Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
15/05/2024, 20:33
Static task
static1
Behavioral task
behavioral1
Sample
47ea34d8ca80ac930c36902eb0bb4ba5_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
47ea34d8ca80ac930c36902eb0bb4ba5_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
47ea34d8ca80ac930c36902eb0bb4ba5_JaffaCakes118.html
-
Size
46KB
-
MD5
47ea34d8ca80ac930c36902eb0bb4ba5
-
SHA1
cc6e6daa8e2eb26db3e83cb370c846289891393f
-
SHA256
b7f03315f9709b62e043c46285adb9d9f04d2e3dcba3089ffb48057ca5381417
-
SHA512
341473ed919d5e29466d36028094d667f452cef50047d6f21d6858ca33244b9f0a24b73527f7efb44f298d81e0bb6e7179590935f18401195eed9eedf6ac7c3f
-
SSDEEP
768:S81O17uvqCHCQPCSC0CtCDjb38c0nPbbGKTw:S8ouvq+Hl9gG0nfGJ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3644 msedge.exe 3644 msedge.exe 4792 msedge.exe 4792 msedge.exe 3736 identity_helper.exe 3736 identity_helper.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4792 wrote to memory of 4888 4792 msedge.exe 83 PID 4792 wrote to memory of 4888 4792 msedge.exe 83 PID 4792 wrote to memory of 5040 4792 msedge.exe 84 PID 4792 wrote to memory of 5040 4792 msedge.exe 84 PID 4792 wrote to memory of 5040 4792 msedge.exe 84 PID 4792 wrote to memory of 5040 4792 msedge.exe 84 PID 4792 wrote to memory of 5040 4792 msedge.exe 84 PID 4792 wrote to memory of 5040 4792 msedge.exe 84 PID 4792 wrote to memory of 5040 4792 msedge.exe 84 PID 4792 wrote to memory of 5040 4792 msedge.exe 84 PID 4792 wrote to memory of 5040 4792 msedge.exe 84 PID 4792 wrote to memory of 5040 4792 msedge.exe 84 PID 4792 wrote to memory of 5040 4792 msedge.exe 84 PID 4792 wrote to memory of 5040 4792 msedge.exe 84 PID 4792 wrote to memory of 5040 4792 msedge.exe 84 PID 4792 wrote to memory of 5040 4792 msedge.exe 84 PID 4792 wrote to memory of 5040 4792 msedge.exe 84 PID 4792 wrote to memory of 5040 4792 msedge.exe 84 PID 4792 wrote to memory of 5040 4792 msedge.exe 84 PID 4792 wrote to memory of 5040 4792 msedge.exe 84 PID 4792 wrote to memory of 5040 4792 msedge.exe 84 PID 4792 wrote to memory of 5040 4792 msedge.exe 84 PID 4792 wrote to memory of 5040 4792 msedge.exe 84 PID 4792 wrote to memory of 5040 4792 msedge.exe 84 PID 4792 wrote to memory of 5040 4792 msedge.exe 84 PID 4792 wrote to memory of 5040 4792 msedge.exe 84 PID 4792 wrote to memory of 5040 4792 msedge.exe 84 PID 4792 wrote to memory of 5040 4792 msedge.exe 84 PID 4792 wrote to memory of 5040 4792 msedge.exe 84 PID 4792 wrote to memory of 5040 4792 msedge.exe 84 PID 4792 wrote to memory of 5040 4792 msedge.exe 84 PID 4792 wrote to memory of 5040 4792 msedge.exe 84 PID 4792 wrote to memory of 5040 4792 msedge.exe 84 PID 4792 wrote to memory of 5040 4792 msedge.exe 84 PID 4792 wrote to memory of 5040 4792 msedge.exe 84 PID 4792 wrote to memory of 5040 4792 msedge.exe 84 PID 4792 wrote to memory of 5040 4792 msedge.exe 84 PID 4792 wrote to memory of 5040 4792 msedge.exe 84 PID 4792 wrote to memory of 5040 4792 msedge.exe 84 PID 4792 wrote to memory of 5040 4792 msedge.exe 84 PID 4792 wrote to memory of 5040 4792 msedge.exe 84 PID 4792 wrote to memory of 5040 4792 msedge.exe 84 PID 4792 wrote to memory of 3644 4792 msedge.exe 85 PID 4792 wrote to memory of 3644 4792 msedge.exe 85 PID 4792 wrote to memory of 3020 4792 msedge.exe 86 PID 4792 wrote to memory of 3020 4792 msedge.exe 86 PID 4792 wrote to memory of 3020 4792 msedge.exe 86 PID 4792 wrote to memory of 3020 4792 msedge.exe 86 PID 4792 wrote to memory of 3020 4792 msedge.exe 86 PID 4792 wrote to memory of 3020 4792 msedge.exe 86 PID 4792 wrote to memory of 3020 4792 msedge.exe 86 PID 4792 wrote to memory of 3020 4792 msedge.exe 86 PID 4792 wrote to memory of 3020 4792 msedge.exe 86 PID 4792 wrote to memory of 3020 4792 msedge.exe 86 PID 4792 wrote to memory of 3020 4792 msedge.exe 86 PID 4792 wrote to memory of 3020 4792 msedge.exe 86 PID 4792 wrote to memory of 3020 4792 msedge.exe 86 PID 4792 wrote to memory of 3020 4792 msedge.exe 86 PID 4792 wrote to memory of 3020 4792 msedge.exe 86 PID 4792 wrote to memory of 3020 4792 msedge.exe 86 PID 4792 wrote to memory of 3020 4792 msedge.exe 86 PID 4792 wrote to memory of 3020 4792 msedge.exe 86 PID 4792 wrote to memory of 3020 4792 msedge.exe 86 PID 4792 wrote to memory of 3020 4792 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\47ea34d8ca80ac930c36902eb0bb4ba5_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4792 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff956ee46f8,0x7ff956ee4708,0x7ff956ee47182⤵PID:4888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,6760341697453311481,2613728239297404891,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 /prefetch:22⤵PID:5040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,6760341697453311481,2613728239297404891,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2220 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,6760341697453311481,2613728239297404891,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2776 /prefetch:82⤵PID:3020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,6760341697453311481,2613728239297404891,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:12⤵PID:1220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,6760341697453311481,2613728239297404891,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:12⤵PID:2992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,6760341697453311481,2613728239297404891,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5036 /prefetch:12⤵PID:2408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,6760341697453311481,2613728239297404891,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5272 /prefetch:12⤵PID:2756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,6760341697453311481,2613728239297404891,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5832 /prefetch:82⤵PID:4584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,6760341697453311481,2613728239297404891,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5832 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,6760341697453311481,2613728239297404891,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4812 /prefetch:12⤵PID:4228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,6760341697453311481,2613728239297404891,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4808 /prefetch:12⤵PID:3084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,6760341697453311481,2613728239297404891,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5296 /prefetch:12⤵PID:5224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,6760341697453311481,2613728239297404891,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6140 /prefetch:12⤵PID:5232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,6760341697453311481,2613728239297404891,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1692 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3492
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1648
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4084
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize168B
MD51d73c9af303f6e521d9e3d60f4439ee5
SHA15dd984168486501297129d7dcf49a12877a8a2f6
SHA2568bf9614651cf575512fb3bc67fbc84a0e1ee079d7b1c46bbc4ca9bdac7f6c09b
SHA5126a12709501831848cc6c1ca4be0138dc2e137aa2fe51441791895ec48b4bc06d3e16bbc8769cdc4240789e245fac564313fd11c7eac1ec727e31725ea3c399fb
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD5436531bbe45c1d5246e3468646392f10
SHA1e0207cf880538b5faf4673737b01d0754969003d
SHA256500e73dafb3f256c031bdcd6aaf3580a7d3f92dd359ee29596a9d302972a8ed5
SHA5129bcd32b11a79b7a45bec6208c2c8d21be3f84779f438262561f66fe1a83b4ff56ba3d157e72d2623db7b90218a08677aa25839e146ac92a1964612905704fc9f
-
Filesize
1KB
MD56c4e15a8d57f876600a78a3f66d7cfcb
SHA160229e70688acbb6cd1011ff5c1902bccbeb4239
SHA256b271b9ba9642a0d50012551b150d9c18a220f490b73f6bc0d7ad3bf59ed9c091
SHA512049013f226e3c721a25ab8bc74e1e2a8e323089502d735a0cd1c89f8d489057eaf8c77650b2775d571d030e2151fb99aae0795885d8201fac80bc0958167fbe2
-
Filesize
6KB
MD5fb800de9a129287a53efb0be117e3df6
SHA1d3d897ed0d938fba7804c86343ff478522478e9f
SHA2563f24a06cf3c0cecf33b96bb2973a9e383da5c8dc8220a1347d47b84ccea7d874
SHA512a3dbfc8500ea96a8789ab40237d5ad8ecb9cf36739a09face1fbfead78837b60052735d6586d3ae26b6501b978769f3f85cbabbad372e6e03242887f8d0bc508
-
Filesize
7KB
MD5086d7af35c1429b15bbb0f10e5bfd07b
SHA123b58d2ab5054ee6a49402b4488643316007f5e4
SHA256287c1e42e1c79a2e68c70b5ba7d5137a36e9955ca97374ad9da403bb5b98dfa8
SHA5126d5963991b2a2866788e7ef6e50b00e99f5b97cd79cf0dc1017cb21069e351409e7cd95b773258ea97db071a6f2d108d73cdca2c75d14493bfd71f5040b311e2
-
Filesize
7KB
MD5201f55a2bae3cdbc938b522d2fd653d5
SHA1c6f89dcbcd5c11c6ce781941bdf612e5fdb4d216
SHA256d932fb71986cc3f759d7fbc26c7efd02b841a9dd6fda661c0957d24999418d1d
SHA5126fbc283df794a33f3aeb8cb2d7898da9d2011bb83d23023c03a74c1a8d8289d3d9eaa8ff8fc3e3ef18ea5fdaff388fdabc8a2e65b5138174cf8991479e6541c1
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD577b172c44abebddaf5b36cb697d15c28
SHA13e50b49f151728b6c6607764f65d97347930e493
SHA256db7d12fe253fdbfe2af17ec94df1b42bcab27361f8913a7c561382cfc9c18ad7
SHA5125a98e92bedb0651ae54b309feeef7bcb722459c963c56b0b4543fb4cb4a1164e911ba28c17a3a251b3f98405162b837abdcbe3a09e4acc1d1e901315c3bf8827