Analysis
-
max time kernel
145s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
11-05-2024 15:49
Static task
static1
Behavioral task
behavioral1
Sample
355aaf3d45da498beb48f71cb876954f_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
355aaf3d45da498beb48f71cb876954f_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
355aaf3d45da498beb48f71cb876954f_JaffaCakes118.html
-
Size
102KB
-
MD5
355aaf3d45da498beb48f71cb876954f
-
SHA1
20cfd50d1c959fc82a46fe0ddedf9e12f434785c
-
SHA256
e8b556b26500fd99237f5d7ad6305e666840467a7306d37dea1255965223b5e2
-
SHA512
34b2f09774ad27897907e6bfa204db1963f8d01b4fbc55c18a8f34497066fc4070c51da8eea02522d9d2ae25e04318a496c886221bece3e9fcd0cd1d4a871069
-
SSDEEP
3072:STmW6FtzEBxOKOZqf7q1bvloOvjfuUO7G5n0jB0wIrk7m/pR1G+Syoj8hDEOOfJQ:SUEB8hr
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3648 msedge.exe 3648 msedge.exe 5348 msedge.exe 5348 msedge.exe 1084 identity_helper.exe 1084 identity_helper.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 5348 msedge.exe 5348 msedge.exe 5348 msedge.exe 5348 msedge.exe 5348 msedge.exe 5348 msedge.exe 5348 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5348 msedge.exe 5348 msedge.exe 5348 msedge.exe 5348 msedge.exe 5348 msedge.exe 5348 msedge.exe 5348 msedge.exe 5348 msedge.exe 5348 msedge.exe 5348 msedge.exe 5348 msedge.exe 5348 msedge.exe 5348 msedge.exe 5348 msedge.exe 5348 msedge.exe 5348 msedge.exe 5348 msedge.exe 5348 msedge.exe 5348 msedge.exe 5348 msedge.exe 5348 msedge.exe 5348 msedge.exe 5348 msedge.exe 5348 msedge.exe 5348 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5348 msedge.exe 5348 msedge.exe 5348 msedge.exe 5348 msedge.exe 5348 msedge.exe 5348 msedge.exe 5348 msedge.exe 5348 msedge.exe 5348 msedge.exe 5348 msedge.exe 5348 msedge.exe 5348 msedge.exe 5348 msedge.exe 5348 msedge.exe 5348 msedge.exe 5348 msedge.exe 5348 msedge.exe 5348 msedge.exe 5348 msedge.exe 5348 msedge.exe 5348 msedge.exe 5348 msedge.exe 5348 msedge.exe 5348 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5348 wrote to memory of 4916 5348 msedge.exe 82 PID 5348 wrote to memory of 4916 5348 msedge.exe 82 PID 5348 wrote to memory of 1896 5348 msedge.exe 83 PID 5348 wrote to memory of 1896 5348 msedge.exe 83 PID 5348 wrote to memory of 1896 5348 msedge.exe 83 PID 5348 wrote to memory of 1896 5348 msedge.exe 83 PID 5348 wrote to memory of 1896 5348 msedge.exe 83 PID 5348 wrote to memory of 1896 5348 msedge.exe 83 PID 5348 wrote to memory of 1896 5348 msedge.exe 83 PID 5348 wrote to memory of 1896 5348 msedge.exe 83 PID 5348 wrote to memory of 1896 5348 msedge.exe 83 PID 5348 wrote to memory of 1896 5348 msedge.exe 83 PID 5348 wrote to memory of 1896 5348 msedge.exe 83 PID 5348 wrote to memory of 1896 5348 msedge.exe 83 PID 5348 wrote to memory of 1896 5348 msedge.exe 83 PID 5348 wrote to memory of 1896 5348 msedge.exe 83 PID 5348 wrote to memory of 1896 5348 msedge.exe 83 PID 5348 wrote to memory of 1896 5348 msedge.exe 83 PID 5348 wrote to memory of 1896 5348 msedge.exe 83 PID 5348 wrote to memory of 1896 5348 msedge.exe 83 PID 5348 wrote to memory of 1896 5348 msedge.exe 83 PID 5348 wrote to memory of 1896 5348 msedge.exe 83 PID 5348 wrote to memory of 1896 5348 msedge.exe 83 PID 5348 wrote to memory of 1896 5348 msedge.exe 83 PID 5348 wrote to memory of 1896 5348 msedge.exe 83 PID 5348 wrote to memory of 1896 5348 msedge.exe 83 PID 5348 wrote to memory