Analysis
-
max time kernel
145s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
13/05/2024, 23:52
Static task
static1
Behavioral task
behavioral1
Sample
3d17d0b7ccaad01851120042177fe30a_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
3d17d0b7ccaad01851120042177fe30a_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
3d17d0b7ccaad01851120042177fe30a_JaffaCakes118.html
-
Size
25KB
-
MD5
3d17d0b7ccaad01851120042177fe30a
-
SHA1
64b697677bdd2e57b441ebe840a0c9666970c226
-
SHA256
7d393e5db222fdee65ffe285cabe1c2c483c88d88554c83af9b4ee25943a0760
-
SHA512
3302650e46625bc826f4032c1263b1392e65676377714c5191b15cfe6ccb34f4ff9de789dc7c1c09a47860734b2496380e780803385b18c4128fdfeceb07f03d
-
SSDEEP
384:rtc0N8AF0UCgjpF+Th1gjAWpJHZxjleDzvCSnAawBob1YUc05Us+HLROaR7/MoMc:rG0tC821eA0H8L2oukQYX+Q+JsIXLX
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3060 msedge.exe 3060 msedge.exe 1124 msedge.exe 1124 msedge.exe 2144 identity_helper.exe 2144 identity_helper.exe 3844 msedge.exe 3844 msedge.exe 3844 msedge.exe 3844 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe 1124 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1124 wrote to memory of 3744 1124 msedge.exe 82 PID 1124 wrote to memory of 3744 1124 msedge.exe 82 PID 1124 wrote to memory of 1184 1124 msedge.exe 83 PID 1124 wrote to memory of 1184 1124 msedge.exe 83 PID 1124 wrote to memory of 1184 1124 msedge.exe 83 PID 1124 wrote to memory of 1184 1124 msedge.exe 83 PID 1124 wrote to memory of 1184 1124 msedge.exe 83 PID 1124 wrote to memory of 1184 1124 msedge.exe 83 PID 1124 wrote to memory of 1184 1124 msedge.exe 83 PID 1124 wrote to memory of 1184 1124 msedge.exe 83 PID 1124 wrote to memory of 1184 1124 msedge.exe 83 PID 1124 wrote to memory of 1184 1124 msedge.exe 83 PID 1124 wrote to memory of 1184 1124 msedge.exe 83 PID 1124 wrote to memory of 1184 1124 msedge.exe 83 PID 1124 wrote to memory of 1184 1124 msedge.exe 83 PID 1124 wrote to memory of 1184 1124 msedge.exe 83 PID 1124 wrote to memory of 1184 1124 msedge.exe 83 PID 1124 wrote to memory of 1184 1124 msedge.exe 83 PID 1124 wrote to memory of 1184 1124 msedge.exe 83 PID 1124 wrote to memory of 1184 1124 msedge.exe 83 PID 1124 wrote to memory of 1184 1124 msedge.exe 83 PID 1124 wrote to memory of 1184 1124 msedge.exe 83 PID 1124 wrote to memory of 1184 1124 msedge.exe 83 PID 1124 wrote to memory of 1184 1124 msedge.exe 83 PID 1124 wrote to memory of 1184 1124 msedge.exe 83 PID 1124 wrote to memory of 1184 1124 msedge.exe 83 PID 1124 wrote to memory of 1184 1124 msedge.exe 83 PID 1124 wrote to memory of 1184 1124 msedge.exe 83 PID 1124 wrote to memory of 1184 1124 msedge.exe 83 PID 1124 wrote to memory of 1184 1124 msedge.exe 83 PID 1124 wrote to memory of 1184 1124 msedge.exe 83 PID 1124 wrote to memory of 1184 1124 msedge.exe 83 PID 1124 wrote to memory of 1184 1124 msedge.exe 83 PID 1124 wrote to memory of 1184 1124 msedge.exe 83 PID 1124 wrote to memory of 1184 1124 msedge.exe 83 PID 1124 wrote to memory of 1184 1124 msedge.exe 83 PID 1124 wrote to memory of 1184 1124 msedge.exe 83 PID 1124 wrote to memory of 1184 1124 msedge.exe 83 PID 1124 wrote to memory of 1184 1124 msedge.exe 83 PID 1124 wrote to memory of 1184 1124 msedge.exe 83 PID 1124 wrote to memory of 1184 1124 msedge.exe 83 PID 1124 wrote to memory of 1184 1124 msedge.exe 83 PID 1124 wrote to memory of 3060 1124 msedge.exe 84 PID 1124 wrote to memory of 3060 1124 msedge.exe 84 PID 1124 wrote to memory of 4464 1124 msedge.exe 85 PID 1124 wrote to memory of 4464 1124 msedge.exe 85 PID 1124 wrote to memory of 4464 1124 msedge.exe 85 PID 1124 wrote to memory of 4464 1124 msedge.exe 85 PID 1124 wrote to memory of 4464 1124 msedge.exe 85 PID 1124 wrote to memory of 4464 1124 msedge.exe 85 PID 1124 wrote to memory of 4464 1124 msedge.exe 85 PID 1124 wrote to memory of 4464 1124 msedge.exe 85 PID 1124 wrote to memory of 4464 1124 msedge.exe 85 PID 1124 wrote to memory of 4464 1124 msedge.exe 85 PID 1124 wrote to memory of 4464 1124 msedge.exe 85 PID 1124 wrote to memory of 4464 1124 msedge.exe 85 PID 1124 wrote to memory of 4464 1124 msedge.exe 85 PID 1124 wrote to memory of 4464 1124 msedge.exe 85 PID 1124 wrote to memory of 4464 1124 msedge.exe 85 PID 1124 wrote to memory of 4464 1124 msedge.exe 85 PID 1124 wrote to memory of 4464 1124 msedge.exe 85 PID 1124 wrote to memory of 4464 1124 msedge.exe 85 PID 1124 wrote to memory of 4464 1124 msedge.exe 85 PID 1124 wrote to memory of 4464 1124 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\3d17d0b7ccaad01851120042177fe30a_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1124 