Analysis
-
max time kernel
141s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
14/05/2024, 23:24
Static task
static1
Behavioral task
behavioral1
Sample
438b8c81d4030779302144b1496e8ffb_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
438b8c81d4030779302144b1496e8ffb_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
438b8c81d4030779302144b1496e8ffb_JaffaCakes118.html
-
Size
49KB
-
MD5
438b8c81d4030779302144b1496e8ffb
-
SHA1
3a1f37be33b1fa97b7c05c04b987385d667aac9b
-
SHA256
08793baf838827bf622d36a97c4fb35e6fefbececabf4c4a3ba3593ab1361287
-
SHA512
2db754cd6926608ec0a3907b8050cd9c74fb11cac4a2ae80659ab95a37a5815b6ffb7def3aa6965d8233fadd79a1034664e2c5570697ef0bd9eaa288886120eb
-
SSDEEP
1536:SdsJaYT//xsnzNm9F18HRdsHsnzNm9F18HVAvMUIe7J+JUZKU0qAO9v471tuCP69:SdsJaYT//xsn4cdsHsn4/7JkUZKU0qAE
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4744 msedge.exe 4744 msedge.exe 1436 msedge.exe 1436 msedge.exe 4920 identity_helper.exe 4920 identity_helper.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1436 wrote to memory of 3796 1436 msedge.exe 81 PID 1436 wrote to memory of 3796 1436 msedge.exe 81 PID 1436 wrote to memory of 1176 1436 msedge.exe 82 PID 1436 wrote to memory of 1176 1436 msedge.exe 82 PID 1436 wrote to memory of 1176 1436 msedge.exe 82 PID 1436 wrote to memory of 1176 1436 msedge.exe 82 PID 1436 wrote to memory of 1176 1436 msedge.exe 82 PID 1436 wrote to memory of 1176 1436 msedge.exe 82 PID 1436 wrote to memory of 1176 1436 msedge.exe 82 PID 1436 wrote to memory of 1176 1436 msedge.exe 82 PID 1436 wrote to memory of 1176 1436 msedge.exe 82 PID 1436 wrote to memory of 1176 1436 msedge.exe 82 PID 1436 wrote to memory of 1176 1436 msedge.exe 82 PID 1436 wrote to memory of 1176 1436 msedge.exe 82 PID 1436 wrote to memory of 1176 1436 msedge.exe 82 PID 1436 wrote to memory of 1176 1436 msedge.exe 82 PID 1436 wrote to memory of 1176 1436 msedge.exe 82 PID 1436 wrote to memory of 1176 1436 msedge.exe 82 PID 1436 wrote to memory of 1176 1436 msedge.exe 82 PID 1436 wrote to memory of 1176 1436 msedge.exe 82 PID 1436 wrote to memory of 1176 1436 msedge.exe 82 PID 1436 wrote to memory of 1176 1436 msedge.exe 82 PID 1436 wrote to memory of 1176 1436 msedge.exe 82 PID 1436 wrote to memory of 1176 1436 msedge.exe 82 PID 1436 wrote to memory of 1176 1436 msedge.exe 82 PID 1436 wrote to memory of 1176 1436 msedge.exe 82 PID 1436 wrote to memory of 1176 1436 msedge.exe 82 PID 1436 wrote to memory of 1176 1436 msedge.exe 82 PID 1436 wrote to memory of 1176 1436 msedge.exe 82 PID 1436 wrote to memory of 1176 1436 msedge.exe 82 PID 1436 wrote to memory of 1176 1436 msedge.exe 82 PID 1436 wrote to memory of 1176 1436 msedge.exe 82 PID 1436 wrote to memory of 1176 1436 msedge.exe 82 PID 1436 wrote to memory of 1176 1436 msedge.exe 82 PID 1436 wrote to memory of 1176 1436 msedge.exe 82 PID 1436 wrote to memory of 1176 1436 msedge.exe 82 PID 1436 wrote to memory of 1176 1436 msedge.exe 82 PID 1436 wrote to memory of 1176 1436 msedge.exe 82 PID 1436 wrote to memory of 1176 1436 msedge.exe 82 PID 1436 wrote to memory of 1176 1436 msedge.exe 82 PID 1436 wrote to memory of 1176 1436 msedge.exe 82 PID 1436 wrote to memory of 1176 1436 msedge.exe 82 PID 1436 wrote to memory of 4744 1436 msedge.exe 83 PID 1436 wrote to memory of 4744 1436 msedge.exe 83 PID 1436 wrote to memory of 1244 1436 msedge.exe 84 PID 1436 wrote to memory of 1244 1436 msedge.exe 84 PID 1436 wrote to memory of 1244 1436 msedge.exe 84 PID 1436 wrote to memory of 1244 1436 msedge.exe 84 PID 1436 wrote to memory of 1244 1436 msedge.exe 84 PID 1436 wrote to memory of 1244 1436 msedge.exe 84 PID 1436 wrote to memory of 1244 1436 msedge.exe 84 PID 1436 wrote to memory of 1244 1436 msedge.exe 84 PID 1436 wrote to memory of 1244 1436 msedge.exe 84 PID 1436 wrote to memory of 1244 1436 msedge.exe 84 PID 1436 wrote to memory of 1244 1436 msedge.exe 84 PID 1436 wrote to memory of 1244 1436 msedge.exe 84 PID 1436 wrote to memory of 1244 1436 msedge.exe 84 PID 1436 wrote to memory of 1244 1436 msedge.exe 84 PID 1436 wrote to memory of 1244 1436 msedge.exe 84 PID 1436 wrote to memory of 1244 1436 msedge.exe 84 PID 1436 wrote to memory of 1244 1436 msedge.exe 84 PID 1436 wrote to memory of 1244 1436 msedge.exe 84 PID 1436 wrote to memory of 1244 1436 msedge.exe 84 PID 1436 wrote to memory of 1244 1436 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\438b8c81d4030779302144b1496e8ffb_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1436 