Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
04/06/2024, 10:04
Static task
static1
Behavioral task
behavioral1
Sample
946d9204c9c149f333f64a36631860ca_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
946d9204c9c149f333f64a36631860ca_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
946d9204c9c149f333f64a36631860ca_JaffaCakes118.html
-
Size
175KB
-
MD5
946d9204c9c149f333f64a36631860ca
-
SHA1
9cd7dd2b43bdfd47179ea7ef7a01826da14e377a
-
SHA256
f9481ad2037b5332893eb3ed27c4605d36f553b906823d6e4177d40786fdfa20
-
SHA512
1b96fb922b529e152eb110de4b1181e793aa4298ed00a749d22f732e34893bcfb7e339511737c5dad478e6342c1469823ba90c2d6eb1c6f8c5604eb30aa47767
-
SSDEEP
1536:SqtH8gd8Wu8pI8Cd8hd8dQgbH//WoS3uGNkFzYfBCJiZOJ+aeTH+WK/Lf1/hpnV+:S9CT3u/FKBCJi5B
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4264 msedge.exe 4264 msedge.exe 208 msedge.exe 208 msedge.exe 572 identity_helper.exe 572 identity_helper.exe 5160 msedge.exe 5160 msedge.exe 5160 msedge.exe 5160 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 208 wrote to memory of 60 208 msedge.exe 83 PID 208 wrote to memory of 60 208 msedge.exe 83 PID 208 wrote to memory of 4912 208 msedge.exe 84 PID 208 wrote to memory of 4912 208 msedge.exe 84 PID 208 wrote to memory of 4912 208 msedge.exe 84 PID 208 wrote to memory of 4912 208 msedge.exe 84 PID 208 wrote to memory of 4912 208 msedge.exe 84 PID 208 wrote to memory of 4912 208 msedge.exe 84 PID 208 wrote to memory of 4912 208 msedge.exe 84 PID 208 wrote to memory of 4912 208 msedge.exe 84 PID 208 wrote to memory of 4912 208 msedge.exe 84 PID 208 wrote to memory of 4912 208 msedge.exe 84 PID 208 wrote to memory of 4912 208 msedge.exe 84 PID 208 wrote to memory of 4912 208 msedge.exe 84 PID 208 wrote to memory of 4912 208 msedge.exe 84 PID 208 wrote to memory of 4912 208 msedge.exe 84 PID 208 wrote to memory of 4912 208 msedge.exe 84 PID 208 wrote to memory of 4912 208 msedge.exe 84 PID 208 wrote to memory of 4912 208 msedge.exe 84 PID 208 wrote to memory of 4912 208 msedge.exe 84 PID 208 wrote to memory of 4912 208 msedge.exe 84 PID 208 wrote to memory of 4912 208 msedge.exe 84 PID 208 wrote to memory of 4912 208 msedge.exe 84 PID 208 wrote to memory of 4912 208 msedge.exe 84 PID 208 wrote to memory of 4912 208 msedge.exe 84 PID 208 wrote to memory of 4912 208 msedge.exe 84 PID 208 wrote to memory of 4912 208 msedge.exe 84 PID 208 wrote to memory of 4912 208 msedge.exe 84 PID 208 wrote to memory of 4912 208 msedge.exe 84 PID 208 wrote to memory of 4912 208 msedge.exe 84 PID 208 wrote to memory of 4912 208 msedge.exe 84 PID 208 wrote to memory of 4912 208 msedge.exe 84 PID 208 wrote to memory of 4912 208 msedge.exe 84 PID 208 wrote to memory of 4912 208 msedge.exe 84 PID 208 wrote to memory of 4912 208 msedge.exe 84 PID 208 wrote to memory of 4912 208 msedge.exe 84 PID 208 wrote to memory of 4912 208 msedge.exe 84 PID 208 wrote to memory of 4912 208 msedge.exe 84 PID 208 wrote to memory of 4912 208 msedge.exe 84 PID 208 wrote to memory of 4912 208 msedge.exe 84 PID 208 wrote to memory of 4912 208 msedge.exe 84 PID 208 wrote to memory of 4912 208 msedge.exe 84 PID 208 wrote to memory of 4264 208 msedge.exe 85 PID 208 wrote to memory of 4264 208 msedge.exe 85 PID 208 wrote to memory of 1852 208 msedge.exe 86 PID 208 wrote to memory of 1852 208 msedge.exe 86 PID 208 wrote to memory of 1852 208 msedge.exe 86 PID 208 wrote to memory of 1852 208 msedge.exe 86 PID 208 wrote to memory of 1852 208 msedge.exe 86 PID 208 wrote to memory of 1852 208 msedge.exe 86 PID 208 wrote to memory of 1852 208 msedge.exe 86 PID 208 wrote to memory of 1852 208 msedge.exe 86 PID 208 wrote to memory of 1852 208 msedge.exe 86 PID 208 wrote to memory of 1852 208 msedge.exe 86 PID 208 wrote to memory of 1852 208 msedge.exe 86 PID 208 wrote to memory of 1852 208 msedge.exe 86 PID 208 wrote to memory of 1852 208 msedge.exe 86 PID 208 wrote to memory of 1852 208 msedge.exe 86 PID 208 wrote to memory of 1852 208 msedge.exe 86 PID 208 wrote to memory of 1852 208 msedge.exe 86 PID 208 wrote to memory of 1852 208 msedge.exe 86 PID 208 wrote to memory of 1852 208 msedge.exe 86 PID 208 wrote to memory of 1852 208 msedge.exe 86 PID 208 wrote to memory of 1852 208 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\946d9204c9c149f333f64a36631860ca_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:208 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff810c446f8,0x7ff810c44708,0x7ff810c447182⤵PID:60
