Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
08-05-2024 16:49
Static task
static1
Behavioral task
behavioral1
Sample
25ca148521c9ad4bb2e4fadf08bd2ba9_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
25ca148521c9ad4bb2e4fadf08bd2ba9_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
25ca148521c9ad4bb2e4fadf08bd2ba9_JaffaCakes118.html
-
Size
59KB
-
MD5
25ca148521c9ad4bb2e4fadf08bd2ba9
-
SHA1
33cb8c9d01326d3e8f51e4daa61635fd6465cf36
-
SHA256
07b87c54c7725bcb9721728de8707f9d5a3b3a32321e58921d9dc418c758e041
-
SHA512
9682949400078d2f163523a3cc08cff16a9d31f4415bd2f6f1ddabbc7136338fa118fc59aee39a124f07a87688ab2cd91eb636f862d51b97fddc13e2ec6c0321
-
SSDEEP
768:8RbOl4JPgGO36bfA4A40n+sFzBCkJTQDI6dKZohV22Se2H:8NPM36bod40nnQCohVsH
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1312 msedge.exe 1312 msedge.exe 4972 msedge.exe 4972 msedge.exe 2160 identity_helper.exe 2160 identity_helper.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe 5064 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4972 wrote to memory of 4948 4972 msedge.exe 79 PID 4972 wrote to memory of 4948 4972 msedge.exe 79 PID 4972 wrote to memory of 5548 4972 msedge.exe 82 PID 4972 wrote to memory of 5548 4972 msedge.exe 82 PID 4972 wrote to memory of 5548 4972 msedge.exe 82 PID 4972 wrote to memory of 5548 4972 msedge.exe 82 PID 4972 wrote to memory of 5548 4972 msedge.exe 82 PID 4972 wrote to memory of 5548 4972 msedge.exe 82 PID 4972 wrote to memory of 5548 4972 msedge.exe 82 PID 4972 wrote to memory of 5548 4972 msedge.exe 82 PID 4972 wrote to memory of 5548 4972 msedge.exe 82 PID 4972 wrote to memory of 5548 4972 msedge.exe 82 PID 4972 wrote to memory of 5548 4972 msedge.exe 82 PID 4972 wrote to memory of 5548 4972 msedge.exe 82 PID 4972 wrote to memory of 5548 4972 msedge.exe 82 PID 4972 wrote to memory of 5548 4972 msedge.exe 82 PID 4972 wrote to memory of 5548 4972 msedge.exe 82 PID 4972 wrote to memory of 5548 4972 msedge.exe 82 PID 4972 wrote to memory of 5548 4972 msedge.exe 82 PID 4972 wrote to memory of 5548 4972 msedge.exe 82 PID 4972 wrote to memory of 5548 4972 msedge.exe 82 PID 4972 wrote to memory of 5548 4972 msedge.exe 82 PID 4972 wrote to memory of 5548 4972 msedge.exe 82 PID 4972 wrote to memory of 5548 4972 msedge.exe 82 PID 4972 wrote to memory of 5548 4972 msedge.exe 82 PID 4972 wrote to memory of 5548 4972 msedge.exe 82 PID 4972 wrote to memory of 5548 4972 msedge.exe 82 PID 4972 wrote to memory of 5548 4972 msedge.exe 82 PID 4972 wrote to memory of 5548 4972 msedge.exe 82 PID 4972 wrote to memory of 5548 4972 msedge.exe 82 PID 4972 wrote to memory of 5548 4972 msedge.exe 82 PID 4972 wrote to memory of 5548 4972 msedge.exe 82 PID 4972 wrote to memory of 5548 4972 msedge.exe 82 PID 4972 wrote to memory of 5548 4972 msedge.exe 82 PID 4972 wrote to memory of 5548 4972 msedge.exe 82 PID 4972 wrote to memory of 5548 4972 msedge.exe 82 PID 4972 wrote to memory of 5548 4972 msedge.exe 82 PID 4972 wrote to memory of 5548 4972 msedge.exe 82 PID 4972 wrote to memory of 5548 4972 msedge.exe 82 PID 4972 wrote to memory of 5548 4972 msedge.exe 82 PID 4972 wrote to memory of 5548 4972 msedge.exe 82 PID 4972 wrote to memory of 5548 4972 msedge.exe 82 PID 4972 wrote to memory of 1312 4972 msedge.exe 83 PID 4972 wrote