Analysis
-
max time kernel
145s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
11/06/2024, 09:52
Static task
static1
Behavioral task
behavioral1
Sample
9dc45c4bca71eb764f6a1af6cc310fb4_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
9dc45c4bca71eb764f6a1af6cc310fb4_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
9dc45c4bca71eb764f6a1af6cc310fb4_JaffaCakes118.html
-
Size
138KB
-
MD5
9dc45c4bca71eb764f6a1af6cc310fb4
-
SHA1
08d953219494f9c930cbde2f3cfd90bc1528e115
-
SHA256
62c5b35597e385daa6def0d6cc03c0e9534b461b21bd3c88635eaa3e57a4f83c
-
SHA512
daee9b4718ba536329ba5862aac110352a22d0fe8093142a1ad32f8c6479156d291d8ee8fef6ec44b45cd115efea74844b6e58f17847df522a6524dd6d0568ba
-
SSDEEP
3072:d1mOlt8joIduss056XY3wIeHxGeJOFAcjHNaQxuZMqQzs+bc:d1mOlt8joIduss056XY3wIeHxGeJjz
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3200 msedge.exe 3200 msedge.exe 2400 msedge.exe 2400 msedge.exe 1960 identity_helper.exe 1960 identity_helper.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2400 wrote to memory of 4360 2400 msedge.exe 81 PID 2400 wrote to memory of 4360 2400 msedge.exe 81 PID 2400 wrote to memory of 1904 2400 msedge.exe 82 PID 2400 wrote to memory of 1904 2400 msedge.exe 82 PID 2400 wrote to memory of 1904 2400 msedge.exe 82 PID 2400 wrote to memory of 1904 2400 msedge.exe 82 PID 2400 wrote to memory of 1904 2400 msedge.exe 82 PID 2400 wrote to memory of 1904 2400 msedge.exe 82 PID 2400 wrote to memory of 1904 2400 msedge.exe 82 PID 2400 wrote to memory of 1904 2400 msedge.exe 82 PID 2400 wrote to memory of 1904 2400 msedge.exe 82 PID 2400 wrote to memory of 1904 2400 msedge.exe 82 PID 2400 wrote to memory of 1904 2400 msedge.exe 82 PID 2400 wrote to memory of 1904 2400 msedge.exe 82 PID 2400 wrote to memory of 1904 2400 msedge.exe 82 PID 2400 wrote to memory of 1904 2400 msedge.exe 82 PID 2400 wrote to memory of 1904 2400 msedge.exe 82 PID 2400 wrote to memory of 1904 2400 msedge.exe 82 PID 2400 wrote to memory of 1904 2400 msedge.exe 82 PID 2400 wrote to memory of 1904 2400 msedge.exe 82 PID 2400 wrote to memory of 1904 2400 msedge.exe 82 PID 2400 wrote to memory of 1904 2400 msedge.exe 82 PID 2400 wrote to memory of 1904 2400 msedge.exe 82 PID 2400 wrote to memory of 1904 2400 msedge.exe 82 PID 2400 wrote to memory of 1904 2400 msedge.exe 82 PID 2400 wrote to memory of 1904 2400 msedge.exe 82 PID 2400 wrote to memory of 1904 2400 msedge.exe 82 PID 2400 wrote to memory of 1904 2400 msedge.exe 82 PID 2400 wrote to memory of 1904 2400 msedge.exe 82 PID 2400 wrote to memory of 1904 2400 msedge.exe 82 PID 2400 wrote to memory of 1904 2400 msedge.exe 82 PID 2400 wrote to memory of 1904 2400 msedge.exe 82 PID 2400 wrote to memory of 1904 2400 msedge.exe 82 PID 2400 wrote to memory of 1904 2400 msedge.exe 82 PID 2400 wrote to memory of 1904 2400 msedge.exe 82 PID 2400 wrote to memory of 1904 2400 msedge.exe 82 PID 2400 wrote to memory of 1904 2400 msedge.exe 82 PID 2400 wrote to memory of 1904 2400 msedge.exe 82 PID 2400 wrote to memory of 1904 2400 msedge.exe 82 PID 2400 wrote to memory of 1904 2400 msedge.exe 82 PID 2400 wrote to memory of 1904 2400 msedge.exe 82 PID 2400 wrote to memory of 1904 2400 msedge.exe 82 PID 2400 wrote to memory of 3200 2400 msedge.exe 83 PID 2400 wrote to memory of 3200 2400 msedge.exe 83 PID 2400 wrote to memory of 436 2400 msedge.exe 84 PID 2400 wrote to memory of 436 2400 msedge.exe 84 PID 2400 wrote to memory of 436 2400 