Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
21/05/2024, 14:01
Static task
static1
Behavioral task
behavioral1
Sample
638ad376430a13e9dcfe9d85c6864e9c_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
638ad376430a13e9dcfe9d85c6864e9c_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
638ad376430a13e9dcfe9d85c6864e9c_JaffaCakes118.html
-
Size
200KB
-
MD5
638ad376430a13e9dcfe9d85c6864e9c
-
SHA1
cef7e6c8bc175c6f0cadda2546c8408cfe58130c
-
SHA256
539928fc97f8f77d9781f7b6ef61e9d35ea1868522c33baca610f1195ab04e83
-
SHA512
59c4d75e01d14846e488152107ed72213d18bbe245163da3855446f6fe406238dbd1792a731bb66a6552e0ebfb427af5127e5d1975ae66299223e265cf17e6bc
-
SSDEEP
1536:ao0YcYJm7jX289uth+088wdv770yc9RqsZqPD1Y:aoGsm3X28k/n8V0yc9RqsZKD1Y
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 344 msedge.exe 344 msedge.exe 1156 msedge.exe 1156 msedge.exe 5084 identity_helper.exe 5084 identity_helper.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe 4028 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1156 msedge.exe 1156 msedge.exe 1156 msedge.exe 1156 msedge.exe 1156 msedge.exe 1156 msedge.exe 1156 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1156 msedge.exe 1156 msedge.exe 1156 msedge.exe 1156 msedge.exe 1156 msedge.exe 1156 msedge.exe 1156 msedge.exe 1156 msedge.exe 1156 msedge.exe 1156 msedge.exe 1156 msedge.exe 1156 msedge.exe 1156 msedge.exe 1156 msedge.exe 1156 msedge.exe 1156 msedge.exe 1156 msedge.exe 1156 msedge.exe 1156 msedge.exe 1156 msedge.exe 1156 msedge.exe 1156 msedge.exe 1156 msedge.exe 1156 msedge.exe 1156 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1156 msedge.exe 1156 msedge.exe 1156 msedge.exe 1156 msedge.exe 1156 msedge.exe 1156 msedge.exe 1156 msedge.exe 1156 msedge.exe 1156 msedge.exe 1156 msedge.exe 1156 msedge.exe 1156 msedge.exe 1156 msedge.exe 1156 msedge.exe 1156 msedge.exe 1156 msedge.exe 1156 msedge.exe 1156 msedge.exe 1156 msedge.exe 1156 msedge.exe 1156 msedge.exe 1156 msedge.exe 1156 msedge.exe 1156 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1156 wrote to memory of 4424 1156 msedge.exe 82 PID 1156 wrote to memory of 4424 1156 msedge.exe 82 PID 1156 wrote to memory of 3760 1156 msedge.exe 83 PID 1156 wrote to memory of 3760 1156 msedge.exe 83 PID 1156 wrote to memory of 3760 1156 msedge.exe 83 PID 1156 wrote to memory of 3760 1156 msedge.exe 83 PID 1156 wrote to memory of 3760 1156 msedge.exe 83 PID 1156 wrote to memory of 3760 1156 msedge.exe 83 PID 1156 wrote to memory of 3760 1156 msedge.exe 83 PID 1156 wrote to memory of 3760 1156 msedge.exe 83 PID 1156 wrote to memory of 3760 1156 msedge.exe 83 PID 1156 wrote to memory of 3760 1156 msedge.exe 83 PID 1156 wrote to memory of 3760 1156 msedge.exe 83 PID 1156 wrote to memory of 3760 1156 msedge.exe 83 PID 1156 wrote to memory of 3760 1156 msedge.exe 83 PID 1156 wrote to memory of 3760 1156 msedge.exe 83 PID 1156 wrote to memory of 3760 1156 msedge.exe 83 PID 1156 wrote to memory of 3760 1156 msedge.exe 83 PID 1156 wrote to memory of 3760 1156 msedge.exe 83 PID 1156 wrote to memory of 3760 1156 msedge.exe 83 PID 1156 wrote to memory of 3760 1156 msedge.exe 83 PID 1156 wrote to memory of 3760 1156 msedge.exe 83 PID 1156 wrote to memory of 3760 1156 msedge.exe 83 PID 1156 wrote to memory of 3760 1156 msedge.exe 83 PID 1156 wrote to memory of 3760 1156 msedge.exe 83 PID 1156 wrote to memory of 3760 1156 msedge.exe 83 PID 1156 wrote to memory of 3760 1156 msedge.exe 83 PID 1156 wrote to memory of 3760 