Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
03/07/2024, 07:24
Static task
static1
Behavioral task
behavioral1
Sample
218592ce4362e6d6adb515d838892d1d_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
218592ce4362e6d6adb515d838892d1d_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
218592ce4362e6d6adb515d838892d1d_JaffaCakes118.html
-
Size
13KB
-
MD5
218592ce4362e6d6adb515d838892d1d
-
SHA1
bcb5a3af5cda3468a9cc6d2c892d108c39187f4b
-
SHA256
d72d9eab99ad5a77b517d5f99300a2392fc4d54d89f4765f76dbbcc4d6b323c3
-
SHA512
f08be4391c27b46aff3d56e48309359c6b9caf9ac7678e75807447dda7a2dea5f5f54b0d510c0e95257093c42c5f844b8fe1df5fc6916bdab40fa7259afbfa56
-
SSDEEP
192:FJRBfhN5jcBF8c4pXLcWJ2gdoq91guxLZD4Z0yBUKuTmdadZsbIipCbwy+Hoylmf:FJRdhcsc5Q2q1nxLaLUKuTmdR0iJ2
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4180 msedge.exe 4180 msedge.exe 320 msedge.exe 320 msedge.exe 812 identity_helper.exe 812 identity_helper.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 320 msedge.exe 320 msedge.exe 320 msedge.exe 320 msedge.exe 320 msedge.exe 320 msedge.exe 320 msedge.exe 320 msedge.exe 320 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 320 msedge.exe 320 msedge.exe 320 msedge.exe 320 msedge.exe 320 msedge.exe 320 msedge.exe 320 msedge.exe 320 msedge.exe 320 msedge.exe 320 msedge.exe 320 msedge.exe 320 msedge.exe 320 msedge.exe 320 msedge.exe 320 msedge.exe 320 msedge.exe 320 msedge.exe 320 msedge.exe 320 msedge.exe 320 msedge.exe 320 msedge.exe 320 msedge.exe 320 msedge.exe 320 msedge.exe 320 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 320 msedge.exe 320 msedge.exe 320 msedge.exe 320 msedge.exe 320 msedge.exe 320 msedge.exe 320 msedge.exe 320 msedge.exe 320 msedge.exe 320 msedge.exe 320 msedge.exe 320 msedge.exe 320 msedge.exe 320 msedge.exe 320 msedge.exe 320 msedge.exe 320 msedge.exe 320 msedge.exe 320 msedge.exe 320 msedge.exe 320 msedge.exe 320 msedge.exe 320 msedge.exe 320 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 320 wrote to memory of 4556 320 msedge.exe 83 PID 320 wrote to memory of 4556 320 msedge.exe 83 PID 320 wrote to memory of 2768 320 msedge.exe 84 PID 320 wrote to memory of 2768 320 msedge.exe 84 PID 320 wrote to memory of 2768 320 msedge.exe 84 PID 320 wrote to memory of 2768 320 msedge.exe 84 PID 320 wrote to memory of 2768 320 msedge.exe 84 PID 320 wrote to memory of 2768 320 msedge.exe 84 PID 320 wrote to memory of 2768 320 msedge.exe 84 PID 320 wrote to memory of 2768 320 msedge.exe 84 PID 320 wrote to memory of 2768 320 msedge.exe 84 PID 320 wrote to memory of 2768 320 msedge.exe 84 PID 320 wrote to memory of 2768 320 msedge.exe 84 PID 320 wrote to memory of 2768 320 msedge.exe 84 PID 320 wrote to memory of 2768 320 msedge.exe 84 PID 320 wrote to memory of 2768 320 msedge.exe 84 PID 320 wrote to memory of 2768 320 msedge.exe 84 PID 320 wrote to memory of 2768 320 msedge.exe 84 PID 320 wrote to memory of 2768 320 msedge.exe 84 PID 320 wrote to memory of 2768 320 msedge.exe 84 PID 320 wrote to memory of 2768 320 msedge.exe 84 PID 320 wrote to memory of 2768 320 msedge.exe 84 PID 320 wrote to memory of 2768 320 msedge.exe 84 PID 320 wrote to memory of 2768 320 msedge.exe 84 PID 320 wrote to memory of 2768 320 msedge.exe 84 PID 320 wrote to memory of 2768 320 msedge.exe 84 PID 320 wrote to memory of 2768 320 msedge.exe 84 PID 320 wrote to memory of 2768 320 msedge.exe 84 PID 320 wrote to memory of 2768 320 msedge.exe 84 PID 320 wrote to memory of 2768 320 msedge.exe 84 PID 320 wrote to memory of 2768 320 msedge.exe 84 PID 320 wrote