Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
16/05/2024, 05:23
Static task
static1
Behavioral task
behavioral1
Sample
4993b350e7a95329c56b59b8c4f02055_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
4993b350e7a95329c56b59b8c4f02055_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
4993b350e7a95329c56b59b8c4f02055_JaffaCakes118.html
-
Size
1.0MB
-
MD5
4993b350e7a95329c56b59b8c4f02055
-
SHA1
76c64fac5536824082ba0d6829a34977262f1942
-
SHA256
d20b808f46a99fbbcacd1ca4848e3dda477b9fa23e2e2c3139ba6422f5d64246
-
SHA512
293312172e3ad7ceb080b3a1cffa3d1d0876aa413ab31525844869c7b4878790c1c4f9096473477d076a0923f3ca70319d177857b544a092f74f0a488072d654
-
SSDEEP
6144:zkclr4UQ6Y/JBDRl3LHhFKB/SKbO6/lsE2HG1qxt+GPaqFZV+rW1bW1:zkcl8B66BDRl3LqBZ7xq/1y
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1436 msedge.exe 1436 msedge.exe 1852 msedge.exe 1852 msedge.exe 4472 identity_helper.exe 4472 identity_helper.exe 3200 msedge.exe 3200 msedge.exe 3200 msedge.exe 3200 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1852 wrote to memory of 5032 1852 msedge.exe 83 PID 1852 wrote to memory of 5032 1852 msedge.exe 83 PID 1852 wrote to memory of 2384 1852 msedge.exe 84 PID 1852 wrote to memory of 2384 1852 msedge.exe 84 PID 1852 wrote to memory of 2384 1852 msedge.exe 84 PID 1852 wrote to memory of 2384 1852 msedge.exe 84 PID 1852 wrote to memory of 2384 1852 msedge.exe 84 PID 1852 wrote to memory of 2384 1852 msedge.exe 84 PID 1852 wrote to memory of 2384 1852 msedge.exe 84 PID 1852 wrote to memory of 2384 1852 msedge.exe 84 PID 1852 wrote to memory of 2384 1852 msedge.exe 84 PID 1852 wrote to memory of 2384 1852 msedge.exe 84 PID 1852 wrote to memory of 2384 1852 msedge.exe 84 PID 1852 wrote to memory of 2384 1852 msedge.exe 84 PID 1852 wrote to memory of 2384 1852 msedge.exe 84 PID 1852 wrote to memory of 2384 1852 msedge.exe 84 PID 1852 wrote to memory of 2384 1852 msedge.exe 84 PID 1852 wrote to memory of 2384 1852 msedge.exe 84 PID 1852 wrote to memory of 2384 1852 msedge.exe 84 PID 1852 wrote to memory of 2384 1852 msedge.exe 84 PID 1852 wrote to memory of 2384 1852 msedge.exe 84 PID 1852 wrote to memory of 2384 1852 msedge.exe 84 PID 1852 wrote to memory of 2384 1852 msedge.exe 84 PID 1852 wrote to memory of 2384 1852 msedge.exe 84 PID 1852 wrote to memory of 2384 1852 msedge.exe 84 PID 1852 wrote to memory of 2384 1852 msedge.exe 84 PID 1852 wrote to memory of 2384 1852 msedge.exe 84 PID 1852 wrote to memory of 2384 1852 msedge.exe 84 PID 1852 wrote to memory of 2384 1852 msedge.exe 84 PID 1852 wrote to memory of 2384 1852 msedge.exe 84 PID 1852 wrote to memory of 2384 1852 msedge.exe 84 PID 1852 wrote to memory of 2384 1852 msedge.exe 84 PID 1852 wrote to memory of 2384 1852 msedge.exe 84 PID 1852 wrote to memory of 2384 1852 msedge.exe 84 PID 1852 wrote to memory of 2384 1852 msedge.exe 84 PID 1852 wrote to memory of 2384 1852 msedge.exe 84 PID 1852 wrote to memory of 2384 1852 msedge.exe 84 PID 1852 wrote to memory of 2384 1852 msedge.exe 84 PID 1852 wrote to memory of 2384 1852 msedge.exe 84 PID 1852 wrote to memory of 2384 1852 msedge.exe 84 PID 1852 wrote to memory of 2384 1852 msedge.exe 84 PID 1852 wrote to memory of 2384 1852 msedge.exe 84 PID 1852 wrote to memory of 1436 1852 msedge.exe 85 PID 1852 wrote to memory of 1436 1852 msedge.exe 85 PID 1852 wrote to memory of 3824 1852 msedge.exe 86 PID 1852 wrote to memory of 3824 1852 msedge.exe 86 PID 1852 wrote to memory of 3824 1852 msedge.exe 86 PID 1852 wrote to memory of 3824 1852 msedge.exe 86 PID 1852 wrote to memory of 3824 1852 msedge.exe 86 PID 1852 wrote to memory of 3824 1852 msedge.exe 86 PID 1852 wrote to memory of 3824 1852 msedge.exe 86 PID 1852 wrote to memory of 3824 1852 msedge.exe 86 PID 1852 wrote to memory of 3824 1852 msedge.exe 86 PID 1852 wrote to memory of 3824 1852 msedge.exe 86 PID 1852 wrote to memory of 3824 1852 msedge.exe 86 PID 1852 wrote to memory of 3824 1852 msedge.exe 86 PID 1852 wrote to memory of 3824 1852 msedge.exe 86 PID 1852 wrote to memory of 3824 1852 msedge.exe 86 PID 1852 wrote to memory of 3824 1852 msedge.exe 86 PID 1852 wrote to memory of 3824 1852 msedge.exe 86 PID 1852 wrote to memory of 3824 1852 msedge.exe 86 PID 1852 wrote to memory of 3824 1852 msedge.exe 86 PID 1852 wrote to memory of 3824 1852 msedge.exe 86 PID 1852 wrote to memory of 3824 1852 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\4993b350e7a95329c56b59b8c4f02055_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1852 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb01aa46f8,0x7ffb01aa4708,0x7ffb01aa47182⤵PID:5032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,15576635578101838570,17100231539771731459,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:22⤵PID:2384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2076,15576635578101838570,17100231539771731459,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2176 