Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02-10-2024 01:30
Static task
static1
Behavioral task
behavioral1
Sample
0842918f02b12e2bfd0247d14bfb745c_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
0842918f02b12e2bfd0247d14bfb745c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
0842918f02b12e2bfd0247d14bfb745c_JaffaCakes118.html
-
Size
15KB
-
MD5
0842918f02b12e2bfd0247d14bfb745c
-
SHA1
8259c23dd297fb3562acaba251b955455a7fbbbf
-
SHA256
721aebb04b73fa1b855220d4a0bfd6f7acc3e4596825ba87cfdf246b77e62a7b
-
SHA512
d90ac4d40f0523987ce8c078a92df237d44900d623e8d3f1f1d3c4b5ee4e37fc1e5e7fe242b6ab4975f3d237a3a15c58e060f9b59e89d0b240c797dcbc874b9b
-
SSDEEP
384:fJVadc5AlnxRYo5Nvh+I2lKfAcmrQyxv2YE2V:6c5ABxRR+JKYb2YV
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3544 msedge.exe 3544 msedge.exe 1184 msedge.exe 1184 msedge.exe 2788 identity_helper.exe 2788 identity_helper.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1184 wrote to memory of 4356 1184 msedge.exe 82 PID 1184 wrote to memory of 4356 1184 msedge.exe 82 PID 1184 wrote to memory of 4604 1184 msedge.exe 83 PID 1184 wrote to memory of 4604 1184 msedge.exe 83 PID 1184 wrote to memory of 4604 1184 msedge.exe 83 PID 1184 wrote to memory of 4604 1184 msedge.exe 83 PID 1184 wrote to memory of 4604 1184 msedge.exe 83 PID 1184 wrote to memory of 4604 1184 msedge.exe 83 PID 1184 wrote to memory of 4604 1184 msedge.exe 83 PID 1184 wrote to memory of 4604 1184 msedge.exe 83 PID 1184 wrote to memory of 4604 1184 msedge.exe 83 PID 1184 wrote to memory of 4604 1184 msedge.exe 83 PID 1184 wrote to memory of 4604 1184 msedge.exe 83 PID 1184 wrote to memory of 4604 1184 msedge.exe 83 PID 1184 wrote to memory of 4604 1184 msedge.exe 83 PID 1184 wrote to memory of 4604 1184 msedge.exe 83 PID 1184 wrote to memory of 4604 1184 msedge.exe 83 PID 1184 wrote to memory of 4604 1184 msedge.exe 83 PID 1184 wrote to memory of 4604 1184 msedge.exe 83 PID 1184 wrote to memory of 4604 1184 msedge.exe 83 PID 1184 wrote to memory of 4604 1184 msedge.exe 83 PID 1184 wrote to memory of 4604 1184 msedge.exe 83 PID 1184 wrote to memory of 4604 1184 msedge.exe 83 PID 1184 wrote to memory of 4604 1184 msedge.exe 83 PID 1184 wrote to memory of 4604 1184 msedge.exe 83 PID 1184 wrote to memory of 4604 1184 msedge.exe 83 PID 1184 wrote to memory of 4604 1184 msedge.exe 83 PID 1184 wrote to memory of 4604 1184 msedge.exe 83 PID 1184 wrote to memory of 4604 1184 msedge.exe 83 PID 1184 wrote to memory of 4604 1184 msedge.exe 83 PID 1184 wrote to memory of 4604 1184 msedge.exe 83 PID 1184 wrote to memory of 4604 1184 msedge.exe 83 PID 1184 wrote to memory of 4604 1184 msedge.exe 83 PID 1184 wrote to memory of 4604 1184 msedge.exe 83 PID 1184 wrote to memory of 4604 1184 msedge.exe 83 PID 1184 wrote to memory of 4604 1184 msedge.exe 83 PID 1184 wrote to memory of 4604 1184 msedge.exe 83 PID 1184 wrote to memory of 4604 1184 msedge.exe 83 PID 1184 wrote to memory of 4604 1184 msedge.exe 83 PID 1184 wrote to memory of 4604 1184 msedge.exe 83 PID 1184 wrote to memory of 4604 1184 msedge.exe 83 PID 1184 wrote to memory of 4604 1184 msedge.exe 83 PID 1184 wrote to memory of 3544 1184 msedge.exe 84 PID 1184 wrote to memory of 3544 1184 msedge.exe 84 PID 1184 wrote to memory of 2052 1184 msedge.exe 85 PID 1184 wrote to memory of 2052 1184 msedge.exe 85 PID 1184 wrote to memory of 2052 1184 msedge.exe 85 PID 1184 wrote to memory of 2052 1184 msedge.exe 85 PID 1184 wrote to memory of 2052 1184 msedge.exe 85 PID 1184 wrote to memory of 2052 1184 msedge.exe 85 PID 1184 wrote to memory of 2052 1184 msedge.exe 85 PID 1184 wrote to memory of 2052 1184 msedge.exe 85 PID 1184 wrote to memory of 2052 1184 msedge.exe 85 PID 1184 wrote to memory of 2052 1184 msedge.exe 85 PID 1184 wrote to memory of 2052 1184 msedge.exe 85 PID 1184 wrote to memory of 2052 1184 msedge.exe 85 PID 1184 wrote to memory of 2052 1184 msedge.exe 85 PID 1184 wrote to memory of 2052 1184 msedge.exe 85 PID 1184 wrote to memory of 2052 1184 msedge.exe 85 PID 1184 wrote to memory of 2052 1184 msedge.exe 85 PID 1184 wrote to memory of 2052 1184 msedge.exe 85 PID 1184 wrote to memory of 2052 1184 msedge.exe 85 PID 1184 wrote to memory of 2052 1184 msedge.exe 85 PID 1184 wrote to memory of 2052 1184 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\0842918f02b12e2bfd0247d14bfb745c_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1184 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd2e0146f8,0x7ffd2e014708,0x7ffd2e0147182⤵PID:4356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,1013230299418042506,18276577784395097842,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:22⤵PID:4604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,1013230299418042506,18276577784395097842,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,1013230299418042506,18276577784395097842,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2864 /prefetch:82⤵PID:2052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,1013230299418042506,18276577784395097842,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:4192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,1013230299418042506,18276577784395097842,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:1288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,1013230299418042506,18276577784395097842,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4192 /prefetch:12⤵PID:2812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,1013230299418042506,18276577784395097842,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4344 /prefetch:12⤵PID:2364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,1013230299418042506,18276577784395097842,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5012 /prefetch:12⤵PID:924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,1013230299418042506,18276577784395097842,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6164 /prefetch:82⤵PID:2368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,1013230299418042506,18276577784395097842,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6164 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,1013230299418042506,18276577784395097842,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5564 /prefetch:12⤵PID:4172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,1013230299418042506,18276577784395097842,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5428 /prefetch:12⤵PID:4680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,1013230299418042506,18276577784395097842,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4116 /prefetch:12⤵PID:4160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,1013230299418042506,18276577784395097842,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5612 /prefetch:12⤵PID:1852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,1013230299418042506,18276577784395097842,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2232 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3672
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4140
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3556
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5eeaa8087eba2f63f31e599f6a7b46ef4
SHA1f639519deee0766a39cfe258d2ac48e3a9d5ac03
SHA25650fe80c9435f601c30517d10f6a8a0ca6ff8ca2add7584df377371b5a5dbe2d9
SHA512eaabfad92c84f422267615c55a863af12823c5e791bdcb30cabe17f72025e07df7383cf6cf0f08e28aa18a31c2aac5985cf5281a403e22fbcc1fb5e61c49fc3c
-
Filesize
152B
MD5b9569e123772ae290f9bac07e0d31748
SHA15806ed9b301d4178a959b26d7b7ccf2c0abc6741
SHA25620ab88e23fb88186b82047cd0d6dc3cfa23422e4fd2b8f3c8437546a2a842c2b
SHA512cfad8ce716ac815b37e8cc0e30141bfb3ca7f0d4ef101289bddcf6ed3c579bc34d369f2ec2f2dab98707843015633988eb97f1e911728031dd897750b8587795
-
Filesize
213KB
MD5f942900ff0a10f251d338c612c456948
SHA14a283d3c8f3dc491e43c430d97c3489ee7a3d320
SHA25638b76a54655aff71271a9ad376ac17f20187abd581bf5aced69ccde0fe6e2fd6
SHA5129b393ce73598ed1997d28ceeddb23491a4d986c337984878ebb0ae06019e30ea77448d375d3d6563c774856d6bc98ee3ca0e0ba88ea5769a451a5e814f6ddb41
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize312B
MD54f20fa1e19411fef85cb704d730d505b
SHA1d0577586ab882fb63672f9aafd3fbc086dfb7213
SHA2560c404e71994658e6c0284b67e2a06686ba10d6466d53884a9caf7ae38c82c3c9
SHA512cd2432971c17a59adeac2ec1835ee17b0f414b6bf61d2f45487195803ac611219f09524e0205e324286f5948c6a8167349fa1176686883809ca50504d15ddb49
-
Filesize
1KB
MD52aca68e5573cd94080c45d85ab38413e
SHA16755822ce67598f915ad78b11a1340922eff0068
SHA2560db0b4d530641cc9a135ddb295232b5212d4d224742eebce5fc76e4eeb5d8594
SHA512cec2cc74c4cb639e7589e32807d72a0f0882b1d22005ad5f066670df414cddeec2b19da491ccea486620484923df92f9940dba6363b36851974e808b6f32fd33
-
Filesize
5KB
MD58dade91aad51f84cdc165fa06adb5089
SHA14c351797d60dced2f71ab1cb1cb8cbab8d97c0cb
SHA2563074b20ba01a463e4f69a80a9bf2762263e62f1ad69d7a733a2def489ab0f73c
SHA512573829dd3af3873b20a2705d3beff69d761ab470946798bb464724b9892a9f769493fbb4ee310d105ebd611be41edac70e8975488fb5ca94e7be29a8be2f7d6d
-
Filesize
6KB
MD5f328b8387b0d02da62003fb947628f89
SHA155244ebe4b8ae0f9e5fd86e7b9e9dd26c0884ec9
SHA256cbabcb2db6ba23b8285ebb00e3d63168a3c8286dbc1cc2e8fd2eb048e41240f4
SHA51230836a26d880651d0d6fbf3ad20c289131d574bbe9cd931169949147ac1fa4f79e5b97aa5ed0671102f9d947f6118c0220e2fabd46834bde4a4135e3e9658866
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD590a80816d34217d080273cce6bcacc93
SHA1dd1b799d9be49c0a055c8874f308746b3fca78cf
SHA256da531f7c494e0f7afffa2fca8ddc4db4823ff2b8d6867956b930e97645a24d5d
SHA512cfb6789335eb21a6a18130b15e0cf9d36b9d9da95606906c7af024be50c7a28b7893f42aae74f9839fd65036d995aec539146b0325543d8a4a1f5bf6f8d257d3