Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
08/05/2024, 03:54
Static task
static1
Behavioral task
behavioral1
Sample
23153bfc0d06c89d1febe305eae981b8_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
23153bfc0d06c89d1febe305eae981b8_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
23153bfc0d06c89d1febe305eae981b8_JaffaCakes118.html
-
Size
38KB
-
MD5
23153bfc0d06c89d1febe305eae981b8
-
SHA1
6c439d8bd46a27dd987f73a4477dfdd06c202968
-
SHA256
d70fdeede659371a8340ecbf7a1c7a56e236d319d67fe9af056128d9701d90d8
-
SHA512
947e742275238f3ef691a9560279613b821cb5ddec864d936f45dab4fe418e45b38a417edb73ddbb7ad8bebbbdc0999c67bd86526e03698659d8f9cb04520cc8
-
SSDEEP
768:TFiSbE1bItCb2vbviDuX/u9bFupK3JCoGeX01Jt4JWYAX2VRw5wFsP:TF/C0tCS7iDuX8JupK3JCrdZZGOXP
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4416 msedge.exe 4416 msedge.exe 2312 msedge.exe 2312 msedge.exe 3292 identity_helper.exe 3292 identity_helper.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2312 wrote to memory of 3016 2312 msedge.exe 83 PID 2312 wrote to memory of 3016 2312 msedge.exe 83 PID 2312 wrote to memory of 1956 2312 msedge.exe 84 PID 2312 wrote to memory of 1956 2312 msedge.exe 84 PID 2312 wrote to memory of 1956 2312 msedge.exe 84 PID 2312 wrote to memory of 1956 2312 msedge.exe 84 PID 2312 wrote to memory of 1956 2312 msedge.exe 84 PID 2312 wrote to memory of 1956 2312 msedge.exe 84 PID 2312 wrote to memory of 1956 2312 msedge.exe 84 PID 2312 wrote to memory of 1956 2312 msedge.exe 84 PID 2312 wrote to memory of 1956 2312 msedge.exe 84 PID 2312 wrote to memory of 1956 2312 msedge.exe 84 PID 2312 wrote to memory of 1956 2312 msedge.exe 84 PID 2312 wrote to memory of 1956 2312 msedge.exe 84 PID 2312 wrote to memory of 1956 2312 msedge.exe 84 PID 2312 wrote to memory of 1956 2312 msedge.exe 84 PID 2312 wrote to memory of 1956 2312 msedge.exe 84 PID 2312 wrote to memory of 1956 2312 msedge.exe 84 PID 2312 wrote to memory of 1956 2312 msedge.exe 84 PID 2312 wrote to memory of 1956 2312 msedge.exe 84 PID 2312 wrote to memory of 1956 2312 msedge.exe 84 PID 2312 wrote to memory of 1956 2312 msedge.exe 84 PID 2312 wrote to memory of 1956 2312 msedge.exe 84 PID 2312 wrote to memory of 1956 2312 msedge.exe 84 PID 2312 wrote to memory of 1956 2312 msedge.exe 84 PID 2312 wrote to memory of 1956 2312 msedge.exe 84 PID 2312 wrote to memory of 1956 2312 msedge.exe 84 PID 2312 wrote to memory of 1956 2312 msedge.exe 84 PID 2312 wrote to memory of 1956 2312 msedge.exe 84 PID 2312 wrote to memory of 1956 2312 msedge.exe 84 PID 2312 wrote to memory of 1956 2312 msedge.exe 84 PID 2312 wrote to memory of 1956 2312 msedge.exe 84 PID 2312 wrote to memory of 1956 2312 msedge.exe 84 PID 2312 wrote to memory of 1956 2312 msedge.exe 84 PID 2312 wrote to memory of 1956 2312 msedge.exe 84 PID 2312 wrote to memory of 1956 2312 msedge.exe 84 PID 2312 wrote to memory of 1956 2312 msedge.exe 84 PID 2312 wrote to memory of 1956 2312 msedge.exe 84 PID 2312 wrote to memory of 1956 2312 msedge.exe 84 PID 2312 wrote to memory of 1956 2312 msedge.exe 84 PID 2312 wrote to memory of 1956 2312 msedge.exe 84 PID 2312 wrote to memory of 1956 2312 msedge.exe 84 PID 2312 wrote to memory of 4416 2312 msedge.exe 85 PID 2312 wrote to memory of 4416 2312 msedge.exe 85 PID 2312 wrote to memory of 1128 2312 msedge.exe 86 PID 2312 wrote to