Analysis
-
max time kernel
140s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
28/05/2024, 19:00
Static task
static1
Behavioral task
behavioral1
Sample
7e0909c852a43901459d63bd93f22215_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
7e0909c852a43901459d63bd93f22215_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
7e0909c852a43901459d63bd93f22215_JaffaCakes118.html
-
Size
140KB
-
MD5
7e0909c852a43901459d63bd93f22215
-
SHA1
22df9b6452d85773465369973cd72b2b5b2917bf
-
SHA256
b74e199101572410fc6e734b60ae64820b7c60c6d1837e29dad8e31ade752379
-
SHA512
374e9bc5cd88bbaac2c8b2fff246b5bf40e876cac6734f70c3dca5376865a84083bafe027f445c724cc85ac94a91db824af1b97717aedc6d556677172239b469
-
SSDEEP
1536:KHsXmBu4FMVEeVUDDkyweVUDDkM6eVUDDkNDjonH7fCEEOizEeVUDDk9HPq:ZWs4FMBjobfCEEOi3HPq
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4000 msedge.exe 4000 msedge.exe 4576 msedge.exe 4576 msedge.exe 3964 identity_helper.exe 3964 identity_helper.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe 3620 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4576 msedge.exe 4576 msedge.exe 4576 msedge.exe 4576 msedge.exe 4576 msedge.exe 4576 msedge.exe 4576 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4576 msedge.exe 4576 msedge.exe 4576 msedge.exe 4576 msedge.exe 4576 msedge.exe 4576 msedge.exe 4576 msedge.exe 4576 msedge.exe 4576 msedge.exe 4576 msedge.exe 4576 msedge.exe 4576 msedge.exe 4576 msedge.exe 4576 msedge.exe 4576 msedge.exe 4576 msedge.exe 4576 msedge.exe 4576 msedge.exe 4576 msedge.exe 4576 msedge.exe 4576 msedge.exe 4576 msedge.exe 4576 msedge.exe 4576 msedge.exe 4576 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4576 msedge.exe 4576 msedge.exe 4576 msedge.exe 4576 msedge.exe 4576 msedge.exe 4576 msedge.exe 4576 msedge.exe 4576 msedge.exe 4576 msedge.exe 4576 msedge.exe 4576 msedge.exe 4576 msedge.exe 4576 msedge.exe 4576 msedge.exe 4576 msedge.exe 4576 msedge.exe 4576 msedge.exe 4576 msedge.exe 4576 msedge.exe 4576 msedge.exe 4576 msedge.exe 4576 msedge.exe 4576 msedge.exe 4576 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4576 wrote to memory of 440 4576 msedge.exe 82 PID 4576 wrote to memory of 440 4576 msedge.exe 82 PID 4576 wrote to memory of 5108 4576 msedge.exe 83 PID 4576 wrote to memory of 5108 4576 msedge.exe 83 PID 4576 wrote to memory of 5108 4576 msedge.exe 83 PID 4576 wrote to memory of 5108 4576 msedge.exe 83 PID 4576 wrote to memory of 5108 4576 msedge.exe 83 PID 4576 wrote to memory of 5108 4576 msedge.exe 83 PID 4576 wrote to memory of 5108 4576 msedge.exe 83 PID 4576 wrote to memory of 5108 4576 msedge.exe 83 PID 4576 wrote to memory of 5108 4576 msedge.exe 83 PID 4576 wrote to memory of 5108 4576 msedge.exe 83 PID 4576 wrote to memory of 5108 4576 msedge.exe 83 PID 4576 wrote to memory of 5108 4576 msedge.exe 83 PID 4576 wrote to memory of 5108 4576 msedge.exe 83 PID 4576 wrote to memory of 5108 4576 msedge.exe 83 PID 4576 wrote to memory of 5108 4576 msedge.exe 83 PID 4576 wrote to memory of 5108 4576 msedge.exe 83 PID 4576 wrote to memory of 5108 4576 msedge.exe 83 PID 4576 wrote to memory of 5108 4576 msedge.exe 83 PID 4576 wrote to memory of 5108 4576 msedge.exe 83 PID 4576 wrote to memory of 5108 4576 msedge.exe 83 PID 4576 wrote to memory of 5108 4576 msedge.exe 83 PID 4576 wrote to memory of 5108 4576 msedge.exe 83 PID 4576 wrote to memory of 5108 4576 msedge.exe 83 PID 4576 wrote to memory of 5108 4576 msedge.exe 83 PID 4576 wrote to memory of 5108 4576 msedge.exe 83 PID 4576 wrote to memory