Analysis
-
max time kernel
139s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
05-06-2024 17:40
Static task
static1
Behavioral task
behavioral1
Sample
98cd19fef91bb71af9862c7707306485_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
98cd19fef91bb71af9862c7707306485_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
98cd19fef91bb71af9862c7707306485_JaffaCakes118.html
-
Size
82KB
-
MD5
98cd19fef91bb71af9862c7707306485
-
SHA1
8a9c9356820d8a3e6d61d586225704f8ae29b820
-
SHA256
99371f44534f1695fa9f4793e03faf854d115d2924471b7bc6bbca7a85d8a260
-
SHA512
68fe9a556227f93d2f7ac7180d642ffd3c7b9bf6836828e37ce729d8a99cef917bd41e1c35eba4cc39c3a0473039787fe08fe8ec562a9dd681d483d483f61a96
-
SSDEEP
1536:CpPMlbN6FJbTM7NbPx5elSWE5/ezOlSYqKyM4WvsUWZkojNqZnR0pD:CpPMlbN+bTM7Nb5IE5/ezOlSs0UC
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4216 msedge.exe 4216 msedge.exe 2132 msedge.exe 2132 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 2480 msedge.exe 3544 identity_helper.exe 3544 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 2132 msedge.exe 2132 msedge.exe 2132 msedge.exe 2132 msedge.exe 2132 msedge.exe 2132 msedge.exe 2132 msedge.exe 2132 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2132 msedge.exe 2132 msedge.exe 2132 msedge.exe 2132 msedge.exe 2132 msedge.exe 2132 msedge.exe 2132 msedge.exe 2132 msedge.exe 2132 msedge.exe 2132 msedge.exe 2132 msedge.exe 2132 msedge.exe 2132 msedge.exe 2132 msedge.exe 2132 msedge.exe 2132 msedge.exe 2132 msedge.exe 2132 msedge.exe 2132 msedge.exe 2132 msedge.exe 2132 msedge.exe 2132 msedge.exe 2132 msedge.exe 2132 msedge.exe 2132 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2132 msedge.exe 2132 msedge.exe 2132 msedge.exe 2132 msedge.exe 2132 msedge.exe 2132 msedge.exe 2132 msedge.exe 2132 msedge.exe 2132 msedge.exe 2132 msedge.exe 2132 msedge.exe 2132 msedge.exe 2132 msedge.exe 2132 msedge.exe 2132 msedge.exe 2132 msedge.exe 2132 msedge.exe 2132 msedge.exe 2132 msedge.exe 2132 msedge.exe 2132 msedge.exe 2132 msedge.exe 2132 msedge.exe 2132 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2132 wrote to memory of 1584 2132 msedge.exe 81 PID 2132 wrote to memory of 1584 2132 msedge.exe 81 PID 2132 wrote to memory of 3792 2132 msedge.exe 82 PID 2132 wrote to memory of 3792 2132 msedge.exe 82 PID 2132 wrote to memory of 3792 2132 msedge.exe 82 PID 2132 wrote to memory of 3792 2132 msedge.exe 82 PID 2132 wrote to memory of 3792 2132 msedge.exe 82 PID 2132 wrote to memory of 3792 2132 msedge.exe 82 PID 2132 wrote to memory of 3792 2132 msedge.exe 82 PID 2132 wrote to memory of 3792 2132 msedge.exe 82 PID 2132 wrote to memory of 3792 2132 msedge.exe 82 PID 2132 wrote to memory of 3792 2132 msedge.exe 82 PID 2132 wrote to memory of 3792 2132 msedge.exe 82 PID 2132 wrote to memory of 3792 2132 msedge.exe 82 PID 2132 wrote to memory of 3792 2132 msedge.exe 82 PID 2132 wrote to memory of 3792 2132 msedge.exe 82 PID 2132 wrote to memory of 3792 2132 msedge.exe 82 PID 2132 wrote to memory of 3792 2132 msedge.exe 82 PID 2132 wrote to memory of 3792 2132 msedge.exe 82 PID 2132 wrote to memory of 3792 2132 msedge.exe 82 PID 2132 wrote to memory of 3792 2132 msedge.exe 82 PID 2132 wrote to memory of 3792 2132 msedge.exe 82 PID 2132 wrote to memory of 3792 2132 msedge.exe 82 PID 2132 wrote to memory of 3792 2132 msedge.exe 82 PID 2132 wrote to memory of 3792 2132 msedge.exe 82 PID 2132 wrote to memory of 3792 2132 msedge.exe 82 PID 2132 wrote to memory of 3792 2132 msedge.exe 82 PID 2132 wrote to memory of 3792 2132 msedge.exe 82 PID 