Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
03/06/2024, 14:24
Static task
static1
Behavioral task
behavioral1
Sample
9219639f8fe4bf9f9b1889b1128d0082_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
9219639f8fe4bf9f9b1889b1128d0082_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
9219639f8fe4bf9f9b1889b1128d0082_JaffaCakes118.html
-
Size
62KB
-
MD5
9219639f8fe4bf9f9b1889b1128d0082
-
SHA1
ce5c8a8ebba426463399f9e2f84d453ddd07051f
-
SHA256
446c80da2ce7acc765dd32aeb6b8758d3b8a1344db80cd630a8c57a8aceb2402
-
SHA512
3ef28695619955808df4b9ab4d85373f8e55efd3486e568008cfafa957ab4fa85b9c9577718f56e71a23d94242d516ae74d89a50d90641a912ca952fdccad0df
-
SSDEEP
1536:MZVZAZ/U5ELtSZKbTVE00ghNxgefN3MU39DMglNJfXwJ0:eh5ELtDTVERgeefR9Dt+J0
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4780 msedge.exe 4780 msedge.exe 3216 msedge.exe 3216 msedge.exe 3900 identity_helper.exe 3900 identity_helper.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3216 wrote to memory of 3700 3216 msedge.exe 81 PID 3216 wrote to memory of 3700 3216 msedge.exe 81 PID 3216 wrote to memory of 1892 3216 msedge.exe 82 PID 3216 wrote to memory of 1892 3216 msedge.exe 82 PID 3216 wrote to memory of 1892 3216 msedge.exe 82 PID 3216 wrote to memory of 1892 3216 msedge.exe 82 PID 3216 wrote to memory of 1892 3216 msedge.exe 82 PID 3216 wrote to memory of 1892 3216 msedge.exe 82 PID 3216 wrote to memory of 1892 3216 msedge.exe 82 PID 3216 wrote to memory of 1892 3216 msedge.exe 82 PID 3216 wrote to memory of 1892 3216 msedge.exe 82 PID 3216 wrote to memory of 1892 3216 msedge.exe 82 PID 3216 wrote to memory of 1892 3216 msedge.exe 82 PID 3216 wrote to memory of 1892 3216 msedge.exe 82 PID 3216 wrote to memory of 1892 3216 msedge.exe 82 PID 3216 wrote to memory of 1892 3216 msedge.exe 82 PID 3216 wrote to memory of 1892 3216 msedge.exe 82 PID 3216 wrote to memory of 1892 3216 msedge.exe 82 PID 3216 wrote to memory of 1892 3216 msedge.exe 82 PID 3216 wrote to memory of 1892 3216 msedge.exe 82 PID 3216 wrote to memory of 1892 3216 msedge.exe 82 PID 3216 wrote to memory of 1892 3216 msedge.exe 82 PID 3216 wrote to memory of 1892 3216 msedge.exe 82 PID 3216 wrote to memory of 1892 3216 msedge.exe 82 PID 3216 wrote to memory of 1892 3216 msedge.exe 82 PID 3216 wrote to memory of 1892 3216 msedge.exe 82 PID 3216 wrote to memory of 1892 3216 msedge.exe 82 PID 3216 wrote to memory of 1892 3216 msedge.exe 82 PID 3216 wrote to memory of 1892 3216 msedge.exe 82 PID 3216 wrote to memory of 1892 3216 msedge.exe 82 PID 3216 wrote to memory of 1892 3216 msedge.exe 82 PID 3216 wrote to memory of 1892 3216 msedge.exe 82 PID 3216 wrote to memory of 1892 3216 msedge.exe 82 PID 3216 wrote to memory of 1892 3216 msedge.exe 82 PID 3216 wrote to memory of 1892 3216 msedge.exe 82 PID 3216 wrote to memory of 1892 3216 msedge.exe 82 PID 3216 wrote to memory of 1892 3216 msedge.exe 82 PID 3216 wrote to memory of 1892 3216 msedge.exe 82 PID 3216 wrote to memory of 1892 3216 msedge.exe 82 PID 3216 wrote to memory of 1892 3216 msedge.exe 82 PID 3216 wrote to memory of 1892 3216 msedge.exe 82 PID 3216 wrote to memory of 1892 3216 msedge.exe 82 PID 3216 wrote to memory of 4780 3216 msedge.exe 83 PID 3216 wrote to memory of 4780 3216 msedge.exe 83 PID 3216 wrote to memory of 2192 3216 msedge.exe 84 PID 3216 wrote to memory of 2192 3216 msedge.exe 84 PID 