Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 13:10
Static task
static1
Behavioral task
behavioral1
Sample
675cf9449effa909f9be47b907f27f2c_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
675cf9449effa909f9be47b907f27f2c_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
675cf9449effa909f9be47b907f27f2c_JaffaCakes118.html
-
Size
70KB
-
MD5
675cf9449effa909f9be47b907f27f2c
-
SHA1
f52165b4fb3c62529c76db46428b7c42478a5545
-
SHA256
c4bce4423982802f8932692246925de20174c5c6342117e5c7f22f40b92a8ccc
-
SHA512
f1cd4415fd70152ba378a101f221f716934372c36115c878239de8262a1d104a857026e6c81faad39f9c6ad0f60f9b2f10016e42a8fce19e66edfaa71f5b2555
-
SSDEEP
1536:OphsD0NY1Wgt8o5n9jhWqqjwvTdh+fcdAdpFpqrBSBuV055FnaaAlz7OUX6O1eaw:QsD0NY1Wgt8o5HWqq8bdh+fcdAdpFpqw
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4844 msedge.exe 4844 msedge.exe 3564 msedge.exe 3564 msedge.exe 3100 identity_helper.exe 3100 identity_helper.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe 3564 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3564 wrote to memory of 4628 3564 msedge.exe 83 PID 3564 wrote to memory of 4628 3564 msedge.exe 83 PID 3564 wrote to memory of 4524 3564 msedge.exe 84 PID 3564 wrote to memory of 4524 3564 msedge.exe 84 PID 3564 wrote to memory of 4524 3564 msedge.exe 84 PID 3564 wrote to memory of 4524 3564 msedge.exe 84 PID 3564 wrote to memory of 4524 3564 msedge.exe 84 PID 3564 wrote to memory of 4524 3564 msedge.exe 84 PID 3564 wrote to memory of 4524 3564 msedge.exe 84 PID 3564 wrote to memory of 4524 3564 msedge.exe 84 PID 3564 wrote to memory of 4524 3564 msedge.exe 84 PID 3564 wrote to memory of 4524 3564 msedge.exe 84 PID 3564 wrote to memory of 4524 3564 msedge.exe 84 PID 3564 wrote to memory of 4524 3564 msedge.exe 84 PID 3564 wrote to memory of 4524 3564 msedge.exe 84 PID 3564 wrote to memory of 4524 3564 msedge.exe 84 PID 3564 wrote to memory of 4524 3564 msedge.exe 84 PID 3564 wrote to memory of 4524 3564 msedge.exe 84 PID 3564 wrote to memory of 4524 3564 msedge.exe 84 PID 3564 wrote to memory of 4524 3564 msedge.exe 84 PID 3564 wrote to memory of 4524 3564 msedge.exe 84 PID 3564 wrote to memory of 4524 3564 msedge.exe 84 PID 3564 wrote to memory of 4524 3564 msedge.exe 84 PID 3564 wrote to memory of 4524 3564 msedge.exe 84 PID 3564 wrote to memory of 4524 3564 msedge.exe 84 PID 3564 wrote to memory of 4524 3564 msedge.exe 84 PID 3564 wrote to memory of 4524 3564 msedge.exe 84 PID 3564 wrote to memory of 4524 3564 msedge.exe 84 PID 3564 wrote to memory of 4524 3564 msedge.exe 84 PID 3564 wrote to memory of 4524 3564 msedge.exe 84 PID 3564 wrote to memory of 4524 3564 msedge.exe 84 PID 3564 wrote to memory of 4524 3564 msedge.exe 84 PID 3564 wrote to memory of 4524 3564 msedge.exe 84 PID 3564 wrote to memory of 4524 3564 msedge.exe 84 PID 3564 wrote to memory of 4524 3564 msedge.exe 84 PID 3564 wrote to memory of 4524 3564 msedge.exe 84 PID 3564 wrote to memory of 4524 3564 msedge.exe 84 PID 3564 wrote to memory of 4524 3564 msedge.exe 84 PID 3564 wrote to memory of 4524 3564 msedge.exe 84 PID 3564 wrote to memory of 4524 3564 msedge.exe 84 PID 3564 wrote to memory of 4524 3564 msedge.exe 84 PID 3564 wrote to memory of 4524 3564 msedge.exe 84 PID 3564 wrote to memory of 4844 3564 msedge.exe 85 PID 3564 wrote to memory of 4844 3564 msedge.exe 85 PID 3564 wrote to memory of 3044 3564 msedge.exe 86 PID 3564 wrote to memory of 3044 3564 msedge.exe 86 PID 3564 wrote to memory of 3044 3564 msedge.exe 86 PID 3564 wrote to memory of 3044 3564 msedge.exe 86 PID 3564 wrote to memory of 3044 3564 msedge.exe 86 PID 3564 wrote to memory of 3044 3564 msedge.exe 86 PID 3564 wrote to memory of 3044 3564 msedge.exe 86 PID 3564 wrote to memory of 3044 3564 msedge.exe 86 PID 3564 wrote to memory of 3044 3564 msedge.exe 86 PID 3564 wrote to memory of 3044 3564 msedge.exe 86 PID 3564 wrote to memory of 3044 3564 msedge.exe 86 PID 3564 wrote to memory of 3044 3564 msedge.exe 86 PID 3564 wrote to memory of 3044 3564 msedge.exe 86 PID 3564 wrote to memory of 3044 3564 msedge.exe 86 PID 3564 wrote to memory of 3044 3564 msedge.exe 86 PID 3564 wrote to memory of 3044 3564 msedge.exe 86 PID 3564 wrote to memory of 3044 3564 msedge.exe 86 PID 3564 wrote to memory of 3044 3564 msedge.exe 86 PID 3564 wrote to memory of 3044 3564 msedge.exe 86 PID 3564 wrote to memory of 3044 3564 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\675cf9449effa909f9be47b907f27f2c_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3564 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe8a7246f8,0x7ffe8a724708,0x7ffe8a7247182⤵PID:4628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,10741712867187048896,7000894378814823748,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:22⤵PID:4524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2072,10741712867187048896,7000894378814823748,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2408 