Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
25/05/2024, 07:24
Static task
static1
Behavioral task
behavioral1
Sample
713f7ed22e14553adc19781c2e6c267e_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
713f7ed22e14553adc19781c2e6c267e_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
713f7ed22e14553adc19781c2e6c267e_JaffaCakes118.html
-
Size
176KB
-
MD5
713f7ed22e14553adc19781c2e6c267e
-
SHA1
5916edd518f1c017b9af0f2ee0cb3106981e8d81
-
SHA256
2172188d3cb7ee27192bde45725980d0b39469dfb4f936663f4c90c8eaec0f72
-
SHA512
40294b5c6eda2c20977b8755782511c408f85d91685d7518be686c6e55f62bba2335c8f72c4a6609d19abcb1615607f044ce667e25bfcd083666bef99357641c
-
SSDEEP
1536:qPChlh2gClh2yAfZlh239swKlh2a8om/+QdODE/r4vZc5oiGJnsqaYIrZf1EAYX+:qPCHbIsNm/+lzZcpGJvG5QJDM6w6bnu
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2852 msedge.exe 2852 msedge.exe 1884 msedge.exe 1884 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe 1884 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1884 wrote to memory of 2068 1884 msedge.exe 84 PID 1884 wrote to memory of 2068 1884 msedge.exe 84 PID 1884 wrote to memory of 2504 1884 msedge.exe 85 PID 1884 wrote to memory of 2504 1884 msedge.exe 85 PID 1884 wrote to memory of 2504 1884 msedge.exe 85 PID 1884 wrote to memory of 2504 1884 msedge.exe 85 PID 1884 wrote to memory of 2504 1884 msedge.exe 85 PID 1884 wrote to memory of 2504 1884 msedge.exe 85 PID 1884 wrote to memory of 2504 1884 msedge.exe 85 PID 1884 wrote to memory of 2504 1884 msedge.exe 85 PID 1884 wrote to memory of 2504 1884 msedge.exe 85 PID 1884 wrote to memory of 2504 1884 msedge.exe 85 PID 1884 wrote to memory of 2504 1884 msedge.exe 85 PID 1884 wrote to memory of 2504 1884 msedge.exe 85 PID 1884 wrote to memory of 2504 1884 msedge.exe 85 PID 1884 wrote to memory of 2504 1884 msedge.exe 85 PID 1884 wrote to memory of 2504 1884 msedge.exe 85 PID 1884 wrote to memory of 2504 1884 msedge.exe 85 PID 1884 wrote to memory of 2504 1884 msedge.exe 85 PID 1884 wrote to memory of 2504 1884 msedge.exe 85 PID 1884 wrote to memory of 2504 1884 msedge.exe 85 PID 1884 wrote to memory of 2504 1884 msedge.exe 85 PID 1884 wrote to memory of 2504 1884 msedge.exe 85 PID 1884 wrote to memory of 2504 1884 msedge.exe 85 PID 1884 wrote to memory of 2504 1884 msedge.exe 85 PID 1884 wrote to memory of 2504 1884 msedge.exe 85 PID 1884 wrote to memory of 2504 1884 msedge.exe 85 PID 1884 wrote to memory of 2504 1884 msedge.exe 85 PID 1884 wrote to memory of 2504 1884 msedge.exe 85 PID 1884 wrote to memory of 2504 1884 msedge.exe 85 PID 1884 wrote to memory of 2504 1884 msedge.exe 85 PID 1884 wrote to memory of 2504 1884 msedge.exe 85 PID 1884 wrote to memory of 2504 1884 msedge.exe 85 PID 1884 wrote to memory of 2504 1884 msedge.exe 85 PID 1884 wrote to memory of 2504 1884 msedge.exe 85 PID 1884 wrote to memory of 2504 1884 msedge.exe 85 PID 1884 wrote to memory of 2504 1884 msedge.exe 85 PID 1884 wrote to memory of 2504 1884 msedge.exe 85 PID 1884 wrote to memory of 2504 1884 msedge.exe 85 PID 1884 wrote to memory of 2504 1884 msedge.exe 85 PID 1884 wrote to memory of 2504 1884 msedge.exe 85 PID 1884 wrote to memory of 2504 1884 msedge.exe 85 PID 1884 wrote to memory of 2852 1884 msedge.exe 86 PID 1884 wrote to memory of 2852 1884 msedge.exe 86 PID 1884 wrote to memory of 936 1884 msedge.exe 87 PID 1884 wrote to memory of 936 1884 msedge.exe 87 PID 1884 wrote to memory of 936 1884 msedge.exe 87 PID 1884 wrote to memory of 936 1884 msedge.exe 87 PID 1884 wrote to memory of 936 1884 msedge.exe 87 PID 1884 wrote to memory of 936 1884 msedge.exe 87 PID 1884 wrote to memory of 936 1884 msedge.exe 87 PID 1884 wrote to memory of 936 1884 msedge.exe 87 PID 1884 wrote to memory of 936 1884 msedge.exe 87 PID 1884 wrote to memory of 936 1884 msedge.exe 87 PID 1884 wrote to memory of 936 1884 msedge.exe 87 PID 1884 wrote to memory of 936 1884 msedge.exe 87 PID 1884 wrote to memory of 936 1884 msedge.exe 87 PID 1884 wrote to memory of 936 1884 msedge.exe 87 PID 1884 wrote to memory of 936 1884 msedge.exe 87 PID 1884 wrote to memory of 936 1884 msedge.exe 87 PID 1884 wrote to memory of 936 1884 msedge.exe 87 PID 1884 wrote to memory of 936 1884 msedge.exe 87 PID 1884 wrote to memory of 936 