Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
16-06-2024 18:29
Static task
static1
Behavioral task
behavioral1
Sample
b49237cd5676e454ef813021033ebdac_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
b49237cd5676e454ef813021033ebdac_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
b49237cd5676e454ef813021033ebdac_JaffaCakes118.html
-
Size
74KB
-
MD5
b49237cd5676e454ef813021033ebdac
-
SHA1
5f7bb171f2033ec45ef12da301c86af58ecbf3c2
-
SHA256
f0ce37a67b61447b2e10e625dda4e197a08920a5e21bf82baf2da272ea0c2a76
-
SHA512
2d1ac73f612d53b359ba9538e687ba9296e336c10bf6b35bafcfa0e2414efb7c649bd823d65ec27b8cf95725a63411f74545431ce238e6c1e648d86738ba6647
-
SSDEEP
1536:/Jzt89+8l+8e+8le+8T+8y+8WsNtv5ZJZFRHZ18sH1KInovFa7y+cTL2HZ85YAdv:Bz3Nx5ZJZFRHZ1j8+cTLz
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1408 msedge.exe 1408 msedge.exe 1696 msedge.exe 1696 msedge.exe 4448 identity_helper.exe 4448 identity_helper.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe 1696 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1696 wrote to memory of 4728 1696 msedge.exe 81 PID 1696 wrote to memory of 4728 1696 msedge.exe 81 PID 1696 wrote to memory of 2336 1696 msedge.exe 82 PID 1696 wrote to memory of 2336 1696 msedge.exe 82 PID 1696 wrote to memory of 2336 1696 msedge.exe 82 PID 1696 wrote to memory of 2336 1696 msedge.exe 82 PID 1696 wrote to memory of 2336 1696 msedge.exe 82 PID 1696 wrote to memory of 2336 1696 msedge.exe 82 PID 1696 wrote to memory of 2336 1696 msedge.exe 82 PID 1696 wrote to memory of 2336 1696 msedge.exe 82 PID 1696 wrote to memory of 2336 1696 msedge.exe 82 PID 1696 wrote to memory of 2336 1696 msedge.exe 82 PID 1696 wrote to memory of 2336 1696 msedge.exe 82 PID 1696 wrote to memory of 2336 1696 msedge.exe 82 PID 1696 wrote to memory of 2336 1696 msedge.exe 82 PID 1696 wrote to memory of 2336 1696 msedge.exe 82 PID 1696 wrote to memory of 2336 1696 msedge.exe 82 PID 1696 wrote to memory of 2336 1696 msedge.exe 82 PID 1696 wrote to memory of 2336 1696 msedge.exe 82 PID 1696 wrote to memory of 2336 1696 msedge.exe 82 PID 1696 wrote to memory of 2336 1696 msedge.exe 82 PID 1696 wrote to memory of 2336 1696 msedge.exe 82 PID 1696 wrote to memory of 2336 1696 msedge.exe 82 PID 1696 wrote to memory of 2336 1696 msedge.exe 82 PID 1696 wrote to memory of 2336 1696 msedge.exe 82 PID 1696 wrote to memory of 2336 1696 msedge.exe 82 PID 1696 wrote to memory of 2336 1696 msedge.exe 82 PID 1696 wrote to memory of 2336 1696 msedge.exe 82 PID 1696 wrote to memory of 2336 1696 msedge.exe 82 PID 1696 wrote to memory of 2336 1696 msedge.exe 82 PID 1696 wrote to memory of 2336 1696 msedge.exe 82 PID 1696 wrote to memory of 2336 1696 msedge.exe 82 PID 1696 wrote to memory of 2336 1696 msedge.exe 82 PID 1696 wrote to memory of 2336 1696 msedge.exe 82 PID 1696 wrote to memory of 2336 1696 msedge.exe 82 PID 1696 wrote to memory of 2336 1696 msedge.exe 82 PID 1696 wrote to memory of 2336 1696 msedge.exe 82 PID 1696 wrote to memory of 2336 1696 msedge.exe 82 PID 1696 wrote to memory of 2336 1696 msedge.exe 82 PID 1696 wrote to memory of 2336 1696 msedge.exe 82 PID 1696 wrote to memory of 2336 1696 msedge.exe 82 PID 1696 wrote to memory of 2336 1696 msedge.exe 82 PID 1696 wrote to memory of 1408 1696 msedge.exe 83 PID 1696 wrote to memory of 1408 1696 msedge.exe 83 PID 1696 wrote to memory of 3624 1696 msedge.exe 84 PID 1696 wrote to memory of 3624 1696 msedge.exe 84 PID 1696 wrote to memory of 3624 1696 msedge.exe 84 PID 1696 wrote to memory of 3624 1696 msedge.exe 84 PID 1696 wrote to memory of 3624 1696 msedge.exe 84 PID 1696 wrote to memory of 3624 1696 msedge.exe 84 PID 1696 wrote to memory of 3624 1696 msedge.exe 84 PID 1696 wrote to memory of 3624 1696 msedge.exe 84 PID 1696 wrote to memory of 3624 1696 msedge.exe 84 PID 1696 wrote to memory of 3624 1696 msedge.exe 84 PID 1696 wrote to memory of 3624 1696 msedge.exe 84 PID 1696 wrote to memory of 3624 1696 msedge.exe 84 PID 1696 wrote to memory of 3624 1696 msedge.exe 84 PID 1696 wrote to memory of 3624 1696 msedge.exe 84 PID 1696 wrote to memory of 3624 1696 msedge.exe 84 PID 1696 wrote to memory of 3624 1696 msedge.exe 84 PID 1696 wrote to memory of 3624 1696 msedge.exe 84 PID 1696 wrote to memory of 3624 1696 msedge.exe 84 PID 1696 wrote to memory of 3624 1696 msedge.exe 84 PID 1696 wrote to memory of 3624 1696 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\b49237cd5676e454ef813021033ebdac_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff97ed846f8,0x7ff97ed84708,0x7ff97ed847182⤵PID:4728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,8022777843858532492,15883105205165984931,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵PID:2336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,8022777843858532492,15883105205165984931,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2156 