Analysis
-
max time kernel
135s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
08/05/2024, 00:05
Static task
static1
Behavioral task
behavioral1
Sample
22530804f74f6e2eaf869b3a460eca00_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
22530804f74f6e2eaf869b3a460eca00_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
22530804f74f6e2eaf869b3a460eca00_JaffaCakes118.html
-
Size
65KB
-
MD5
22530804f74f6e2eaf869b3a460eca00
-
SHA1
0107d47c8f08c51e52127e9b06e89e3197d494e6
-
SHA256
49ed6f27e2e786a3483c088911aaeb5894f1e76171c210ab4b5029b48968b1f5
-
SHA512
6a1573d5fcf382375539fea56c2d4d2bfa0fffc94074c88cf4cd76d3f7f96195c66553ca6ec02921ac3385c124aa4e7ee28bf25bf75fc00d803a71102b47c449
-
SSDEEP
1536:mrrdd5jIj0ya/D0cvjFMZ9ZccBxETO6rL3zsDqanIZijoWFJy2f/430xt0VB9O4F:0dd5iBusYpanIZNZ2H430xt0VB9O4Vn
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3928 msedge.exe 3928 msedge.exe 3408 msedge.exe 3408 msedge.exe 5096 identity_helper.exe 5096 identity_helper.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe 3408 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3408 wrote to memory of 592 3408 msedge.exe 83 PID 3408 wrote to memory of 592 3408 msedge.exe 83 PID 3408 wrote to memory of 4188 3408 msedge.exe 84 PID 3408 wrote to memory of 4188 3408 msedge.exe 84 PID 3408 wrote to memory of 4188 3408 msedge.exe 84 PID 3408 wrote to memory of 4188 3408 msedge.exe 84 PID 3408 wrote to memory of 4188 3408 msedge.exe 84 PID 3408 wrote to memory of 4188 3408 msedge.exe 84 PID 3408 wrote to memory of 4188 3408 msedge.exe 84 PID 3408 wrote to memory of 4188 3408 msedge.exe 84 PID 3408 wrote to memory of 4188 3408 msedge.exe 84 PID 3408 wrote to memory of 4188 3408 msedge.exe 84 PID 3408 wrote to memory of 4188 3408 msedge.exe 84 PID 3408 wrote to memory of 4188 3408 msedge.exe 84 PID 3408 wrote to memory of 4188 3408 msedge.exe 84 PID 3408 wrote to memory of 4188 3408 msedge.exe 84 PID 3408 wrote to memory of 4188 3408 msedge.exe 84 PID 3408 wrote to memory of 4188 3408 msedge.exe 84 PID 3408 wrote to memory of 4188 3408 msedge.exe 84 PID 3408 wrote to memory of 4188 3408 msedge.exe 84 PID 3408 wrote to memory of 4188 3408 msedge.exe 84 PID 3408 wrote to memory of 4188 3408 msedge.exe 84 PID 3408 wrote to memory of 4188 3408 msedge.exe 84 PID 3408 wrote to memory of 4188 3408 msedge.exe 84 PID 3408 wrote to memory of 4188 3408 msedge.exe 84 PID 3408 wrote to memory of 4188 3408 msedge.exe 84 PID 3408 wrote to memory of 4188 3408 msedge.exe 84 PID 3408 wrote to memory of 4188 3408 msedge.exe 84 PID 3408 wrote to memory of 4188 3408 msedge.exe 84 PID 3408 wrote to memory of 4188 3408 msedge.exe 84 PID 3408 wrote to memory of 4188 3408 msedge.exe 84 PID 3408 wrote to memory of 4188 3408 msedge.exe 84 PID 3408 wrote to memory of 4188 3408 msedge.exe 84 PID 3408 wrote to memory of 4188 3408 msedge.exe 84 PID 3408 wrote to memory of 4188 3408 msedge.exe 84 PID 3408 wrote to memory of 4188 3408 msedge.exe 84 PID 3408 wrote to memory of 4188 3408 msedge.exe 84 PID 3408 wrote to memory of 4188 3408 msedge.exe 84 PID 3408 wrote to memory of 4188 3408 msedge.exe 84 PID 3408 wrote to memory of 4188 3408 msedge.exe 84 PID 3408 wrote to memory of 4188 3408 msedge.exe 84 PID 3408 wrote to memory of 4188 3408 msedge.exe 84 PID 3408 wrote to memory of 3928 3408 msedge.exe 85 PID 3408 wrote to memory of 3928 3408 msedge.exe 85 PID 3408 wrote to memory of 4968 3408 msedge.exe 86 PID 3408 wrote to memory of 4968 3408 msedge.exe 86 PID 3408 wrote