Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
14/05/2024, 05:47
Static task
static1
Behavioral task
behavioral1
Sample
3e170587ccdeef1345530300044ee47b_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3e170587ccdeef1345530300044ee47b_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
3e170587ccdeef1345530300044ee47b_JaffaCakes118.html
-
Size
75KB
-
MD5
3e170587ccdeef1345530300044ee47b
-
SHA1
97401ce5509da1ef723d7af54ef6f9aa6bfad1c4
-
SHA256
02ca5ed463941ca1459825b9c3aa31a28949c081cbcd7c8f826800d81dfb7129
-
SHA512
62211fc8c9a4855b3b4b391e9cfa6bb8279dcd25dcd44810e93d424bb0241618923dffe4c6aa2d3f17aa621bc4164645cd5a847c5b1bbcef76895a138c197737
-
SSDEEP
768:SX/g30BgtYTSxXyf39PjCtXN20bj9oDSY5NWbx10G2pGO:SXY3YyXNXbj9oDqm1pGO
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2004 msedge.exe 2004 msedge.exe 3552 msedge.exe 3552 msedge.exe 3120 identity_helper.exe 3120 identity_helper.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe 3552 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3552 wrote to memory of 4756 3552 msedge.exe 82 PID 3552 wrote to memory of 4756 3552 msedge.exe 82 PID 3552 wrote to memory of 4232 3552 msedge.exe 83 PID 3552 wrote to memory of 4232 3552 msedge.exe 83 PID 3552 wrote to memory of 4232 3552 msedge.exe 83 PID 3552 wrote to memory of 4232 3552 msedge.exe 83 PID 3552 wrote to memory of 4232 3552 msedge.exe 83 PID 3552 wrote to memory of 4232 3552 msedge.exe 83 PID 3552 wrote to memory of 4232 3552 msedge.exe 83 PID 3552 wrote to memory of 4232 3552 msedge.exe 83 PID 3552 wrote to memory of 4232 3552 msedge.exe 83 PID 3552 wrote to memory of 4232 3552 msedge.exe 83 PID 3552 wrote to memory of 4232 3552 msedge.exe 83 PID 3552 wrote to memory of 4232 3552 msedge.exe 83 PID 3552 wrote to memory of 4232 3552 msedge.exe 83 PID 3552 wrote to memory of 4232 3552 msedge.exe 83 PID 3552 wrote to memory of 4232 3552 msedge.exe 83 PID 3552 wrote to memory of 4232 3552 msedge.exe 83 PID 3552 wrote to memory of 4232 3552 msedge.exe 83 PID 3552 wrote to memory of 4232 3552 msedge.exe 83 PID 3552 wrote to memory of 4232 3552 msedge.exe 83 PID 3552 wrote to memory of 4232 3552 msedge.exe 83 PID 3552 wrote to memory of 4232 3552 msedge.exe 83 PID 3552 wrote to memory of 4232 3552 msedge.exe 83 PID 3552 wrote to memory of 4232 3552 msedge.exe 83 PID 3552 wrote to memory of 4232 3552 msedge.exe 83 PID 3552 wrote to memory of 4232 3552 msedge.exe 83 PID 3552 wrote to memory of 4232 3552 msedge.exe 83 PID 3552 wrote to memory of 4232 3552 msedge.exe 83 PID 3552 wrote to memory of 4232 3552 msedge.exe 83 PID 3552 wrote to memory of 4232 3552 msedge.exe 83 PID 3552 wrote to memory of 4232 3552 msedge.exe 83 PID 3552 wrote to memory of 4232 3552 msedge.exe 83 PID 3552 wrote to memory of 4232 3552 msedge.exe 83 PID 3552 wrote to memory of 4232 3552 msedge.exe 83 PID 3552 wrote to memory of 4232 3552 msedge.exe 83 PID 3552 wrote to memory of 4232 3552 msedge.exe 83 PID 3552 wrote to memory of 4232 3552 msedge.exe 83 PID 3552 wrote to memory of 4232 3552 msedge.exe 83 PID 3552 wrote to memory of 4232 3552 msedge.exe 83 PID 3552 wrote to memory of 4232 3552 msedge.exe 83 PID 3552 wrote to memory of 4232 3552 msedge.exe 83 PID 3552 wrote to memory of 2004 3552 msedge.exe 84 PID 3552 wrote to memory of 2004 3552 msedge.exe 84 PID 3552 wrote to memory of 4304 3552 msedge.exe 85 PID 3552 wrote to memory of 4304 3552 msedge.exe 85 PID 3552 wrote to memory of 4304 3552 msedge.exe 85 PID 3552 wrote to memory of 4304 3552 msedge.exe 85 PID 3552 wrote to memory of 4304 3552 msedge.exe 85 PID 3552 wrote to memory of 4304 3552 msedge.exe 85 PID 3552 wrote to memory of 4304 3552 msedge.exe 85 PID 3552 wrote to memory of 4304 3552 msedge.exe 85 PID 3552 wrote to memory of 4304 3552 msedge.exe 85 PID 3552 wrote to memory of 4304 3552 msedge.exe 85 PID 3552 wrote to memory of 4304 3552 msedge.exe 85 PID 3552 wrote to memory of 4304 3552 msedge.exe 85 PID 3552 wrote to memory of 4304 3552 msedge.exe 85 PID 3552 wrote to memory of 4304 3552 msedge.exe 85 PID 3552 wrote to memory of 4304 3552 msedge.exe 85 PID 3552 wrote to memory of 4304 3552 msedge.exe 85 PID 3552 wrote to memory of 4304 3552 msedge.exe 85 PID 3552 wrote to memory of 4304 3552 msedge.exe 85 PID 3552 wrote to memory of 4304 3552 msedge.exe 85 PID 3552 wrote to memory of 4304 3552 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\3e170587ccdeef1345530300044ee47b_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3552 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff1e8a46f8,0x7fff1e8a4708,0x7fff1e8a47182⤵PID:4756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2196,683451007242067292,18380406632166879996,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2224 /prefetch:22⤵PID:4232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2196,683451007242067292,18380406632166879996,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2344 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2196,683451007242067292,18380406632166879996,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2432 /prefetch:82⤵PID:4304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,683451007242067292,18380406632166879996,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3176 /prefetch:12⤵PID:2704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,683451007242067292,18380406632166879996,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:1984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,683451007242067292,18380406632166879996,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4172 /prefetch:12⤵PID:1100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,683451007242067292,18380406632166879996,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4668 /prefetch:12⤵PID:2172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2196,683451007242067292,18380406632166879996,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5696 /prefetch:82⤵PID:2320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2196,683451007242067292,18380406632166879996,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5696 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,683451007242067292,18380406632166879996,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5340 /prefetch:12⤵PID:640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,683451007242067292,18380406632166879996,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5360 /prefetch:12⤵PID:3316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,683451007242067292,18380406632166879996,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4084 /prefetch:12⤵PID:1292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,683451007242067292,18380406632166879996,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5092 /prefetch:12⤵PID:4388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2196,683451007242067292,18380406632166879996,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2016 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2368
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4568
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4452
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD575e6beb77804381a8d9b262d17f125a5
SHA18964ae03d11c7dbca05b9346f027e40ee72d3576
SHA256359b82fd74ea8831ebfaf652ac2399254e406092a4c2355cf055c819f9af554d
SHA5127e053d0a7dbd20e846a9330c4018d9f1c0d738db6615aeb758f637195406b46908c8c0a808b6f950f51cd385ea5565d8673860f57a2ff59da06d64fdd579f6fb
-
Filesize
152B
MD5537815e7cc5c694912ac0308147852e4
SHA12ccdd9d9dc637db5462fe8119c0df261146c363c
SHA256b4b69d099507d88abdeff4835e06cc6711e1c47464c963d013cef0a278e52d4f
SHA51263969a69af057235dbdecddc483ef5ce0058673179a3580c5aa12938c9501513cdb72dd703a06fa7d4fc08d074f17528283338c795334398497c771ecbd1350a
-
Filesize
152B
MD58b167567021ccb1a9fdf073fa9112ef0
SHA13baf293fbfaa7c1e7cdacb5f2975737f4ef69898
SHA25626764cedf35f118b55f30b3a36e0693f9f38290a5b2b6b8b83a00e990ae18513
SHA512726098001ef1acf1dd154a658752fa27dea32bca8fbb66395c142cb666102e71632adbad1b7e2f717071cd3e3af3867471932a71707f2ae97b989f4be468ab54
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize384B
MD523816d85c345bf8ad033b19297ee4ecd
SHA1b7f514c5ed1fdb61238376f7b1235abfa8b8466d
SHA256ac7ad5267269c2c235bc22829bfa0516b956d76a532c4f05d888f4d487f81623
SHA512d38183096aaec5b8d9b7bc015c98524135f75702485b5f7ce035480d251e7bdcca235cd46b3c17600b70021343f05e889a7740bd13b3c82b2b1e5c40056796d6
-
Filesize
333B
MD5ee57360b409b7db75dfb1640805c2856
SHA1dd6c9c8c702bd6c7f960a8b2c6017d9cf8dca850
SHA256206d60ff675449f6b880c83ce18d1b974acdfca7b8b5ec5d4f1db96b265acbbd
SHA5129513383eb0e93c9557592d60584b3c6261a638d93ea7d4442004a039fd5644e7a5eaf2d9ce970567de52c39bf9aaee9e2b327d18446140c8d41ceed894e4c3e2
-
Filesize
6KB
MD5ed2d207d5d9d55398b5ccecbeee32da8
SHA14e0318f0be832854561f15d25e964380bba40f40
SHA2569b3e5a0fd69b913143c4ae2847ec20f53f614d7d8fa8e55d615351c004d9d9ae
SHA512a758ad0264b5652859e17cc593aa6ef38457048647133a184d27cd42936410483fdd463634442d96fbcbe3a9295a00c56a21652e98dabc0cfeb8cf32cdf3dfe2
-
Filesize
5KB
MD5bd5e4808dfc985a0648ba3b4187c9447
SHA123356b5ce0973cb5c86c98181c38c67dad6e9be3
SHA25690bd1658f628a0ede4117f56e9f3cd28c54148daeef497de8b280c4c1af0e977
SHA512f579d0c88438904ed9f5935baa840d19e048228823ece8629656f962f86dadc74420caa750745867aba686f13d72b886d4ec8610acc2d58878307e12fad666fb
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389