Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
16-05-2024 01:05
Static task
static1
Behavioral task
behavioral1
Sample
48df1942ef5b77dfe8699f0b4c1eead2_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
48df1942ef5b77dfe8699f0b4c1eead2_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
48df1942ef5b77dfe8699f0b4c1eead2_JaffaCakes118.html
-
Size
175KB
-
MD5
48df1942ef5b77dfe8699f0b4c1eead2
-
SHA1
558cde6098e62cd2fd247febac9d61dba3e363aa
-
SHA256
92040fecc2134e40b58729a9cc0ff7a47aa9a976624daf9afcf0ed2ec26bc840
-
SHA512
4b9bcd2615d28e3450917575e9bf36825708fe61c60819d1730ea93553f359af68ca1979c78013338afbf236146e30492a669ef2c994124be899fe3edb2549f6
-
SSDEEP
1536:SqtH8gd8Wu8pI8Cd8hd8dQgbH//WoS3fGNkFEYfBCJiZx+aeTH+WK/Lf1/hpnVSV:S9CT3f/FxBCJiwB
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 5040 msedge.exe 5040 msedge.exe 704 msedge.exe 704 msedge.exe 3124 identity_helper.exe 3124 identity_helper.exe 5316 msedge.exe 5316 msedge.exe 5316 msedge.exe 5316 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 704 wrote to memory of 3724 704 msedge.exe 83 PID 704 wrote to memory of 3724 704 msedge.exe 83 PID 704 wrote to memory of 3140 704 msedge.exe 84 PID 704 wrote to memory of 3140 704 msedge.exe 84 PID 704 wrote to memory of 3140 704 msedge.exe 84 PID 704 wrote to memory of 3140 704 msedge.exe 84 PID 704 wrote to memory of 3140 704 msedge.exe 84 PID 704 wrote to memory of 3140 704 msedge.exe 84 PID 704 wrote to memory of 3140 704 msedge.exe 84 PID 704 wrote to memory of 3140 704 msedge.exe 84 PID 704 wrote to memory of 3140 704 msedge.exe 84 PID 704 wrote to memory of 3140 704 msedge.exe 84 PID 704 wrote to memory of 3140 704 msedge.exe 84 PID 704 wrote to memory of 3140 704 msedge.exe 84 PID 704 wrote to memory of 3140 704 msedge.exe 84 PID 704 wrote to memory of 3140 704 msedge.exe 84 PID 704 wrote to memory of 3140 704 msedge.exe 84 PID 704 wrote to memory of 3140 704 msedge.exe 84 PID 704 wrote to memory of 3140 704 msedge.exe 84 PID 704 wrote to memory of 3140 704 msedge.exe 84 PID 704 wrote to memory of 3140 704 msedge.exe 84 PID 704 wrote to memory of 3140 704 msedge.exe 84 PID 704 wrote to memory of 3140 704 msedge.exe 84 PID 704 wrote to memory of 3140 704 msedge.exe 84 PID 704 wrote to memory of 3140 704 msedge.exe 84 PID 704 wrote to memory of 3140 704 msedge.exe 84 PID 704 wrote to memory of 3140 704 msedge.exe 84 PID 704 wrote to memory of 3140 704 msedge.exe 84 PID 704 wrote to memory of 3140 704 msedge.exe 84 PID 704 wrote to memory of 3140 704 msedge.exe 84 PID 704 wrote to memory of 3140 704 msedge.exe 84 PID 704 wrote to memory of 3140 704 msedge.exe 84 PID 704 wrote to memory of 3140 704 msedge.exe 84 PID 704 wrote to memory of 3140 704 msedge.exe 84 PID 704 wrote to memory of 3140 704 msedge.exe 84 PID 704 wrote to memory of 3140 704 msedge.exe 84 PID 704 wrote to memory of 3140 704 msedge.exe 84 PID 704 wrote to memory of 3140 704 msedge.exe 84 PID 704 wrote to memory of 3140 704 msedge.exe 84 PID 704 wrote to memory of 3140 704 msedge.exe 84 PID 704 wrote to memory of 3140 704 msedge.exe 84 PID 704 wrote to memory of 3140 704 msedge.exe 84 PID 704 wrote to memory of 5040 704 msedge.exe 85 PID 704 wrote to memory of 5040 704 msedge.exe 85 PID 704 wrote to memory of 1988 704 msedge.exe 86 PID 704 wrote to memory of 1988 704 msedge.exe 86 PID 704 wrote to memory of 1988 704 msedge.exe 86 PID 704 wrote to memory of 1988 704 msedge.exe 86 PID 704 wrote to memory of 1988 704 msedge.exe 86 PID 704 wrote to memory of 1988 704 msedge.exe 86 PID 704 wrote to memory of 1988 704 msedge.exe 86 PID 704 wrote to memory of 1988 704 msedge.exe 86 PID 704 wrote to memory of 1988 704 msedge.exe 86 PID 704 wrote to memory of 1988 704 msedge.exe 86 PID 704 wrote to memory of 1988 704 msedge.exe 86 PID 704 wrote to memory of 1988 704 msedge.exe 86 PID 704 wrote to memory of 1988 704 msedge.exe 86 PID 704 wrote to memory of 1988 704 msedge.exe 86 PID 704 wrote to memory of 1988 704 msedge.exe 86 PID 704 wrote to memory of 1988 704 msedge.exe 86 PID 704 wrote to memory of 1988 704 msedge.exe 86 PID 704 wrote to memory of 1988 704 msedge.exe 86 PID 704 wrote to memory of 1988 704 msedge.exe 86 PID 704 wrote to memory of 1988 704 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\48df1942ef5b77dfe8699f0b4c1eead2_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:704 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb633a46f8,0x7ffb633a4708,0x7ffb633a47182⤵PID:3724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,14545396992190695602,13084768432115012741,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2172 /prefetch:22⤵PID:3140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2156,14545396992190695602,13084768432115012741,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2264 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2156,14545396992190695602,13084768432115012741,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2676 /prefetch:82⤵PID:1988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,14545396992190695602,13084768432115012741,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3156 /prefetch:12⤵PID:1424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,14545396992190695602,13084768432115012741,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3172 /prefetch:12⤵PID:1440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,14545396992190695602,13084768432115012741,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4732 /prefetch:12⤵PID:4604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,14545396992190695602,13084768432115012741,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4852 /prefetch:12⤵PID:1976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,14545396992190695602,13084768432115012741,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5308 /prefetch:12⤵PID:1300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,14545396992190695602,13084768432115012741,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5444 /prefetch:12⤵PID:4552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2156,14545396992190695602,13084768432115012741,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5760 /prefetch:82⤵PID:4736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2156,14545396992190695602,13084768432115012741,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5760 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,14545396992190695602,13084768432115012741,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5840 /prefetch:12⤵PID:4544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,14545396992190695602,13084768432115012741,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5856 /prefetch:12⤵PID:4100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,14545396992190695602,13084768432115012741,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5608 /prefetch:12⤵PID:5432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,14545396992190695602,13084768432115012741,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5484 /prefetch:12⤵PID:5440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,14545396992190695602,13084768432115012741,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5152 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5316
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4336
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4500
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4772
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52daa93382bba07cbc40af372d30ec576
SHA1c5e709dc3e2e4df2ff841fbde3e30170e7428a94
SHA2561826d2a57b1938c148bf212a47d947ed1bfb26cfc55868931f843ee438117f30
SHA51265635cb59c81548a9ef8fdb0942331e7f3cd0c30ce1d4dba48aed72dbb27b06511a55d2aeaadfadbbb4b7cb4b2e2772bbabba9603b3f7d9c8b9e4a7fbf3d6b6b
-
Filesize
152B
MD5ecdc2754d7d2ae862272153aa9b9ca6e
SHA1c19bed1c6e1c998b9fa93298639ad7961339147d
SHA256a13d791473f836edcab0e93451ce7b7182efbbc54261b2b5644d319e047a00a7
SHA512cd4fb81317d540f8b15f1495a381bb6f0f129b8923a7c06e4b5cf777d2625c30304aee6cc68aa20479e08d84e5030b43fbe93e479602400334dfdd7297f702f2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize360B
MD57d0ec7689e2aa1a47df79a285e4e0bc7
SHA1f895c7ebd81e23b52cf8cc788ecc29c3df28b420
SHA256132610b09031a953b0280cbb7802a2e1e38174f4ab7e5eaadc5c28487cc1a65c
SHA512db439975845b2cca5d9e4153c1b1973b6e62facbb3eb179d3793ee51c8ca960efaeef5a046bb95abc976ea17a6316d766cab2297516f18f2aa529e45aa877679
-
Filesize
2KB
MD57783ba3348872aaac3901e9f369cf666
SHA1532e3647e6cef29e1a5da665f529c698a2bd1199
SHA256e42ccd5df5ef437a0a10fe22088c39426568dd4f28467e6fbac0c5ff635a1bc1
SHA512b4be7653010b2f94e7d3baca9138e63d07e93a7d1483457f1d48d964befa613dcca6b03216a1171020984b4b59e5e412a94af697d9a3967006f6cf82b7b9a8b1
-
Filesize
2KB
MD5403915c0c789cf3d28779fb56e92b71c
SHA12675bf1d8633677c5440d271eb9089cf9a42cf97
SHA256a5c34bfc6ffc82e5bccd6857c55d45e9071370d1598004fe71572f1fcdcbefba
SHA5128d432976a22271d3cf5b9497e26c5a0966338094990e13901abe9525c6f58cae871701a63d290e233c7f51f6e03d2f46ba92e841fc8c9d65c5aa5f3c12e64017
-
Filesize
5KB
MD57f1358aa0f4305be49a83fb8ea7ce3f4
SHA10bec387718eb6cd941d40167ef17fcf988ac0ed0
SHA25603407bca4fa08b7e1cc39e4f848e0d14dc755c4491335089e8b52ad006464232
SHA512d9a270f01c131670a4005bac2f422cf9b36f46dc4c513650d4d10263bc3f2c3767d5e5d6e1b8fe0909d97b72498fce57498f48b071991cb318f6943cb53bcaf8
-
Filesize
7KB
MD5ffaab1e2611c9c73b2c49a032b6b1bdd
SHA16111cc5a89147ffd499b5abdaacb6263b14ff574
SHA256e953a70df897ed2929ce4113ec8e7815c2848ba2346bef317ef7305c71bda3d9
SHA512405f7a36a8254e0dc38a6ea0a64ce615210178602009b9529b4b1d20517f8421dbf9ec14172e7db6094f65f62e6bab0312fc1adf76c9adceb8c44c6103a522a8
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD544fba2ee1af532b82948cb9968708163
SHA127420b0f1959ebb18025fb8246c2b5492f4098e5
SHA2565219c7b88904c19d6317a77b0656a6bf36675f98e09e914d65e47ad161b8753c
SHA512375aa89802a4a80cc2286a44f85dd5fa0cecae7bda1c987d31259de2b5f7714ada676d3d1f51f7bf5bbb980a6daeda2169d656960c243769680360bb33b326c4