Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
04/06/2024, 11:40
Static task
static1
Behavioral task
behavioral1
Sample
94b46fa0089883ba1083502ed4a01a95_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
94b46fa0089883ba1083502ed4a01a95_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
94b46fa0089883ba1083502ed4a01a95_JaffaCakes118.html
-
Size
208KB
-
MD5
94b46fa0089883ba1083502ed4a01a95
-
SHA1
d79aeaf7af8cac78682bbd2390e0f63dbe624d33
-
SHA256
e3e10f9dba171f5fedaf12db6e9b09bdfafc2ea0ac3fef191e5d97da21b889ba
-
SHA512
fceda54a86f0f997daef2524ce0028fe189de734cae440ed68166a2753232e03cc0882a49a6de1dafda7ee812d2748e31314c22e87e8d0f88989eb4d65b03c5c
-
SSDEEP
3072:9mq7PcULnf+wsJCD7QfVmNrcU5Zwlwn8Xx41cMPt28W:9mq7PcULnf+IqIolm8Biq
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4036 msedge.exe 4036 msedge.exe 3660 msedge.exe 3660 msedge.exe 4360 identity_helper.exe 4360 identity_helper.exe 2820 msedge.exe 2820 msedge.exe 2820 msedge.exe 2820 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3660 wrote to memory of 2424 3660 msedge.exe 82 PID 3660 wrote to memory of 2424 3660 msedge.exe 82 PID 3660 wrote to memory of 3192 3660 msedge.exe 83 PID 3660 wrote to memory of 3192 3660 msedge.exe 83 PID 3660 wrote to memory of 3192 3660 msedge.exe 83 PID 3660 wrote to memory of 3192 3660 msedge.exe 83 PID 3660 wrote to memory of 3192 3660 msedge.exe 83 PID 3660 wrote to memory of 3192 3660 msedge.exe 83 PID 3660 wrote to memory of 3192 3660 msedge.exe 83 PID 3660 wrote to memory of 3192 3660 msedge.exe 83 PID 3660 wrote to memory of 3192 3660 msedge.exe 83 PID 3660 wrote to memory of 3192 3660 msedge.exe 83 PID 3660 wrote to memory of 3192 3660 msedge.exe 83 PID 3660 wrote to memory of 3192 3660 msedge.exe 83 PID 3660 wrote to memory of 3192 3660 msedge.exe 83 PID 3660 wrote to memory of 3192 3660 msedge.exe 83 PID 3660 wrote to memory of 3192 3660 msedge.exe 83 PID 3660 wrote to memory of 3192 3660 msedge.exe 83 PID 3660 wrote to memory of 3192 3660 msedge.exe 83 PID 3660 wrote to memory of 3192 3660 msedge.exe 83 PID 3660 wrote to memory of 3192 3660 msedge.exe 83 PID 3660 wrote to memory of 3192 3660 msedge.exe 83 PID 3660 wrote to memory of 3192 3660 msedge.exe 83 PID 3660 wrote to memory of 3192 3660 msedge.exe 83 PID 3660 wrote to memory of 3192 3660 msedge.exe 83 PID 3660 wrote to memory of 3192 3660 msedge.exe 83 PID 3660 wrote to memory of 3192 3660 msedge.exe 83 PID 3660 wrote to memory of 3192 3660 msedge.exe 83 PID 3660 wrote to memory of 3192 3660 msedge.exe 83 PID 3660 wrote to memory of 3192 3660 msedge.exe 83 PID 3660 wrote to memory of 3192 3660 msedge.exe 83 PID 3660 wrote to memory of 3192 3660 msedge.exe 83 PID 3660 wrote to memory of 3192 3660 msedge.exe 83 PID 3660 wrote to memory of 3192 3660 msedge.exe 83 PID 3660 wrote to memory of 3192 3660 msedge.exe 83 PID 3660 wrote to memory of 3192 3660 msedge.exe 83 PID 3660 wrote to memory of 3192 3660 msedge.exe 83 PID 3660 wrote to memory of 3192 3660 msedge.exe 83 PID 3660 wrote to memory of 3192 3660 msedge.exe 83 PID 3660 wrote to memory of 3192 3660 msedge.exe 83 PID 3660 wrote to memory of 3192 3660 msedge.exe 83 PID 3660 wrote to memory of 3192 3660 msedge.exe 83 PID 3660 wrote to memory of 4036 3660 msedge.exe 84 PID 3660 wrote to memory of 4036 3660 msedge.exe 84 PID 3660 wrote to memory of 2828 3660 msedge.exe 85 PID 3660 wrote