msedge.exe 84 PID 2400 wrote to memory of 436 2400 msedge.exe 84 PID 2400 wrote to memory of 436 2400 msedge.exe 84 PID 2400 wrote to memory of 436 2400 msedge.exe 84 PID 2400 wrote to memory of 436 2400 msedge.exe 84 PID 2400 wrote to memory of 436 2400 msedge.exe 84 PID 2400 wrote to memory of 436 2400 msedge.exe 84 PID 2400 wrote to memory of 436 2400 msedge.exe 84 PID 2400 wrote to memory of 436 2400 msedge.exe 84 PID 2400 wrote to memory of 436 2400 msedge.exe 84 PID 2400 wrote to memory of 436 2400 msedge.exe 84 PID 2400 wrote to memory of 436 2400 msedge.exe 84 PID 2400 wrote to memory of 436 2400 msedge.exe 84 PID 2400 wrote to memory of 436 2400 msedge.exe 84 PID 2400 wrote to memory of 436 2400 msedge.exe 84 PID 2400 wrote to memory of 436 2400 msedge.exe 84 PID 2400 wrote to memory of 436 2400 msedge.exe 84 PID 2400 wrote to memory of 436 2400 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\9dc45c4bca71eb764f6a1af6cc310fb4_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff84d7846f8,0x7ff84d784708,0x7ff84d7847182⤵PID:4360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,11271346049999651978,5732021432940828511,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2088 /prefetch:22⤵PID:1904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2052,11271346049999651978,5732021432940828511,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2240 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2052,11271346049999651978,5732021432940828511,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2652 /prefetch:82⤵PID:436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,11271346049999651978,5732021432940828511,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:4976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,11271346049999651978,5732021432940828511,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:3188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,11271346049999651978,5732021432940828511,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4948 /prefetch:12⤵PID:2484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,11271346049999651978,5732021432940828511,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5500 /prefetch:82⤵PID:3408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,11271346049999651978,5732021432940828511,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5500 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,11271346049999651978,5732021432940828511,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5496 /prefetch:12⤵PID:2360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,11271346049999651978,5732021432940828511,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5196 /prefetch:12⤵PID:1620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,11271346049999651978,5732021432940828511,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4000 /prefetch:12⤵PID:2256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,11271346049999651978,5732021432940828511,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5680 /prefetch:12⤵PID:3364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,11271346049999651978,5732021432940828511,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1652 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:220
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4148
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4028
