Analysis
-
max time kernel
147s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
13-05-2024 23:47
Static task
static1
Behavioral task
behavioral1
Sample
3d13a3454b8e9a0dcbb93f5094e49e87_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
3d13a3454b8e9a0dcbb93f5094e49e87_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
3d13a3454b8e9a0dcbb93f5094e49e87_JaffaCakes118.html
-
Size
21KB
-
MD5
3d13a3454b8e9a0dcbb93f5094e49e87
-
SHA1
83704292a09ce0b83b1a8724c2fecb6acec8455a
-
SHA256
bbdf7456eefce71ef7f6a30890b5bf05a0454c988e32a3ae9282b0100000ec48
-
SHA512
155cb49209d7c995fba7863f2522e8a68e0d8e21bbfac7aff905f29381a8604ccdd9fd429a2618327bf647dba04fbfed93ee453c771b81ed487b436bc6ff37e5
-
SSDEEP
384:FRlSZ3msWPrJ97BMUtUrrNz6ZgC4+tNeJk0uUqSo+FWirxvuai6:pSZ3msWPrJ97C1C4xJk0uUqS98irxvP/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 3260 msedge.exe 3260 msedge.exe 4408 msedge.exe 4408 msedge.exe 1068 identity_helper.exe 1068 identity_helper.exe 1068 identity_helper.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4408 wrote to memory of 4808 4408 msedge.exe 82 PID 4408 wrote to memory of 4808 4408 msedge.exe 82 PID 4408 wrote to memory of 4420 4408 msedge.exe 85 PID 4408 wrote to memory of 4420 4408 msedge.exe 85 PID 4408 wrote to memory of 4420 4408 msedge.exe 85 PID 4408 wrote to memory of 4420 4408 msedge.exe 85 PID 4408 wrote to memory of 4420 4408 msedge.exe 85 PID 4408 wrote to memory of 4420 4408 msedge.exe 85 PID 4408 wrote to memory of 4420 4408 msedge.exe 85 PID 4408 wrote to memory of 4420 4408 msedge.exe 85 PID 4408 wrote to memory of 4420 4408 msedge.exe 85 PID 4408 wrote to memory of 4420 4408 msedge.exe 85 PID 4408 wrote to memory of 4420 4408 msedge.exe 85 PID 4408 wrote to memory of 4420 4408 msedge.exe 85 PID 4408 wrote to memory of 4420 4408 msedge.exe 85 PID 4408 wrote to memory of 4420 4408 msedge.exe 85 PID 4408 wrote to memory of 4420 4408 msedge.exe 85 PID 4408 wrote to memory of 4420 4408 msedge.exe 85 PID 4408 wrote to memory of 4420 4408 msedge.exe 85 PID 4408 wrote to memory of 4420 4408 msedge.exe 85 PID 4408 wrote to memory of 4420 4408 msedge.exe 85 PID 4408 wrote to memory of 4420 4408 msedge.exe 85 PID 4408 wrote to memory of 4420 4408 msedge.exe 85 PID 4408 wrote to memory of 4420 4408 msedge.exe 85 PID 4408 wrote to memory of 4420 4408 msedge.exe 85 PID 4408 wrote to memory of 4420 4408 msedge.exe 85 PID 4408 wrote to memory of 4420 4408 msedge.exe 85 PID 4408 wrote to memory of 4420 4408 msedge.exe 85 PID 4408 wrote to memory of 4420 4408 msedge.exe 85 PID 4408 wrote to memory of 4420 4408 msedge.exe 85 PID 4408 wrote to memory of 4420 4408 msedge.exe 85 PID 4408 wrote to memory of 4420 4408 msedge.exe 85 PID 4408 wrote to memory of 4420 4408 msedge.exe 85 PID 4408 wrote to memory of 4420 4408 msedge.exe 85 PID 4408 wrote to memory of 4420 4408 msedge.exe 85 PID 4408 wrote to memory of 4420 4408 msedge.exe 85 PID 4408 wrote to memory of 4420 4408 msedge.exe 85 PID 4408 wrote to memory of 4420 4408 msedge.exe 85 PID 4408 wrote to memory of 4420 4408 msedge.exe 85 PID 4408 wrote to memory of 4420 4408 msedge.exe 85 PID 4408 wrote to memory of 4420 4408 msedge.exe 85 PID 4408 wrote to memory of 4420 4408 msedge.exe 85 PID 4408 wrote to memory of 3260 4408 msedge.exe 86 PID 4408 wrote to memory of 3260 4408 msedge.exe 86 PID 4408 wrote to memory of 8 4408 msedge.exe 87 PID 4408 wrote to memory of 8 4408 msedge.exe 87 PID 4408 wrote to memory of 8 4408 msedge.exe 87 PID 4408 wrote to memory of 8 4408 msedge.exe 87 PID 4408 wrote to memory of 8 4408 msedge.exe 87 PID 4408 wrote to memory of 8 4408 msedge.exe 87 PID 4408 wrote to memory of 8 4408 msedge.exe 87 PID 4408 wrote to memory of 8 4408 msedge.exe 87 PID 4408 wrote to memory of 8 4408 msedge.exe 87 PID 4408 wrote to memory of 8 4408 msedge.exe 87 PID 4408 wrote to memory of 8 4408 msedge.exe 87 PID 4408 wrote to memory of 8 4408 msedge.exe 87 PID 4408 wrote to memory of 8 4408 msedge.exe 87 PID 4408 wrote to memory of 8 4408 msedge.exe 87 PID 4408 wrote to memory of 8 4408 msedge.exe 87 PID 4408 wrote to memory of 8 4408 msedge.exe 87 PID 4408 wrote to memory of 8 4408 msedge.exe 87 PID 4408 wrote to memory of 8 4408 msedge.exe 87 PID 4408 wrote to memory of 8 4408 msedge.exe 87 PID 4408 wrote to memory of 8 4408 