Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
30-05-2024 11:23
Static task
static1
Behavioral task
behavioral1
Sample
840dfd214518c3a039839f7227dc1f96_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
840dfd214518c3a039839f7227dc1f96_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
840dfd214518c3a039839f7227dc1f96_JaffaCakes118.html
-
Size
175KB
-
MD5
840dfd214518c3a039839f7227dc1f96
-
SHA1
ce7e14355d57882c3d86f5e12a2594e4cf0d8e04
-
SHA256
68b6d2dda8aa58138c79a8940f1255484c74c2b4a141d19b10b9af3ee4ee1bd4
-
SHA512
78eaa9225463a8fa0bdcf7d86e7210748e4aba58b8bb5705fdbb582be3751636528ee19b6d7ec6650564900ec5ca9af013d7d354e22466a97c44be68c8ccf3ae
-
SSDEEP
1536:Sqtk8hd8Wu8pI8Cd8hd8dQg0H//3oS3kGNkFEYfBCJisi+aeTH+Wf/Lf1/hmnVSV:S7oT3k/FxBCJi89
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3416 msedge.exe 3416 msedge.exe 552 msedge.exe 552 msedge.exe 2812 identity_helper.exe 2812 identity_helper.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe 3004 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 552 wrote to memory of 4612 552 msedge.exe 81 PID 552 wrote to memory of 4612 552 msedge.exe 81 PID 552 wrote to memory of 3968 552 msedge.exe 82 PID 552 wrote to memory of 3968 552 msedge.exe 82 PID 552 wrote to memory of 3968 552 msedge.exe 82 PID 552 wrote to memory of 3968 552 msedge.exe 82 PID 552 wrote to memory of 3968 552 msedge.exe 82 PID 552 wrote to memory of 3968 552 msedge.exe 82 PID 552 wrote to memory of 3968 552 msedge.exe 82 PID 552 wrote to memory of 3968 552 msedge.exe 82 PID 552 wrote to memory of 3968 552 msedge.exe 82 PID 552 wrote to memory of 3968 552 msedge.exe 82 PID 552 wrote to memory of 3968 552 msedge.exe 82 PID 552 wrote to memory of 3968 552 msedge.exe 82 PID 552 wrote to memory of 3968 552 msedge.exe 82 PID 552 wrote to memory of 3968 552 msedge.exe 82 PID 552 wrote to memory of 3968 552 msedge.exe 82 PID 552 wrote to memory of 3968 552 msedge.exe 82 PID 552 wrote to memory of 3968 552 msedge.exe 82 PID 552 wrote to memory of 3968 552 msedge.exe 82 PID 552 wrote to memory of 3968 552 msedge.exe 82 PID 552 wrote to memory of 3968 552 msedge.exe 82 PID 552 wrote to memory of 3968 552 msedge.exe 82 PID 552 wrote to memory of 3968 552 msedge.exe 82 PID 552 wrote to memory of 3968 552 msedge.exe 82 PID 552 wrote to memory of 3968 552 msedge.exe 82 PID 552 wrote to memory of 3968 552 msedge.exe 82 PID 552 wrote to memory of 3968 552 msedge.exe 82 PID 552 wrote to memory of 3968 552 msedge.exe 82 PID 552 wrote to memory of 3968 552 msedge.exe 82 PID 552 wrote to memory of 3968 552 msedge.exe 82 PID 552 wrote to memory of 3968 552 msedge.exe 82 PID 552 wrote to memory of 3968 552 msedge.exe 82 PID 552 wrote to memory of 3968 552 msedge.exe 82 PID 552 wrote to memory of 3968 552 msedge.exe 82 PID 552 wrote to memory of 3968 552 msedge.exe 82 PID 552 wrote to memory of 3968 552 msedge.exe 82 PID 552 wrote to memory of 3968 552 msedge.exe 82 PID 552 wrote to memory of 3968 552 msedge.exe 82 PID 552 wrote to memory of 3968 552 msedge.exe 82 PID 552 wrote to memory of 3968 552 msedge.exe 82 PID 552 wrote to memory of 3968 552 msedge.exe 82 PID 552 wrote to memory of 3416 552 msedge.exe 83 PID 552 wrote to memory of 3416 552 msedge.exe 83 PID 552 wrote to memory of 5328 552 msedge.exe 84 PID 552 wrote to memory of 5328 552 msedge.exe 84 PID 552 wrote to memory of 5328 552 msedge.exe 84 PID 552 wrote to memory of 5328 552 msedge.exe 84 PID 552 wrote to memory of 5328 552 msedge.exe 84 PID 552 wrote to memory of 5328 552 msedge.exe 84 PID 552 wrote to memory of 5328 552 msedge.exe 84 PID 552 wrote to memory of 5328 552 msedge.exe 84 PID 552 wrote to memory of 5328 552 msedge.exe 84 PID 552 wrote to memory of 5328 552 msedge.exe 84 PID 552 wrote to memory of 5328 552 msedge.exe 84 PID 552 wrote to memory of 5328 552 msedge.exe 84 PID 552 wrote to memory of 5328 552 msedge.exe 84 PID 552 wrote to memory of 5328 552 msedge.exe 84 PID 552 wrote to memory of 5328 552 msedge.exe 84 PID 552 wrote to memory of 5328 552 msedge.exe 84 PID 552 wrote to memory of 5328 552 msedge.exe 84 PID 552 wrote to memory of 5328 552 msedge.exe 84 PID 552 wrote to memory of 5328 552 msedge.exe 84 PID 552 wrote to memory of 5328 552 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\840dfd214518c3a039839f7227dc1f96_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:552 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffae23946f8,0x7ffae2394708,0x7ffae23947182⤵PID:4612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,2512248714586298043,18201116536585491810,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵PID:3968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,2512248714586298043,18201116536585491810,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2480 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2080,2512248714586298043,18201116536585491810,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2904 /prefetch:82⤵PID:5328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,2512248714586298043,18201116536585491810,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,2512248714586298043,18201116536585491810,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:3680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,2512248714586298043,18201116536585491810,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4788 /prefetch:12⤵PID:1952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,2512248714586298043,18201116536585491810,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4904 /prefetch:12⤵PID:4944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,2512248714586298043,18201116536585491810,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5316 /prefetch:12⤵PID:4644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,2512248714586298043,18201116536585491810,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5516 /prefetch:12⤵PID:1844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,2512248714586298043,18201116536585491810,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3460 /prefetch:82⤵PID:2548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,2512248714586298043,18201116536585491810,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3460 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,2512248714586298043,18201116536585491810,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4644 /prefetch:12⤵PID:944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,2512248714586298043,18201116536585491810,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5504 /prefetch:12⤵PID:432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,2512248714586298043,18201116536585491810,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5732 /prefetch:12⤵PID:5696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,2512248714586298043,18201116536585491810,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5696 /prefetch:12⤵PID:3972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,2512248714586298043,18201116536585491810,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2692 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3004
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:696
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5216
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2936
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52daa93382bba07cbc40af372d30ec576
SHA1c5e709dc3e2e4df2ff841fbde3e30170e7428a94
SHA2561826d2a57b1938c148bf212a47d947ed1bfb26cfc55868931f843ee438117f30
SHA51265635cb59c81548a9ef8fdb0942331e7f3cd0c30ce1d4dba48aed72dbb27b06511a55d2aeaadfadbbb4b7cb4b2e2772bbabba9603b3f7d9c8b9e4a7fbf3d6b6b
-
Filesize
152B
MD5ecdc2754d7d2ae862272153aa9b9ca6e
SHA1c19bed1c6e1c998b9fa93298639ad7961339147d
SHA256a13d791473f836edcab0e93451ce7b7182efbbc54261b2b5644d319e047a00a7
SHA512cd4fb81317d540f8b15f1495a381bb6f0f129b8923a7c06e4b5cf777d2625c30304aee6cc68aa20479e08d84e5030b43fbe93e479602400334dfdd7297f702f2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize336B
MD5f8854fb09a2ea338af1f775aaac8f5fb
SHA1836edfc2cfc267a61e280bba3e4fd70dbdec2553
SHA25603c19ebfc4ea4c5645dda16c590a7cf654444ada0fbff9a62d7627ebd80fef8a
SHA51248e6b492bb707472395b3eeffd0dd6c7a2dbd80f743286139a810e8643f1756d93c524836f9fe39e1763d4ad0cd49cf7e397d8cf09af7e7ce0534f4ca8203f33
-
Filesize
2KB
MD533597c8ad31e4fd5b6b767d53bcd82e8
SHA18da89e350351d51dc4e1140dc22a24a9b4ac0801
SHA2562c637ac3eabb96c081d8d22d3ddee9989437bb77de35e6c5cbdd7d5434dfd014
SHA51214f9eb10b36bf79b377aeeca8ea156ce90e79f6803be173f9a7ffd0e031dc3d6b11e8d61fac3aae6b23534e3a3457e18cd1e9985e25f6b2c6287b447811bbe4a
-
Filesize
2KB
MD5867f86a990c47fa1ac8647458c37933d
SHA17898b50c053caddf676738486230383b92569f67
SHA256914bef0889d030789071edc2f8e890f2793ecf9e106cfa98779d990012b89743
SHA512d275cdfe99724f64a8d981708a7d15ca58680cd15c55317a58f0dec32dc32c2ac2da5e6d6b487a2262e9153f0e8fcaf767078ddfe6280928f2edc96385392473
-
Filesize
5KB
MD5e56a478cdb7233b515198a12912bc836
SHA14e336408abf376b350a479d76ea72c510ab795a2
SHA256d8fdd54e11ab8de542b7e5cd18bea7ba60135049e27bc5077128117dfcb1f623
SHA512583162552cbd74e7971f07826ee4dc8c74eda35df813929a249879f00be9905e0d09877af5991590a0e8b3e434cab737b172f176cb5185e1a26ae2ebba162d65
-
Filesize
7KB
MD565e31c51da42a888830fcec329807339
SHA1d5c74f51e8c42bcb8edaa56d359fabc9a81ded38
SHA256c29a50c46f108edff74ec2a4135bd1f15f15e7d93084a87a32520ccd76582685
SHA5122f41cbbd042550fa3f4323fb1064a78295e34a4e258f7efc3b9ed12cd90f12ef1ee32d8a625a8f12a25875c888fec9b09de83dbd8f240fe92a0f767c870c5c6f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5a2bf282801e4b54a04e0eaf23ff5cc81
SHA1cd448d7a25cd81a87924b018a6195561942460fb
SHA256827e4581fc90b8450fd87fe66ce74a7d1bfda46241ed5a5fa4c33ba16249e598
SHA5128058483e745e247cf5c22b60f92c347d42bd9c71aebc2b87987166206b31ea1794ee8738692c04351c9fad7def57bdeac3e8df3293a1bdafe94e3e78ee3218d8