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,6957075915304476954,9679727439860383207,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:22⤵PID:4912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,6957075915304476954,9679727439860383207,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2480 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,6957075915304476954,9679727439860383207,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2852 /prefetch:82⤵PID:1852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,6957075915304476954,9679727439860383207,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:2928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,6957075915304476954,9679727439860383207,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:4100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,6957075915304476954,9679727439860383207,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4700 /prefetch:12⤵PID:4116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,6957075915304476954,9679727439860383207,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4704 /prefetch:12⤵PID:3696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,6957075915304476954,9679727439860383207,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5056 /prefetch:12⤵PID:4984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,6957075915304476954,9679727439860383207,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5048 /prefetch:12⤵PID:4052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,6957075915304476954,9679727439860383207,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3452 /prefetch:82⤵PID:844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,6957075915304476954,9679727439860383207,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3452 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,6957075915304476954,9679727439860383207,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5596 /prefetch:12⤵PID:2584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,6957075915304476954,9679727439860383207,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5612 /prefetch:12⤵PID:3880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,6957075915304476954,9679727439860383207,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5692 /prefetch:12⤵PID:5348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,6957075915304476954,9679727439860383207,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5652 /prefetch:12⤵PID:5356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,6957075915304476954,9679727439860383207,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5404 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5160
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2836
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2172
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:412
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize528B
MD5c572a73b863c9f06ad0583f7fbaf84ce
SHA11f108834430b4084fa2eedc754f99f3ec39b1688
SHA2568342a5bf5681d824a8f3e24061c4c8d29cd2f1f124e8642d37b3f858eb743f6c
SHA51247f89d380a6dcf34e0c9bb0251a49389933864d4bfa2828f7a7ea401fb0b4578aac639d790bc5613b51d558f12239d92a639f599ebc77e0ad87f54cd023f0bb3
-
Filesize
2KB
MD5313cdf5433f3d648284a1d961b29a6dc
SHA14996c4de9747b021a7c816c6a62edc02c3f10da6
SHA256b66295d1776bae2b5fc928cd5243d5f9ada476685c6018664a9afecd86c7af75
SHA51272de20754cf756a01a0d5701a321a129b033fc495f69ba38a671592e24d43e4657d31a41ecb084ce0288c8d68479fc3c2f9b99da3b9cc5d4ba635d7f24d9651d
-
Filesize
2KB
MD50cd2b476b808b1838b9c52fd976a078a
SHA1ce58052b49170b87826322c690b0f30ddc21f4b2
SHA25669785315544b9f317f8926b1646a66fc3a310f3098385dc6a4ef1e2df30fcb2d
SHA5121540e2a27ac1968d1b506a95862a1eb36446ea76347f9e92ae656e7f23fa8c1b34994989b95b489f9faa1857a1575a4aa5873098d53583c8f1ce97cf47279e41
-
Filesize
5KB
MD59f5f1f310eed5a4d988cbeee93c377ae
SHA16a109710a40a44c2a4b57fc3399af715fc926f82
SHA25620f77d5883575ae86075c63b41ed9a7364b942cefabe45f372990a138b99044b
SHA5125d774462b5238bf2e605d67c1e8022d6c4172be6f1ec2755192518593bb6e70e7c902332dd9d8a8326a9a251e97475d58e389504250283d6046b54bed61c3a91
-
Filesize
7KB
MD5eb2ee226ca30503c91bb93f5c3521179
SHA1d6f9c96656c9fa7c8d8f622889e5899f8ed665bf
SHA25641100b661bab9ca890586bde407d1d684a6710d231147a688ea5e80bc902e4b0
SHA5127977e038087bcbd39e007fb987cc9be0eea5fe4ba701b502d152eb88c70b3d2d5d3881c7880645630d54ae4d2cd52b47d4bdeac6795a7320c7e6e7bd98ebec6f
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD5e2c7dddd3b2a6e0dba92917a6d55fca2
SHA146784b7764289052388b60e769fdc615638cbbab
SHA25605025d93982ddf163a2177d5d1ec915761f048d4de3642d9721c39810c2167a8
SHA512dd5322f3ced41c51f5d851a17c3920bc799db462dd0c9baf0a55dc35f7b95303cfd63b611b41f6aaba3f86736865db5306eccdbed2d3a5190df0212410fcd90e