of 5108 4576 msedge.exe 83 PID 4576 wrote to memory of 5108 4576 msedge.exe 83 PID 4576 wrote to memory of 5108 4576 msedge.exe 83 PID 4576 wrote to memory of 5108 4576 msedge.exe 83 PID 4576 wrote to memory of 5108 4576 msedge.exe 83 PID 4576 wrote to memory of 5108 4576 msedge.exe 83 PID 4576 wrote to memory of 5108 4576 msedge.exe 83 PID 4576 wrote to memory of 5108 4576 msedge.exe 83 PID 4576 wrote to memory of 5108 4576 msedge.exe 83 PID 4576 wrote to memory of 5108 4576 msedge.exe 83 PID 4576 wrote to memory of 5108 4576 msedge.exe 83 PID 4576 wrote to memory of 5108 4576 msedge.exe 83 PID 4576 wrote to memory of 5108 4576 msedge.exe 83 PID 4576 wrote to memory of 5108 4576 msedge.exe 83 PID 4576 wrote to memory of 5108 4576 msedge.exe 83 PID 4576 wrote to memory of 4000 4576 msedge.exe 84 PID 4576 wrote to memory of 4000 4576 msedge.exe 84 PID 4576 wrote to memory of 4936 4576 msedge.exe 85 PID 4576 wrote to memory of 4936 4576 msedge.exe 85 PID 4576 wrote to memory of 4936 4576 msedge.exe 85 PID 4576 wrote to memory of 4936 4576 msedge.exe 85 PID 4576 wrote to memory of 4936 4576 msedge.exe 85 PID 4576 wrote to memory of 4936 4576 msedge.exe 85 PID 4576 wrote to memory of 4936 4576 msedge.exe 85 PID 4576 wrote to memory of 4936 4576 msedge.exe 85 PID 4576 wrote to memory of 4936 4576 msedge.exe 85 PID 4576 wrote to memory of 4936 4576 msedge.exe 85 PID 4576 wrote to memory of 4936 4576 msedge.exe 85 PID 4576 wrote to memory of 4936 4576 msedge.exe 85 PID 4576 wrote to memory of 4936 4576 msedge.exe 85 PID 4576 wrote to memory of 4936 4576 msedge.exe 85 PID 4576 wrote to memory of 4936 4576 msedge.exe 85 PID 4576 wrote to memory of 4936 4576 msedge.exe 85 PID 4576 wrote to memory of 4936 4576 msedge.exe 85 PID 4576 wrote to memory of 4936 4576 msedge.exe 85 PID 4576 wrote to memory of 4936 4576 msedge.exe 85 PID 4576 wrote to memory of 4936 4576 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\7e0909c852a43901459d63bd93f22215_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4576 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9849246f8,0x7ff984924708,0x7ff9849247182⤵PID:440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2020,17846037213206514096,6917002304515630698,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2060 /prefetch:22⤵PID:5108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2020,17846037213206514096,6917002304515630698,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2128 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2020,17846037213206514096,6917002304515630698,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2684 /prefetch:82⤵PID:4936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,17846037213206514096,6917002304515630698,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:5064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,17846037213206514096,6917002304515630698,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:2468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,17846037213206514096,6917002304515630698,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4144 /prefetch:12⤵PID:2408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2020,17846037213206514096,6917002304515630698,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6084 /prefetch:82⤵PID:2356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2020,17846037213206514096,6917002304515630698,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6084 