Analysis
-
max time kernel
143s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
15/05/2024, 22:30
Static task
static1
Behavioral task
behavioral1
Sample
48568954cbe8feb0821c2a2dbbaea861_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
48568954cbe8feb0821c2a2dbbaea861_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
48568954cbe8feb0821c2a2dbbaea861_JaffaCakes118.html
-
Size
49KB
-
MD5
48568954cbe8feb0821c2a2dbbaea861
-
SHA1
e0773bd50147342497b9dacb92c43371292edbac
-
SHA256
1911773f108ad532342baef4e7255725317f72af6bb79f6e309670fde94fd9f1
-
SHA512
82c8e9ba3341e0a3cf6c916f4d60b32700e0a97d9c5599b0cc40be1ed7848f6f43f6201e0c3af9a32abf2a7fc996d0e492baf35bc42e70f5a28d58d8719a180c
-
SSDEEP
1536:Sd2DaYT//KsnzNm9F18HRf2msnzNm9F18HVAvAUjKIVsjKKAgtxvaj9DLIAVj0if:Sd2DaYT//Ksn4cf2msn43VsjKKAgtxvE
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 468 msedge.exe 468 msedge.exe 1668 msedge.exe 1668 msedge.exe 1168 identity_helper.exe 1168 identity_helper.exe 3404 msedge.exe 3404 msedge.exe 3404 msedge.exe 3404 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1668 wrote to memory of 228 1668 msedge.exe 83 PID 1668 wrote to memory of 228 1668 msedge.exe 83 PID 1668 wrote to memory of 3012 1668 msedge.exe 84 PID 1668 wrote to memory of 3012 1668 msedge.exe 84 PID 1668 wrote to memory of 3012 1668 msedge.exe 84 PID 1668 wrote to memory of 3012 1668 msedge.exe 84 PID 1668 wrote to memory of 3012 1668 msedge.exe 84 PID 1668 wrote to memory of 3012 1668 msedge.exe 84 PID 1668 wrote to memory of 3012 1668 msedge.exe 84 PID 1668 wrote to memory of 3012 1668 msedge.exe 84 PID 1668 wrote to memory of 3012 1668 msedge.exe 84 PID 1668 wrote to memory of 3012 1668 msedge.exe 84 PID 1668 wrote to memory of 3012 1668 msedge.exe 84 PID 1668 wrote to memory of 3012 1668 msedge.exe 84 PID 1668 wrote to memory of 3012 1668 msedge.exe 84 PID 1668 wrote to memory of 3012 1668 msedge.exe 84 PID 1668 wrote to memory of 3012 1668 msedge.exe 84 PID 1668 wrote to memory of 3012 1668 msedge.exe 84 PID 1668 wrote to memory of 3012 1668 msedge.exe 84 PID 1668 wrote to memory of 3012 1668 msedge.exe 84 PID 1668 wrote to memory of 3012 1668 msedge.exe 84 PID 1668 wrote to memory of 3012 1668 msedge.exe 84 PID 1668 wrote to memory of 3012 1668 msedge.exe 84 PID 1668 wrote to memory of 3012 1668 msedge.exe 84 PID 1668 wrote to memory of 3012 1668 msedge.exe 84 PID 1668 wrote to memory of 3012 1668 msedge.exe 84 PID 1668 wrote to memory of 3012 1668 msedge.exe 84 PID 1668 wrote to memory of 3012 1668 msedge.exe 84 PID 1668 wrote to memory of 3012 1668 msedge.exe 84 PID 1668 wrote to memory of 3012 1668 msedge.exe 84 PID 1668 wrote to memory of 3012 1668 msedge.exe 84 PID 1668 wrote to memory of 3012 1668 msedge.exe 84 PID 1668 wrote to memory of 3012 1668 msedge.exe 84 PID 1668 wrote to memory of 3012 1668 msedge.exe 84 PID 1668 wrote to memory of 3012 1668 msedge.exe 84 PID 1668 wrote to memory of 3012 1668 msedge.exe 84 PID 1668 wrote to memory of 3012 1668 msedge.exe 84 PID 1668 wrote to memory of 3012 1668 msedge.exe 84 PID 1668 wrote to memory of 3012 1668 msedge.exe 84 PID 1668 wrote to memory of 3012 1668 msedge.exe 84 PID 1668 wrote to memory of 3012 1668 msedge.exe 84 PID 1668 wrote to memory of 3012 1668 msedge.exe 84 PID 1668 wrote to memory of 468 1668 msedge.exe 85 PID 1668 wrote to memory of 468 1668 msedge.exe 85 PID 1668 wrote to memory of 1536 1668 msedge.exe 86 PID 1668 wrote to memory of 1536 1668 msedge.exe 86 PID 1668 wrote to memory of 1536 1668 msedge.exe 86 PID 1668 wrote to memory of 1536 1668 msedge.exe 86 PID 1668 wrote to memory of 1536 1668 msedge.exe 86 PID 1668 wrote to memory of 1536 1668 msedge.exe 86 PID 1668 wrote to memory of 1536 1668 msedge.exe 86 PID 1668 wrote to memory of 1536 1668 msedge.exe 86 PID 1668 wrote to memory of 1536 1668 msedge.exe 86 PID 1668 wrote to memory of 1536 1668 msedge.exe 86 PID 1668 wrote to memory of 1536 1668 msedge.exe 86 PID 1668 wrote to memory of 1536 1668 msedge.exe 86 PID 1668 wrote to memory of 1536 1668 msedge.exe 86 PID 1668 wrote to memory of 1536 1668 msedge.exe 86 PID 1668 wrote to memory of 1536 1668 msedge.exe 86 PID 1668 wrote to memory of 1536 1668 msedge.exe 86 PID 1668 wrote to memory of 1536 1668 msedge.exe 86 PID 1668 wrote to memory of 1536 1668 msedge.exe 86 PID 1668 wrote to memory of 1536 1668 msedge.exe 86 PID 1668 wrote to memory of 1536 1668 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\48568954cbe8feb0821c2a2dbbaea861_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe931046f8,0x7ffe93104708,0x7ffe931047182⤵PID:228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,535112665297553442,17769132942813494598,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2072 /prefetch:22⤵PID:3012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2060,535112665297553442,17769132942813494598,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2044 