Analysis
-
max time kernel
145s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
08/05/2024, 07:42
Static task
static1
Behavioral task
behavioral1
Sample
23dcd660551a7cb6c02f38e3d4a16ff0_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
23dcd660551a7cb6c02f38e3d4a16ff0_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
23dcd660551a7cb6c02f38e3d4a16ff0_JaffaCakes118.html
-
Size
112KB
-
MD5
23dcd660551a7cb6c02f38e3d4a16ff0
-
SHA1
760ebfda1adfa34a94c97b67c75e90817fc7693d
-
SHA256
bf2182a85ded4e3da637a3e65c34f1dc58dd38960ecb39c313bcad571e74ad0a
-
SHA512
e6fc09d26c8d0c1917f18fcce5ddfedcaf6b4d6ce0f75a227c35a54d739c901664a83ecfc4bddde1e840a1c8d06d24f2aba1b0c4cf7d8984cbb463dc1634f505
-
SSDEEP
3072:g94s2yvyKYyLkyZXCNnG4Z/0PPf4SpmzMI:TAvyKYyLXXGV
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1860 msedge.exe 1860 msedge.exe 2880 msedge.exe 2880 msedge.exe 3804 identity_helper.exe 3804 identity_helper.exe 664 msedge.exe 664 msedge.exe 664 msedge.exe 664 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 2880 msedge.exe 2880 msedge.exe 2880 msedge.exe 2880 msedge.exe 2880 msedge.exe 2880 msedge.exe 2880 msedge.exe 2880 msedge.exe 2880 msedge.exe 2880 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2880 msedge.exe 2880 msedge.exe 2880 msedge.exe 2880 msedge.exe 2880 msedge.exe 2880 msedge.exe 2880 msedge.exe 2880 msedge.exe 2880 msedge.exe 2880 msedge.exe 2880 msedge.exe 2880 msedge.exe 2880 msedge.exe 2880 msedge.exe 2880 msedge.exe 2880 msedge.exe 2880 msedge.exe 2880 msedge.exe 2880 msedge.exe 2880 msedge.exe 2880 msedge.exe 2880 msedge.exe 2880 msedge.exe 2880 msedge.exe 2880 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2880 msedge.exe 2880 msedge.exe 2880 msedge.exe 2880 msedge.exe 2880 msedge.exe 2880 msedge.exe 2880 msedge.exe 2880 msedge.exe 2880 msedge.exe 2880 msedge.exe 2880 msedge.exe 2880 msedge.exe 2880 msedge.exe 2880 msedge.exe 2880 msedge.exe 2880 msedge.exe 2880 msedge.exe 2880 msedge.exe 2880 msedge.exe 2880 msedge.exe 2880 msedge.exe 2880 msedge.exe 2880 msedge.exe 2880 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2880 wrote to memory of 2820 2880 msedge.exe 85 PID 2880 wrote to memory of 2820 2880 msedge.exe 85 PID 2880 wrote to memory of 2016 2880 msedge.exe 86 PID 2880 wrote to memory of 2016 2880 msedge.exe 86 PID 2880 wrote to memory of 2016 2880 msedge.exe 86 PID 2880 wrote to memory of 2016 2880 msedge.exe 86 PID 2880 wrote to memory of 2016 2880 msedge.exe 86 PID 2880 wrote to memory of 2016 2880 msedge.exe 86 PID 2880 wrote to memory of 2016 2880 msedge.exe 86 PID 2880 wrote to memory of 2016 2880 msedge.exe 86 PID 2880 wrote to memory of 2016 2880 msedge.exe 86 PID 2880 wrote to memory of 2016 2880 msedge.exe 86 PID 2880 wrote to memory of 2016 2880 msedge.exe 86 PID 2880 wrote to memory of 2016 2880 msedge.exe 86 PID 2880 wrote to memory of 2016 2880 msedge.exe 86 PID 2880 wrote to memory of 2016 2880 msedge.exe 86 PID 2880 wrote to memory of 2016 2880 msedge.exe 86 PID 2880 wrote to memory of 2016 2880 msedge.exe 86 PID 2880 wrote to memory of 2016 2880 msedge.exe 86 PID 2880 wrote to memory of 2016 2880 msedge.exe 86 PID 2880 wrote to memory of 2016 2880 msedge.exe 86 PID 2880 wrote to memory of 2016 2880 msedge.exe 86 PID 2880 wrote to memory of 2016 2880 msedge.exe 86 PID 2880 wrote to memory of 2016 2880 msedge.exe 86 PID 2880 wrote to memory of 2016 2880 msedge.exe 86 PID 2880 wrote to memory of 2016 2880 msedge.exe 86 PID 2880 wrote to memory of 2016 2880 msedge.exe 86 PID 2880 wrote to memory of 2016 2880 msedge.exe 86 PID 2880 wrote to memory of 2016 2880 msedge.exe 86 PID 2880 wrote to memory of 2016 2880 msedge.exe 86 PID 2880 wrote to memory