memory of 1128 2312 msedge.exe 86 PID 2312 wrote to memory of 1128 2312 msedge.exe 86 PID 2312 wrote to memory of 1128 2312 msedge.exe 86 PID 2312 wrote to memory of 1128 2312 msedge.exe 86 PID 2312 wrote to memory of 1128 2312 msedge.exe 86 PID 2312 wrote to memory of 1128 2312 msedge.exe 86 PID 2312 wrote to memory of 1128 2312 msedge.exe 86 PID 2312 wrote to memory of 1128 2312 msedge.exe 86 PID 2312 wrote to memory of 1128 2312 msedge.exe 86 PID 2312 wrote to memory of 1128 2312 msedge.exe 86 PID 2312 wrote to memory of 1128 2312 msedge.exe 86 PID 2312 wrote to memory of 1128 2312 msedge.exe 86 PID 2312 wrote to memory of 1128 2312 msedge.exe 86 PID 2312 wrote to memory of 1128 2312 msedge.exe 86 PID 2312 wrote to memory of 1128 2312 msedge.exe 86 PID 2312 wrote to memory of 1128 2312 msedge.exe 86 PID 2312 wrote to memory of 1128 2312 msedge.exe 86 PID 2312 wrote to memory of 1128 2312 msedge.exe 86 PID 2312 wrote to memory of 1128 2312 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\23153bfc0d06c89d1febe305eae981b8_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff320e46f8,0x7fff320e4708,0x7fff320e47182⤵PID:3016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,13382600691802811311,11570222692575075711,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:22⤵PID:1956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,13382600691802811311,11570222692575075711,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2420 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,13382600691802811311,11570222692575075711,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2796 /prefetch:82⤵PID:1128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,13382600691802811311,11570222692575075711,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2104 /prefetch:12⤵PID:2816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,13382600691802811311,11570222692575075711,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:2952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,13382600691802811311,11570222692575075711,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4972 /prefetch:12⤵PID:3288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,13382600691802811311,11570222692575075711,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5328 /prefetch:82⤵PID:2796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,13382600691802811311,11570222692575075711,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5328 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,13382600691802811311,11570222692575075711,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5320 /prefetch:12⤵PID:1844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,13382600691802811311,11570222692575075711,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5412 /prefetch:12⤵PID:2268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,13382600691802811311,11570222692575075711,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5040 /prefetch:12⤵PID:5280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,13382600691802811311,11570222692575075711,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4956 /prefetch:12⤵PID:5288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,13382600691802811311,11570222692575075711,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1884 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2792
