Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
21-05-2024 01:09
Static task
static1
Behavioral task
behavioral1
Sample
618ef745b5b946a102b5e44168867ed0_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
618ef745b5b946a102b5e44168867ed0_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
618ef745b5b946a102b5e44168867ed0_JaffaCakes118.html
-
Size
29KB
-
MD5
618ef745b5b946a102b5e44168867ed0
-
SHA1
4bcfd0821e38bad0f35ef3f51a7e60fd6402e15b
-
SHA256
ee6e67e5e6107d6223a1af9fbd8cdcc9aeb84c21c06804932e34ae8092865c1f
-
SHA512
075ab18ab06b2d99afa5b6dd53721f6a75090540bc08fd3f7e3ac5bf761297a1faa936d742f03a7eb6f5ce08e56684dc3dc1a8b0d258f8561257e0ecdcd8c3fd
-
SSDEEP
768:/yq3SLHy2pVUXrbRGyq3AvPGy6H4lMFh9ofRWXXpOXH0:Gy2eaeM3pe0
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1056 msedge.exe 1056 msedge.exe 3440 msedge.exe 3440 msedge.exe 672 identity_helper.exe 672 identity_helper.exe 5800 msedge.exe 5800 msedge.exe 5800 msedge.exe 5800 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe 3440 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3440 wrote to memory of 4200 3440 msedge.exe 85 PID 3440 wrote to memory of 4200 3440 msedge.exe 85 PID 3440 wrote to memory of 1116 3440 msedge.exe 86 PID 3440 wrote to memory of 1116 3440 msedge.exe 86 PID 3440 wrote to memory of 1116 3440 msedge.exe 86 PID 3440 wrote to memory of 1116 3440 msedge.exe 86 PID 3440 wrote to memory of 1116 3440 msedge.exe 86 PID 3440 wrote to memory of 1116 3440 msedge.exe 86 PID 3440 wrote to memory of 1116 3440 msedge.exe 86 PID 3440 wrote to memory of 1116 3440 msedge.exe 86 PID 3440 wrote to memory of 1116 3440 msedge.exe 86 PID 3440 wrote to memory of 1116 3440 msedge.exe 86 PID 3440 wrote to memory of 1116 3440 msedge.exe 86 PID 3440 wrote to memory of 1116 3440 msedge.exe 86 PID 3440 wrote to memory of 1116 3440 msedge.exe 86 PID 3440 wrote to memory of 1116 3440 msedge.exe 86 PID 3440 wrote to memory of 1116 3440 msedge.exe 86 PID 3440 wrote to memory of 1116 3440 msedge.exe 86 PID 3440 wrote to memory of 1116 3440 msedge.exe 86 PID 3440 wrote to memory of 1116 3440 msedge.exe 86 PID 3440 wrote to memory of 1116 3440 msedge.exe 86 PID 3440 wrote to memory of 1116 3440 msedge.exe 86 PID 3440 wrote to memory of 1116 3440 msedge.exe 86 PID 3440 wrote to memory of 1116 3440 msedge.exe 86 PID 3440 wrote to memory of 1116 3440 msedge.exe 86 PID 3440 wrote to memory of 1116 3440 msedge.exe 86 PID 3440 wrote to memory of 1116 3440 msedge.exe 86 PID 3440 wrote to memory of 1116 3440 msedge.exe 86 PID 3440 wrote to memory of 1116 3440 msedge.exe 86 PID 3440 wrote to memory of 1116 3440 msedge.exe 86 PID 3440 wrote to memory of 1116 3440 msedge.exe 86 PID 3440 wrote to memory of 1116 3440 msedge.exe 86 PID 3440 wrote to memory of 1116 3440 msedge.exe 86 PID 3440 wrote to memory of 1116 3440 msedge.exe 86 PID 3440 wrote to memory of 1116 3440 msedge.exe 86 PID 3440 wrote to memory of 1116 3440 msedge.exe 86 PID 3440 wrote to memory of 1116 3440 msedge.exe 86 PID 3440 wrote to memory of 1116 3440 msedge.exe 86 PID 3440 wrote to memory of 1116 3440 msedge.exe 86 PID 3440 wrote to memory of 1116 3440 msedge.exe 86 PID 3440 wrote to memory of 1116 3440 msedge.exe 86 PID 3440 wrote to memory of 1116 3440 msedge.exe 86 PID 3440 wrote to memory of 1056 3440 msedge.exe 87 PID 3440 wrote to memory of 1056 3440 msedge.exe 87 PID 3440 wrote to memory of 4884 3440 msedge.exe 88 PID 3440 wrote to memory of 4884 3440 msedge.exe 88 PID 3440 wrote to memory of 4884 3440 msedge.exe 88 PID 3440 wrote to memory of 4884 3440 msedge.exe 88 PID 3440 wrote to memory of 4884 3440 msedge.exe 88 PID 3440 wrote to memory of 4884 3440 msedge.exe 88 PID 3440 wrote to memory of 4884 3440 msedge.exe 88 PID 3440 wrote to memory of 4884 3440 msedge.exe 88 PID 3440 wrote to memory of 4884 3440 msedge.exe 88 PID 3440 wrote to memory of 4884 3440 msedge.exe 88 PID 3440 wrote to memory of 4884 3440 msedge.exe 88 PID 3440 wrote to memory of 4884 3440 msedge.exe 88 PID 3440 wrote to memory of 4884 3440 msedge.exe 88 PID 3440 wrote to memory of 4884 3440 msedge.exe 88 PID 3440 wrote to memory of 4884 3440 msedge.exe 88 PID 3440 wrote to memory of 4884 3440 msedge.exe 88 PID 3440 wrote to memory of 4884 3440 msedge.exe 88 PID 3440 wrote to memory of 4884 3440 msedge.exe 88 PID 3440 wrote to memory of 4884 3440 msedge.exe 88 PID 3440 wrote to memory of 4884 3440 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\618ef745b5b946a102b5e44168867ed0_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3440 