Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
15/05/2024, 16:57
Static task
static1
Behavioral task
behavioral1
Sample
47213a057669b4efbc5909ff5b6111eb_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
47213a057669b4efbc5909ff5b6111eb_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
47213a057669b4efbc5909ff5b6111eb_JaffaCakes118.html
-
Size
37KB
-
MD5
47213a057669b4efbc5909ff5b6111eb
-
SHA1
d62a89d3a4f5b8b4b08ccbab5bec766f48f87be9
-
SHA256
7fc7d6cf7ca45eca5cf1443d02e2d2d7c5799c0422b4dba86549b22fe5bca57a
-
SHA512
30d83fdf71889b92916493ffb5e6a3e731d666eabcbb03fb96ee4f173e6ee527bfde3e6e5afe21bb4e367b82b9ed5803251ed6263781d0191636c92473263518
-
SSDEEP
768:0A67P3IwoH/AHupP1fF5A1is1OPyVzCDvHc0lMw94Cem:P67P3IwoH/AHs9fF5A1dS/rlMw9Rem
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4712 msedge.exe 4712 msedge.exe 4016 msedge.exe 4016 msedge.exe 1600 identity_helper.exe 1600 identity_helper.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4016 wrote to memory of 3644 4016 msedge.exe 81 PID 4016 wrote to memory of 3644 4016 msedge.exe 81 PID 4016 wrote to memory of 1132 4016 msedge.exe 82 PID 4016 wrote to memory of 1132 4016 msedge.exe 82 PID 4016 wrote to memory of 1132 4016 msedge.exe 82 PID 4016 wrote to memory of 1132 4016 msedge.exe 82 PID 4016 wrote to memory of 1132 4016 msedge.exe 82 PID 4016 wrote to memory of 1132 4016 msedge.exe 82 PID 4016 wrote to memory of 1132 4016 msedge.exe 82 PID 4016 wrote to memory of 1132 4016 msedge.exe 82 PID 4016 wrote to memory of 1132 4016 msedge.exe 82 PID 4016 wrote to memory of 1132 4016 msedge.exe 82 PID 4016 wrote to memory of 1132 4016 msedge.exe 82 PID 4016 wrote to memory of 1132 4016 msedge.exe 82 PID 4016 wrote to memory of 1132 4016 msedge.exe 82 PID 4016 wrote to memory of 1132 4016 msedge.exe 82 PID 4016 wrote to memory of 1132 4016 msedge.exe 82 PID 4016 wrote to memory of 1132 4016 msedge.exe 82 PID 4016 wrote to memory of 1132 4016 msedge.exe 82 PID 4016 wrote to memory of 1132 4016 msedge.exe 82 PID 4016 wrote to memory of 1132 4016 msedge.exe 82 PID 4016 wrote to memory of 1132 4016 msedge.exe 82 PID 4016 wrote to memory of 1132 4016 msedge.exe 82 PID 4016 wrote to memory of 1132 4016 msedge.exe 82 PID 4016 wrote to memory of 1132 4016 msedge.exe 82 PID 4016 wrote to memory of 1132 4016 msedge.exe 82 PID 4016 wrote to memory of 1132 4016 msedge.exe 82 PID 4016 wrote to memory of 1132 4016 msedge.exe 82 PID 4016 wrote to memory of 1132 4016 msedge.exe 82 PID 4016 wrote to memory of 1132 4016 msedge.exe 82 PID 4016 wrote to memory of 1132 4016 msedge.exe 82 PID 4016 wrote to memory of 1132 4016 msedge.exe 82 PID 4016 wrote to memory of 1132 4016 msedge.exe 82 PID 4016 wrote to memory of 1132 4016 msedge.exe 82 PID 4016 wrote to memory of 1132 4016 msedge.exe 82 PID 4016 wrote to memory of 1132 4016 msedge.exe 82 PID 4016 wrote to memory of 1132 4016 msedge.exe 82 PID 4016 wrote to memory of 1132 4016 msedge.exe 82 PID 4016 wrote to memory of 1132 4016 msedge.exe 82 PID 4016 wrote to memory of 1132 4016 msedge.exe 82 PID 4016 wrote to memory of 1132 4016 msedge.exe 82 PID 4016 wrote to memory of 1132 4016 msedge.exe 82 PID 4016 wrote to memory of 4712 4016 msedge.exe 83 PID 4016 wrote to memory of 4712 4016 msedge.exe 83 PID 4016 wrote to memory of 2612 4016 msedge.exe 84 PID 4016 wrote to memory of 2612 4016 msedge.exe 84 PID 4016 wrote to memory of 2612 4016 msedge.exe 84 PID 4016 wrote to memory of 2612 4016 msedge.exe 84 PID 4016 wrote to memory of 2612 4016 msedge.exe 84 PID 4016 wrote to memory of 2612 4016 msedge.exe 84 PID 4016 wrote to memory of 2612 4016 msedge.exe 84 PID 4016 wrote to memory of 2612 4016 msedge.exe 84 PID 4016 wrote to memory of 2612 4016 msedge.exe 84 PID 4016 wrote to memory of 2612 4016 msedge.exe 84 PID 4016 wrote to memory of 2612 4016 msedge.exe 84 PID 4016 wrote to memory of 2612 4016 msedge.exe 84 PID 4016 wrote to memory of 2612 4016 msedge.exe 84 PID 4016 wrote to memory of 2612 4016 msedge.exe 84 PID 4016 wrote to memory of 2612 4016 msedge.exe 84 PID 4016 wrote to memory of 2612 4016 msedge.exe 84 PID 4016 wrote to memory of 2612 4016 msedge.exe 84 PID 4016 wrote to memory of 2612 4016 msedge.exe 84 PID 4016 wrote to memory of 2612 4016 msedge.exe 84 PID 4016 wrote to memory of 2612 4016 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\47213a057669b4efbc5909ff5b6111eb_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4016 