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2060,535112665297553442,17769132942813494598,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2808 /prefetch:82⤵PID:1536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,535112665297553442,17769132942813494598,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:4940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,535112665297553442,17769132942813494598,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:3352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,535112665297553442,17769132942813494598,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4640 /prefetch:12⤵PID:4496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,535112665297553442,17769132942813494598,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6064 /prefetch:12⤵PID:5012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,535112665297553442,17769132942813494598,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4996 /prefetch:12⤵PID:3160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,535112665297553442,17769132942813494598,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5468 /prefetch:82⤵PID:2676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,535112665297553442,17769132942813494598,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5468 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,535112665297553442,17769132942813494598,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6008 /prefetch:12⤵PID:2040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,535112665297553442,17769132942813494598,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5800 /prefetch:12⤵PID:3400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,535112665297553442,17769132942813494598,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5808 /prefetch:12⤵PID:3120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,535112665297553442,17769132942813494598,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5368 /prefetch:12⤵PID:4848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,535112665297553442,17769132942813494598,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5712 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3404
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1020
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3656
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54b4f91fa1b362ba5341ecb2836438dea
SHA19561f5aabed742404d455da735259a2c6781fa07
SHA256d824b742eace197ddc8b6ed5d918f390fde4b0fbf0e371b8e1f2ed40a3b6455c
SHA512fef22217dcdd8000bc193e25129699d4b8f7a103ca4fe1613baf73ccf67090d9fbae27eb93e4bb8747455853a0a4326f2d0c38df41c8d42351cdcd4132418dac
-
Filesize
152B
MD5eaa3db555ab5bc0cb364826204aad3f0
SHA1a4cdfaac8de49e6e6e88b335cfeaa7c9e3c563ca
SHA256ef7baeb1b2ab05ff3c5fbb76c2759db49294654548706c7c8e87f0cde855b86b
SHA512e13981da51b52c15261ecabb98af32f9b920651b46b10ce0cc823c5878b22eb1420258c80deef204070d1e0bdd3a64d875ac2522e3713a3cf11657aa55aeccd4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD5f8385293b2a04fd5ccf18fd67f907706
SHA1963facbbee532aeaba6a34b38f785715e94c376f
SHA25619e5c55b425075a718ca0a84120a366654338b79a2999faf2bfc2696b7837ea6
SHA512ec86044753211849c65377a75cc4d2b5d0929aae24257ecff886cf2a496c9222f74d4bc43747ae6ba9bef590f5604fc6ac1867d710167a3d02c6c33d3267d6ef
-
Filesize
542B
MD5a5b3c7acd3e29a6a78c46cd2aa542d46
SHA1c1bae2b2bbb57810eb20b1abcfd7b45d6782713f
SHA2562ca5f0c491ecf1e8377b5a84dddadc1ce7df3db46a72c0a2d7cc531b03fd57f3
SHA512312e6d8a413038f7d55e04ba4fd383f9c3c58f84ab60aac78a169a836e78ba3b859e88bca8cbd273ea1aa28562507ef30be627c32e16ae2107575dbb21db1410
-
Filesize
6KB
MD5be1f024ffeca8f4ed0e32908ef5e9e60
SHA11249040e6aebc61e3c1fa7c6d4c238d2659bc0ec
SHA256b8ac1bda2cdc3475bc3adbe083093e7a63759deee1ad017147ff575c2d6dc41f
SHA51258102e442ab1040719ecf0daece4541599ca45e4b962e6fc8e53dbb8dcaabb59bfb84741738a7b4aa63dfd5d0fcce465b726e1d23e0cb37a6b31ae30fdbd56a3
-
Filesize
6KB
MD5dab68a0ae271ac286ff3c1732bfd881b
SHA1db3a3aff160ff5f17cf54fc5de47353dbcdb2205
SHA25673e537254e2451d3f7e9056c73265dae32cd02ad2623952c1079a0d5cec9e0d6
SHA512708b22afcf08c701d366104afede94cc84ba8e06bf783be4ce817bc9da1fddadcc9e71a9f756bee7f5520664baa327bfba68d676cd24a0b7934875104b54e5d8
-
Filesize
7KB
MD52ed107fea04d715b51187a357d7a9c8c
SHA1382afeeb810090ccd138612ebc8f63c8fe471d04
SHA2560d8135206fc74b902300cfb9059cee4f90e6ac7bde55edb001409744b64140c4
SHA512a45258311118a614525ae42f6f77ccf6ab88ef2dbe82831a99f50b6137db15acb00aeb929d0ed1803adb2461ceb99b43aafd86d69bcde02f8cef653a862546d9
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD579a92f33f6025ac53914d3eb8062087f
SHA17f9d2828b1991d37cb1905230e887e3b9c97686f
SHA2560089a158d9836ccf861fbcf7156d762bba736b4802e128bcc289c32aebda65c5
SHA512daa369d645c3aac6f1bf4eaaedb24745970d24d3d44cdf1432625ec9e07fafa5d1aa97a5137b37a88d65cc50e590c3fd2643cdfd94115a15cfdc7e69f17e5e36