Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 01:14
Static task
static1
Behavioral task
behavioral1
Sample
657ba4f617949612cb86af9e99b29b9c_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
657ba4f617949612cb86af9e99b29b9c_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
657ba4f617949612cb86af9e99b29b9c_JaffaCakes118.html
-
Size
72KB
-
MD5
657ba4f617949612cb86af9e99b29b9c
-
SHA1
8ee383db6c455c4a7a03df2fc37fb7cbd64aa7c6
-
SHA256
1ba9b54c74d7d76639617a17b39ea0051d6575a68fb27ef35cb1a45ac64cdbff
-
SHA512
cb80e3f7d9dadbb8b51e85d2c756849ce70441dd2bfd1140273ac2502a6cd4d2da0b7818ac4947c217115be19ac699248bb8345c87b590873714261d4c18c51f
-
SSDEEP
1536:yi3XaA6orTbrJ/OovyLFXU4xevEu3KSMqcTTUMfdXTljjjICFAM4I+fbWjfsadoE:Z3XaA6orTbROu4xevEbTUMfdXTljjT+s
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 3200 msedge.exe 3200 msedge.exe 4456 msedge.exe 4456 msedge.exe 4676 identity_helper.exe 4676 identity_helper.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe 3044 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
Processes:
msedge.exepid process 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 4456 wrote to memory of 1744 4456 msedge.exe msedge.exe PID 4456 wrote to memory of 1744 4456 msedge.exe msedge.exe PID 4456 wrote to memory of 4632 4456 msedge.exe msedge.exe PID 4456 wrote to memory of 4632 4456 msedge.exe msedge.exe PID 4456 wrote to memory of 4632 4456 msedge.exe msedge.exe PID 4456 wrote to memory of 4632 4456 msedge.exe msedge.exe PID 4456 wrote to memory of 4632 4456 msedge.exe msedge.exe PID 4456 wrote to memory of 4632 4456 msedge.exe msedge.exe PID 4456 wrote to memory of 4632 4456 msedge.exe msedge.exe PID 4456 wrote to memory of 4632 4456 msedge.exe msedge.exe PID 4456 wrote to memory of 4632 4456 msedge.exe msedge.exe PID 4456 wrote to memory of 4632 4456 msedge.exe msedge.exe PID 4456 wrote to memory of 4632 4456 msedge.exe msedge.exe PID 4456 wrote to memory of 4632 4456 msedge.exe msedge.exe PID 4456 wrote to memory of 4632 4456 msedge.exe msedge.exe PID 4456 wrote to memory of 4632 4456 msedge.exe msedge.exe PID 4456 wrote to memory of 4632 4456 msedge.exe msedge.exe PID 4456 wrote to memory of 4632 4456 msedge.exe msedge.exe PID 4456 wrote to memory of 4632 4456 msedge.exe msedge.exe PID 4456 wrote to memory of 4632 4456 msedge.exe msedge.exe PID 4456 wrote to memory of 4632 4456 msedge.exe msedge.exe PID 4456 wrote to memory of 4632 4456 msedge.exe msedge.exe PID 4456 wrote to memory of 4632 4456 msedge.exe msedge.exe PID 4456 wrote to memory of 4632 4456 msedge.exe msedge.exe PID 4456 wrote to memory of 4632 4456 msedge.exe msedge.exe PID 4456 wrote to memory of 4632 4456 msedge.exe msedge.exe PID 4456 wrote to memory of 4632 4456 msedge.exe msedge.exe PID 4456 wrote to memory of 4632 4456 msedge.exe msedge.exe PID 4456 wrote to memory of 4632 4456 msedge.exe msedge.exe PID 4456 wrote to memory of 4632 4456 msedge.exe msedge.exe PID 4456 wrote to memory of 4632 4456 msedge.exe msedge.exe PID 4456 wrote to memory of 4632 4456 msedge.exe msedge.exe PID 4456 wrote to memory of 4632 4456 msedge.exe msedge.exe PID 4456 wrote to memory of 4632 4456 msedge.exe msedge.exe PID 4456 wrote to memory of 4632 4456 msedge.exe msedge.exe PID 4456 wrote to memory of 4632 4456 msedge.exe msedge.exe PID 4456 wrote to memory of 4632 4456 msedge.exe msedge.exe PID 4456 wrote to memory of 4632 4456 msedge.exe msedge.exe PID 4456 wrote