Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
17-06-2024 02:54
Static task
static1
Behavioral task
behavioral1
Sample
b674275c6b9bfbedca9852053fab2e8c_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b674275c6b9bfbedca9852053fab2e8c_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
b674275c6b9bfbedca9852053fab2e8c_JaffaCakes118.html
-
Size
19KB
-
MD5
b674275c6b9bfbedca9852053fab2e8c
-
SHA1
d1b30e18e5c6db041c4aa77700340912441359f5
-
SHA256
8c7e96526d2723f42ade5d00212e6dc4bd1605f12479d69eac8deb6085975431
-
SHA512
5ea92b8c4061d6bf5162511f52f2070f4a6a1b2df838b2b45371e54633e06a0d152ea77614091911066a768eeea88bae48b2b2296c00a157fe0748ca1b02edbb
-
SSDEEP
384:ziwGKhgES6VBD8cCQ3RHpYQGi1emLsXucfIk9xheZ7zVc9CW:zi8S6gcF3J1GzmFOIk9eZXqCW
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2140 msedge.exe 2140 msedge.exe 3352 msedge.exe 3352 msedge.exe 3232 identity_helper.exe 3232 identity_helper.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe 2412 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3352 wrote to memory of 4420 3352 msedge.exe 82 PID 3352 wrote to memory of 4420 3352 msedge.exe 82 PID 3352 wrote to memory of 1344 3352 msedge.exe 83 PID 3352 wrote to memory of 1344 3352 msedge.exe 83 PID 3352 wrote to memory of 1344 3352 msedge.exe 83 PID 3352 wrote to memory of 1344 3352 msedge.exe 83 PID 3352 wrote to memory of 1344 3352 msedge.exe 83 PID 3352 wrote to memory of 1344 3352 msedge.exe 83 PID 3352 wrote to memory of 1344 3352 msedge.exe 83 PID 3352 wrote to memory of 1344 3352 msedge.exe 83 PID 3352 wrote to memory of 1344 3352 msedge.exe 83 PID 3352 wrote to memory of 1344 3352 msedge.exe 83 PID 3352 wrote to memory of 1344 3352 msedge.exe 83 PID 3352 wrote to memory of 1344 3352 msedge.exe 83 PID 3352 wrote to memory of 1344 3352 msedge.exe 83 PID 3352 wrote to memory of 1344 3352 msedge.exe 83 PID 3352 wrote to memory of 1344 3352 msedge.exe 83 PID 3352 wrote to memory of 1344 3352 msedge.exe 83 PID 3352 wrote to memory of 1344 3352 msedge.exe 83 PID 3352 wrote to memory of 1344 3352 msedge.exe 83 PID 3352 wrote to memory of 1344 3352 msedge.exe 83 PID 3352 wrote to memory of 1344 3352 msedge.exe 83 PID 3352 wrote to memory of 1344 3352 msedge.exe 83 PID 3352 wrote to memory of 1344 3352 msedge.exe 83 PID 3352 wrote to memory of 1344 3352 msedge.exe 83 PID 3352 wrote to memory of 1344 3352 msedge.exe 83 PID 3352 wrote to memory of 1344 3352 msedge.exe 83 PID 3352 wrote to memory of 1344 3352 msedge.exe 83 PID 3352 wrote to memory of 1344 3352 msedge.exe 83 PID 3352 wrote to memory of 1344 3352 msedge.exe 83 PID 3352 wrote to memory of 1344 3352 msedge.exe 83 PID 3352 wrote to memory of 1344 3352 msedge.exe 83 PID 3352 wrote to memory of 1344 3352 msedge.exe 83 PID 3352 wrote to memory of 1344 3352 msedge.exe 83 PID 3352 wrote to memory of 1344 3352 msedge.exe 83 PID 3352 wrote to memory of 1344 3352 msedge.exe 83 PID 3352 wrote to memory of 1344 3352 msedge.exe 83 PID 3352 wrote to memory of 1344 3352 msedge.exe 83 PID 3352 wrote to memory of 1344 3352 msedge.exe 83 PID 3352 wrote to memory of 1344 3352 msedge.exe 83 PID 3352 wrote to memory of 1344 3352 msedge.exe 83 PID 3352 wrote to memory of 1344 3352 msedge.exe 83 PID 3352 wrote to memory of 2140 3352 msedge.exe 84 PID 3352 wrote to memory of 2140 3352 msedge.exe 84 PID 3352 wrote to memory of 2544 3352 msedge.exe 85 PID 3352 wrote to memory of 2544 3352 msedge.exe 85 PID 3352 wrote to memory of 2544 3352 msedge.exe 85 PID 3352 wrote to memory of 2544 3352 msedge.exe 85 PID 3352 wrote to memory of 2544 3352 msedge.exe 85 PID 3352 wrote to memory of 2544 3352 msedge.exe 85 PID 3352 wrote to memory of 2544 3352 msedge.exe 85 PID 3352 wrote to memory of 2544 3352 msedge.exe 85 PID 3352 wrote to memory of 2544 3352 msedge.exe 85 PID 3352 wrote to memory of 2544 3352 msedge.exe 85 PID 3352 wrote to memory of 2544 3352 msedge.exe 85 PID 3352 wrote to memory of 2544 3352 msedge.exe 85 PID 3352 wrote to memory of 2544 3352 msedge.exe 85 PID 3352 wrote to memory of 2544 3352 msedge.exe 85 PID 3352 wrote to memory of 2544 3352 msedge.exe 85 PID 3352 wrote to memory of 2544 3352 msedge.exe 85 PID 3352 wrote to memory of 2544 3352 msedge.exe 85 PID 3352 wrote to memory of 2544 3352 msedge.exe 85 PID 3352 wrote to memory of 2544 3352 msedge.exe 85 PID 3352 wrote to memory of 2544 3352 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\b674275c6b9bfbedca9852053fab2e8c_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3352 