0967c5472755700f615b0033129cf7d6b35b
SHA5129d30cea6cfc259e97b0305f8b5cd19774044fb78feedfcef2014b2947f2e6a101273bc4ad30db9cc1724e62eb441266d7df376e28ac58693f128b9cce2c7d20d
-
Filesize
152B
MD54dc6fc5e708279a3310fe55d9c44743d
SHA1a42e8bdf9d1c25ef3e223d59f6b1d16b095f46d2
SHA256a1c5f48659d4b3af960971b3a0f433a95fee5bfafe5680a34110c68b342377d8
SHA5125874b2310187f242b852fa6dcded244cc860abb2be4f6f5a6a1db8322e12e1fef8f825edc0aae75adbb7284a2cd64730650d0643b1e2bb7ead9350e50e1d8c13
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\14246420-b094-4c3e-997e-22cc4a043728.tmp
Filesize6KB
MD538a33feaa9cbbf92d2e0d5999a6afe32
SHA1763a629949c9398fa91ac5046e74d0b7d23e97a0
SHA2561e9c78d76530d7381ee212ad62fc940d734c59dae872633db06167543e2977cc
SHA512c3b71e6ae848dc15ee973b424fa7ecbf2acdb67dc767ab7c571acedc1d8b487d664651f1bb9306228d83f6579299db84cad334378bf98a0cd3fe07cb09d3c9a9
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize192B
MD5ba365bdf641780e05b023c4b42673a13
SHA17435275ce78e8ed82b96a57337e2c97a1accdadb
SHA2567eb3ff15f91cc8b7d3318ec2a9a8f687ab8b52bb268a8861a43cd86fe8b15d6e
SHA5121a5dfdc0085b6a6a5aeeee59cbf828b4d3dc276b3795b3261fdb3bfb2e1ba80094a63e89a5d71e0dae79494e725fb70e21df6a59b5b978122a2ff2a862658f00
-
Filesize
179B
MD5fb3dcf6dbcf0e64f04deeed7a06dcb2e
SHA17d237118c0a9139810efaacabc8eabc68816a9cd
SHA256632ebf86061464cb788dfe4aff0052892d5d06b0e9e516152d695ce55ec1ab7e
SHA5122810ff16251db8d90522e14fd7f484df23955c3650cf0b7fecf9d97f8c1d22ab958175563d5d43b187f2edab1e25f87c6e46dea00b34b2f563d925fd2173e61e
-
Filesize
6KB
MD52481b135eb7fea1dd09254d8fed397c5
SHA15cb198a02a9d0c710a64dadae920c72f00819203
SHA256ddfdf3fdab8bb305d35d72d7eb9dfcc6ed9e356b2556f47a6bc222d096e4354c
SHA5127ca3de3832e654b5341dbdb52bcbe9abeec378334a57432e67f90c0645aa002ff3ab254616cc9ace90c224a505249e60cb7b03d457b6208b637425767ae79d95
-
Filesize
6KB
MD526cc1f166b647e2bf904e762e4e89b1a
SHA146633221cccd6b6fc4862494e6868aa4482042be
SHA25673076ca8fc79cbc3d921a9d167a2b68d58bb843fd0b879390071cb3b05711b07
SHA512879e2241e12c672ec4b43681f4bd2a3082fdabf76578dde9dcc7e1af5ea00e6c6b3d27243db24e2bb4c380584b3095a45c3e5c92558fe7658a0f0f28ba2310ab
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD523ce25a0c56ddc316008369d00348227
SHA1e32b1a2d0dccbabd850d33a6815d3950dffd76f6
SHA25636b875b6bed0145b08a6aa375918770bc6cdb6171c76c8d486e0703b26cb852b
SHA512bf54cbfbc2cb227f14848361730bbed23e15fd6331fecf282e59b155734cc52795b002378e956b0e9d059bf0d622e133588880a74056cd5f571e13fc4b5caa93