Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
12/05/2024, 01:19
Static task
static1
Behavioral task
behavioral1
Sample
377f79117d088a9743642624a8db9d0b_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
377f79117d088a9743642624a8db9d0b_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
377f79117d088a9743642624a8db9d0b_JaffaCakes118.html
-
Size
55KB
-
MD5
377f79117d088a9743642624a8db9d0b
-
SHA1
1ba3403654f03741d54612809a8c28f2ca5e6e9c
-
SHA256
af44a2481c35ef586ecc8924e5c3f9d80faf22c3c2f353e025aa607ec3fd23d1
-
SHA512
8bd44c4fe82284329a44143919c655fd214e635b45f90f7d62e2f7bbd9591bd458615493a33bbc810fc5826e4941abd243acd02b7b7fd29e8c0c2ae29a6663e3
-
SSDEEP
1536:eLTupBl7F1RmRMRRR4aRRu11fagI/GA/5fAURIH:eWpBlB1oSPle1S/5fAURIH
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1724 msedge.exe 1724 msedge.exe 2864 msedge.exe 2864 msedge.exe 1852 identity_helper.exe 1852 identity_helper.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2864 wrote to memory of 2708 2864 msedge.exe 82 PID 2864 wrote to memory of 2708 2864 msedge.exe 82 PID 2864 wrote to memory of 4652 2864 msedge.exe 83 PID 2864 wrote to memory of 4652 2864 msedge.exe 83 PID 2864 wrote to memory of 4652 2864 msedge.exe 83 PID 2864 wrote to memory of 4652 2864 msedge.exe 83 PID 2864 wrote to memory of 4652 2864 msedge.exe 83 PID 2864 wrote to memory of 4652 2864 msedge.exe 83 PID 2864 wrote to memory of 4652 2864 msedge.exe 83 PID 2864 wrote to memory of 4652 2864 msedge.exe 83 PID 2864 wrote to memory of 4652 2864 msedge.exe 83 PID 2864 wrote to memory of 4652 2864 msedge.exe 83 PID 2864 wrote to memory of 4652 2864 msedge.exe 83 PID 2864 wrote to memory of 4652 2864 msedge.exe 83 PID 2864 wrote to memory of 4652 2864 msedge.exe 83 PID 2864 wrote to memory of 4652 2864 msedge.exe 83 PID 2864 wrote to memory of 4652 2864 msedge.exe 83 PID 2864 wrote to memory of 4652 2864 msedge.exe 83 PID 2864 wrote to memory of 4652 2864 msedge.exe 83 PID 2864 wrote to memory of 4652 2864 msedge.exe 83 PID 2864 wrote to memory of 4652 2864 msedge.exe 83 PID 2864 wrote to memory of 4652 2864 msedge.exe 83 PID 2864 wrote to memory of 4652 2864 msedge.exe 83 PID 2864 wrote to memory of 4652 2864 msedge.exe 83 PID 2864 wrote to memory of 4652 2864 msedge.exe 83 PID 2864 wrote to memory of 4652 2864 msedge.exe 83 PID 2864 wrote to memory of 4652 2864 msedge.exe 83 PID 2864 wrote to memory of 4652 2864 msedge.exe 83 PID 2864 wrote to memory of 4652 2864 msedge.exe 83 PID 2864 wrote to memory of 4652 2864 msedge.exe 83 PID 2864 wrote to memory of 4652 2864 msedge.exe 83 PID 2864 wrote to memory of 4652 2864 msedge.exe 83 PID 2864 wrote to memory of 4652 2864 msedge.exe 83 PID 2864 wrote to memory of 4652 2864 msedge.exe 83 PID 2864 wrote to memory of 4652 2864 msedge.exe 83 PID 2864 wrote to memory of 4652 2864 msedge.exe 83 PID 2864 wrote to memory of 4652 2864 msedge.exe 83 PID 2864 wrote to memory of 4652 2864 msedge.exe 83 PID 2864 wrote to memory of 4652 2864 msedge.exe 83 PID 2864 wrote to memory of 4652 2864 msedge.exe 83 PID 2864 wrote to memory of 4652 2864 msedge.exe 83 PID 2864 wrote to memory of 4652 2864 msedge.exe 83 PID 2864 wrote to memory of 1724 2864 msedge.exe 84 PID 2864 wrote to memory of 1724 2864 msedge.exe 84 PID 2864 wrote to memory of 2516 2864 msedge.exe 85 PID 2864 wrote to memory of 2516 2864 msedge.exe 85 PID 2864 wrote