Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
27/06/2024, 14:34
Static task
static1
Behavioral task
behavioral1
Sample
16593077ae35b54110a9c4e319295909_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
16593077ae35b54110a9c4e319295909_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
16593077ae35b54110a9c4e319295909_JaffaCakes118.html
-
Size
57KB
-
MD5
16593077ae35b54110a9c4e319295909
-
SHA1
e1bf444711d701c4dc303da9edd96bfe6bc00c91
-
SHA256
c23070e8029340d8decc3f7b20986b563ac159a3fd54abd54fd2aeb489b01c0e
-
SHA512
962f51100779c562be03cda3764b699e576f8fbdf03c914c1c36398ecdc27769fc1bdd08e7c27d80685d84ad69ea03622c31159a80aa11337581f420d83bf880
-
SSDEEP
1536:ijEQvK8OPHdyAmo2vgyHJv0owbd6zKD6CDK2RVrolewpDK2RVy:ijnOPHdyw2vgyHJutDK2RVrolewpDK2m
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2996 msedge.exe 2996 msedge.exe 3628 msedge.exe 3628 msedge.exe 832 identity_helper.exe 832 identity_helper.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3628 wrote to memory of 4248 3628 msedge.exe 80 PID 3628 wrote to memory of 4248 3628 msedge.exe 80 PID 3628 wrote to memory of 804 3628 msedge.exe 81 PID 3628 wrote to memory of 804 3628 msedge.exe 81 PID 3628 wrote to memory of 804 3628 msedge.exe 81 PID 3628 wrote to memory of 804 3628 msedge.exe 81 PID 3628 wrote to memory of 804 3628 msedge.exe 81 PID 3628 wrote to memory of 804 3628 msedge.exe 81 PID 3628 wrote to memory of 804 3628 msedge.exe 81 PID 3628 wrote to memory of 804 3628 msedge.exe 81 PID 3628 wrote to memory of 804 3628 msedge.exe 81 PID 3628 wrote to memory of 804 3628 msedge.exe 81 PID 3628 wrote to memory of 804 3628 msedge.exe 81 PID 3628 wrote to memory of 804 3628 msedge.exe 81 PID 3628 wrote to memory of 804 3628 msedge.exe 81 PID 3628 wrote to memory of 804 3628 msedge.exe 81 PID 3628 wrote to memory of 804 3628 msedge.exe 81 PID 3628 wrote to memory of 804 3628 msedge.exe 81 PID 3628 wrote to memory of 804 3628 msedge.exe 81 PID 3628 wrote to memory of 804 3628 msedge.exe 81 PID 3628 wrote to memory of 804 3628 msedge.exe 81 PID 3628 wrote to memory of 804 3628 msedge.exe 81 PID 3628 wrote to memory of 804 3628 msedge.exe 81 PID 3628 wrote to memory of 804 3628 msedge.exe 81 PID 3628 wrote to memory of 804 3628 msedge.exe 81 PID 3628 wrote to memory of 804 3628 msedge.exe 81 PID 3628 wrote to memory of 804 3628 msedge.exe 81 PID 3628 wrote to memory of 804 3628 msedge.exe 81 PID 3628 wrote to memory of 804 3628 msedge.exe 81 PID 3628 wrote to memory of 804 3628 msedge.exe 81 PID 3628 wrote to memory of 804 3628 msedge.exe 81 PID 3628 wrote to memory of 804 3628 msedge.exe 81 PID 3628 wrote to memory of 804 3628 msedge.exe 81 PID 3628 wrote to memory of 804 3628 msedge.exe 81 PID 3628 wrote to memory of 804 3628 msedge.exe 81 PID 3628 wrote to memory of 804 3628 msedge.exe 81 PID 3628 wrote to memory of 804 3628 msedge.exe 81 PID 3628 wrote to memory of 804 3628 msedge.exe 81 PID 3628 wrote to memory of 804 3628 msedge.exe 81 PID 3628 wrote to memory of 804 3628 msedge.exe 81 PID 3628 wrote to memory of 804 3628 msedge.exe 81 PID 3628 wrote to memory of 804 3628 msedge.exe 81 PID 3628 wrote to memory of 2996 3628 msedge.exe 82 PID 3628 wrote to memory of 2996 3628 msedge.exe 82 PID 3628 wrote to memory of 1684 3628 msedge.exe 83 PID 3628 wrote to memory of 1684 3628 msedge.exe 83 PID 3628 wrote to memory of 1684 3628 msedge.exe 83 PID 3628 wrote to memory of 1684 3628 msedge.exe 83 PID 3628 wrote to memory of 1684 3628 msedge.exe 83 PID 3628 wrote to memory of 1684 3628 msedge.exe 83 PID 3628 wrote to memory of 1684 3628 msedge.exe 83 PID 3628 wrote to memory of 1684 3628 msedge.exe 83 PID 3628 wrote to memory of 1684 3628 msedge.exe 83 PID 3628 wrote to memory of 1684 3628 msedge.exe 83 PID 3628 wrote to memory of 1684 3628 msedge.exe 83 PID 3628 wrote to memory of 1684 3628 msedge.exe 83 PID 3628 wrote to memory of 1684 3628 msedge.exe 83 PID 3628 wrote to memory of 1684 3628 msedge.exe 83 PID 3628 wrote to memory of 1684 3628 msedge.exe 83 PID 3628 wrote to memory of 1684 3628 msedge.exe 83 PID 3628 wrote to memory of 1684 3628 msedge.exe 83 PID 3628 wrote to memory of 1684 3628 msedge.exe 83 PID 3628 wrote to memory of 1684 3628 msedge.exe 83 PID 3628 wrote to memory of 1684 3628 msedge.exe 83
