Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
14/05/2024, 01:02
Static task
static1
Behavioral task
behavioral1
Sample
3d4e64ad45fb2b4ef9e2652227c037e0_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
3d4e64ad45fb2b4ef9e2652227c037e0_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
3d4e64ad45fb2b4ef9e2652227c037e0_JaffaCakes118.html
-
Size
131KB
-
MD5
3d4e64ad45fb2b4ef9e2652227c037e0
-
SHA1
b5318547d80e8f2f00ee1c6423878f793f2c980e
-
SHA256
dc96daad0865befc98adc71ae6786c4f2ddf4a708a82df07383188d0d8047944
-
SHA512
ea7e97ee16aa70203abc969909af177c3eab780b66eb4c3c3a51b55ce6464b64a547119bd6786665da7c4c320aa7feca6a8e9049fd86f961f3dfdb8f97eebcd6
-
SSDEEP
1536:gAJ2p00/GgrMpN3MeeCaMeeejMeeONMee91MeeU2Mee3YoScMeey3MeeSsMeeB8t:P0/GgrMp/ZSnzH/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2752 msedge.exe 2752 msedge.exe 4168 msedge.exe 4168 msedge.exe 1652 identity_helper.exe 1652 identity_helper.exe 1264 msedge.exe 1264 msedge.exe 1264 msedge.exe 1264 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 4168 msedge.exe 4168 msedge.exe 4168 msedge.exe 4168 msedge.exe 4168 msedge.exe 4168 msedge.exe 4168 msedge.exe 4168 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4168 msedge.exe 4168 msedge.exe 4168 msedge.exe 4168 msedge.exe 4168 msedge.exe 4168 msedge.exe 4168 msedge.exe 4168 msedge.exe 4168 msedge.exe 4168 msedge.exe 4168 msedge.exe 4168 msedge.exe 4168 msedge.exe 4168 msedge.exe 4168 msedge.exe 4168 msedge.exe 4168 msedge.exe 4168 msedge.exe 4168 msedge.exe 4168 msedge.exe 4168 msedge.exe 4168 msedge.exe 4168 msedge.exe 4168 msedge.exe 4168 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4168 msedge.exe 4168 msedge.exe 4168 msedge.exe 4168 msedge.exe 4168 msedge.exe 4168 msedge.exe 4168 msedge.exe 4168 msedge.exe 4168 msedge.exe 4168 msedge.exe 4168 msedge.exe 4168 msedge.exe 4168 msedge.exe 4168 msedge.exe 4168 msedge.exe 4168 msedge.exe 4168 msedge.exe 4168 msedge.exe 4168 msedge.exe 4168 msedge.exe 4168 msedge.exe 4168 msedge.exe 4168 msedge.exe 4168 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4168 wrote to memory of 3472 4168 msedge.exe 82 PID 4168 wrote to memory of 3472 4168 msedge.exe 82 PID 4168 wrote to memory of 1712 4168 msedge.exe 83 PID 4168 wrote to memory of 1712 4168 msedge.exe 83 PID 4168 wrote to memory of 1712 4168 msedge.exe 83 PID 4168 wrote to memory of 1712 4168 msedge.exe 83 PID 4168 wrote to memory of 1712 4168 msedge.exe 83 PID 4168 wrote to memory of 1712 4168 msedge.exe 83 PID 4168 wrote to memory of 1712 4168 msedge.exe 83 PID 4168 wrote to memory of 1712 4168 msedge.exe 83 PID 4168 wrote to memory of 1712 4168 msedge.exe 83 PID 4168 wrote to memory of 1712 4168 msedge.exe 83 PID 4168 wrote to memory of 1712 4168 msedge.exe 83 PID 4168 wrote to memory of 1712 4168 msedge.exe 83 PID 4168 wrote to memory of 1712 4168 msedge.exe 83 PID 4168 wrote to memory of 1712 4168 msedge.exe 83 PID 4168 wrote to memory of 1712 4168 msedge.exe 83 PID 4168 wrote to memory of 1712 4168 msedge.exe 83 PID 4168 wrote to memory of 1712 4168 msedge.exe 83 PID 4168 wrote to memory of 1712 4168 msedge.exe 83 PID 4168 wrote to memory of 1712 4168 msedge.exe 83 PID 4168 wrote to memory of 1712 4168 msedge.exe 83 PID 4168 wrote to memory of 1712 4168 msedge.exe 83 PID 4168 wrote to memory of 1712 4168 msedge.exe 83 PID 4168 wrote to memory of 1712 4168 msedge.exe 83 PID 4168 wrote to memory of 1712 4168 msedge.exe 83 PID 4168 wrote to memory of 1712 4168 msedge.exe 