Analysis
-
max time kernel
145s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
26/05/2024, 16:26
Static task
static1
Behavioral task
behavioral1
Sample
76151ba88ac2ba26ed3563e21bd6dbfa_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
76151ba88ac2ba26ed3563e21bd6dbfa_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
76151ba88ac2ba26ed3563e21bd6dbfa_JaffaCakes118.html
-
Size
56KB
-
MD5
76151ba88ac2ba26ed3563e21bd6dbfa
-
SHA1
bbc07ec27f2fe1f9914492e7d448dda67a851e7a
-
SHA256
1ca95ef8290e62a718ec22aa350e8437b5544137ca8a01423f01ab3da019794d
-
SHA512
26f8d92fd010bd1df5b6cbde440bfbaf91458f62058611bec9873c276cd1816e0b6c2358aca5c1e839863ba7f33a9aced7f62f532295c83c05c1f2d88a8d3e45
-
SSDEEP
768:KdKEoLopjFgGQAZzt/Atsdekq+1RKlGGhb/mvZQ+ix4/A1NNipG2Ste:KdyopjFaAZh/AGXq8ggl/AzNipL
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1672 msedge.exe 1672 msedge.exe 3948 msedge.exe 3948 msedge.exe 4656 identity_helper.exe 4656 identity_helper.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3948 wrote to memory of 3468 3948 msedge.exe 83 PID 3948 wrote to memory of 3468 3948 msedge.exe 83 PID 3948 wrote to memory of 3792 3948 msedge.exe 84 PID 3948 wrote to memory of 3792 3948 msedge.exe 84 PID 3948 wrote to memory of 3792 3948 msedge.exe 84 PID 3948 wrote to memory of 3792 3948 msedge.exe 84 PID 3948 wrote to memory of 3792 3948 msedge.exe 84 PID 3948 wrote to memory of 3792 3948 msedge.exe 84 PID 3948 wrote to memory of 3792 3948 msedge.exe 84 PID 3948 wrote to memory of 3792 3948 msedge.exe 84 PID 3948 wrote to memory of 3792 3948 msedge.exe 84 PID 3948 wrote to memory of 3792 3948 msedge.exe 84 PID 3948 wrote to memory of 3792 3948 msedge.exe 84 PID 3948 wrote to memory of 3792 3948 msedge.exe 84 PID 3948 wrote to memory of 3792 3948 msedge.exe 84 PID 3948 wrote to memory of 3792 3948 msedge.exe 84 PID 3948 wrote to memory of 3792 3948 msedge.exe 84 PID 3948 wrote to memory of 3792 3948 msedge.exe 84 PID 3948 wrote to memory of 3792 3948 msedge.exe 84 PID 3948 wrote to memory of 3792 3948 msedge.exe 84 PID 3948 wrote to memory of 3792 3948 msedge.exe 84 PID 3948 wrote to memory of 3792 3948 msedge.exe 84 PID 3948 wrote to memory of 3792 3948 msedge.exe 84 PID 3948 wrote to memory of 3792 3948 msedge.exe 84 PID 3948 wrote to memory of 3792 3948 msedge.exe 84 PID 3948 wrote to memory of 3792 3948 msedge.exe 84 PID 3948 wrote to memory of 3792 3948 msedge.exe 84 PID 3948 wrote to memory of 3792 3948 msedge.exe 84 PID 3948 wrote to memory of 3792 3948 msedge.exe 84 PID 3948 wrote to memory of 3792 3948 msedge.exe 84 PID 3948 wrote to memory of 3792 3948 msedge.exe 84 PID 3948 wrote to memory of 3792 3948 msedge.exe 84 PID 3948 wrote to memory of 3792 3948 msedge.exe 84 PID 3948 wrote to memory of 3792 3948 msedge.exe 84 PID 3948 wrote to memory of 3792 3948 msedge.exe 84 PID 3948 wrote to memory of 3792 3948 msedge.exe 84 PID 3948 wrote to memory of 3792 3948 msedge.exe 84 PID 3948 wrote to memory of 3792 3948 msedge.exe 84 PID 3948 wrote to memory of 3792 3948 msedge.exe 84 PID 3948 wrote to memory of 3792 3948 msedge.exe 84 PID 3948 wrote to memory of 3792 3948 msedge.exe 84 PID 3948 wrote to memory of 3792 3948 msedge.exe 84 PID 3948 wrote to memory of 1672 3948 msedge.exe 85 PID 3948 wrote to memory of 1672 3948 msedge.exe 85 PID 3948 wrote to memory of 2016 3948 msedge.exe 86 