Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 23:49
Static task
static1
Behavioral task
behavioral1
Sample
690d0121b8e3ce36ae2ad40a14dedcb3_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
690d0121b8e3ce36ae2ad40a14dedcb3_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
690d0121b8e3ce36ae2ad40a14dedcb3_JaffaCakes118.html
-
Size
52KB
-
MD5
690d0121b8e3ce36ae2ad40a14dedcb3
-
SHA1
ccc3a1090b8bdd6715966f447fde97e88a8a77c4
-
SHA256
a0a7df5a83ea799164ab57a828f42cce8ad00d13cdb9978da5c8036d0001bf7f
-
SHA512
cd93a099e227f8024d5a2d242f6733d8a400f547737313f723d1c92702f86ff50f4738b5e1b9b92b66aa70c88b4556ee63edafad2724042f4bc716c0bd47ab65
-
SSDEEP
768:OgOriWNcaSoagGr+UdlYL5E80nQuzCvt1uDwNrble2SE3:Z/9+U6E80srbl/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 4828 msedge.exe 4828 msedge.exe 1184 msedge.exe 1184 msedge.exe 4336 identity_helper.exe 4336 identity_helper.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
Processes:
msedge.exepid process 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 1184 wrote to memory of 2168 1184 msedge.exe msedge.exe PID 1184 wrote to memory of 2168 1184 msedge.exe msedge.exe PID 1184 wrote to memory of 1128 1184 msedge.exe msedge.exe PID 1184 wrote to memory of 1128 1184 msedge.exe msedge.exe PID 1184 wrote to memory of 1128 1184 msedge.exe msedge.exe PID 1184 wrote to memory of 1128 1184 msedge.exe msedge.exe PID 1184 wrote to memory of 1128 1184 msedge.exe msedge.exe PID 1184 wrote to memory of 1128 1184 msedge.exe msedge.exe PID 1184 wrote to memory of 1128 1184 msedge.exe msedge.exe PID 1184 wrote to memory of 1128 1184 msedge.exe msedge.exe PID 1184 wrote to memory of 1128 1184 msedge.exe msedge.exe PID 1184 wrote to memory of 1128 1184 msedge.exe msedge.exe PID 1184 wrote to memory of 1128 1184 msedge.exe msedge.exe PID 1184 wrote to memory of 1128 1184 msedge.exe msedge.exe PID 1184 wrote to memory of 1128 1184 msedge.exe msedge.exe PID 1184 wrote to memory of 1128 1184 msedge.exe msedge.exe PID 1184 wrote to memory of 1128 1184 msedge.exe msedge.exe PID 1184 wrote to memory of 1128 1184 msedge.exe msedge.exe PID 1184 wrote to memory of 1128 1184 msedge.exe msedge.exe PID 1184 wrote to memory of 1128 1184 msedge.exe msedge.exe PID 1184 wrote to memory of 1128 1184 msedge.exe msedge.exe PID 1184 wrote to memory of 1128 1184 msedge.exe msedge.exe PID 1184 wrote to memory of 1128 1184 msedge.exe msedge.exe PID 1184 wrote to memory of 1128 1184 msedge.exe msedge.exe PID 1184 wrote to memory of 1128 1184 msedge.exe msedge.exe PID 1184 wrote to memory of 1128 1184 msedge.exe msedge.exe PID 1184 wrote to memory of 1128 1184 msedge.exe msedge.exe PID 1184 wrote to memory of 1128 1184 msedge.exe msedge.exe PID 1184 wrote to memory of 1128 1184 msedge.exe msedge.exe PID 1184 wrote to memory of 1128 1184 msedge.exe msedge.exe PID 1184 wrote to memory of 1128 1184 msedge.exe msedge.exe PID 1184 wrote to memory of 1128 1184 msedge.exe msedge.exe PID 1184 wrote to memory of 1128 1184 msedge.exe msedge.exe PID 1184 wrote to memory of 1128 1184 msedge.exe msedge.exe PID 1184 wrote to memory of 1128 1184 msedge.exe msedge.exe PID 1184 wrote to memory of 1128 1184 msedge.exe msedge.exe PID 1184 wrote to memory of 1128 1184 msedge.exe msedge.exe PID 1184 wrote to memory of 1128 1184 msedge.exe msedge.exe PID 1184 wrote to memory of 1128 1184 msedge.exe msedge.exe PID 1184 wrote to memory of 1128 1184 msedge.exe msedge.exe PID 