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2660
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3932
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52a70f1bd4da893a67660d6432970788d
SHA1ddf4047e0d468f56ea0c0d8ff078a86a0bb62873
SHA256c550af5ba51f68ac4d18747edc5dea1a655dd212d84bad1e6168ba7a97745561
SHA51226b9a365e77df032fc5c461d85d1ba313eafead38827190608c6537ec12b2dfdbed4e1705bfd1e61899034791ad6fa88ea7490c3a48cdaec4d04cd0577b11343
-
Filesize
152B
MD5fbe1ce4d182aaffb80de94263be1dd35
SHA1bc6c9827aa35a136a7d79be9e606ff359e2ac3ea
SHA2560021f72dbca789f179762b0e17c28fe0b93a12539b08294800e47469905aeb51
SHA5123fb0a3b38e7d4a30f5560594b1d14e6e58419e274255fb68dfe0ca897aa181f9ce8cb2048403f851fd36a17b0e34d272d03927769d41a500b2fe64806354902f
-
Filesize
22KB
MD55e74c6d871232d6fe5d88711ece1408b
SHA11a5d3ac31e833df4c091f14c94a2ecd1c6294875
SHA256bcadf445d413314a44375c63418a0f255fbac7afae40be0a80c9231751176105
SHA5129d001eabce7ffdbf8e338725ef07f0033d0780ea474b7d33c2ad63886ff3578d818eb5c9b130d726353cd813160b49f572736dd288cece84e9bd8b784ce530d5
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD525b0c7e4e1345505d86d973f838ad245
SHA130e931fe86d902c6af22cd1e994a715a4eb3763f
SHA2565286e8a74b590b5cc77767eb723eacb10f5197ab262348495c4350e24391e6ce
SHA512dfdd8ec2ed7d5f5270d1025a0e8a768e827a577e9c868b0a397c57d9b550dbec51d1b2099c57564857d064e09023a8b46c1d9cd1cf74f2776f586c46f090f443
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD54c687befd1315c9172fef41e8e4a15ac
SHA1363fb68fe01f4a7c4990ff21a82b1423b32da718
SHA2568adf17fa9eb856ef379533abcd4071cef3049e22bf72cd656f7d254c59d3b0fd
SHA5122fc31337838e0f29721eb549dcbc00ed28ac07357994276e55f307b2ea829cd20d2a49787918962cb3414a3878dab4af9fab5c7b2cd27168e17437000a93ba06
-
Filesize
986B
MD54cd2ef5ff3ce9e9bff1156072f05ef06
SHA134a2bb1c8acc065494a3442996d1f7049470e0cc
SHA256ef6838ed28d1e78783e3093127f99041913a11cfb542209388eda6495e66dd9f
SHA512edd53b9f369674a9d8631139ee40cdb22eb1c3d41ba232ff7a7cd0260f831f3583f68a5248af3b83323df07e0f6d863149cbd8503defcce76043a935425dbfae
-
Filesize
5KB
MD58d517c88f33d521867cab4c2a226f52f
SHA10756c89e268e8c40033e345193725b00373410fb
SHA256c8d69c0086f278de5d7a152e2c1ffe24b668b9a8098492fd823bc0a11308d724
SHA5128d629caa51d4f1c95b8245029a3ec25a68199ecad7bcba4dcdf75b039ea8f9a6e781134c36d48c37261f5c6ba3a356e42070d944211ffedb730ee25e55de758e
-
Filesize
6KB
MD545959c85f5ba3a11e9f170bbb9f1c753
SHA1db6c18bb9465cce21b0df4e7295a1a1fb381494c
SHA256b2e3fc0ce26502ab213b445fcf02934f5826d0ccd34a33471ff33a1c5583ca48
SHA512d48e59284d57aa6f93ec47183c9e86f51b6d61fa087773acad970405f316037765c11a450333d0ea0f630ce1fa7cf38cdbba00a3288ce96b46cfeff5aef75e16
-
Filesize
6KB
MD581325321cbc74a2f4b3250a9121cc9f4
SHA1cd7270bea78114009befd919f55b87422ecd0764
SHA25625a7bcaea0192087e44c7a25409b584a7a9f89923298449f78389bf3a0064f44
SHA512732dd735c9dfb15941ead143fc86fbbca96f6cc3c920628e722ba2fe92087f6fd9542dfc7445edc01c8f9b4287593f9cec34a20f59b4b695ba51acb0f0d5989a
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5fd544771268dfb7e4a1fc2998cf6ef1e
SHA13d9f91f007e8605859e96e465b047f663ca77ffb
SHA256d42d272ce5a32580c0a1cdfe3cc781e8c86ba66178e285ac09baab023c36a725
SHA512798b93aeed1539ae646960671986b42be6751cd9675d52a87112ad77a5ba7c2f64c441a1afd5b907b760971b7ed30ff639e14f6c826ec360863255e2327bede1