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2076,15576635578101838570,17100231539771731459,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2936 /prefetch:82⤵PID:3824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,15576635578101838570,17100231539771731459,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:1900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,15576635578101838570,17100231539771731459,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,15576635578101838570,17100231539771731459,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4732 /prefetch:12⤵PID:1836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,15576635578101838570,17100231539771731459,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4920 /prefetch:12⤵PID:4032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,15576635578101838570,17100231539771731459,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5356 /prefetch:12⤵PID:2380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,15576635578101838570,17100231539771731459,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5468 /prefetch:12⤵PID:828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,15576635578101838570,17100231539771731459,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4736 /prefetch:12⤵PID:972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,15576635578101838570,17100231539771731459,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3460 /prefetch:12⤵PID:4376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,15576635578101838570,17100231539771731459,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3436 /prefetch:12⤵PID:3996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,15576635578101838570,17100231539771731459,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1960 /prefetch:82⤵PID:912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,15576635578101838570,17100231539771731459,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1960 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,15576635578101838570,17100231539771731459,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4028 /prefetch:12⤵PID:4620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,15576635578101838570,17100231539771731459,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5024 /prefetch:12⤵PID:4928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,15576635578101838570,17100231539771731459,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1048 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3200
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3928
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2652
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54f7152bc5a1a715ef481e37d1c791959
SHA1c8a1ed674c62ae4f45519f90a8cc5a81eff3a6d7
SHA256704dd4f98d8ca34ec421f23ba1891b178c23c14b3301e4655efc5c02d356c2bc
SHA5122e6b02ca35d76a655a17a5f3e9dbd8d7517c7dae24f0095c7350eb9e7bdf9e1256a7009aa8878f96c89d1ea4fe5323a41f72b8c551806dda62880d7ff231ff5c
-
Filesize
152B
MD5ea98e583ad99df195d29aa066204ab56
SHA1f89398664af0179641aa0138b337097b617cb2db
SHA256a7abb51435909fa2d75c6f2ff5c69a93d4a0ab276ed579e7d8733b2a63ffbee6
SHA512e109be3466e653e5d310b3e402e1626298b09205d223722a82344dd78504f3c33e1e24e8402a02f38cd2c9c50d96a303ce4846bea5a583423937ab018cd5782f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize216B
MD51a2282bb84cbf070a7a5ee8dc7ec9007
SHA166cf04ce505a3526ed31731bad2e5af9ab6eb056
SHA25648748dba465bb15b4d5a8725f647ba224e03215ddc22d21ff48f433c5532ca59
SHA512db5c80cb02d015d9f5910553a609dfbee3919269db919ec161bc2e4c673eff13d175ff055913dd5f775e4ec00dc74935ed35c11f1a3a55bd203bad3173133392
-
Filesize
2KB
MD55de558b6a26e8314b4d5dc921f91353d
SHA186611e60d98a1955ad055aed7bc68c2666939897
SHA256fa2f6d4e5016a05c251909ad7b3dc68c089c643b50ec925a2cfa0c44bbb1f594
SHA512d3b9582e118b6dfa22e3f45053e54b303f92e5708aadd1f6280fea9e4217fab52162d7820050eb3d08924f6dcdd06108d89d3f0de2ec23693f1da91a748974fe
-
Filesize
5KB
MD56d0c06e711f3089c87f09174ef37c6eb
SHA1a33baa30a9cd0a79a40b7c21242783ffebd2c7bc
SHA25666334b233a5919b1797b7e49c77cfcc34daa5aa537be182017c6fa7a520cfcff
SHA51278a589826992c118add63aefb123d4c85a779b3983555ed538ba3b1312c0c9e39bf91103281ecb178992adfb6a980d754317f74296616d998b1ba094ad32931e
-
Filesize
7KB
MD58796ecafaf024c915affb24f06560056
SHA130df0cbdd800c1f549cdc0b2cb0ff244ac62a4b3
SHA256de7816fd5c1967f969165bfff13d64faea64afc776d32b352260c171f42f90e3
SHA5120c8d101876fd16dd5bcb2871bad9ff2c25ba08821aeb9a47c6c3bac4f3be7c4062962f1e2f0a642410a53cfa0d8a8185b06214519ae6b607eed0b373330e9d65
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD56acddcf7d48279a5799b0671fa25a59d
SHA19a2d921df1a9a3eba3bf296a576857bd9d23ed4b
SHA2563111c2d5194f3b348ddec004ca83398ce4f41cd9f0032786c4ad296c62924a4c
SHA51231f0d5a8616d7c5f960f5c358413a819f952871991cbce466dee824e20dd5171d0b61bfd7c4e31cf81ebedf6a348b1aa9931721d40009c1e218fc3b473bac67a