Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
25-05-2024 15:49
Static task
static1
Behavioral task
behavioral1
Sample
727738d0189a6014f62650f14fc4eafe_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
727738d0189a6014f62650f14fc4eafe_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
727738d0189a6014f62650f14fc4eafe_JaffaCakes118.html
-
Size
14KB
-
MD5
727738d0189a6014f62650f14fc4eafe
-
SHA1
88b09c13576d0e654fbb7eb991c2bb0a93803c0f
-
SHA256
c5c6dc033ccd1a68ce74039230b217753be77617b8b20c78218730c6f95d23e3
-
SHA512
5d4c6a817debc5ee9753999b42dd65d25fbcff93ddeb89a6d7501090068b537f312d2ead4ac80234d45d3925fca228ec4f2db1f0c752aec5f119f18e87509a0d
-
SSDEEP
192:SI+tPGweLOTciZpDO5DldonqG7XfcRI+l/Mj+9M+F16qmJsiDxgE:Spkw/Tvq5stChoe/jmJsiDj
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3576 msedge.exe 3576 msedge.exe 3248 msedge.exe 3248 msedge.exe 2336 identity_helper.exe 2336 identity_helper.exe 5456 msedge.exe 5456 msedge.exe 5456 msedge.exe 5456 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3248 msedge.exe 3248 msedge.exe 3248 msedge.exe 3248 msedge.exe 3248 msedge.exe 3248 msedge.exe 3248 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3248 msedge.exe 3248 msedge.exe 3248 msedge.exe 3248 msedge.exe 3248 msedge.exe 3248 msedge.exe 3248 msedge.exe 3248 msedge.exe 3248 msedge.exe 3248 msedge.exe 3248 msedge.exe 3248 msedge.exe 3248 msedge.exe 3248 msedge.exe 3248 msedge.exe 3248 msedge.exe 3248 msedge.exe 3248 msedge.exe 3248 msedge.exe 3248 msedge.exe 3248 msedge.exe 3248 msedge.exe 3248 msedge.exe 3248 msedge.exe 3248 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3248 msedge.exe 3248 msedge.exe 3248 msedge.exe 3248 msedge.exe 3248 msedge.exe 3248 msedge.exe 3248 msedge.exe 3248 msedge.exe 3248 msedge.exe 3248 msedge.exe 3248 msedge.exe 3248 msedge.exe 3248 msedge.exe 3248 msedge.exe 3248 msedge.exe 3248 msedge.exe 3248 msedge.exe 3248 msedge.exe 3248 msedge.exe 3248 msedge.exe 3248 msedge.exe 3248 msedge.exe 3248 msedge.exe 3248 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3248 wrote to memory of 712 3248 msedge.exe 82 PID 3248 wrote to memory of 712 3248 msedge.exe 82 PID 3248 wrote to memory of 3952 3248 msedge.exe 83 PID 3248 wrote to memory of 3952 3248 msedge.exe 83 PID 3248 wrote to memory of 3952 3248 msedge.exe 83 PID 3248 wrote to memory of 3952 3248 msedge.exe 83 PID 3248 wrote to memory of 3952 3248 msedge.exe 83 PID 3248 wrote to memory of 3952 3248 msedge.exe 83 PID 3248 wrote to memory of 3952 3248 msedge.exe 83 PID 3248 wrote to memory of 3952 3248 msedge.exe 83 PID 3248 wrote to memory of 3952 3248 msedge.exe 83 PID 3248 wrote to memory of 3952 3248 msedge.exe 83 PID 3248 wrote to memory of 3952 3248 msedge.exe 83 PID 3248 wrote to memory of 3952 3248 msedge.exe 83 PID 3248 wrote to memory of 3952 3248 msedge.exe 83 PID 3248 wrote to memory of 3952 3248 msedge.exe 83 PID 3248 wrote to memory of 3952 3248 msedge.exe 83 PID 3248 wrote to memory of 3952 3248 msedge.exe 83 PID 3248 wrote to memory of 3952 3248 msedge.exe 83 PID 3248 wrote to memory of 3952 3248 msedge.exe 83 PID 3248 wrote to memory of 3952 3248 msedge.exe 83 PID 3248 wrote to memory of 3952 3248 msedge.exe 83 PID 3248 wrote to memory of 3952 3248 msedge.exe 83 PID 3248 wrote to memory of 3952 3248 msedge.exe 83 PID 3248 wrote to memory of 3952 3248 msedge.exe 83 PID 3248 wrote to memory of 3952 3248 msedge.exe 83 PID 3248 wrote to memory of 