Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
05-06-2024 10:23
Static task
static1
Behavioral task
behavioral1
Sample
97dab30418595de64fbded0e0b8db36f_JaffaCakes118.html
Resource
win7-20240221-en
General
-
Target
97dab30418595de64fbded0e0b8db36f_JaffaCakes118.html
-
Size
21KB
-
MD5
97dab30418595de64fbded0e0b8db36f
-
SHA1
7e235f51abf0a00c3a06fc9e36bd701f6b21838b
-
SHA256
4548e8cef3d92ec171dbc8575956c63d9506500497f12d6176d47a26d9674f2d
-
SHA512
aa1e8ddfdc3197acdddec956ead33f59202946bd5059c8c4cc4e17b41f6ccdfd97f48d40feaad3655574065c3bed06698b88841dfaf754c921071f3c26c1d34e
-
SSDEEP
384:xfuna6DEKEqvO4F4QIy/r5XTkgkENdT+6aUPh9KOl4WcT+F2+Nz6:gLDnNvO4ltrNdT+6aUPh9KOl4WcT+F2R
Malware Config
Signatures
-
Mark of the Web detected: This indicates that the page was originally saved or cloned. 1 IoCs
Processes:
flow ioc 38 http://www.kdeey.com/index.html -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 3472 msedge.exe 3472 msedge.exe 228 msedge.exe 228 msedge.exe 1288 identity_helper.exe 1288 identity_helper.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe 1576 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
Processes:
msedge.exepid process 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe 228 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 228 wrote to memory of 2264 228 msedge.exe msedge.exe PID 228 wrote to memory of 2264 228 msedge.exe msedge.exe PID 228 wrote to memory of 4912 228 msedge.exe msedge.exe PID 228 wrote to memory of 4912 228 msedge.exe msedge.exe PID 228 wrote to memory of 4912 228 msedge.exe msedge.exe PID 228 wrote to memory of 4912 228 msedge.exe msedge.exe PID 228 wrote to memory of 4912 228 msedge.exe msedge.exe PID 228 wrote to memory of 4912 228 msedge.exe msedge.exe PID 228 wrote to memory of 4912 228 msedge.exe msedge.exe PID 228 wrote to memory of 4912 228 msedge.exe msedge.exe PID 228 wrote to memory of 4912 228 msedge.exe msedge.exe PID 228 wrote to memory of 4912 228 msedge.exe msedge.exe PID 228 wrote to memory of 4912 228 msedge.exe msedge.exe PID 228 wrote to memory of 4912 228 msedge.exe msedge.exe PID 228 wrote to memory of 4912 228 msedge.exe msedge.exe PID 228 wrote to memory of 4912 228 msedge.exe msedge.exe PID 228 wrote to memory of 4912 228 msedge.exe msedge.exe PID 228 wrote to memory of 4912 228 msedge.exe msedge.exe PID 228 wrote to memory of 4912 228 msedge.exe msedge.exe PID 228 wrote to memory of 4912 228 msedge.exe msedge.exe PID 228 wrote to memory of 4912 228 msedge.exe msedge.exe PID 228 wrote to memory of 4912 228 msedge.exe msedge.exe PID 228 wrote to memory of 4912 228 msedge.exe msedge.exe PID 228 wrote to memory of 4912 228 msedge.exe msedge.exe PID 228 wrote to memory of 4912 228 msedge.exe msedge.exe PID 228 wrote to memory of 4912 228 msedge.exe msedge.exe PID 228 wrote to memory of 4912 228 msedge.exe msedge.exe PID 228 wrote to memory of 4912 228 msedge.exe msedge.exe PID 228 wrote to memory of 4912 228 msedge.exe msedge.exe PID 228 wrote to memory of 4912 228 msedge.exe msedge.exe PID 228 wrote to memory of 4912 228 msedge.exe msedge.exe PID 228 wrote to memory of 4912 228 msedge.exe msedge.exe PID 228 wrote to memory of 4912 228 msedge.exe msedge.exe PID 228 wrote to memory of 4912 228 msedge.exe msedge.exe PID 228 wrote to memory of 4912 228 msedge.exe msedge.exe PID 228 wrote to memory of 4912 228 msedge.exe msedge.exe PID 228 wrote to memory of 4912 228 msedge.exe msedge.exe PID 228 wrote to memory of 4912 228 msedge.exe msedge.exe PID 228 wrote to memory of 4912 228 msedge.exe msedge.exe PID 228 wrote to memory of 4912 228 msedge.exe msedge.exe PID 228 wrote to memory of 4912 228 msedge.exe msedge.exe PID 228 wrote to memory of 4912 228 msedge.exe msedge.exe PID 228 wrote to memory of 3472 228 msedge.exe msedge.exe PID 228 wrote to memory of 3472 228 msedge.exe msedge.exe PID 228 wrote to memory of 1488 228 msedge.exe msedge.exe PID 228 wrote to memory of 1488 228 msedge.exe msedge.exe PID 228 wrote to memory of 1488 228 msedge.exe msedge.exe PID 228 wrote to memory of 1488 228 msedge.exe msedge.exe PID 