Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
01-06-2024 04:39
Static task
static1
Behavioral task
behavioral1
Sample
89633ea174da7dc473820e953895511f_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
89633ea174da7dc473820e953895511f_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
89633ea174da7dc473820e953895511f_JaffaCakes118.html
-
Size
175KB
-
MD5
89633ea174da7dc473820e953895511f
-
SHA1
e609b79620a328d897170a4f7ae771c049c486ab
-
SHA256
3c666628985afa2365c29d0fe5fafd8480aab19d465ea645f17866a3f1dc3658
-
SHA512
78c7ded9c2b092ec7eebc7627f8c1fe0cfa150a01dd73db1b7ccbb3b0896e51eae054fb1e8388ada7fd67ca862904c12781c6cc991a17bc5b7404b9a0708b0cb
-
SSDEEP
1536:Sqtz8hd8Wu8pI8Cd8hd8dQg0H//3oS3/GNkF2YfBCJisI+aeTH+WK/Lf1/hmnVSV:SOoT3//F/BCJiam
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3740 msedge.exe 3740 msedge.exe 2676 msedge.exe 2676 msedge.exe 2260 identity_helper.exe 2260 identity_helper.exe 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2676 wrote to memory of 1920 2676 msedge.exe 84 PID 2676 wrote to memory of 1920 2676 msedge.exe 84 PID 2676 wrote to memory of 4408 2676 msedge.exe 85 PID 2676 wrote to memory of 4408 2676 msedge.exe 85 PID 2676 wrote to memory of 4408 2676 msedge.exe 85 PID 2676 wrote to memory of 4408 2676 msedge.exe 85 PID 2676 wrote to memory of 4408 2676 msedge.exe 85 PID 2676 wrote to memory of 4408 2676 msedge.exe 85 PID 2676 wrote to memory of 4408 2676 msedge.exe 85 PID 2676 wrote to memory of 4408 2676 msedge.exe 85 PID 2676 wrote to memory of 4408 2676 msedge.exe 85 PID 2676 wrote to memory of 4408 2676 msedge.exe 85 PID 2676 wrote to memory of 4408 2676 msedge.exe 85 PID 2676 wrote to memory of 4408 2676 msedge.exe 85 PID 2676 wrote to memory of 4408 2676 msedge.exe 85 PID 2676 wrote to memory of 4408 2676 msedge.exe 85 PID 2676 wrote to memory of 4408 2676 msedge.exe 85 PID 2676 wrote to memory of 4408 2676 msedge.exe 85 PID 2676 wrote to memory of 4408 2676 msedge.exe 85 PID 2676 wrote to memory of 4408 2676 msedge.exe 85 PID 2676 wrote to memory of 4408 2676 msedge.exe 85 PID 2676 wrote to memory of 4408 2676 msedge.exe 85 PID 2676 wrote to memory of 4408 2676 msedge.exe 85 PID 2676 wrote to memory of 4408 2676 msedge.exe 85 PID 2676 wrote to memory of 4408 2676 msedge.exe 85 PID 2676 wrote to memory of 4408 2676 msedge.exe 85 PID 2676 wrote to memory of 4408 2676 msedge.exe 85 PID 2676 wrote to memory of 4408 2676 msedge.exe 85 PID 2676 wrote to memory of 4408 2676 msedge.exe 85 PID 2676 wrote to memory of 4408 2676 msedge.exe 85 PID 2676 wrote to memory of 4408 2676 msedge.exe 85 PID 2676 wrote to memory of 4408 2676 msedge.exe 85 PID 2676 wrote to memory of 4408 2676 msedge.exe 85 PID 2676 wrote to memory of 4408 2676 msedge.exe 85 PID 2676 wrote to memory of 4408 2676 msedge.exe 85 PID 2676 wrote to memory of 4408 2676 msedge.exe 85 PID 2676 wrote to memory of 4408 2676 msedge.exe 85 PID 2676 wrote to memory of 4408 2676 msedge.exe 85 PID 2676 wrote to memory of 4408 2676 msedge.exe 85 PID 2676 wrote to memory of 4408 2676 msedge.exe 85 PID 2676 wrote to memory of 4408 2676 msedge.exe 85 PID 2676 wrote to memory of 4408 2676 msedge.exe 85 PID 2676 wrote to memory of 3740 2676 msedge.exe 86 PID 2676 wrote to memory of 3740 2676 msedge.exe 86 PID 2676 wrote to memory of 460 2676 msedge.exe 87 PID 2676 wrote to memory of 460 2676 msedge.exe 87 PID 2676 wrote to memory of 460 2676 msedge.exe 87 PID 2676 wrote to memory of 460 2676 msedge.exe 87 PID 2676 wrote to memory of 460 2676 msedge.exe 87 PID 2676 wrote to memory of 460 2676 msedge.exe 87 PID 2676 wrote to memory of 460 2676 msedge.exe 87 PID 2676 wrote to memory of 460 2676 msedge.exe 87 PID 2676 wrote to memory of 460 2676 msedge.exe 87 PID 2676 wrote to memory of 460 2676 msedge.exe 87 PID 2676 wrote to memory of 460 2676 msedge.exe 87 PID 2676 wrote to memory of 460 2676 msedge.exe 87 PID 2676 wrote to memory of 460 2676 msedge.exe 87 PID 2676 wrote to memory of 460 2676 msedge.exe 87 PID 2676 wrote to memory of 460 2676 msedge.exe 87 PID 2676 wrote to memory of 460 2676 msedge.exe 87 PID 2676 wrote to memory of 460 2676 msedge.exe 87 PID 2676 wrote to memory of 460 2676 msedge.exe 87 PID 2676 wrote to memory of 460 2676 msedge.exe 87 PID 2676 wrote to memory of 460 2676 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\89633ea174da7dc473820e953895511f_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa087846f8,0x7ffa08784708,0x7ffa087847182⤵PID:1920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2204,12782218643051943376,17022591130695148395,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2196 /prefetch:22⤵PID:4408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2204,12782218643051943376,17022591130695148395,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2280 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2204,12782218643051943376,17022591130695148395,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2532 /prefetch:82⤵PID:460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,12782218643051943376,17022591130695148395,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3152 /prefetch:12⤵PID:1972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,12782218643051943376,17022591130695148395,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3180 /prefetch:12⤵PID:1472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,12782218643051943376,17022591130695148395,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4676 /prefetch:12⤵PID:636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,12782218643051943376,17022591130695148395,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4688 /prefetch:12⤵PID:5052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,12782218643051943376,17022591130695148395,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5232 /prefetch:12⤵PID:3780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,12782218643051943376,17022591130695148395,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4792 /prefetch:12⤵PID:4460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2204,12782218643051943376,17022591130695148395,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5692 /prefetch:82⤵PID:3244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2204,12782218643051943376,17022591130695148395,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5692 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,12782218643051943376,17022591130695148395,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2268 /prefetch:12⤵PID:4884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,12782218643051943376,17022591130695148395,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5752 /prefetch:12⤵PID:1188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,12782218643051943376,17022591130695148395,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4032 /prefetch:12⤵PID:4800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,12782218643051943376,17022591130695148395,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6112 /prefetch:12⤵PID:2548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2204,12782218643051943376,17022591130695148395,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4508 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4504
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3500
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2344
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4724
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556641592f6e69f5f5fb06f2319384490
SHA16a86be42e2c6d26b7830ad9f4e2627995fd91069
SHA25602d4984e590e947265474d592e64edde840fdca7eb881eebde3e220a1d883455
SHA512c75e689b2bbbe07ebf72baf75c56f19c39f45d5593cf47535eb722f95002b3ee418027047c0ee8d63800f499038db5e2c24aff9705d830c7b6eaa290d9adc868
-
Filesize
152B
MD5612a6c4247ef652299b376221c984213
SHA1d306f3b16bde39708aa862aee372345feb559750
SHA2569d8e24c91cff338e56b518a533cb2e49a2803356bbf6e04892fb168a7ce2844a
SHA51234a14d63abb1e3fe0f9927a94393043d458fe0624843e108d290266f554018e6379cba924cb5388735abdd6c5f1e2e318478a673f3f9b762815a758866d10973
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize336B
MD59a83708b801a3aeea014792f87648c89
SHA1db4a6eef52149e540145354172bb531762597be3
SHA256489142f4a5a238d3d5ea814307f6754a986c11cb5bd0e3d1143e9f8037deadc9
SHA512f43f9887e27f0e7a6faaf70d9010e35d56fcf67662369e10f241712bae061d0c7f282036e1df9efc3887ed7004d032c2faefb8c5d0b0fc9e74a260250ddeeedb
-
Filesize
2KB
MD512b618cbf5c084e07b4cd2a3bdccf293
SHA1829ff030be0455e18d9ca40ff78a7c36d6ef1f9f
SHA2564b5e6c68f84cc32db32d0753ff12bc0458b63f91e9a7022b959ac80a52a5b024
SHA512935d223292e6c263ebefe87e8e94517eef080fd1cbaca5e57b7f670b8841ee219c8b297fe1735b0f0b6019fa89796a298247d3d88f0bc63e9db07006704e1ba3
-
Filesize
2KB
MD529fb9d4041c16b8b8706f7aa452fa454
SHA1c67937a4ad6aab32c6e88f95a4a9a3029d623f0c
SHA256deb35d12a567c8836e1e13048e71c5ee3d9078115a642339d012cde295a13dba
SHA51267ab15ee9119d72941768467b1c7e46e6eafa63e6c67ddf9d54c489482951805e70231c79478462fe25b1d8261faafa2318a5b3d55e2fa7e07151109986dc0a9
-
Filesize
7KB
MD54b0e9976e51583557b94dda2214fa4a8
SHA1b326433ce0f05a40f3efb6c08cedf0955b3f2856
SHA25620fdc541bac023beed82662d94ba7622b4a6efd99d9319c5b635f7ed702b3293
SHA51224ad28f162b7d93824a3625c3212f1ff9e23daf3b11ed88d7decb939b6b7faea7ce12500c2a141261049ab45cc7ae762cdbdb166d8a15ab41fec46bf273558a8
-
Filesize
5KB
MD55abdaa3e764d29e9836fb7498c8f3cdc
SHA11bf9d8c52bd1ddc4fc4b14c6fd4c53e518b54daf
SHA256c152be14a2e9ff7631837ac72db832b8912385cc2a53a857d72275aeb1f72299
SHA512c5faeea60074447cd1bd9f264e7e62ba3f09f503fbaf61f3f42f7384309a9e9f0fd1556a1e91dafba3e1ccd0a9c123b5f8cab83a6af61e19db6aefc903b708d2
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD579d82706eecad47869e3c3666181365f
SHA1b94b412af54606152db12013de08dc92e9b3a52f
SHA256c3fb7f63b5c74d6b417502c7761be4eccff044a10f1419b510b837184f40a089
SHA512d78a07902c0a6b15ec8d6332a57745970fb19d4c2aa3d829dd93a24385a6e1f3c3dcb45c7720b0f3206a8f1849e42ac92a811b48603125c8fc1143333ddffe04