Analysis
-
max time kernel
148s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
04-06-2024 20:14
Static task
static1
Behavioral task
behavioral1
Sample
961e745c098989099f2fced23876b40b_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
961e745c098989099f2fced23876b40b_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
961e745c098989099f2fced23876b40b_JaffaCakes118.html
-
Size
19KB
-
MD5
961e745c098989099f2fced23876b40b
-
SHA1
9729e4e71fc5cbd288a2b536e66a4905cd0399f7
-
SHA256
8a45e75167da6e2f8b470866e8385602953f80a998844e4493981fcb27c82942
-
SHA512
4f937fbdc30d66e6c29d118be9c49c49d75eb248da7e633e362b360d7a76f578fc38693fd8e7cf1a15e73e2b3fd235b419bac9bdd17e014e2e549ea722163e69
-
SSDEEP
384:zi8KhBTESyVBD8cSQ3Re4emLTXucfIk99he8zVc91:ziUSygc13kmWOIk9S6q1
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4628 msedge.exe 4628 msedge.exe 2140 msedge.exe 2140 msedge.exe 2184 identity_helper.exe 2184 identity_helper.exe 4248 msedge.exe 4248 msedge.exe 4248 msedge.exe 4248 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2140 wrote to memory of 5068 2140 msedge.exe 86 PID 2140 wrote to memory of 5068 2140 msedge.exe 86 PID 2140 wrote to memory of 3948 2140 msedge.exe 87 PID 2140 wrote to memory of 3948 2140 msedge.exe 87 PID 2140 wrote to memory of 3948 2140 msedge.exe 87 PID 2140 wrote to memory of 3948 2140 msedge.exe 87 PID 2140 wrote to memory of 3948 2140 msedge.exe 87 PID 2140 wrote to memory of 3948 2140 msedge.exe 87 PID 2140 wrote to memory of 3948 2140 msedge.exe 87 PID 2140 wrote to memory of 3948 2140 msedge.exe 87 PID 2140 wrote to memory of 3948 2140 msedge.exe 87 PID 2140 wrote to memory of 3948 2140 msedge.exe 87 PID 2140 wrote to memory of 3948 2140 msedge.exe 87 PID 2140 wrote to memory of 3948 2140 msedge.exe 87 PID 2140 wrote to memory of 3948 2140 msedge.exe 87 PID 2140 wrote to memory of 3948 2140 msedge.exe 87 PID 2140 wrote to memory of 3948 2140 msedge.exe 87 PID 2140 wrote to memory of 3948 2140 msedge.exe 87 PID 2140 wrote to memory of 3948 2140 msedge.exe 87 PID 2140 wrote to memory of 3948 2140 msedge.exe 87 PID 2140 wrote to memory of 3948 2140 msedge.exe 87 PID 2140 wrote to memory of 3948 2140 msedge.exe 87 PID 2140 wrote to memory of 3948 2140 msedge.exe 87 PID 2140 wrote to memory of 3948 2140 msedge.exe 87 PID 2140 wrote to memory of 3948 2140 msedge.exe 87 PID 2140 wrote to memory of 3948 2140 msedge.exe 87 PID 2140 wrote to memory of 3948 2140 msedge.exe 87 PID 2140 wrote to memory of 3948 2140 msedge.exe 87 PID 2140 wrote to memory of 3948 2140 msedge.exe 87 PID 2140 wrote to memory of 3948 2140 msedge.exe 87 PID 2140 wrote to memory of 3948 2140 msedge.exe 87 PID 2140 wrote to memory of 3948 2140 msedge.exe 87 PID 2140 wrote to memory of 3948 2140 msedge.exe 87 PID 2140 wrote to memory of 3948 2140 msedge.exe 87 PID 2140 wrote to memory of 3948 2140 msedge.exe 87 PID 2140 wrote to memory of 3948 2140 msedge.exe 87 PID 2140 wrote to memory of 3948 2140 msedge.exe 87 PID 2140 wrote to memory of 3948 2140 msedge.exe 87 PID 2140 wrote to memory of 3948 2140 msedge.exe 87 PID 2140 wrote to memory of 3948 2140 msedge.exe 87 PID 2140 wrote to memory of 3948 2140 msedge.exe 87 PID 2140 wrote to memory of 3948 2140 msedge.exe 87 PID 2140 wrote to memory of 4628 2140 msedge.exe 88 PID 2140 wrote to memory of 4628 2140 msedge.exe 88 PID 2140 wrote to memory of 4240 2140 msedge.exe 89 PID 2140 wrote to memory of 4240 2140 msedge.exe 89 PID 2140 wrote to memory of 4240 2140 msedge.exe 89 PID 2140 wrote to memory of 4240 2140 msedge.exe 89 PID 2140 wrote to memory of 4240 2140 msedge.exe 89 PID 2140 wrote to memory of 4240 2140 msedge.exe 89 PID 2140 wrote to memory of 4240 2140 msedge.exe 89 PID 2140 wrote to memory of 4240 2140 msedge.exe 89 PID 2140 wrote to memory of 4240 2140 msedge.exe 89 PID 2140 wrote to memory of 4240 2140 msedge.exe 89 PID 2140 wrote to memory of 4240 2140 msedge.exe 89 PID 2140 wrote to memory of 4240 2140 msedge.exe 89 PID 2140 wrote to memory of 4240 2140 msedge.exe 89 PID 2140 wrote to memory of 4240 2140 msedge.exe 89 PID 2140 wrote to memory of 4240 2140 msedge.exe 89 PID 2140 wrote to memory of 4240 2140 msedge.exe 89 PID 2140 wrote to memory of 4240 2140 msedge.exe 89 PID 2140 wrote to memory of 4240 2140 msedge.exe 89 PID 2140 wrote to memory of 4240 2140 msedge.exe 89 PID 2140 wrote to memory of 4240 2140 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\961e745c098989099f2fced23876b40b_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffaef7f46f8,0x7ffaef7f4708,0x7ffaef7f47182⤵PID:5068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2168,3503926877627654968,7591876511720095285,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2180 /prefetch:22⤵PID:3948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2168,3503926877627654968,7591876511720095285,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2232 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2168,3503926877627654968,7591876511720095285,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2792 /prefetch:82⤵PID:4240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,3503926877627654968,7591876511720095285,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3188 /prefetch:12⤵PID:2676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,3503926877627654968,7591876511720095285,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3196 /prefetch:12⤵PID:2648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,3503926877627654968,7591876511720095285,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4664 /prefetch:12⤵PID:4452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,3503926877627654968,7591876511720095285,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4700 /prefetch:12⤵PID:1900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,3503926877627654968,7591876511720095285,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5464 /prefetch:12⤵PID:1504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,3503926877627654968,7591876511720095285,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5444 /prefetch:12⤵PID:2956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2168,3503926877627654968,7591876511720095285,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6432 /prefetch:82⤵PID:3780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2168,3503926877627654968,7591876511720095285,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6432 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,3503926877627654968,7591876511720095285,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6364 /prefetch:12⤵PID:1072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,3503926877627654968,7591876511720095285,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6332 /prefetch:12⤵PID:4900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2168,3503926877627654968,7591876511720095285,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5252 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4248
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3044
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:824
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ae54e9db2e89f2c54da8cc0bfcbd26bd
SHA1a88af6c673609ecbc51a1a60dfbc8577830d2b5d
SHA2565009d3c953de63cfd14a7d911156c514e179ff07d2b94382d9caac6040cb72af
SHA512e3b70e5eb7321b9deca6f6a17424a15b9fd5c4008bd3789bd01099fd13cb2f4a2f37fe4b920fb51c50517745b576c1f94df83efd1a7e75949551163985599998
-
Filesize
152B
MD5f53207a5ca2ef5c7e976cbb3cb26d870
SHA149a8cc44f53da77bb3dfb36fc7676ed54675db43
SHA25619ab4e3c9da6d9cedda7461efdba9a2085e743513ab89f1dd0fd5a8f9486ad23
SHA512be734c7e8afda19f445912aef0d78f9941add29baebd4a812bff27f10a1d78b52aeb11c551468c8644443c86e1a2a6b2e4aead3d7f81d39925e3c20406ac1499
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD51b62e6a6c5551ec024c2e6463d315cf3
SHA13070b4736f09f190ad3465419753ec4302d3e505
SHA256e48ed4d0a0bfb788389eb199f05bcf447dabdd74c8efff885967b3795caed602
SHA512077c78762a534f39eb32478fb928a325fd58d78b0524a2d886544feac9f621a13f09946b835d77fcfc1c0095ac42233f684913d85cf9c8cc132394ff68f67cb0
-
Filesize
408B
MD5d3ea8c2d3bc7fdc6c26aecff5e918493
SHA1c5b4cc65a2eec012dad8833d4f28dd0644bafd39
SHA256f08f433d08108c8575cdca35dbd8abb48d2c3af7ffcf7f4a076b9bc521930479
SHA51284ee742c4378a81e0818c0db90925a4a8afe7eb0b9eae344a55e78df52376ec6ee3c807f0f045296fa53a3f98c93af7ed8db09559633923fce82e406c19f27c3
-
Filesize
6KB
MD5ced6319e217da0474ecb395a547e9b3c
SHA15e75d4e345a5d401d3e9f355d313bd640e3ed190
SHA2564a93f483aef335d8ef3a15c7b2d9381c504e5a56b4e3972b55ed07852dd7a5b7
SHA51214c39d0eb84056e538ef5cd1b511ae2b628d839613d854905f5a2d57bc88c993962cd1739e247026643531e44d7aa6670301228d20deb11d24f0ae372b4fd0f9
-
Filesize
6KB
MD5b984075bde169764e0ae31aba7f0ad1c
SHA11025c64ee19475e0becd601dee7f7e560bc168fe
SHA25663a4e975a31e37f04ade0d2d80d5ef92aa23a55fc1d76386da3d846a13fa6c80
SHA5122917b274c18332ad7a32418e1461494879c8d8fd26103b75b54c2c97059fbc7d4a75c9ca224b1ec15ae4ee31ed5d60673ee9b8d473045bbdfc1b6d5e69e766c5
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5fc76d7d3cac9dae7af0f3626891c8713
SHA1f49576168f44dac2ca61a26ce14321dc692f790d
SHA2564746b5975859d00202831d6cbf5e724fcbb265906f7e6269d403c23ea0ba28a7
SHA512aac1bffbf474e6dad1ac6d8224df0127e14fa920b5abb4d6b5cbf6090103361057206186122d9dba613cbfea4bf3298587039bccd53fb4176877a85ae0e6efa3
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e