to memory of 2768 320 msedge.exe 84 PID 320 wrote to memory of 2768 320 msedge.exe 84 PID 320 wrote to memory of 2768 320 msedge.exe 84 PID 320 wrote to memory of 2768 320 msedge.exe 84 PID 320 wrote to memory of 2768 320 msedge.exe 84 PID 320 wrote to memory of 2768 320 msedge.exe 84 PID 320 wrote to memory of 2768 320 msedge.exe 84 PID 320 wrote to memory of 2768 320 msedge.exe 84 PID 320 wrote to memory of 2768 320 msedge.exe 84 PID 320 wrote to memory of 2768 320 msedge.exe 84 PID 320 wrote to memory of 2768 320 msedge.exe 84 PID 320 wrote to memory of 4180 320 msedge.exe 85 PID 320 wrote to memory of 4180 320 msedge.exe 85 PID 320 wrote to memory of 3448 320 msedge.exe 86 PID 320 wrote to memory of 3448 320 msedge.exe 86 PID 320 wrote to memory of 3448 320 msedge.exe 86 PID 320 wrote to memory of 3448 320 msedge.exe 86 PID 320 wrote to memory of 3448 320 msedge.exe 86 PID 320 wrote to memory of 3448 320 msedge.exe 86 PID 320 wrote to memory of 3448 320 msedge.exe 86 PID 320 wrote to memory of 3448 320 msedge.exe 86 PID 320 wrote to memory of 3448 320 msedge.exe 86 PID 320 wrote to memory of 3448 320 msedge.exe 86 PID 320 wrote to memory of 3448 320 msedge.exe 86 PID 320 wrote to memory of 3448 320 msedge.exe 86 PID 320 wrote to memory of 3448 320 msedge.exe 86 PID 320 wrote to memory of 3448 320 msedge.exe 86 PID 320 wrote to memory of 3448 320 msedge.exe 86 PID 320 wrote to memory of 3448 320 msedge.exe 86 PID 320 wrote to memory of 3448 320 msedge.exe 86 PID 320 wrote to memory of 3448 320 msedge.exe 86 PID 320 wrote to memory of 3448 320 msedge.exe 86 PID 320 wrote to memory of 3448 320 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\218592ce4362e6d6adb515d838892d1d_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:320 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb32ac46f8,0x7ffb32ac4708,0x7ffb32ac47182⤵PID:4556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,18437839323323431575,9142829739745790026,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2088 /prefetch:22⤵PID:2768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,18437839323323431575,9142829739745790026,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2204 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2080,18437839323323431575,9142829739745790026,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2740 /prefetch:82⤵PID:3448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,18437839323323431575,9142829739745790026,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:3484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,18437839323323431575,9142829739745790026,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:2176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,18437839323323431575,9142829739745790026,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4152 /prefetch:12⤵PID:1428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,18437839323323431575,9142829739745790026,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4844 /prefetch:12⤵PID:4520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,18437839323323431575,9142829739745790026,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5228 /prefetch:12⤵PID:1632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,18437839323323431575,9142829739745790026,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5692 /prefetch:12⤵PID:4484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,18437839323323431575,9142829739745790026,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5716 /prefetch:12⤵PID:4464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,18437839323323431575,9142829739745790026,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5268 /prefetch:82⤵PID:4152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,18437839323323431575,9142829739745790026,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5268 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,18437839323323431575,9142829739745790026,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6028 /prefetch:12⤵PID:552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,18437839323323431575,9142829739745790026,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5476 /prefetch:12⤵PID:2052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,18437839323323431575,9142829739745790026,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6488 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2672
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3292
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2688
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c5abc082d9d9307e797b7e89a2f755f4
SHA154c442690a8727f1d3453b6452198d3ec4ec13df
SHA256a055d69c6aba59e97e632d118b7960a5fdfbe35cfdfaa0de14f194fc6f874716
SHA512ad765cddbf89472988de5356db5e0ee254ca3475491c6034fba1897c373702ab7cfa4bd21662ab862eebb48a757c3eb86b1f8ed58629751f71863822a59cd26c
-
Filesize
152B
MD5b4a74bc775caf3de7fc9cde3c30ce482
SHA1c6ed3161390e5493f71182a6cb98d51c9063775d
SHA256dfad4e020a946f85523604816a0a9781091ee4669c870db2cabab027f8b6f280
SHA51255578e254444a645f455ea38480c9e02599ebf9522c32aca50ff37aad33976db30e663d35ebe31ff0ecafb4007362261716f756b3a0d67ac3937ca62ff10e25f
-
Filesize
211KB
MD5151fb811968eaf8efb840908b89dc9d4
SHA17ec811009fd9b0e6d92d12d78b002275f2f1bee1
SHA256043fd8558e4a5a60aaccd2f0377f77a544e3e375242e9d7200dc6e51f94103ed
SHA51283aface0ab01da52fd077f747c9d5916e3c06b0ea5c551d7d316707ec3e8f3f986ce1c82e6f2136e48c6511a83cb0ac67ff6dc8f0e440ac72fc6854086a87674
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize312B
MD596063d89d5a00b2cdeed28674170e3c7
SHA1f3d6a9c100a12f12f96e98bc7ec29bc29d73ceb0
SHA2563c5e55858bdaf399d10d0bd0a2bff7a67dd5a12e68c8b9eea00b948eafd5cef2
SHA512eba4d1b88d30da5ce17ac3bc348430699882449a3a436e373de0b2fab3804dec0a444b128a77c680457b2ec4c33eac2b4d11b7bd9105a210efc7f343c5b9065b
-
Filesize
1KB
MD5059f7a7d5d13d3da1f01c527a5954e77
SHA137287f4f5642a013cc21a4a77376828c5d9cbb92
SHA256ce1db390d4d170dd1c4db7f25e2b54964d5c0ddc3bdb1b6d8a9b9485f4b789f0
SHA5129b8bf925d59e122b434880596ef0f1b51a3b9a759dde7d0259965ce65d5c5956fa7188726647a265c129bc0d3617f902201d45e7275a5994e5bc78d6bb9a29f0
-
Filesize
5KB
MD5c72e3f3b472a381bec689f4e71df095e
SHA11a86f4bfaf4d3da54eca0419baba4b699f31e9e7
SHA256c3c3d8e97a2900865994fcd755937e659dffe7eea87f3fe8ff9bd187f3beb4dc
SHA51293e21dadfdb4d8b8a0ae8c0b39d73e83626ed7c91ac401d2bef31b9c1a3bfb0fb4278cf3851b6581a54ab71cef2dc86ce34a957f89d49b6cd7df28cfb33d69f3
-
Filesize
6KB
MD5b4b78cbbed4c03c77e795950c0688459
SHA1fca2812875809491584433bd100fbe42d9a9c2dc
SHA25680e68390374134ddfa65cb097bd419a9fff5b2d6f57d279ee830d42d3d9944e8
SHA5124dbe433e59b4db629a0ca76a365a05bbbcc7540f96d77c517534282197c46ccd985a0ddd1a2b003533e23d569181aacd6bb608fc8a33a2638b818bf93939a0da
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD5f48830470bdbc5146b3f46bebe1d54a8
SHA1af65fc1f2d49f4af13d1f44bbe7a14a7c684bd83
SHA25615376279c05bcbdae5a78b7044e4ff4661e53700159aa33938b095e3b0476503
SHA512625184bb0d1f21a03540392e1d29145c9130ef812134f5bc28820d73b83c955f9ec401d39ad436dcca6c4710232108a15fbf40ffc10336d72814be8f1ea303ed