3952 3248 msedge.exe 83 PID 3248 wrote to memory of 3952 3248 msedge.exe 83 PID 3248 wrote to memory of 3952 3248 msedge.exe 83 PID 3248 wrote to memory of 3952 3248 msedge.exe 83 PID 3248 wrote to memory of 3952 3248 msedge.exe 83 PID 3248 wrote to memory of 3952 3248 msedge.exe 83 PID 3248 wrote to memory of 3952 3248 msedge.exe 83 PID 3248 wrote to memory of 3952 3248 msedge.exe 83 PID 3248 wrote to memory of 3952 3248 msedge.exe 83 PID 3248 wrote to memory of 3952 3248 msedge.exe 83 PID 3248 wrote to memory of 3952 3248 msedge.exe 83 PID 3248 wrote to memory of 3952 3248 msedge.exe 83 PID 3248 wrote to memory of 3952 3248 msedge.exe 83 PID 3248 wrote to memory of 3952 3248 msedge.exe 83 PID 3248 wrote to memory of 3952 3248 msedge.exe 83 PID 3248 wrote to memory of 3952 3248 msedge.exe 83 PID 3248 wrote to memory of 3576 3248 msedge.exe 84 PID 3248 wrote to memory of 3576 3248 msedge.exe 84 PID 3248 wrote to memory of 1728 3248 msedge.exe 85 PID 3248 wrote to memory of 1728 3248 msedge.exe 85 PID 3248 wrote to memory of 1728 3248 msedge.exe 85 PID 3248 wrote to memory of 1728 3248 msedge.exe 85 PID 3248 wrote to memory of 1728 3248 msedge.exe 85 PID 3248 wrote to memory of 1728 3248 msedge.exe 85 PID 3248 wrote to memory of 1728 3248 msedge.exe 85 PID 3248 wrote to memory of 1728 3248 msedge.exe 85 PID 3248 wrote to memory of 1728 3248 msedge.exe 85 PID 3248 wrote to memory of 1728 3248 msedge.exe 85 PID 3248 wrote to memory of 1728 3248 msedge.exe 85 PID 3248 wrote to memory of 1728 3248 msedge.exe 85 PID 3248 wrote to memory of 1728 3248 msedge.exe 85 PID 3248 wrote to memory of 1728 3248 msedge.exe 85 PID 3248 wrote to memory of 1728 3248 msedge.exe 85 PID 3248 wrote to memory of 1728 3248 msedge.exe 85 PID 3248 wrote to memory of 1728 3248 msedge.exe 85 PID 3248 wrote to memory of 1728 3248 msedge.exe 85 PID 3248 wrote to memory of 1728 3248 msedge.exe 85 PID 3248 wrote to memory of 1728 3248 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\727738d0189a6014f62650f14fc4eafe_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3248 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffa5ce246f8,0x7ffa5ce24708,0x7ffa5ce247182⤵PID:712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2224,9780222012584975257,13806820682502413032,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2244 /prefetch:22⤵PID:3952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2224,9780222012584975257,13806820682502413032,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2320 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2224,9780222012584975257,13806820682502413032,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2796 /prefetch:82⤵PID:1728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,9780222012584975257,13806820682502413032,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:4812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,9780222012584975257,13806820682502413032,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:4340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,9780222012584975257,13806820682502413032,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4928 /prefetch:12⤵PID:2760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2224,9780222012584975257,13806820682502413032,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5220 /prefetch:82⤵PID:4184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2224,9780222012584975257,13806820682502413032,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5220 