Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
05-06-2024 12:46
Static task
static1
Behavioral task
behavioral1
Sample
9832efecb0ac51674c241d7d0ee4f75b_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
9832efecb0ac51674c241d7d0ee4f75b_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
9832efecb0ac51674c241d7d0ee4f75b_JaffaCakes118.html
-
Size
38KB
-
MD5
9832efecb0ac51674c241d7d0ee4f75b
-
SHA1
1469cd7b67433695c777e98c831430f82b60af71
-
SHA256
a34e40f6b620c814909d4364d28a6e429b7a52b4771d6c48b0f27121e417dffc
-
SHA512
7b1afc38e2a8ba995976928c717ab4072a779e4dadf35dafc75f55febe9a3ebd2bf23ba8fbc3a83405863d0808a89785046e7c90c4cb042b93fd999715c4a81a
-
SSDEEP
768:ckclux9o7Lq5CpK2nd94cKmxofB6Rs2SfJT68S:ckclOWWIpK2dUB6R48
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1812 msedge.exe 1812 msedge.exe 632 msedge.exe 632 msedge.exe 5108 identity_helper.exe 5108 identity_helper.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe 4236 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 632 wrote to memory of 3788 632 msedge.exe 83 PID 632 wrote to memory of 3788 632 msedge.exe 83 PID 632 wrote to memory of 4844 632 msedge.exe 84 PID 632 wrote to memory of 4844 632 msedge.exe 84 PID 632 wrote to memory of 4844 632 msedge.exe 84 PID 632 wrote to memory of 4844 632 msedge.exe 84 PID 632 wrote to memory of 4844 632 msedge.exe 84 PID 632 wrote to memory of 4844 632 msedge.exe 84 PID 632 wrote to memory of 4844 632 msedge.exe 84 PID 632 wrote to memory of 4844 632 msedge.exe 84 PID 632 wrote to memory of 4844 632 msedge.exe 84 PID 632 wrote to memory of 4844 632 msedge.exe 84 PID 632 wrote to memory of 4844 632 msedge.exe 84 PID 632 wrote to memory of 4844 632 msedge.exe 84 PID 632 wrote to memory of 4844 632 msedge.exe 84 PID 632 wrote to memory of 4844 632 msedge.exe 84 PID 632 wrote to memory of 4844 632 msedge.exe 84 PID 632 wrote to memory of 4844 632 msedge.exe 84 PID 632 wrote to memory of 4844 632 msedge.exe 84 PID 632 wrote to memory of 4844 632 msedge.exe 84 PID 632 wrote to memory of 4844 632 msedge.exe 84 PID 632 wrote to memory of 4844 632 msedge.exe 84 PID 632 wrote to memory of 4844 632 msedge.exe 84 PID 632 wrote to memory of 4844 632 msedge.exe 84 PID 632 wrote to memory of 4844 632 msedge.exe 84 PID 632 wrote to memory of 4844 632 msedge.exe 84 PID 632 wrote to memory of 4844 632 msedge.exe 84 PID 632 wrote to memory of 4844 632 msedge.exe 84 PID 632 wrote to memory of 4844 632 msedge.exe 84 PID 632 wrote to memory of 4844 632 msedge.exe 84 PID 632 wrote to memory of 4844 632 msedge.exe 84 PID 632 wrote to memory of 4844 632 msedge.exe 84 PID 632 wrote to memory of 4844 632 msedge.exe 84 PID 632 wrote to memory of 4844 632 msedge.exe 84 PID 632 wrote to memory of 4844 632 msedge.exe 84 PID 632 wrote to memory of 4844 632 msedge.exe 84 PID 632 wrote to memory of 4844 632 msedge.exe 84 PID 632 wrote to memory of 4844 632 msedge.exe 84 PID 632 wrote to memory of 4844 632 msedge.exe 84 PID 632 wrote to memory of 4844 632 msedge.exe 84 PID 632 wrote to memory of 4844 632 msedge.exe 84 PID 632 wrote to memory of 4844 632 msedge.exe 84 PID 632 wrote to memory of 1812 632 msedge.exe 85 PID 632 wrote to memory of 1812 632 msedge.exe 85 PID 632 wrote to memory of 2532 632 msedge.exe 86 PID 632 wrote to memory of 2532 632 msedge.exe 86 PID 632 wrote to memory of 2532 632 msedge.exe 86 PID 632 wrote to memory of 2532 632 msedge.exe 86 PID 632 wrote to memory of 2532 632 msedge.exe 86 PID 632 wrote to memory of 2532 632 msedge.exe 86 PID 632 wrote to memory of 2532 632 msedge.exe 86 PID 632 wrote to memory of 2532 632 msedge.exe 86 PID 632 wrote to memory of 2532 632 msedge.exe 86 PID 632 wrote to memory of 2532 632 msedge.exe 86 PID 632 wrote to memory of 2532 632 msedge.exe 86 PID 632 wrote to memory of 2532 632 msedge.exe 86 PID 632 wrote to memory of 2532 632 msedge.exe 86 PID 632 wrote to memory of 2532 632 msedge.exe 86 PID 632 wrote to memory of 2532 632 msedge.exe 86 PID 632 wrote to memory of 2532 632 msedge.exe 86 PID 632 wrote to memory of 2532 632 msedge.exe 86 PID 632 wrote to memory of 2532 632 msedge.exe 86 PID 632 wrote to memory of 2532 632 msedge.exe 86 PID 632 wrote to memory of 2532 632 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\9832efecb0ac51674c241d7d0ee4f75b_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:632 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff85efe46f8,0x7ff85efe4708,0x7ff85efe47182⤵PID:3788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2180,7580467922698577022,13231700909723816797,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2208 /prefetch:22⤵PID:4844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2180,7580467922698577022,13231700909723816797,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2284 