Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
15-05-2024 08:17
Static task
static1
Behavioral task
behavioral1
Sample
4547bf53c77fbe96ba16568774881a66_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
4547bf53c77fbe96ba16568774881a66_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
4547bf53c77fbe96ba16568774881a66_JaffaCakes118.html
-
Size
115KB
-
MD5
4547bf53c77fbe96ba16568774881a66
-
SHA1
2224fdc587aac0e57cacf4f3cecc3182be3fa640
-
SHA256
4c3950e945d20b094e1f234469336c351e58d21a6daa23312fe74172b9068038
-
SHA512
0ff5465b5494d87b0598144eb9cf49941b67d47d5bd9c06d76ea27dfd53c2916f948d60bfcb1d9413ba281f2f224508b72ac9214be501b3c65371320f20ba022
-
SSDEEP
768:STmWZs5zfzEBW3u7TcpJXTioLHGiWfqpMf8GE8xihlEX:STmWqVfzEBW3u0pJXTkiWfU4zE8xClEX
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 908 msedge.exe 908 msedge.exe 4388 msedge.exe 4388 msedge.exe 1576 identity_helper.exe 1576 identity_helper.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4388 wrote to memory of 392 4388 msedge.exe 82 PID 4388 wrote to memory of 392 4388 msedge.exe 82 PID 4388 wrote to memory of 4848 4388 msedge.exe 83 PID 4388 wrote to memory of 4848 4388 msedge.exe 83 PID 4388 wrote to memory of 4848 4388 msedge.exe 83 PID 4388 wrote to memory of 4848 4388 msedge.exe 83 PID 4388 wrote to memory of 4848 4388 msedge.exe 83 PID 4388 wrote to memory of 4848 4388 msedge.exe 83 PID 4388 wrote to memory of 4848 4388 msedge.exe 83 PID 4388 wrote to memory of 4848 4388 msedge.exe 83 PID 4388 wrote to memory of 4848 4388 msedge.exe 83 PID 4388 wrote to memory of 4848 4388 msedge.exe 83 PID 4388 wrote to memory of 4848 4388 msedge.exe 83 PID 4388 wrote to memory of 4848 4388 msedge.exe 83 PID 4388 wrote to memory of 4848 4388 msedge.exe 83 PID 4388 wrote to memory of 4848 4388 msedge.exe 83 PID 4388 wrote to memory of 4848 4388 msedge.exe 83 PID 4388 wrote to memory of 4848 4388 msedge.exe 83 PID 4388 wrote to memory of 4848 4388 msedge.exe 83 PID 4388 wrote to memory of 4848 4388 msedge.exe 83 PID 4388 wrote to memory of 4848 4388 msedge.exe 83 PID 4388 wrote to memory of 4848 4388 msedge.exe 83 PID 4388 wrote to memory of 4848 4388 msedge.exe 83 PID 4388 wrote to memory of 4848 4388 msedge.exe 83 PID 4388 wrote to memory of 4848 4388 msedge.exe 83 PID 4388 wrote to memory of 4848 4388 msedge.exe 83 PID 4388 wrote to memory of 4848 4388 msedge.exe 83 PID 4388 wrote to memory of 4848 4388 msedge.exe 83 PID 4388 wrote to memory of 4848 4388 msedge.exe 83 PID 4388 wrote to memory of 4848 4388 msedge.exe 83 PID 4388 wrote to memory of 4848 4388 msedge.exe 83 PID 4388 wrote to memory of 4848 4388 msedge.exe 83 PID 4388 wrote to memory of 4848 4388 msedge.exe 83 PID 4388 wrote to memory of 4848 4388 msedge.exe 83 PID 4388 wrote to memory of 4848 4388 msedge.exe 83 PID 4388 wrote to memory of 4848 4388 msedge.exe 83 PID 4388 wrote to memory of 4848 4388 msedge.exe 83 PID 4388 wrote to memory of 4848 4388 msedge.exe 83 PID 4388 wrote to memory of 4848 4388 msedge.exe 83 PID 4388 wrote to memory of 4848 4388 msedge.exe 83 PID 4388 wrote to memory of 4848 4388 msedge.exe 83 PID 4388 wrote to memory of 4848 4388 msedge.exe 83 PID 4388 wrote to memory of 908 4388 msedge.exe 84 PID 4388 wrote to memory of 908 4388 msedge.exe 84 PID 4388 wrote to memory of 1216 4388 msedge.exe 85 PID 4388 wrote to memory of 1216 4388 msedge.exe 85 PID 4388 wrote to memory of 1216 4388 msedge.exe 85 PID 4388 wrote to memory of 1216 4388 msedge.exe 85 PID 4388 wrote to memory of 1216 4388 msedge.exe 85 PID 4388 wrote to memory of 1216 4388 msedge.exe 85 PID 4388 wrote to memory of 1216 4388 msedge.exe 85 PID 4388 wrote to memory of 1216 4388 msedge.exe 85 PID 4388 wrote to memory of 1216 4388 msedge.exe 85 PID 4388 wrote to memory of 1216 4388 msedge.exe 85 PID 4388 wrote to memory of 1216 4388 msedge.exe 85 PID 4388 wrote to memory of 1216 4388 msedge.exe 85 PID 4388 wrote to memory of 1216 4388 msedge.exe 85 PID 4388 wrote to memory of 1216 4388 msedge.exe 85 PID 4388 wrote to memory of 1216 4388 msedge.exe 85 PID 4388 wrote to memory of 1216 4388 msedge.exe 85 PID 4388 wrote to memory of 1216 4388 msedge.exe 85 PID 4388 wrote to memory of 1216 4388 msedge.exe 85 PID 4388 wrote to memory of 1216 4388 msedge.exe 85 PID 4388 wrote to memory of 1216 4388 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\4547bf53c77fbe96ba16568774881a66_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4388 