Analysis
-
max time kernel
146s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
22/05/2024, 07:11
Static task
static1
Behavioral task
behavioral1
Sample
666df5389a2784cb0331a598aa3c8e69_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
666df5389a2784cb0331a598aa3c8e69_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
666df5389a2784cb0331a598aa3c8e69_JaffaCakes118.html
-
Size
106KB
-
MD5
666df5389a2784cb0331a598aa3c8e69
-
SHA1
8ff298ba079c234d68d6a2bd36e47412f9b0b6e7
-
SHA256
a87a0e3f762d9f1af8da26114aa95b1f106ca891d1345984c3f4390174fd9f61
-
SHA512
38c64b6fc4dd95c9f89f1d5666d90963eb84c089d6af299ae47375e2f0d333c99f90b8b6a8d0129002adef3c08eec5e6c11012e9d4c192fa67f1ed49acea2281
-
SSDEEP
3072:Wg6+QD1hgpw8Zfw/pNTQo6H4xW4jPrt6eeBB0:ZQsM17
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 576 msedge.exe 576 msedge.exe 3984 msedge.exe 3984 msedge.exe 668 msedge.exe 668 msedge.exe 668 msedge.exe 668 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3984 wrote to memory of 3620 3984 msedge.exe 83 PID 3984 wrote to memory of 3620 3984 msedge.exe 83 PID 3984 wrote to memory of 5708 3984 msedge.exe 84 PID 3984 wrote to memory of 5708 3984 msedge.exe 84 PID 3984 wrote to memory of 5708 3984 msedge.exe 84 PID 3984 wrote to memory of 5708 3984 msedge.exe 84 PID 3984 wrote to memory of 5708 3984 msedge.exe 84 PID 3984 wrote to memory of 5708 3984 msedge.exe 84 PID 3984 wrote to memory of 5708 3984 msedge.exe 84 PID 3984 wrote to memory of 5708 3984 msedge.exe 84 PID 3984 wrote to memory of 5708 3984 msedge.exe 84 PID 3984 wrote to memory of 5708 3984 msedge.exe 84 PID 3984 wrote to memory of 5708 3984 msedge.exe 84 PID 3984 wrote to memory of 5708 3984 msedge.exe 84 PID 3984 wrote to memory of 5708 3984 msedge.exe 84 PID 3984 wrote to memory of 5708 3984 msedge.exe 84 PID 3984 wrote to memory of 5708 3984 msedge.exe 84 PID 3984 wrote to memory of 5708 3984 msedge.exe 84 PID 3984 wrote to memory of 5708 3984 msedge.exe 84 PID 3984 wrote to memory of 5708 3984 msedge.exe 84 PID 3984 wrote to memory of 5708 3984 msedge.exe 84 PID 3984 wrote to memory of 5708 3984 msedge.exe 84 PID 3984 wrote to memory of 5708 3984 msedge.exe 84 PID 3984 wrote to memory of 5708 3984 msedge.exe 84 PID 3984 wrote to memory of 5708 3984 msedge.exe 84 PID 3984 wrote to memory of 5708 3984 msedge.exe 84 PID 3984 wrote to memory of 5708 3984 msedge.exe 84 PID 3984 wrote to memory of 5708 3984 msedge.exe 84 PID 3984 wrote to memory of 5708 3984 msedge.exe 84 PID 3984 wrote to memory of 5708 3984 msedge.exe 84 PID 3984 wrote to memory of 5708 3984 msedge.exe 84 PID 3984 wrote to memory of 5708 3984 msedge.exe 84 PID 3984 wrote to memory of 5708 3984 msedge.exe 84 PID 3984 wrote to memory of 5708 3984 msedge.exe 84 PID 3984 wrote to memory of 5708 3984 msedge.exe 84 PID 3984 wrote to memory of 5708 3984 msedge.exe 84 PID 3984 wrote to memory of 5708 3984 msedge.exe 84 PID 3984 wrote to memory of 5708 3984 msedge.exe 84 PID 3984 wrote to memory of 5708 3984 msedge.exe 84 PID 3984 wrote to memory of 5708 3984 msedge.exe 84 PID 3984 wrote to memory of 5708 3984 msedge.exe 84 PID 3984 wrote to memory of 5708 3984 msedge.exe 84 PID 3984 wrote to memory of 576 3984 msedge.exe 85 PID 3984 wrote to memory of 576 3984 msedge.exe 85 PID 3984 wrote to memory of 5172 3984 msedge.exe 86 PID 3984 wrote to memory of 5172 3984 msedge.exe 86 PID 3984 wrote to memory of 5172 3984 msedge.exe 86 PID 3984 wrote to memory of 5172 3984 msedge.exe 86 PID 3984 wrote to memory of 5172 3984 msedge.exe 86 PID 3984 wrote to memory of 5172 3984 msedge.exe 86 PID 3984 wrote to memory of 5172 3984 msedge.exe 86 PID 3984 wrote to memory of 5172 3984 msedge.exe 86 PID 3984 wrote to memory of 