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2180,7580467922698577022,13231700909723816797,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2652 /prefetch:82⤵PID:2532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,7580467922698577022,13231700909723816797,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3204 /prefetch:12⤵PID:3512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,7580467922698577022,13231700909723816797,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,7580467922698577022,13231700909723816797,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4728 /prefetch:12⤵PID:1552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,7580467922698577022,13231700909723816797,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4908 /prefetch:12⤵PID:5092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,7580467922698577022,13231700909723816797,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5028 /prefetch:12⤵PID:4612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2180,7580467922698577022,13231700909723816797,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4620 /prefetch:82⤵PID:3108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2180,7580467922698577022,13231700909723816797,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4620 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,7580467922698577022,13231700909723816797,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5668 /prefetch:12⤵PID:1652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,7580467922698577022,13231700909723816797,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5560 /prefetch:12⤵PID:1996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,7580467922698577022,13231700909723816797,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5852 /prefetch:12⤵PID:3244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,7580467922698577022,13231700909723816797,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5464 /prefetch:12⤵PID:3568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2180,7580467922698577022,13231700909723816797,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6084 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4236
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3268
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1172
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ae54e9db2e89f2c54da8cc0bfcbd26bd
SHA1a88af6c673609ecbc51a1a60dfbc8577830d2b5d
SHA2565009d3c953de63cfd14a7d911156c514e179ff07d2b94382d9caac6040cb72af
SHA512e3b70e5eb7321b9deca6f6a17424a15b9fd5c4008bd3789bd01099fd13cb2f4a2f37fe4b920fb51c50517745b576c1f94df83efd1a7e75949551163985599998
-
Filesize
152B
MD5f53207a5ca2ef5c7e976cbb3cb26d870
SHA149a8cc44f53da77bb3dfb36fc7676ed54675db43
SHA25619ab4e3c9da6d9cedda7461efdba9a2085e743513ab89f1dd0fd5a8f9486ad23
SHA512be734c7e8afda19f445912aef0d78f9941add29baebd4a812bff27f10a1d78b52aeb11c551468c8644443c86e1a2a6b2e4aead3d7f81d39925e3c20406ac1499
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD506553c5a3ded5a53d29acefa01c1332c
SHA1129791f5b632b4dad3b1a94cdb188e0befff2cab
SHA2566cc02d4d23bf97d8b33020516418f287e812c92619b6cdb8646423e1b7f83e09
SHA5121a61516eb796ab9eaccce357fa917c0a72bb99b286535f56f5b47ca20ece2cfa8f74d454b43455318c0b0bde6eb1cff606efcd05183242360cd1c3163cba50c9
-
Filesize
925B
MD58a72474cdda6da44ad94fe5f978fd676
SHA13d320df86c3b2c7b5bc97cc785e206fb46604d03
SHA25650f3e9483a74398b8d9bb4c57a20b9380ac4845483bb675020b2224d278bf53e
SHA51277765b509bea3899c8adfbebe6067ed825a3335d9cbeeabbf2753e543a3963467264d8759712c4048effd0d0e815896f3686b0b41003d6ed436139b846acb4d5
-
Filesize
5KB
MD52c41939771f5e8fb95e5d8f39aafaad7
SHA17fa6916f2f79c2eabfa080b8a3e9c26914c4d61d
SHA256083a26d6435aba4b2a3a77e6d6f027e47f86d683bdfb658cae8fa753011f1f8c
SHA512436c42f8067f9ea92b23fca44798b80f5c9addabb3db6ebe094b4d902c16ef6609d80c8405408b3a5cf64d779360bd6a9765a643e92aa5d9ba09053308e1c95f
-
Filesize
6KB
MD54bba8383fcb2e04dc18e56db27f841ef
SHA1ba6af16778f2fdeade1031283e4c29dbafbeb1cf
SHA256b90c60ba16ba0e54e64d92204c9097a4dac93567bed3a0f8bca30b89738a3b29
SHA51287e31dd1a879e8f11933fee0e56d167f2ab15047fe00363ad1f86060a2f3486ed30d8a7a18bd1f65b41604de75f43f63d94095cea24f5bb4c172d57b807669e0
-
Filesize
6KB
MD58acfb7bbe10b808b05682a94ab42d376
SHA17c11c2005da6e91187f9896d993c57dbb616c4f9
SHA256af776d22e754e4bc5db2fcdb31edddc26e96be97f3b6d73de87c7bdd8000d5cf
SHA51292fa9ddf2d4d202a4b62d81144e99ada952ad4c0d42dea2217778d489878056b2476ee51f86f5970f282419d72f3846ea170443e2bc398b48c640acdc192e5e2
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD50c73c6d65657f15b59b46934029faf9b
SHA14f6234c3b920f2637a626ff80d9662c3715cf8bc
SHA256bdecd11cb0cf7d731194381ae6af8c1e302d94877f551c578f38d4b107840fb9
SHA512663ddb7634d59bcd8cd4e398e8f16d5c21a8f0414bac326317df7568be10e4d481ba7348f47e9fe128f588b10c75c907bbd037325ae6af1c5c0f3aa7739a9fc3