of 1896 5348 msedge.exe 83 PID 5348 wrote to memory of 1896 5348 msedge.exe 83 PID 5348 wrote to memory of 1896 5348 msedge.exe 83 PID 5348 wrote to memory of 1896 5348 msedge.exe 83 PID 5348 wrote to memory of 1896 5348 msedge.exe 83 PID 5348 wrote to memory of 1896 5348 msedge.exe 83 PID 5348 wrote to memory of 1896 5348 msedge.exe 83 PID 5348 wrote to memory of 1896 5348 msedge.exe 83 PID 5348 wrote to memory of 1896 5348 msedge.exe 83 PID 5348 wrote to memory of 1896 5348 msedge.exe 83 PID 5348 wrote to memory of 1896 5348 msedge.exe 83 PID 5348 wrote to memory of 1896 5348 msedge.exe 83 PID 5348 wrote to memory of 1896 5348 msedge.exe 83 PID 5348 wrote to memory of 1896 5348 msedge.exe 83 PID 5348 wrote to memory of 1896 5348 msedge.exe 83 PID 5348 wrote to memory of 1896 5348 msedge.exe 83 PID 5348 wrote to memory of 3648 5348 msedge.exe 84 PID 5348 wrote to memory of 3648 5348 msedge.exe 84 PID 5348 wrote to memory of 1128 5348 msedge.exe 85 PID 5348 wrote to memory of 1128 5348 msedge.exe 85 PID 5348 wrote to memory of 1128 5348 msedge.exe 85 PID 5348 wrote to memory of 1128 5348 msedge.exe 85 PID 5348 wrote to memory of 1128 5348 msedge.exe 85 PID 5348 wrote to memory of 1128 5348 msedge.exe 85 PID 5348 wrote to memory of 1128 5348 msedge.exe 85 PID 5348 wrote to memory of 1128 5348 msedge.exe 85 PID 5348 wrote to memory of 1128 5348 msedge.exe 85 PID 5348 wrote to memory of 1128 5348 msedge.exe 85 PID 5348 wrote to memory of 1128 5348 msedge.exe 85 PID 5348 wrote to memory of 1128 5348 msedge.exe 85 PID 5348 wrote to memory of 1128 5348 msedge.exe 85 PID 5348 wrote to memory of 1128 5348 msedge.exe 85 PID 5348 wrote to memory of 1128 5348 msedge.exe 85 PID 5348 wrote to memory of 1128 5348 msedge.exe 85 PID 5348 wrote to memory of 1128 5348 msedge.exe 85 PID 5348 wrote to memory of 1128 5348 msedge.exe 85 PID 5348 wrote to memory of 1128 5348 msedge.exe 85 PID 5348 wrote to memory of 1128 5348 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\355aaf3d45da498beb48f71cb876954f_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5348 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa1ec946f8,0x7ffa1ec94708,0x7ffa1ec947182⤵PID:4916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2036,1239699595232037825,14724758014923330456,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2056 /prefetch:22⤵PID:1896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2036,1239699595232037825,14724758014923330456,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2524 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2036,1239699595232037825,14724758014923330456,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2904 /prefetch:82⤵PID:1128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,1239699595232037825,14724758014923330456,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3188 /prefetch:12⤵PID:4224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,1239699595232037825,14724758014923330456,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:2216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,1239699595232037825,14724758014923330456,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4712 /prefetch:12⤵PID:1280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2036,1239699595232037825,14724758014923330456,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5872 /prefetch:82⤵PID:4784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2036,1239699595232037825,14724758014923330456,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5872 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,1239699595232037825,14724758014923330456,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4216 /prefetch:12⤵PID:5080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,1239699595232037825,14724758014923330456,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5424 /prefetch:12⤵PID:4000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,1239699595232037825,14724758014923330456,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5040 /prefetch:12⤵PID:3948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,1239699595232037825,14724758014923330456,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4712 /prefetch:12⤵PID:4484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2036,1239699595232037825,14724758014923330456,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1776 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2764
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4804
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5316
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5537815e7cc5c694912ac0308147852e4
SHA12ccdd9d9dc637db5462fe8119c0df261146c363c
SHA256b4b69d099507d88abdeff4835e06cc6711e1c47464c963d013cef0a278e52d4f
SHA51263969a69af057235dbdecddc483ef5ce0058673179a3580c5aa12938c9501513cdb72dd703a06fa7d4fc08d074f17528283338c795334398497c771ecbd1350a
-
Filesize
152B
MD58b167567021ccb1a9fdf073fa9112ef0
SHA13baf293fbfaa7c1e7cdacb5f2975737f4ef69898
SHA25626764cedf35f118b55f30b3a36e0693f9f38290a5b2b6b8b83a00e990ae18513
SHA512726098001ef1acf1dd154a658752fa27dea32bca8fbb66395c142cb666102e71632adbad1b7e2f717071cd3e3af3867471932a71707f2ae97b989f4be468ab54
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD507540742af94df69f52717c111077ba4
SHA18be4102e876f9ca4873b4b4a4d17b7bf51481c10
SHA25611be3ba2ed8e452ddad73d0d5f3b424efc3c8e1a064caf4caf889bb0b866b78e
SHA512842f8f4f7f3663fdbded79c68bd748720942cd0bc4e4b1ab3012ed1ce1d0849803f1e55b8e84e0793e4b1ba86af613804069e825bcefbceeb8410a7858285536
-
Filesize
324B
MD5ff17505b02d988cd94ac6b26bf718018
SHA169f3ba890950867b858fb4c1bface08058ddc38d
SHA256d0718af13cae3e6a7b66a86da4da75938d0d6b84bf5f9039f812d588ab9a02d4
SHA512c6570711fc94751163c9a7b8f9932d51b7e472e86707ad8a651f76814408b01e00a0f4710d680f9b168c510bfb527dc3106a254e0747f3254afadbfc73737984
-
Filesize
5KB
MD5a1ecba584b73da2b25c1f2210b95be73
SHA131f27fcf50d70187fe4021ed2e49a38846fe100c
SHA25658d0d104fb0e50ade984cfdd1767838fe85b21519b2f5bec3b962ac28f2ecb66
SHA512a708a2205393daeb8786acb693fd65a392329872807929a2d74d148fe01fada16de6a2b7328158782e0f40baa0f45ef803a9985348346a1d0aabed1591abc287
-
Filesize
6KB
MD5e495c1958573ad091e02638d85fde4a3
SHA1538fcbac85e23c8421d343bd1bab926dfabeafce
SHA256ca9d3e0ddca38f4cde165c956d9092f3e454e34317f8ceb621b547202ccf94b0
SHA512e3f3c7b54067e12549a4073ed4a1a7d94cecd7d21c994c3064e47f859c207c85c67e63e3271001f5b6b7613fea2c8891eac277bcc6767a2bde31a95082af697c
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5f0cbc59c31bda641001ac742e340d35e
SHA10bdf1c7c3f7cb1ac62af64ff7ac65ada38950d2c
SHA256e30793325aba90b9f9884d9bab91ada7036e95f981b04d8d6e9d73eb46308a2f
SHA51215be40774b2f4175992869b3a2b1aab41891528caa6f87b38413014ed96436f6cba8a0a1d11dae8f4db94e0a2823c8fb7ec1bfb00a659ebe42c428664076d368