Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
07-05-2024 20:49
Static task
static1
Behavioral task
behavioral1
Sample
21ab0d03c9387984eea2a92793f74db8_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
21ab0d03c9387984eea2a92793f74db8_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
21ab0d03c9387984eea2a92793f74db8_JaffaCakes118.html
-
Size
66KB
-
MD5
21ab0d03c9387984eea2a92793f74db8
-
SHA1
0c234767f7cbc0f62ed71070483ae40dd0b47bae
-
SHA256
e0f8dcbf2f8b52293d9d0d971d45780539086759a3a2249df2afdf7eca8c1565
-
SHA512
aa7d6080b242fc30b53703bfbfc2ef5733405b4bdf6e91c4fb01075719303e59b43401a1bf90fd9e473cc2efd1c9df224125c29c520a9049862c08614f03fe4f
-
SSDEEP
1536:Kv8HH5kMjFS/cX2N+KXAhBEZDJQeBFqZ6:KkHZ/QwBERJQeBFD
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3392 msedge.exe 3392 msedge.exe 552 msedge.exe 552 msedge.exe 4516 identity_helper.exe 4516 identity_helper.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 552 wrote to memory of 3720 552 msedge.exe 85 PID 552 wrote to memory of 3720 552 msedge.exe 85 PID 552 wrote to memory of 2512 552 msedge.exe 86 PID 552 wrote to memory of 2512 552 msedge.exe 86 PID 552 wrote to memory of 2512 552 msedge.exe 86 PID 552 wrote to memory of 2512 552 msedge.exe 86 PID 552 wrote to memory of 2512 552 msedge.exe 86 PID 552 wrote to memory of 2512 552 msedge.exe 86 PID 552 wrote to memory of 2512 552 msedge.exe 86 PID 552 wrote to memory of 2512 552 msedge.exe 86 PID 552 wrote to memory of 2512 552 msedge.exe 86 PID 552 wrote to memory of 2512 552 msedge.exe 86 PID 552 wrote to memory of 2512 552 msedge.exe 86 PID 552 wrote to memory of 2512 552 msedge.exe 86 PID 552 wrote to memory of 2512 552 msedge.exe 86 PID 552 wrote to memory of 2512 552 msedge.exe 86 PID 552 wrote to memory of 2512 552 msedge.exe 86 PID 552 wrote to memory of 2512 552 msedge.exe 86 PID 552 wrote to memory of 2512 552 msedge.exe 86 PID 552 wrote to memory of 2512 552 msedge.exe 86 PID 552 wrote to memory of 2512 552 msedge.exe 86 PID 552 wrote to memory of 2512 552 msedge.exe 86 PID 552 wrote to memory of 2512 552 msedge.exe 86 PID 552 wrote to memory of 2512 552 msedge.exe 86 PID 552 wrote to memory of 2512 552 msedge.exe 86 PID 552 wrote to memory of 2512 552 msedge.exe 86 PID 552 wrote to memory of 2512 552 msedge.exe 86 PID 552 wrote to memory of 2512 552 msedge.exe 86 PID 552 wrote to memory of 2512 552 msedge.exe 86 PID 552 wrote to memory of 2512 552 msedge.exe 86 PID 552 wrote to memory of 2512 552 msedge.exe 86 PID 552 wrote to memory of 2512 552 msedge.exe 86 PID 552 wrote to memory of 2512 552 msedge.exe 86 PID 552 wrote to memory of 2512 552 msedge.exe 86 PID 552 wrote to memory of 2512 552 msedge.exe 86 PID 552 wrote to memory of 2512 552 msedge.exe 86 PID 552 wrote to memory of 2512 552 msedge.exe 86 PID 552 wrote to memory of 2512 552 msedge.exe 86 PID 552 wrote to memory of 2512 552 msedge.exe 86 PID 552 wrote to memory of 2512 552 msedge.exe 86 PID 552 wrote to memory of 2512 552 msedge.exe 86 PID 552 wrote to memory of 2512 552 msedge.exe 86 PID 552 wrote to memory of 3392 552 msedge.exe 87 PID 552 wrote to memory of 3392 552 msedge.exe 87 PID 552 wrote to memory of 2916 552 msedge.exe 88 PID 552 wrote to memory of 2916 552 msedge.exe 88 PID 552 wrote to memory of 2916 552 msedge.exe 88 PID 552 wrote to memory of 2916 552 msedge.exe 88 PID 552 wrote to memory of 2916 552 msedge.exe 88 PID 552 wrote to memory of 2916 552 msedge.exe 88 PID 552 wrote to memory of 2916 552 msedge.exe 88 PID 552 wrote to memory of 2916 552 msedge.exe 88 PID 552 wrote to memory of 2916 552 msedge.exe 88 PID 552 wrote to memory of 2916 552 msedge.exe 88 PID 552 wrote to memory of 2916 552 msedge.exe 88 PID 552 wrote to memory of 2916 552 msedge.exe 88 PID 552 wrote to memory of 2916 552 msedge.exe 88 PID 552 wrote to memory of 2916 552 msedge.exe 88 PID 552 wrote to memory of 2916 552 msedge.exe 88 PID 552 wrote to memory of 2916 552 msedge.exe 88 PID 552 wrote to memory of 2916 552 msedge.exe 88 PID 552 wrote to memory of 2916 552 msedge.exe 88 PID 552 wrote to memory of 2916 552 msedge.exe 88 PID 552 wrote to memory of 2916 552 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\21ab0d03c9387984eea2a92793f74db8_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:552 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffff36c46f8,0x7ffff36c4708,0x7ffff36c47182⤵PID:3720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2200,12929382795589004975,1495845723423070398,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2212 /prefetch:22⤵PID:2512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2200,12929382795589004975,1495845723423070398,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2284 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2200,12929382795589004975,1495845723423070398,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2820 /prefetch:82⤵PID:2916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,12929382795589004975,1495845723423070398,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:2288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,12929382795589004975,1495845723423070398,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:3972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,12929382795589004975,1495845723423070398,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4720 /prefetch:12⤵PID:1440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,12929382795589004975,1495845723423070398,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4856 /prefetch:12⤵PID:3968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,12929382795589004975,1495845723423070398,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5088 /prefetch:12⤵PID:1564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,12929382795589004975,1495845723423070398,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5616 /prefetch:12⤵PID:4696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,12929382795589004975,1495845723423070398,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4708 /prefetch:12⤵PID:4252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2200,12929382795589004975,1495845723423070398,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6548 /prefetch:82⤵PID:3948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2200,12929382795589004975,1495845723423070398,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6548 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,12929382795589004975,1495845723423070398,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6556 /prefetch:12⤵PID:3176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,12929382795589004975,1495845723423070398,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6336 /prefetch:12⤵PID:2144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,12929382795589004975,1495845723423070398,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4108 /prefetch:12⤵PID:60
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,12929382795589004975,1495845723423070398,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5544 /prefetch:12⤵PID:5064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2200,12929382795589004975,1495845723423070398,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6592 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4460
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5064
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3144
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54e96ed67859d0bafd47d805a71041f49
SHA17806c54ae29a6c8d01dcbc78e5525ddde321b16b
SHA256bd13ddab4dc4bbf01ed50341953c9638f6d71faf92bc79fbfe93687432c2292d
SHA512432201c3119779d91d13da55a26d4ff4ce4a9529e00b44ec1738029f92610d4e6e25c05694adf949c3e9c70fbbbbea723f63c29287906729f5e88a046a2edcb7
-
Filesize
152B
MD51cbd0e9a14155b7f5d4f542d09a83153
SHA127a442a921921d69743a8e4b76ff0b66016c4b76
SHA256243d05d6af19bfe3e06b1f7507342ead88f9d87b84e239ad1d144e9e454b548c
SHA51217e5217d5bf67571afb0e7ef30ac21c11ea6553f89457548d96ee4461011f641a7872a37257239fa5f25702f027afb85d5bd9faf2f2f183992b8879407e56a0d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize168B
MD5b1a976c86dbcc811bad8b9a05a3dd8e7
SHA14b20cfec40d6376b8c2a7c4039ecd78df3167ce8
SHA2568ae039669c777aded421ce9419df6ab94f05de419a35f273487394d6595a6ef1
SHA512b404333d8ec20b48989436d91640bbcc12d1c76745ee392bb26f6488b9d31ad37cfbb6f5035bd3e7bb0761fee002ab2c1203e67fa868f1232c9d80d21d7f5fe2
-
Filesize
1KB
MD5a958daa2220c39c5ccd76515414a88a2
SHA10c492e0f3d4494fbea7fb81f3bb963a8da119972
SHA256163a09cb9e615cc5f495183b5d34feffd0900982aa0052d2459f92abeb14fdf2
SHA5128658e1b84a30d25d0fb70d890c5d75c256f901c387c46c9b247c08f3ae245709ae12b86da44eb07298addf8bf317fb22d57b5747ea98ab5ee92abe15627e77f4
-
Filesize
6KB
MD5592c55e6f588d3e0b064dd7289644e1d
SHA1110affd3a83e6f99daf84644916d06343ff93415
SHA256a13ce5c6d6dce95e0e7f3de1430a0193266231d83b18875e9afb279c64e77ee4
SHA5127a8ded32bd7ad2a2e0a30d5596ea9c7dc80cd761ec3b5330d9a46456bb4af81bac3ac223b49347c77a50c73978f279f0450d27569ffdef14c1b96aaaedd579d0
-
Filesize
5KB
MD5fe1f3796b10e6850fcdb0bf0dd434f30
SHA186f5ef2f63818ec85ac02f94abc0e82c99b56c9e
SHA2560d24373a6557d9edb71979152abd85b72591a1f50c2850e9b3df988bb2d19ca5
SHA5124efa522e42acc9f7eb81f74632b9714b7ceed74b1c2bdefc48c92ac9f57b7f69742886684287d50157b89343d49d03721c50714e1c8e139ccfc7755582670a62
-
Filesize
6KB
MD5875d1cf517577881fe2c8b152e55739d
SHA1ee0b157ccd88bb795e197399a4f47445e751962a
SHA256098021b25cc0207c1c91cd72fccc547060fc84bfaa2af7f0db79e18a9c291792
SHA512b09353ae6e4ff457f76f426cf4c877f2b19da74de9a7fa7e14908a738e73b2f40ad852ca18f10090b4319b21340a0fe54abe3bb90af8f3eb00ceb2bfb9671800
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD52abd31389d4aec2a9eb96d72954b68f1
SHA1444ed0a1ec92e6de97ee3d112864e5311e5335fd
SHA2567fb8af8a7f343a3761c653ae54f78a942d9d0b067731fab9e8f2c55483b41cc2
SHA512ce2b7e3ae2dc19ce46304223191fae4a32479f7c7dcc084c0c62d41d0ca9514a51e7296490ecb84051df310211d19180ac5a2939389e749c8aa1b3e4ef0511f5