to memory of 4968 3408 msedge.exe 86 PID 3408 wrote to memory of 4968 3408 msedge.exe 86 PID 3408 wrote to memory of 4968 3408 msedge.exe 86 PID 3408 wrote to memory of 4968 3408 msedge.exe 86 PID 3408 wrote to memory of 4968 3408 msedge.exe 86 PID 3408 wrote to memory of 4968 3408 msedge.exe 86 PID 3408 wrote to memory of 4968 3408 msedge.exe 86 PID 3408 wrote to memory of 4968 3408 msedge.exe 86 PID 3408 wrote to memory of 4968 3408 msedge.exe 86 PID 3408 wrote to memory of 4968 3408 msedge.exe 86 PID 3408 wrote to memory of 4968 3408 msedge.exe 86 PID 3408 wrote to memory of 4968 3408 msedge.exe 86 PID 3408 wrote to memory of 4968 3408 msedge.exe 86 PID 3408 wrote to memory of 4968 3408 msedge.exe 86 PID 3408 wrote to memory of 4968 3408 msedge.exe 86 PID 3408 wrote to memory of 4968 3408 msedge.exe 86 PID 3408 wrote to memory of 4968 3408 msedge.exe 86 PID 3408 wrote to memory of 4968 3408 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\22530804f74f6e2eaf869b3a460eca00_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3408 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc0db446f8,0x7ffc0db44708,0x7ffc0db447182⤵PID:592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1976,13767459542307586696,10134752717960864329,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2064 /prefetch:22⤵PID:4188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1976,13767459542307586696,10134752717960864329,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2480 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1976,13767459542307586696,10134752717960864329,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2720 /prefetch:82⤵PID:4968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,13767459542307586696,10134752717960864329,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:3312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,13767459542307586696,10134752717960864329,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:4872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,13767459542307586696,10134752717960864329,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1052 /prefetch:12⤵PID:4700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1976,13767459542307586696,10134752717960864329,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5520 /prefetch:82⤵PID:4992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1976,13767459542307586696,10134752717960864329,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5520 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,13767459542307586696,10134752717960864329,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1900 /prefetch:12⤵PID:5064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,13767459542307586696,10134752717960864329,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5340 /prefetch:12⤵PID:4244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,13767459542307586696,10134752717960864329,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5284 /prefetch:12⤵PID:1592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,13767459542307586696,10134752717960864329,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5312 /prefetch:12⤵PID:5088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1976,13767459542307586696,10134752717960864329,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1308 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4856
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1160