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,9780222012584975257,13806820682502413032,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4796 /prefetch:12⤵PID:4092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,9780222012584975257,13806820682502413032,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4800 /prefetch:12⤵PID:868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,9780222012584975257,13806820682502413032,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5040 /prefetch:12⤵PID:3428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,9780222012584975257,13806820682502413032,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5036 /prefetch:12⤵PID:4240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2224,9780222012584975257,13806820682502413032,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3080 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5456
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3772
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4240
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51ac52e2503cc26baee4322f02f5b8d9c
SHA138e0cee911f5f2a24888a64780ffdf6fa72207c8
SHA256f65058c6f1a745b37a64d4c97a8e8ee940210273130cec97a67f568088b5d4d4
SHA5127670d606bc5197ecb7db3ddaecd6f74a80e6decae92b94e0e8145a7f463fa099058e89f9dfa1c45b9197c36e5e21994698186a2ec970bbdb0937fe28ca46a834
-
Filesize
152B
MD5b2a1398f937474c51a48b347387ee36a
SHA1922a8567f09e68a04233e84e5919043034635949
SHA2562dc0bf08246ddd5a32288c895d676017578d792349ca437b1b36e7b2f0ade6d6
SHA5124a660c0549f7a850e07d8d36dab33121af02a7bd7e9b2f0137930b4c8cd89b6c5630e408f882684e6935dcb0d5cb5e01a854950eeda252a4881458cafcc7ef7c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\12042a3d-80ab-417f-97f9-a782a437607d.tmp
Filesize6KB
MD53c82657069d02782a5a78f1899ee43ae
SHA1f2ce8f65c3f38bbf798cae3932efb68202e1c752
SHA2563121bd16a7ad2050911192ef074920b9475ddb554588dbfe518b1856d3eac2c7
SHA512912fc64fccbe0a7dbf578c015e9d09771f826950c6ad964eb0e7ba841d6e483ac9155cd2c8f8768f87816bd2cb205e2df6c473af4e1a63021d2a54a79026ecae
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD5601a3faad84f1f805c3bf39a31d7add7
SHA17beba86985fc1ad87727feea1a0dc4d61a3aecc6
SHA256d35bc08b17a14b09f131b3f563a02ff79d754c8e2b8fb82cc53e2ed9debd6e39
SHA512dcd67368b19728e839b57d933265b54a37e99e919598db841166d5b94439a65a3dc2aea2334971a01a50d01d59399e04c69090dee36fd6740ec0dd5662df0173
-
Filesize
644B
MD5bd59a6aa99162778b6007c2bde189a80
SHA188b33dd49d07ac788a295be91a6ae0bc97807bed
SHA2563c1a37452a4f04917b67f1abb916d1466bf21a327c881dd11175ef94d3cae538
SHA51265777f534e0b83e169c72821932fb9a3b6bd1f345d327f91afc1a3a475be171699d57d56542315f739fb52b184c67dee42e15968aa654da06ce4a6d520bfafc8
-
Filesize
5KB
MD5a11d239ffe286ae87b670405a8442174
SHA1135b0cb665ed881b5736e5f5813dce72db742495
SHA2564c123e9763a62806083454ea8bb2df67b5bf0326e3c8222ff7f5a5e6417197ca
SHA5127a87ba7caba45c58b15e086a061c981dc26e797b3068b1aebe1441de854f8190f64862d20f664c5595cffb7834612a08324f044517807e37a32c49aafb03bc58
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5900b260052ddab1d19911633051661b2
SHA1fcf8bb5300e7761bdef7ea74cc44f466c9783420
SHA2569a09a013a0ce9039cd95be16fa9fa38b4d5f402c160ae4ab82a99757562fe8eb
SHA512449492ef92189cab5346c1bf5fb2ab55ea9bfcb223bd6dab52f2b7331c8a9101ebbdccb701c956fdc0eb5a6685ae7300a898bb185e36cb8a7a053d454170a76e