Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
20/05/2024, 22:11
Static task
static1
Behavioral task
behavioral1
Sample
610e4024a083a79570df7a08225a55f7_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
610e4024a083a79570df7a08225a55f7_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
610e4024a083a79570df7a08225a55f7_JaffaCakes118.html
-
Size
20KB
-
MD5
610e4024a083a79570df7a08225a55f7
-
SHA1
c63bf70867e0101decdd7acb4c9e15c5bb2f1a48
-
SHA256
36850907533734e541cdf959d3094d32963ee0f91d1ea9bfa96907807e7c28b1
-
SHA512
b3953f6c295a04ed26c20c90f4f6c139f1c1f498d6258dd38b3ff1a4bd41733c11023f67e9c3010617999f5906bfde8363d50bbfa3ddd2c92d0d228d4bbe4016
-
SSDEEP
384:S/0/ef4hq7wN06YSIvM4o/jDUL60HkVJT8kwjbriHiUUBdT8QwIoKT8iNVNsV:S/02ATKMX/jQ9b2v8eV
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3820 msedge.exe 3820 msedge.exe 684 msedge.exe 684 msedge.exe 1716 identity_helper.exe 1716 identity_helper.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 684 msedge.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 684 msedge.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 684 msedge.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 684 wrote to memory of 1708 684 msedge.exe 84 PID 684 wrote to memory of 1708 684 msedge.exe 84 PID 684 wrote to memory of 2800 684 msedge.exe 85 PID 684 wrote to memory of 2800 684 msedge.exe 85 PID 684 wrote to memory of 2800 684 msedge.exe 85 PID 684 wrote to memory of 2800 684 msedge.exe 85 PID 684 wrote to memory of 2800 684 msedge.exe 85 PID 684 wrote to memory of 2800 684 msedge.exe 85 PID 684 wrote to memory of 2800 684 msedge.exe 85 PID 684 wrote to memory of 2800 684 msedge.exe 85 PID 684 wrote to memory of 2800 684 msedge.exe 85 PID 684 wrote to memory of 2800 684 msedge.exe 85 PID 684 wrote to memory of 2800 684 msedge.exe 85 PID 684 wrote to memory of 2800 684 msedge.exe 85 PID 684 wrote to memory of 2800 684 msedge.exe 85 PID 684 wrote to memory of 2800 684 msedge.exe 85 PID 684 wrote to memory of 2800 684 msedge.exe 85 PID 684 wrote to memory of 2800 684 msedge.exe 85 PID 684 wrote to memory of 2800 684 msedge.exe 85 PID 684 wrote to memory of 2800 684 msedge.exe 85 PID 684 wrote to memory of 2800 684 msedge.exe 85 PID 684 wrote to memory of 2800 684 msedge.exe 85 PID 684 wrote to memory of 2800 684 msedge.exe 85 PID 684 wrote to memory of 2800 684 msedge.exe 85 PID 684 wrote to memory of 2800 684 msedge.exe 85 PID 684 wrote to memory of 2800 684 msedge.exe 85 PID 684 wrote to memory of 2800 684 msedge.exe 85 PID 684 wrote to memory of 2800 684 msedge.exe 85 PID 684 wrote to memory of 2800 684 msedge.exe 85 PID 684 wrote to memory of 2800 684 msedge.exe 85 PID 684 wrote to memory of 2800 684 msedge.exe 85 PID 684 wrote to memory of 2800 684 msedge.exe 85 PID 684 wrote to memory of 2800 684 msedge.exe 85 PID 684 wrote to memory of 2800 684 msedge.exe 85 PID 684 wrote to memory of 2800 684 msedge.exe 85 PID 684 wrote to memory of 2800 684 msedge.exe 85 PID 684 wrote to memory of 2800 684 msedge.exe 85 PID 684 wrote to memory of 2800 684 msedge.exe 85 PID 684 wrote to memory of 2800 684 msedge.exe 85 PID 684 wrote to memory of 2800 684 msedge.exe 85 PID 684 wrote to memory of 2800 684 msedge.exe 85 PID 684 wrote to memory of 2800 684 msedge.exe 85 PID 684 wrote to memory of 3820 684 msedge.exe 86 PID 684 wrote to memory of 3820 684 msedge.exe 86 PID 684 wrote to memory of 4216 684 msedge.exe 87 PID 684 wrote to memory of 4216 684 msedge.exe 87 PID 684 wrote to memory of 4216 684 msedge.exe 87 PID 684 wrote to memory of 4216 684 msedge.exe 87 PID 684 wrote to memory of 4216 684 msedge.exe 87 PID 684 wrote to memory of 4216 684 msedge.exe 87 PID 684 wrote to memory of 4216 684 msedge.exe 87 PID 684 wrote to memory of 4216 684 msedge.exe 87 PID 684 wrote to memory of 4216 684 msedge.exe 87 PID 684 wrote to memory of 4216 684 msedge.exe 87 PID 684 wrote to memory of 4216 684 msedge.exe 87 PID 684 wrote to memory of 4216 684 msedge.exe 87 PID 684 wrote to memory of 4216 684 msedge.exe 87 PID 684 wrote to memory of 4216 684 msedge.exe 87 PID 684 wrote to memory of 4216 684 msedge.exe 87 PID 684 wrote to memory of 4216 684 msedge.exe 87 PID 684 wrote to memory of 4216 684 msedge.exe 87 PID 684 wrote to memory of 4216 684 msedge.exe 87 PID 684 wrote to memory of 4216 684 msedge.exe 87 PID 684 wrote to memory of 4216 684 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\610e4024a083a79570df7a08225a55f7_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:684 