Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
16/05/2024, 13:34
Static task
static1
Behavioral task
behavioral1
Sample
4b534f36e86381723aae00b97d9c13be_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4b534f36e86381723aae00b97d9c13be_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
4b534f36e86381723aae00b97d9c13be_JaffaCakes118.html
-
Size
35KB
-
MD5
4b534f36e86381723aae00b97d9c13be
-
SHA1
65a135ed405a5bdcbaf452b0ecce727bf1deae66
-
SHA256
1dade14e85e3438d005e38f3405aa54bd2566cdb8002d500bef4803eec29ffec
-
SHA512
beb6bee1bdfaf89275c33905f2eef462ab7c1bf099523860a93172d205f85a97c607bcfa72f05199be24f8c87f88c5b34bc4cdf1e81e07648434480389de009d
-
SSDEEP
768:iKorwX4jF5Tsj+FZKVecLOGWPQmK43DS+12WavqJr6QkD:i5wX4jF5Tsj+FcVecL0DS+12Wavqt6Qy
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 628 msedge.exe 628 msedge.exe 5312 msedge.exe 5312 msedge.exe 5520 identity_helper.exe 5520 identity_helper.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 5312 msedge.exe 5312 msedge.exe 5312 msedge.exe 5312 msedge.exe 5312 msedge.exe 5312 msedge.exe 5312 msedge.exe 5312 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5312 msedge.exe 5312 msedge.exe 5312 msedge.exe 5312 msedge.exe 5312 msedge.exe 5312 msedge.exe 5312 msedge.exe 5312 msedge.exe 5312 msedge.exe 5312 msedge.exe 5312 msedge.exe 5312 msedge.exe 5312 msedge.exe 5312 msedge.exe 5312 msedge.exe 5312 msedge.exe 5312 msedge.exe 5312 msedge.exe 5312 msedge.exe 5312 msedge.exe 5312 msedge.exe 5312 msedge.exe 5312 msedge.exe 5312 msedge.exe 5312 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5312 msedge.exe 5312 msedge.exe 5312 msedge.exe 5312 msedge.exe 5312 msedge.exe 5312 msedge.exe 5312 msedge.exe 5312 msedge.exe 5312 msedge.exe 5312 msedge.exe 5312 msedge.exe 5312 msedge.exe 5312 msedge.exe 5312 msedge.exe 5312 msedge.exe 5312 msedge.exe 5312 msedge.exe 5312 msedge.exe 5312 msedge.exe 5312 msedge.exe 5312 msedge.exe 5312 msedge.exe 5312 msedge.exe 5312 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5312 wrote to memory of 2232 5312 msedge.exe 82 PID 5312 wrote to memory of 2232 5312 msedge.exe 82 PID 5312 wrote to memory of 536 5312 msedge.exe 83 PID 5312 wrote to memory of 536 5312 msedge.exe 83 PID 5312 wrote to memory of 536 5312 msedge.exe 83 PID 5312 wrote to memory of 536 5312 msedge.exe 83 PID 5312 wrote to memory of 536 5312 msedge.exe 83 PID 5312 wrote to memory of 536 5312 msedge.exe 83 PID 5312 wrote to memory of 536 5312 msedge.exe 83 PID 5312 wrote to memory of 536 5312 msedge.exe 83 PID 5312 wrote to memory of 536 5312 msedge.exe 83 PID 5312 wrote to memory of 536 5312 msedge.exe 83 PID 5312 wrote to memory of 536 5312 msedge.exe 83 PID 5312 wrote to memory of 536 5312 msedge.exe 83 PID 5312 wrote to memory of 536 5312 msedge.exe 83 PID 5312 wrote to memory of 536 5312 msedge.exe 83 PID 5312 wrote to memory of 536 5312 msedge.exe 83 PID 5312 wrote to memory of 536 5312 msedge.exe 83 PID 5312 wrote to memory of 536 5312 msedge.exe 83 PID 5312 wrote to memory of 536 5312 msedge.exe 83 PID 5312 wrote to memory of 536 5312 msedge.exe 83 PID 5312 wrote to memory of 536 5312 msedge.exe 83 PID 5312 wrote to memory of 536 5312 msedge.exe 83 PID 5312 wrote to memory of 536 5312 msedge.exe 83 PID 5312 wrote to memory of 536 5312 msedge.exe 83 PID 5312 wrote to memory of 536 5312 msedge.exe 83 PID 5312 wrote to memory of 536 5312 msedge.exe 83 PID 5312 wrote to