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2072,10741712867187048896,7000894378814823748,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2516 /prefetch:82⤵PID:3044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,10741712867187048896,7000894378814823748,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3192 /prefetch:12⤵PID:3812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,10741712867187048896,7000894378814823748,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3204 /prefetch:12⤵PID:2112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,10741712867187048896,7000894378814823748,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5068 /prefetch:12⤵PID:624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,10741712867187048896,7000894378814823748,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5216 /prefetch:12⤵PID:3484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,10741712867187048896,7000894378814823748,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5676 /prefetch:82⤵PID:2168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,10741712867187048896,7000894378814823748,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5676 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,10741712867187048896,7000894378814823748,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6072 /prefetch:12⤵PID:644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,10741712867187048896,7000894378814823748,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6076 /prefetch:12⤵PID:1880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,10741712867187048896,7000894378814823748,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4012 /prefetch:12⤵PID:1884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,10741712867187048896,7000894378814823748,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5896 /prefetch:12⤵PID:212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,10741712867187048896,7000894378814823748,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4740 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4536
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3320
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:776
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1572
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ae54e9db2e89f2c54da8cc0bfcbd26bd
SHA1a88af6c673609ecbc51a1a60dfbc8577830d2b5d
SHA2565009d3c953de63cfd14a7d911156c514e179ff07d2b94382d9caac6040cb72af
SHA512e3b70e5eb7321b9deca6f6a17424a15b9fd5c4008bd3789bd01099fd13cb2f4a2f37fe4b920fb51c50517745b576c1f94df83efd1a7e75949551163985599998
-
Filesize
152B
MD5f53207a5ca2ef5c7e976cbb3cb26d870
SHA149a8cc44f53da77bb3dfb36fc7676ed54675db43
SHA25619ab4e3c9da6d9cedda7461efdba9a2085e743513ab89f1dd0fd5a8f9486ad23
SHA512be734c7e8afda19f445912aef0d78f9941add29baebd4a812bff27f10a1d78b52aeb11c551468c8644443c86e1a2a6b2e4aead3d7f81d39925e3c20406ac1499
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize216B
MD59c4924004d762123e50a038054136b4d
SHA16340f78a80f9233c6c7bf74fc989a1aab57db651
SHA256f43cb4c8dcf88a440e4f97c4c14a3620eedcb76e16d98eef7c9bdeae2773d1b9
SHA512c6ef54d74f381e8c3f8ae2a50a713db4f7ac0eecec9f31e620a6bb1d81980a4fc3c25a3c6a286a305b38fbcb9fe0ae208ade6a9bdab155c2ab2e0b420f9c82ee
-
Filesize
2KB
MD5914a7f1bd722e885dab0ad28bde9d336
SHA1ebbdb6bbea46775cd26c68e156dfe65bd853d09c
SHA256e8f152d728ac1e0f4b2ceb08da3884ad3e9b1504ff9265dc653c08b8c4cb610d
SHA5122b22c3d544b0bf24a53f3ddb76ac2fddb27d39b53b7be810c6426ea81103591d8367cd3e88d4b18221076cbec8f1c97dba3131c2b217aa681d112432f50122e9
-
Filesize
2KB
MD5847089f992d0cef8142879268c2bb9c7
SHA15671fbf9ffa42fcb230887f59d8e15e4d9f49265
SHA256fcdba3ee9bea35549b8715a62c174d9f640b69db19c12861c565955aa33dac19
SHA512d95be980211becadefa96cffcded249f642846c8d057dc7b20c242291dfee4b14801c0d33f48951e24d0b3f121cc81b54faa7fa773022e0e0b85fbd63ba462ad
-
Filesize
5KB
MD570c6863b37e0d1662fd2781197811e9e
SHA16e9b041d656311f2b73086c28310783ab078600f
SHA2566dc0088f8eeba88fd8351736f961bc0a11ce2e6f66d879f3b0fb07549f028754
SHA5128c236a4c1bc19443da01230bfaf55f4db3d28ee972f73889279e7871cbbfc42005935effc09b9680b75f523e92817804d8a730a6f65e679eeb9a51d543cbfef1
-
Filesize
6KB
MD55212aed5a53d707bd96fd24e515150f8
SHA19388692509d6216a33e11e0a0e17c46deaa5b59c
SHA2568af7fb10fc4e8eb71137c9ea5990442f7a2bafb5adf1fea72eb5b5cffd0d9150
SHA5125a88de61bf523bb55ecbd09b0b5b7ef4588812ab888b1bbd27a6b365cd3c88709906cf1712d722f21c1f11425980f368e14cfcb5bb81fc5e5972ca1fc56075fe
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD59b92032f20cf359fa76ef9bf25293136
SHA10749ee90408c5f21c7b92f0be3cf978196da67fe
SHA2567482f960832926e4c4e66ace687352a33aecf9af047cbdc61cf20fe4883ee0f3
SHA51269f70b50dd64ec7d8649e6b8860b49b7a318879e184f7724a981a12546dde96f077207785d869bf94ffbe13a79b5c8223c081e63b594628c80ede6c59dc155a3