Analysis
-
max time kernel
145s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
03/06/2024, 09:02
Static task
static1
Behavioral task
behavioral1
Sample
9136f0e1bda9247c4a6128e2a5f1acd3_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
9136f0e1bda9247c4a6128e2a5f1acd3_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
9136f0e1bda9247c4a6128e2a5f1acd3_JaffaCakes118.html
-
Size
21KB
-
MD5
9136f0e1bda9247c4a6128e2a5f1acd3
-
SHA1
2c7d55aa4090b441046c752518e2d6f5ff37b013
-
SHA256
4b95b591edb76ab8a87ff49ebe99d4037fa6e7964591faa13aa03f86865df9db
-
SHA512
dea64c5958fed057e99f5d1bf9b01a5c0dae7612716b88555b69181414f3541240e684e256b7bb171268b407c6f561e9ec7801a0cbca04cfe8cb282d290753b5
-
SSDEEP
384:SwxdcxnJFf3/TlKwuYKvAIqsPMrNHDryWy5sR1GRgJyyBau4QxgHjg6/cuJl:Sb7nSAZsWFvqQ5aKS/cml
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3484 msedge.exe 3484 msedge.exe 3748 msedge.exe 3748 msedge.exe 4088 identity_helper.exe 4088 identity_helper.exe 2252 msedge.exe 2252 msedge.exe 2252 msedge.exe 2252 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe 3748 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3748 wrote to memory of 1292 3748 msedge.exe 81 PID 3748 wrote to memory of 1292 3748 msedge.exe 81 PID 3748 wrote to memory of 2372 3748 msedge.exe 82 PID 3748 wrote to memory of 2372 3748 msedge.exe 82 PID 3748 wrote to memory of 2372 3748 msedge.exe 82 PID 3748 wrote to memory of 2372 3748 msedge.exe 82 PID 3748 wrote to memory of 2372 3748 msedge.exe 82 PID 3748 wrote to memory of 2372 3748 msedge.exe 82 PID 3748 wrote to memory of 2372 3748 msedge.exe 82 PID 3748 wrote to memory of 2372 3748 msedge.exe 82 PID 3748 wrote to memory of 2372 3748 msedge.exe 82 PID 3748 wrote to memory of 2372 3748 msedge.exe 82 PID 3748 wrote to memory of 2372 3748 msedge.exe 82 PID 3748 wrote to memory of 2372 3748 msedge.exe 82 PID 3748 wrote to memory of 2372 3748 msedge.exe 82 PID 3748 wrote to memory of 2372 3748 msedge.exe 82 PID 3748 wrote to memory of 2372 3748 msedge.exe 82 PID 3748 wrote to memory of 2372 3748 msedge.exe 82 PID 3748 wrote to memory of 2372 3748 msedge.exe 82 PID 3748 wrote to memory of 2372 3748 msedge.exe 82 PID 3748 wrote to memory of 2372 3748 msedge.exe 82 PID 3748 wrote to memory of 2372 3748 msedge.exe 82 PID 3748 wrote to memory of 2372 3748 msedge.exe 82 PID 3748 wrote to memory of 2372 3748 msedge.exe 82 PID 3748 wrote to memory of 2372 3748 msedge.exe 82 PID 3748 wrote to memory of 2372 3748 msedge.exe 82 PID 3748 wrote to memory of 2372 3748 msedge.exe 82 PID 3748 wrote to memory of 2372 3748 msedge.exe 82 PID 3748 wrote to memory of 2372 3748 msedge.exe 82 PID 3748 wrote to memory of 2372 3748 msedge.exe 82 PID 3748 wrote to memory of 2372 3748 msedge.exe 82 PID 3748 wrote to memory of 2372 3748 msedge.exe 82 PID 3748 wrote to memory of 2372 3748 msedge.exe 82 PID 3748 wrote to memory of 2372 3748 msedge.exe 82 PID 3748 wrote to memory of 2372 3748 msedge.exe 82 PID 3748 wrote to memory of 2372 3748 msedge.exe 82 PID 3748 wrote to memory of 2372 3748 msedge.exe 82 PID 3748 wrote to memory of 2372 3748 msedge.exe 82 PID 3748 wrote to memory of 2372 3748 msedge.exe 82 PID 3748 wrote to memory of 2372 3748 msedge.exe 82 PID 3748 wrote to memory of 2372 3748 msedge.exe 82 PID 3748 wrote to memory of 2372 3748 msedge.exe 82 PID 3748 wrote to memory of 3484 3748 msedge.exe 83 PID 3748 wrote to memory of 3484 3748 msedge.exe 83 PID 3748 wrote to memory of 4388 3748 msedge.exe 84 PID 3748 wrote to memory of 4388 3748 msedge.exe 84 PID 3748 wrote to memory of 4388 3748 msedge.exe 84 PID 3748 wrote to memory of 4388 3748 msedge.exe 84 PID 3748 wrote to memory of 4388 3748 msedge.exe 84 PID 3748 wrote to memory of 4388 3748 msedge.exe 84 PID 3748 wrote to memory of 4388 3748 msedge.exe 84 PID 3748 wrote to memory of 4388 3748 msedge.exe 84 PID 3748 wrote to memory of 4388 3748 msedge.exe 84 PID 3748 wrote to memory of 4388 3748 msedge.exe 84 PID 3748 wrote to memory of 4388 3748 msedge.exe 84 PID 3748 wrote to memory of 4388 3748 msedge.exe 84 PID 3748 wrote to memory of 4388 3748 msedge.exe 84 PID 3748 wrote to memory of 4388 3748 msedge.exe 84 PID 3748 wrote to memory of 4388 3748 msedge.exe 84 PID 3748 wrote to memory of 4388 3748 msedge.exe 84 PID 3748 wrote to memory of 4388 3748 msedge.exe 84 PID 3748 wrote to memory of 4388 3748 msedge.exe 84 PID 3748 wrote to memory of 4388 3748 msedge.exe 84 PID 3748 wrote to memory of 4388 3748 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\9136f0e1bda9247c4a6128e2a5f1acd3_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3748 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc502e46f8,0x7ffc502e4708,0x7ffc502e47182⤵PID:1292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,5458305077088256100,17160223194247801006,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2064 /prefetch:22⤵PID:2372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2056,5458305077088256100,17160223194247801006,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2136 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2056,5458305077088256100,17160223194247801006,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2876 /prefetch:82⤵PID:4388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,5458305077088256100,17160223194247801006,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:60
