Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
25-05-2024 00:07
Static task
static1
Behavioral task
behavioral1
Sample
703cba635e5a392eb537958c0a0955c3_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
703cba635e5a392eb537958c0a0955c3_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
703cba635e5a392eb537958c0a0955c3_JaffaCakes118.html
-
Size
26KB
-
MD5
703cba635e5a392eb537958c0a0955c3
-
SHA1
fe88873e4f8834faf909e3239650894e478a226e
-
SHA256
6d5663537db389428ef1a8fc731cf278e1921aa5b607e8a0da5dd3102e33cc3a
-
SHA512
8443480acf9f66287c9a7fd8428a8bc905010dc4964ebf080e700be50a324c811ad99fefb450d0a729ca61c8e1f210d972a4be190ce2ba2cdaa77349b671bf92
-
SSDEEP
384:vrReRbxnT0EipB0IJ4zFa03yPG4b3fPEP2Ph+kTp1L71j012S4FdllX+qwDaSef0:vGT0EipB5JqaeCJ7nU2h+gdK2S4F1BRY
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2272 msedge.exe 2272 msedge.exe 4388 msedge.exe 4388 msedge.exe 2852 identity_helper.exe 2852 identity_helper.exe 5212 msedge.exe 5212 msedge.exe 5212 msedge.exe 5212 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4388 wrote to memory of 1168 4388 msedge.exe 82 PID 4388 wrote to memory of 1168 4388 msedge.exe 82 PID 4388 wrote to memory of 528 4388 msedge.exe 83 PID 4388 wrote to memory of 528 4388 msedge.exe 83 PID 4388 wrote to memory of 528 4388 msedge.exe 83 PID 4388 wrote to memory of 528 4388 msedge.exe 83 PID 4388 wrote to memory of 528 4388 msedge.exe 83 PID 4388 wrote to memory of 528 4388 msedge.exe 83 PID 4388 wrote to memory of 528 4388 msedge.exe 83 PID 4388 wrote to memory of 528 4388 msedge.exe 83 PID 4388 wrote to memory of 528 4388 msedge.exe 83 PID 4388 wrote to memory of 528 4388 msedge.exe 83 PID 4388 wrote to memory of 528 4388 msedge.exe 83 PID 4388 wrote to memory of 528 4388 msedge.exe 83 PID 4388 wrote to memory of 528 4388 msedge.exe 83 PID 4388 wrote to memory of 528 4388 msedge.exe 83 PID 4388 wrote to memory of 528 4388 msedge.exe 83 PID 4388 wrote to memory of 528 4388 msedge.exe 83 PID 4388 wrote to memory of 528 4388 msedge.exe 83 PID 4388 wrote to memory of 528 4388 msedge.exe 83 PID 4388 wrote to memory of 528 4388 msedge.exe 83 PID 4388 wrote to memory of 528 4388 msedge.exe 83 PID 4388 wrote to memory of 528 4388 msedge.exe 83 PID 4388 wrote to memory of 528 4388 msedge.exe 83 PID 4388 wrote to memory of 528 4388 msedge.exe 83 PID 4388 wrote to memory of 528 4388 msedge.exe 83 PID 4388 wrote to memory of 528 4388 msedge.exe 83 PID 4388 wrote to memory of 528 4388 msedge.exe 83 PID 4388 wrote to memory of 528 4388 msedge.exe 83 PID 4388 wrote to memory of 528 4388 msedge.exe 83 PID 4388 wrote to memory of 528 4388 msedge.exe 83 PID 4388 wrote to memory of 528 4388 msedge.exe 83 PID 4388 wrote to memory of 528 4388 msedge.exe 83 PID 4388 wrote to memory of 528 4388 msedge.exe 83 PID 4388 wrote to memory of 528 4388 msedge.exe 83 PID 4388 wrote to memory of 528 4388 msedge.exe 83 PID 4388 wrote to memory of 528 4388 msedge.exe 83 PID 4388 wrote to memory of 528 4388 msedge.exe 83 PID 4388 wrote to memory of 528 4388 msedge.exe 83 PID 4388 wrote to memory of 528 4388 msedge.exe 83 PID 4388 wrote to memory of 528 4388 msedge.exe 83 PID 4388 wrote to memory of 528 4388 msedge.exe 83 PID 4388 wrote to memory of 2272 4388 msedge.exe 84 PID 4388 wrote to memory of 2272 4388 msedge.exe 84 PID 4388 wrote to memory of 620 4388 