PID 3948 wrote to memory of 2016 3948 msedge.exe 86 PID 3948 wrote to memory of 2016 3948 msedge.exe 86 PID 3948 wrote to memory of 2016 3948 msedge.exe 86 PID 3948 wrote to memory of 2016 3948 msedge.exe 86 PID 3948 wrote to memory of 2016 3948 msedge.exe 86 PID 3948 wrote to memory of 2016 3948 msedge.exe 86 PID 3948 wrote to memory of 2016 3948 msedge.exe 86 PID 3948 wrote to memory of 2016 3948 msedge.exe 86 PID 3948 wrote to memory of 2016 3948 msedge.exe 86 PID 3948 wrote to memory of 2016 3948 msedge.exe 86 PID 3948 wrote to memory of 2016 3948 msedge.exe 86 PID 3948 wrote to memory of 2016 3948 msedge.exe 86 PID 3948 wrote to memory of 2016 3948 msedge.exe 86 PID 3948 wrote to memory of 2016 3948 msedge.exe 86 PID 3948 wrote to memory of 2016 3948 msedge.exe 86 PID 3948 wrote to memory of 2016 3948 msedge.exe 86 PID 3948 wrote to memory of 2016 3948 msedge.exe 86 PID 3948 wrote to memory of 2016 3948 msedge.exe 86 PID 3948 wrote to memory of 2016 3948 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\76151ba88ac2ba26ed3563e21bd6dbfa_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3948 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb166d46f8,0x7ffb166d4708,0x7ffb166d47182⤵PID:3468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,9969476147553543836,11864917994163298245,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2184 /prefetch:22⤵PID:3792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2064,9969476147553543836,11864917994163298245,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2240 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2064,9969476147553543836,11864917994163298245,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2848 /prefetch:82⤵PID:2016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,9969476147553543836,11864917994163298245,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:3452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,9969476147553543836,11864917994163298245,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:5084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,9969476147553543836,11864917994163298245,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4856 /prefetch:12⤵PID:392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,9969476147553543836,11864917994163298245,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6024 /prefetch:82⤵PID:2964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,9969476147553543836,11864917994163298245,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6024 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,9969476147553543836,11864917994163298245,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2256 /prefetch:12⤵PID:5036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,9969476147553543836,11864917994163298245,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5820 /prefetch:12⤵PID:1244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,9969476147553543836,11864917994163298245,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4128 /prefetch:12⤵PID:1940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,9969476147553543836,11864917994163298245,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4964 /prefetch:12⤵PID:1948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,9969476147553543836,11864917994163298245,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5108 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:632