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff089646f8,0x7fff08964708,0x7fff089647182⤵PID:3796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,14377534194291547083,4188953220692357918,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:22⤵PID:1176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,14377534194291547083,4188953220692357918,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2464 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2080,14377534194291547083,4188953220692357918,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2960 /prefetch:82⤵PID:1244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,14377534194291547083,4188953220692357918,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:2368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,14377534194291547083,4188953220692357918,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:60
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,14377534194291547083,4188953220692357918,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4960 /prefetch:12⤵PID:5064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,14377534194291547083,4188953220692357918,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3840 /prefetch:12⤵PID:2384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,14377534194291547083,4188953220692357918,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3120 /prefetch:12⤵PID:4388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,14377534194291547083,4188953220692357918,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3356 /prefetch:82⤵PID:4832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,14377534194291547083,4188953220692357918,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3356 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,14377534194291547083,4188953220692357918,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3368 /prefetch:12⤵PID:3576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,14377534194291547083,4188953220692357918,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6056 /prefetch:12⤵PID:4612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,14377534194291547083,4188953220692357918,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5348 /prefetch:12⤵PID:2556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,14377534194291547083,4188953220692357918,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5284 /prefetch:12⤵PID:2392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,14377534194291547083,4188953220692357918,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3960 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4460
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4056
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:756
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD54eb39a13f6d3cef0a6cd6d0d3904fd99
SHA192ee61664d10fd0e71f17ed61be33e33a4f2f7f2
SHA256d7cc0e51333b6a3fb16be67ad944af305b45f7e5d240301df95cf44dce15b96b
SHA512b49ea67f1947a32ab486f071162f2b09d3947c1367970301fe6bbd305a161f52470518b5feb55e275a524a4e1836ed86532a7c4bbc756ca369f44d3c0cd9d4c9
-
Filesize
543B
MD5beef58b509d2a92ebb25de5c4175633f
SHA1d219c927310df79ddd007550bc3afb73ce11c4c0
SHA25669fbf6d05f9bbb622da262b7835b22f5f5bb7ec6d31420d1c00a4d6da551819c
SHA512435c61ea83cf868b4d50cbabc0d24481d8f2eba3d30fd783b69f9f555966170378152683cb5b93cbf72e4f1a1e772fa6c356900d8243c9d4b46aa5a6a30d80f0
-
Filesize
6KB
MD515f3c8198e5c08cebe9fef7d23a2c577
SHA12d54171c5648f0882f3400b921986d29505af78d
SHA2567a5acc4cba422647da7b490d5b46a14b9dacd6e8fc273491fa29f234420300f0
SHA51208b466a221ac06e31c580f8a7fdd9de3dcea3d0e4d27f0b54758080939b4284250e21cad7de4b8c06dee918129cd269cc7b9b6014eeb23515081512ce7e1a59f
-
Filesize
6KB
MD5924d97b684658238db401c7685773d84
SHA16126c43a4034f38a0451980a4a8b9ed00523ad62
SHA2560d091aa6cde3f312060919cce301e11447fcce90f4f9041efc2130bc19a6f8b9
SHA5125382ccef79101074ae973788ffdd61ca6aec37d88cd78081708a835435ac0315bfc870536bb72fa689bc9fb075bda707de2422b45d82046778f48b7959e409da
-
Filesize
7KB
MD5b521a0a11e3f2483e11da22f64e9cd54
SHA15f1c936f986db909909fb831d7624c260ab61c2e
SHA25654caa622b9b0c861d5412bfccaf5d148d5a476c0811f71196c241df7477d29ee
SHA512e75c81c0d92854242156dd407dfb02d133f5c8cf00ef93b79cd7a9a7d4aaf5a561f684a1dade71d176658e2ed9d827a5d4ae2e953280d2112386f3e7c5380c92
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD58fd276a40d9428b9cf48d80cc330541f
SHA114bd1ca151a104a6cc327e4dc37d9d3a8910ab47
SHA2565da77adba4159fb416f9acc494215f4c09fb44d6d1e3def99b2466769403959a
SHA51279e4a6f9c4a7942fb9bc7c094c4081f626d901f5a91c2fdd95268330811b00d830b2365e039e156c01a2b8e2983a848a1b2a9d7d4370aa0d02545a8e93408493