Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
21-05-2024 19:29
Static task
static1
Behavioral task
behavioral1
Sample
647cc2e930fc7b1b4b82eccf40e7483f_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
647cc2e930fc7b1b4b82eccf40e7483f_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
647cc2e930fc7b1b4b82eccf40e7483f_JaffaCakes118.html
-
Size
3KB
-
MD5
647cc2e930fc7b1b4b82eccf40e7483f
-
SHA1
159c43c816073024affe53f2184b77279920cd13
-
SHA256
e710b490e953a5db56ad4c798b0f20926648d87110d95661b10fd3d5243622b5
-
SHA512
8155fdb01d34724e62fb38550212726aed8be6dfa094af1e737b22b747bf8e151b1e31a50231845a11836dc646502fec89ae378af4dd3d31c9a55f2d67dad71b
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 2300 msedge.exe 2300 msedge.exe 5032 msedge.exe 5032 msedge.exe 4408 identity_helper.exe 4408 identity_helper.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
Processes:
msedge.exepid process 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 5032 wrote to memory of 4696 5032 msedge.exe msedge.exe PID 5032 wrote to memory of 4696 5032 msedge.exe msedge.exe PID 5032 wrote to memory of 1536 5032 msedge.exe msedge.exe PID 5032 wrote to memory of 1536 5032 msedge.exe msedge.exe PID 5032 wrote to memory of 1536 5032 msedge.exe msedge.exe PID 5032 wrote to memory of 1536 5032 msedge.exe msedge.exe PID 5032 wrote to memory of 1536 5032 msedge.exe msedge.exe PID 5032 wrote to memory of 1536 5032 msedge.exe msedge.exe PID 5032 wrote to memory of 1536 5032 msedge.exe msedge.exe PID 5032 wrote to memory of 1536 5032 msedge.exe msedge.exe PID 5032 wrote to memory of 1536 5032 msedge.exe msedge.exe PID 5032 wrote to memory of 1536 5032 msedge.exe msedge.exe PID 5032 wrote to memory of 1536 5032 msedge.exe msedge.exe PID 5032 wrote to memory of 1536 5032 msedge.exe msedge.exe PID 5032 wrote to memory of 1536 5032 msedge.exe msedge.exe PID 5032 wrote to memory of 1536 5032 msedge.exe msedge.exe PID 5032 wrote to memory of 1536 5032 msedge.exe msedge.exe PID 5032 wrote to memory of 1536 5032 msedge.exe msedge.exe PID 5032 wrote to memory of 1536 5032 msedge.exe msedge.exe PID 5032 wrote to memory of 1536 5032 msedge.exe msedge.exe PID 5032 wrote to memory of 1536 5032 msedge.exe msedge.exe PID 5032 wrote to memory of 1536 5032 msedge.exe msedge.exe PID 5032 wrote to memory of 1536 5032 msedge.exe msedge.exe PID 5032 wrote to memory of 1536 5032 msedge.exe msedge.exe PID 5032 wrote to memory of 1536 5032 msedge.exe msedge.exe PID 5032 wrote to memory of 1536 5032 msedge.exe msedge.exe PID 5032 wrote to memory of 1536 5032 msedge.exe msedge.exe PID 5032 wrote to memory of 1536 5032 msedge.exe msedge.exe PID 5032 wrote to memory of 1536 5032 msedge.exe msedge.exe PID 5032 wrote to memory of 1536 5032 msedge.exe msedge.exe PID 5032 wrote to memory of 1536 5032 msedge.exe msedge.exe PID 5032 wrote to memory of 1536 5032 msedge.exe msedge.exe PID 5032 wrote to memory of 1536 5032 msedge.exe msedge.exe PID 5032 wrote to memory of 1536 5032 msedge.exe msedge.exe PID 5032 wrote to memory of 1536 5032 msedge.exe msedge.exe PID 5032 wrote to memory of 1536 5032 msedge.exe msedge.exe PID 5032 wrote to memory of 1536 5032 msedge.exe msedge.exe PID 5032 wrote to memory of 1536 5032 msedge.exe msedge.exe PID 5032 wrote to memory of 1536 5032 msedge.exe msedge.exe PID 5032 wrote to memory of 1536 5032 msedge.exe msedge.exe PID 5032 wrote to memory of 1536 5032 msedge.exe msedge.exe PID 5032 wrote to memory of 1536 5032 msedge.exe msedge.exe PID 5032 wrote to memory of 2300 5032 msedge.exe msedge.exe PID 5032 wrote to memory of 2300 5032 msedge.exe msedge.exe PID 5032 wrote to memory of 756 5032 msedge.exe msedge.exe PID 5032 wrote to memory of 756 5032 msedge.exe msedge.exe PID 5032 wrote to memory of 756 5032 msedge.exe msedge.exe PID 5032 wrote to memory of 756 5032 msedge.exe msedge.exe PID 5032 wrote to memory of 756 5032 msedge.exe msedge.exe PID 5032 wrote to memory of 756 5032 msedge.exe msedge.exe PID 5032 wrote to memory of 756 5032 msedge.exe msedge.exe PID 5032 wrote to memory of 756 5032 msedge.exe msedge.exe PID 5032 wrote to memory of 756 5032 msedge.exe msedge.exe PID 5032 wrote to memory of 756 5032 msedge.exe msedge.exe PID 5032 wrote to memory of 756 5032 msedge.exe msedge.exe PID 5032 wrote to memory of 756 5032 msedge.exe msedge.exe PID 5032 wrote to memory of 756 5032 msedge.exe msedge.exe PID 5032 wrote to memory of 756 5032 msedge.exe msedge.exe PID 5032 wrote to memory of 756 5032 msedge.exe msedge.exe PID 5032 wrote to memory of 756 5032 msedge.exe msedge.exe PID 5032 wrote to memory of 756 5032 msedge.exe msedge.exe PID 5032 wrote to memory of 756 5032 msedge.exe msedge.exe PID 5032 wrote to memory of 756 5032 msedge.exe msedge.exe PID 5032 wrote to memory of 756 5032 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\647cc2e930fc7b1b4b82eccf40e7483f_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5032 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff82abe46f8,0x7ff82abe4708,0x7ff82abe47182⤵PID:4696