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2084
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5dbac49e66219979194c79f1cf1cb3dd1
SHA14ef87804a04d51ae1fac358f92382548b27f62f2
SHA256f24ed6c5bf4b734a9af4d64e14a80a160bea569f50849f70bf7b7277c4f48562
SHA512bb314d61f53cf7774f6dfb6b772c72f5daf386bc3d27d2bb7a14c65848ee86e6c48e9c5696693ded31846b69b9372a530175df48494e3d61a228e49d43401ad1
-
Filesize
152B
MD5a9e55f5864d6e2afd2fd84e25a3bc228
SHA1a5efcff9e3df6252c7fe8535d505235f82aab276
SHA2560f4df3120e4620555916be8e51c29be8d600d68ae5244efad6a0268aabc8c452
SHA51212f45fa73a6de6dfe17acc8b52b60f2d79008da130730b74cc138c1dcd73ccc99487165e3c8c90dc247359fde272f1ec6b3cf2c5fcb04e5093936144d0558b75
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize360B
MD532ae43f28aa805e4018a915b74ca32b7
SHA1ee25b167210b0910626b0e8277c59994bbeda44c
SHA25624629a8fb681ac454fa31ad7b1db6c21f2024f054479af2146c6398df8f5c1b7
SHA51244df99128efa262d321b3f638738e0d72df6b6b35ea39004a681b1ad0f65bae7b45f1609576665f63b67b2daf2cffe534fc85b3124b5bfdf3ba9dabb8fd414dd
-
Filesize
664B
MD5bd2f1dac70d23e0eb2d327b201116003
SHA164517966cf927289e941aa5ca2b2d2b2f266e2c2
SHA256eeb16c197d840aca9a2a0b6a2bf94921a1f1ae9699dc34c2452b5ef3dbd89abd
SHA512b877e1e6cf6aeef5cc9d5a29b1f6562e952d1eed97b95b00216904707a80fe5ab1596a08aeb02ffd3d59e2241ce5b08bdff455017564cfdc237ad0f0b849be0d
-
Filesize
776B
MD5439765724176e155f815db2ba2c8f480
SHA119789e987f6abf88a832c6f5d07da05ff74e942b
SHA256f62f2c2f9b6e8575d435d72f1eeae0901e49cdd826e41fa847a1aed74a19b14e
SHA512638d26b8e52d998d9ec1245d70ee0b4cc6394172638ada067daf305f312f06dceb9eb78507873adcb0ccb3460c36e2a43acc6941379036cdbd0dd31089a4f023
-
Filesize
5KB
MD513508922f94516496c0706b39f19a41c
SHA10778aea4cc3d05879326530fb21718e660bed26a
SHA256bddcb52fb2ae33f09b0fd0a21d8e9ac7f39e158728a4a2ca733a6c20d5276f89
SHA512bf8d3a22a1f4d6ef4c02ce6a4311bc54c60cea8e7a567a3980daa2e1ae438c7fd161ecb6a52a2b5eb32227c202b5c624a89eb291a5975622a68ccd4061dd5026
-
Filesize
6KB
MD5b7733f704096bc1d9e3785bbddde5d8e
SHA1953cbac17dc0b52425bf2abac2c7b0426c3acc7e
SHA2560e4c3ad09c608693ffde00884d5e746b125f1c56f7dfa89110242094885bee8b
SHA512ae2a357b4f2a3eea438265308a442188c680486ce9692f69c974ba76c84ed23b2bbd091e9fbc7a58d70134131f38549fb39ab0c7c8638f0590006219c86fcfdd
-
Filesize
6KB
MD518dad7d6766e71f0af85c7fe9b58d671
SHA167c3b2e8c5f4df69450d01d1960bf24ed9911f3c
SHA25684733d301c7860db7d8083a8c26c98b5019fe8f6421bdc8ac9cddddb7b1a00f2
SHA5129f5d53dfb7e3c156923384a3751966421e3ed83f912a98d172513a36b058c9a17ce380b8c16fe460053ebede1eb7e3ce3891260ca2dabd21de5ffb53483d993b
-
Filesize
372B
MD54b186f32423e7065809c94a0b7ef7e65
SHA10d8d74fc2ca60fc16220b1d62393cf9f1e6e728a
SHA2569580737e1b55f14c8bb16bde17eccac375f385e8556e74accbecf4795d5d5284
SHA512d2ab9cba0ada895adedad992f179fdedf01fe3e6c6da245bde3c927909c1fcb7af14779afa708d1951293aee7ad6e5b8ba70165bbf5d4d006328452a7c18319c
-
Filesize
204B
MD5ead613b1af48502f284961b85192adb4
SHA15655d5c0a945cfee97c33a8bdf576ed7c831bc04
SHA256b106cf709277e1d693c30cabc8506053f111f2593566046dee1e6847411fe192
SHA51275080255f3cc5ca40dd857dd9bdbdeb4ff968ce6d80d2cf2c0262f183129d06a8bd1a3b43ce7d4a7ec4c99023ec487ecb67898a36436f3475b8609160c89054b
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD55ab7d9b730228924fd83f35477e92eb2
SHA1344d1eeb289b19591da90a21af49c3fc51746425
SHA2562d22178f9f22df31356d95d89beb65113f0647273cd87c85fcf3369508cf9cbf
SHA5129fb716f41e1ee73ae78926f4f635213ed54f05df27fad6191c8133b799e638fa78a49f6038695176a3799400dea4eacf3b9db81ba15560c8aaa0552d8f8cdbe2