memory of 536 5312 msedge.exe 83 PID 5312 wrote to memory of 536 5312 msedge.exe 83 PID 5312 wrote to memory of 536 5312 msedge.exe 83 PID 5312 wrote to memory of 536 5312 msedge.exe 83 PID 5312 wrote to memory of 536 5312 msedge.exe 83 PID 5312 wrote to memory of 536 5312 msedge.exe 83 PID 5312 wrote to memory of 536 5312 msedge.exe 83 PID 5312 wrote to memory of 536 5312 msedge.exe 83 PID 5312 wrote to memory of 536 5312 msedge.exe 83 PID 5312 wrote to memory of 536 5312 msedge.exe 83 PID 5312 wrote to memory of 536 5312 msedge.exe 83 PID 5312 wrote to memory of 536 5312 msedge.exe 83 PID 5312 wrote to memory of 536 5312 msedge.exe 83 PID 5312 wrote to memory of 536 5312 msedge.exe 83 PID 5312 wrote to memory of 536 5312 msedge.exe 83 PID 5312 wrote to memory of 628 5312 msedge.exe 84 PID 5312 wrote to memory of 628 5312 msedge.exe 84 PID 5312 wrote to memory of 3120 5312 msedge.exe 85 PID 5312 wrote to memory of 3120 5312 msedge.exe 85 PID 5312 wrote to memory of 3120 5312 msedge.exe 85 PID 5312 wrote to memory of 3120 5312 msedge.exe 85 PID 5312 wrote to memory of 3120 5312 msedge.exe 85 PID 5312 wrote to memory of 3120 5312 msedge.exe 85 PID 5312 wrote to memory of 3120 5312 msedge.exe 85 PID 5312 wrote to memory of 3120 5312 msedge.exe 85 PID 5312 wrote to memory of 3120 5312 msedge.exe 85 PID 5312 wrote to memory of 3120 5312 msedge.exe 85 PID 5312 wrote to memory of 3120 5312 msedge.exe 85 PID 5312 wrote to memory of 3120 5312 msedge.exe 85 PID 5312 wrote to memory of 3120 5312 msedge.exe 85 PID 5312 wrote to memory of 3120 5312 msedge.exe 85 PID 5312 wrote to memory of 3120 5312 msedge.exe 85 PID 5312 wrote to memory of 3120 5312 msedge.exe 85 PID 5312 wrote to memory of 3120 5312 msedge.exe 85 PID 5312 wrote to memory of 3120 5312 msedge.exe 85 PID 5312 wrote to memory of 3120 5312 msedge.exe 85 PID 5312 wrote to memory of 3120 5312 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\4b534f36e86381723aae00b97d9c13be_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5312 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff427246f8,0x7fff42724708,0x7fff427247182⤵PID:2232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,3138907605888584914,14041652359565901470,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2100 /prefetch:22⤵PID:536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,3138907605888584914,14041652359565901470,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,3138907605888584914,14041652359565901470,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2684 /prefetch:82⤵PID:3120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,3138907605888584914,14041652359565901470,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:1988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,3138907605888584914,14041652359565901470,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:5160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,3138907605888584914,14041652359565901470,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4224 /prefetch:12⤵PID:4348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,3138907605888584914,14041652359565901470,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4904 /prefetch:12⤵PID:3740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,3138907605888584914,14041652359565901470,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5800 /prefetch:82⤵PID:2828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,3138907605888584914,14041652359565901470,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5800 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,3138907605888584914,14041652359565901470,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5512 /prefetch:12⤵PID:4824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,3138907605888584914,14041652359565901470,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4928 /prefetch:12⤵PID:2980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,3138907605888584914,14041652359565901470,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6024 /prefetch:12⤵PID:4516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,3138907605888584914,14041652359565901470,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6020 /prefetch:12⤵PID:3224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,3138907605888584914,14041652359565901470,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4952 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4960
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3312
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4960
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ae54e9db2e89f2c54da8cc0bfcbd26bd
SHA1a88af6c673609ecbc51a1a60dfbc8577830d2b5d
SHA2565009d3c953de63cfd14a7d911156c514e179ff07d2b94382d9caac6040cb72af
SHA512e3b70e5eb7321b9deca6f6a17424a15b9fd5c4008bd3789bd01099fd13cb2f4a2f37fe4b920fb51c50517745b576c1f94df83efd1a7e75949551163985599998
-
Filesize
152B
MD5f53207a5ca2ef5c7e976cbb3cb26d870
SHA149a8cc44f53da77bb3dfb36fc7676ed54675db43
SHA25619ab4e3c9da6d9cedda7461efdba9a2085e743513ab89f1dd0fd5a8f9486ad23
SHA512be734c7e8afda19f445912aef0d78f9941add29baebd4a812bff27f10a1d78b52aeb11c551468c8644443c86e1a2a6b2e4aead3d7f81d39925e3c20406ac1499
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize192B
MD5475fbec4d720f7f22a28f874df9018ac
SHA1bda5d1cc246dfa61cce38eabdb7847b01cd391fc
SHA256f808789b0a3d03a719f21d613b0f3c75b2e904ab34ea89a11e80f76cf056934e
SHA512271155c54e46621fade7f1ff1a3ef123389184c3a5b13a2ed7595d3340f7589b1b8bb9c048bf1203a7fa600c224b4cdc97e4368f4336b810b36e86604fcf3ce2
-
Filesize
634B
MD56e3e893dec260b2a16fe519595038cd4
SHA1839927c842bc6f7de51384b121a05f283d83592c
SHA256cd30dd878f1e67eb1333f63d196b104ada4e0d9b70347b3e6948f2d1094c09d4
SHA51253f028cb5899dbec037700cc82d124f49db7b448952a291fc728bd06db03bb3f8925115d7551739d6e40832e72cc62d1831d537ab770c952d2641e1e7338d90f
-
Filesize
5KB
MD56bf6987220f2fc4a87a7d31d8b031c64
SHA1995c6cfc0e893e50b163a21c91b1768a5d0840f7
SHA25622def884cc9ee06918ae2b952892ba343e985678e3a3e4cd648131ed3c564de0
SHA51283ea4b09ad2fa770c9007dcc286c0d22b9f49954468439d55796a05c1b7b68bfb84b50693242dff711c87befa23b6193780b89bb2cde2c35732bc0b2286f8fb1
-
Filesize
6KB
MD59910eb50fbe271f8691c7fc86442f506
SHA1ed91ccbb76f82b77ffe8a512cdc0f7491c7e1c91
SHA25617c768d93713b2ddf9bc8806a0267a91bb8df4cb8f941b7f6875da1ecb6e0884
SHA5124aed66368029a92c1b04dbe48a8833dd062b3641d21e4623409f64264e339914b0e94d0d54e04b3823eef98549157e765c34c5339412ccb373c3c034768adbdb
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD56401c485c11da8c2f1bc27230537d643
SHA1ebe22d89dffa2ab94d57b3a0a005df5937d7db0e
SHA256942fe775a1ca85e19dc844c0c52060c7e1feca29bc82c5135df3e9513d209c73
SHA51200b63f09f34a8622dd16a686df8f49ae02441f8bf57271664a51c8fe2bad638e4c867dc22a937e0a8aa61bf129d9d909c1a8be4d28ee6eaf62e448f820999366