1156 msedge.exe 83 PID 1156 wrote to memory of 3760 1156 msedge.exe 83 PID 1156 wrote to memory of 3760 1156 msedge.exe 83 PID 1156 wrote to memory of 3760 1156 msedge.exe 83 PID 1156 wrote to memory of 3760 1156 msedge.exe 83 PID 1156 wrote to memory of 3760 1156 msedge.exe 83 PID 1156 wrote to memory of 3760 1156 msedge.exe 83 PID 1156 wrote to memory of 3760 1156 msedge.exe 83 PID 1156 wrote to memory of 3760 1156 msedge.exe 83 PID 1156 wrote to memory of 3760 1156 msedge.exe 83 PID 1156 wrote to memory of 3760 1156 msedge.exe 83 PID 1156 wrote to memory of 3760 1156 msedge.exe 83 PID 1156 wrote to memory of 3760 1156 msedge.exe 83 PID 1156 wrote to memory of 3760 1156 msedge.exe 83 PID 1156 wrote to memory of 3760 1156 msedge.exe 83 PID 1156 wrote to memory of 344 1156 msedge.exe 84 PID 1156 wrote to memory of 344 1156 msedge.exe 84 PID 1156 wrote to memory of 228 1156 msedge.exe 85 PID 1156 wrote to memory of 228 1156 msedge.exe 85 PID 1156 wrote to memory of 228 1156 msedge.exe 85 PID 1156 wrote to memory of 228 1156 msedge.exe 85 PID 1156 wrote to memory of 228 1156 msedge.exe 85 PID 1156 wrote to memory of 228 1156 msedge.exe 85 PID 1156 wrote to memory of 228 1156 msedge.exe 85 PID 1156 wrote to memory of 228 1156 msedge.exe 85 PID 1156 wrote to memory of 228 1156 msedge.exe 85 PID 1156 wrote to memory of 228 1156 msedge.exe 85 PID 1156 wrote to memory of 228 1156 msedge.exe 85 PID 1156 wrote to memory of 228 1156 msedge.exe 85 PID 1156 wrote to memory of 228 1156 msedge.exe 85 PID 1156 wrote to memory of 228 1156 msedge.exe 85 PID 1156 wrote to memory of 228 1156 msedge.exe 85 PID 1156 wrote to memory of 228 1156 msedge.exe 85 PID 1156 wrote to memory of 228 1156 msedge.exe 85 PID 1156 wrote to memory of 228 1156 msedge.exe 85 PID 1156 wrote to memory of 228 1156 msedge.exe 85 PID 1156 wrote to memory of 228 1156 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\638ad376430a13e9dcfe9d85c6864e9c_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1156 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb014846f8,0x7ffb01484708,0x7ffb014847182⤵PID:4424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,697744209346009933,5970979614156363286,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2184 /prefetch:22⤵PID:3760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2056,697744209346009933,5970979614156363286,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2284 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2056,697744209346009933,5970979614156363286,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2624 /prefetch:82⤵PID:228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,697744209346009933,5970979614156363286,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3180 /prefetch:12⤵PID:1768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,697744209346009933,5970979614156363286,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:1332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,697744209346009933,5970979614156363286,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4704 /prefetch:12⤵PID:3536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,697744209346009933,5970979614156363286,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6088 /prefetch:82⤵PID:4284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,697744209346009933,5970979614156363286,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6088 