Analysis
-
max time kernel
145s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
17/05/2024, 03:53
Static task
static1
Behavioral task
behavioral1
Sample
4e514e4bc3606d0b747bc72a10891d53_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4e514e4bc3606d0b747bc72a10891d53_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
4e514e4bc3606d0b747bc72a10891d53_JaffaCakes118.html
-
Size
35KB
-
MD5
4e514e4bc3606d0b747bc72a10891d53
-
SHA1
f23a46932a0429561154aa633bcfd7fa3ea1029c
-
SHA256
1d9e82cbc7bf15c4d6084b213965957ab0eedb049784d4c7d0e0e44f8032c045
-
SHA512
a4175e52a27397dd89aed22239c1b79444c10e7f73ce6365d6352f3b08bd90a66c9b145b9ee012d472360e167d8c9d53acc2e462f5829f297333e272d6fca496
-
SSDEEP
768:Snmj66wUiFXFBbqBkJVvzzEj6IN4Kwohx+IQZJ2wHxrH3vNwWHl:Snmj66liFXFFqBqWwHxrH3vNwWHl
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3364 msedge.exe 3364 msedge.exe 3164 msedge.exe 3164 msedge.exe 3708 identity_helper.exe 3708 identity_helper.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3164 wrote to memory of 1524 3164 msedge.exe 82 PID 3164 wrote to memory of 1524 3164 msedge.exe 82 PID 3164 wrote to memory of 3692 3164 msedge.exe 83 PID 3164 wrote to memory of 3692 3164 msedge.exe 83 PID 3164 wrote to memory of 3692 3164 msedge.exe 83 PID 3164 wrote to memory of 3692 3164 msedge.exe 83 PID 3164 wrote to memory of 3692 3164 msedge.exe 83 PID 3164 wrote to memory of 3692 3164 msedge.exe 83 PID 3164 wrote to memory of 3692 3164 msedge.exe 83 PID 3164 wrote to memory of 3692 3164 msedge.exe 83 PID 3164 wrote to memory of 3692 3164 msedge.exe 83 PID 3164 wrote to memory of 3692 3164 msedge.exe 83 PID 3164 wrote to memory of 3692 3164 msedge.exe 83 PID 3164 wrote to memory of 3692 3164 msedge.exe 83 PID 3164 wrote to memory of 3692 3164 msedge.exe 83 PID 3164 wrote to memory of 3692 3164 msedge.exe 83 PID 3164 wrote to memory of 3692 3164 msedge.exe 83 PID 3164 wrote to memory of 3692 3164 msedge.exe 83 PID 3164 wrote to memory of 3692 3164 msedge.exe 83 PID 3164 wrote to memory of 3692 3164 msedge.exe 83 PID 3164 wrote to memory of 3692 3164 msedge.exe 83 PID 3164 wrote to memory of 3692 3164 msedge.exe 83 PID 3164 wrote to memory of 3692 3164 msedge.exe 83 PID 3164 wrote to memory of 3692 3164 msedge.exe 83 PID 3164 wrote to memory of 3692 3164 msedge.exe 83 PID 3164 wrote to memory of 3692 3164 msedge.exe 83 PID 3164 wrote to memory of 3692 3164 msedge.exe 83 PID 3164 wrote to memory of 3692 3164 msedge.exe 83 PID 3164 wrote to memory of 3692 3164 msedge.exe 83 PID 3164 wrote to memory of 3692 3164 msedge.exe 83 PID 3164 wrote to memory of 3692 3164 msedge.exe 83 PID 3164 wrote to memory of 3692 3164 msedge.exe 83 PID 3164 wrote to memory of 3692 3164 msedge.exe 83 PID 3164 wrote to memory of 3692 3164 msedge.exe 83 PID 3164 wrote to memory of 3692 3164 msedge.exe 83 PID 3164 wrote to memory of 3692 3164 msedge.exe 83 PID 3164 wrote to memory of 3692 3164 msedge.exe 83 PID 3164 wrote to memory of 3692 3164 msedge.exe 83 PID 3164 wrote to memory of 3692 3164 msedge.exe 83 PID 3164 wrote to memory of 3692 3164 msedge.exe 83 PID 3164 wrote to memory of 3692 3164 msedge.exe 83 PID 3164 wrote to memory of 3692 3164 msedge.exe 83 PID 3164 wrote to memory of 3364 3164 msedge.exe 84 PID 3164 wrote to memory of 3364 3164 msedge.exe 84 PID 3164 wrote to memory of 5004 3164 msedge.exe 85 PID 3164 wrote