to memory of 2516 2864 msedge.exe 85 PID 2864 wrote to memory of 2516 2864 msedge.exe 85 PID 2864 wrote to memory of 2516 2864 msedge.exe 85 PID 2864 wrote to memory of 2516 2864 msedge.exe 85 PID 2864 wrote to memory of 2516 2864 msedge.exe 85 PID 2864 wrote to memory of 2516 2864 msedge.exe 85 PID 2864 wrote to memory of 2516 2864 msedge.exe 85 PID 2864 wrote to memory of 2516 2864 msedge.exe 85 PID 2864 wrote to memory of 2516 2864 msedge.exe 85 PID 2864 wrote to memory of 2516 2864 msedge.exe 85 PID 2864 wrote to memory of 2516 2864 msedge.exe 85 PID 2864 wrote to memory of 2516 2864 msedge.exe 85 PID 2864 wrote to memory of 2516 2864 msedge.exe 85 PID 2864 wrote to memory of 2516 2864 msedge.exe 85 PID 2864 wrote to memory of 2516 2864 msedge.exe 85 PID 2864 wrote to memory of 2516 2864 msedge.exe 85 PID 2864 wrote to memory of 2516 2864 msedge.exe 85 PID 2864 wrote to memory of 2516 2864 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\377f79117d088a9743642624a8db9d0b_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcce6146f8,0x7ffcce614708,0x7ffcce6147182⤵PID:2708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,5033429357204085515,11013814645179282884,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:22⤵PID:4652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,5033429357204085515,11013814645179282884,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2176 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,5033429357204085515,11013814645179282884,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2820 /prefetch:82⤵PID:2516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,5033429357204085515,11013814645179282884,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:1808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,5033429357204085515,11013814645179282884,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:1744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,5033429357204085515,11013814645179282884,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4640 /prefetch:12⤵PID:4824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,5033429357204085515,11013814645179282884,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4988 /prefetch:12⤵PID:3020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,5033429357204085515,11013814645179282884,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5140 /prefetch:12⤵PID:4376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,5033429357204085515,11013814645179282884,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5176 /prefetch:12⤵PID:548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,5033429357204085515,11013814645179282884,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6320 /prefetch:82⤵PID:5028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,5033429357204085515,11013814645179282884,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6320 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,5033429357204085515,11013814645179282884,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6312 /prefetch:12⤵PID:1188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,5033429357204085515,11013814645179282884,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6280 /prefetch:12⤵PID:4612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,5033429357204085515,11013814645179282884,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1772 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2360
