Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
26/05/2024, 16:46
Static task
static1
Behavioral task
behavioral1
Sample
7622a9974c79e37bf918e5d3a67c9ebf_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
7622a9974c79e37bf918e5d3a67c9ebf_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
7622a9974c79e37bf918e5d3a67c9ebf_JaffaCakes118.html
-
Size
78KB
-
MD5
7622a9974c79e37bf918e5d3a67c9ebf
-
SHA1
624aae2062ce3fa6e7d1ef7161dac1a70b1d4195
-
SHA256
fb10f58459e0666219366c68a09208b1b7bc4595ee1730027aed057790259621
-
SHA512
59c87cd313720f5f0db151c36b9701bc614d99777227d5f82acee6629ce6dfb46101743d24b47ef61b36913842b4922ce6bf550ce90ca0fcc31d2bacdcbe8e9a
-
SSDEEP
1536:Ansy9Wc0eYzXt4RoOX/qVUDDkXntRQ/PBgOCZ982dimaPG7I/jVUDDxh62e1LRdC:AnRH6zdOFh/5gN982dX62e1L2
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2536 msedge.exe 2536 msedge.exe 4200 msedge.exe 4200 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4200 wrote to memory of 900 4200 msedge.exe 85 PID 4200 wrote to memory of 900 4200 msedge.exe 85 PID 4200 wrote to memory of 4696 4200 msedge.exe 86 PID 4200 wrote to memory of 4696 4200 msedge.exe 86 PID 4200 wrote to memory of 4696 4200 msedge.exe 86 PID 4200 wrote to memory of 4696 4200 msedge.exe 86 PID 4200 wrote to memory of 4696 4200 msedge.exe 86 PID 4200 wrote to memory of 4696 4200 msedge.exe 86 PID 4200 wrote to memory of 4696 4200 msedge.exe 86 PID 4200 wrote to memory of 4696 4200 msedge.exe 86 PID 4200 wrote to memory of 4696 4200 msedge.exe 86 PID 4200 wrote to memory of 4696 4200 msedge.exe 86 PID 4200 wrote to memory of 4696 4200 msedge.exe 86 PID 4200 wrote to memory of 4696 4200 msedge.exe 86 PID 4200 wrote to memory of 4696 4200 msedge.exe 86 PID 4200 wrote to memory of 4696 4200 msedge.exe 86 PID 4200 wrote to memory of 4696 4200 msedge.exe 86 PID 4200 wrote to memory of 4696 4200 msedge.exe 86 PID 4200 wrote to memory of 4696 4200 msedge.exe 86 PID 4200 wrote to memory of 4696 4200 msedge.exe 86 PID 4200 wrote to memory of 4696 4200 msedge.exe 86 PID 4200 wrote to memory of 4696 4200 msedge.exe 86 PID 4200 wrote to memory of 4696 4200 msedge.exe 86 PID 4200 wrote to memory of 4696 4200 msedge.exe 86 PID 4200 wrote to memory of 4696 4200 msedge.exe 86 PID 4200 wrote to memory of 4696 4200 msedge.exe 86 PID 4200 wrote to memory of 4696 4200 msedge.exe 86 PID 4200 wrote to memory of 4696 4200 msedge.exe 86 PID 4200 wrote to memory of 4696 4200 msedge.exe 86 PID 4200 wrote to memory of 4696 4200 msedge.exe 86 PID 4200 wrote to memory of 4696 4200 msedge.exe 86 PID 4200 wrote to memory of 4696 4200 msedge.exe 86 PID 4200 wrote to memory of 4696 4200 msedge.exe 86 PID 4200 wrote to memory of 4696 4200 msedge.exe 86 PID 4200 wrote to memory of 4696 4200 msedge.exe 86 PID 4200 wrote to memory of 4696 4200 msedge.exe 86 PID 4200 wrote to memory of 4696 4200 msedge.exe 86 PID 4200 wrote to memory of 4696 4200 msedge.exe 86 PID 4200 wrote to memory of 4696 4200 msedge.exe 86 PID 4200 wrote to memory of 4696 4200 msedge.exe 86 PID 4200 wrote to memory of 4696 4200 msedge.exe 86 PID 4200 wrote to memory of 4696 4200 msedge.exe 86 PID 4200 wrote to memory of 2536 4200 msedge.exe 87 PID 4200 wrote to memory of 2536 4200 msedge.exe 87 PID 4200 wrote to memory of 1876 4200 msedge.exe 88 PID 4200 wrote to memory of 1876 4200 msedge.exe 88 PID 4200 wrote