to memory of 1312 4972 msedge.exe 83 PID 4972 wrote to memory of 2220 4972 msedge.exe 84 PID 4972 wrote to memory of 2220 4972 msedge.exe 84 PID 4972 wrote to memory of 2220 4972 msedge.exe 84 PID 4972 wrote to memory of 2220 4972 msedge.exe 84 PID 4972 wrote to memory of 2220 4972 msedge.exe 84 PID 4972 wrote to memory of 2220 4972 msedge.exe 84 PID 4972 wrote to memory of 2220 4972 msedge.exe 84 PID 4972 wrote to memory of 2220 4972 msedge.exe 84 PID 4972 wrote to memory of 2220 4972 msedge.exe 84 PID 4972 wrote to memory of 2220 4972 msedge.exe 84 PID 4972 wrote to memory of 2220 4972 msedge.exe 84 PID 4972 wrote to memory of 2220 4972 msedge.exe 84 PID 4972 wrote to memory of 2220 4972 msedge.exe 84 PID 4972 wrote to memory of 2220 4972 msedge.exe 84 PID 4972 wrote to memory of 2220 4972 msedge.exe 84 PID 4972 wrote to memory of 2220 4972 msedge.exe 84 PID 4972 wrote to memory of 2220 4972 msedge.exe 84 PID 4972 wrote to memory of 2220 4972 msedge.exe 84 PID 4972 wrote to memory of 2220 4972 msedge.exe 84 PID 4972 wrote to memory of 2220 4972 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\25ca148521c9ad4bb2e4fadf08bd2ba9_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4972 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa819846f8,0x7ffa81984708,0x7ffa819847182⤵PID:4948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2252,14439569837792074901,8720288139570730981,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2288 /prefetch:22⤵PID:5548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2252,14439569837792074901,8720288139570730981,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2364 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2252,14439569837792074901,8720288139570730981,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2804 /prefetch:82⤵PID:2220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2252,14439569837792074901,8720288139570730981,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:2080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2252,14439569837792074901,8720288139570730981,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:12⤵PID:5320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2252,14439569837792074901,8720288139570730981,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4780 /prefetch:12⤵PID:4328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2252,14439569837792074901,8720288139570730981,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2912 /prefetch:82⤵PID:6040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2252,14439569837792074901,8720288139570730981,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2912 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2252,14439569837792074901,8720288139570730981,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5632 /prefetch:12⤵PID:2740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2252,14439569837792074901,8720288139570730981,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4992 /prefetch:12⤵PID:4500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2252,14439569837792074901,8720288139570730981,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4192 /prefetch:12⤵PID:4136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2252,14439569837792074901,8720288139570730981,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4848 /prefetch:12⤵PID:1960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2252,14439569837792074901,8720288139570730981,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5448 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5064
