Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
16-06-2024 22:03
Static task
static1
Behavioral task
behavioral1
Sample
b566f557b7b1c2ea6115fed836c57dc0_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
b566f557b7b1c2ea6115fed836c57dc0_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
b566f557b7b1c2ea6115fed836c57dc0_JaffaCakes118.html
-
Size
64KB
-
MD5
b566f557b7b1c2ea6115fed836c57dc0
-
SHA1
5ea0ee1d1ea2ce956af70f0d9c7d5dfef73a3bca
-
SHA256
5d8fd50acb343e6ce54502be1722a17ed37e23c3cc9ec2f698741a6a8c97b32c
-
SHA512
157c902bedf66f933926332cb56fcc60147876d41cb439d86c4995aa2794959cb8d49299847e68eae156475553425f184303a6d46d7fc2427a28a5ce2a3a9e26
-
SSDEEP
1536:oRv/DpAu/ZMIP2qwQ9p5uw2QOGO/OvhIx96tbtbFElcXJsijJ6hwCfwlSB58fl3h:op/DpASqIjwQ9p5uw2kAhwVlSB58fl3h
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4396 msedge.exe 4396 msedge.exe 952 msedge.exe 952 msedge.exe 2004 identity_helper.exe 2004 identity_helper.exe 1708 msedge.exe 1708 msedge.exe 1708 msedge.exe 1708 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 952 msedge.exe 952 msedge.exe 952 msedge.exe 952 msedge.exe 952 msedge.exe 952 msedge.exe 952 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 952 msedge.exe 952 msedge.exe 952 msedge.exe 952 msedge.exe 952 msedge.exe 952 msedge.exe 952 msedge.exe 952 msedge.exe 952 msedge.exe 952 msedge.exe 952 msedge.exe 952 msedge.exe 952 msedge.exe 952 msedge.exe 952 msedge.exe 952 msedge.exe 952 msedge.exe 952 msedge.exe 952 msedge.exe 952 msedge.exe 952 msedge.exe 952 msedge.exe 952 msedge.exe 952 msedge.exe 952 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 952 msedge.exe 952 msedge.exe 952 msedge.exe 952 msedge.exe 952 msedge.exe 952 msedge.exe 952 msedge.exe 952 msedge.exe 952 msedge.exe 952 msedge.exe 952 msedge.exe 952 msedge.exe 952 msedge.exe 952 msedge.exe 952 msedge.exe 952 msedge.exe 952 msedge.exe 952 msedge.exe 952 msedge.exe 952 msedge.exe 952 msedge.exe 952 msedge.exe 952 msedge.exe 952 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 952 wrote to memory of 4720 952 msedge.exe 81 PID 952 wrote to memory of 4720 952 msedge.exe 81 PID 952 wrote to memory of 3244 952 msedge.exe 83 PID 952 wrote to memory of 3244 952 msedge.exe 83 PID 952 wrote to memory of 3244 952 msedge.exe 83 PID 952 wrote to memory of 3244 952 msedge.exe 83 PID 952 wrote to memory of 3244 952 msedge.exe 83 PID 952 wrote to memory of 3244 952 msedge.exe 83 PID 952 wrote to memory of 3244 952 msedge.exe 83 PID 952 wrote to memory of 3244 952 msedge.exe 83 PID 952 wrote to memory of 3244 952 msedge.exe 83 PID 952 wrote to memory of 3244 952 msedge.exe 83 PID 952 wrote to memory of 3244 952 msedge.exe 83 PID 952 wrote to memory of 3244 952 msedge.exe 83 PID 952 wrote to memory of 3244 952 msedge.exe 83 PID 952 wrote to memory of 3244 952 msedge.exe 83 PID 952 wrote to memory of 3244 952 msedge.exe 83 PID 952 wrote to memory of 3244 952 msedge.exe 83 PID 952 wrote to memory of 3244 952 msedge.exe 83 PID 952 wrote to memory of 3244 952 msedge.exe 83 PID 952 wrote to memory of 3244 952 msedge.exe 83 PID 952 wrote to memory of 3244 952 msedge.exe 83 PID 952 wrote to memory of 3244 952 msedge.exe 83 PID 952 wrote to memory of 3244 952 msedge.exe 83 PID 952 wrote to memory of 3244 952 msedge.exe 83 PID 952 wrote to memory of 3244 952 msedge.exe 83 PID 952 wrote to memory of 3244 952 msedge.exe 83 PID 952 wrote to memory of 3244 952 msedge.exe 83 PID 952 wrote to memory of 3244 952 msedge.exe 83 PID 952 wrote to memory of 3244 952 msedge.exe 83 PID 952 wrote to memory of 3244 952 msedge.exe 83 PID 952 wrote to memory of 3244 952 msedge.exe 83 PID 952 wrote to memory of 3244 952 