to memory of 5004 3164 msedge.exe 85 PID 3164 wrote to memory of 5004 3164 msedge.exe 85 PID 3164 wrote to memory of 5004 3164 msedge.exe 85 PID 3164 wrote to memory of 5004 3164 msedge.exe 85 PID 3164 wrote to memory of 5004 3164 msedge.exe 85 PID 3164 wrote to memory of 5004 3164 msedge.exe 85 PID 3164 wrote to memory of 5004 3164 msedge.exe 85 PID 3164 wrote to memory of 5004 3164 msedge.exe 85 PID 3164 wrote to memory of 5004 3164 msedge.exe 85 PID 3164 wrote to memory of 5004 3164 msedge.exe 85 PID 3164 wrote to memory of 5004 3164 msedge.exe 85 PID 3164 wrote to memory of 5004 3164 msedge.exe 85 PID 3164 wrote to memory of 5004 3164 msedge.exe 85 PID 3164 wrote to memory of 5004 3164 msedge.exe 85 PID 3164 wrote to memory of 5004 3164 msedge.exe 85 PID 3164 wrote to memory of 5004 3164 msedge.exe 85 PID 3164 wrote to memory of 5004 3164 msedge.exe 85 PID 3164 wrote to memory of 5004 3164 msedge.exe 85 PID 3164 wrote to memory of 5004 3164 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\4e514e4bc3606d0b747bc72a10891d53_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3164 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9303d46f8,0x7ff9303d4708,0x7ff9303d47182⤵PID:1524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,8672821878399073976,4198108819752464946,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2088 /prefetch:22⤵PID:3692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2044,8672821878399073976,4198108819752464946,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2536 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2044,8672821878399073976,4198108819752464946,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2824 /prefetch:82⤵PID:5004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,8672821878399073976,4198108819752464946,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:4984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,8672821878399073976,4198108819752464946,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:4488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,8672821878399073976,4198108819752464946,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5104 /prefetch:12⤵PID:1088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2044,8672821878399073976,4198108819752464946,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5728 /prefetch:82⤵PID:4972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2044,8672821878399073976,4198108819752464946,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5728 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,8672821878399073976,4198108819752464946,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5380 /prefetch:12⤵PID:5000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,8672821878399073976,4198108819752464946,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5260 /prefetch:12⤵PID:4692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,8672821878399073976,4198108819752464946,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4056 /prefetch:12⤵PID:2028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,8672821878399073976,4198108819752464946,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5852 /prefetch:12⤵PID:3052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,8672821878399073976,4198108819752464946,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6020 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1424