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,18048343882000689533,6758336904530478141,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2068 /prefetch:22⤵PID:1536
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2056,18048343882000689533,6758336904530478141,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2300 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2056,18048343882000689533,6758336904530478141,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2908 /prefetch:82⤵PID:756
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,18048343882000689533,6758336904530478141,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:1184
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,18048343882000689533,6758336904530478141,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:1960
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,18048343882000689533,6758336904530478141,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5808 /prefetch:82⤵PID:5104
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,18048343882000689533,6758336904530478141,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5808 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4408 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,18048343882000689533,6758336904530478141,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5056 /prefetch:12⤵PID:5048
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,18048343882000689533,6758336904530478141,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5028 /prefetch:12⤵PID:1652
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,18048343882000689533,6758336904530478141,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4924 /prefetch:12⤵PID:3012
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,18048343882000689533,6758336904530478141,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5836 /prefetch:12⤵PID:3104
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,18048343882000689533,6758336904530478141,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5864 /prefetch:12⤵PID:4952
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,18048343882000689533,6758336904530478141,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3888 /prefetch:12⤵PID:1184
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,18048343882000689533,6758336904530478141,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4780 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2472
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4444
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:516
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5537815e7cc5c694912ac0308147852e4
SHA12ccdd9d9dc637db5462fe8119c0df261146c363c
SHA256b4b69d099507d88abdeff4835e06cc6711e1c47464c963d013cef0a278e52d4f
SHA51263969a69af057235dbdecddc483ef5ce0058673179a3580c5aa12938c9501513cdb72dd703a06fa7d4fc08d074f17528283338c795334398497c771ecbd1350a
-
Filesize
152B
MD58b167567021ccb1a9fdf073fa9112ef0
SHA13baf293fbfaa7c1e7cdacb5f2975737f4ef69898
SHA25626764cedf35f118b55f30b3a36e0693f9f38290a5b2b6b8b83a00e990ae18513
SHA512726098001ef1acf1dd154a658752fa27dea32bca8fbb66395c142cb666102e71632adbad1b7e2f717071cd3e3af3867471932a71707f2ae97b989f4be468ab54
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD551be1ba10a5868cbc175bff247e45012
SHA120dd03320a5cb3811f60d1ecbd93342f515da1dc
SHA256b8833ab18c7eff81fe910526e9aaa72b2d147789dc3abe07f17323c39e1fbed6
SHA5123bba97fac13401dc3bb641304378fbbad3182354e034a6a9ffdd21bc8c0afac37d6c112cc083796d1c081c9e3b6a4ef3397cdbfc192af9e2e6014ed181786d1e
-
Filesize
886B
MD52f7c4765c5f5460bffec79d1aeb69622
SHA14d1c336dd197f1c150448fec38e701ba9f38d96c
SHA256cf9b759b2869aeb8ddc1837c00d6ede591d9115f4b22fed5d87fea9c155a4d52
SHA512ad355febe4eecb6ed7adab97e782e30022e9cd301d327d11faad50471b329c1dcabc0d80f82445c8c34462be0fee8567523da876ebf0ea73faffb2ecbf6c8f14
-
Filesize
5KB
MD5bae06eccd761a47bbe039265c69391e7
SHA16dbb74a2d8865352ff5b492eed52ed5ca9cff51c
SHA256f374f732e72f47ae72ffb518aaf35b7417b2eca31548c6335016a919372eb541
SHA512cffb81b3f4a74cee3c66dfa420a0756ce64cc1f0d42944b214b0edb7b1e6193a1d19f647bcf427a1fc52108f2fd213dace4dd8008d0db2b73d6ecc49bb40d2e8
-
Filesize
6KB
MD5ff4bd349d5edc22b1032045b001e0d8a
SHA1a7eb01c6c65ac0c33c50dabe3e705a8676b9173e
SHA2566cb185db8eea5634a546b89da3348caebd42d60722661ae0e2a979a5c9c7428f
SHA51267f17354b3bdc7896f049037143abc9146785976a0c49472bca328a539a94982d8746ffb04de2d4af47ab6c78491559e971b66b6e9b83893215a774dbda8c99b
-
Filesize
6KB
MD5b931f94394cbdb409770fceaba980eae
SHA1851ff635e499f3bb07b61455f44b15c699ef222a
SHA256b99973e63d3cd4075d2b486dc590b2431f9edcaba884b5ada237b048c61f43d0
SHA512fecb52b444e0b825948febe3be07ca6119f9e6e1c3eaf5fa791fd4b03e3d9daa888f3f65d59ac68aedf396f35157ab1f98a92116608a08bf36ae8048e8af496e
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD5cd51a9b90ec99b035f5ae65c964bf458
SHA1e1d31c0a74d0e05adbc2ad70429f60ad05d1d157
SHA2564635fb1fc80c841dcacfb079fbed694fa0909cca1a54c9c53ccb2c6869fa0112
SHA5124dcb4121e8239c1d2c24936ba8b638dc2e47f71afc2db94914e86b1349a7c5dc56e5a85a2ded53e200634ced885cdcec66fcf29f39f40835869fa2c0e0c580df
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e