msedge.exe 83 PID 952 wrote to memory of 3244 952 msedge.exe 83 PID 952 wrote to memory of 3244 952 msedge.exe 83 PID 952 wrote to memory of 3244 952 msedge.exe 83 PID 952 wrote to memory of 3244 952 msedge.exe 83 PID 952 wrote to memory of 3244 952 msedge.exe 83 PID 952 wrote to memory of 3244 952 msedge.exe 83 PID 952 wrote to memory of 3244 952 msedge.exe 83 PID 952 wrote to memory of 3244 952 msedge.exe 83 PID 952 wrote to memory of 3244 952 msedge.exe 83 PID 952 wrote to memory of 4396 952 msedge.exe 84 PID 952 wrote to memory of 4396 952 msedge.exe 84 PID 952 wrote to memory of 2576 952 msedge.exe 85 PID 952 wrote to memory of 2576 952 msedge.exe 85 PID 952 wrote to memory of 2576 952 msedge.exe 85 PID 952 wrote to memory of 2576 952 msedge.exe 85 PID 952 wrote to memory of 2576 952 msedge.exe 85 PID 952 wrote to memory of 2576 952 msedge.exe 85 PID 952 wrote to memory of 2576 952 msedge.exe 85 PID 952 wrote to memory of 2576 952 msedge.exe 85 PID 952 wrote to memory of 2576 952 msedge.exe 85 PID 952 wrote to memory of 2576 952 msedge.exe 85 PID 952 wrote to memory of 2576 952 msedge.exe 85 PID 952 wrote to memory of 2576 952 msedge.exe 85 PID 952 wrote to memory of 2576 952 msedge.exe 85 PID 952 wrote to memory of 2576 952 msedge.exe 85 PID 952 wrote to memory of 2576 952 msedge.exe 85 PID 952 wrote to memory of 2576 952 msedge.exe 85 PID 952 wrote to memory of 2576 952 msedge.exe 85 PID 952 wrote to memory of 2576 952 msedge.exe 85 PID 952 wrote to memory of 2576 952 msedge.exe 85 PID 952 wrote to memory of 2576 952 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\b566f557b7b1c2ea6115fed836c57dc0_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:952 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa98fa46f8,0x7ffa98fa4708,0x7ffa98fa47182⤵PID:4720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,12886521184578563171,14004042190441229824,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2196 /prefetch:22⤵PID:3244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2060,12886521184578563171,14004042190441229824,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2284 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2060,12886521184578563171,14004042190441229824,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2544 /prefetch:82⤵PID:2576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,12886521184578563171,14004042190441229824,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3200 /prefetch:12⤵PID:2972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,12886521184578563171,14004042190441229824,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:1060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,12886521184578563171,14004042190441229824,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4876 /prefetch:12⤵PID:1340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,12886521184578563171,14004042190441229824,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5944 /prefetch:12⤵PID:944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,12886521184578563171,14004042190441229824,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5928 /prefetch:12⤵PID:2976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,12886521184578563171,14004042190441229824,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5560 /prefetch:82⤵PID:4056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,12886521184578563171,14004042190441229824,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5560 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,12886521184578563171,14004042190441229824,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4152 /prefetch:12⤵PID:3180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,12886521184578563171,14004042190441229824,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4236 /prefetch:12⤵PID:3488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,12886521184578563171,14004042190441229824,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5604 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1708
