Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
03/10/2024, 18:50
Static task
static1
Behavioral task
behavioral1
Sample
1021b9e50e7a77f1c24f8cc2be67cf3f_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
1021b9e50e7a77f1c24f8cc2be67cf3f_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
1021b9e50e7a77f1c24f8cc2be67cf3f_JaffaCakes118.html
-
Size
69KB
-
MD5
1021b9e50e7a77f1c24f8cc2be67cf3f
-
SHA1
b90072d32eca3c01cf3f0b68d32363635d5deae3
-
SHA256
ac2930e42f822dd65ea8fa4969758d94e010f1e4bf22a765a4d125314a7c9920
-
SHA512
079f1c92fe32f7a1fff159f97be14e5652ee223000cf95a318a61bacfcf556870461beb30fdebc031a32ab4d144f99abcef8eca1a5608b69bd408350add8b7cd
-
SSDEEP
1536:gQZBCCOdj0IxCVXKOka2A5rjZY2YnXHOXK87FvilCewQU/2Bwl90OrFHYK23E0GX:gk2F0IxtOka2A5rjZY2YnXHOXK87FviE
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4712 msedge.exe 4712 msedge.exe 3492 msedge.exe 3492 msedge.exe 4568 identity_helper.exe 4568 identity_helper.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe 3492 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3492 wrote to memory of 4964 3492 msedge.exe 82 PID 3492 wrote to memory of 4964 3492 msedge.exe 82 PID 3492 wrote to memory of 4268 3492 msedge.exe 83 PID 3492 wrote to memory of 4268 3492 msedge.exe 83 PID 3492 wrote to memory of 4268 3492 msedge.exe 83 PID 3492 wrote to memory of 4268 3492 msedge.exe 83 PID 3492 wrote to memory of 4268 3492 msedge.exe 83 PID 3492 wrote to memory of 4268 3492 msedge.exe 83 PID 3492 wrote to memory of 4268 3492 msedge.exe 83 PID 3492 wrote to memory of 4268 3492 msedge.exe 83 PID 3492 wrote to memory of 4268 3492 msedge.exe 83 PID 3492 wrote to memory of 4268 3492 msedge.exe 83 PID 3492 wrote to memory of 4268 3492 msedge.exe 83 PID 3492 wrote to memory of 4268 3492 msedge.exe 83 PID 3492 wrote to memory of 4268 3492 msedge.exe 83 PID 3492 wrote to memory of 4268 3492 msedge.exe 83 PID 3492 wrote to memory of 4268 3492 msedge.exe 83 PID 3492 wrote to memory of 4268 3492 msedge.exe 83 PID 3492 wrote to memory of 4268 3492 msedge.exe 83 PID 3492 wrote to memory of 4268 3492 msedge.exe 83 PID 3492 wrote to memory of 4268 3492 msedge.exe 83 PID 3492 wrote to memory of 4268 3492 msedge.exe 83 PID 3492 wrote to memory of 4268 3492 msedge.exe 83 PID 3492 wrote to memory of 4268 3492 msedge.exe 83 PID 3492 wrote to memory of 4268 3492 msedge.exe 83 PID 3492 wrote to memory of 4268 3492 msedge.exe 83 PID 3492 wrote to memory of 4268 3492 msedge.exe 83 PID 3492 wrote to memory of 4268 3492 msedge.exe 83 PID 3492 wrote to memory of 4268 3492 msedge.exe 83 PID 3492 wrote to memory of 4268 3492 msedge.exe 83 PID 3492 wrote to memory of 4268 3492 msedge.exe 83 PID 3492 wrote to memory of 4268 3492 msedge.exe 83 PID 3492 wrote to memory of 4268 3492 msedge.exe 83 PID 3492 wrote to memory of 4268 3492 msedge.exe 83 PID 3492 wrote to memory of 4268 3492 msedge.exe 83 PID 3492 wrote to memory of 4268 3492 msedge.exe 83 PID 3492 wrote to memory of 4268 3492 msedge.exe 83 PID 3492 wrote to memory of 4268 3492 msedge.exe 83 PID 3492 wrote to memory of 4268 3492 msedge.exe 83 PID 3492 wrote to memory of 4268 3492 msedge.exe 83 PID 3492 wrote to memory of 4268 3492 msedge.exe 83 PID 3492 wrote to memory of 4268 3492 msedge.exe 83 PID 3492 wrote to memory of 4712 3492 msedge.exe 84 PID 3492 wrote to memory of 4712 3492 msedge.exe 84 PID 3492 wrote to memory of 2736 3492 msedge.exe 85 PID 3492 wrote to memory of 2736 3492 msedge.exe 85 PID 3492 wrote to memory of 2736 3492 msedge.exe 85 PID 3492 wrote to memory of 2736 3492 msedge.exe 85 PID 3492 wrote to memory of 2736 3492 msedge.exe 85 PID 3492 wrote to memory of 2736 3492 msedge.exe 85 PID 3492 wrote to memory of 2736 3492 msedge.exe 85 PID 3492 wrote to memory of 2736 3492 msedge.exe 85 PID 3492 wrote to memory of 2736 3492 msedge.exe 85 PID 3492 wrote to memory of 2736 3492 msedge.exe 85 PID 3492 wrote to memory of 2736 3492 msedge.exe 85 PID 3492 wrote to memory of 2736 3492 msedge.exe 85 PID 3492 wrote to memory of 2736 3492 msedge.exe 85 PID 3492 wrote to memory of 2736 3492 msedge.exe 85 PID 3492 wrote to memory of 2736 3492 msedge.exe 85 PID 3492 wrote to memory of 2736 3492 msedge.exe 85 PID 3492 wrote to memory of 2736 3492 msedge.exe 85 PID 3492 wrote to memory of 2736 3492 msedge.exe 85 PID 3492 wrote to memory of 2736 3492 msedge.exe 85 PID 3492 wrote to memory of 2736 3492 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\1021b9e50e7a77f1c24f8cc2be67cf3f_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3492 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa7b6546f8,0x7ffa7b654708,0x7ffa7b6547182⤵PID:4964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,12482003610639887261,13746509990510171871,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2096 /prefetch:22⤵PID:4268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,12482003610639887261,13746509990510171871,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2252 