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2080,8022777843858532492,15883105205165984931,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2652 /prefetch:82⤵PID:3624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,8022777843858532492,15883105205165984931,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:4804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,8022777843858532492,15883105205165984931,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:1548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,8022777843858532492,15883105205165984931,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5104 /prefetch:12⤵PID:4696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,8022777843858532492,15883105205165984931,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5592 /prefetch:82⤵PID:4516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,8022777843858532492,15883105205165984931,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5592 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,8022777843858532492,15883105205165984931,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4984 /prefetch:12⤵PID:5112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,8022777843858532492,15883105205165984931,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4948 /prefetch:12⤵PID:5108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,8022777843858532492,15883105205165984931,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4116 /prefetch:12⤵PID:4864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,8022777843858532492,15883105205165984931,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5796 /prefetch:12⤵PID:4496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,8022777843858532492,15883105205165984931,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2720 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4000
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4484
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4148
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4900
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD581e892ca5c5683efdf9135fe0f2adb15
SHA139159b30226d98a465ece1da28dc87088b20ecad
SHA256830f394548cff6eed3608476190a7ee7d65fe651adc638c5b27ce58639a91e17
SHA512c943f4cfe8615ac159cfac13c10b67e6c0c9093851dd3ac6dda3b82e195d3554e3c37962010a2d0ae5074828d376402624f0dda5499c9997e962e4cfd26444c0
-
Filesize
152B
MD556067634f68231081c4bd5bdbfcc202f
SHA15582776da6ffc75bb0973840fc3d15598bc09eb1
SHA2568c08b0cbceb301c8f960aa674c6e7f6dbf40b4a1c2684e6fb0456ec5ff0e56b4
SHA512c4657393e0b9ec682570d7e251644a858d33e056ccd0f3eebffd0fde25244b3a699b8d9244bcdac00d6f74b49833629b270e099c2b557f729a9066922583f784
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\58f1a99b-2844-4388-9855-afc8d2380c17.tmp
Filesize2KB
MD5bc63969da639be1132799af6ca463612
SHA1e5c3ab0200310ca9b31deacd26defbce5ba29ef3
SHA256bde81b5439fd29dca4caf79aa46ddb873acaaf81906c715f8da3f20395bb66da
SHA5129c58206b1a24a2f4d19477699e07361c96226ab71d9247e8e8555328a67139b153a3244ce18b1248e2c61dfa76d855d62fc5f414853416192c2a3eea5c779e9a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize216B
MD52fab38f833a496b12a5e2364bd600056
SHA128978445b48a132df75f48a559adb92e115f8fb7
SHA256120e9e18fc53550e0b9ab67c2e58ba68ffc5738ff357f36e56fdbfb37d14a75b
SHA512144cf5630c2c3ecd82c267db6f8504b8bce94fb6a53e710b21f0c24e0d83a692d59492b0f9db050e4ef66c8ad3917cca6ab21b23f704697d12a963857454b37e
-
Filesize
2KB
MD5506f350bff2d2090bc13163c331cb076
SHA13074fbaf93240b505561764e971330f85cef5b12
SHA2564af5535e2ed6f99d7767b239cb3bcd72dd3fee11f2efc0c530bd281b5e8c4395
SHA512a307eccd7a6328703d0ba5d5f530996d322ffbb5c7685a97c3b475b636baa472f52fa1058cd3f4f48b1b272ac543dc5de004928d9de564d49cb3564441e536dc
-
Filesize
6KB
MD5fb8fee1b980f5ceb85825251c3c8e728
SHA15ee29d0c48a0cb55667b2b9fec634499ee9e638f
SHA256eeabc223849a396530fecc63d0d7926ff49a1d91728213aeb124ac3ecab55ac4
SHA5129b01924a763df5ad711709b1fc35c1f68a3df172edcf11663e89923764f4409f19915c35c61223ab3fbdd094e7de95b1cc1e8e0a95a4957e78fbac6dc61b8c5c
-
Filesize
6KB
MD55c75ef669b02148b2eea0e9d771ecf06
SHA10c7518f88db0dc018a2357ba9c7b7948272ccb00
SHA2569c6c29671b796c5b0c2d4882e7fca07a168a223e137245eb670bcabc8bab4563
SHA512dcd36ad5ac8e3bb449bc03f4457c6d78bbc242bd77df0a8e5255efd140ceb53af57fbd19b5cd26a6092803ffdbc63c2b697de8c682687a8f01b6b271542b95e4
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD550d5ea1f94b55779144eb4b8a1b164de
SHA1fe4ed22fef9c9a2cf9b14af625df417e8b787b91
SHA256b5cd19b6e1720bb9c991af59b0e7326d9b4b3b7ef94cacfe854ed1fb9c4ee152
SHA5121b8e0cce0c3b9853abb92c3dab31b996cbc63d23db6bdf234d324437317a02ea9bba8b2fff82a0cb13f60bbc187eba632f8e1ed24903a36ba1b87d07246c840f