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4212
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4740
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD581e892ca5c5683efdf9135fe0f2adb15
SHA139159b30226d98a465ece1da28dc87088b20ecad
SHA256830f394548cff6eed3608476190a7ee7d65fe651adc638c5b27ce58639a91e17
SHA512c943f4cfe8615ac159cfac13c10b67e6c0c9093851dd3ac6dda3b82e195d3554e3c37962010a2d0ae5074828d376402624f0dda5499c9997e962e4cfd26444c0
-
Filesize
152B
MD556067634f68231081c4bd5bdbfcc202f
SHA15582776da6ffc75bb0973840fc3d15598bc09eb1
SHA2568c08b0cbceb301c8f960aa674c6e7f6dbf40b4a1c2684e6fb0456ec5ff0e56b4
SHA512c4657393e0b9ec682570d7e251644a858d33e056ccd0f3eebffd0fde25244b3a699b8d9244bcdac00d6f74b49833629b270e099c2b557f729a9066922583f784
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize336B
MD525614a7e25b03b52e2fa87edd58cc599
SHA19cf9d4606ae38f3eebbcd38ae5eb72c8490d2020
SHA2566be137904cab4772eee8b0c42497b2038a9c971c2e0206260cb4a55c9b4d328c
SHA51248020216223e98ad74338f1f6a5632c634e2ab201f0c20e0cff6ed979eeb6372ab19928da15372e5cdb7dbc420b85e8725f431f18a1eb5f382c6f393dae26ac6
-
Filesize
484B
MD51bfb8bd9c01f1fea4d0afbbf2af1e7d4
SHA1b4482e207d23b4675b6695cf7867308b3b6cb149
SHA256650398f6a0c21196b7e30e48e73c57fb0a33aa8edf8897a33db08acb19c9c1ec
SHA512aacde83b72adf9df7ec03382995ef2d802740e7cd62b3e9453339913f4ed934c024e5411a523d8b68aed1cf4045e60e93c223061b29c3f55723255e3c7145196
-
Filesize
6KB
MD534b1c7ce856b896c03005c9aacc54ca5
SHA179b9d9e88449782200772b9be600128ae286f797
SHA256e8012d04579e8b8a37c56a5df46c5c81b501ea2ce9d2376aeda688153037166e
SHA51227b8edccc4a1757e4edcfdf0bcaa99f9a5425f57b54f0898a3b5816aee122986f8bcf3df5d1a35da13adba0cc0b6178bad57e8b2e3b60a10a15a57c54294c4ea
-
Filesize
6KB
MD5fd7d01fc83d45fced07ce57c3c6a37a9
SHA1c6797f0f2e432d75c7d86e49d7c2a1b8a0b36f39
SHA25659e0b7a4aad7c8c9a2d8c6cc6a8ff2ad819c200df7f9ce85c27260b1b0b22227
SHA512d02df01781ed7b2f53e37a2264e22a23e6adb7e4de48e320aec5d9a00e978ed0bacd653d8746cf697567b90bc629ff1298db51b9435c934b5934ec2ee4afe52e
-
Filesize
6KB
MD5288d22da9c39f560b6555ea00948716a
SHA115c7fc69ce30e2196d36da354195dbd40c9f349d
SHA256de3146fa311155beab959c4b6df38bc23057bf52c448cbbf34e371efd22b09ec
SHA5124397b4b8d4855e1f92155a9e3f83db84807b3ddf900ee936ce62b5010f45214e3de1c9fc8a65518246bbe744d6869ace79c3eb108138e6703c87e65f74481d48
-
Filesize
372B
MD5e393159e7b1a5e4a1a4c309d67bd1f06
SHA187cd55f4ec3dd4f8613ce0eb658b2e04f733c3f4
SHA256f8b755d9fbe557a817e1900f870670ecf4eb9c41a770cbb58ebf11f2f15ae57f
SHA51254eb47ae0b573b1096016bb857ce626158df84adedeff3e8aed049ce93839779b3e79e1835d1cf380b7398522dcfd60bfb8c19787555dc09dc6ffbb8a9c3c961
-
Filesize
204B
MD57652a32d090f69fe3f99cf1da9165161
SHA1272832cda334e6399448c4420999b840f1a76713
SHA2566b04e469add771a64bc3b07d71b51582187a2829fda83e1ca8b1e5daf7ac9ce0
SHA5125885b22c7e0e31682af306668f121174cbbd99145c8acd3003fe079892ae9480ca0e82af9f89c435e686ebbc42ade4e5f36adc8935189454641b47bc58b79882
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD515f15bd4d18bab1f82b52198ad5c4ad9
SHA1e53f188dffe8539cdc5df417ef0d5bc6ebaad5f1
SHA256ae4908a02d448208b18990d8aa7af6edffe0027e51823864ef180eaf05daae58
SHA5129719542d788e9cdfa832832153815b966f6315fb7e8dcd1fb42bba3e04dfd8d50e72d05d3982ea34b8a1c0f075ef8e6308d30ab65420c5691b88c1096d6dfeaa