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5020
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4500
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5537815e7cc5c694912ac0308147852e4
SHA12ccdd9d9dc637db5462fe8119c0df261146c363c
SHA256b4b69d099507d88abdeff4835e06cc6711e1c47464c963d013cef0a278e52d4f
SHA51263969a69af057235dbdecddc483ef5ce0058673179a3580c5aa12938c9501513cdb72dd703a06fa7d4fc08d074f17528283338c795334398497c771ecbd1350a
-
Filesize
152B
MD58b167567021ccb1a9fdf073fa9112ef0
SHA13baf293fbfaa7c1e7cdacb5f2975737f4ef69898
SHA25626764cedf35f118b55f30b3a36e0693f9f38290a5b2b6b8b83a00e990ae18513
SHA512726098001ef1acf1dd154a658752fa27dea32bca8fbb66395c142cb666102e71632adbad1b7e2f717071cd3e3af3867471932a71707f2ae97b989f4be468ab54
-
Filesize
22KB
MD55e74c6d871232d6fe5d88711ece1408b
SHA11a5d3ac31e833df4c091f14c94a2ecd1c6294875
SHA256bcadf445d413314a44375c63418a0f255fbac7afae40be0a80c9231751176105
SHA5129d001eabce7ffdbf8e338725ef07f0033d0780ea474b7d33c2ad63886ff3578d818eb5c9b130d726353cd813160b49f572736dd288cece84e9bd8b784ce530d5
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD52e4007de278fa041a236bef160b6ceff
SHA11c8aa3dbedc4e5f089d91f60e9a6c149c996f278
SHA2564600e1a63bcee664443060d363a81a5b89153422aff0dde09dd1086fbe21effa
SHA51269e9c32d830f98e25325b39c138dc50c5fac0a22753cd4c669e2d8c364ce2f30ed974ea733fc84775d62a52e64917c2e83e1736f4c1c9b96feb766e88b91df81
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD5b8aa803bcada7c26d63ea2738e56c747
SHA1f4b83b718fd96bdbb34960dc638782d84b5f2ab4
SHA25628331347179437ad6622821a870d5c34f3fbd282d64659284fc89dcb1a047920
SHA512aac36fe186a1d0df78a9bff5ea5c684c1e70a2341cca40a5a45e0e8cc3a975206d7b43cfb8e02d051dbd1f1be4a86cf41d3559bcbe7e7a4dbec0b09c10bda912
-
Filesize
1KB
MD5158e8bd390578086290957923f9ae0ce
SHA160131c960606ce7640424c0e51771e88692fffc9
SHA25685a3fe50308ad5f90efd6e9cc67db2b14e6a33fbdb6c5a429dca6c4d23fbddef
SHA5123c9d5c46bb27c92f3b8a9ee62567ed72aa4225eae08894c86bdc053ef26b65756aafd8b4a1041873398a00ea533d3aa50770afcf38dff75b5ec1f4af9bebaf89
-
Filesize
5KB
MD525ca72e07e103baa15c3e4e722d7d829
SHA1e65b449f40213138bfeed02002a77fdaef3a25d6
SHA25676d3e1191563644c45604616fc6f514ca5502cbc9f89f3ff92ebc33aa3188142
SHA5126294793e2180081b5a2b925b755d478c2a9d256aa2a30aededad547085b8249fe7c4c1786aa130a6054c52565cb64d976c225ef72dcda5856d5932e5f09f5f2b
-
Filesize
7KB
MD5bcd8c8f68061f91b0625faa4f67dbb36
SHA191d7c4ccbbefc7a1c6d0ca844f723637f4aab71d
SHA2565bfc5eda6904d6d0ee853547d763d9d832e40a0cbc09c3605249f7251f8dbbf3
SHA512ae8ce055d0f4ac9909ec8ebc5809c4410aa6d33adc46dc55a05a89735eadaa423762019a41ce46f8e95330df1ee81dcdcf18c8ae686cb3cb938b3eb7a5d7f7a4
-
Filesize
7KB
MD50532d781702e31f206b0652660204128
SHA18ed59eea948ce12cc6f3f69bfbecafa79f07076a
SHA256c90619166ab7ea401b0db08fd4766770c76c99b2318bb37956ef78c08ce00324
SHA512841cb5e96d4cc16dd57c92b21b4678507c7101355636436a3365c540fcaf0c7aca7c9a0242f469607d746144466183086e8a51eba14c76af50fe8db6e3ef1e0f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD57f85c36154ab6e90ddbf5bbed1a6cfef
SHA17f132714631750a45759b8f41cc9485a18285c9e
SHA256d68a0a1b75356162fabea04b808423b33580744c625973ac459dac72202b47b3
SHA51262606919f5490a450d475d5311b3c8ae1a3400b41eb5471d6d1f6d41d2e0067384552dccd4eca9d96705f3322dda5cd44ad62c403d6b7414792c8ab07c775d39