1184 wrote to memory of 1128 1184 msedge.exe msedge.exe PID 1184 wrote to memory of 1128 1184 msedge.exe msedge.exe PID 1184 wrote to memory of 4828 1184 msedge.exe msedge.exe PID 1184 wrote to memory of 4828 1184 msedge.exe msedge.exe PID 1184 wrote to memory of 1704 1184 msedge.exe msedge.exe PID 1184 wrote to memory of 1704 1184 msedge.exe msedge.exe PID 1184 wrote to memory of 1704 1184 msedge.exe msedge.exe PID 1184 wrote to memory of 1704 1184 msedge.exe msedge.exe PID 1184 wrote to memory of 1704 1184 msedge.exe msedge.exe PID 1184 wrote to memory of 1704 1184 msedge.exe msedge.exe PID 1184 wrote to memory of 1704 1184 msedge.exe msedge.exe PID 1184 wrote to memory of 1704 1184 msedge.exe msedge.exe PID 1184 wrote to memory of 1704 1184 msedge.exe msedge.exe PID 1184 wrote to memory of 1704 1184 msedge.exe msedge.exe PID 1184 wrote to memory of 1704 1184 msedge.exe msedge.exe PID 1184 wrote to memory of 1704 1184 msedge.exe msedge.exe PID 1184 wrote to memory of 1704 1184 msedge.exe msedge.exe PID 1184 wrote to memory of 1704 1184 msedge.exe msedge.exe PID 1184 wrote to memory of 1704 1184 msedge.exe msedge.exe PID 1184 wrote to memory of 1704 1184 msedge.exe msedge.exe PID 1184 wrote to memory of 1704 1184 msedge.exe msedge.exe PID 1184 wrote to memory of 1704 1184 msedge.exe msedge.exe PID 1184 wrote to memory of 1704 1184 msedge.exe msedge.exe PID 1184 wrote to memory of 1704 1184 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\690d0121b8e3ce36ae2ad40a14dedcb3_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1184 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9cc9c46f8,0x7ff9cc9c4708,0x7ff9cc9c47182⤵PID:2168
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,1785907880987134432,12782684675751033941,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:22⤵PID:1128
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,1785907880987134432,12782684675751033941,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2176 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4828 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,1785907880987134432,12782684675751033941,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2932 /prefetch:82⤵PID:1704
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,1785907880987134432,12782684675751033941,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:2340
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,1785907880987134432,12782684675751033941,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:3108
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,1785907880987134432,12782684675751033941,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4732 /prefetch:12⤵PID:1564
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,1785907880987134432,12782684675751033941,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4872 /prefetch:12⤵PID:4928
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,1785907880987134432,12782684675751033941,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1256 /prefetch:12⤵PID:4776
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,1785907880987134432,12782684675751033941,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2920 /prefetch:12⤵PID:3304
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,1785907880987134432,12782684675751033941,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6276 /prefetch:82⤵PID:3952
