Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
16/05/2024, 03:07
Static task
static1
Behavioral task
behavioral1
Sample
4935ae8632240e620e117fa1e84c8e1e_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
4935ae8632240e620e117fa1e84c8e1e_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
4935ae8632240e620e117fa1e84c8e1e_JaffaCakes118.html
-
Size
43KB
-
MD5
4935ae8632240e620e117fa1e84c8e1e
-
SHA1
b0a3b479656a8322ce49d51193168ca2796e1801
-
SHA256
8a7dc460ab070eef4866d91e9de4f020b2052dbdeeea569b185f8cc948c2b6cc
-
SHA512
669565f418207268fb5409b0efca1e443e3e320020d4193c03eb63e2b8a372786c294529b4d993a84a27d4d4045afe894d6bf77b0be86d8e9755ee56b63538d8
-
SSDEEP
768:CayHHvPWlhhwS2MGdpklziL/OiComCgJlDHXX9aw:C3HH2lhhwTMGdxmiC7lD3X1
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2988 msedge.exe 2988 msedge.exe 912 msedge.exe 912 msedge.exe 1504 identity_helper.exe 1504 identity_helper.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 912 msedge.exe 912 msedge.exe 912 msedge.exe 912 msedge.exe 912 msedge.exe 912 msedge.exe 912 msedge.exe 912 msedge.exe 912 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 912 msedge.exe 912 msedge.exe 912 msedge.exe 912 msedge.exe 912 msedge.exe 912 msedge.exe 912 msedge.exe 912 msedge.exe 912 msedge.exe 912 msedge.exe 912 msedge.exe 912 msedge.exe 912 msedge.exe 912 msedge.exe 912 msedge.exe 912 msedge.exe 912 msedge.exe 912 msedge.exe 912 msedge.exe 912 msedge.exe 912 msedge.exe 912 msedge.exe 912 msedge.exe 912 msedge.exe 912 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 912 msedge.exe 912 msedge.exe 912 msedge.exe 912 msedge.exe 912 msedge.exe 912 msedge.exe 912 msedge.exe 912 msedge.exe 912 msedge.exe 912 msedge.exe 912 msedge.exe 912 msedge.exe 912 msedge.exe 912 msedge.exe 912 msedge.exe 912 msedge.exe 912 msedge.exe 912 msedge.exe 912 msedge.exe 912 msedge.exe 912 msedge.exe 912 msedge.exe 912 msedge.exe 912 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 912 wrote to memory of 1492 912 msedge.exe 83 PID 912 wrote to memory of 1492 912 msedge.exe 83 PID 912 wrote to memory of 548 912 msedge.exe 84 PID 912 wrote to memory of 548 912 msedge.exe 84 PID 912 wrote to memory of 548 912 msedge.exe 84 PID 912 wrote to memory of 548 912 msedge.exe 84 PID 912 wrote to memory of 548 912 msedge.exe 84 PID 912 wrote to memory of 548 912 msedge.exe 84 PID 912 wrote to memory of 548 912 msedge.exe 84 PID 912 wrote to memory of 548 912 msedge.exe 84 PID 912 wrote to memory of 548 912 msedge.exe 84 PID 912 wrote to memory of 548 912 msedge.exe 84 PID 912 wrote to memory of 548 912 msedge.exe 84 PID 912 wrote to memory of 548 912 msedge.exe 84 PID 912 wrote to memory of 548 912 msedge.exe 84 PID 912 wrote to memory of 548 912 msedge.exe 84 PID 912 wrote to memory of 548 912 msedge.exe 84 PID 912 wrote to memory of 548 912 msedge.exe 84 PID 912 wrote to memory of 548 912 msedge.exe 84 PID 912 wrote to memory of 548 912 msedge.exe 84 PID 912 wrote to memory of 548 912 msedge.exe 84 PID 912 wrote to memory of 548 912 msedge.exe 84 PID 912 wrote to memory of 548 912 msedge.exe 84 PID 912 wrote to memory of 548 912 msedge.exe 84 PID 912 wrote to memory of 548 912 msedge.exe 84 PID 912 wrote to memory of 548 912 msedge.exe 84 PID 912 wrote to memory of 548 912 msedge.exe 84 PID 912 wrote to memory of 548 912 msedge.exe 84 PID 912 wrote to memory of 548 912 msedge.exe 84 PID 912 wrote to memory of 548 912 msedge.exe 84 PID 912 wrote to memory of 548 912 msedge.exe 84 PID 912 wrote to memory of 548 912 msedge.exe 84 PID 912 wrote to memory of 548 912 msedge.exe 84 PID 912 wrote to memory of 548 912 msedge.exe 84 PID 912 wrote to memory of 548 912 msedge.exe 84 PID 912 wrote to memory of 548 912 msedge.exe 84 PID 912 wrote to memory of 548 912 msedge.exe 84 PID 912 wrote to memory of 548 912 msedge.exe 84 PID 912 wrote to memory of 548 912 msedge.exe 84 PID 912 wrote to memory of 548 912 msedge.exe 84 PID 912 wrote to memory of 548 912 msedge.exe 84 PID 912 wrote to memory of 548 912 msedge.exe 84 PID 912 wrote to memory of 2988 912 msedge.exe 85 PID 912 wrote to memory of 2988 912 msedge.exe 85 PID 912 wrote to memory of 1784 912 msedge.exe 86 PID 912 wrote to memory of 1784 912 msedge.exe 86 PID 912 wrote to memory of 1784 912 msedge.exe 86 PID 912 wrote to memory of 1784 912 msedge.exe 86 PID 912 wrote to memory of 1784 912 msedge.exe 86 PID 912 wrote to memory of 1784 912 msedge.exe 86 PID 912 wrote to memory of 1784 912 msedge.exe 86 PID 912 wrote to memory of 1784 912 msedge.exe 86 PID 912 wrote to memory of 1784 912 msedge.exe 86 PID 912 wrote to memory of 1784 912 msedge.exe 86 PID 912 wrote to memory of 1784 912 msedge.exe 86 PID 912 wrote to memory of 1784 912 msedge.exe 86 PID 912 wrote to memory of 1784 912 msedge.exe 86 PID 912 wrote to memory of 1784 912 msedge.exe 86 PID 912 wrote to memory of 1784 912 msedge.exe 86 PID 912 wrote to memory of 1784 