Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
15-05-2024 00:37
Static task
static1
Behavioral task
behavioral1
Sample
43cec309033192a4547b6715d7e281a4_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
43cec309033192a4547b6715d7e281a4_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
43cec309033192a4547b6715d7e281a4_JaffaCakes118.html
-
Size
133KB
-
MD5
43cec309033192a4547b6715d7e281a4
-
SHA1
b5f848bce433a6e02620bc6814e012d784f65db7
-
SHA256
306a692967cabd62d19a40d19e0de5a42bbd4d4942f3ae19e19737a07da47633
-
SHA512
c12a52e7507aac8124ebc685af314316e856dd30d6e9d4d9caaa3b37cbc18a43f746995cc1c134eec988cbf780b54337552844b9f27107e28f1e54780bf26036
-
SSDEEP
3072:S97ZjxDp3tn3kpGlA2znSjAEr+b2daqNLmbDifHuafWPRTfE:S9Ftn3kpGlA2znSjAEr+b2daqNLmbDiT
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1868 msedge.exe 1868 msedge.exe 4960 msedge.exe 4960 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4960 wrote to memory of 3412 4960 msedge.exe 83 PID 4960 wrote to memory of 3412 4960 msedge.exe 83 PID 4960 wrote to memory of 5008 4960 msedge.exe 84 PID 4960 wrote to memory of 5008 4960 msedge.exe 84 PID 4960 wrote to memory of 5008 4960 msedge.exe 84 PID 4960 wrote to memory of 5008 4960 msedge.exe 84 PID 4960 wrote to memory of 5008 4960 msedge.exe 84 PID 4960 wrote to memory of 5008 4960 msedge.exe 84 PID 4960 wrote to memory of 5008 4960 msedge.exe 84 PID 4960 wrote to memory of 5008 4960 msedge.exe 84 PID 4960 wrote to memory of 5008 4960 msedge.exe 84 PID 4960 wrote to memory of 5008 4960 msedge.exe 84 PID 4960 wrote to memory of 5008 4960 msedge.exe 84 PID 4960 wrote to memory of 5008 4960 msedge.exe 84 PID 4960 wrote to memory of 5008 4960 msedge.exe 84 PID 4960 wrote to memory of 5008 4960 msedge.exe 84 PID 4960 wrote to memory of 5008 4960 msedge.exe 84 PID 4960 wrote to memory of 5008 4960 msedge.exe 84 PID 4960 wrote to memory of 5008 4960 msedge.exe 84 PID 4960 wrote to memory of 5008 4960 msedge.exe 84 PID 4960 wrote to memory of 5008 4960 msedge.exe 84 PID 4960 wrote to memory of 5008 4960 msedge.exe 84 PID 4960 wrote to memory of 5008 4960 msedge.exe 84 PID 4960 wrote to memory of 5008 4960 msedge.exe 84 PID 4960 wrote to memory of 5008 4960 msedge.exe 84 PID 4960 wrote to memory of 5008 4960 msedge.exe 84 PID 4960 wrote to memory of 5008 4960 msedge.exe 84 PID 4960 wrote to memory of 5008 4960 msedge.exe 84 PID 4960 wrote to memory of 5008 4960 msedge.exe 84 PID 4960 wrote to memory of 5008 4960 msedge.exe 84 PID 4960 wrote to memory of 5008 4960 msedge.exe 84 PID 4960 wrote to memory of 5008 4960 msedge.exe 84 PID 4960 wrote to memory of 5008 4960 msedge.exe 84 PID 4960 wrote to memory of 5008 4960 msedge.exe 84 PID 4960 wrote to memory of 5008 4960 msedge.exe 84 PID 4960 wrote to memory of 5008 4960 msedge.exe 84 PID 4960 wrote to memory of 5008 4960 msedge.exe 84 PID 4960 wrote to memory of 5008 4960 msedge.exe 84 PID 4960 wrote to memory of 5008 4960 msedge.exe 84 PID 4960 wrote to memory of 5008 4960 msedge.exe 84 PID 4960 wrote to memory of 5008 4960 msedge.exe 84 PID 4960 wrote to memory of 5008 4960 msedge.exe 84 PID 4960 wrote to memory of 1868 4960 msedge.exe 85 PID 4960 wrote to memory of 1868 4960 msedge.exe 85 PID 4960 wrote to memory of 4148 4960 msedge.exe 86 PID 4960 wrote to memory of 4148 4960 msedge.exe 86 PID 4960 wrote to memory of 4148 4960 msedge.exe 86 PID 4960 wrote to memory of 4148 4960 msedge.exe 86 PID 4960 wrote to memory of 4148 4960 msedge.exe 86 PID 4960 wrote to memory of 4148 4960 msedge.exe 86 PID 4960 wrote to memory of 4148 4960 msedge.exe 86 PID 4960 wrote to memory of 4148 4960 msedge.exe 86 PID 4960 wrote to memory of 4148 4960 msedge.exe 86 PID 4960 wrote to memory of 4148 4960 msedge.exe 86 PID 4960 wrote to memory of 4148 4960 msedge.exe 86 PID 4960 wrote to memory of 4148 4960 msedge.exe 86 PID 4960 wrote to memory of 4148 4960 msedge.exe 86 PID 4960 wrote to memory of 4148 4960 msedge.exe 86 PID 4960 wrote to memory of 4148 4960 msedge.exe 86 PID 4960 wrote to memory of 4148 4960 msedge.exe 86 PID 4960 wrote to memory of 4148 4960 msedge.exe 86 PID 4960 wrote to memory of 4148 4960 msedge.exe 