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,1785907880987134432,12782684675751033941,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6276 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4336 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,1785907880987134432,12782684675751033941,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5828 /prefetch:12⤵PID:5052
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,1785907880987134432,12782684675751033941,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4872 /prefetch:12⤵PID:1416
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,1785907880987134432,12782684675751033941,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4976 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4708
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4612
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4232
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54b4f91fa1b362ba5341ecb2836438dea
SHA19561f5aabed742404d455da735259a2c6781fa07
SHA256d824b742eace197ddc8b6ed5d918f390fde4b0fbf0e371b8e1f2ed40a3b6455c
SHA512fef22217dcdd8000bc193e25129699d4b8f7a103ca4fe1613baf73ccf67090d9fbae27eb93e4bb8747455853a0a4326f2d0c38df41c8d42351cdcd4132418dac
-
Filesize
152B
MD5eaa3db555ab5bc0cb364826204aad3f0
SHA1a4cdfaac8de49e6e6e88b335cfeaa7c9e3c563ca
SHA256ef7baeb1b2ab05ff3c5fbb76c2759db49294654548706c7c8e87f0cde855b86b
SHA512e13981da51b52c15261ecabb98af32f9b920651b46b10ce0cc823c5878b22eb1420258c80deef204070d1e0bdd3a64d875ac2522e3713a3cf11657aa55aeccd4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD53012ffcac1bf954560a8ac6b45a2bae4
SHA15127248541b829d61e145bafc6fed12a9f0fb752
SHA2569bbd22bb28bffd1fa85d9c43e85e056de8bfd1a40565045d40a99b8c069f8b82
SHA51229cd9ec9aa1762e7ee50610b824634f95512718a8e019317ad2b85909ea1f41a249bc4ede50c3a2dfe7af6dfbc1211a73787b6bf2a8170c785fe5924b8b16d3e
-
Filesize
1KB
MD5ab242bf3ce14e37c67b90bba378fe148
SHA16ec6532fcc68bbe5ffdcce231f5eeb98761416b3
SHA256036f95e1344525a1e8ec462e78912d083c458f602bad3e67835764c04c529468
SHA512737cc4bd7da52ebbe2ddddf5c43bb273cc6c6e258687ab34d647635a057d552713f7ef9fe674fb3e1ed2c159f4283265826d390728b61db6724f747cd5ee2f3f
-
Filesize
5KB
MD55b4de80d20e504410740aeb3bf34964e
SHA1f1238c547e7cd68f8aa31ef312819b6f355a86e6
SHA256c63efc6584b40c2e467d2193b548bdc68f3605c2f601337cabca6e7d1cefff36
SHA512b56015c344ad03f3acc421d26225a3e23589c7d3fbe8579962ab4418c26006b51ca017583833e568b9fe4d4548b80fe5ac704bb56424a19a35424321111cc18e
-
Filesize
6KB
MD5381bd23c4deb24f46f019352af886e97
SHA1767dec317fa62ed55d78fe7b6ce3b4ea10a5ae14
SHA256a11d47b2694ce1f274db4b134673695f41fef3b1201f0e0d053146d011c2dd3f
SHA5125bc51b7b6590e6cec1acb23eb424612645b0655281e593c9f54dcb852d1bd8fecd9e0c75394269b191c38a40e81285054325011d7a56ed5a81b2227fcbcc5351
-
Filesize
6KB
MD5c59082808044fc8167898937d562382f
SHA160e5b144506a507bde77daf1da1bad059cfbb48d
SHA25619a630e36836ee8200b8a0a944f0014006ec803d6be3bd6ee7c4c4cd96fc0051
SHA5122c380277fd3f7f6f73b53819e5c4c0c09ab8576671a68825972d25aeeda319e1a650e3496fe13cfe239e54453594aef6fc6c1cb65acb828142419f79d0fd8f96
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD571732addd3a109176357c600b253953b
SHA1c5fda7db38d42edcd5fafd5eeb06646350036f72
SHA25683b99dd778336f2e3387ac8ab295ea65ddcccbebd99e0a3d4b99d55477df886e
SHA512404637b4facef8952f356d7973072810993a8582a50a86ed2a06a50a923b3c52467ba0482382978028674474cff7fdfe244af426668d444b8497fe0c4d2c721c
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e