to memory of 2828 3660 msedge.exe 85 PID 3660 wrote to memory of 2828 3660 msedge.exe 85 PID 3660 wrote to memory of 2828 3660 msedge.exe 85 PID 3660 wrote to memory of 2828 3660 msedge.exe 85 PID 3660 wrote to memory of 2828 3660 msedge.exe 85 PID 3660 wrote to memory of 2828 3660 msedge.exe 85 PID 3660 wrote to memory of 2828 3660 msedge.exe 85 PID 3660 wrote to memory of 2828 3660 msedge.exe 85 PID 3660 wrote to memory of 2828 3660 msedge.exe 85 PID 3660 wrote to memory of 2828 3660 msedge.exe 85 PID 3660 wrote to memory of 2828 3660 msedge.exe 85 PID 3660 wrote to memory of 2828 3660 msedge.exe 85 PID 3660 wrote to memory of 2828 3660 msedge.exe 85 PID 3660 wrote to memory of 2828 3660 msedge.exe 85 PID 3660 wrote to memory of 2828 3660 msedge.exe 85 PID 3660 wrote to memory of 2828 3660 msedge.exe 85 PID 3660 wrote to memory of 2828 3660 msedge.exe 85 PID 3660 wrote to memory of 2828 3660 msedge.exe 85 PID 3660 wrote to memory of 2828 3660 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\94b46fa0089883ba1083502ed4a01a95_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3660 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffee01646f8,0x7ffee0164708,0x7ffee01647182⤵PID:2424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,3417605756805354975,12727225125327430071,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:22⤵PID:3192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,3417605756805354975,12727225125327430071,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,3417605756805354975,12727225125327430071,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2788 /prefetch:82⤵PID:2828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,3417605756805354975,12727225125327430071,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,3417605756805354975,12727225125327430071,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3164 /prefetch:12⤵PID:3068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,3417605756805354975,12727225125327430071,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4724 /prefetch:12⤵PID:2388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,3417605756805354975,12727225125327430071,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2196 /prefetch:12⤵PID:4340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,3417605756805354975,12727225125327430071,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5400 /prefetch:82⤵PID:4304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,3417605756805354975,12727225125327430071,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5400 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,3417605756805354975,12727225125327430071,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5780 /prefetch:12⤵PID:3344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,3417605756805354975,12727225125327430071,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5908 /prefetch:12⤵PID:2364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,3417605756805354975,12727225125327430071,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4484 /prefetch:12⤵PID:1104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,3417605756805354975,12727225125327430071,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4976 /prefetch:12⤵PID:3908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,3417605756805354975,12727225125327430071,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2156 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2820