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffaa37e46f8,0x7ffaa37e4708,0x7ffaa37e47182⤵PID:3644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,15764069022608359940,8763264687127111167,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 /prefetch:22⤵PID:1132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2148,15764069022608359940,8763264687127111167,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2228 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2148,15764069022608359940,8763264687127111167,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2872 /prefetch:82⤵PID:2612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,15764069022608359940,8763264687127111167,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:2784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,15764069022608359940,8763264687127111167,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:4748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,15764069022608359940,8763264687127111167,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5088 /prefetch:12⤵PID:1012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,15764069022608359940,8763264687127111167,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5652 /prefetch:82⤵PID:912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,15764069022608359940,8763264687127111167,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5652 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,15764069022608359940,8763264687127111167,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5748 /prefetch:12⤵PID:1980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,15764069022608359940,8763264687127111167,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5736 /prefetch:12⤵PID:4388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,15764069022608359940,8763264687127111167,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4132 /prefetch:12⤵PID:1068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,15764069022608359940,8763264687127111167,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5632 /prefetch:12⤵PID:4356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,15764069022608359940,8763264687127111167,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4860 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2672
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1532
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2584
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD509501a504251c89199f6547ea99e340c
SHA1eb2da8debe259dd52bc99aa23545e63c437b1a9e
SHA25690d26e75051e0e9070648319510a65056e1436a7ec7a8000e78cf24c5eeaaf1e
SHA5120d6f25552c68d831f4251ac65fb2bb8067144e86dc74976d7a5c5bcc6b882667986d1244a127480e97b2d4891fde3398a6c3bc5796160a6b05bf5917722b9adf
-
Filesize
1KB
MD52928ec3b53646294ea89dbf18dc61648
SHA1dd28cc4c76ff926c51a1102b280f64807992f750
SHA2561ca2e6ebeae9ba3a1729e5d356bade72c8056e1154489c7a8891dc6662c68731
SHA512ed17b1a8840510dd70677d88b125809579ad5d98212be8f6e6f0deed3688073458a862f49a13624b5e07af4a7b81ca3437fa6d5336d2747b9cec003e0e8fcb5b
-
Filesize
1KB
MD5ed4bcff7a210d69d60d1350706ca71af
SHA1899155965f2d3726d544a9e2b794d2e28c0383e5
SHA2565dfef4b6bfd5ec40dd365327eef9ebafdf4d5ea1ae6f7746ddbf0eb76153ca86
SHA512a3bbcec99e37fb144c9059d32a7021ea85f4e71760fa83b46df1c3096ecee99523111072a0f84a44d1e36ee1987e036eabf9156bf5aaadc710ee0fbe4728e667
-
Filesize
6KB
MD5a2339840a8ad17668a7f7de59a5f3da9
SHA1f0f3a709fee2dccbd8f6ecb7b370f8dafe43f984
SHA256f902a2508ea5b637b9949f8df60d7b0c83351c7d01798b3d7068c7fef18b5265
SHA5123b732dedd168ba712e47ca2c237ba85b509a9981d08a5f62f6b6846c828b498fe5cc72f71cb1caafc4d6a4928722b0c6c83cf0295a04fe72367883b329e9ddfa
-
Filesize
7KB
MD51a69e4326a69cf9b046eef65e0e831d1
SHA17c34b31a802fbc1ed00f4ffa54e2ebe282834ed1
SHA2569bf87e390b223ab56a476ba343eb044b8092a00043cf8ff22e0505855eae0010
SHA5120d99b430664438d45307b83e73803d3aa105d47194b0b897a09af39751848725de76b6180f468a4d97444dc0476253ed08ca719d5917ccefd00de76ec534f885
-
Filesize
7KB
MD5028f98d68d2ad67af65029103520efd2
SHA1e67d77654f90f0932d69fa7d6604c897b16252b7
SHA256d385012f49b7c21d1974aa0ec79595b614c0c300488e5cc66f6ae993d9218e89
SHA51295dfeb8b6ea25013c480da761d99591041818ffaa7bc854a14b3f78cd8b62ff6c0f4adbca6ecb00a36ace89c6bbc9290a8572c1d762f5137d8ee098de65f483f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5c37ecd71a8158b03dec118247143ab82
SHA1525076cf4e56d321e6988f0e78b67b3dd4332beb
SHA25686fa14487ca8df2e79af5b6acd7dca141b6c2d61079bf9e2bf6ca27d9a3f00e8
SHA5122527da9bc8752cdf1e63b3ad3a6bfc880e5860463f59ccbe2ea6f8f9ccb171d3914be2f6a9912ff1c78ac142d2d7ca5b1b8e5653e642ded0b31745358997fff7