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb60b546f8,0x7ffb60b54708,0x7ffb60b547182⤵PID:4420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,5784378938925279782,10043189760437033416,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2180 /prefetch:22⤵PID:1344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,5784378938925279782,10043189760437033416,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2232 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2136,5784378938925279782,10043189760437033416,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2808 /prefetch:82⤵PID:2544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,5784378938925279782,10043189760437033416,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3208 /prefetch:12⤵PID:3980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,5784378938925279782,10043189760437033416,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:4900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,5784378938925279782,10043189760437033416,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4700 /prefetch:12⤵PID:2736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,5784378938925279782,10043189760437033416,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5320 /prefetch:82⤵PID:4056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,5784378938925279782,10043189760437033416,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5320 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,5784378938925279782,10043189760437033416,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=180 /prefetch:12⤵PID:2892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,5784378938925279782,10043189760437033416,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5408 /prefetch:12⤵PID:1028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,5784378938925279782,10043189760437033416,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4776 /prefetch:12⤵PID:1048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,5784378938925279782,10043189760437033416,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4812 /prefetch:12⤵PID:2440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,5784378938925279782,10043189760437033416,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5020 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2412
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1756
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5028
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5477462b6ad8eaaf8d38f5e3a4daf17b0
SHA186174e670c44767c08a39cc2a53c09c318326201
SHA256e6bbd4933b9baa1df4bb633319174de07db176ec215e71c8568d27c5c577184d
SHA512a0acc2ef7fd0fcf413572eeb94d1e38aa6a682195cc03d6eaaaa0bc9e5f4b2c0033da0b835f4617aebc52069d0a10b52fc31ed53c2fe7943a480b55b7481dd4e
-
Filesize
152B
MD5b704c9ca0493bd4548ac9c69dc4a4f27
SHA1a3e5e54e630dabe55ca18a798d9f5681e0620ba7
SHA2562ebd5229b9dc642afba36a27c7ac12d90196b1c50985c37e94f4c17474e15411
SHA51269c8116fb542b344a8c55e2658078bd3e0d3564b1e4c889b072dbc99d2b070dacbc4394dedbc22a4968a8cf9448e71f69ec71ded018c1bacc0e195b3b3072d32
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD5bd303024e2d1781db41dd9da0f4f2937
SHA12214004a5c7c2569ca21826e22bf99818556dbca
SHA256ddd297be6f8e383f33d11532014030a221a3b9513d4196616854b6d9c55909f2
SHA51254b8c216ff8297e505ce80c940c426916741b6980a85b07c7678a026803ed156d549763ba26a4b39c8e59339a01db34c8fcb0802a74edbb34e3fc72aacc0c928
-
Filesize
401B
MD5d11d15f278780e3b7bf9d3224d8172c0
SHA1bc594e815cff8c283865493ba25de892455256bc
SHA2562e785d0018024d578bf98d977f35b5711c3f40c0d10c9945d4b6a4839530ea0d
SHA51217289f14d85c1b1a1a919dcf102b692838716b807f5962cbc820a21bfe3ec25a0d4731a0ece6e5f69686ab0841d12589b3bbe8c6be7be0372b81a5cc29ed6781
-
Filesize
6KB
MD50de594f6b8ee44312c7fb9afd1395d71
SHA1882e07fa093dab7380c5da2d905d8d098dbd9865
SHA256d2906fd348c27224560b53592ba35dbd6a4c83a64d55c15dea62b347fe1e44a9
SHA512d330fe2543728b41fe22b310063c7bdfd024c466e5ee55fc4520813e12aa74d344adcc0cbf3fb498f96bd5a9a4947c85f479995b74950b9ddfa972549b1a41c5
-
Filesize
6KB
MD5990c0cd915c2ee68d4210343f61dce81
SHA1a39380ef9e99b02d077821227740ac40415f796d
SHA2562a5788c7c9a86891b7245004288ad78f1bad8b720148112bb8c7095ad79eb9de
SHA512fb06e11bc7bbfe3800c5c963ab9439634108f272b1eb6d591409ea5be18d5453cc64c8fc63c4a4e0ead6d5314e39819ae62390231d2e29e1e84d0214283412a9
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5d33a1c0e4e5012a13a9557c9cd8f30be
SHA11a37aef6bb533cceaa840a7fa2e3096750421e18
SHA256627f59479413e9dff339444d8daf88137879cf20456f7cc6e9b9e3869728c343
SHA512ce5e6d2f90df8c59e8fc5e9dff2aa070c0d0b96c8c496a9207f0ed1d499fd2283ec5aeab5a4bb8baa20c59dbd75f43c60e858824039e2dff2b147514116fcc46