to memory of 4632 4456 msedge.exe msedge.exe PID 4456 wrote to memory of 4632 4456 msedge.exe msedge.exe PID 4456 wrote to memory of 4632 4456 msedge.exe msedge.exe PID 4456 wrote to memory of 4632 4456 msedge.exe msedge.exe PID 4456 wrote to memory of 3200 4456 msedge.exe msedge.exe PID 4456 wrote to memory of 3200 4456 msedge.exe msedge.exe PID 4456 wrote to memory of 5104 4456 msedge.exe msedge.exe PID 4456 wrote to memory of 5104 4456 msedge.exe msedge.exe PID 4456 wrote to memory of 5104 4456 msedge.exe msedge.exe PID 4456 wrote to memory of 5104 4456 msedge.exe msedge.exe PID 4456 wrote to memory of 5104 4456 msedge.exe msedge.exe PID 4456 wrote to memory of 5104 4456 msedge.exe msedge.exe PID 4456 wrote to memory of 5104 4456 msedge.exe msedge.exe PID 4456 wrote to memory of 5104 4456 msedge.exe msedge.exe PID 4456 wrote to memory of 5104 4456 msedge.exe msedge.exe PID 4456 wrote to memory of 5104 4456 msedge.exe msedge.exe PID 4456 wrote to memory of 5104 4456 msedge.exe msedge.exe PID 4456 wrote to memory of 5104 4456 msedge.exe msedge.exe PID 4456 wrote to memory of 5104 4456 msedge.exe msedge.exe PID 4456 wrote to memory of 5104 4456 msedge.exe msedge.exe PID 4456 wrote to memory of 5104 4456 msedge.exe msedge.exe PID 4456 wrote to memory of 5104 4456 msedge.exe msedge.exe PID 4456 wrote to memory of 5104 4456 msedge.exe msedge.exe PID 4456 wrote to memory of 5104 4456 msedge.exe msedge.exe PID 4456 wrote to memory of 5104 4456 msedge.exe msedge.exe PID 4456 wrote to memory of 5104 4456 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\657ba4f617949612cb86af9e99b29b9c_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4456 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8930846f8,0x7ff893084708,0x7ff8930847182⤵PID:1744
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1980,6613336729437828213,13542324553524013381,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1996 /prefetch:22⤵PID:4632
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1980,6613336729437828213,13542324553524013381,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2112 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3200 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1980,6613336729437828213,13542324553524013381,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2808 /prefetch:82⤵PID:5104
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,6613336729437828213,13542324553524013381,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:2212
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,6613336729437828213,13542324553524013381,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:4552
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,6613336729437828213,13542324553524013381,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4764 /prefetch:12⤵PID:1640
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1980,6613336729437828213,13542324553524013381,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5780 /prefetch:82⤵PID:3920
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1980,6613336729437828213,13542324553524013381,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5780 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4676 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,6613336729437828213,13542324553524013381,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5660 /prefetch:12⤵PID:4476