3216 wrote to memory of 2192 3216 msedge.exe 84 PID 3216 wrote to memory of 2192 3216 msedge.exe 84 PID 3216 wrote to memory of 2192 3216 msedge.exe 84 PID 3216 wrote to memory of 2192 3216 msedge.exe 84 PID 3216 wrote to memory of 2192 3216 msedge.exe 84 PID 3216 wrote to memory of 2192 3216 msedge.exe 84 PID 3216 wrote to memory of 2192 3216 msedge.exe 84 PID 3216 wrote to memory of 2192 3216 msedge.exe 84 PID 3216 wrote to memory of 2192 3216 msedge.exe 84 PID 3216 wrote to memory of 2192 3216 msedge.exe 84 PID 3216 wrote to memory of 2192 3216 msedge.exe 84 PID 3216 wrote to memory of 2192 3216 msedge.exe 84 PID 3216 wrote to memory of 2192 3216 msedge.exe 84 PID 3216 wrote to memory of 2192 3216 msedge.exe 84 PID 3216 wrote to memory of 2192 3216 msedge.exe 84 PID 3216 wrote to memory of 2192 3216 msedge.exe 84 PID 3216 wrote to memory of 2192 3216 msedge.exe 84 PID 3216 wrote to memory of 2192 3216 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\9219639f8fe4bf9f9b1889b1128d0082_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3216 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8f93d46f8,0x7ff8f93d4708,0x7ff8f93d47182⤵PID:3700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,12678759796279102963,17423215485120521221,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2064 /prefetch:22⤵PID:1892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2052,12678759796279102963,17423215485120521221,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2052,12678759796279102963,17423215485120521221,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2832 /prefetch:82⤵PID:2192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,12678759796279102963,17423215485120521221,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,12678759796279102963,17423215485120521221,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:1552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,12678759796279102963,17423215485120521221,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2752 /prefetch:12⤵PID:2896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,12678759796279102963,17423215485120521221,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3952 /prefetch:12⤵PID:4276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,12678759796279102963,17423215485120521221,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5636 /prefetch:82⤵PID:3812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,12678759796279102963,17423215485120521221,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5636 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,12678759796279102963,17423215485120521221,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5324 /prefetch:12⤵PID:1088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,12678759796279102963,17423215485120521221,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4932 /prefetch:12⤵PID:1252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,12678759796279102963,17423215485120521221,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5816 /prefetch:12⤵PID:1944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,12678759796279102963,17423215485120521221,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5848 /prefetch:12⤵PID:4640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,12678759796279102963,17423215485120521221,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4740 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1356