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,697744209346009933,5970979614156363286,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5484 /prefetch:12⤵PID:552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,697744209346009933,5970979614156363286,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5500 /prefetch:12⤵PID:2000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,697744209346009933,5970979614156363286,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5380 /prefetch:12⤵PID:748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,697744209346009933,5970979614156363286,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5944 /prefetch:12⤵PID:904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,697744209346009933,5970979614156363286,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4812 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4028
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5096
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4744
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5537815e7cc5c694912ac0308147852e4
SHA12ccdd9d9dc637db5462fe8119c0df261146c363c
SHA256b4b69d099507d88abdeff4835e06cc6711e1c47464c963d013cef0a278e52d4f
SHA51263969a69af057235dbdecddc483ef5ce0058673179a3580c5aa12938c9501513cdb72dd703a06fa7d4fc08d074f17528283338c795334398497c771ecbd1350a
-
Filesize
152B
MD58b167567021ccb1a9fdf073fa9112ef0
SHA13baf293fbfaa7c1e7cdacb5f2975737f4ef69898
SHA25626764cedf35f118b55f30b3a36e0693f9f38290a5b2b6b8b83a00e990ae18513
SHA512726098001ef1acf1dd154a658752fa27dea32bca8fbb66395c142cb666102e71632adbad1b7e2f717071cd3e3af3867471932a71707f2ae97b989f4be468ab54
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD5e116d7a15be2c2a7b3a0d97f41da55ae
SHA12db6aeaea7fa5773d8a3ce45a996d0d8cfccabee
SHA2561d3369e7dd5577c26c200046b90f2a5f6dda8a8e04b4bca83553e08db38c318a
SHA512b51ddc4ec42fe71c1daec2885c0e5b15aca247435d274f3fa061d2d2cc7d1f7ce69ce9e69a791ec47c7f7f6183578ddda1024ff67dbd3607b56ddd435eeab29d
-
Filesize
1KB
MD59a97bceaa9ec5a9290a19db6f0c1d15f
SHA1607356352f9df54a49dc9600163627d31f539374
SHA2563bd05e2768bc51b5a9c2accbfeca49741940ae1970daaf60b2e5a5bd5b144389
SHA512599eabb5101740ceedcae88a13af4486c8f2fa6cdd2d5d35e7c501ea8e0a12fc8abd268d026e0af648717bdcb5c57ff921d193d0bcfe4e6692b0d045d3c37357
-
Filesize
5KB
MD5bff3a654784491b425266d249a4c0b72
SHA12fa63d5b350ee287ad01aa34b78d7d290eb2d26e
SHA256da1a5be639faaf8c52ed5a96c9e41310d83731c4e6bc363ae14cd8024c0cd086
SHA512837020945bf46f8933ed9f9eed841e34b8ecfa9918afb10c533ad2611fbb9bbfd91aadab744f8ec5ebbb6c1616612fe0a569907e6a0343a19788996571851955
-
Filesize
6KB
MD5ab3a50abc9aad75569ea91ff815c14e2
SHA13d749777f53523a98ce6ee34893908b9b52b3b22
SHA256eb13fa7252e0ebe959e873771e62e8be3b247aadef7da8abe765bc0760627920
SHA5126c7861f87bcb43fc203dcbc50e7c3fe14cd77e34ccf5e9aff5da1ccdbec1cbd928ff779cc9ee111c5a22b642836aa6d12aa1c021668a43c3470c6f20acd182cc
-
Filesize
6KB
MD55fd2cee5eaa41ca7cdc22cb17433a395
SHA1b3cb0a5859eb4915c116f2e6de28de61a9eaca22
SHA256f4b8e892de869953ed63ac729dc188d0e00a254c5258eb1a85747017c644c55f
SHA512e1bc81b8be91febf1c561c16b07852677199ec9c973a836cdf667a310b3c7ae3814f0fcc1f3bd6f76932d883d4aca09e74c90d34b9f53e193feeadb32f7b0104
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD55f9d0d0fdcafe9cac93ced96c47fb2be
SHA181694026904dee370711e9c5c489e19a90a2a53a
SHA256c2a72b047c0f659327e3277abe84e033fdcf7d6166a7357e01a237c7eaa381fb
SHA5122037338acb0d408936ecd24a590adcc9c057a905c7cbf95968d6eed43bff9cbbd1118a7707d398ad5f87b473911d55ca54aa742897f357ada661b1e13fa999d7