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,12482003610639887261,13746509990510171871,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2904 /prefetch:82⤵PID:2736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,12482003610639887261,13746509990510171871,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:3656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,12482003610639887261,13746509990510171871,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:4564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,12482003610639887261,13746509990510171871,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4180 /prefetch:12⤵PID:3168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,12482003610639887261,13746509990510171871,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4864 /prefetch:12⤵PID:1572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,12482003610639887261,13746509990510171871,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5088 /prefetch:12⤵PID:2488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,12482003610639887261,13746509990510171871,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5896 /prefetch:82⤵PID:2552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,12482003610639887261,13746509990510171871,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5896 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,12482003610639887261,13746509990510171871,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6044 /prefetch:12⤵PID:4884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,12482003610639887261,13746509990510171871,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5892 /prefetch:12⤵PID:2476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,12482003610639887261,13746509990510171871,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4124 /prefetch:12⤵PID:4772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,12482003610639887261,13746509990510171871,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6244 /prefetch:12⤵PID:2436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,12482003610639887261,13746509990510171871,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5000 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3140
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2008
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3316
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59e3fc58a8fb86c93d19e1500b873ef6f
SHA1c6aae5f4e26f5570db5e14bba8d5061867a33b56
SHA256828f4eacac1c40b790fd70dbb6fa6ba03dcc681171d9b2a6579626d27837b1c4
SHA512e5e245b56fa82075e060f468a3224cf2ef43f1b6d87f0351a2102d85c7c897e559be4caeaecfdc4059af29fdc674681b61229319dda95cb2ee649b2eb98d313e
-
Filesize
152B
MD527304926d60324abe74d7a4b571c35ea
SHA178b8f92fcaf4a09eaa786bbe33fd1b0222ef29c1
SHA2567039ad5c2b40f4d97c8c2269f4942be13436d739b2e1f8feb7a0c9f9fdb931de
SHA512f5b6181d3f432238c7365f64fc8a373299e23ba8178bcc419471916ef8b23e909787c7c0617ab22e4eb90909c02bd7b84f1386fbc61e2bdb5a0eb474175da4bd
-
Filesize
213KB
MD5f942900ff0a10f251d338c612c456948
SHA14a283d3c8f3dc491e43c430d97c3489ee7a3d320
SHA25638b76a54655aff71271a9ad376ac17f20187abd581bf5aced69ccde0fe6e2fd6
SHA5129b393ce73598ed1997d28ceeddb23491a4d986c337984878ebb0ae06019e30ea77448d375d3d6563c774856d6bc98ee3ca0e0ba88ea5769a451a5e814f6ddb41
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize504B
MD5ddcd013d50a10c4238bcfd82a1ae90f8
SHA1fdffa364b88e5c5b54a4ac9d1477a30bbcc899c7
SHA25643a4529a5cf97b946cf117c39fa9b014913732fdcf8b03bc45349d9df6767412
SHA51217db156d2b3f00bcd2ab0fe4f16b6544996e075743371dfe61b63a84ce612e2ac7ee4d09e7932b1765e8efe7990de6784e9d345daad0e417ea22481483099ccc
-
Filesize
1KB
MD59818ac683541277ea25cff800e60325a
SHA1fecddc9514e7742b866d0bcf51c07c4a0f52f433
SHA2562a106142c88284fe38d07ab27a657126a388110c3759d87b31009d674180001b
SHA512b934e17081390cbdbf0b1072da729f8416eb439dde9599c4b7a7d046941a87ee6720fbdd64bf47480b76f2552752bdd210962b9eb1d98bfc3c914457cee9c4e6
-
Filesize
5KB
MD5ad16e781263578a6c2399a5dcbf88aec
SHA1172b98778c81d0411ae6f0c6eb07909e505f7a24
SHA256033845e87132972d2c015c48b0571c7a15fda7784f895900c471a25c5f472475
SHA5120cce9deb77aefff1ee8635de53dacb831caec9a7bb19696833311eb0caec208114c924bb08bd0a2e11d058b0ce66d94a47f8a9fc32bab8d35da1bd9683329cc5
-
Filesize
6KB
MD535840c9f0d4915af5661635da8c12923
SHA191d3d17ebc16ff1eb18ed0a7c66cb934478aceb3
SHA25684f8310053811d3ab0104993d798398b76f04d5abe9c46e047651c4c9e539d23
SHA512bbf664be6d245aacd904b994dc541ed6987f700306b3ba32be0750b7244dc1fa5f185da0acf810adf1b0cdbec306c17f84cdeb5d4e9c355cfc72fca189d93e52
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD562f4d0b2068bcddc1b98aeae860c57ba
SHA1c661bd98ba08b6bc838385940a71aba1b62e38d4
SHA256fe0bac23d371a9d54ea2ef537ee6a30a53ec5840efc218d179b928f98742a601
SHA512ab032cac47224e3ab04d2b9ec57a7da83402e4dfb6ff3bb29fe79e310922f3661bf10c369db321592df054c229025bc2da819da5d872156bae945b00933c63cd