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5148
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5200
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54b4f91fa1b362ba5341ecb2836438dea
SHA19561f5aabed742404d455da735259a2c6781fa07
SHA256d824b742eace197ddc8b6ed5d918f390fde4b0fbf0e371b8e1f2ed40a3b6455c
SHA512fef22217dcdd8000bc193e25129699d4b8f7a103ca4fe1613baf73ccf67090d9fbae27eb93e4bb8747455853a0a4326f2d0c38df41c8d42351cdcd4132418dac
-
Filesize
152B
MD5eaa3db555ab5bc0cb364826204aad3f0
SHA1a4cdfaac8de49e6e6e88b335cfeaa7c9e3c563ca
SHA256ef7baeb1b2ab05ff3c5fbb76c2759db49294654548706c7c8e87f0cde855b86b
SHA512e13981da51b52c15261ecabb98af32f9b920651b46b10ce0cc823c5878b22eb1420258c80deef204070d1e0bdd3a64d875ac2522e3713a3cf11657aa55aeccd4
-
Filesize
40KB
MD55ce7bdeeea547dc5e395554f1de0b179
SHA13dba53fa4da7c828a468d17abc09b265b664078a
SHA256675cd5fdfe3c14504b7af2d1012c921ab0b5af2ab93bf4dfbfe6505cae8b79a9
SHA5120bf3e39c11cfefbd4de7ec60f2adaacfba14eac0a4bf8e4d2bc80c4cf1e9d173035c068d8488436c4cf9840ae5c7cfccbefddf9d184e60cab78d1043dc3b9c4e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize264B
MD5619a88abca7793530f55e281a1b63ea3
SHA1fe77362ba4bd1d5630dc542c2c954b3b578dc1d9
SHA2565a999eea91057bb88ced0851aaea290d13eb99ec6acb9191377dc609815d879d
SHA5123393a43049d60b3eb3453b26a3432f3dd5dcd67ab5c4a998c2bdc1780b92a49783f6db31468185732acc87082140d3240a581de7794357c1f23b031fcd9b4c21
-
Filesize
2KB
MD506b473ba6d3f17fb80522339b128bcc0
SHA15414ded6f1ad5a138acd9106c5b21394ff68b997
SHA25685d9aa1f7cee25dd508ea9fe89208fbe4629793878c8dc434b956254720f42ef
SHA5123fa937add3be4ada1094db4e8de7e7c6e00e5f5c30bee29f1571ffa3e74c2ff1434e95d3af50ef49e81fba796ce54c1eef0ead7c5326b5d93883ead7a1ea48a6
-
Filesize
7KB
MD559a47e050ac19938370139700e0dd1ed
SHA1a549d200e62d914ff85b1d9a129989cb91db679e
SHA25618dca8932d6d9ae8d577e108cda56a4dfcf7bf3083922b71d3cfdae8e4ea93c0
SHA512f7e340544b38f0f80ba97117ea6dca72cac9d177b655190e1ea856b8eb339aca5c45ed3e3cdd907485f586f1e05f98a95274d4571f1ef34d22a5b757ba5447e0
-
Filesize
6KB
MD505f76efb31a86ff276505fadc88d5f9d
SHA1b9e31e7d1de3eedf5ff0e1dbc07354272af227c5
SHA256735fb84cd0474af44d148d74404370ee4c96d3ceab0d6a365864bbf3eb5ea92c
SHA512926771d47b4eb6d0a87281210e8da3346dbbada6a93ef246da03ebc5aa46e1d3675cb9177e538ff0f3d543eb88298e32a6fe2698c14f1a9497557da80c6ab297
-
Filesize
7KB
MD50f36ad894e9ab3eed31ca64b63ce0929
SHA15ff2688f44f606627bbbf6c2f912e2db37f6e4c8
SHA256fdc83a0c55699eff082658144c777cd086a4670b49206cc13d92f934ba0d760b
SHA51257e1368b4b8fc31a682d771005edc4c28960c497eb32d6b73dffc1c2905f003cc6ec54e433bc87128a68ea3f90352bb0483df7e9f84ffef6835b59b4fe3a630b
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5ab98b05757d2f98b7235d00027eb9b5d
SHA1a5e04a19fda9fbcbec94e771a8b563b69714742b
SHA25636340c2c26ca1f8e2ba6fc412a9a781d26d05ddfd0bae7daeb55c18e4b4b5c4d
SHA512898647bf54d6f0472a7cbc3d1e2ffc0259eec1bd67e847ea05e24ff69045c07577a0f897360e030542c0d5332efb50dcea96a3453cfe1d7d7a319f7b7ac72bec