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff61f746f8,0x7fff61f74708,0x7fff61f747182⤵PID:3744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,3715705524350591985,431073346011113341,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2096 /prefetch:22⤵PID:1184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,3715705524350591985,431073346011113341,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2228 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,3715705524350591985,431073346011113341,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2900 /prefetch:82⤵PID:4464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,3715705524350591985,431073346011113341,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:2136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,3715705524350591985,431073346011113341,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:12⤵PID:1528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,3715705524350591985,431073346011113341,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5080 /prefetch:12⤵PID:3384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,3715705524350591985,431073346011113341,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5580 /prefetch:82⤵PID:4224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,3715705524350591985,431073346011113341,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5580 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,3715705524350591985,431073346011113341,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5888 /prefetch:12⤵PID:2280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,3715705524350591985,431073346011113341,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5800 /prefetch:12⤵PID:1756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,3715705524350591985,431073346011113341,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4952 /prefetch:12⤵PID:2028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,3715705524350591985,431073346011113341,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4712 /prefetch:12⤵PID:4852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,3715705524350591985,431073346011113341,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3032 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3844
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1128
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4516
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51ac52e2503cc26baee4322f02f5b8d9c
SHA138e0cee911f5f2a24888a64780ffdf6fa72207c8
SHA256f65058c6f1a745b37a64d4c97a8e8ee940210273130cec97a67f568088b5d4d4
SHA5127670d606bc5197ecb7db3ddaecd6f74a80e6decae92b94e0e8145a7f463fa099058e89f9dfa1c45b9197c36e5e21994698186a2ec970bbdb0937fe28ca46a834
-
Filesize
152B
MD5b2a1398f937474c51a48b347387ee36a
SHA1922a8567f09e68a04233e84e5919043034635949
SHA2562dc0bf08246ddd5a32288c895d676017578d792349ca437b1b36e7b2f0ade6d6
SHA5124a660c0549f7a850e07d8d36dab33121af02a7bd7e9b2f0137930b4c8cd89b6c5630e408f882684e6935dcb0d5cb5e01a854950eeda252a4881458cafcc7ef7c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD52ac84256cddf71774c4cef82f344448e
SHA1dc179cb1edf81bf6ef5c6db29ac1715f681f014a
SHA256421f6395df247b4ce4b50606a257951969a2992b70064fadcb17d089a85b965b
SHA5125f4bf4dfcef9ea94779499ca04edd8512af05a5435305f51703fc38b028ee7592bc75531d06b0252913bea63bb4904b28f4bac88637e6b98913b3f00bdf8bc10
-
Filesize
644B
MD573e4e05c6b763759dbc8f30f5852e9ce
SHA114d2a86b8dc6e87dcdb17a2daea0fc7aa3ecba06
SHA256e90441b54fc705fe42fa0aeda76b8b4696e41c403d88d0e31e4809bd5737b0e0
SHA512b193b56e9e5ce597e6dcc26868a46b3c4230c0901eafecfeef567d99784e62e94e85d15d24a0b2c9b55611ab373c92688904109a55ed5b42d7d0c4f2cd3d3b75
-
Filesize
5KB
MD567b845289fc8550f4b247c4e6ce48070
SHA13e6238daf9a050b8a3df8a7b7c045f12b50c7a86
SHA25688203ef4657c7c790c3b87bd9d47d5ce045409e9d2f45e3b9e66f4566e3d6ef4
SHA5123c025e56023f58efd483eae60d5db5d363881d7544ae9666773744c6b0301b6c67164d0b01f8a9e1b758e28342bdfcd264c7450ccbc47186e8710ba72e2de41d
-
Filesize
6KB
MD524ddf250df11724004e30fc9fb545d18
SHA11fb53b7a76c5dfd8dfe98764f7243054ce411ec6
SHA256708ae70d35c7180149a8dc959bfcc12563f45ac10c3ba25f298287178c7efffe
SHA5129255f1cf06aa0c6d02b1417f1cb33aeab80cec46dd4e0e0661afe1bac7f55951a63a562bf48ec94929757f23996a556324c19b798220b6e8454123101c28397c
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5a898adfa38d35b86dd5005a8cfeb46c9
SHA1dd3d04f17126ee1e84e3dd8f9eaa71bec03cdf2b
SHA2565734c29ae5bfb54793bdafbbf516de756a7835a9275446a42a1503fcbbb90c19
SHA512b47c805e887806d203403c6cb847fdca861257f6e7936268f10b316aa12040cebfc23ddb9f04d694fa8c01ff3feb1cd5f389a4e6df5e42dceebb2a74f0ab1255