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:884
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5068
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ae54e9db2e89f2c54da8cc0bfcbd26bd
SHA1a88af6c673609ecbc51a1a60dfbc8577830d2b5d
SHA2565009d3c953de63cfd14a7d911156c514e179ff07d2b94382d9caac6040cb72af
SHA512e3b70e5eb7321b9deca6f6a17424a15b9fd5c4008bd3789bd01099fd13cb2f4a2f37fe4b920fb51c50517745b576c1f94df83efd1a7e75949551163985599998
-
Filesize
152B
MD5f53207a5ca2ef5c7e976cbb3cb26d870
SHA149a8cc44f53da77bb3dfb36fc7676ed54675db43
SHA25619ab4e3c9da6d9cedda7461efdba9a2085e743513ab89f1dd0fd5a8f9486ad23
SHA512be734c7e8afda19f445912aef0d78f9941add29baebd4a812bff27f10a1d78b52aeb11c551468c8644443c86e1a2a6b2e4aead3d7f81d39925e3c20406ac1499
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD5e1c87e788fc581ec587b44af3a02d02a
SHA11eaf6471af1cddc49b1113d071f478c7ebb07969
SHA256c9a0bf6eb0d301b52bff0ee06e7507a4521cc9592be6008bceccccdefb3f040c
SHA5121f21cab431bd1dbdc9d0dbf089f38a6907d2a814d471078ba331b53503efdc88df05c9affb08a7d005d3fcf69b6976b793d5f64d78562293d55f8a0bb6e8862e
-
Filesize
1KB
MD5a71b759afe4ae346ac4c1c0a94bcc036
SHA1ca35753050924b7b28f04afff27d7d9b8c21b459
SHA256f382fb44fccf672ed302d5e24297906661c1d3e7658a42eeb76251d7bea0fd4c
SHA512344cc38c56c1a913a114d714d6f9a3c9bbc29d9e8f23ad6555f6e1e69581fa38c199d8db211449830bf88af5d66c6ac044e6688c8b6b055d6e0313e67ad1b47f
-
Filesize
1KB
MD556ba5a4e75ce3b73a2c85b9ec3b9e1f8
SHA1321b12fe09c4c99368c6457850a315ad27c5b47c
SHA256bc21600685e43dad4bff03137276ba687a82d3d72a95111fa9e7a0e67497235a
SHA512bc8b43237f1a5b573acd105784a9187261175e3a9f0deb3f9d122ac57888b1b64855d2e2ef00c82028b5a84b96ac65a285bbf9101dd32f44e607da55b687910d
-
Filesize
5KB
MD56570e001d0637109c92f553aa9c83f3e
SHA13e14b4b1151523a4c2c1f191154bf04a5aa8afa6
SHA2565f83a5150bb96b887a1689d6533c5447476c9edc8b6024fbba2ad691123d6288
SHA512d54f31fa89982399290a4b97f17036f5b2a52320231d2bc40dd51f08b7971502efcd035f4f3295556ae355b63631b1f9a87a3fe75a05aa35f5b1993e270ab16f
-
Filesize
6KB
MD5b6f2b998d316d754de29c7a9c1681cd2
SHA15efeb3a05a2a09c115caaf5f8091be8dd31dd6e7
SHA256f07f77ffa8c70f24144bd6dc02b85af330ff9bfd5c535b2641ab4b4cd0581494
SHA512595fac5c643ec7d8eb2d975fc8d58ce5567035876c0e0c947c186dca32207ac15c910ffb5e8bad07193e4bf01c36db02ec2db9793c2eb1bc3a2d55bc7df74a92
-
Filesize
372B
MD531966069431394410a2d668f88ad3fd3
SHA1c23038b645925bfdf919d94ee1534212a096bfe3
SHA2568f00cb42265a91570d60add2885316b70fb113125e87aafa1fa702695b673059
SHA512c11884e868e88c30b86b511b5882d6e2f17b5ed479bdf511342b1a614cce764ae58b25941e9eed8a36d0faabf9705d66a5e04376303cee2ff513cb69adf0afb5
-
Filesize
204B
MD566e8e67f21ac3b32a6c8ee8cd3e9aa61
SHA13048ecc530b0fa5a7d09fccc123ae4854c21695b
SHA256dbba7e6402eb08dd195fd62da4f2cee6adfdd70d0068f8fe8d1b1dbd67392031
SHA5129dc32c3926ff0e0e463c722057ca96e3646b39046b71f16b9022e47b61051aaeb767469f1dc56b2dba8d92906c3a484980ac8da057bfd88550acc1a7a23e7fd1
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5f717cd58ce25a6ad32a6c7052c06b7cc
SHA11ff93a32691a5305659a3da7d0f8fbe09d4c1515
SHA256baab63eefc57ce06ad8de86501f3b485a17f0957df8c9e4dd682d7fd46f76a5e
SHA512fe7298cd0cd612c08045c3538593ee32c3e3e0a157e165655a39c570519a6f884e9616c27247d30871d19825a8621ca00ce421c4d7c599fc598371aca0362be7