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52daa93382bba07cbc40af372d30ec576
SHA1c5e709dc3e2e4df2ff841fbde3e30170e7428a94
SHA2561826d2a57b1938c148bf212a47d947ed1bfb26cfc55868931f843ee438117f30
SHA51265635cb59c81548a9ef8fdb0942331e7f3cd0c30ce1d4dba48aed72dbb27b06511a55d2aeaadfadbbb4b7cb4b2e2772bbabba9603b3f7d9c8b9e4a7fbf3d6b6b
-
Filesize
152B
MD5ecdc2754d7d2ae862272153aa9b9ca6e
SHA1c19bed1c6e1c998b9fa93298639ad7961339147d
SHA256a13d791473f836edcab0e93451ce7b7182efbbc54261b2b5644d319e047a00a7
SHA512cd4fb81317d540f8b15f1495a381bb6f0f129b8923a7c06e4b5cf777d2625c30304aee6cc68aa20479e08d84e5030b43fbe93e479602400334dfdd7297f702f2
-
Filesize
23KB
MD5e1c71f7c04be834f5587230db2ad24b3
SHA1f3bab9cb99d9f343bf7ed3981aaa7450515d2424
SHA2569fb6c768068467b58cc773a3907f3f5ec170bfe02ca8f301f6a232a9daf5a899
SHA512205366b4a3ca0dae58722a19ba24088dd8db483db9d14b376434024b064715ade720347ff5de87db014e32d2ef8192e71bbbdd3c885d5a8581b4aafc6e88ce51
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD50362018c33f0fd1f2e3566f80c8e9226
SHA1e000e07bc183c67babfcee825a743ae9bfabe795
SHA2567afff2d761b86eae96ef85fc90d6c38a4a3d6ab6fb43ffee8b5daf0b9ac61361
SHA512b72c483416b7baa79f5bd0fa712e735097f84b4b76baac1fe2a1e2bf7c0eb56acd148d3d8f6ce18415e489e8ca7f0b73c7d620d0d141cf4c98082ce897b1044b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD50ba42190aced91a8c7ec6ab8b4028b0f
SHA12ab8e787ade66d25235a80709cd5de194dc00ce3
SHA256545e1a73300cbf6e1d91537566014b345bb93e7a1c8c33721e23566a83559c07
SHA512dad5d68a826bbb860c4a81d67136efd3a62309ab82df8005dc450c2c001bcb3fe3fc8b1ffd438983b3dc3fb91c3c017b8c0f276503c4306f3ef9312fc469d74a
-
Filesize
3KB
MD5db835d4e6fa984d6161ab8575ddc0086
SHA17e2583b2926ba1cef030263966ed80ed81f3ad30
SHA25677360b10922a61a305aa2418e64cc2210a8fccc48f5fcf79cc4c986bb449f844
SHA51275a2cc31a1d894c7761e451c56bfff8f7cf62a9dddf3d787b4db47ac4aa35464a7d56afb83da6fe9f5527dbf637ff9b71baa5c21d2092b486493c78d0204c42d
-
Filesize
7KB
MD5cde6e1c0d3eb0e52f69a619c13e34838
SHA13d96fdd5557389579d7222ef926270de731a6acb
SHA2563669e46a1888ca9b3a8f19c1603aae7865b55dbd1915bd623a8e168df9e37e61
SHA512afa563583c3047a8fad8866bb596d02c973222c3f3f3b18bf10f208ba24dd2843c50e80bfc0c4d1a16174705ebd73f36c560dbe4febda4550c14b78bdde1e2d8
-
Filesize
5KB
MD53d1a3e695f04a0f51ad91015dd1cf4e4
SHA1e8984be143878b2b2dc7a94cf2fb040ac1aa9f38
SHA25656f250caa4b96ac43880610f6cd0adad9d8f6ad765616d4b66818a62f8499054
SHA512d2c5694f44b1ce5ae13aa5a79631bfd9cfebd7a46ee3142f88b5086dd29d07299cd0de052242f78e5cad038db756fa200e68e1162ad6d30027fb9c633bc88180
-
Filesize
7KB
MD544670d6c0ed6e8fc810a1a8d34f83af1
SHA177133bf5f910d015d6cf291d26314e2f20e507fc
SHA256e6fc19b5b5abe65e12afe41100ec29560d6608ace6d67e192907cccf5328ca10
SHA512901b2d81f629de23acbe44112443e61d7c8aa12d4512c2dfa0d95847009cc0cda61e476c45d70ebd58036dc8b291c498b890eb39ef580c9889eb9f1d2961397b
-
Filesize
7KB
MD5ae77584307f7f3246d9dfb5d67116fc6
SHA1f668efa568bcdcf0c4c5b343458107473ac9473e
SHA2567aa1cd33401064a24a2897a1ed5b9bd07794a2b9e28e247bc650e62cc9693bbf
SHA5122378ec309185235a8ccfddd0311dfeb1c43b7333106b2a0dd1fc87de37689e7a8f3b8ad0006143a1f92f8203d5aee58bde89d3478efc68b9e3b0ae59f9cc5658
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5f79f4a04ef7d7333f55bb430eabbaa7f
SHA1c955d000e6d8cdba1a9bb7738516ccfba8ef9032
SHA256b6bbb056f6f27c007d90e417c250e53b504b7b27f611cd5f71f5a4df29fae062
SHA512ebc4af3b3607c9290fc65b6163f8cba268b2ac2fc998f177f9ac7432047d72a05436076f7a3fa2da7b1b02af00362abdc1d25ac340c24a1a89cff743b45d7f2e