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc840f46f8,0x7ffc840f4708,0x7ffc840f47182⤵PID:1708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,8742097069028625006,9293401598527962584,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵PID:2800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2064,8742097069028625006,9293401598527962584,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2292 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2064,8742097069028625006,9293401598527962584,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2828 /prefetch:82⤵PID:4216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,8742097069028625006,9293401598527962584,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:2144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,8742097069028625006,9293401598527962584,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:2216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,8742097069028625006,9293401598527962584,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4912 /prefetch:12⤵PID:4844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,8742097069028625006,9293401598527962584,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5272 /prefetch:12⤵PID:212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,8742097069028625006,9293401598527962584,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5556 /prefetch:82⤵PID:2904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,8742097069028625006,9293401598527962584,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5556 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,8742097069028625006,9293401598527962584,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5640 /prefetch:12⤵PID:1688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,8742097069028625006,9293401598527962584,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5656 /prefetch:12⤵PID:2020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,8742097069028625006,9293401598527962584,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5320 /prefetch:12⤵PID:468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,8742097069028625006,9293401598527962584,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5264 /prefetch:12⤵PID:2924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,8742097069028625006,9293401598527962584,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4796 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1536
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3388
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4948
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2996
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52daa93382bba07cbc40af372d30ec576
SHA1c5e709dc3e2e4df2ff841fbde3e30170e7428a94
SHA2561826d2a57b1938c148bf212a47d947ed1bfb26cfc55868931f843ee438117f30
SHA51265635cb59c81548a9ef8fdb0942331e7f3cd0c30ce1d4dba48aed72dbb27b06511a55d2aeaadfadbbb4b7cb4b2e2772bbabba9603b3f7d9c8b9e4a7fbf3d6b6b
-
Filesize
152B
MD5ecdc2754d7d2ae862272153aa9b9ca6e
SHA1c19bed1c6e1c998b9fa93298639ad7961339147d
SHA256a13d791473f836edcab0e93451ce7b7182efbbc54261b2b5644d319e047a00a7
SHA512cd4fb81317d540f8b15f1495a381bb6f0f129b8923a7c06e4b5cf777d2625c30304aee6cc68aa20479e08d84e5030b43fbe93e479602400334dfdd7297f702f2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize192B
MD58a737bd2ec0d2a44e1c26d0f6c6b97da
SHA147627cf2ff0759a326955df1a4fbb58b87b6ce0e
SHA25691d0bd54cf4ece5c24d5b7c73ec9a540420628e96769e272cbcddf0de63b206b
SHA5123f7a659bb011275f966d4d82c007da44c91d4a21d17b13cf68988ca522fbfac3be5ae31e773babf97da58cb965ea012a290eb745d81c2f898dee3d7c265bbe4f
-
Filesize
940B
MD5fb0f9e5f8081466263dcb147cb7793f5
SHA19e36d84a3c594258a788dc34745976d088b49aa5
SHA256f63fcb56496537d9c237430134bb063a465a5806d9c3e5168046015881e214ae
SHA512d6b0f081b5fd22f178e9188798a212e4281b9301366b8da9dc241d201dcd93d5ca579a4be6ab5e2088fe10fed92a71009f2c56cad7a5eb39efd922087540e72a
-
Filesize
6KB
MD516207d7e5e42c2db577d05cbd10f54f8
SHA1aba47ff736bc6d3460ffd92e375216ce4ed36dd6
SHA256d576ec58dd9ec3b3762cb3edafe235f800c4ddbc404f59dc5d7391f0c79a06b4
SHA512429c13150818aeb063e55cc8c356fe78db8c97fe8fb5e88c37fb8b8d97ea6dffb594fb750db5a12446e378ecbf65823351359b3a466c67e7a43fbac77242350d
-
Filesize
5KB
MD5511daceb4ef9fb6cf299c905a57d1130
SHA1c60f7af356212e8d5d0a455d9aadc07c5fd948b9
SHA256b318d550987c26ad3562893d7598f47d1271e22176ef03829002efbf739147af
SHA5121a8bb850475898d1a702ffe5dd89872b8c9623b9e1779d30a9418390f3df816a4b70349d9d642ffd4037e29515bb3b8d8bb19c3ec8845fd3d28a3861ad462503
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD55a3147f878d6cd2e752b3d2f1c1c788d
SHA17bf37829a7e7be31a46908b3c02eec5426ce748e
SHA256924c59fd59d24a03d31b5729f9b0971acd3c33f43d64f80ee7603721bd5423bd
SHA5124b05c4ff10800503ce1a43576d8b7560b0e911b013ef24ede1b95c862dbae0fbeb97804e2de59dc4dc3154205cbb427913c7dbb651eb5c255bf8d7593660105f