5172 3984 msedge.exe 86 PID 3984 wrote to memory of 5172 3984 msedge.exe 86 PID 3984 wrote to memory of 5172 3984 msedge.exe 86 PID 3984 wrote to memory of 5172 3984 msedge.exe 86 PID 3984 wrote to memory of 5172 3984 msedge.exe 86 PID 3984 wrote to memory of 5172 3984 msedge.exe 86 PID 3984 wrote to memory of 5172 3984 msedge.exe 86 PID 3984 wrote to memory of 5172 3984 msedge.exe 86 PID 3984 wrote to memory of 5172 3984 msedge.exe 86 PID 3984 wrote to memory of 5172 3984 msedge.exe 86 PID 3984 wrote to memory of 5172 3984 msedge.exe 86 PID 3984 wrote to memory of 5172 3984 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\666df5389a2784cb0331a598aa3c8e69_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3984 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8d51846f8,0x7ff8d5184708,0x7ff8d51847182⤵PID:3620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,15791362275169437343,10551765367006947346,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2176 /prefetch:22⤵PID:5708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2156,15791362275169437343,10551765367006947346,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2252 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2156,15791362275169437343,10551765367006947346,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2868 /prefetch:82⤵PID:5172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,15791362275169437343,10551765367006947346,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:4948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,15791362275169437343,10551765367006947346,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:3352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,15791362275169437343,10551765367006947346,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4732 /prefetch:12⤵PID:4032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,15791362275169437343,10551765367006947346,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5488 /prefetch:12⤵PID:5756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,15791362275169437343,10551765367006947346,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5612 /prefetch:12⤵PID:5320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,15791362275169437343,10551765367006947346,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1752 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:668
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3624
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4296
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3916
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54f7152bc5a1a715ef481e37d1c791959
SHA1c8a1ed674c62ae4f45519f90a8cc5a81eff3a6d7
SHA256704dd4f98d8ca34ec421f23ba1891b178c23c14b3301e4655efc5c02d356c2bc
SHA5122e6b02ca35d76a655a17a5f3e9dbd8d7517c7dae24f0095c7350eb9e7bdf9e1256a7009aa8878f96c89d1ea4fe5323a41f72b8c551806dda62880d7ff231ff5c
-
Filesize
152B
MD5ea98e583ad99df195d29aa066204ab56
SHA1f89398664af0179641aa0138b337097b617cb2db
SHA256a7abb51435909fa2d75c6f2ff5c69a93d4a0ab276ed579e7d8733b2a63ffbee6
SHA512e109be3466e653e5d310b3e402e1626298b09205d223722a82344dd78504f3c33e1e24e8402a02f38cd2c9c50d96a303ce4846bea5a583423937ab018cd5782f
-
Filesize
22KB
MD55e74c6d871232d6fe5d88711ece1408b
SHA11a5d3ac31e833df4c091f14c94a2ecd1c6294875
SHA256bcadf445d413314a44375c63418a0f255fbac7afae40be0a80c9231751176105
SHA5129d001eabce7ffdbf8e338725ef07f0033d0780ea474b7d33c2ad63886ff3578d818eb5c9b130d726353cd813160b49f572736dd288cece84e9bd8b784ce530d5
-
Filesize
20KB
MD5b6c8122025aff891940d1d5e1ab95fce
SHA1a0c7ca41d0922d085c358f5dde81ae3e85a8c9c4
SHA2569954c64c68000f615e5066bc255eced1195d1f8b7dbc715f9062ddf9f147e87e