83 PID 4168 wrote to memory of 1712 4168 msedge.exe 83 PID 4168 wrote to memory of 1712 4168 msedge.exe 83 PID 4168 wrote to memory of 1712 4168 msedge.exe 83 PID 4168 wrote to memory of 1712 4168 msedge.exe 83 PID 4168 wrote to memory of 1712 4168 msedge.exe 83 PID 4168 wrote to memory of 1712 4168 msedge.exe 83 PID 4168 wrote to memory of 1712 4168 msedge.exe 83 PID 4168 wrote to memory of 1712 4168 msedge.exe 83 PID 4168 wrote to memory of 1712 4168 msedge.exe 83 PID 4168 wrote to memory of 1712 4168 msedge.exe 83 PID 4168 wrote to memory of 1712 4168 msedge.exe 83 PID 4168 wrote to memory of 1712 4168 msedge.exe 83 PID 4168 wrote to memory of 1712 4168 msedge.exe 83 PID 4168 wrote to memory of 1712 4168 msedge.exe 83 PID 4168 wrote to memory of 1712 4168 msedge.exe 83 PID 4168 wrote to memory of 2752 4168 msedge.exe 84 PID 4168 wrote to memory of 2752 4168 msedge.exe 84 PID 4168 wrote to memory of 1932 4168 msedge.exe 85 PID 4168 wrote to memory of 1932 4168 msedge.exe 85 PID 4168 wrote to memory of 1932 4168 msedge.exe 85 PID 4168 wrote to memory of 1932 4168 msedge.exe 85 PID 4168 wrote to memory of 1932 4168 msedge.exe 85 PID 4168 wrote to memory of 1932 4168 msedge.exe 85 PID 4168 wrote to memory of 1932 4168 msedge.exe 85 PID 4168 wrote to memory of 1932 4168 msedge.exe 85 PID 4168 wrote to memory of 1932 4168 msedge.exe 85 PID 4168 wrote to memory of 1932 4168 msedge.exe 85 PID 4168 wrote to memory of 1932 4168 msedge.exe 85 PID 4168 wrote to memory of 1932 4168 msedge.exe 85 PID 4168 wrote to memory of 1932 4168 msedge.exe 85 PID 4168 wrote to memory of 1932 4168 msedge.exe 85 PID 4168 wrote to memory of 1932 4168 msedge.exe 85 PID 4168 wrote to memory of 1932 4168 msedge.exe 85 PID 4168 wrote to memory of 1932 4168 msedge.exe 85 PID 4168 wrote to memory of 1932 4168 msedge.exe 85 PID 4168 wrote to memory of 1932 4168 msedge.exe 85 PID 4168 wrote to memory of 1932 4168 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\3d4e64ad45fb2b4ef9e2652227c037e0_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4168 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbcb3246f8,0x7ffbcb324708,0x7ffbcb3247182⤵PID:3472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2028,5854354155989488822,11729323482214266784,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2064 /prefetch:22⤵PID:1712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2028,5854354155989488822,11729323482214266784,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2480 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2028,5854354155989488822,11729323482214266784,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2916 /prefetch:82⤵PID:1932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,5854354155989488822,11729323482214266784,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:12⤵PID:3620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,5854354155989488822,11729323482214266784,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:12⤵PID:1372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,5854354155989488822,11729323482214266784,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4956 /prefetch:12⤵PID:3756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,5854354155989488822,11729323482214266784,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3620 /prefetch:12⤵PID:4476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2028,5854354155989488822,11729323482214266784,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5732 /prefetch:82⤵PID:5108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2028,5854354155989488822,11729323482214266784,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5732 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,5854354155989488822,11729323482214266784,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4960 /prefetch:12⤵PID:1860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,5854354155989488822,11729323482214266784,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4240 /prefetch:12⤵PID:3512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,5854354155989488822,11729323482214266784,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5756 /prefetch:12⤵PID:2256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,5854354155989488822,11729323482214266784,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5776 /prefetch:12⤵PID:2592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2028,5854354155989488822,11729323482214266784,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=180 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1264
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3100
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3576
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f61fa5143fe872d1d8f1e9f8dc6544f9
SHA1df44bab94d7388fb38c63085ec4db80cfc5eb009
SHA256284a24b5b40860240db00ef3ae6a33c9fa8349ab5490a634e27b2c6e9a191c64
SHA512971000784a6518bb39c5cf043292c7ab659162275470f5f6b632ea91a6bcae83bc80517ceb983dd5abfe8fb4e157344cb65c27e609a879eec00b33c5fad563a6
-
Filesize
152B
MD587f7abeb82600e1e640b843ad50fe0a1
SHA1045bbada3f23fc59941bf7d0210fb160cb78ae87
SHA256b35d6906050d90a81d23646f86c20a8f5d42f058ffc6436fb0a2b8bd71ee1262
SHA512ea8e7f24ab823ad710ce079c86c40aa957353a00d2775732c23e31be88a10d212e974c4691279aa86016c4660f5795febf739a15207833df6ed964a9ed99d618
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD578a68a9ecfcf5dd696c75cd67a9daae8
SHA1253fe16353ee5d4a25c6e8673022b4dd2b703b91
SHA2563d6382ab75990fb9890c5cea6c8779fdafa2c7d3b6b6e7bcf472551bf894caf6
SHA5120efde8dceec64e8c630e87e324928cd9923f77b6b4b6fbc707f49660ded54817dddbd89e97356b15b7165dd02ceefc58c27b7d90f7fd269cee356a2479957b66
-
Filesize
1KB
MD5989f6783c1295a7225e1831d38a3822e
SHA1f07c7bccccb56bae2cc24f72c15ce9352f11a033
SHA256f388726e42ecf65ea3e7b30aa9d5249932e630bb3613ca868386fa903053195f
SHA51237646f6e4a230ccdedf836970d7b3ddab9def66e4d81afd99ae78ea3febd8481cdb08698e50091c0174b9a6db7b8ae11479a78a87c6e7a9695cc6973abe70df8
-
Filesize
6KB
MD555bff3b9a3e35d4976cafca8afb800d2
SHA11210cad3b1498b5014876002848fedb097657858
SHA256818300a2adaff83d8daab268efb718b6dd7eabc77847b6beaba11766bffda37b
SHA51230d189184c08f2de954aed14bdaa8efdc6039e0ff3d147310ef9e64504eb0f7d1c6f803e331e441c3f18928d1539a90c040d43714749b7dde0ee47a3ccfa0745
-
Filesize
6KB
MD50485a4747f1c1ab8072b5309c3ffb202
SHA1691d0bdf44221a2140916196a30a53e18fb8b239
SHA256f4379f4bed8045ca7c935fba2af5e1ca604b21c9fa1d87dfa49a689832cbd3fd
SHA5123668a725a369488d4fd9aad5fde78bae1503a89bf7cb4e6ee778439ad988578f576ea19ff19b0b4cbd8c57284d02ed4a062684bf747ca9a3161bc309b529f2f7
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5a229a0364e805521e1815881a91e1687
SHA17dbab93216100d2a1fa323c5cefd1970f27dc457
SHA256993c735aff97c518fe91d5f485cbf4e23730613f86d9e544dd65ca062c7f7180
SHA512a0009d9ebc4d547df757d51e03e0c3b01bc64fe1770b29a541057bbaae31b673c36a47b916991eb88664a1cdd8a463c847563738bcf261abdb05c3535af035b3