to memory of 1876 4200 msedge.exe 88 PID 4200 wrote to memory of 1876 4200 msedge.exe 88 PID 4200 wrote to memory of 1876 4200 msedge.exe 88 PID 4200 wrote to memory of 1876 4200 msedge.exe 88 PID 4200 wrote to memory of 1876 4200 msedge.exe 88 PID 4200 wrote to memory of 1876 4200 msedge.exe 88 PID 4200 wrote to memory of 1876 4200 msedge.exe 88 PID 4200 wrote to memory of 1876 4200 msedge.exe 88 PID 4200 wrote to memory of 1876 4200 msedge.exe 88 PID 4200 wrote to memory of 1876 4200 msedge.exe 88 PID 4200 wrote to memory of 1876 4200 msedge.exe 88 PID 4200 wrote to memory of 1876 4200 msedge.exe 88 PID 4200 wrote to memory of 1876 4200 msedge.exe 88 PID 4200 wrote to memory of 1876 4200 msedge.exe 88 PID 4200 wrote to memory of 1876 4200 msedge.exe 88 PID 4200 wrote to memory of 1876 4200 msedge.exe 88 PID 4200 wrote to memory of 1876 4200 msedge.exe 88 PID 4200 wrote to memory of 1876 4200 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\7622a9974c79e37bf918e5d3a67c9ebf_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4200 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff76e346f8,0x7fff76e34708,0x7fff76e347182⤵PID:900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,1913459654560294552,1724738800550144228,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2096 /prefetch:22⤵PID:4696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2084,1913459654560294552,1724738800550144228,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2500 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2084,1913459654560294552,1724738800550144228,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2748 /prefetch:82⤵PID:1876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,1913459654560294552,1724738800550144228,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:2608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,1913459654560294552,1724738800550144228,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:60
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,1913459654560294552,1724738800550144228,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5056 /prefetch:12⤵PID:1940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,1913459654560294552,1724738800550144228,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5188 /prefetch:12⤵PID:4464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,1913459654560294552,1724738800550144228,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5236 /prefetch:12⤵PID:2344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,1913459654560294552,1724738800550144228,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5948 /prefetch:12⤵PID:2064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,1913459654560294552,1724738800550144228,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5940 /prefetch:12⤵PID:2196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,1913459654560294552,1724738800550144228,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5272 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3232
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2528
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2072
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
20KB
MD5397383c90a2d930f866f405747e27466
SHA17bb6b5d6cee104c877dc5c3462f61232ffe5b360