1884 msedge.exe 87 PID 1884 wrote to memory of 936 1884 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\713f7ed22e14553adc19781c2e6c267e_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd92e046f8,0x7ffd92e04708,0x7ffd92e047182⤵PID:2068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,2072210621198497436,17865028832484237808,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2088 /prefetch:22⤵PID:2504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,2072210621198497436,17865028832484237808,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,2072210621198497436,17865028832484237808,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2792 /prefetch:82⤵PID:936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,2072210621198497436,17865028832484237808,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:4488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,2072210621198497436,17865028832484237808,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,2072210621198497436,17865028832484237808,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2220 /prefetch:12⤵PID:2312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,2072210621198497436,17865028832484237808,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1832 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5060
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4984
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1988
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54f7152bc5a1a715ef481e37d1c791959
SHA1c8a1ed674c62ae4f45519f90a8cc5a81eff3a6d7
SHA256704dd4f98d8ca34ec421f23ba1891b178c23c14b3301e4655efc5c02d356c2bc
SHA5122e6b02ca35d76a655a17a5f3e9dbd8d7517c7dae24f0095c7350eb9e7bdf9e1256a7009aa8878f96c89d1ea4fe5323a41f72b8c551806dda62880d7ff231ff5c
-
Filesize
152B
MD5ea98e583ad99df195d29aa066204ab56
SHA1f89398664af0179641aa0138b337097b617cb2db
SHA256a7abb51435909fa2d75c6f2ff5c69a93d4a0ab276ed579e7d8733b2a63ffbee6
SHA512e109be3466e653e5d310b3e402e1626298b09205d223722a82344dd78504f3c33e1e24e8402a02f38cd2c9c50d96a303ce4846bea5a583423937ab018cd5782f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD53c3ca481e07698d88f799a9ec77095bc
SHA1dbd2e52b6168b3b926848775dcacf4d7b9dc2fc7
SHA25631825e46fb41a98f334c040c59ff0fa3baab445532b54d1dc2d6e4c7865af6a2
SHA512e148b83efb00d840327e6c62880863d490fa9eb6bec9bddb256d982f5dc6fb33a949744e919fd4fe21ea8bfc965cf054293b7cd787729b595ec56eb14286b9a8
-
Filesize
1KB
MD5625867da9bf0b9e9a203936d26147929
SHA161e34fb8df9b9cf3a01f0e80e5564db8d5a625c7
SHA2562c9eab90699edcc805a5bf45984eada7fbac353b57ba0b41f63928c60507dadd
SHA5129b6173581a977c76bb6e2a2538bd9fc8b0c73897d3a68b639c5acc4e0a19c25dfe9a8f6d8c7285a990cb4292f7f49153ee48829a04e41df974415f4303e47958
-
Filesize
1KB
MD5a600fd23beee522303d1c629892507ef
SHA1363c55c846d1d1a8ea888dd329f0dc03a13402f7
SHA256fb9fb02b76a92763201c1627aa1321460b4341fb8e900cb207233b71be7e0783
SHA512211032c4ebac16c57f9fe0ba2ababe71801b43409e9b91ae60fe67e0815ea9c882f72e5d2177da903cad7db3c88136ef25d10ebce0a0493a34fc5cdf3a54ab17
-
Filesize
6KB
MD59609a804f8a778c70e6954021f0d23fd
SHA16f9d8442c010dddf99d2e27f6b4034e4feea2073
SHA25618b6261826f1e6d02feb40bada8d96ec8ac550d9f79699e46d5386a24059350b
SHA512192798f9a5fe726a14d84496fd9744f0dbdde16b5689c38d5c15981e54dd3bdbe4618a940a02eec09f30295bbc1b56a39f4f5d6dd29af04e1df884424610cc6d
-
Filesize
5KB
MD5f3fceeeec03caab290d33497f8e1244d
SHA1f44e89dc7a4ced9e7d06e7cfc0a12497726a043d
SHA256bb674cc526adcac4cab28b296e941268e989fdb1a524fa5cfc0e8527f90638cc
SHA51273285158a4122198e57eb589e0f80f6387bfe4232284a7f8abc56b207fa59a575d561704c8cddbdfbc1e1db394a7f8c981040782f88c890867279bf19379ef7e
-
Filesize
6KB
MD5072f4663f5f1c0fba5f87c94fb6dd4f8
SHA135050fc50d544e676869557f71cdf75b2b438c0d
SHA2560ae8ad3c6c938d447463d8410870fc063d9273dcbf203b3e681e362b1e96f593
SHA512ec05af2749fb7ae4e1c0c31504ddf6822821e662d7f83363562a7c6ef464699cf332f41d1a361b8750548b7a36f95658ea03561a1e28913d837307b6240d2e7a
-
Filesize
11KB
MD505659cd09544f40755019e09377f6eb5
SHA122989cbe5ae418c7a0579169f43eeb941b00480a
SHA256bdb3cbfff02abc910d0fd99e1a766ea40d9e507acf47c3b504edebe670ccc0b6
SHA5127e06a0ef7a9e23ee97e9db6cbdc1ecffd2a3a064d3351fbcaeca1b2c55c18f3430f92aafd538ba6b62833862c81284de55191b4d688f7c26d42d2538759ae8a1