Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
21/05/2024, 06:48
Static task
static1
Behavioral task
behavioral1
Sample
6262edb10284dd5743c1d10a03b1bb5e_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
6262edb10284dd5743c1d10a03b1bb5e_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
6262edb10284dd5743c1d10a03b1bb5e_JaffaCakes118.html
-
Size
23KB
-
MD5
6262edb10284dd5743c1d10a03b1bb5e
-
SHA1
9cc1b50160f747b3b15111bde6d4456fe393b4b4
-
SHA256
1c7ba4ba635eeb58870e8a89a122131ab1667380241db8648669ead07c55c14c
-
SHA512
61659fcf9d4c456ba6acdab75332790e260e40e21ee0435b4246e494e0bbe55d4d9376285316a1a051819055ac1dd6097f0d45f25848fc863668dea5c7107e24
-
SSDEEP
384:SI9rOwqr3cXkunTURqfzjotr0/coOQLyk3Pk4l2a0Ptk6HA24Q:S1BrsXkCTUI3otr0/fOU8Pk6HA24Q
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4064 msedge.exe 4064 msedge.exe 3792 msedge.exe 3792 msedge.exe 1096 identity_helper.exe 1096 identity_helper.exe 3420 msedge.exe 3420 msedge.exe 3420 msedge.exe 3420 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3792 wrote to memory of 3932 3792 msedge.exe 83 PID 3792 wrote to memory of 3932 3792 msedge.exe 83 PID 3792 wrote to memory of 3036 3792 msedge.exe 84 PID 3792 wrote to memory of 3036 3792 msedge.exe 84 PID 3792 wrote to memory of 3036 3792 msedge.exe 84 PID 3792 wrote to memory of 3036 3792 msedge.exe 84 PID 3792 wrote to memory of 3036 3792 msedge.exe 84 PID 3792 wrote to memory of 3036 3792 msedge.exe 84 PID 3792 wrote to memory of 3036 3792 msedge.exe 84 PID 3792 wrote to memory of 3036 3792 msedge.exe 84 PID 3792 wrote to memory of 3036 3792 msedge.exe 84 PID 3792 wrote to memory of 3036 3792 msedge.exe 84 PID 3792 wrote to memory of 3036 3792 msedge.exe 84 PID 3792 wrote to memory of 3036 3792 msedge.exe 84 PID 3792 wrote to memory of 3036 3792 msedge.exe 84 PID 3792 wrote to memory of 3036 3792 msedge.exe 84 PID 3792 wrote to memory of 3036 3792 msedge.exe 84 PID 3792 wrote to memory of 3036 3792 msedge.exe 84 PID 3792 wrote to memory of 3036 3792 msedge.exe 84 PID 3792 wrote to memory of 3036 3792 msedge.exe 84 PID 3792 wrote to memory of 3036 3792 msedge.exe 84 PID 3792 wrote to memory of 3036 3792 msedge.exe 84 PID 3792 wrote to memory of 3036 3792 msedge.exe 84 PID 3792 wrote to memory of 3036 3792 msedge.exe 84 PID 3792 wrote to memory of 3036 3792 msedge.exe 84 PID 3792 wrote to memory of 3036 3792 msedge.exe 84 PID 3792 wrote to memory of 3036 3792 msedge.exe 84 PID 3792 wrote to memory of 3036 3792 msedge.exe 84 PID 3792 wrote to memory of 3036 3792 msedge.exe 84 PID 3792 wrote to memory of 3036 3792 msedge.exe 84 PID 3792 wrote to memory of 3036 3792 msedge.exe 84 PID 3792 wrote to memory of 3036 3792 msedge.exe 84 PID 3792 wrote to memory of 3036 3792 msedge.exe 84 PID 3792 wrote to memory of 3036 3792 msedge.exe 84 PID 3792 wrote to memory of 3036 3792 msedge.exe 84 PID 3792 wrote to memory of 3036 3792 msedge.exe 84 PID 3792 wrote to memory of 3036 3792 msedge.exe 84 PID 3792 wrote to memory of 3036 3792 msedge.exe 84 PID 3792 wrote to memory of 3036 3792 msedge.exe 84 PID 3792 wrote to memory of 3036 3792 msedge.exe 84 PID 3792 wrote to memory of 3036 3792 msedge.exe 84 PID 3792 wrote to memory of 3036 3792 msedge.exe 84 PID 3792 wrote to memory of 4064 3792 msedge.exe 85 PID 3792 wrote to memory of 4064 3792 msedge.exe 85 PID 3792 wrote to memory of 1052 3792 msedge.exe 86 PID 3792 wrote to memory of 1052 3792 msedge.exe 86 PID 3792 wrote to memory of 1052 3792 msedge.exe 86 PID 3792 wrote to memory of 1052 3792 msedge.exe 86 PID 3792 wrote to memory of 1052 3792 msedge.exe 86 PID 3792 wrote to memory of 1052 3792 msedge.exe 86 PID 3792 wrote to memory of 1052 3792 msedge.exe 86 PID 3792 wrote to memory of 1052 3792 msedge.exe 86 PID 3792 wrote to memory of 1052 3792 msedge.exe 86 PID 3792 wrote to memory of 1052 3792 msedge.exe 86 PID 3792 wrote to memory of 1052 3792 msedge.exe 86 PID 3792 wrote to memory of 1052 3792 msedge.exe 86 PID 3792 wrote to memory of 1052 3792 msedge.exe 86 PID 3792 wrote to memory of 1052 3792 msedge.exe 86 PID 3792 wrote to memory of 1052 3792 msedge.exe 86 PID 3792 wrote to memory of 1052 3792 msedge.exe 86 PID 3792 wrote to memory of 1052 3792 msedge.exe 86 PID 3792 wrote to memory of 1052 3792 msedge.exe 86 PID 3792 wrote to memory of 1052 3792 msedge.exe 86 PID 3792 wrote to memory of 1052 3792 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\6262edb10284dd5743c1d10a03b1bb5e_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3792 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbdcb646f8,0x7ffbdcb64708,0x7ffbdcb647182⤵PID:3932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2020,11722135277999455482,4117356663114698996,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2064 /prefetch:22⤵PID:3036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2020,11722135277999455482,4117356663114698996,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2020,11722135277999455482,4117356663114698996,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2852 /prefetch:82⤵PID:1052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,11722135277999455482,4117356663114698996,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:4800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,11722135277999455482,4117356663114698996,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:3560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,11722135277999455482,4117356663114698996,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4720 /prefetch:12⤵PID:2404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,11722135277999455482,4117356663114698996,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4704 /prefetch:12⤵PID:1032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,11722135277999455482,4117356663114698996,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5424 /prefetch:12⤵PID:4048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,11722135277999455482,4117356663114698996,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5436 /prefetch:12⤵PID:4616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2020,11722135277999455482,4117356663114698996,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5060 /prefetch:82⤵PID:368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2020,11722135277999455482,4117356663114698996,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5060 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,11722135277999455482,4117356663114698996,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4032 /prefetch:12⤵PID:2744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,11722135277999455482,4117356663114698996,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3496 /prefetch:12⤵PID:4968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2020,11722135277999455482,4117356663114698996,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2028 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3420
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5028
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2296
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3060
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c9c4c494f8fba32d95ba2125f00586a3
SHA18a600205528aef7953144f1cf6f7a5115e3611de
SHA256a0ca609205813c307df9122c0c5b0967c5472755700f615b0033129cf7d6b35b
SHA5129d30cea6cfc259e97b0305f8b5cd19774044fb78feedfcef2014b2947f2e6a101273bc4ad30db9cc1724e62eb441266d7df376e28ac58693f128b9cce2c7d20d
-
Filesize
152B
MD54dc6fc5e708279a3310fe55d9c44743d
SHA1a42e8bdf9d1c25ef3e223d59f6b1d16b095f46d2
SHA256a1c5f48659d4b3af960971b3a0f433a95fee5bfafe5680a34110c68b342377d8
SHA5125874b2310187f242b852fa6dcded244cc860abb2be4f6f5a6a1db8322e12e1fef8f825edc0aae75adbb7284a2cd64730650d0643b1e2bb7ead9350e50e1d8c13
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize216B
MD5066e86f3ede1ec10c9b7f68ba73cac2b
SHA1bb64b997170ced65c6bc9d72081c1aa9a2812148
SHA25631db863cb67eaedd900196f819eecf7b85b81a82c961938b04b9350e2c63fa1f
SHA5120bb09da20554f14846a9a7b7a1aca65af773fbc508942166b8cb3a3d8ecdeddf20a6cbe0436592a915f0d036f5cb3235d6526c75b4f748066c793f3a7da61348
-
Filesize
2KB
MD584c626224795f4fd66557e46b139e03c
SHA17476e86addf6bf1b6a551ee37e09b47c2d94e367
SHA2563882e660e7f735c00d96622040e2e865e6d57174f75b4170625b89b4bd041e03
SHA512b7b961ee31c40d61e0a2f3b96d85fca814c03b7441c958da0e5afce38dce6dbcaba246c6e9dca45ce006ee71ac4f26daa9474adb2b1d607201fba68a22fdfd14
-
Filesize
2KB
MD521a9f64568e3096459247eb42d9283a9
SHA1ba91227eafd4c1cc93ac3015928ad554ed41ddae
SHA2565e45db19ff96325e29e0cc64472df9b113f5a55abd2355c8264ceb5a35223911
SHA512c4121f17d5053e72e9420575da23f796556c72885935f8b361b50c1853361ac42af546830c2a5c815bcc473fc3ba92eac0d7ac8cefa023017508ce830fd6928b
-
Filesize
5KB
MD56af989ad5f2386457737d3ca5c53e729
SHA16d16fe05e0eac3ccfed1f491e93769c16f0bd175
SHA2560556cbe798986eb44a4a0243b235f6b91ae4411d167830b7a0ee90c776628cfa
SHA512265478de8a25a4c857013267b29e4e171f5912da4344e5ba134aef39cb40e28c0ddd9d38242b66cba6f37c2e6d82de47361ddc825fbfcaeb6728ece3a9b2aa64
-
Filesize
7KB
MD5329f87b5ba00cb77d64e7771b7d02ce7
SHA1aad890cb3593b0ed5952d7011a773c9c35b9a5ca
SHA256dd453ac2cc9fdadc905fe81d20a4d770253830b2f9c406e9790889dace4af475
SHA51299f9ac63c3d96f8ceca1f0c020259db371b773dfbf378b9138ba51f7c94ee8830159e1fdb2fedbaa7ddae9a9e5dfaabda2b4abce03875cd3132632f4bd9c0303
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5356cab4b4d9e6b0e05e45fd290d25344
SHA115871e4cbe645c041287181d5091fe793752025d
SHA256864bbcdad5d25c9867a157b7cd9ecaf463d472609603ed069401f91b5c2353eb
SHA512d0a85b0f4358aed9ab5db5df78f339abfee11c09c1bdb6fda59d77582536350185456b38e2bb549011c1c379716e84b1cc4b55ae6114fb1c7943474c736f318a