Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
17-05-2024 10:33
Static task
static1
Behavioral task
behavioral1
Sample
4f8f2a6027f2263f846ce3de89c102be_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4f8f2a6027f2263f846ce3de89c102be_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
4f8f2a6027f2263f846ce3de89c102be_JaffaCakes118.html
-
Size
51KB
-
MD5
4f8f2a6027f2263f846ce3de89c102be
-
SHA1
51b3ae24d50ba551ded87b5edb5b43f0f78d5d09
-
SHA256
a862534b686e01e4cdf10773646e11dacbf74982c2dc1e0c6c2fe9f1ea85fd6f
-
SHA512
ab8eafb558248ff170e7cc3787379ab50084858be46a6208338555c2a18e5dc42a975f9594ab1d61f674a73795514260791bd3c36c6cbf66aba136c80b143495
-
SSDEEP
768:SrEn6zqUo6AQQeNojXpCUfIOaCf5hslque1hRvzoDq7J2SRdEJj:P6OUNAQQei5CUR2lqqDq7o
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 5036 msedge.exe 5036 msedge.exe 3640 msedge.exe 3640 msedge.exe 1160 identity_helper.exe 1160 identity_helper.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe 1316 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe 3640 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3640 wrote to memory of 2796 3640 msedge.exe 82 PID 3640 wrote to memory of 2796 3640 msedge.exe 82 PID 3640 wrote to memory of 3372 3640 msedge.exe 83 PID 3640 wrote to memory of 3372 3640 msedge.exe 83 PID 3640 wrote to memory of 3372 3640 msedge.exe 83 PID 3640 wrote to memory of 3372 3640 msedge.exe 83 PID 3640 wrote to memory of 3372 3640 msedge.exe 83 PID 3640 wrote to memory of 3372 3640 msedge.exe 83 PID 3640 wrote to memory of 3372 3640 msedge.exe 83 PID 3640 wrote to memory of 3372 3640 msedge.exe 83 PID 3640 wrote to memory of 3372 3640 msedge.exe 83 PID 3640 wrote to memory of 3372 3640 msedge.exe 83 PID 3640 wrote to memory of 3372 3640 msedge.exe 83 PID 3640 wrote to memory of 3372 3640 msedge.exe 83 PID 3640 wrote to memory of 3372 3640 msedge.exe 83 PID 3640 wrote to memory of 3372 3640 msedge.exe 83 PID 3640 wrote to memory of 3372 3640 msedge.exe 83 PID 3640 wrote to memory of 3372 3640 msedge.exe 83 PID 3640 wrote to memory of 3372 3640 msedge.exe 83 PID 3640 wrote to memory of 3372 3640 msedge.exe 83 PID 3640 wrote to memory of 3372 3640 msedge.exe 83 PID 3640 wrote to memory of 3372 3640 msedge.exe 83 PID 3640 wrote to memory of 3372 3640 msedge.exe 83 PID 3640 wrote to memory of 3372 3640 msedge.exe 83 PID 3640 wrote to memory of 3372 3640 msedge.exe 83 PID 3640 wrote to memory of 3372 3640 msedge.exe 83 PID 3640 wrote to memory of 3372 3640 msedge.exe 83 PID 3640 wrote to memory of 3372 3640 msedge.exe 83 PID 3640 wrote to memory of 3372 3640 msedge.exe 83 PID 3640 wrote to memory of 3372 3640 msedge.exe 83 PID 3640 wrote to memory of 3372 3640 msedge.exe 83 PID 3640 wrote to memory of 3372 3640 msedge.exe 83 PID 3640 wrote to memory of 3372 3640 msedge.exe 83 PID 3640 wrote to memory of 3372 3640 msedge.exe 83 PID 3640 wrote to memory of 3372 3640 msedge.exe 83 PID 3640 wrote to memory of 3372 3640 msedge.exe 83 PID 3640 wrote to memory of 3372 3640 msedge.exe 83 PID 3640 wrote to memory of 3372 3640 msedge.exe 83 PID 3640 wrote to memory of 3372 3640 msedge.exe 83 PID 3640 wrote to memory of 3372 3640 msedge.exe 83 PID 3640 wrote to memory of 3372 3640 msedge.exe 83 PID 3640 wrote to memory of 3372 3640 msedge.exe 83 PID 3640 wrote to memory of 5036 3640 msedge.exe 84 PID 3640 wrote to memory of 5036 3640 msedge.exe 84 PID 3640 wrote to memory of 4008 3640 msedge.exe 85 PID 3640 wrote to memory of 4008 3640 msedge.exe 85 PID 3640 wrote to memory of 4008 3640 msedge.exe 85 PID 3640 wrote to memory of 4008 3640 msedge.exe 85 PID 3640 wrote to memory of 4008 3640 msedge.exe 85 PID 3640 wrote to memory of 4008 3640 msedge.exe 85 PID 3640 wrote to memory of 4008 3640 msedge.exe 85 PID 3640 wrote to memory of 4008 3640 msedge.exe 85 PID 3640 wrote to memory of 4008 3640 msedge.exe 85 PID 3640 wrote to memory of 4008 3640 msedge.exe 85 PID 3640 wrote to memory of 4008 3640 msedge.exe 85 PID 3640 wrote to memory of 4008 3640 msedge.exe 85 PID 3640 wrote to memory of 4008 3640 msedge.exe 85 PID 3640 wrote to memory of 4008 3640 msedge.exe 85 PID 3640 wrote to memory of 4008 3640 msedge.exe 85 PID 3640 wrote to memory of 4008 3640 msedge.exe 85 PID 3640 wrote to memory of 4008 3640 msedge.exe 85 PID 3640 wrote to memory of 4008 3640 msedge.exe 85 PID 3640 wrote to memory of 4008 3640 msedge.exe 85 PID 3640 wrote to memory of 4008 3640 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\4f8f2a6027f2263f846ce3de89c102be_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3640 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc8b8946f8,0x7ffc8b894708,0x7ffc8b8947182⤵PID:2796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,15515414527356722213,3250715949963761184,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 /prefetch:22⤵PID:3372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,15515414527356722213,3250715949963761184,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2136,15515414527356722213,3250715949963761184,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2832 /prefetch:82⤵PID:4008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,15515414527356722213,3250715949963761184,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:2492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,15515414527356722213,3250715949963761184,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:1512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,15515414527356722213,3250715949963761184,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5008 /prefetch:12⤵PID:1616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,15515414527356722213,3250715949963761184,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6116 /prefetch:12⤵PID:2424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,15515414527356722213,3250715949963761184,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4960 /prefetch:12⤵PID:4720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,15515414527356722213,3250715949963761184,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5100 /prefetch:12⤵PID:4196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,15515414527356722213,3250715949963761184,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1724 /prefetch:82⤵PID:1280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,15515414527356722213,3250715949963761184,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1724 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,15515414527356722213,3250715949963761184,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5032 /prefetch:12⤵PID:3084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,15515414527356722213,3250715949963761184,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6112 /prefetch:12⤵PID:4452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,15515414527356722213,3250715949963761184,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4056 /prefetch:12⤵PID:2940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,15515414527356722213,3250715949963761184,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5748 /prefetch:12⤵PID:3944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,15515414527356722213,3250715949963761184,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1424 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1316
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4836
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4004
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51ac52e2503cc26baee4322f02f5b8d9c
SHA138e0cee911f5f2a24888a64780ffdf6fa72207c8
SHA256f65058c6f1a745b37a64d4c97a8e8ee940210273130cec97a67f568088b5d4d4
SHA5127670d606bc5197ecb7db3ddaecd6f74a80e6decae92b94e0e8145a7f463fa099058e89f9dfa1c45b9197c36e5e21994698186a2ec970bbdb0937fe28ca46a834
-
Filesize
152B
MD5b2a1398f937474c51a48b347387ee36a
SHA1922a8567f09e68a04233e84e5919043034635949
SHA2562dc0bf08246ddd5a32288c895d676017578d792349ca437b1b36e7b2f0ade6d6
SHA5124a660c0549f7a850e07d8d36dab33121af02a7bd7e9b2f0137930b4c8cd89b6c5630e408f882684e6935dcb0d5cb5e01a854950eeda252a4881458cafcc7ef7c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD5fdd6a6ff4aba2ad142721297d550a8f3
SHA154bd930f63e2081cab80280e5696261624a5ade6
SHA256e463c76d3de33f53f5e4793262e53bc76384577064c5c1d716efb1b31ee2f654
SHA512cf0c0afb95af8a866207360ab07e0d5cdfb65c46b9aef751b84b784e2649961a39d2798128ffbb4f62f904bce89e4e02717f01e4128ce8edd5030f6d996091db
-
Filesize
1KB
MD5aea277fd7c35177977eaed58b8ea5d96
SHA1bf8dd3d1266157dddc71a6d57c87fe6ffa6afca0
SHA256a7d03eee232494a5e3b9903625bd2ae6cb89ccf6b4cf68905853b1848100d138
SHA512ea76768feb7ebbd82d0fab281d988cb2d96d452facfff6c150d500b7e49db1fde5d52426edee8cd57e20ba452c8ab2dc39febfda70d527eba98f8aa81335dcd7
-
Filesize
6KB
MD5630e4935ec216d2e2d3c30c16a94cb66
SHA1173955cbbc42261d277132a976f2831540466023
SHA256570c504f17709f3f98a2542f359d1d40d27664c9a455da30c17e3e4e015c9e95
SHA512b6e6c2cb0d5c77f77b396015d43b7bbf7fd4d9c2851e4f974da3bb34a53f82cc5f64c6b0948b112238754da9f4f7e823f27c0d300f5074226021d4003b742cdb
-
Filesize
5KB
MD50991b2055221c593e30b7e6f2ebfa08e
SHA1a15d72297077ca3e01096efecedddad331d443a6
SHA256ee9a30ed756c916c184a17377dcd8297d97b73b6956f4aa10aa77a6e4e284df3
SHA512ef6ba9d0958c3dd85037343db74192e87845f4e82b58f95252254e8d0fb7baa9db202c5672ce411b65c5cb2f9b508e22a9dc8e32c329512dd08559ffc4266da7
-
Filesize
7KB
MD5243345c83bf73e0442026170da8b78b9
SHA10b9ff2e1a5d858e5ab8bd01202d29603b43d2d42
SHA256b047791b49f2be614e1e79717ba958fe8040bff4e349399ef98a31eff3d62361
SHA512e0f8d5cbc073f49471e876ace173739169eaf3856cb379f863fa040d82ea0f23d3b56f1da3070e5bfff8656125a3cecd8f27a8df72099cc204726f5af47571e5
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5787298505dd20befd1a0941bad15ae06
SHA1b811a3492aa5341f3a66790728fd5bd774e46ebe
SHA256c9f022cc32c3a3e628b100c4306137c0ab5323200eccc0995f81694146b624fa
SHA5126f99726d1f1df08d3a8e6da2f0d4a9d06dc07a86268004dd78fc38b965865bc6eb2aca39071231ac10f89d36c6909cc2513e15a347804a2bf4be6b375dafe4af