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1988
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4484
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c9c4c494f8fba32d95ba2125f00586a3
SHA18a600205528aef7953144f1cf6f7a5115e3611de
SHA256a0ca609205813c307df9122c0c5b0967c5472755700f615b0033129cf7d6b35b
SHA5129d30cea6cfc259e97b0305f8b5cd19774044fb78feedfcef2014b2947f2e6a101273bc4ad30db9cc1724e62eb441266d7df376e28ac58693f128b9cce2c7d20d
-
Filesize
152B
MD54dc6fc5e708279a3310fe55d9c44743d
SHA1a42e8bdf9d1c25ef3e223d59f6b1d16b095f46d2
SHA256a1c5f48659d4b3af960971b3a0f433a95fee5bfafe5680a34110c68b342377d8
SHA5125874b2310187f242b852fa6dcded244cc860abb2be4f6f5a6a1db8322e12e1fef8f825edc0aae75adbb7284a2cd64730650d0643b1e2bb7ead9350e50e1d8c13
-
Filesize
20KB
MD5b6c8122025aff891940d1d5e1ab95fce
SHA1a0c7ca41d0922d085c358f5dde81ae3e85a8c9c4
SHA2569954c64c68000f615e5066bc255eced1195d1f8b7dbc715f9062ddf9f147e87e
SHA512e62a37b55b6b8d95c24fb624105ff6ff72f118e31760d0da1e8df8e8acf627ec6327c26dfa26df8535585877604c7948d2f621ccabc39beec49787e22c302c10
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD5da9210627456ef80101f62933e4110ad
SHA1cbb7dbacebf4d7aa8d21ff12a046bb82ba9b78fc
SHA256270baed2a56fbc653751ab79a056802d3cdbb2294ca54fbd23b2ff7554213d55
SHA5125da3168c517e89d5109e84fe00b782d9ec59da2a47078f91992b35cb2047d3654782ee5f77f637deb3d2efef8dd1620641860c3fcf9129d607ac737294727123
-
Filesize
1KB
MD523a794a239687ac95621d7a591a6bbb6
SHA147ec798fa02c111c0c57d070bef607d9b1dd71fe
SHA256a9d0d91caf20985b4a3881a87dd8f154eb85783c8c892a23be03f415e96b2d82
SHA512560b801901b428484caf10c48778a2982549b8ef00513d8de614a465d8f9fd2530d1fb51557032d3e799222415da26f14602bc02b014dbfe05983dd588a71a30
-
Filesize
1KB
MD56b39680cb254207ee62b2fd630cd6977
SHA15181d6344d088f66a5ebd974ed3a084074b6eaab
SHA2567b5137ee140807e6f92963e40964dd40eed4a0db53a44491b7fa8d280da101be
SHA51233c76a6d5f1659e1dcaaf89f1e47c8c0da55b942baacd37e387ccfe68b3a2e3854ae87f100c11c843229b2335a78308d89f4c57fba015b4ec1020954c4849db6
-
Filesize
7KB
MD5f4ddec2df63a7ae9a184a729921a4efa
SHA1e46c62807bbe475f83906cf5457dcd1d8c1bb85e
SHA256345c85c98e610d317d71500e56ba57341583e7110756d556c0e56544821b7dfc
SHA512849fbc88f48af9b37c306aebd1f97a13498e6e9cb342f94d94c60e54dcd4df85489272667f96b33b8959fb646c3ea7da88fcc283f4ca62c435f53ff9a1f6d5c2
-
Filesize
5KB
MD57fc76e9a49786e1dfe24e28dead9e7c6
SHA186bdf9b9dfd8b64dad909656ec4473402c9cb393
SHA25600a06267d82c31fc31f34bc43fbfd87b192c6b4850b2aa93b36597c84a8a84c8
SHA512647a06fc02651a4555405f6d37ca91aae462f00b62b609b86d0b4c038a8446cebbede3770eadb956c06e8a71493f33c49dcc6f9419dae32ce2cc42e13c34c8e0
-
Filesize
7KB
MD53d8e95f6b6280983c9e9252c2eabd6b2
SHA1d081d77aecbde4ee50044b6ed5e536f2a783af90
SHA2561a8048c00a5233695f5068877642a013d5607d6ea8115d0dc4508569021ad23b
SHA512529539345eefbf4dad8ae5558441222110ac4157e38148f5992db4b9f593838b5128b086cbb348f974326535f3225b2734050c6c015e72576adc5cc427e8c97b
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5fd2ebf8dfb325ae922d6c318e0c17fbb
SHA189e7dee93815c3a0bb7da616f509bad45a943996
SHA256e1a8c9013ba2b6550a45b75e29423aa40b5975c105199deda7c9b0690f34c8ea
SHA512e2920f63abeb086e8236daa901bb79fd302f70acab434ec436d7e2cf11ebfda70e784ce061c20953d8a50332346e9f570d243a86c3189161b2daa9ab7cabf53c