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\16593077ae35b54110a9c4e319295909_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3628 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa54ff46f8,0x7ffa54ff4708,0x7ffa54ff47182⤵PID:4248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,6872385020768139593,1551586467135275737,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2164 /prefetch:22⤵PID:804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,6872385020768139593,1551586467135275737,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2344 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,6872385020768139593,1551586467135275737,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2656 /prefetch:82⤵PID:1684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,6872385020768139593,1551586467135275737,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,6872385020768139593,1551586467135275737,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:1772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,6872385020768139593,1551586467135275737,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4904 /prefetch:12⤵PID:4800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,6872385020768139593,1551586467135275737,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5304 /prefetch:12⤵PID:4860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,6872385020768139593,1551586467135275737,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4728 /prefetch:12⤵PID:3724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,6872385020768139593,1551586467135275737,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5684 /prefetch:12⤵PID:4696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,6872385020768139593,1551586467135275737,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5988 /prefetch:82⤵PID:376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,6872385020768139593,1551586467135275737,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5988 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,6872385020768139593,1551586467135275737,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6060 /prefetch:12⤵PID:2356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,6872385020768139593,1551586467135275737,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6068 /prefetch:12⤵PID:3148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,6872385020768139593,1551586467135275737,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6288 /prefetch:12⤵PID:4592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,6872385020768139593,1551586467135275737,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6308 /prefetch:12⤵PID:4768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,6872385020768139593,1551586467135275737,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3128 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3892
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2100
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4556
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize696B
MD56021f6882a86f2b1b0b1716b69efbd6a
SHA1735f1aaf718e7f049aee2d4816add8909844c124
SHA25616ac37f4909e76bea98cbc1cb5758e9cf066274a5e286d4d046ee6dfd7fa275a
SHA512c587eecf54c29b446e3a70f97729e510086eac17dc2960afc65fa58c84847f098ac5c5ed7e35470056417158bf26a732990b023cf20d2e1e71ef343d73d70708
-
Filesize
1KB
MD5d5d735899fbe1c70890b198ba2421254
SHA1fb1bbdfd87f1e9bb802bf0f42d3a7a4e328d7923
SHA256e7705d6ea910ca9987e9277eb1f699349b5f2c7ced0bfbd10bc61a055835d297
SHA512417b1f7fade9569d73ed47f184bcded9b7f14ea32a9558455c85116e42997bee99d55094e6848fe856f8183fe177aedfdf51a9452c6ac689c25e02a9eb6b6763
-
Filesize
5KB
MD56eaf4133e25ee96eb13963aac0ecac5d
SHA10ef674c7339caa0b8f03d136b6d9c5e1da9e0b07
SHA2560314c724ca6f1f573ba4fbaba0036b41601d3c1005947663a533d550f8bacc9d
SHA51251cdebbcced0068450314a3f9862ae9644fe882ccb0df81208f5af73083b86b9a2d8b510a0c4e15455771359080f2880cdd740074ae0f78deb62021baebce3cd
-
Filesize
6KB
MD5d16cfbec33b356cd923aed070fcabee9
SHA1ba0ed60aa1adf434607da6bfa9f0b572a8d22ce8
SHA25616b2c8b9cc837cacaf7800826f72e19a1b59dff949e516c52c09e9e0012ed05c
SHA512989943eb41027464517f7f13e456a5f5474262301b19d22401184e35947ca5452a76b614aa6178be402ced94ef71f059293592571e481641462f5addcb966ed8
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
10KB
MD5a9023ce0d454ebc61dd76ca5e3169026
SHA16e8bce69c9a22f990a926beb835354f52cc28477
SHA2561366cf61ca2d0b78775a0091106b246092692eee7f871c78ae6de1a5d2d3b8bc
SHA5125726c693bf904b93ef0cde4d3c48242486624e33a4b1c7e57a3a817573b5f58d83b1af5b4ea6f6981ebd14175ccff204360a79adb6f07950f27fe9697f08fe29