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2072
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3564
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54b4f91fa1b362ba5341ecb2836438dea
SHA19561f5aabed742404d455da735259a2c6781fa07
SHA256d824b742eace197ddc8b6ed5d918f390fde4b0fbf0e371b8e1f2ed40a3b6455c
SHA512fef22217dcdd8000bc193e25129699d4b8f7a103ca4fe1613baf73ccf67090d9fbae27eb93e4bb8747455853a0a4326f2d0c38df41c8d42351cdcd4132418dac
-
Filesize
152B
MD5eaa3db555ab5bc0cb364826204aad3f0
SHA1a4cdfaac8de49e6e6e88b335cfeaa7c9e3c563ca
SHA256ef7baeb1b2ab05ff3c5fbb76c2759db49294654548706c7c8e87f0cde855b86b
SHA512e13981da51b52c15261ecabb98af32f9b920651b46b10ce0cc823c5878b22eb1420258c80deef204070d1e0bdd3a64d875ac2522e3713a3cf11657aa55aeccd4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize192B
MD5cf48fea4c0b2ae96286f22e4e5891ac3
SHA1a9a2c60e40eb17c7209c98fbfd09a63f12eefb9e
SHA2563e20da73cf7c59ebbb31816f66a8f81e701c8f71c6b50dc7536b7a1aab0e930c
SHA512ab2b4c36f026081db1a82844bc6d85fdd13658bef6146c814ea8305caf6c15c0d380fe44cd8d3cbfa3d2f00a28987cf505dfc87d2c1feede8928826c35d06f2e
-
Filesize
1KB
MD598a6b686dc925ed163ee52a19c05a874
SHA1bc1cac5e2df1c8e94e0c85767db47b08f047d9dd
SHA256bd8b47de76c6c6d70f820c80314d1a6959bafa519624bd5f405b248864c37c54
SHA5124ac55fcbe71188006a8ca8054ee6a04280f83d0f3bd45735c5c837ae1e6a26be0830a9e109e52050f20705c5595dfbb5cf6abafe32eec21b722d08c8f63a797a
-
Filesize
1KB
MD5efa798b9fcc73e341c2ed61c1ea4ab0f
SHA1ec75cfb9f192fb7f06eedbb2729d969b9bdf35bd
SHA2562a8effcf9cac23db90d1573dcd4d4fc805091d887d9f730d4e5275301b9f40b5
SHA5126d88942d3cd459b5170cce8f77c069ba9fd396221031c51b39081b3eb0b8d54a0f520176821cb7c9d3441cec0d1d67d1cc227b2d9e21105366899a15c0097a71
-
Filesize
6KB
MD5d1125ba25679aee69dc4835e7db6c36f
SHA15923ef1529408d9ebb4976a99216623162e69950
SHA2560d2d3355ad691345e45a10b1cc4684a6333f63e41a22027fff1145f1f9f734e7
SHA51272da9fe01602e6c1dadce8cb81553d9bd77fdca78c1bbd49c1a3f246564b707bfb70d58b5198810d0fbf2e236c513d946a4ab1cc97387c5f384c83eed5fc3298
-
Filesize
5KB
MD57f2afa8274c26d54bcf2effcc0239f78
SHA14b8e54481c4c283b10561cf65acf3b51028b54e5
SHA25623ff5ee0c2b131b386ef1d3fe3719735b19e5f1f7271b7e69197c1f6f8c47180
SHA5127705cd4ed9a39edf819494ddd6a51910b0deef5736138db98743fb6fa467fff8eaff09a2f75d2314b828608efe3e7d1f3e79ea9696d7ff3ffaf97ec95f1a9530
-
Filesize
6KB
MD5477141f95867191e6e33f98fc86b74c5
SHA1a9fc79badbc5ea82606f7d1d6fcdf1a77bb05ff7
SHA256305b7c0f230add80addbded7f03f72a2417df7cd02eb1c6339c048af7d335655
SHA512dcd8a57e292aca2b14d5cb8749c67a9ffc3a9261a4b5e7175a154ef5c5311b434a59fce6084097eb8b05b028980e6249553fb4131ee4290eb661da5f9c71121e
-
Filesize
6KB
MD59e6fc1df3595b091bc1ced3ce8b84d1b
SHA189ffb979411272cf1e2371f7ed6b632ec3d39b11
SHA256ecc563cd08ab15d4cdd1a02b225b5c8e6d59285cbe8d62e4928cd36a5c85f89c
SHA512edc8504ee18af2d91f9e18b8abf84465c8c50adef487fff3aa8e5abeceafe26d2415add475befd1fe88704b06248f06c05b2a56a19f3ec53d139b2c7b8ca8efe
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5327b45901a017d33744b95d398db8210
SHA10206e017340eb03292789dac759962633c9a617e
SHA256c015950c7db1ba7d79f5d7490d099936bba3081e8b2447637e83f5fd8da5a78f
SHA512127f8377506cf24d6b543f501b1d81ddc1b329a3d391c6c8556e0134aa992a5202e1ef0691bd41f5df280239034838ebec2ac3fe7f5ecb7e0172d008e62f16a3