Analysis
-
max time kernel
148s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
03/06/2024, 14:56
Static task
static1
Behavioral task
behavioral1
Sample
922f58e958e765c21837398f0a7610d6_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
922f58e958e765c21837398f0a7610d6_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
922f58e958e765c21837398f0a7610d6_JaffaCakes118.html
-
Size
111KB
-
MD5
922f58e958e765c21837398f0a7610d6
-
SHA1
99b8f35a694a0394b9c19c9c99375460158fc3b9
-
SHA256
3a325afaf0708bcb2be5c62bbf97be24208691b4fcccf79922ed435c5532d7b7
-
SHA512
c062e7c91111de27ad981b02208f2bc69821830b562037d883abf7c8d022f0ba0af2c07ec431da71f7706f39d9b3c95991313214978b47b56a7508bf77cd830c
-
SSDEEP
1536:n9rkAbAGYFQrWI/oqWoIliw9D3WY8aSgRTp5MmBmGTWPHEfPN5:VAaWohw9D3gaJtbMv8WPHe5
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1392 msedge.exe 1392 msedge.exe 1032 msedge.exe 1032 msedge.exe 4868 identity_helper.exe 4868 identity_helper.exe 948 msedge.exe 948 msedge.exe 948 msedge.exe 948 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1032 wrote to memory of 2728 1032 msedge.exe 81 PID 1032 wrote to memory of 2728 1032 msedge.exe 81 PID 1032 wrote to memory of 976 1032 msedge.exe 82 PID 1032 wrote to memory of 976 1032 msedge.exe 82 PID 1032 wrote to memory of 976 1032 msedge.exe 82 PID 1032 wrote to memory of 976 1032 msedge.exe 82 PID 1032 wrote to memory of 976 1032 msedge.exe 82 PID 1032 wrote to memory of 976 1032 msedge.exe 82 PID 1032 wrote to memory of 976 1032 msedge.exe 82 PID 1032 wrote to memory of 976 1032 msedge.exe 82 PID 1032 wrote to memory of 976 1032 msedge.exe 82 PID 1032 wrote to memory of 976 1032 msedge.exe 82 PID 1032 wrote to memory of 976 1032 msedge.exe 82 PID 1032 wrote to memory of 976 1032 msedge.exe 82 PID 1032 wrote to memory of 976 1032 msedge.exe 82 PID 1032 wrote to memory of 976 1032 msedge.exe 82 PID 1032 wrote to memory of 976 1032 msedge.exe 82 PID 1032 wrote to memory of 976 1032 msedge.exe 82 PID 1032 wrote to memory of 976 1032 msedge.exe 82 PID 1032 wrote to memory of 976 1032 msedge.exe 82 PID 1032 wrote to memory of 976 1032 msedge.exe 82 PID 1032 wrote to memory of 976 1032 msedge.exe 82 PID 1032 wrote to memory of 976 1032 msedge.exe 82 PID 1032 wrote to memory of 976 1032 msedge.exe 82 PID 1032 wrote to memory of 976 1032 msedge.exe 82 PID 1032 wrote to memory of 976 1032 msedge.exe 82 PID 1032 wrote to memory of 976 1032 msedge.exe 82 PID 1032 wrote to memory of 976 1032 msedge.exe 82 PID 1032 wrote to memory of 976 1032 msedge.exe 82 PID 1032 wrote to memory of 976 1032 msedge.exe 82 PID 1032 wrote to memory of 976 1032 msedge.exe 82 PID 1032 wrote to memory of 976 1032 msedge.exe 82 PID 1032 wrote to memory of 976 1032 msedge.exe 82 PID 1032 wrote to memory of 976 1032 msedge.exe 82 PID 1032 wrote to memory of 976 1032 msedge.exe 82 PID 1032 wrote to memory of 976 1032 msedge.exe 82 PID 1032 wrote to memory of 976 1032 msedge.exe 82 PID 1032 wrote to memory of 976 1032 msedge.exe 82 PID 1032 wrote to memory of 976 1032 msedge.exe 82 PID 1032 wrote to memory of 976 1032 msedge.exe 82 PID 1032 wrote to memory of 976 1032 msedge.exe 82 PID 1032 wrote to memory of 976 1032 msedge.exe 82 PID 1032 wrote to memory of 1392 1032 msedge.exe 83 PID 1032 wrote to memory of 1392 1032 msedge.exe 83 PID 1032 wrote to memory of 1908 1032 msedge.exe 84 PID 1032 wrote to memory of 1908 1032 msedge.exe 84 PID 1032 wrote to memory of 1908 1032 msedge.exe 84 PID 1032 wrote to memory of 1908 1032 msedge.exe 84 PID 1032 wrote to memory of 1908 1032 msedge.exe 84 PID 1032 wrote to memory of 1908 1032 msedge.exe 84 PID 1032 wrote to memory of 1908 1032 msedge.exe 84 PID 1032 wrote to memory of 1908 1032 msedge.exe 84 PID 1032 wrote to memory of 1908 1032 msedge.exe 84 PID 1032 wrote to memory of 1908 1032 msedge.exe 84 PID 1032 wrote to memory of 1908 1032 msedge.exe 84 PID 1032 wrote to memory of 1908 1032 msedge.exe 84 PID 1032 wrote to memory of 1908 1032 msedge.exe 84 PID 1032 wrote to memory of 1908 1032 msedge.exe 84 PID 1032 wrote to memory of 1908 1032 msedge.exe 84 PID 1032 wrote to memory of 1908 1032 msedge.exe 84 PID 1032 wrote to memory of 1908 1032 msedge.exe 84 PID 1032 wrote to memory of 1908 1032 msedge.exe 84 PID 1032 wrote to memory of 1908 1032 msedge.exe 84 PID 1032 wrote to memory of 1908 1032 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\922f58e958e765c21837398f0a7610d6_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffeec7246f8,0x7ffeec724708,0x7ffeec7247182⤵PID:2728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,13920098185417479919,13670162416568849053,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2060 /prefetch:22⤵PID:976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,13920098185417479919,13670162416568849053,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,13920098185417479919,13670162416568849053,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2740 /prefetch:82⤵PID:1908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,13920098185417479919,13670162416568849053,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:3600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,13920098185417479919,13670162416568849053,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:3316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,13920098185417479919,13670162416568849053,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4692 /prefetch:12⤵PID:3536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,13920098185417479919,13670162416568849053,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4896 /prefetch:12⤵PID:4032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,13920098185417479919,13670162416568849053,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1720 /prefetch:12⤵PID:2260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,13920098185417479919,13670162416568849053,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5328 /prefetch:12⤵PID:2100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,13920098185417479919,13670162416568849053,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5332 /prefetch:82⤵PID:400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,13920098185417479919,13670162416568849053,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5332 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,13920098185417479919,13670162416568849053,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5988 /prefetch:12⤵PID:1604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,13920098185417479919,13670162416568849053,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5096 /prefetch:12⤵PID:728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,13920098185417479919,13670162416568849053,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5292 /prefetch:12⤵PID:3400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,13920098185417479919,13670162416568849053,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5884 /prefetch:12⤵PID:1040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,13920098185417479919,13670162416568849053,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5228 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:948
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3668
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:368
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5537815e7cc5c694912ac0308147852e4
SHA12ccdd9d9dc637db5462fe8119c0df261146c363c
SHA256b4b69d099507d88abdeff4835e06cc6711e1c47464c963d013cef0a278e52d4f
SHA51263969a69af057235dbdecddc483ef5ce0058673179a3580c5aa12938c9501513cdb72dd703a06fa7d4fc08d074f17528283338c795334398497c771ecbd1350a
-
Filesize
152B
MD58b167567021ccb1a9fdf073fa9112ef0
SHA13baf293fbfaa7c1e7cdacb5f2975737f4ef69898
SHA25626764cedf35f118b55f30b3a36e0693f9f38290a5b2b6b8b83a00e990ae18513
SHA512726098001ef1acf1dd154a658752fa27dea32bca8fbb66395c142cb666102e71632adbad1b7e2f717071cd3e3af3867471932a71707f2ae97b989f4be468ab54
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD54b3cd855e28051f77bb6fd858395a3d4
SHA1943bf85daf80af177990c046498802a576c94bd3
SHA25620c181959e9e05aa2cc658a943c7a1ed5bb3dfdcdd83762eb63fd9940ef7f115
SHA5124c9041fc9110293025baae7a5accb4bb9dc4ee6f973cacdb8de52faf034b004ecc9eed9fcab5f2bc9b0a0d0f84d0649b56a09e3e14bd77747e69e7ea0dbbee4b
-
Filesize
1KB
MD5317d090576a3b17f76340a66168795b0
SHA151d50348095f8f2c3b6f94ad5f18eee0c70271e2
SHA25697db5b08c0eebf8625810fe1d2b11490874bd2a8e4a89590a0259cfee1779ff1
SHA512bbd077b0caca37b42a68fafa000b3283af5bf8548e3f3ceb763336a984ce6149902c5a78ac32297cb272e9dd5b2c58079dc63ff63c86c8742fa82f87ab3aa1a0
-
Filesize
5KB
MD59a28b30bd83a112e674cc0616b88ad23
SHA1f766d8e641d77396b4e4e9dc6162275416c4ac1d
SHA256a13c6f2f4283bf244efc975e9c4a4d2f6285a1a61e948adef66d50a165f705f9
SHA5126eb7e209f354b0d662a7d3eb552b4e0ace585dd773e686bda717a0f1fa48e22c33631700f871c562f72c248da141281ac78eee8e81c561477ee7ab30825b084a
-
Filesize
6KB
MD57d13e6b4911046b730bef4c023d97cf8
SHA110cef769b7529ce722acf3b484b2b8c144e03489
SHA256706d2874ac8726bc62da68f4d571e129f5627e0c0a18328221957b70b8ad8c82
SHA51294c3246c7e785853a5879d406d6d19668472bb8c2ef9a80b3883cfb4851e30bf6afbc146efc498e32653afa8f56d1f31a0a1272f2a26fa01eff9985443a99247
-
Filesize
6KB
MD5b4e02470f8dff422fcabb2e46d332d83
SHA1c38398d29f0c42f4849e434a119c5f26e7077f4d
SHA25621f6603cd9c54af22d51f2ce8df0862898ff0b0f37171465ee85d4552fb5a474
SHA512ad470643f76d0c4b44eed544ec9444d2f3fe6c3b9f766b503ee99e413585ae21b13f9811fb879c308bdf92f76f6cfea9a74cf9341d979498ef326aeb77a6cf3e
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5d8ad2f50cae776d66c996063dc25cca7
SHA1604569fe694c4a7c3a7f98d589847ee98fc08727
SHA2563f31c0e0fabd308983f406674d81fbc1e3dc9755bbc9c00c5b0e83465b85470a
SHA5129178a883d20e3b84d553ea70e6e89e9ca3bf7195c30e3b09c8a08a21c4f7fdffd38495ea4953921ca7d4c4aac33720eb2896eb318e5c14989bb29fa6e9628ce6