86 PID 4960 wrote to memory of 4148 4960 msedge.exe 86 PID 4960 wrote to memory of 4148 4960 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\43cec309033192a4547b6715d7e281a4_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4960 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xb4,0x108,0x7ff96de446f8,0x7ff96de44708,0x7ff96de447182⤵PID:3412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,12383275333042439107,778317290564794509,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2280 /prefetch:22⤵PID:5008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2084,12383275333042439107,778317290564794509,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2352 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2084,12383275333042439107,778317290564794509,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2928 /prefetch:82⤵PID:4148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,12383275333042439107,778317290564794509,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:4452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,12383275333042439107,778317290564794509,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:3496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,12383275333042439107,778317290564794509,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5144 /prefetch:12⤵PID:5088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,12383275333042439107,778317290564794509,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5356 /prefetch:12⤵PID:884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,12383275333042439107,778317290564794509,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2188 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4392
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3228
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4816
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4208
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54f7152bc5a1a715ef481e37d1c791959
SHA1c8a1ed674c62ae4f45519f90a8cc5a81eff3a6d7
SHA256704dd4f98d8ca34ec421f23ba1891b178c23c14b3301e4655efc5c02d356c2bc
SHA5122e6b02ca35d76a655a17a5f3e9dbd8d7517c7dae24f0095c7350eb9e7bdf9e1256a7009aa8878f96c89d1ea4fe5323a41f72b8c551806dda62880d7ff231ff5c
-
Filesize
152B
MD5ea98e583ad99df195d29aa066204ab56
SHA1f89398664af0179641aa0138b337097b617cb2db
SHA256a7abb51435909fa2d75c6f2ff5c69a93d4a0ab276ed579e7d8733b2a63ffbee6
SHA512e109be3466e653e5d310b3e402e1626298b09205d223722a82344dd78504f3c33e1e24e8402a02f38cd2c9c50d96a303ce4846bea5a583423937ab018cd5782f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize216B
MD505daa24b771ef8f7d938e37754463610
SHA190bf6554f294aa1d800cf3ca78151252be86a370
SHA25617c997343b2a7742a9282387106bbffee8f268415a10774835ad3c45f329abb7
SHA51268b18afb662f923de7c98431962f9eef711ac425b2b13ad832aee5afc6a7bc0c9d57d4b3355b544dc56ac152fe2eecc2273c9f8c31d0616e4e11aded88ad0949
-
Filesize
2KB
MD50ff3e3fc5aa876fb2cebc26ce9fa0f8c
SHA1dba63c9ee413c5007cb3fb67b223667b2a19d636
SHA256fe4c745805218cdebb4284fcb92b4ed90c5568cb4a8a4c01e737d4940305d52b
SHA512a86bd75ddf54c1896852f91753b3102a92697e2765062bb0eae993d60336e2883a84e47105c967396a0088a3c526a08f4f2a0931bf5c0cb12b8e2aa20d36672c
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
6KB
MD530ffa1b85ebf7baf74c65caa071356e9
SHA1fa2f96593e764b3fc957dcf415677028b38e1284
SHA256db15a63871be82e03a6c78caa9417321effcc542fdaa02671dc2a1f8cd311db1
SHA51291a1a5a3ab3ee4f6af7f46cb0e9b8c1c08114c570aa1fc41adea9855506139a3f0576028f5c670f73a2e08eb662d2039715b869e8aa3eb9f767c6bcefccc7883
-
Filesize
5KB
MD5d55d9bfa7d3eed5c16f95e5d4c8e06f2
SHA14505b2588e7a3e1f663b293026c1072876087ccf
SHA256ebf67b2689c940518787c7cb16a1217e88960a30d9a8ea79870e0ea02d7ac9f5
SHA51218ddf830591cf285f400c10516106cccb167845eec65f8a4c71c59cd72b2f8fedf852a667e0b8992931da48613df2762f0727413f124f1d697bf293229ce3e46
-
Filesize
11KB
MD51cef7168beadb58b038d802793eb4070
SHA10a3e3b29566e56e076ef7a53ee55a08342a25a59
SHA256cd6254d45f6e70d66eca0d6b40a7f14e0c2da94030a9a05945b136382522daf5
SHA5122aecab6f2138f93fce7fbf0f596f7c04477224d4d312592a90bf78c2cf12083d10e75d53f3f9dd705eda07b46803cd0f2433d2c26d0e44f9077a8fac8e6944d4