msedge.exe 85 PID 4388 wrote to memory of 620 4388 msedge.exe 85 PID 4388 wrote to memory of 620 4388 msedge.exe 85 PID 4388 wrote to memory of 620 4388 msedge.exe 85 PID 4388 wrote to memory of 620 4388 msedge.exe 85 PID 4388 wrote to memory of 620 4388 msedge.exe 85 PID 4388 wrote to memory of 620 4388 msedge.exe 85 PID 4388 wrote to memory of 620 4388 msedge.exe 85 PID 4388 wrote to memory of 620 4388 msedge.exe 85 PID 4388 wrote to memory of 620 4388 msedge.exe 85 PID 4388 wrote to memory of 620 4388 msedge.exe 85 PID 4388 wrote to memory of 620 4388 msedge.exe 85 PID 4388 wrote to memory of 620 4388 msedge.exe 85 PID 4388 wrote to memory of 620 4388 msedge.exe 85 PID 4388 wrote to memory of 620 4388 msedge.exe 85 PID 4388 wrote to memory of 620 4388 msedge.exe 85 PID 4388 wrote to memory of 620 4388 msedge.exe 85 PID 4388 wrote to memory of 620 4388 msedge.exe 85 PID 4388 wrote to memory of 620 4388 msedge.exe 85 PID 4388 wrote to memory of 620 4388 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\703cba635e5a392eb537958c0a0955c3_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4388 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd3fa246f8,0x7ffd3fa24708,0x7ffd3fa247182⤵PID:1168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,1208917540479696085,18061495545460863729,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵PID:528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2064,1208917540479696085,18061495545460863729,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2064,1208917540479696085,18061495545460863729,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2732 /prefetch:82⤵PID:620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,1208917540479696085,18061495545460863729,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:3868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,1208917540479696085,18061495545460863729,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:4212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,1208917540479696085,18061495545460863729,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4628 /prefetch:12⤵PID:5092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,1208917540479696085,18061495545460863729,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4860 /prefetch:12⤵PID:532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,1208917540479696085,18061495545460863729,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4140 /prefetch:12⤵PID:332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,1208917540479696085,18061495545460863729,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6236 /prefetch:82⤵PID:2500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,1208917540479696085,18061495545460863729,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6236 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,1208917540479696085,18061495545460863729,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5644 /prefetch:12⤵PID:4508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,1208917540479696085,18061495545460863729,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5628 /prefetch:12⤵PID:4280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,1208917540479696085,18061495545460863729,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4056 /prefetch:12⤵PID:3004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,1208917540479696085,18061495545460863729,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5452 /prefetch:12⤵PID:3436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,1208917540479696085,18061495545460863729,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5164 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5212