SHA512e62a37b55b6b8d95c24fb624105ff6ff72f118e31760d0da1e8df8e8acf627ec6327c26dfa26df8535585877604c7948d2f621ccabc39beec49787e22c302c10
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD59f894d650ef654a0327345a99b12c691
SHA16886c1ce71aab7eaefca5511a26bbdb9acc189a9
SHA256f888ccd7abc13a3027305b3865cce2521134d5a6bcef26035b255a66eaccc2a1
SHA512eb3c2ff01d216c943670ad54f5a468bf05901f3760708691e76a6ea5884994d4568bbc0737deb6d551d1859c1bf1c6268a8493c3342b731bedddb5946588fef9
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize432B
MD5de853f6c02d0d82d9fb6de1cfe84b1d6
SHA13da022dedf1559fae737761a7ee42722c2625966
SHA256d5fdacc63ae771eaf528ba9ce7f328315d4570fd9c59a3e0db5207db5bc17f28
SHA5124b1bfbb18de2f223e96031d54d2249b4475b5bdb2416f0dced64ade3cbf2457fe20de6d1300ade1c32ca5d6414d4b643fecbc137075a37dbaf5646c86038a4d2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize456B
MD5d2a91cd1522a5b79656bf1261967ce5f
SHA11129f1b6c5598497e99fb5f6853b16c28dd2aad4
SHA25664c41f8faafdb6153b2f03f15b2df650a881f0d318754c6e98ef0e387778dd63
SHA5124b9c0a48b9414aab1ba07df7833580276c6a5acb76f52cbf742c1acf570787e8b47a8b7106266bd4f658976019976daae04ebf62ceee0739f1b4be1903a2b76f
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
3KB
MD5f478ac07c30370f445b2bb227941c5c5
SHA104b73718eec25a1a75e119f8ae0740108fcb21da
SHA2562f6a811cbb0877728b32699f2cc3a86df07ba9ae4abfac867f344bae91d9df69
SHA512760f6a6142a084f74692b509c77a6352e97a15902a6786b3412c5927abfffdde40cba8f05caddf612d6519c1bd4a3343110224428229a8604865b23bcd83f0d1
-
Filesize
5KB
MD559ee845920902896f519994ffe3ffa41
SHA145f0eb2b002774975d542751a39436a101aa6521
SHA256550d6a8c9fa3e984233f0e4acd92a920f011f560a0551117e0ee7f0a63e9ea8a
SHA512f23b7e1794078f06cde39b3a8d3fd66fd8f41eef92e5d60a4d220b471c40fbab30601fe1197cc29708264277a09788cb0717bcce1515a6f137c92ebe4c518e51
-
Filesize
7KB
MD55e4788d3efeea7f360f40874325eb43f
SHA1a60b7188b31ba23481d9ef45597a09ba348489b6
SHA256dc5862fb2ba7f6eb444e7db28a4ade90296e8db1529b236ec2ee3312ba880bdd
SHA512c8052002fc2efb424330ad24dc4ca626e6caf4f140214f79c2dff7651ba9d7f4cf23b75513962d6b6be70e74d70aa2f55bfad8c9037d080929f26fff0a653274
-
Filesize
538B
MD519e17816f827137ee1ba60acc6ffdfdf
SHA105ef52f80f1d9e370b3bcbd8c3d1959c6ac9ac0e
SHA256625aa74c2e764151d702f3a5ac2c9918812d3fe6645cfb120906db6e5f91e3a2
SHA512670dc3ddd444437a7bedd67dc02aa7f532853f62ed715c5565e3abd976c223a34b9969489ef2f9d07dfacd3cb7b22b6872602eac0f2055da15ad94161c9c4e71
-
Filesize
538B
MD55a159b40e71fd55a29f5f033efa4517b
SHA1a5c62d59b2e3afcd2d0b58ec4bcbc97a61d24723
SHA2561177c4fcd45d29b229a716e8188bc00c236188aaf11de4633f66dcab1e555106
SHA5121c741a45931d7c5516b6e3dd8ac3d552ec1d73ff99e5799670630fe82e1ac264e6a4b53bc0b5af624e938882cc6a2002743bee9920a001514ab4ae2309aca91e
-
Filesize
203B
MD553b3901e82839a96f6121b5ad2ef4233
SHA1a1a70416437084a11be8828c75e638bcdc0040f5
SHA2564fdf068e76a461c7b742b6c52c155b6b42f3568cb7db7f8c706d234b1c876f8f
SHA512a48a83aff3f2053ebebd7033905b5ad3e352fc7d24e8e297e21d027a00af61fa0037048c216daf9de83c91f428ba79c6c9968058f487756e8bba6d3637e07adb
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\fb73961f-8150-4707-a6d7-20529c3aaf51.tmp
Filesize8KB
MD57305b3914cb73c312c8f3090e44b2780
SHA16d3aad4ba578a2e89b0205fa80b459252117a75c
SHA256a36f08685804e2be756b8acc5e85dd9d98895836037ebd940b60b6fdcf391a94
SHA512808d076de79766c1f8c8e0d14a06292fea94116135de7f96cdcb1091d34ff204e8c710da6354907d7c5da7920d0ad9bfd6cf3468ad8359bf09841a68d8046fcc
-
Filesize
11KB
MD513223b1a4b0b700b9767705abfc9f614
SHA1c99168af64d80064b1b34401d2c662c56406e061
SHA256a48f53ece3fb88e0ab6a51f15254a5ef57b8cc38a9c9e3f35759b7b208d72686
SHA5125a236cc0c4a070b3c1e99c55bf988d483bdf8550a69916ac3333f8f3bcfbe955b02f47886ac09f4ce6dbc3ccbcb2963a33fb5bebfeeefe49d64e74c13937141c