Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
11-05-2024 05:30
Static task
static1
Behavioral task
behavioral1
Sample
32f61c3a2b87579efd47045b2ff61591_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
32f61c3a2b87579efd47045b2ff61591_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
32f61c3a2b87579efd47045b2ff61591_JaffaCakes118.html
-
Size
8KB
-
MD5
32f61c3a2b87579efd47045b2ff61591
-
SHA1
ebe09d6f95c6dfd4474633e2482b6fb0efe2a710
-
SHA256
5f1209de220698cdfd046755d5dc2eff472cb20e5f1c3bfd1b3945601651aa3f
-
SHA512
5dd1f7a99b203d1c24c0cf76a279eba916f392f75d1ceeb115b898293c7a6441ffbaf0f3e6dedf8737fe53f20ecb899a676e84286b3cbab3108213c722bdadb2
-
SSDEEP
192:4bo06ENdB0UQ1rTZc1V7CRC3CLsCjxGZqNeGqRIbFLt8egGHhqcpllLe/CRbiE64:4bo0ZM219CRC3CLsCjxzrgidllWCsy8q
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2240 msedge.exe 2240 msedge.exe 1396 msedge.exe 1396 msedge.exe 5748 identity_helper.exe 5748 identity_helper.exe 5724 msedge.exe 5724 msedge.exe 5724 msedge.exe 5724 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe 1396 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1396 wrote to memory of 4688 1396 msedge.exe 82 PID 1396 wrote to memory of 4688 1396 msedge.exe 82 PID 1396 wrote to memory of 1820 1396 msedge.exe 83 PID 1396 wrote to memory of 1820 1396 msedge.exe 83 PID 1396 wrote to memory of 1820 1396 msedge.exe 83 PID 1396 wrote to memory of 1820 1396 msedge.exe 83 PID 1396 wrote to memory of 1820 1396 msedge.exe 83 PID 1396 wrote to memory of 1820 1396 msedge.exe 83 PID 1396 wrote to memory of 1820 1396 msedge.exe 83 PID 1396 wrote to memory of 1820 1396 msedge.exe 83 PID 1396 wrote to memory of 1820 1396 msedge.exe 83 PID 1396 wrote to memory of 1820 1396 msedge.exe 83 PID 1396 wrote to memory of 1820 1396 msedge.exe 83 PID 1396 wrote to memory of 1820 1396 msedge.exe 83 PID 1396 wrote to memory of 1820 1396 msedge.exe 83 PID 1396 wrote to memory of 1820 1396 msedge.exe 83 PID 1396 wrote to memory of 1820 1396 msedge.exe 83 PID 1396 wrote to memory of 1820 1396 msedge.exe 83 PID 1396 wrote to memory of 1820 1396 msedge.exe 83 PID 1396 wrote to memory of 1820 1396 msedge.exe 83 PID 1396 wrote to memory of 1820 1396 msedge.exe 83 PID 1396 wrote to memory of 1820 1396 msedge.exe 83 PID 1396 wrote to memory of 1820 1396 msedge.exe 83 PID 1396 wrote to memory of 1820 1396 msedge.exe 83 PID 1396 wrote to memory of 1820 1396 msedge.exe 83 PID 1396 wrote to memory of 1820 1396 msedge.exe 83 PID 1396 wrote to memory of 1820 1396 msedge.exe 83 PID 1396 wrote to memory of 1820 1396 msedge.exe 83 PID 1396 wrote to memory of 1820 1396 msedge.exe 83 PID 1396 wrote to memory of 1820 1396 msedge.exe 83 PID 1396 wrote to memory of 1820 1396 msedge.exe 83 PID 1396 wrote to memory of 1820 1396 msedge.exe 83 PID 1396 wrote to memory of 1820 1396 msedge.exe 83 PID 1396 wrote to memory of 1820 1396 msedge.exe 83 PID 1396 wrote to memory of 1820 1396 msedge.exe 83 PID 1396 wrote to memory of 1820 1396 msedge.exe 83 PID 1396 wrote to memory of 1820 1396 msedge.exe 83 PID 1396 wrote to memory of 1820 1396 msedge.exe 83 PID 1396 wrote to memory of 1820 1396 msedge.exe 83 PID 1396 wrote to memory of 1820 1396 msedge.exe 83 PID 1396 wrote to memory of 1820 1396 msedge.exe 83 PID 1396 wrote to memory of 1820 1396 msedge.exe 83 PID 1396 wrote to memory of 2240 1396 msedge.exe 84 PID 1396 wrote to memory of 2240 1396 msedge.exe 84 PID 1396 wrote to memory of 1360 1396 msedge.exe 85 PID 1396 wrote to memory of 1360 1396 msedge.exe 85 PID 1396 wrote to memory of 1360 1396 msedge.exe 85 PID 1396 wrote to memory of 1360 1396 msedge.exe 85 PID 1396 wrote to memory of 1360 1396 msedge.exe 85 PID 1396 wrote to memory of 1360 1396 msedge.exe 85 PID 1396 wrote to memory of 1360 1396 msedge.exe 85 PID 1396 wrote to memory of 1360 1396 msedge.exe 85 PID 1396 wrote to memory of 1360 1396 msedge.exe 85 PID 1396 wrote to memory of 1360 1396 msedge.exe 85 PID 1396 wrote to memory of 1360 1396 msedge.exe 85 PID 1396 wrote to memory of 1360 1396 msedge.exe 85 PID 1396 wrote to memory of 1360 1396 msedge.exe 85 PID 1396 wrote to memory of 1360 1396 msedge.exe 85 PID 1396 wrote to memory of 1360 1396 msedge.exe 85 PID 1396 wrote to memory of 1360 1396 msedge.exe 85 PID 1396 wrote to memory of 1360 1396 msedge.exe 85 PID 1396 wrote to memory of 1360 1396 msedge.exe 85 PID 1396 wrote to memory of 1360 1396 msedge.exe 85 PID 1396 wrote to memory of 1360 1396 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\32f61c3a2b87579efd47045b2ff61591_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1396 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9a06c46f8,0x7ff9a06c4708,0x7ff9a06c47182⤵PID:4688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2336,9121580135718678689,3949837856536107824,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2324 /prefetch:22⤵PID:1820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2336,9121580135718678689,3949837856536107824,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2392 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2336,9121580135718678689,3949837856536107824,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2692 /prefetch:82⤵PID:1360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2336,9121580135718678689,3949837856536107824,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:5464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2336,9121580135718678689,3949837856536107824,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:5232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2336,9121580135718678689,3949837856536107824,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5024 /prefetch:12⤵PID:720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2336,9121580135718678689,3949837856536107824,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5368 /prefetch:12⤵PID:3344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2336,9121580135718678689,3949837856536107824,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4756 /prefetch:12⤵PID:5008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2336,9121580135718678689,3949837856536107824,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5576 /prefetch:12⤵PID:5160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2336,9121580135718678689,3949837856536107824,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5648 /prefetch:12⤵PID:5096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2336,9121580135718678689,3949837856536107824,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5840 /prefetch:82⤵PID:4996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2336,9121580135718678689,3949837856536107824,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5840 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2336,9121580135718678689,3949837856536107824,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5492 /prefetch:12⤵PID:2340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2336,9121580135718678689,3949837856536107824,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5468 /prefetch:12⤵PID:1240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2336,9121580135718678689,3949837856536107824,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4128 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5724
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5076
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5824
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ae54e9db2e89f2c54da8cc0bfcbd26bd
SHA1a88af6c673609ecbc51a1a60dfbc8577830d2b5d
SHA2565009d3c953de63cfd14a7d911156c514e179ff07d2b94382d9caac6040cb72af
SHA512e3b70e5eb7321b9deca6f6a17424a15b9fd5c4008bd3789bd01099fd13cb2f4a2f37fe4b920fb51c50517745b576c1f94df83efd1a7e75949551163985599998
-
Filesize
152B
MD5f53207a5ca2ef5c7e976cbb3cb26d870
SHA149a8cc44f53da77bb3dfb36fc7676ed54675db43
SHA25619ab4e3c9da6d9cedda7461efdba9a2085e743513ab89f1dd0fd5a8f9486ad23
SHA512be734c7e8afda19f445912aef0d78f9941add29baebd4a812bff27f10a1d78b52aeb11c551468c8644443c86e1a2a6b2e4aead3d7f81d39925e3c20406ac1499
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD5e7e87a49b2009ce5ee04e04343d09392
SHA1fb35e4c0202fbe26f7114b9552746c557ece3c16
SHA256b5f31267bf46603a82097efcb0f5a8d36e244fb45c3aded8efd7d6b95a5945a7
SHA512d4bfe85277e0f0a86471060330814fec0ddb6b8afd8b3a8adae7a3a11452f35cad670619d056903090743c1c949922cf99b7be263a8748ce6d9fe776bcb34a81
-
Filesize
1KB
MD5c17f942e202bbf8ee240b77ce0e232b0
SHA11be94cf4b42686c051909b4d330718605a9b65a6
SHA256852ec41369ed0369ff339a9f673855f17813467c9a342acbaa6a5c3f31bb7d58
SHA512baf0ab42c900931a1c26b30fc7f60dac4d60560a72049c7c8c014d2722edaa2b858cf20cee7ff004d358162526644eba00bd8fca040e4686d2d1540534ae7d75
-
Filesize
5KB
MD50970e55f0c16150fd0d93868547bb7ba
SHA191897c904ab849af04750e17616d88a36add0684
SHA256168aa432792bc9604b2e27fa6a564737dad982a0f42b85d20a83ffc1294fd96e
SHA51246677a3c7ec9e9bcec5be5c6fd76f49ba639b8b83c88bce00a02e9e441128448691da58d2d0597237ee72e5a4be97b55ff5b86dbf14104f84107a6ae52582813
-
Filesize
6KB
MD562ca0014a02cae45ed5c23e0b6485883
SHA126294f935ee935f0dc801d14ad95d28212476292
SHA256666642ae255b76de87d98372d220a90924588e9862ca8a54e0c7a4b3cd5c65fb
SHA512585dd39e66278993aaeb06d79856e71a6169ad9398ef55385e262ecc84f701a541394a2dae4b25cc72b1b1184e9f8f7d57764f81a1becbb3923d0a58d3cb0765
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5d05e39c5c61a27f638647e78fae70229
SHA186d353f255f90101faebd364de2a8387c4081446
SHA25601755fe2d8c4db7617707e00976a3ff9f3befb132fcf07be5d7355ffe945b376
SHA51282a08782da67228d77b52178c5b539cc0416216fc5e1693e0dad3a97ca614c21e743c88075c202dc80bb813a251d939afa2598f5d8ed6b389953cd5672996f39