of 2016 2880 msedge.exe 86 PID 2880 wrote to memory of 2016 2880 msedge.exe 86 PID 2880 wrote to memory of 2016 2880 msedge.exe 86 PID 2880 wrote to memory of 2016 2880 msedge.exe 86 PID 2880 wrote to memory of 2016 2880 msedge.exe 86 PID 2880 wrote to memory of 2016 2880 msedge.exe 86 PID 2880 wrote to memory of 2016 2880 msedge.exe 86 PID 2880 wrote to memory of 2016 2880 msedge.exe 86 PID 2880 wrote to memory of 2016 2880 msedge.exe 86 PID 2880 wrote to memory of 2016 2880 msedge.exe 86 PID 2880 wrote to memory of 2016 2880 msedge.exe 86 PID 2880 wrote to memory of 2016 2880 msedge.exe 86 PID 2880 wrote to memory of 1860 2880 msedge.exe 87 PID 2880 wrote to memory of 1860 2880 msedge.exe 87 PID 2880 wrote to memory of 4704 2880 msedge.exe 88 PID 2880 wrote to memory of 4704 2880 msedge.exe 88 PID 2880 wrote to memory of 4704 2880 msedge.exe 88 PID 2880 wrote to memory of 4704 2880 msedge.exe 88 PID 2880 wrote to memory of 4704 2880 msedge.exe 88 PID 2880 wrote to memory of 4704 2880 msedge.exe 88 PID 2880 wrote to memory of 4704 2880 msedge.exe 88 PID 2880 wrote to memory of 4704 2880 msedge.exe 88 PID 2880 wrote to memory of 4704 2880 msedge.exe 88 PID 2880 wrote to memory of 4704 2880 msedge.exe 88 PID 2880 wrote to memory of 4704 2880 msedge.exe 88 PID 2880 wrote to memory of 4704 2880 msedge.exe 88 PID 2880 wrote to memory of 4704 2880 msedge.exe 88 PID 2880 wrote to memory of 4704 2880 msedge.exe 88 PID 2880 wrote to memory of 4704 2880 msedge.exe 88 PID 2880 wrote to memory of 4704 2880 msedge.exe 88 PID 2880 wrote to memory of 4704 2880 msedge.exe 88 PID 2880 wrote to memory of 4704 2880 msedge.exe 88 PID 2880 wrote to memory of 4704 2880 msedge.exe 88 PID 2880 wrote to memory of 4704 2880 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\23dcd660551a7cb6c02f38e3d4a16ff0_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff035946f8,0x7fff03594708,0x7fff035947182⤵PID:2820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1968,7910174962048672726,12969604926505515243,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1980 /prefetch:22⤵PID:2016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1968,7910174962048672726,12969604926505515243,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2404 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1968,7910174962048672726,12969604926505515243,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2840 /prefetch:82⤵PID:4704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1968,7910174962048672726,12969604926505515243,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:3908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1968,7910174962048672726,12969604926505515243,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:2080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1968,7910174962048672726,12969604926505515243,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4692 /prefetch:12⤵PID:1256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1968,7910174962048672726,12969604926505515243,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5508 /prefetch:12⤵PID:4036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1968,7910174962048672726,12969604926505515243,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5088 /prefetch:12⤵PID:2892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1968,7910174962048672726,12969604926505515243,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5816 /prefetch:12⤵PID:4400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1968,7910174962048672726,12969604926505515243,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2344 /prefetch:82⤵PID:664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1968,7910174962048672726,12969604926505515243,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2344 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1968,7910174962048672726,12969604926505515243,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5876 /prefetch:12⤵PID:3736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1968,7910174962048672726,12969604926505515243,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5948 /prefetch:12⤵PID:2508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1968,7910174962048672726,12969604926505515243,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5916 /prefetch:12⤵PID:1824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1968,7910174962048672726,12969604926505515243,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5884 /prefetch:12⤵PID:4344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1968,7910174962048672726,12969604926505515243,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5032 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:664
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1684
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4268
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD58b2290ca03b4ca5fe52d82550c7e7d69
SHA120583a7851a906444204ce8ba4fa51153e6cd494
SHA256f9ff4871fc5317299de907489d466e630be63d698c8f7cb77cc81faddbecc6d2
SHA512704ec8122cc1c263dff67ddbb5c20ee0db8a438674d716bc3be5b266ee5629a219b0049d721f9eb2dd8f2d8fda0163659eaa4d3e1f0a6e9072a8ffb92bb2b25d
-
Filesize
152B
MD5919c29d42fb6034fee2f5de14d573c63
SHA124a2e1042347b3853344157239bde3ed699047a8
SHA25617cd6de97a0c020cb4935739cfef4ec4e074e8d127ac4c531b6dc496580c8141
SHA512bb7eadd087bbcec8b1b8a49b102b454333f2f9708d36b6ffc3c82fdc52e46873398d967238c3bfe9ac6caef45b017a5fe3938ebf5f3053e4ef9be7b2752b563d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD5c6db7d5bd14e45653463ac830659ba0d
SHA1a35f65bf98b530c4806a47adc104016fa2d8dbb9
SHA256873915f8620f89d2d1073983d39e9a5793ee0837f826e3402eec031e41e53457
SHA5129987ad36354384204778a65b282bca8c05a5558fd1791119bd7514e253ef74c8c2860081bbc9a55fd4f7c1526a3b5078f2e2f7aaa0fd4a6df95e2c57e12b7603
-
Filesize
2KB
MD569b37619174666fa26c17732bc0534a2
SHA166e4963deac1357ad6e223fd13f1f271796a9d94
SHA256e40b01354a57006f59b5835ea3a5733bc3d3a4d603ce4702591f027bfa870f26
SHA512c0a94861580b91993f4b4bee44d0196152eeab1f5e78c5981aef845bb2532cdb625b7c6eee8061b123a666faa8a0b55c6067366ba97253db995be565c38cd7e6
-
Filesize
7KB
MD56deb25d694879f51d327067720a2d21d
SHA1d06d9680a90ff93e49f0b3c5f0ba14ef75b05680
SHA256e97c084b56b3f487da624fb0e61dcef04187e8ea425e091e6628d494ab7a699e
SHA512cce22657480d79b34d9bdc150c7a13bac2f11e96de024dd50dc6bb4891a43c633114708cd7656a40a10c088b408452ca0ed107c4ba38aaf070fe6568331bb16b
-
Filesize
5KB
MD5e6e2bf9954702fdaaa432e5e8c5018d7
SHA142b8d966f0a53886050781cacf080279cb987a9a
SHA256026d85d38244609549d78cb89bcafbbfd4f03c92391d4beaddd3a3747c3f532d
SHA51217c3b90ca70b71f249501dd9fd1dd4aa755a5df116a613726bbad69ea38f3b37a655268658fd5a22e3ce83e4caaf8bb86115c949598659e2d835edf534e9b11a
-
Filesize
7KB
MD51a9266ecddea49568ae36eb273538641
SHA125fe985841ece13da748cd0130e24b56a52a6b31
SHA256ac981e13f041534388052f4a2f7b58813d967e0cfdb644592b93cc498f4e8681
SHA5127954bca48489aa7532989aae3991661022649cab7fc64d56cddc08b7ec48659c61e981007af50f495c1f2e937b5d82e03d27ccd6111fd993f9aa60032f58f25e
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5d69e38b1b3b99cf06c531faac8cf0d39
SHA1727cefae5c8bfc48701264a6c77f1af7384ce7d2
SHA256f36b64e9d38a3d22abf8086cc66b494f455638705bd7ff5bfc15271e768acd79
SHA512c1b08bc7632d07d3249831c02cf382ec175591349c74632359446db37fa4adb6dfaf9c5e9e10e840a0c825e92aeb16910026a4a1909200ce8d87c9abb4270185