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2008
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5044
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ae54e9db2e89f2c54da8cc0bfcbd26bd
SHA1a88af6c673609ecbc51a1a60dfbc8577830d2b5d
SHA2565009d3c953de63cfd14a7d911156c514e179ff07d2b94382d9caac6040cb72af
SHA512e3b70e5eb7321b9deca6f6a17424a15b9fd5c4008bd3789bd01099fd13cb2f4a2f37fe4b920fb51c50517745b576c1f94df83efd1a7e75949551163985599998
-
Filesize
152B
MD5f53207a5ca2ef5c7e976cbb3cb26d870
SHA149a8cc44f53da77bb3dfb36fc7676ed54675db43
SHA25619ab4e3c9da6d9cedda7461efdba9a2085e743513ab89f1dd0fd5a8f9486ad23
SHA512be734c7e8afda19f445912aef0d78f9941add29baebd4a812bff27f10a1d78b52aeb11c551468c8644443c86e1a2a6b2e4aead3d7f81d39925e3c20406ac1499
-
Filesize
20KB
MD5b6c8122025aff891940d1d5e1ab95fce
SHA1a0c7ca41d0922d085c358f5dde81ae3e85a8c9c4
SHA2569954c64c68000f615e5066bc255eced1195d1f8b7dbc715f9062ddf9f147e87e
SHA512e62a37b55b6b8d95c24fb624105ff6ff72f118e31760d0da1e8df8e8acf627ec6327c26dfa26df8535585877604c7948d2f621ccabc39beec49787e22c302c10
-
Filesize
44KB
MD588477d32f888c2b8a3f3d98deb460b3d
SHA11fae9ac6c1082fc0426aebe4e683eea9b4ba898c
SHA2561b1f0b5ef5f21d5742d84f331def7116323365c3dd4aec096a55763e310879d8
SHA512e0c0588ff27a989cac47797e5a8044983d0b3c75c44416c5f977e0e93e9d3a9321b9283ea077e6dcad0619ac960ee45fe8570f1d5cc7d5d4117fee4f2f0c96b3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize216B
MD5186f7299b3993593ced190fedb920828
SHA1cbecacef2121ae7d4fdf368db77a0cb2b8a15646
SHA25656ce3e08a548324eab562c1a261e20d01dc4c8389ea54769ceea1e2d5fe860c4
SHA5120e294b8db50fcb0d14d6dd198d4a0f7c97ce34ad4ddb36daeec1d57e657dc5c4014813e1d2862ef833f17a9acd8262a953958b40aabb0df501662551ea7cbbd9
-
Filesize
1KB
MD54d0a8d3ec98180d108dcfd360762188d
SHA15521bea9de49cc72b3fe6aa86f9d6c9c8e3b8765
SHA256ce0abd4cb2d63363ee8bb452aed672ea842befe4889438b3e28bb6ac579e8fa5
SHA512a2d0465f52576495266221fb9358df99d0ce303f8bb1d93cd7ce5dd6b70e1693e2b0d6bf7b03d53d46b1b92bee9152f284be01f7bd37aeaa32afac33e7c64144
-
Filesize
6KB
MD5e209dd54688530e928fe333f9192f46d
SHA1d29da8e43dbe4618b91fd49b7b0023cce862129d
SHA2563f334d663b4d2b801e625ec5b84a9b6008e01b9c1fc4a4597aae2b7a5bfe439a
SHA512c80299e58cb8a144519047876a0f6871c58a839677b9bbbc295bd2fd75e1880165ca59bbd9fa9103c93fb83b158d8b8e60d09b8b98fc5cec3836d3594a6d97d5
-
Filesize
5KB
MD5000cda03c131ed0fca01d6a0d75e20e9
SHA1ea42c0e401894b24dd3700b2cb16a3a09d7c2a26
SHA2560c593208c16716fd98cd1982785288f07dbfde24112d943ffc164fffeba2db5b
SHA51237bf287ca370bb3079f90cd56f48707f69df770dd15992937d02eaef1b099ce8c4f523405ea78e4a4ad157f027f6119a4d2e72f9b581be26f5f9355edbac9127
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD54e7bc07486b7e529e702a2fc1341bde7
SHA13d72b010a050377b814df03e38a49bb90dbf6b0f
SHA256479ab10e3868ed67c162f4b4324e424ec93c66130482eedf8ce4ed788db7a08c
SHA51215eb1c7c574554bf11b0e50913dede1737fda056e1b159497ebcbd1e5704521f7f2532d0ac9b0b7cad2b7220062d471d1b7fbd01cf0f3381c6dcabd5f89522c2