SHA256a67db01d19e15d8fa76e5a075e336e195325d79d277a83aadb6a440acf887c47
SHA5124357eddc0581e3cd6209646540bf59756cb4035d7dba47d5cb6b0050e6c202bda65721d4e9d644f37e3cd105bc5fa240574cfa96649f01e2769b796b523e08aa
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD56512c9496da9994c4611c69f037c4d4d
SHA1de07e89796803765b9c7dc2e0471bae3f42d7160
SHA256bfc2a90a10a5d309695d346894b251320b19b03ddef3f86cb64e5f98cf82bec4
SHA512eeeec6856a8ff9c7c3a3bbbaa4905c05d81023fcf4e81966ed91b10973f2d4e30fc5c1e70e5801d9b1e40596b62c4ab83119595c297fd96658fcc14f48d523bc
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize168B
MD5d28f23075226232c9689d2429038772b
SHA15e62220ddf27ca208d34a3419cb5d99f034daaec
SHA256b7d17a63d131b83c5c3424cc18811b46068f12bdc36dba3d2db9be92f4781d20
SHA512d7347e4a5257b35baff661eef4e33f802d71c92ee7a4528cb661f4f9fd78a65c15b1a5a4d8bab8a532eda0ae72dcaa5b7dc71989d3431e2f34d3ea97efc77003
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize192B
MD5740f9728120be9c05d04e14bdbd654ba
SHA14635003054742c641bd9ad07c71fedf9648196b1
SHA25661969ff42520c2b8789f10d0352cbbe782b026e011d751fbe109c6c65c87b2cd
SHA5122fa460fc58feb5ab10510d333e65df592b4e45f9874be6876ab864de1ef95fb7c412548b3f8a186b01ac703251207d27215851a07c98d86999e3225f89d36408
-
Filesize
2KB
MD5af50ca84b33e0498d4ac3a4addb48081
SHA158480f8a79eca534df403ae3b8ee0110e611912b
SHA256c31e3e5e4914b1249c9ff5f90475290bb76ddad0dcfb4c010e7b2929814d5bd4
SHA512a52387945c4bc358dffc296b27f1cb6d21a64978ca75c15db6aa49a2ac5f11d0ffe639bb6588a5b0f89c351e46c37611103744ef589aa6840d2fbb2f154669e9
-
Filesize
7KB
MD5318e8cdf604d317f8b7c9b0c309ea8f4
SHA125ecdf2911926a72cc37a114fd561f9c5a52d140
SHA256335a161f83ab46108fc30b03546b35b04e88ce9410bfe38910e0078734420582
SHA512a1d4f79d2c48fef047495e6645ba116c45270620b5dfe9965c71be39ada77f71837ad67d67ee0130f896ac1632b3ef85d22c657fdf6bc0fd3cf6a45712e0133a
-
Filesize
5KB
MD5f50c57e415f4c08c8bf77da33a61adcb
SHA1a32cd0740258b0cb98f7e369b95562440ce2e8df
SHA256ceecbfd301dadea0fae7fbefd34e25cc880885d788b3a6b9f5e54593908bdeb0
SHA51279776e9f781e28147890dd7b2b8c934bdf0e342a05e24d087eeb194a2fc8c7dcecb3ac72e143a2d02be1373ca891a749776e39fc684e66050ab375d9ffc0de8a
-
Filesize
8KB
MD54a5a9a95f4bc31b12382487c8c207b27
SHA1df3b3857258573bb0dd9ed996f6cc103fa17943f
SHA25604323c5f0eada43998689a31ffd20046b6a3a022de78f92997330601dd92134c
SHA512d6332c24625aa5a1b5fe9baf3d982a8b4c40a9d0f822cea630757279a8d599d5ed6965cfe590bd05b848a71f8460adc808939995b06ec536ecece893c61c7adb
-
Filesize
706B
MD5c900099d7f1600fe72f6eba953635b4f
SHA183a6ab4f427d2be76e11c605c97eabfb7c370289
SHA2560cba9abe798337c401094c102223adaf4e1556a81423e8f337e59624bea26d9d
SHA5127d416b6ba14db7f65c7e49bacec029af777929f2627c8ca443b98aa5e68eb1ab28fc1e731b7525242a0b6a0bc2e4202c844a7bf8e1cf058b9fc5d6f9064f7e18
-
Filesize
371B
MD5181763536a8488a68d6cd30869996297
SHA141ca68a2708f0ad4328d15e92e9a32191861bdfe
SHA25639fd5093e72dea0cca4fcfc2f5fb5075d0f27b46850adc11771a2f08e178e118
SHA51222ad048a9f5933df44885d10cd9909bab6f6ae591530691cd01b52c2fa5b9111910b7c34199369eab1c6fbe4abe668ba63e306697d7a16024db6af2ae29ac4de
-
Filesize
11KB
MD58902e1d154ba7970a9631ec83273acb6
SHA16abe2ab673d722d1cf8a14c8051ea7c88590d6ac
SHA25658e198f55453c01253f847d657101b72ee6ce4227e9f8da0a879c7217ec0b73a
SHA51296c0e00d226b4c80527b71d6a0718e70f0e94c006ad30bc582762a34a1608ea35aa37546698449f913e27d2c7ed647b9c3dbf1595c41140e706eeaf38d416860