Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
04/06/2024, 08:20
Static task
static1
Behavioral task
behavioral1
Sample
942461d821c34cf046628244bcc236d0_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
942461d821c34cf046628244bcc236d0_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
942461d821c34cf046628244bcc236d0_JaffaCakes118.html
-
Size
68KB
-
MD5
942461d821c34cf046628244bcc236d0
-
SHA1
4583f7e8d30fdb7e441a3b76b03e485c44d968fe
-
SHA256
63f04c78406a916ecddf6b976671933c197e92219c56976e9fdedeb70edc9753
-
SHA512
a50826a9cf8513a9dcd3861b9c935de8aab0a9ec84e80038b254ceaae0fb3dc17645a4346f729475ef0f94cc8d08ff810a09d3ecbd220608920290ecd316dc92
-
SSDEEP
768:JiFgcMiR3sI2PDDnX0g6/tuA4MAoTyv1wCZkoTyMdtbBnfBgN8/lboi2hcpQFVGo:Jbwr42TcNen0tbrga94hcuNnQC
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3148 msedge.exe 3148 msedge.exe 4336 msedge.exe 4336 msedge.exe 3384 identity_helper.exe 3384 identity_helper.exe 5624 msedge.exe 5624 msedge.exe 5624 msedge.exe 5624 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe 4336 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4336 wrote to memory of 3752 4336 msedge.exe 83 PID 4336 wrote to memory of 3752 4336 msedge.exe 83 PID 4336 wrote to memory of 1440 4336 msedge.exe 84 PID 4336 wrote to memory of 1440 4336 msedge.exe 84 PID 4336 wrote to memory of 1440 4336 msedge.exe 84 PID 4336 wrote to memory of 1440 4336 msedge.exe 84 PID 4336 wrote to memory of 1440 4336 msedge.exe 84 PID 4336 wrote to memory of 1440 4336 msedge.exe 84 PID 4336 wrote to memory of 1440 4336 msedge.exe 84 PID 4336 wrote to memory of 1440 4336 msedge.exe 84 PID 4336 wrote to memory of 1440 4336 msedge.exe 84 PID 4336 wrote to memory of 1440 4336 msedge.exe 84 PID 4336 wrote to memory of 1440 4336 msedge.exe 84 PID 4336 wrote to memory of 1440 4336 msedge.exe 84 PID 4336 wrote to memory of 1440 4336 msedge.exe 84 PID 4336 wrote to memory of 1440 4336 msedge.exe 84 PID 4336 wrote to memory of 1440 4336 msedge.exe 84 PID 4336 wrote to memory of 1440 4336 msedge.exe 84 PID 4336 wrote to memory of 1440 4336 msedge.exe 84 PID 4336 wrote to memory of 1440 4336 msedge.exe 84 PID 4336 wrote to memory of 1440 4336 msedge.exe 84 PID 4336 wrote to memory of 1440 4336 msedge.exe 84 PID 4336 wrote to memory of 1440 4336 msedge.exe 84 PID 4336 wrote to memory of 1440 4336 msedge.exe 84 PID 4336 wrote to memory of 1440 4336 msedge.exe 84 PID 4336 wrote to memory of 1440 4336 msedge.exe 84 PID 4336 wrote to memory of 1440 4336 msedge.exe 84 PID 4336 wrote to memory of 1440 4336 msedge.exe 84 PID 4336 wrote to memory of 1440 4336 msedge.exe 84 PID 4336 wrote to memory of 1440 4336 msedge.exe 84 PID 4336 wrote to memory of 1440 4336 msedge.exe 84 PID 4336 wrote to memory of 1440 4336 msedge.exe 84 PID 4336 wrote to memory of 1440 4336 msedge.exe 84 PID 4336 wrote to memory of 1440 4336 msedge.exe 84 PID 4336 wrote to memory of 1440 4336 msedge.exe 84 PID 4336 wrote to memory of 1440 4336 msedge.exe 84 PID 4336 wrote to memory of 1440 4336 msedge.exe 84 PID 4336 wrote to memory of 1440 4336 msedge.exe 84 PID 4336 wrote to memory of 1440 4336 msedge.exe 84 PID 4336 wrote to memory of 1440 4336 msedge.exe 84 PID 4336 wrote to memory of 1440 4336 msedge.exe 84 PID 4336 wrote to memory of 1440 4336 msedge.exe 84 PID 4336 wrote to memory of 3148 4336 msedge.exe 85 PID 4336 wrote to memory of 3148 4336 msedge.exe 85 PID 4336 wrote to memory of 4316 4336 msedge.exe 86 PID 4336 wrote to memory of 4316 4336 msedge.exe 86 PID 4336 wrote to memory of 4316 4336 msedge.exe 86 PID 4336 wrote to memory of 4316 4336 msedge.exe 86 PID 4336 wrote to memory of 4316 4336 msedge.exe 86 PID 4336 wrote to memory of 4316 4336 msedge.exe 86 PID 4336 wrote to memory of 4316 4336 msedge.exe 86 PID 4336 wrote to memory of 4316 4336 msedge.exe 86 PID 4336 wrote to memory of 4316 4336 msedge.exe 86 PID 4336 wrote to memory of 4316 4336 msedge.exe 86 PID 4336 wrote to memory of 4316 4336 msedge.exe 86 PID 4336 wrote to memory of 4316 4336 msedge.exe 86 PID 4336 wrote to memory of 4316 4336 msedge.exe 86 PID 4336 wrote to memory of 4316 4336 msedge.exe 86 PID 4336 wrote to memory of 4316 4336 msedge.exe 86 PID 4336 wrote to memory of 4316 4336 msedge.exe 86 PID 4336 wrote to memory of 4316 4336 msedge.exe 86 PID 4336 wrote to memory of 4316 4336 msedge.exe 86 PID 4336 wrote to memory of 4316 4336 msedge.exe 86 PID 4336 wrote to memory of 4316 4336 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\942461d821c34cf046628244bcc236d0_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4336 