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,5458305077088256100,17160223194247801006,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:1740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,5458305077088256100,17160223194247801006,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4612 /prefetch:12⤵PID:3636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,5458305077088256100,17160223194247801006,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4688 /prefetch:12⤵PID:3420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,5458305077088256100,17160223194247801006,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5336 /prefetch:82⤵PID:4352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,5458305077088256100,17160223194247801006,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5336 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,5458305077088256100,17160223194247801006,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5412 /prefetch:12⤵PID:1196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,5458305077088256100,17160223194247801006,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5396 /prefetch:12⤵PID:3704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,5458305077088256100,17160223194247801006,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5508 /prefetch:12⤵PID:4332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,5458305077088256100,17160223194247801006,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5496 /prefetch:12⤵PID:3088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,5458305077088256100,17160223194247801006,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2612 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2252
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4384
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3672
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2880
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5537815e7cc5c694912ac0308147852e4
SHA12ccdd9d9dc637db5462fe8119c0df261146c363c
SHA256b4b69d099507d88abdeff4835e06cc6711e1c47464c963d013cef0a278e52d4f
SHA51263969a69af057235dbdecddc483ef5ce0058673179a3580c5aa12938c9501513cdb72dd703a06fa7d4fc08d074f17528283338c795334398497c771ecbd1350a
-
Filesize
152B
MD58b167567021ccb1a9fdf073fa9112ef0
SHA13baf293fbfaa7c1e7cdacb5f2975737f4ef69898
SHA25626764cedf35f118b55f30b3a36e0693f9f38290a5b2b6b8b83a00e990ae18513
SHA512726098001ef1acf1dd154a658752fa27dea32bca8fbb66395c142cb666102e71632adbad1b7e2f717071cd3e3af3867471932a71707f2ae97b989f4be468ab54
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize192B
MD5cab31385b3e634da2a966223ec17a65a
SHA17ac27733613b1962fc95c0da85cf9800c021830b
SHA25635101d811f5a3f0360d020d0c502deddf7c6bff5a16abc5703e7800c7ea00733
SHA512a46ac274c8f6f77314d8da8afd3a1b2026ef72d121bb945aed7d2d3e09562129ed84619ebb13f10855a14e8013e739babf50b6bd80a80ed0f0b8b81d29f1b1cb
-
Filesize
1KB
MD563d4a4c00c6079e973cad86cedf49279
SHA1eefc86752ba24e3e9f3a6bf8f954d0637822ec7f
SHA2560b34c030d4cf8896f582210caf2b1c2a9cf6f53564772a9807b225638aa7392c
SHA5120c71bfebf386999e915e6924beaa07e0891776627cb55d76430bd0aa85e65859df5a18da36fa6e08e978e64e31be7d69234facf88ff7fc1f212aa495e47b589f
-
Filesize
1KB
MD527e6b55dcd86a3affb2d7e2666dd5e10
SHA1363b963b421d4b72fca02d2e86b1df6100b67712
SHA25605ce0b78bb608d5389d59f9a7bea77aa394a9a5ac58d66ff85da51bb54ebea8b
SHA512dc7e697951b43543d08addbc1f6455adbf55316176d7b0434bdc1db8db1e2896f17a02ab0613cdfede9c92e6ce967deb7028e592ae023a812b7671ddcec6df3e
-
Filesize
6KB
MD59853b54dcd49a7f3828ed54326906183
SHA1671aff58fa0a140edf7ffc152020b799687cbb6d
SHA256c8c89925ccbddfcef23793cb9b370743dda5ac516441ef0494d93f599217668c
SHA5120ede4b6db7c413ce5b6bd812967479d68db17d445afecfedbc08c4d41821d7a1b025f2adda824aac473dcc4e4d731dd0a631914d4ca4f32d57650820d5dac280
-
Filesize
5KB
MD58874681b6cc525a741e6b1c058cca181
SHA12d5798c803ef03fb16266b5fa9aba6462ce91e08
SHA256c592a15d9a989a6baec4d2707cc454178b70b44cd0ebd13d91386a2261d11d7e
SHA51282670f485dff378835be31da28e703a9af99ce112725bcaebb9808ffd34dfb7f855514ae0ec83f25b0be3f2778f872b3be0b422cf63fb40cfde7c2a0ad6f3db1
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD5b0b9222b51bb7e85b388585b91be4585
SHA11c67257a26b4275461512649679108dd47e26244
SHA256c7c60687830f061cc4b270241bd58fed25ce7200384410a9409012ab9a0f3add
SHA5128415afaf0caba02682c6789e2a635efddb0302d0a3ef1f24657ffac469f82fae0750d26a714518559f6fcbfe4b7e8ec7831301bfabeef9c3ffba5d0fc3fa00c9