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9cc4c46f8,0x7ff9cc4c4708,0x7ff9cc4c47182⤵PID:392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,14124182288440284558,15433655761746985724,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2168 /prefetch:22⤵PID:4848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,14124182288440284558,15433655761746985724,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2228 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,14124182288440284558,15433655761746985724,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2912 /prefetch:82⤵PID:1216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,14124182288440284558,15433655761746985724,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:4712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,14124182288440284558,15433655761746985724,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:3076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,14124182288440284558,15433655761746985724,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4744 /prefetch:12⤵PID:3336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,14124182288440284558,15433655761746985724,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5876 /prefetch:82⤵PID:3524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,14124182288440284558,15433655761746985724,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5876 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,14124182288440284558,15433655761746985724,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4932 /prefetch:12⤵PID:2756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,14124182288440284558,15433655761746985724,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5836 /prefetch:12⤵PID:4396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,14124182288440284558,15433655761746985724,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5656 /prefetch:12⤵PID:636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,14124182288440284558,15433655761746985724,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5688 /prefetch:12⤵PID:3012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,14124182288440284558,15433655761746985724,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5124 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1656
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2112
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1172
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54b4f91fa1b362ba5341ecb2836438dea
SHA19561f5aabed742404d455da735259a2c6781fa07
SHA256d824b742eace197ddc8b6ed5d918f390fde4b0fbf0e371b8e1f2ed40a3b6455c
SHA512fef22217dcdd8000bc193e25129699d4b8f7a103ca4fe1613baf73ccf67090d9fbae27eb93e4bb8747455853a0a4326f2d0c38df41c8d42351cdcd4132418dac
-
Filesize
152B
MD5eaa3db555ab5bc0cb364826204aad3f0
SHA1a4cdfaac8de49e6e6e88b335cfeaa7c9e3c563ca
SHA256ef7baeb1b2ab05ff3c5fbb76c2759db49294654548706c7c8e87f0cde855b86b
SHA512e13981da51b52c15261ecabb98af32f9b920651b46b10ce0cc823c5878b22eb1420258c80deef204070d1e0bdd3a64d875ac2522e3713a3cf11657aa55aeccd4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD59e69bd8d3f40ae76ddff37d2a34f4e65
SHA15cf75e5d10dfbc34d4d613404b28a92ed5839e9f
SHA25677161ba88d3053f5bc50193e4c124465f13e3cda18e2f42bd18dad6dc5f91fd6
SHA5129811e377f9d5ad2e655307153cea3ef132ca1042b75962ff90b4592049f974ebb6c944c99259342a7f3efe8df6c2c6971278010663f8b7380515769b310892f0
-
Filesize
324B
MD5ff17505b02d988cd94ac6b26bf718018
SHA169f3ba890950867b858fb4c1bface08058ddc38d
SHA256d0718af13cae3e6a7b66a86da4da75938d0d6b84bf5f9039f812d588ab9a02d4
SHA512c6570711fc94751163c9a7b8f9932d51b7e472e86707ad8a651f76814408b01e00a0f4710d680f9b168c510bfb527dc3106a254e0747f3254afadbfc73737984
-
Filesize
6KB
MD5f163451c604202459dc42b9ae3d03fda
SHA1e42ab6b5c58094943f68278ce43b4abff932c195
SHA25688f68a1e9ccb6be3177d1c76e6b60fd198347886b45c3fee0fcf5b3d9d9c0240
SHA5124e5eedfadded9f5acafb81bbc885d604ee9fc6396f86538a10acccc9508a36d907fd9e90843604aaef258f5859d7ae02ce783eaaacf57a073657399b66603b96
-
Filesize
6KB
MD5125d4292285b367bb6cec0a6c44b7c22
SHA11d764eb99a57d371b3652720811b311490b8acfd
SHA25676ee4d1af7fc4fcf4ac991014aab3128e83db7840047389756a43e7021189749
SHA5127516f86b7ba67d9ba89e8892c618539e85243f97f3f96c5c0023e39d4c72a711b05fd9ea58f49d3d062cb46b1fa4a0baf3e7e8b8a862d7de632519eeb225ad0b
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD569c83780aa18712558407ff8a2d25765
SHA1d1d3a03f6a50b70b9fa52aad527d0e69f113cae2
SHA25642b9d912b03ce91537473540d0228dd4968f393bd74704e7a47155b30e8b13c8
SHA51250070a3afd4df865107ba99033e8f68c1d0ebc17d194b26dbdcd47c81195698543189de2024acd3914c1c749a47fad763adad48a54faf610465c7b2d9f4010d3