Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
08-05-2024 03:17
Static task
static1
Behavioral task
behavioral1
Sample
22f7b876682a65d172c71b1426233d29_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
22f7b876682a65d172c71b1426233d29_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
22f7b876682a65d172c71b1426233d29_JaffaCakes118.html
-
Size
214KB
-
MD5
22f7b876682a65d172c71b1426233d29
-
SHA1
6a15117dcd62a62b0f7c4b01bc32e7c013813d06
-
SHA256
2f7519cda6c3ddee85fbb08a98ddd06fd23422bd8b8d0e87df969bbbb102e595
-
SHA512
138df3751f91eb8eb2ea3c8cf270ef8fa5ad86a026c712a4a9be6bf6de50d349d7b35306bb07569690c3d6d055beee69da38a519967a7177265cad6aa7349004
-
SSDEEP
6144:zBVXIIIJ5krCO0/V/8rnOL55ShutTfiVQ5MIsuQyf5bTM+MdBXpKgXpgx4t4cO9a:bDG5krCO0/V/8rnOL55ShutDiwMIsuQF
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2264 msedge.exe 2264 msedge.exe 900 msedge.exe 900 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe 900 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 900 wrote to memory of 4328 900 msedge.exe 86 PID 900 wrote to memory of 4328 900 msedge.exe 86 PID 900 wrote to memory of 5028 900 msedge.exe 87 PID 900 wrote to memory of 5028 900 msedge.exe 87 PID 900 wrote to memory of 5028 900 msedge.exe 87 PID 900 wrote to memory of 5028 900 msedge.exe 87 PID 900 wrote to memory of 5028 900 msedge.exe 87 PID 900 wrote to memory of 5028 900 msedge.exe 87 PID 900 wrote to memory of 5028 900 msedge.exe 87 PID 900 wrote to memory of 5028 900 msedge.exe 87 PID 900 wrote to memory of 5028 900 msedge.exe 87 PID 900 wrote to memory of 5028 900 msedge.exe 87 PID 900 wrote to memory of 5028 900 msedge.exe 87 PID 900 wrote to memory of 5028 900 msedge.exe 87 PID 900 wrote to memory of 5028 900 msedge.exe 87 PID 900 wrote to memory of 5028 900 msedge.exe 87 PID 900 wrote to memory of 5028 900 msedge.exe 87 PID 900 wrote to memory of 5028 900 msedge.exe 87 PID 900 wrote to memory of 5028 900 msedge.exe 87 PID 900 wrote to memory of 5028 900 msedge.exe 87 PID 900 wrote to memory of 5028 900 msedge.exe 87 PID 900 wrote to memory of 5028 900 msedge.exe 87 PID 900 wrote to memory of 5028 900 msedge.exe 87 PID 900 wrote to memory of 5028 900 msedge.exe 87 PID 900 wrote to memory of 5028 900 msedge.exe 87 PID 900 wrote to memory of 5028 900 msedge.exe 87 PID 900 wrote to memory of 5028 900 msedge.exe 87 PID 900 wrote to memory of 5028 900 msedge.exe 87 PID 900 wrote to memory of 5028 900 msedge.exe 87 PID 900 wrote to memory of 5028 900 msedge.exe 87 PID 900 wrote to memory of 5028 900 msedge.exe 87 PID 900 wrote to memory of 5028 900 msedge.exe 87 PID 900 wrote to memory of 5028 900 msedge.exe 87 PID 900 wrote to memory of 5028 900 msedge.exe 87 PID 900 wrote to memory of 5028 900 msedge.exe 87 PID 900 wrote to memory of 5028 900 msedge.exe 87 PID 900 wrote to memory of 5028 900 msedge.exe 87 PID 900 wrote to memory of 5028 900 msedge.exe 87 PID 900 wrote to memory of 5028 900 msedge.exe 87 PID 900 wrote to memory of 5028 900 msedge.exe 87 PID 900 wrote to memory of 5028 900 msedge.exe 87 PID 900 wrote to memory of 5028 900 msedge.exe 87 PID 900 wrote to memory of 2264 900 msedge.exe 88 PID 900 wrote to memory of 2264 900 msedge.exe 88 PID 900 wrote to memory of 5032 900 msedge.exe 89 PID 900 wrote to memory of 5032 900 msedge.exe 89 PID 900 wrote to memory of 5032 900 msedge.exe 89 PID 900 wrote to memory of 5032 900 msedge.exe 89 PID 900 wrote to memory of 5032 900 msedge.exe 89 PID 900 wrote to memory of 5032 900 msedge.exe 89 PID 900 wrote to memory of 5032 900 msedge.exe 89 PID 900 wrote to memory of 5032 900 msedge.exe 89 PID 900 wrote to memory of 5032 900 msedge.exe 89 PID 900 wrote to memory of 5032 900 msedge.exe 89 PID 900 wrote to memory of 5032 900 msedge.exe 89 PID 900 wrote to memory of 5032 900 msedge.exe 89 PID 900 wrote to memory of 5032 900 msedge.exe 89 PID 900 wrote to memory of 5032 900 msedge.exe 89 PID 900 wrote to memory of 5032 900 msedge.exe 89 PID 900 wrote to memory of 5032 900 msedge.exe 89 PID 900 wrote to memory of 5032 900 msedge.exe 89 PID 900 wrote to memory of 5032 900 msedge.exe 89 PID 900 wrote to memory of 5032 900 msedge.exe 89 PID 900 wrote to memory of 5032 900 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\22f7b876682a65d172c71b1426233d29_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:900 