Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
03-06-2024 06:48
Static task
static1
Behavioral task
behavioral1
Sample
90e0c6a99dc554b15cda9652ede27afa_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
90e0c6a99dc554b15cda9652ede27afa_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
90e0c6a99dc554b15cda9652ede27afa_JaffaCakes118.html
-
Size
84KB
-
MD5
90e0c6a99dc554b15cda9652ede27afa
-
SHA1
85a5c4aa3ec03fff3f2497081b14d0c11caa2469
-
SHA256
b24a677e6e4834ffe8f0ec57acca00aaa9aaed809bab758a1287aa9bcdfef864
-
SHA512
f8ab281a2fee913762a87ac025ca2dd3fa00d0ad1cda7daf970bd1cfd807317ce68ce9c5669a9d00609b199cdb6f4da0be436245f77fe9f7ce4826e8b6b2420f
-
SSDEEP
1536:TIMLvVKmSJkXg6UdreY3XjKciKHX9JPOiqtN5kNEnCMO3Zt:TzLvK6Uf3zxi4JAtr2MO3Zt
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2108 msedge.exe 2108 msedge.exe 1924 msedge.exe 1924 msedge.exe 3588 identity_helper.exe 3588 identity_helper.exe 840 msedge.exe 840 msedge.exe 840 msedge.exe 840 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1924 wrote to memory of 3368 1924 msedge.exe 82 PID 1924 wrote to memory of 3368 1924 msedge.exe 82 PID 1924 wrote to memory of 540 1924 msedge.exe 83 PID 1924 wrote to memory of 540 1924 msedge.exe 83 PID 1924 wrote to memory of 540 1924 msedge.exe 83 PID 1924 wrote to memory of 540 1924 msedge.exe 83 PID 1924 wrote to memory of 540 1924 msedge.exe 83 PID 1924 wrote to memory of 540 1924 msedge.exe 83 PID 1924 wrote to memory of 540 1924 msedge.exe 83 PID 1924 wrote to memory of 540 1924 msedge.exe 83 PID 1924 wrote to memory of 540 1924 msedge.exe 83 PID 1924 wrote to memory of 540 1924 msedge.exe 83 PID 1924 wrote to memory of 540 1924 msedge.exe 83 PID 1924 wrote to memory of 540 1924 msedge.exe 83 PID 1924 wrote to memory of 540 1924 msedge.exe 83 PID 1924 wrote to memory of 540 1924 msedge.exe 83 PID 1924 wrote to memory of 540 1924 msedge.exe 83 PID 1924 wrote to memory of 540 1924 msedge.exe 83 PID 1924 wrote to memory of 540 1924 msedge.exe 83 PID 1924 wrote to memory of 540 1924 msedge.exe 83 PID 1924 wrote to memory of 540 1924 msedge.exe 83 PID 1924 wrote to memory of 540 1924 msedge.exe 83 PID 1924 wrote to memory of 540 1924 msedge.exe 83 PID 1924 wrote to memory of 540 1924 msedge.exe 83 PID 1924 wrote to memory of 540 1924 msedge.exe 83 PID 1924 wrote to memory of 540 1924 msedge.exe 83 PID 1924 wrote to memory of 540 1924 msedge.exe 83 PID 1924 wrote to memory of 540 1924 msedge.exe 83 PID 1924 wrote to memory of 540 1924 msedge.exe 83 PID 1924 wrote to memory of 540 1924 msedge.exe 83 PID 1924 wrote to memory of 540 1924 msedge.exe 83 PID 1924 wrote to memory of 540 1924 msedge.exe 83 PID 1924 wrote to memory of 540 1924 msedge.exe 83 PID 1924 wrote to memory of 540 1924 msedge.exe 83 PID 1924 wrote to memory of 540 1924 msedge.exe 83 PID 1924 wrote to memory of 540 1924 msedge.exe 83 PID 1924 wrote to memory of 540 1924 msedge.exe 83 PID 1924 wrote to memory of 540 1924 msedge.exe 83 PID 1924 wrote to memory of 540 1924 msedge.exe 83 PID 1924 wrote to memory of 540 1924 msedge.exe 83 PID 1924 wrote to memory of 540 1924 msedge.exe 83 PID 1924 wrote to memory of 540 1924 msedge.exe 83 PID 1924 wrote to memory of 2108 1924 msedge.exe 84 PID 1924 wrote to memory of 2108 1924 msedge.exe 84 PID 1924 wrote to memory of 1992 1924 msedge.exe 85 PID 1924 wrote to memory of 1992 1924 msedge.exe 85 PID 1924 wrote to memory of 1992 1924 msedge.exe 85 PID 1924 wrote to memory of 1992 1924 msedge.exe 85 PID 1924 wrote to memory of 1992 1924 msedge.exe 85 PID 1924 wrote to memory of 1992 1924 msedge.exe 85 PID 1924 wrote to memory of 1992 1924 msedge.exe 85 PID 1924 wrote to memory of 1992 1924 msedge.exe 85 PID 1924 wrote to memory of 1992 1924 msedge.exe 85 PID 1924 wrote to memory of 1992 1924 msedge.exe 85 PID 1924 wrote to memory of 1992 1924 msedge.exe 85 PID 1924 wrote to memory of 1992 1924 msedge.exe 85 PID 1924 wrote to memory of 1992 1924 msedge.exe 85 PID 1924 wrote to memory of 1992 1924 msedge.exe 85 PID 1924 wrote to memory of 1992 1924 msedge.exe 85 PID 1924 wrote to memory of 1992 1924 msedge.exe 85 PID 1924 wrote to memory of 1992 1924 msedge.exe 85 PID 1924 wrote to memory of 1992 1924 msedge.exe 85 PID 1924 wrote to memory of 1992 1924 msedge.exe 85 PID 1924 wrote to memory of 1992 1924 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\90e0c6a99dc554b15cda9652ede27afa_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe344246f8,0x7ffe34424708,0x7ffe344247182⤵PID:3368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,2371705982824978853,1002200214960106641,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2168 /prefetch:22⤵PID:540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2072,2371705982824978853,1002200214960106641,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2276 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2072,2371705982824978853,1002200214960106641,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2800 /prefetch:82⤵PID:1992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,2371705982824978853,1002200214960106641,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:2880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,2371705982824978853,1002200214960106641,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3352 /prefetch:12⤵PID:384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,2371705982824978853,1002200214960106641,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4756 /prefetch:12⤵PID:3740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,2371705982824978853,1002200214960106641,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5248 /prefetch:12⤵PID:452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,2371705982824978853,1002200214960106641,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5364 /prefetch:12⤵PID:3236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,2371705982824978853,1002200214960106641,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5664 /prefetch:12⤵PID:4744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,2371705982824978853,1002200214960106641,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1828 /prefetch:12⤵PID:4028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,2371705982824978853,1002200214960106641,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2140 /prefetch:12⤵PID:5000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,2371705982824978853,1002200214960106641,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6280 /prefetch:82⤵PID:3000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,2371705982824978853,1002200214960106641,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6280 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,2371705982824978853,1002200214960106641,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4860 /prefetch:12⤵PID:1908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,2371705982824978853,1002200214960106641,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4100 /prefetch:12⤵PID:4396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,2371705982824978853,1002200214960106641,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5292 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:840
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:556
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4824
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD5520574a08a332f50254a45305b9805f8
SHA1b29036e0edca42a51f2fb6c5ee7b1a96ac69cf4a
SHA256eeead524f6e05ad278dba256d378687c96f72e9a1407e1cfcfabdadc9275274c
SHA51281c3ac37be6fbac0b0e8ae03684f7a7016467bac125c27b97cb6b9fb7978f29e21bc8100853fb6657e21f07285ffd4023e52ef82062a2e7ec2acd6ade7a2fddb
-
Filesize
152B
MD5537815e7cc5c694912ac0308147852e4
SHA12ccdd9d9dc637db5462fe8119c0df261146c363c
SHA256b4b69d099507d88abdeff4835e06cc6711e1c47464c963d013cef0a278e52d4f
SHA51263969a69af057235dbdecddc483ef5ce0058673179a3580c5aa12938c9501513cdb72dd703a06fa7d4fc08d074f17528283338c795334398497c771ecbd1350a
-
Filesize
152B
MD58b167567021ccb1a9fdf073fa9112ef0
SHA13baf293fbfaa7c1e7cdacb5f2975737f4ef69898
SHA25626764cedf35f118b55f30b3a36e0693f9f38290a5b2b6b8b83a00e990ae18513
SHA512726098001ef1acf1dd154a658752fa27dea32bca8fbb66395c142cb666102e71632adbad1b7e2f717071cd3e3af3867471932a71707f2ae97b989f4be468ab54
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD594016ac1d3017b8a436448b8864e0ce3
SHA1ad7049a018c33963334cf99ae58cc0bb85d99dc2
SHA256439df535180a0d8b30443c62ffd3587ccef2e2ea09320fd0f6442ef3d3dea363
SHA512dee7123fbf1eedf5930b05d0ec543846a28eb51511caa9cb4b1f22d96499ba45a5a62f9a29095a55d34d8892eb4af760f702838e42b2ec3a3864ac0606355eee
-
Filesize
1KB
MD5499e97aee9bc5e820f564530aebc8851
SHA1326558bc31e48c88386059ba83ee4633e36d2e64
SHA2562caaa1ebec0934ebc5b37d8316ea7be5afadb2c39a97e012b411da2eb751628e
SHA512ba8877c916676717303de987b2f56bacf24f24c69a79cb7b20e168a185ad10ebffc80a495860f3970b5a05cc96caa36270a0c2d1919e3fb92344090a55b6198d
-
Filesize
5KB
MD511416ffad8a3f395d29d43f816d6539f
SHA128445f79cbd504b4917a752d4a7ff008bc04dfef
SHA25658ceb7d0b04c86be37efc73ea242b5ffd35ed620ccf0313e4cdd5e556765f98a
SHA512c6880ab586be880e9c583df79da9e67a4b880fa0fee0c1fd411b5c4133376a813b03eecc662a647ca4ec46ca043d075debce26a5a0fbb260138a45bfa1de847f
-
Filesize
7KB
MD5007ccc10371bf53beca293398fdc8b2a
SHA12e87d399238837b910da90bdd0ef2117053bb856
SHA2562df7dfddde2396a7437471e28607032d9092fe32dd38f8bb005d5ca3da8600b5
SHA51211882e3f1cd5671babdd7bb7e941d3efd94d0c167fe4768c5e7803779a09fac9685c27c1f907588059a92410fa0e5dc39dc06fa0abc5855f02f60f8598feeb12
-
Filesize
7KB
MD53b85cd20c6917cbb05b407063913d46c
SHA1df90a401c644bfd79bd917a9be243347c82156f4
SHA256eb6cbfaec32eda729fa11b6e1ffdaeb0c4965602b0e17839c50d3122b181f5f6
SHA512c0e88b97fe366f14aa320f490f13cd3b5984862c99bbb78c31f4fc1369f0edca4f36a50307061d92b1cf25b8d5a0cc7b69188f57576215ddcb1c17e846434ab9
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389