Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
05-06-2024 01:18
Static task
static1
Behavioral task
behavioral1
Sample
96de10ad7dfdfd63f36b7febf5b18645_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
96de10ad7dfdfd63f36b7febf5b18645_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
96de10ad7dfdfd63f36b7febf5b18645_JaffaCakes118.html
-
Size
86KB
-
MD5
96de10ad7dfdfd63f36b7febf5b18645
-
SHA1
71a61df9ebab7cc56fb5ec71a5636d79532b08c7
-
SHA256
13d21b1d598d62f797d3d1f5796443dc0f55906aaf11fada9e77d2f141485c92
-
SHA512
4e691849d0386237abb02ea6131006d4e455d90065002575219c9d8556b9ecf8f15ecd72e8b94725038dfd49c0aae7d36fc2561b1ad16aa038c40a42ef3daa51
-
SSDEEP
1536:JrSR/gHyYOZzQ2e5I0jPPciOK2zLNztzNCRiVhCdvOHE6Ohpzn14Czd32xjwSOnw:7HkZfe2Q0Lm4cKjwSOnrqb
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1936 msedge.exe 1936 msedge.exe 4940 msedge.exe 4940 msedge.exe 2684 msedge.exe 2684 msedge.exe 2684 msedge.exe 2684 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4940 wrote to memory of 1056 4940 msedge.exe 81 PID 4940 wrote to memory of 1056 4940 msedge.exe 81 PID 4940 wrote to memory of 1876 4940 msedge.exe 82 PID 4940 wrote to memory of 1876 4940 msedge.exe 82 PID 4940 wrote to memory of 1876 4940 msedge.exe 82 PID 4940 wrote to memory of 1876 4940 msedge.exe 82 PID 4940 wrote to memory of 1876 4940 msedge.exe 82 PID 4940 wrote to memory of 1876 4940 msedge.exe 82 PID 4940 wrote to memory of 1876 4940 msedge.exe 82 PID 4940 wrote to memory of 1876 4940 msedge.exe 82 PID 4940 wrote to memory of 1876 4940 msedge.exe 82 PID 4940 wrote to memory of 1876 4940 msedge.exe 82 PID 4940 wrote to memory of 1876 4940 msedge.exe 82 PID 4940 wrote to memory of 1876 4940 msedge.exe 82 PID 4940 wrote to memory of 1876 4940 msedge.exe 82 PID 4940 wrote to memory of 1876 4940 msedge.exe 82 PID 4940 wrote to memory of 1876 4940 msedge.exe 82 PID 4940 wrote to memory of 1876 4940 msedge.exe 82 PID 4940 wrote to memory of 1876 4940 msedge.exe 82 PID 4940 wrote to memory of 1876 4940 msedge.exe 82 PID 4940 wrote to memory of 1876 4940 msedge.exe 82 PID 4940 wrote to memory of 1876 4940 msedge.exe 82 PID 4940 wrote to memory of 1876 4940 msedge.exe 82 PID 4940 wrote to memory of 1876 4940 msedge.exe 82 PID 4940 wrote to memory of 1876 4940 msedge.exe 82 PID 4940 wrote to memory of 1876 4940 msedge.exe 82 PID 4940 wrote to memory of 1876 4940 msedge.exe 82 PID 4940 wrote to memory of 1876 4940 msedge.exe 82 PID 4940 wrote to memory of 1876 4940 msedge.exe 82 PID 4940 wrote to memory of 1876 4940 msedge.exe 82 PID 4940 wrote to memory of 1876 4940 msedge.exe 82 PID 4940 wrote to memory of 1876 4940 msedge.exe 82 PID 4940 wrote to memory of 1876 4940 msedge.exe 82 PID 4940 wrote to memory of 1876 4940 msedge.exe 82 PID 4940 wrote to memory of 1876 4940 msedge.exe 82 PID 4940 wrote to memory of 1876 4940 msedge.exe 82 PID 4940 wrote to memory of 1876 4940 msedge.exe 82 PID 4940 wrote to memory of 1876 4940 msedge.exe 82 PID 4940 wrote to memory of 1876 4940 msedge.exe 82 PID 4940 wrote to memory of 1876 4940 msedge.exe 82 PID 4940 wrote to memory of 1876 4940 msedge.exe 82 PID 4940 wrote to memory of 1876 4940 msedge.exe 82 PID 4940 wrote to memory of 1936 4940 msedge.exe 83 PID 4940 wrote to memory of 1936 4940 msedge.exe 83 PID 4940 wrote to memory of 3992 4940 msedge.exe 84 PID 4940 wrote to memory of 3992 4940 msedge.exe 84 PID 4940 wrote to memory of 3992 4940 msedge.exe 84 PID 4940 wrote to memory of 3992 4940 msedge.exe 84 PID 4940 wrote to memory of 3992 4940 msedge.exe 84 PID 4940 wrote to memory of 3992 4940 msedge.exe 84 PID 4940 wrote to memory of 3992 4940 msedge.exe 84 PID 4940 wrote to memory of 3992 4940 msedge.exe 84 PID 4940 wrote to memory of 3992 4940 msedge.exe 84 PID 4940 wrote to memory of 3992 4940 msedge.exe 84 PID 4940 wrote to memory of 3992 4940 msedge.exe 84 PID 4940 wrote to memory of 3992 4940 msedge.exe 84 PID 4940 wrote to