Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 16:15
Static task
static1
Behavioral task
behavioral1
Sample
67db3a5b6a635e73c470bab05d517d24_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
67db3a5b6a635e73c470bab05d517d24_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
67db3a5b6a635e73c470bab05d517d24_JaffaCakes118.html
-
Size
67KB
-
MD5
67db3a5b6a635e73c470bab05d517d24
-
SHA1
aeea513a997e2d90c3803c40928b211583d3ffc8
-
SHA256
c0d569b5eb1876385a299cd6f430f9ea89984e244ba30dcf81092517313efc3e
-
SHA512
9d05c4f9cd9b800fd8e565c2ec42311d0d7bc0093b6d44fde2cec0e0c05625628628503921c48d26d478389a82116c6a9e1cf9da81aa4f1736ba83c7e890601b
-
SSDEEP
1536:MmW/FdAMKhLFJ78m2p1SzkqXH7sY+f6JBso4FoTNoZVoQe/TBJ/HN7NtQSbu8H+Q:MHddAMKhLFJ78m2MkssY+SDKrSZBNcha
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3888 msedge.exe 3888 msedge.exe 3632 msedge.exe 3632 msedge.exe 640 identity_helper.exe 640 identity_helper.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe 3632 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3632 wrote to memory of 4224 3632 msedge.exe 82 PID 3632 wrote to memory of 4224 3632 msedge.exe 82 PID 3632 wrote to memory of 916 3632 msedge.exe 83 PID 3632 wrote to memory of 916 3632 msedge.exe 83 PID 3632 wrote to memory of 916 3632 msedge.exe 83 PID 3632 wrote to memory of 916 3632 msedge.exe 83 PID 3632 wrote to memory of 916 3632 msedge.exe 83 PID 3632 wrote to memory of 916 3632 msedge.exe 83 PID 3632 wrote to memory of 916 3632 msedge.exe 83 PID 3632 wrote to memory of 916 3632 msedge.exe 83 PID 3632 wrote to memory of 916 3632 msedge.exe 83 PID 3632 wrote to memory of 916 3632 msedge.exe 83 PID 3632 wrote to memory of 916 3632 msedge.exe 83 PID 3632 wrote to memory of 916 3632 msedge.exe 83 PID 3632 wrote to memory of 916 3632 msedge.exe 83 PID 3632 wrote to memory of 916 3632 msedge.exe 83 PID 3632 wrote to memory of 916 3632 msedge.exe 83 PID 3632 wrote to memory of 916 3632 msedge.exe 83 PID 3632 wrote to memory of 916 3632 msedge.exe 83 PID 3632 wrote to memory of 916 3632 msedge.exe 83 PID 3632 wrote to memory of 916 3632 msedge.exe 83 PID 3632 wrote to memory of 916 3632 msedge.exe 83 PID 3632 wrote to memory of 916 3632 msedge.exe 83 PID 3632 wrote to memory of 916 3632 msedge.exe 83 PID 3632 wrote to memory of 916 3632 msedge.exe 83 PID 3632 wrote to memory of 916 3632 msedge.exe 83 PID 3632 wrote to memory of 916 3632 msedge.exe 83 PID 3632 wrote to memory of 916 3632 msedge.exe 83 PID 3632 wrote to memory of 916 3632 msedge.exe 83 PID 3632 wrote to memory of 916 3632 msedge.exe 83 PID 3632 wrote to memory of 916 3632 msedge.exe 83 PID 3632 wrote to memory of 916 3632 msedge.exe 83 PID 3632 wrote to memory of 916 3632 msedge.exe 83 PID 3632 wrote to memory of 916 3632 msedge.exe 83 PID 3632 wrote to memory of 916 3632 msedge.exe 83 PID 3632 wrote to memory of 916 3632 msedge.exe 83 PID 3632 wrote to memory of 916 3632 msedge.exe 83 PID 3632 wrote to memory of 916 3632 msedge.exe 83 PID 3632 wrote to memory of 916 3632 msedge.exe 83 PID 3632 wrote to memory of 916 3632 msedge.exe 83 PID 3632 wrote to memory of 916 3632 msedge.exe 83 PID 3632 wrote to memory of 916 3632 msedge.exe 83 PID 3632 wrote to memory of 3888 3632 msedge.exe 84 PID 3632 wrote to memory of 3888 3632 msedge.exe 84 PID 3632 wrote to memory of 4340 3632 msedge.exe 85 PID 3632 wrote to memory of 4340 3632 msedge.exe 85 PID 3632 wrote to memory of 4340 3632 msedge.exe 85 PID 3632 wrote to memory of 4340 3632 msedge.exe 85 PID 3632 wrote to memory of 4340 3632 msedge.exe 85 PID 3632 wrote to memory of 4340 3632 msedge.exe 85 PID 3632 wrote to memory of 4340 3632 msedge.exe 85 PID 3632 wrote to memory of 4340 3632 msedge.exe 85 PID 3632 wrote to memory of 4340 3632 msedge.exe 85 PID 3632 wrote to memory of 4340 3632 msedge.exe 85 PID 3632 wrote to memory of 4340 3632 msedge.exe 85 PID 3632 wrote to memory of 4340 3632 msedge.exe 85 PID 3632 wrote to memory of 4340 3632 msedge.exe 85 PID 3632 wrote to memory of 4340 3632 msedge.exe 85 PID 3632 wrote to memory of 4340 3632 msedge.exe 85 PID 3632 wrote to memory of 4340 3632 msedge.exe 85 PID 3632 wrote to memory of 4340 3632 msedge.exe 85 PID 3632 wrote to memory of 4340 3632 msedge.exe 85 PID 3632 wrote to memory of 4340 3632 msedge.exe 85 PID 3632 wrote to memory of 4340 3632 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\67db3a5b6a635e73c470bab05d517d24_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3632 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xd8,0x100,0x104,0xe4,0x108,0x7ffd17b046f8,0x7ffd17b04708,0x7ffd17b047182⤵PID:4224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,15583252895970269924,4991805637464976761,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2144 /prefetch:22⤵PID:916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,15583252895970269924,4991805637464976761,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2204 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,15583252895970269924,4991805637464976761,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2808 /prefetch:82⤵PID:4340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,15583252895970269924,4991805637464976761,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:1916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,15583252895970269924,4991805637464976761,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:3380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,15583252895970269924,4991805637464976761,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3000 /prefetch:12⤵PID:1052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,15583252895970269924,4991805637464976761,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5536 /prefetch:82⤵PID:1552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,15583252895970269924,4991805637464976761,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5536 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,15583252895970269924,4991805637464976761,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5156 /prefetch:12⤵PID:1440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,15583252895970269924,4991805637464976761,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3956 /prefetch:12⤵PID:2168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,15583252895970269924,4991805637464976761,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4104 /prefetch:12⤵PID:3832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,15583252895970269924,4991805637464976761,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5592 /prefetch:12⤵PID:3660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,15583252895970269924,4991805637464976761,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5560 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1376
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3968
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1440
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4800
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f61fa5143fe872d1d8f1e9f8dc6544f9
SHA1df44bab94d7388fb38c63085ec4db80cfc5eb009
SHA256284a24b5b40860240db00ef3ae6a33c9fa8349ab5490a634e27b2c6e9a191c64
SHA512971000784a6518bb39c5cf043292c7ab659162275470f5f6b632ea91a6bcae83bc80517ceb983dd5abfe8fb4e157344cb65c27e609a879eec00b33c5fad563a6
-
Filesize
152B
MD587f7abeb82600e1e640b843ad50fe0a1
SHA1045bbada3f23fc59941bf7d0210fb160cb78ae87
SHA256b35d6906050d90a81d23646f86c20a8f5d42f058ffc6436fb0a2b8bd71ee1262
SHA512ea8e7f24ab823ad710ce079c86c40aa957353a00d2775732c23e31be88a10d212e974c4691279aa86016c4660f5795febf739a15207833df6ed964a9ed99d618
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize216B
MD55eb720ae175c0ea4bd0df3a065388122
SHA1900c23e97bde32028baa3a29f993273f4f0955f0
SHA256e26803b48e3cac5f1e907763b31fac104d2d5781ef60147a14a1129f28ec57bb
SHA512b9c9476a2a2b36ab7c467e4662ff8c986a2b99dafc5b16d537586c22c006a695449cde3ce3b979cb816aea8650c2bb2c75e85f13476ef3d31500050c4c851276
-
Filesize
7KB
MD55a4e2b1a0db7b58c3dacfa674c35219e
SHA1c7443fa33649520de7d556144e89bb35faad1311
SHA256c5563b8a8e343960d265f674f11ad9221a700bf6281778e2c1de7279faf035be
SHA5127d31c6e49d95263e5723da7ba625ced412beae5ac2e29065c872db4105bfd851683a26163faacfd8d214226de70bf5a750ac2ced02b484c48278038fd16035e9
-
Filesize
5KB
MD5df1e68dcd6a45a9a428668c06b6f9d74
SHA167e77a698a9f01a8aad69848d29bfbddda4f1d46
SHA25655fff8ab7f4f27a810214e474d019414c6865817bfc6005fc2d8ce9604261190
SHA5120e3605e83d62a8dd4794adf858e7855a850c997a58c0b8e7b32554d75d60abf4188c095a68de8df7e62e8937ca7e4c1d8f1913e61620a6b778693c2fb374da96
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\dd62a1fd-218e-49a0-8715-5fcb13a02a9c.tmp
Filesize6KB
MD5b25e9ac31569587886afb08d1bde96fc
SHA1b1434d5eda615b60625bb461cae7956119c3a3bd
SHA256f0a834d1ee2247d815a96573448bdebb6578ee70e721b57bfafa04b8e925740b
SHA5127729e5b0b0485a74ab59a415522f2db2f0795d63e9fe362650ae44db704ae4609f1488c705f24e4966fd46c01a0731b1ec0d4c63d2ba0a4c9ed8caef7a287e78
-
Filesize
11KB
MD52cc907db96d18eae17b891d20d46dc86
SHA1c107928439b4aa8ed70aebfc8415625e5c38ce9d
SHA2562c14ee7d74340ceafccd72726a2d32c9201460f8416fceac2aca9cb87d9fb500
SHA512ea2ac4b134fca6ccdc6e304b68e7611e0b0a57c8cb360cc29ceaae092b788955d55622bcb69646c1780e42b9590993652dc53314a0e2fb8b01f65bdbe20b72de