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe429c46f8,0x7ffe429c4708,0x7ffe429c47182⤵PID:4328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2264,16772030523981159511,15932267084542699903,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2276 /prefetch:22⤵PID:5028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2264,16772030523981159511,15932267084542699903,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2348 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2264,16772030523981159511,15932267084542699903,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2908 /prefetch:82⤵PID:5032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2264,16772030523981159511,15932267084542699903,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2264,16772030523981159511,15932267084542699903,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:4608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2264,16772030523981159511,15932267084542699903,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4892 /prefetch:12⤵PID:3344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2264,16772030523981159511,15932267084542699903,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1748 /prefetch:12⤵PID:3968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2264,16772030523981159511,15932267084542699903,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2220 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4600
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4376
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4588
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3764
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD562c02dda2bf22d702a9b3a1c547c5f6a
SHA18f42966df96bd2e8c1f6b31b37c9a19beb6394d6
SHA256cb8a0964605551ed5a0668c08ab888044bbd845c9225ffee5a28e0b847ede62b
SHA512a7ce2c0946382188e1d8480cfb096b29bd0dcb260ccdc74167cc351160a1884d04d57a2517eb700b3eef30eaf4a01bfbf31858365b1e624d4b0960ffd0032fa9
-
Filesize
152B
MD5850f27f857369bf7fe83c613d2ec35cb
SHA17677a061c6fd2a030b44841bfb32da0abc1dbefb
SHA256a7db700e067222e55e323a9ffc71a92f59829e81021e2607cec0d2ec6faf602a
SHA5127b1efa002b7a1a23973bff0618fb4a82cd0c5193df55cd960c7516caa63509587fd8b36f3aea6db01ece368065865af6472365b820fadce720b64b561ab5f401
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize216B
MD5e427658407859415dd448f88964790ea
SHA1cb9eb34510c542887b7b56f0f3e8803c1a72cdf2
SHA256db4f1058638ed8e0f0beb5d2a6d7514846c70cf99a6071df10d86570449f5ea6
SHA512293825ebcd2ff6f8dd491575d97d3fd94c6d91fa9f04981250e20869932442eb9fbadc99deed899c66c8251300de5e389c60ec056d8a0c3717b20b604892d596
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD58a0c94bb3308e51baf3c8847a989b6f5
SHA1e3745d39ceb75fe5fd33c751eac61ef42a0c03bc
SHA256636123d084387e26b65d08871c4c26a493fa09a5b75af37ed059806e33ea629a
SHA5121126799c62f42830ee89bb48d381c7ab4a1ac65d089dc81b4a0431a6e211a7c4cbac3cc0dadb6a0f9573163307e80d3539b7908e3fabfbf90fe922c7874f4329
-
Filesize
3KB
MD527b7709dcea8fa76cd1d6ca1dcdadcde
SHA12963750dffe1d9bc86556d7d28b21e8f328748db
SHA2561af0f141367a7115e8d1ec1802f8176c079648a64e20a63921e5b586f045786b
SHA512e0f4519efc33f96b6c3614966a5f8021c686a1a5024c6917065411424130f5b88ac9699cf039a5f5bb83057ae94b7aa2b10642cd3821c0bafa1163c2415a7f18
-
Filesize
1KB
MD50056ca1d47f9021f34888fef69e8351d
SHA1cfb164fb35a857592b7f96279679a3a42edea8a1
SHA25674ad76dd5d427071be7fc0d087a30fff0366732d79afcfd9ae67375b75c43d4c
SHA51269aebd2687a5933343e4bcbd398e23ba0a2790e3cfbb10147fa9da00440e8d15fefa827ea07628e09e88b41811558cbf29358706aa2ac46cecf1d73774f2ba8d
-
Filesize
5KB
MD50ca0770b2cbedf725fb972ed6199fc6a
SHA10d3d90be494984abdf2b2f52d2327b1de1eda2c1
SHA256ec850a2ca9f743f51577bd592d440532ccdce43f190281117a6e2406cf3b5015
SHA5122126bf02ec487dfa10865dffc17ff599ba3e71c3be5309407aa019016e4ae88c285d4591e382c4e6447033cb964ad174b160ac1a938bc1b11ab25037e55ee7a0
-
Filesize
6KB
MD5baf383e2bcd22cd564eb632cb593297d
SHA1bc21ee4b8c2057e470bb85bb5c7a353a6328a154
SHA25692d39efff971c26a7612480bfc6cf6e965c6368afa5c2e8efbbf69e9a5758e0a
SHA5120ac86d9295dc3b0bac6da421b1ca9b4797f194f0f08aad1033456921b858f897195fc42f4036ca077d34069839e87193c9e90bbc0631d359bd95b279b8340d5c
-
Filesize
11KB
MD520c90e1a09d6bfb0c8de6b38ef562e72
SHA130490be981e418ccf31b3b9ad2dc893d3694251b
SHA256cdf961974259f3ca3fcb231dd9290542060c7453aa82835296077f0056e9c791
SHA5120c140eb45d99365f006e5b1f26bfd43027687db9e8b728ba44283ecaee50b2dd217201498a2d6879cb29ad635a97b5d1d7b0fc0c000a13c4d5ec79104caac68b