memory of 3992 4940 msedge.exe 84 PID 4940 wrote to memory of 3992 4940 msedge.exe 84 PID 4940 wrote to memory of 3992 4940 msedge.exe 84 PID 4940 wrote to memory of 3992 4940 msedge.exe 84 PID 4940 wrote to memory of 3992 4940 msedge.exe 84 PID 4940 wrote to memory of 3992 4940 msedge.exe 84 PID 4940 wrote to memory of 3992 4940 msedge.exe 84 PID 4940 wrote to memory of 3992 4940 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\96de10ad7dfdfd63f36b7febf5b18645_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4940 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff96de446f8,0x7ff96de44708,0x7ff96de447182⤵PID:1056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,11191052676304281263,5763802865638887293,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2100 /prefetch:22⤵PID:1876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,11191052676304281263,5763802865638887293,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2176 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,11191052676304281263,5763802865638887293,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2756 /prefetch:82⤵PID:3992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,11191052676304281263,5763802865638887293,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3204 /prefetch:12⤵PID:2324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,11191052676304281263,5763802865638887293,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:3940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,11191052676304281263,5763802865638887293,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1748 /prefetch:12⤵PID:3672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,11191052676304281263,5763802865638887293,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6128 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2684
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4712
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:896
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2424
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54f7152bc5a1a715ef481e37d1c791959
SHA1c8a1ed674c62ae4f45519f90a8cc5a81eff3a6d7
SHA256704dd4f98d8ca34ec421f23ba1891b178c23c14b3301e4655efc5c02d356c2bc
SHA5122e6b02ca35d76a655a17a5f3e9dbd8d7517c7dae24f0095c7350eb9e7bdf9e1256a7009aa8878f96c89d1ea4fe5323a41f72b8c551806dda62880d7ff231ff5c
-
Filesize
152B
MD5ea98e583ad99df195d29aa066204ab56
SHA1f89398664af0179641aa0138b337097b617cb2db
SHA256a7abb51435909fa2d75c6f2ff5c69a93d4a0ab276ed579e7d8733b2a63ffbee6
SHA512e109be3466e653e5d310b3e402e1626298b09205d223722a82344dd78504f3c33e1e24e8402a02f38cd2c9c50d96a303ce4846bea5a583423937ab018cd5782f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize216B
MD53832ea49beaf95ede2d3261ce1682c1c
SHA1bdcb5a60f13aa4598597ecda0fea50afa326b3a1
SHA2566b511ea5b5ad11acb11e2e965443d374c71941cf6aa63d8e10d19e968620ab32
SHA512f9cd26f0724164c32d36a2e9cc931c7db03a4ec56118cac8c437e39914104ba71813b504e5c3f250f4d2d3c4a6a31eb9aad87d854953f1e1838eb6f5ac2f284f
-
Filesize
6KB
MD5985720b33464789a7702de22daaefeb4
SHA1bbca06f8ebe7b5c4610f07954d8589a0132234b7
SHA256f97a5b0744703faf59897fc6790486bc6c0e6a3bac8281a8c9c0b98b50c5dde4
SHA5122db6f34a4dec357ece46513cc89c39c6d0c694a5ee8083ceac2e489b61ce46152b10375f0d9cc5e1758a38a20a6e294b4a730057f42370a6ace473b2e9bbef9a
-
Filesize
5KB
MD5fb10db360de9e6f646ce2ebbc4caf136
SHA1e54b9764bed9a2a19f5005c81d2818ed0851162a
SHA256e5e551f7c2dc4321b4193b3a7c75149ff7c755030d80d48e76f03fe4cfe3b457
SHA5125e46cbadcd5ca77fa0c2b503bd5b0dd875cfd86012eb186918bd53f21cc4f6d6b4f616c494dbb0ca3a0c3b02dcabae6a1164d78000244845d68a74d6f284a59a
-
Filesize
10KB
MD59290814818e4c83d83f406f700f05e7e
SHA14a16d3961bef46f3f19f941562b6eaaa728b5dd1
SHA256eadd4685c65a8f671c9c1cb012cb96496a0fcc9de4ed379785233c88aebe0b2a
SHA512c537a9ae795b5466f6e337c664554e567c75e0e9b1b19b8a4fe18bae47c71b836549bf95fdc655328bdee186e9d645fa247de3a51fa9bd8ace8991f9138f9e43