912 msedge.exe 86 PID 912 wrote to memory of 1784 912 msedge.exe 86 PID 912 wrote to memory of 1784 912 msedge.exe 86 PID 912 wrote to memory of 1784 912 msedge.exe 86 PID 912 wrote to memory of 1784 912 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\4935ae8632240e620e117fa1e84c8e1e_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:912 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe40aa46f8,0x7ffe40aa4708,0x7ffe40aa47182⤵PID:1492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,16336900392921782057,11260920629899686882,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:22⤵PID:548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,16336900392921782057,11260920629899686882,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2536 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,16336900392921782057,11260920629899686882,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2844 /prefetch:82⤵PID:1784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,16336900392921782057,11260920629899686882,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,16336900392921782057,11260920629899686882,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,16336900392921782057,11260920629899686882,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4676 /prefetch:12⤵PID:2888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,16336900392921782057,11260920629899686882,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2988 /prefetch:12⤵PID:404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,16336900392921782057,11260920629899686882,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5008 /prefetch:12⤵PID:3380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,16336900392921782057,11260920629899686882,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4964 /prefetch:82⤵PID:1228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,16336900392921782057,11260920629899686882,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4964 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,16336900392921782057,11260920629899686882,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4976 /prefetch:12⤵PID:5004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,16336900392921782057,11260920629899686882,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4876 /prefetch:12⤵PID:3520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,16336900392921782057,11260920629899686882,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5816 /prefetch:12⤵PID:3040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,16336900392921782057,11260920629899686882,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5608 /prefetch:12⤵PID:1128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,16336900392921782057,11260920629899686882,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5316 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2068
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:464
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1940
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD5bc33ec52760320b5ebed2340ff7ac289
SHA14a0ed9a27e839bdceedc196187de02eaa56611f1
SHA2569b3150c11305c07f358aefdf2eb389695264598d817fd445fcbb33cbd28000b0
SHA512f053ee20d8514bbf434c4641df216d49571522ebeac1416c94066c2157640cb72b3c07cc237ef5435465ce028783ffede5c11813fa4519aa3b3fbbc49bfd7937
-
Filesize
1KB
MD5730340adf1ff111b10b2fb9fadab16ed
SHA10b34d73278f05e8e71bda31a4c2e4fff3a23d3cf
SHA2566e59f2645eb665da302c2d94b7aa23ab23c1e0ca1698bac00d8446e5b575e9ee
SHA512a11b4dabe866ac91312dab10ac5000dd0d16e81a203691ccde458306ab432b22eba450f2a8d239b1b3a838f66349bb4063bbfe9a0b148142770223f5926dff87
-
Filesize
5KB
MD56c26d2ec07e39d7f056bb8e7e89063a8
SHA15729938b5718eee355f9e6615ca764d688ff1a3d
SHA256ff8a88fb9dc1922d6b521bed3356be461d69d15452acdc6677505c14d4d4f28c
SHA5128e9eb50dbca27a6897190bc96bab75dc9bc81157a1c73f3d5b54744f892a6cdc77fe097fce3175f6bf2f8f939ed2167e2c34453fa5ca08dceeb3bb1b1bde0e26
-
Filesize
6KB
MD5d4de8d38d1b8dd30167cd954819caf18
SHA100d849794835f22e8d24a483aba1f31dff98d2c6
SHA25652b9b23d9cb4a0ba5c89d944c432696f3bef1effbac29e8c0c63a7e484f65f5f
SHA512fb9fee5d4693511b509a46dee82b996f59489674b05304508b91c54119af122e422a9b4db0c0b55597a1e4145f3d4f4f9e3ba5059e7a974e6457f01c08bac080
-
Filesize
6KB
MD59a2ddce8f3bc311928bd23f8c901d3ea
SHA1ffbeaf9a2caf8d13c631ef3f3b323ffb47f0fbea
SHA256467ec329a3e286c41e9dc05784e028c3c393e61ac55052167b0c545f341b172e
SHA512f02ed971bb3d47865467c2d29fa361862f2562b18b1423e52787f0991fd5fafba772747b1bb4ce24a0a454b3d3396032070fc63b6f7f15cd35c18f4fc73f479f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD56c2f0ee5b0f029cd20ffed02bd1dace2
SHA144a9fcab1730fd72fa6d337a13d73fa09c8df65a
SHA25667509b8ee4c7350c718bd2c68c162ca09485d1c19f42093abb4c7bc0f068ca7b
SHA512a0ee1c26f22e34839fc8bc9d172b5485755d65d969c9c1a425cb90aa25d5a9a577a2918a286428fbb87fe239cd9e79854eb2e0feb2f86c71300c0934a099fbc1