Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
05/06/2024, 21:04
Static task
static1
Behavioral task
behavioral1
Sample
993fbfe8afd7f758f606b321011548f5_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
993fbfe8afd7f758f606b321011548f5_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
993fbfe8afd7f758f606b321011548f5_JaffaCakes118.html
-
Size
65KB
-
MD5
993fbfe8afd7f758f606b321011548f5
-
SHA1
03c81fcc8a47d042803f4687b113d0fcbea244b0
-
SHA256
6d6c2d8361e8ce07cfb45f09e2b61e73a5ba17f9c55a821396c8c906a8d93d4e
-
SHA512
e0c02b69b560e596cd4ee34290348e5a41ec3eff6e390e692d4765cdb43bba30973542f140945b8e884fcc20b77558b53ec549366006edc198208902aadf36aa
-
SSDEEP
768:JifgcM0St8tN99OIsjfXmnKmMwoTyOqhCZkoTnMdtbBnfBgN8/oycc8QFVG8sP/i:J9+fb+TIgec0tbrgaCcFNnzAC
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3680 msedge.exe 3680 msedge.exe 5112 msedge.exe 5112 msedge.exe 3972 identity_helper.exe 3972 identity_helper.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe 3676 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe 5112 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5112 wrote to memory of 2932 5112 msedge.exe 82 PID 5112 wrote to memory of 2932 5112 msedge.exe 82 PID 5112 wrote to memory of 556 5112 msedge.exe 84 PID 5112 wrote to memory of 556 5112 msedge.exe 84 PID 5112 wrote to memory of 556 5112 msedge.exe 84 PID 5112 wrote to memory of 556 5112 msedge.exe 84 PID 5112 wrote to memory of 556 5112 msedge.exe 84 PID 5112 wrote to memory of 556 5112 msedge.exe 84 PID 5112 wrote to memory of 556 5112 msedge.exe 84 PID 5112 wrote to memory of 556 5112 msedge.exe 84 PID 5112 wrote to memory of 556 5112 msedge.exe 84 PID 5112 wrote to memory of 556 5112 msedge.exe 84 PID 5112 wrote to memory of 556 5112 msedge.exe 84 PID 5112 wrote to memory of 556 5112 msedge.exe 84 PID 5112 wrote to memory of 556 5112 msedge.exe 84 PID 5112 wrote to memory of 556 5112 msedge.exe 84 PID 5112 wrote to memory of 556 5112 msedge.exe 84 PID 5112 wrote to memory of 556 5112 msedge.exe 84 PID 5112 wrote to memory of 556 5112 msedge.exe 84 PID 5112 wrote to memory of 556 5112 msedge.exe 84 PID 5112 wrote to memory of 556 5112 msedge.exe 84 PID 5112 wrote to memory of 556 5112 msedge.exe 84 PID 5112 wrote to memory of 556 5112 msedge.exe 84 PID 5112 wrote to memory of 556 5112 msedge.exe 84 PID 5112 wrote to memory of 556 5112 msedge.exe 84 PID 5112 wrote to memory of 556 5112 msedge.exe 84 PID 5112 wrote to memory of 556 5112 msedge.exe 84 PID 5112 wrote to memory of 556 5112 msedge.exe 84 PID 5112 wrote to memory of 556 5112 msedge.exe 84 PID 5112 wrote to memory of 556 5112 msedge.exe 84 PID 5112 wrote to memory of 556 5112 msedge.exe 84 PID 5112 wrote to memory of 556 5112 msedge.exe 84 PID 5112 wrote to memory of 556 5112 msedge.exe 84 PID 5112 wrote to memory of 556 5112 msedge.exe 84 PID 5112 wrote to memory of 556 5112 msedge.exe 84 PID 5112 wrote to memory of 556 5112 msedge.exe 84 PID 5112 wrote to memory of 556 5112 msedge.exe 84 PID 5112 wrote to memory of 556 5112 msedge.exe 84 PID 5112 wrote to memory of 556 5112 msedge.exe 84 PID 5112 wrote to memory of 556 5112 msedge.exe 84 PID 5112 wrote to memory of 556 5112 msedge.exe 84 PID 5112 wrote to memory of 556 5112 msedge.exe 84 PID 5112 wrote to memory of 3680 5112 msedge.exe 85 PID 5112 wrote to memory of 3680 5112 msedge.exe 85 PID 5112 wrote to memory of 5060 5112 msedge.exe 86 PID 5112 wrote to memory of 5060 5112 msedge.exe 86 PID 5112 wrote to memory of 5060 5112 msedge.exe 86 PID 5112 wrote to memory of 5060 5112 msedge.exe 86 PID 5112 wrote to memory of 5060 5112 msedge.exe 86 PID 5112 wrote to memory of 5060 5112 msedge.exe 86 PID 5112 wrote to memory of 5060 5112 msedge.exe 86 PID 5112 wrote to memory of 5060 5112 msedge.exe 86 PID 5112 wrote to memory of 5060 5112 msedge.exe 86 PID 5112 wrote to memory of 5060 5112 msedge.exe 86 PID 5112 wrote to memory of 5060 5112 msedge.exe 86 PID 5112 wrote to memory of 5060 5112 msedge.exe 86 PID 5112 wrote to memory of 5060 5112 msedge.exe 86 PID 5112 wrote to memory of 5060 5112 msedge.exe 86 PID 5112 wrote to memory of 5060 5112 msedge.exe 86 PID 5112 wrote to memory of 5060 5112 msedge.exe 86 PID 5112 wrote to memory of 5060 5112 msedge.exe 86 PID 5112 wrote to memory of 5060 5112 msedge.exe 86 PID 5112 wrote to memory of 5060 5112 msedge.exe 86 PID 5112 wrote to memory of 5060 5112 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\993fbfe8afd7f758f606b321011548f5_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5112 