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff76e346f8,0x7fff76e34708,0x7fff76e347182⤵PID:4200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2032,10764356510843685244,9265969400777815641,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2064 /prefetch:22⤵PID:1116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2032,10764356510843685244,9265969400777815641,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2468 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2032,10764356510843685244,9265969400777815641,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2876 /prefetch:82⤵PID:4884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,10764356510843685244,9265969400777815641,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:1736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,10764356510843685244,9265969400777815641,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:4068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,10764356510843685244,9265969400777815641,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4632 /prefetch:12⤵PID:1616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,10764356510843685244,9265969400777815641,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5188 /prefetch:12⤵PID:1928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2032,10764356510843685244,9265969400777815641,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5544 /prefetch:82⤵PID:2052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2032,10764356510843685244,9265969400777815641,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5544 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,10764356510843685244,9265969400777815641,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5608 /prefetch:12⤵PID:3788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,10764356510843685244,9265969400777815641,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5624 /prefetch:12⤵PID:1800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,10764356510843685244,9265969400777815641,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5404 /prefetch:12⤵PID:5352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,10764356510843685244,9265969400777815641,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3520 /prefetch:12⤵PID:5360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2032,10764356510843685244,9265969400777815641,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5348 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5800
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4428
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1316
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1068
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize216B
MD551bfe8852099167d28dd9963d0ee2993
SHA10f109a8a8d5d0e76095b1c4316e70ca0221a2a45
SHA2569312868eeea37c1fe4e98c6a481beeece4eb47dfb7f08e7040a2b72b1ae1f60a
SHA5126ec1c34f1aee20522363a8b1494ea39fe136b588415111f0e5ae2b17cd92e23c81e4f1a66978b5ac3a313b4779e2f40933b95afd7a376f35ae98e8c8cab66f51
-
Filesize
2KB
MD525a2b410ebd5803d6df253d34bfd4b20
SHA1c2dfec9b119d97094ea7ac9f99be79edb2d37cbf
SHA256f4ca78e539b0593ae5b2764fecfb28b3dc29b859ebd020f2875db0ee66bcd43e
SHA512c3b6f83339f1f01cff017cd6118167de48011f6316e3d84088716930566b62f8fb71f9305377c49aa084c175bc974a8bd3ba8ad1bc73036cc6cc522eb0731811
-
Filesize
2KB
MD56672a7ccc700e5fb665bf790b8668af7
SHA145b34ab5c2287d5203fa71a305e488e5756adc47
SHA25611b51fdca2baaee7f5731b392dfadcea528b554a35ac7c517c91f7a4526a7d8d
SHA51239857174be8b9096a762bea711c1130cabef14ee16c331504b7c30e4d7aa4d8b1a06017bc3a895a5606800451a43ac055a05ec0e750fb537dc4f7d9779c288eb
-
Filesize
5KB
MD54c2900fc3cb07baf1402c6c82dbf9d3f
SHA18914fdf57a6dedf9764ee440bf4af19c54c647aa
SHA256727c5ab490d2c5dc08a25ed132e80cb4c9680dc204880dd5bec2140f001ca20f
SHA5128fde541264e2c60d113926e4ac02e0a5cb411b95425e8f263f9a02a82504aed9497b21c1cb91edb07536955f5456c71062d4267ec266ca169edeb8042fab6d10
-
Filesize
6KB
MD5ba0bf89990c023bf400fe2f99e809bde
SHA14e6b43f76cbb4077834e727d2e1ed79099ba2227
SHA256ddc2552d519ad72d31b5718a656946800dbb4c5d7bf397ef9ab1a7f5456625cc
SHA512f7acb45d95e754db1fc2f23411b31311c5d5f827a04ec1aae3506f7b6d4c890013c78d32c5815c1ecef56b8902f40a25a119e0c42bf0926735f918dd34b48958
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD517fe420f287f086d462e28388e6f10d2
SHA1ed9b6b23d3274b7cac109e2a4b3ba45af66be1be
SHA2561dea4d367ad529763bb0c15b708c3d1251b1de55106cef1f582dc765a10d7554
SHA5120b5137fe9e8dfa8ce55a674536df18dfdbd042c387af8ee3d0635a46ae18117a252c6f82b7fa615b0c8c7c59f595daff76d8bcb6827379703c7cf5d9e5f1ac0a