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcdb8546f8,0x7ffcdb854708,0x7ffcdb8547182⤵PID:3752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,18099438139876354563,10311728707411353446,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:22⤵PID:1440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,18099438139876354563,10311728707411353446,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,18099438139876354563,10311728707411353446,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2888 /prefetch:82⤵PID:4316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,18099438139876354563,10311728707411353446,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3184 /prefetch:12⤵PID:3368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,18099438139876354563,10311728707411353446,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:2444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,18099438139876354563,10311728707411353446,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4660 /prefetch:12⤵PID:1568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,18099438139876354563,10311728707411353446,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5388 /prefetch:82⤵PID:392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,18099438139876354563,10311728707411353446,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5388 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,18099438139876354563,10311728707411353446,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5484 /prefetch:12⤵PID:3608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,18099438139876354563,10311728707411353446,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5500 /prefetch:12⤵PID:1556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,18099438139876354563,10311728707411353446,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4704 /prefetch:12⤵PID:332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,18099438139876354563,10311728707411353446,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5844 /prefetch:12⤵PID:4964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,18099438139876354563,10311728707411353446,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1832 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5624
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5068
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1528
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54b4f91fa1b362ba5341ecb2836438dea
SHA19561f5aabed742404d455da735259a2c6781fa07
SHA256d824b742eace197ddc8b6ed5d918f390fde4b0fbf0e371b8e1f2ed40a3b6455c
SHA512fef22217dcdd8000bc193e25129699d4b8f7a103ca4fe1613baf73ccf67090d9fbae27eb93e4bb8747455853a0a4326f2d0c38df41c8d42351cdcd4132418dac
-
Filesize
152B
MD5eaa3db555ab5bc0cb364826204aad3f0
SHA1a4cdfaac8de49e6e6e88b335cfeaa7c9e3c563ca
SHA256ef7baeb1b2ab05ff3c5fbb76c2759db49294654548706c7c8e87f0cde855b86b
SHA512e13981da51b52c15261ecabb98af32f9b920651b46b10ce0cc823c5878b22eb1420258c80deef204070d1e0bdd3a64d875ac2522e3713a3cf11657aa55aeccd4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\18d11c2c-b12f-4370-a4b5-fdb74aa125f5.tmp
Filesize6KB
MD5a4062eff2891e64a7750853555599886
SHA1c748ff2173b76a1ad983170e50d8f3eaeda6161d
SHA256b1149377185dbf8155371be1360d8c526e5d47838e302bed250c93dcdc6cea87
SHA5129ca1b2c13f8d9e75a99454f80b69082af023e16632dafd8c82a852d8c193f9a319e31932c1a82e9b59e27ec9420d10aa5d48888b5ee08f3ea137cb887d1d517a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD52068d58159b4d1ce3d0006b377bad854
SHA1412fefbc86ddefcf41967aeaa77b3a1a8d532381
SHA2568d09cf2479ac662bb6df985cc4048bc4fa576e20d610d197574429dca1623e5e
SHA5127b759d2c2bbe32a548ab022e4d5fa4076401de6e019d08b4421e1d7c8a0de9675469ef1fa8ee823a24a6b8a0365eaf84bdf32fcec8bb2318f44d9a19fd4bb5d8
-
Filesize
408B
MD550a6c6b960f1016f0ecd18a03c26e29b
SHA1307952a3b638b44216e0f8b26dd4fd2094b94c44
SHA256e19cc4c6eb8e7708b31c76e58220663c8eb5ee0bcbb34c54e56672b2f04df92d
SHA5129cebfb0867dc8195e29f838525fe05b84411425e95f1eff844330f865b6c0280b56759ab0be2373d36cf3683cbb71e5f43a7c29a121bb5679e7d71ef99076e6f
-
Filesize
5KB
MD5b45fc06e0a37376c8e1a47e1d21418b3
SHA1acff05e4b93d9a3f8d98dccb13f2314b090a4aec
SHA256bc897de2ed6e4f4d8a6f4b7438ff1c7b86c9f8c085158622b9f60f382f03d1b5
SHA5123b679330dd3df7bc75f05f5dea8220d0380e031ff8fd3b173592f93d5f0ca44fe183713768812d8bf6132cf6d77250bb42c1156d58720c7843c10b984226c915
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD56cfb0022a700f6c4579c788ed14427ba
SHA1e041a7a8ee04bef7828cc04288e898716a662303
SHA256770570235216bce6d48cabea4beeed2b7a4381dd720befdcbb9c480f978b0955
SHA512ae60e5d3d272f7e99df23490fbeb8ec9ec5eef92556fdea0531bd88585969b9f756d27e8a608bb635c5330f0188e9838e995e47dfdfe25a9a39490c09d8ae191