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffde10f46f8,0x7ffde10f4708,0x7ffde10f47182⤵PID:2932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,10401163575423557608,546010591363113583,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1520 /prefetch:22⤵PID:556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,10401163575423557608,546010591363113583,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2204 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,10401163575423557608,546010591363113583,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2964 /prefetch:82⤵PID:5060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,10401163575423557608,546010591363113583,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:3960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,10401163575423557608,546010591363113583,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:4768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,10401163575423557608,546010591363113583,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4776 /prefetch:12⤵PID:964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,10401163575423557608,546010591363113583,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5504 /prefetch:82⤵PID:3380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,10401163575423557608,546010591363113583,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5504 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,10401163575423557608,546010591363113583,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4932 /prefetch:12⤵PID:1672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,10401163575423557608,546010591363113583,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2088 /prefetch:12⤵PID:3180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,10401163575423557608,546010591363113583,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5872 /prefetch:12⤵PID:3156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,10401163575423557608,546010591363113583,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5908 /prefetch:12⤵PID:4648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,10401163575423557608,546010591363113583,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2836 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3676
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1924
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:212
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5537815e7cc5c694912ac0308147852e4
SHA12ccdd9d9dc637db5462fe8119c0df261146c363c
SHA256b4b69d099507d88abdeff4835e06cc6711e1c47464c963d013cef0a278e52d4f
SHA51263969a69af057235dbdecddc483ef5ce0058673179a3580c5aa12938c9501513cdb72dd703a06fa7d4fc08d074f17528283338c795334398497c771ecbd1350a
-
Filesize
152B
MD58b167567021ccb1a9fdf073fa9112ef0
SHA13baf293fbfaa7c1e7cdacb5f2975737f4ef69898
SHA25626764cedf35f118b55f30b3a36e0693f9f38290a5b2b6b8b83a00e990ae18513
SHA512726098001ef1acf1dd154a658752fa27dea32bca8fbb66395c142cb666102e71632adbad1b7e2f717071cd3e3af3867471932a71707f2ae97b989f4be468ab54
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD5d9079d6e7f29f540388cde273529698b
SHA1bf4ad026d608d51caf762ffa2d1dfe6df9b41464
SHA25611922b03e3688299deb16e23a3847f498bcbac4b866546ef5b648cca086c149b
SHA51255ce2ecbe09389e6cb80fb01ad6df52aa98df73a521ef755769ef5874631a8c0f5e9401a981af3317b87c6f1977b5597aed177e61de68e4f3c6d5eafa4cc05a6
-
Filesize
410B
MD5875dc99f6aebe18d290098c0e542427a
SHA1b6ecefba12361402249c174e919b86876f52b2b0
SHA2568c42a0b4e8822b7b70f4e0669c8a6360e7718116abdb3922ca39babd4c0fe981
SHA5127b599a0b273d8371415950560a8c6bcdb945345f1925823711da618c92c7e340e768758fe74856aa33724f78917c491355b5be1574984e627f54c7ed268d228d
-
Filesize
5KB
MD5691024000afde59063f4f7090f149f0d
SHA163b99f5f1fc373eae7caa7719c1e8a658cfe73bb
SHA256f421525d0c5c294978e832142e8ce50dff2cdbb5291b9e82ac2f0a591c16cf3b
SHA5122b3f5b6b3777feaa5b964e40cb37d8297d399d6a8f6d924eef8c6416efca926fc4894b9f9f4139a8a7991a4c2c85321c312d64e8dd28f3b015b125c4521bd2e1
-
Filesize
6KB
MD575f99bd00510f55973ef4ce9c7711c8b
SHA150bb90265a67a8206f34d3c06df1a229921808db
SHA256ec97b122140104150c4c10665ade679ea1cc5bfd41a430cfeaae3af3356182b9
SHA512fac2d07800a5cc635fcfbb9970ce136d96b6382da3f17d8d71fa8bab4cc77ff7590e0478bb3b12fed74ce489611b66179469daa0d9d971bdfdecb422eb165ef0
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5b34676a360292df59afb8253339419df
SHA10f282fa76daec305a808b6bdd0f403edba6b82d2
SHA256a53704ea84a8b34adec79a62e673c3925694c1885da6f17a6604303fd9e2a7f3
SHA512f14593c4f61cd67d51e754499db8829e405c3d2fa6d5e7c28ba0054fa698a09969e3075afebd762f64892a73ddb43e30cb0a0480734c874983456ab8dfb3393a