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3704
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1784
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54b4f91fa1b362ba5341ecb2836438dea
SHA19561f5aabed742404d455da735259a2c6781fa07
SHA256d824b742eace197ddc8b6ed5d918f390fde4b0fbf0e371b8e1f2ed40a3b6455c
SHA512fef22217dcdd8000bc193e25129699d4b8f7a103ca4fe1613baf73ccf67090d9fbae27eb93e4bb8747455853a0a4326f2d0c38df41c8d42351cdcd4132418dac
-
Filesize
152B
MD5eaa3db555ab5bc0cb364826204aad3f0
SHA1a4cdfaac8de49e6e6e88b335cfeaa7c9e3c563ca
SHA256ef7baeb1b2ab05ff3c5fbb76c2759db49294654548706c7c8e87f0cde855b86b
SHA512e13981da51b52c15261ecabb98af32f9b920651b46b10ce0cc823c5878b22eb1420258c80deef204070d1e0bdd3a64d875ac2522e3713a3cf11657aa55aeccd4
-
Filesize
20KB
MD5b6c8122025aff891940d1d5e1ab95fce
SHA1a0c7ca41d0922d085c358f5dde81ae3e85a8c9c4
SHA2569954c64c68000f615e5066bc255eced1195d1f8b7dbc715f9062ddf9f147e87e
SHA512e62a37b55b6b8d95c24fb624105ff6ff72f118e31760d0da1e8df8e8acf627ec6327c26dfa26df8535585877604c7948d2f621ccabc39beec49787e22c302c10
-
Filesize
44KB
MD588477d32f888c2b8a3f3d98deb460b3d
SHA11fae9ac6c1082fc0426aebe4e683eea9b4ba898c
SHA2561b1f0b5ef5f21d5742d84f331def7116323365c3dd4aec096a55763e310879d8
SHA512e0c0588ff27a989cac47797e5a8044983d0b3c75c44416c5f977e0e93e9d3a9321b9283ea077e6dcad0619ac960ee45fe8570f1d5cc7d5d4117fee4f2f0c96b3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD54083ff0031352af9658c40bcd7692dd9
SHA144a28edd7c7e44e0750d72279ed149431af8c394
SHA25650bfc88251ab361687c0c69232831aaf8cd7c78c6d177645225d7f72e8e76077
SHA512b768b379ff2daeb957f851a1cf5ef30ec515e67bd6c58ce665d534d7e17304f6eaeccd9385f0fa0dcba7621a9ed4468a5b7eb7150e9b7a7697b19da4acc62d63
-
Filesize
1KB
MD500f4219485afe5de53358118e23bc275
SHA1c16ed1676e8eec4c86e3eea3457b9936528036f8
SHA256d77f19e665e68326ad857a9d170cc0c0c946bf1bf71faf0482e4b615c0b761e1
SHA512bfab57f6747552f65893dee69a1f3f64ef48bb68285782c676b329cb1a22103b4ed73bb1d5799ddfd7de001c422a3f70b6c7ee2f7856b8df81a7855ee0ee1164
-
Filesize
1KB
MD50881f98e50d12407a00e069e49092993
SHA1f088af235caa852efb2b5878e5b14b9bac472c7d
SHA2569166e27fe4b555a3999a687db9d866e235af614a1a7ce36c12c5a7dd87eb69b5
SHA512fc00627153aeb7af566c96ea9d260a8615aecde4b453c12eb312d0e7034c5915eb93379df96def486fdf063405f0cba8ebfddd64624eedef1ec80a939b022b54
-
Filesize
6KB
MD5fea694e06d8323c64d12ed2db0744960
SHA16befcd3db48c5e45c4ba68e094bdaa34981352dc
SHA25683612c9cce469e36fdd5263d11810b73edc66bc65168ebfc93f5c553799c958c
SHA512804d71df88d902e1cacf3233c5fd7d2d93cb18cd9f22cb9c842278d870898f1371105eed56dd53f2db3d069daa36864b60097141791f3274567697132126ecfa
-
Filesize
6KB
MD52e6ca9a4e41421a773da50bf7a8791f1
SHA1655b0fe353b16d7e3bd7998d6aa7469286863519
SHA256f645e1b3d34cf611ebea6b806e6b9640c007401719afbef52b2fec4dd7df4d8e
SHA512f6b87e1b636353bc720c42fbeab40f7990c7a54691c9603fd235a62dd9ec3f03b3d53726ebb4acd93c43b7c1c07df0b08150a76b3504ab4420d4def0325b3e84
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5d46182c27fe029054118a3a05da09d2c
SHA1f67041dbed4e547137dd0b1c3bf888f9e22f2fe3
SHA25656aabfaba072d61f9c22b1738679af7e34fbb171eb7d73824d8311de0decef78
SHA51279db677704f3c960de1be3016a86387d2b35afd8a9e3601b494e45c32842f53dfa2f1a43304d0ef1be067d02d07c0ccfc47d2c104bd6142e38a0b5584e22dd2f