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,6613336729437828213,13542324553524013381,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5560 /prefetch:12⤵PID:3412
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,6613336729437828213,13542324553524013381,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4944 /prefetch:12⤵PID:2656
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,6613336729437828213,13542324553524013381,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1296 /prefetch:12⤵PID:4020
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1980,6613336729437828213,13542324553524013381,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4736 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3044
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2580
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1612
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51ac52e2503cc26baee4322f02f5b8d9c
SHA138e0cee911f5f2a24888a64780ffdf6fa72207c8
SHA256f65058c6f1a745b37a64d4c97a8e8ee940210273130cec97a67f568088b5d4d4
SHA5127670d606bc5197ecb7db3ddaecd6f74a80e6decae92b94e0e8145a7f463fa099058e89f9dfa1c45b9197c36e5e21994698186a2ec970bbdb0937fe28ca46a834
-
Filesize
152B
MD5b2a1398f937474c51a48b347387ee36a
SHA1922a8567f09e68a04233e84e5919043034635949
SHA2562dc0bf08246ddd5a32288c895d676017578d792349ca437b1b36e7b2f0ade6d6
SHA5124a660c0549f7a850e07d8d36dab33121af02a7bd7e9b2f0137930b4c8cd89b6c5630e408f882684e6935dcb0d5cb5e01a854950eeda252a4881458cafcc7ef7c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD552575f68f894c015090197cb87d0dc6c
SHA1da4359efee3e7a2206323356f9411e5ec83c365d
SHA256f97399b12cccf6bf5b93e7dd3e1d2597ad556de6fbc08bbfb5c1581d16bb300e
SHA512da8ada01549dc72821c7ac0d0833c646e51037176467bc070ab51e5c49c86179b4148312008f282c76ecac18197188129f18e8d1a419dc46c5524e14dd82bc2a
-
Filesize
716B
MD577973c1e6234f24464f57820656eef29
SHA10593ed83627578c8a1bdaf49145cca01b3539d8a
SHA2568fa403364046ae30db9ee6cd946084d7b10c4ac6dc4ca02fa88beaa8fa7db644
SHA51275a013f7928a5a4ad86834cd189753080e63e14dd9fd0032f7511bf8cdca877905ebe42807777e31a3c34d923d25a3910102ab6e04015677bd2b4b611532333c
-
Filesize
481B
MD5e13f2eb86f49cef32f7da8b67e4abef9
SHA13098afd11827d5d68ccea069368c159f434d7768
SHA25604ad4ab01f74f9661cb09406c43afd79f281c84a315d9ef67be6eedcbda5a4a4
SHA512c94d1f07e5fca9ba83d6bf2ea4b4b7daef20f90b9d4cca4553ea5adeefba250ce7743c05829dc9dbcbdb38c0bce935517f1e4e76ae32c5dc286dcf61e2b7a68d
-
Filesize
5KB
MD58bed0a8326380005b91fd1031412b7d9
SHA15493632b9a89e2b363cd723138cddb618d228b93
SHA256a75c55923d23f3d66b373dc11579451098c01c0f2fc19e628dc360b3b07a27dd
SHA512d5be2e1784d9caa47ac7ce2471f30c9036f4dc62738550a6eb63f0a2dcaa72e0f9b90e5ceccab49a60ae35b88475c63fd0a9a64a923834f5ce826081b9beac7a
-
Filesize
6KB
MD55fd0e89dc5e7bf4f9e4995cfeac31d3e
SHA1afee9352624ecfe30294b2062c6cf36aa3c73b9d
SHA256aaa8adac14c6d806a1ef3959ab9a7223707d99a87047ce818462595ce1ad80bf
SHA5123e3122e257465515884f4ceb226dacd6a3a3f1e88ec367899f7021f09e776ecd07826044406ab811abc6b15ba826746e4a8c1bc30c1b2938a0e69db8d3ee242d
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5edffac524d9893fa7baac760a1ac023d
SHA1a070c00b524f4ca6b169c32892454cf17ecce39f
SHA256fb2b14386438ed41137180b9d1321e0fb00ff6c272a671664b0f52c0238b5114
SHA51269cc418c7bed71bbe1fe7f88461b56c8f9f4dad82057b893f47d65f6b077154069550a46d6d801f02c12e8c84460f41d69aea9571256fafad440857439c47584
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e