228 wrote to memory of 1488 228 msedge.exe msedge.exe PID 228 wrote to memory of 1488 228 msedge.exe msedge.exe PID 228 wrote to memory of 1488 228 msedge.exe msedge.exe PID 228 wrote to memory of 1488 228 msedge.exe msedge.exe PID 228 wrote to memory of 1488 228 msedge.exe msedge.exe PID 228 wrote to memory of 1488 228 msedge.exe msedge.exe PID 228 wrote to memory of 1488 228 msedge.exe msedge.exe PID 228 wrote to memory of 1488 228 msedge.exe msedge.exe PID 228 wrote to memory of 1488 228 msedge.exe msedge.exe PID 228 wrote to memory of 1488 228 msedge.exe msedge.exe PID 228 wrote to memory of 1488 228 msedge.exe msedge.exe PID 228 wrote to memory of 1488 228 msedge.exe msedge.exe PID 228 wrote to memory of 1488 228 msedge.exe msedge.exe PID 228 wrote to memory of 1488 228 msedge.exe msedge.exe PID 228 wrote to memory of 1488 228 msedge.exe msedge.exe PID 228 wrote to memory of 1488 228 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\97dab30418595de64fbded0e0b8db36f_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff810c446f8,0x7ff810c44708,0x7ff810c447182⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1980,15342537558887657610,5984752629676787989,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1804 /prefetch:22⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1980,15342537558887657610,5984752629676787989,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2196 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1980,15342537558887657610,5984752629676787989,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2768 /prefetch:82⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,15342537558887657610,5984752629676787989,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,15342537558887657610,5984752629676787989,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1980,15342537558887657610,5984752629676787989,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5252 /prefetch:82⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1980,15342537558887657610,5984752629676787989,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5252 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,15342537558887657610,5984752629676787989,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5044 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,15342537558887657610,5984752629676787989,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5072 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,15342537558887657610,5984752629676787989,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,15342537558887657610,5984752629676787989,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5520 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1980,15342537558887657610,5984752629676787989,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4888 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
5KB
MD5ba5d3ef29c296be6a3ed90bb3c86afa0
SHA1226b7473d5c05126d6b6f20bdd15cc711f3a090a
SHA2560bd8fd045484661c52b11f7a8b2ccc6392cc94ecd3adcc3a9efb835d2e93dc3d
SHA5126affc59928e38dda3a1edd5707c55cf769ac4da5fcc7b7dce1499a8897005bbc3c1bee0249974035b3377aae7557b07e5d1d8d2c5327c054ca2d861ee506ae89
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
6KB
MD5af696dcc87003e494c266a21742b8218
SHA123e0cf80f03273f8fb5d457e76ab7650ab76dcc4
SHA2567ba0228c3fe682a0bf5ae3608567d50f862a3a3d4872fcf94ed58b34c1928c24
SHA512d16b96f07e420b3dcdc8fff0335d70c91bb4c8ec02a351aceabd6f283b4f940f85f002da4b15d664ef6a12d17be271a3cd6ddfac90bbf368218c909a853cc664
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENTFilesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENTFilesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
11KB
MD5180d5c75f240499df850e5fcc17aefde
SHA117a402a9310a369b6eefb815e84df95a21174c30
SHA256fe222cecfa24b99a25f575cf8ca8156b1c7a075acffa324b8cd86bf8b69a6fc8
SHA5121ec95bfe64e709f180872f4cedfd15c737e152a9be3c0c92cd3d5a47bddd35587f3df00caedbc59ccc2f82488cc6ab82a03f5e7fa0278681ee33ffd878e7bcd5
-
\??\pipe\LOCAL\crashpad_228_YRCLNVETYTHXBRDYMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e