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,17846037213206514096,6917002304515630698,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5776 /prefetch:12⤵PID:4524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,17846037213206514096,6917002304515630698,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5724 /prefetch:12⤵PID:2948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,17846037213206514096,6917002304515630698,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5940 /prefetch:12⤵PID:936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,17846037213206514096,6917002304515630698,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5232 /prefetch:12⤵PID:3756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2020,17846037213206514096,6917002304515630698,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6068 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3620
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3772
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4788
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ae54e9db2e89f2c54da8cc0bfcbd26bd
SHA1a88af6c673609ecbc51a1a60dfbc8577830d2b5d
SHA2565009d3c953de63cfd14a7d911156c514e179ff07d2b94382d9caac6040cb72af
SHA512e3b70e5eb7321b9deca6f6a17424a15b9fd5c4008bd3789bd01099fd13cb2f4a2f37fe4b920fb51c50517745b576c1f94df83efd1a7e75949551163985599998
-
Filesize
152B
MD5f53207a5ca2ef5c7e976cbb3cb26d870
SHA149a8cc44f53da77bb3dfb36fc7676ed54675db43
SHA25619ab4e3c9da6d9cedda7461efdba9a2085e743513ab89f1dd0fd5a8f9486ad23
SHA512be734c7e8afda19f445912aef0d78f9941add29baebd4a812bff27f10a1d78b52aeb11c551468c8644443c86e1a2a6b2e4aead3d7f81d39925e3c20406ac1499
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize240B
MD5ea4f7ad0df42c1989c556972aba27188
SHA181815f83f0437245947c188896998a714d48d120
SHA25677c55642cc91ca870415b1f7b91ea55a3bab42ea4344f59855238dde99d0d0c8
SHA5128ae541c06cd01ff124c5c585b4a449b7b104a24eaff3fb27455c16a03a6c58ecd726e9a6d48515791a9ff77e7bdc0f9e2f47fae7bfd7291ae94804a768e8ff85
-
Filesize
2KB
MD504d770172d52e9e2df4a43aa5641a13e
SHA1def97dc47ac9cbc4878928e24be5210dc06fffd0
SHA25692d2da17e6ed1a988dffea03f7733dbacab75ca57e0e5b6a73cb267740311e28
SHA512605c3a600f22c35357130f0d8d3ff0b1eae3b1c45c1fdfafc7e679cd87f1710791d5042b5d988c16b8876321f3a5245a0041c3005bf59ac21dc760d82b5c78fe
-
Filesize
5KB
MD5546cd02e11cd8abab8c6be34eddba124
SHA18ef71cd6e7be292841bf812c0ca2d689d181d1d8
SHA2568037f82b7a08cabf8cef5a55ed443e33a0a8a5df00bd0acb7ebb238331259350
SHA5122f5373f3377351ed3b89d4515a5786d936e362512fc53b2b1a8b71e88ce7aa450b41290be6293737238653cd56b13a6d999959a150c69a0c729aaa491d69e9b1
-
Filesize
7KB
MD50ea171b23a9e5f49114a7be244557a72
SHA101e408722a7acaa58ec15d2c874ae48fbd0c6d21
SHA256af74a547c2a0720ceabf6f5c6c704fc82d5ce1758f0e6333c00ff84e71a64085
SHA512f6cc8b7ec76a587d6709f287994fea9d87d027ac7d61fa75d3266353658abae5baae409bf462dfde6256e50884458aaf626f473d73561fbd38a060dcbcdf2b05
-
Filesize
7KB
MD52b924c9a9eeac8bad264170e18c165c9
SHA1d084ab7f0f435b17f3e34c6db11f8bb248c15499
SHA25681a4ff111142e0bd887bed5e7c80bfbd1465bd71e30809455f1e04b4eac01a8c
SHA512ac246999b24ac8e0234dab0b77306755f9b97aa3a5646b51e49509a0ba1a5dd9944940ca766754aec0769020f4262d426a421a62ea1dccdcf58bc03b57b1ed75
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD52c1f3b921577188a9bbc900274644a33
SHA13e1562b908f5aa1985a851804ed6e2c334b594f7
SHA2565628c1abf12405ddc45307ba5999dbf49ebb3bec800a761a7d9b07154ff0db3c
SHA5121947c9b0c03a80c12761484fd65f46c83d04ed0c96078c9ddedcf50901d1383a7e59e60966466dd9add472a1d6b2c83d62497798d252f5ab467c2fa967cffd7b