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\3d13a3454b8e9a0dcbb93f5094e49e87_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4408 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8fe9b46f8,0x7ff8fe9b4708,0x7ff8fe9b47182⤵PID:4808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,14914315145910873038,8555683876837731096,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2060 /prefetch:22⤵PID:4420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2044,14914315145910873038,8555683876837731096,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2232 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2044,14914315145910873038,8555683876837731096,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2940 /prefetch:82⤵PID:8
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,14914315145910873038,8555683876837731096,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:2740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,14914315145910873038,8555683876837731096,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:4628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,14914315145910873038,8555683876837731096,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4800 /prefetch:12⤵PID:2340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,14914315145910873038,8555683876837731096,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5544 /prefetch:12⤵PID:2612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,14914315145910873038,8555683876837731096,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5788 /prefetch:12⤵PID:3976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,14914315145910873038,8555683876837731096,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3520 /prefetch:12⤵PID:2292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2044,14914315145910873038,8555683876837731096,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5584 /prefetch:82⤵PID:1532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2044,14914315145910873038,8555683876837731096,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5584 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,14914315145910873038,8555683876837731096,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4524 /prefetch:12⤵PID:3412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,14914315145910873038,8555683876837731096,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6080 /prefetch:12⤵PID:1864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,14914315145910873038,8555683876837731096,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2992 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4816
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2920
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4608
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize168B
MD5139fbe0f2f897bd8364429f2a8e22045
SHA121f911c89521484e95e68b7358586b74cc541832
SHA25694e7db9e610a9b1204a24fa6f302076b2b76d015d7144ee89fee7cfca89de645
SHA512b61370cdaef73ec95899b9143a1085f83038367c1191a0c8a847b4ec866a0586f1cc6fb4290a979e31036a3a0d40dbbec18b36ebb023e2483e3519d21580a374
-
Filesize
627B
MD592fd42ce5eddc3eefd2ea8e9279e61fe
SHA1dd15116a225f17b54a931f1d31c1992e8df491b7
SHA2568d7a7cfe0fde3e42500473bea2b3a0d3343fde46db0d71f4720326f2730631b3
SHA512013ba7939b582daa9c75a86560d7602deb9e02205841b00483ae3a75aa92203542b61cbd28b399b629fbedfff4411bde80b9a786711f131889a12a3a8f6c2f59
-
Filesize
6KB
MD5bc98284cb912891759e2a86ed0809ed0
SHA16f0d793242357aa9d6809b3cd5c4c6adc61713ca
SHA256b0c9709e33461f961d339f1df88fa879103936e7fa6d003b024a9a7ab58b25bd
SHA512e58fabc53f9c5171c32976976aad768825a6e67a656e7d9c2c20b91efc5e2a4629c0eefaa3b850f07390f6675cf29bbf2718b665f0af0b384b4dba72cf905f70
-
Filesize
6KB
MD5b4b95e3cb271d2254f4aeac0956b2635
SHA141ddf36073eb64287a8498b774b22c9d8f0434ec
SHA2569e6d121621946dc92b99a77ea284fe79a9c55fcc477d011d5de6482bd52f807c
SHA512e02ef836bc3c66298d85c389d9725fb8cbdfece3925543b6c4e68a5ae6fd536c1d0cc78681fdb714deab3379e4585852508391641ca5ab7f12ddeda0735e75d7
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD5d2d01e2e6e1908ddf2be9d3ba2b3964b
SHA109a5f353561ca47e7d3a494137dd55a2917c2227
SHA2564766eb6827447d45b9fe17c9092e45498adfb7b1730aa4ad380b7e3182ef3353
SHA5120f8f5967f5f6032f3f39da46e6f16aec05f1a8927ea6be83630046d25f4c992eb7f1da968186d7b3ca47257c70b5d6e2e5ab108e78d15fb414966491e88548f0