2132 wrote to memory of 3792 2132 msedge.exe 82 PID 2132 wrote to memory of 3792 2132 msedge.exe 82 PID 2132 wrote to memory of 3792 2132 msedge.exe 82 PID 2132 wrote to memory of 3792 2132 msedge.exe 82 PID 2132 wrote to memory of 3792 2132 msedge.exe 82 PID 2132 wrote to memory of 3792 2132 msedge.exe 82 PID 2132 wrote to memory of 3792 2132 msedge.exe 82 PID 2132 wrote to memory of 3792 2132 msedge.exe 82 PID 2132 wrote to memory of 3792 2132 msedge.exe 82 PID 2132 wrote to memory of 3792 2132 msedge.exe 82 PID 2132 wrote to memory of 3792 2132 msedge.exe 82 PID 2132 wrote to memory of 3792 2132 msedge.exe 82 PID 2132 wrote to memory of 3792 2132 msedge.exe 82 PID 2132 wrote to memory of 3792 2132 msedge.exe 82 PID 2132 wrote to memory of 4216 2132 msedge.exe 83 PID 2132 wrote to memory of 4216 2132 msedge.exe 83 PID 2132 wrote to memory of 4740 2132 msedge.exe 84 PID 2132 wrote to memory of 4740 2132 msedge.exe 84 PID 2132 wrote to memory of 4740 2132 msedge.exe 84 PID 2132 wrote to memory of 4740 2132 msedge.exe 84 PID 2132 wrote to memory of 4740 2132 msedge.exe 84 PID 2132 wrote to memory of 4740 2132 msedge.exe 84 PID 2132 wrote to memory of 4740 2132 msedge.exe 84 PID 2132 wrote to memory of 4740 2132 msedge.exe 84 PID 2132 wrote to memory of 4740 2132 msedge.exe 84 PID 2132 wrote to memory of 4740 2132 msedge.exe 84 PID 2132 wrote to memory of 4740 2132 msedge.exe 84 PID 2132 wrote to memory of 4740 2132 msedge.exe 84 PID 2132 wrote to memory of 4740 2132 msedge.exe 84 PID 2132 wrote to memory of 4740 2132 msedge.exe 84 PID 2132 wrote to memory of 4740 2132 msedge.exe 84 PID 2132 wrote to memory of 4740 2132 msedge.exe 84 PID 2132 wrote to memory of 4740 2132 msedge.exe 84 PID 2132 wrote to memory of 4740 2132 msedge.exe 84 PID 2132 wrote to memory of 4740 2132 msedge.exe 84 PID 2132 wrote to memory of 4740 2132 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\98cd19fef91bb71af9862c7707306485_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9303d46f8,0x7ff9303d4708,0x7ff9303d47182⤵PID:1584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2168,17052882962051073043,2569918213811193272,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2220 /prefetch:22⤵PID:3792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2168,17052882962051073043,2569918213811193272,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2272 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2168,17052882962051073043,2569918213811193272,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2684 /prefetch:82⤵PID:4740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,17052882962051073043,2569918213811193272,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3104 /prefetch:12⤵PID:3700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,17052882962051073043,2569918213811193272,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3116 /prefetch:12⤵PID:1640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,17052882962051073043,2569918213811193272,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2864 /prefetch:12⤵PID:4596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,17052882962051073043,2569918213811193272,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5312 /prefetch:12⤵PID:212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2168,17052882962051073043,2569918213811193272,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4772 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2168,17052882962051073043,2569918213811193272,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5984 /prefetch:82⤵PID:3056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2168,17052882962051073043,2569918213811193272,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5984 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,17052882962051073043,2569918213811193272,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5632 /prefetch:12⤵PID:3080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,17052882962051073043,2569918213811193272,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5892 /prefetch:12⤵PID:4208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,17052882962051073043,2569918213811193272,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4724 /prefetch:12⤵PID:2316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,17052882962051073043,2569918213811193272,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4868 /prefetch:12⤵PID:2272
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4796
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4032
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5537815e7cc5c694912ac0308147852e4
SHA12ccdd9d9dc637db5462fe8119c0df261146c363c
SHA256b4b69d099507d88abdeff4835e06cc6711e1c47464c963d013cef0a278e52d4f
SHA51263969a69af057235dbdecddc483ef5ce0058673179a3580c5aa12938c9501513cdb72dd703a06fa7d4fc08d074f17528283338c795334398497c771ecbd1350a
-
Filesize
152B
MD58b167567021ccb1a9fdf073fa9112ef0
SHA13baf293fbfaa7c1e7cdacb5f2975737f4ef69898
SHA25626764cedf35f118b55f30b3a36e0693f9f38290a5b2b6b8b83a00e990ae18513
SHA512726098001ef1acf1dd154a658752fa27dea32bca8fbb66395c142cb666102e71632adbad1b7e2f717071cd3e3af3867471932a71707f2ae97b989f4be468ab54
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize168B
MD5ae99eb16c2ceb8329a60e03657fc7159
SHA1d718a8456859338064e4a4b6f116421b1d86f8f8
SHA256bfecf2323080f3ee6f1de0e2161eab22a20947095782d454d4e57c06ce8bcaff
SHA5122b63ef9ddde020a95b60dadf11675c016a57558ae72ad551872b5abcbd9889dd42734028415998c4c25329c76211dcf79f7a7b012383c349184b0d7aa9023907
-
Filesize
470B
MD5623fb0604aee7ec41743d4ebb266e765
SHA13474aa581e522965d6b51c9ac620721e11f9347b
SHA2563ad7f46eff7449d5cc1cfa0184312bc4f8e33b92c87607e95234409da3b36e35
SHA512b361e3594f7354623d19b4be1b156e20afa30543e9cb79b68d37c7f982d06fedfdc924ef5f035e609558b73e4081b74cdafe5ce746cda34010d6ba8f0604ad87
-
Filesize
5KB
MD5dcadec15107bd8674101c4ccac97ac51
SHA1169248f8d3b34a3665d59f1f6a9bdcb309259005
SHA2565fe897f84967f7f0f2789237ab9e17abb8816531e22991f44c80119345464e93
SHA51221f477ff5c6861bb2fe60240546e40f972be3d1f76bcfd9c2b329190323ad63319776e8576d3de450a5612590617af880b0f0992c9284285af39157c7bae7404
-
Filesize
6KB
MD5e2a7aebb7603fd1e4bda5507a1d9a295
SHA1493ccc2b992bd3c826856748abbd87c76c4cd521
SHA2568555fdb66d1c95af721545db6469af71c21950d8b515f120ce2a52b201ce41c0
SHA512399a234e2201b1c97e787608efbcc961b17aeddf01c6a96b76547a20d7d9380955312cdde6b5e82bfaae7a0eda9a5b80f6133079b97a4c46106cdd0cd002a0c7
-
Filesize
6KB
MD55c94ce9bb8ba897ec1bb2d3168c6d590
SHA157e161d3336bca3f3e0b48cd1229a8a7930051af
SHA256cbd056f2320aeada4e830bd5c320f87902905a54d23bccda210a4d308560e8dd
SHA5129a15ba04960e9f5fcb790ea703777a26a65b904577219d9cefd336798424f86f33ae7224e4e03c1a949180ae509088b702b92e8d1708bd9636a4f9840eb0d6c4
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5bbf884b1948a20ebb23fcb1ae349adb2
SHA163fec70d686f58f09740adadb5758bf0792ec799
SHA256b6a550558057d160a16d656410097c3557dceab2373cbfdd0992af713e8c7cb9
SHA512e46dc1ab58035f5a8399e4da303ba6e362fa1e8b1babe28a9a6521fe025144251a7275ef5c549d71a2898bda7fcfc095cdd71e3e51f8855dab27c46c175c62dd