Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04/10/2024, 03:58
Static task
static1
Behavioral task
behavioral1
Sample
11bdf0c52c2c43979cc8902eabd19d22_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
11bdf0c52c2c43979cc8902eabd19d22_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
11bdf0c52c2c43979cc8902eabd19d22_JaffaCakes118.html
-
Size
121KB
-
MD5
11bdf0c52c2c43979cc8902eabd19d22
-
SHA1
1a3df6062ae5d0efa5b14a475ab70c8efe3ea7b5
-
SHA256
7f3118b8ff74eea8c42f5966148e886f85a64f2ca6f1e12ea347dc571abe42b0
-
SHA512
fb57aa94945f89611679bf687c0ce29cc86901e46264c30e725cbdf1fd0476c21d29a1c425e9fbb6039c5ce469742db3e2ee643fa76bdc5679a14cdbdae6c4ce
-
SSDEEP
1536:GWCDrj3rzeF6tI5pqDNOpQ0TgsUpUXLI1iYN9M+QDFmc6bstdrmebdt37RzW3Uvh:GI5n1zWkvwIH
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 5076 msedge.exe 5076 msedge.exe 1248 msedge.exe 1248 msedge.exe 1744 identity_helper.exe 1744 identity_helper.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe 1248 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1248 wrote to memory of 4920 1248 msedge.exe 82 PID 1248 wrote to memory of 4920 1248 msedge.exe 82 PID 1248 wrote to memory of 4200 1248 msedge.exe 83 PID 1248 wrote to memory of 4200 1248 msedge.exe 83 PID 1248 wrote to memory of 4200 1248 msedge.exe 83 PID 1248 wrote to memory of 4200 1248 msedge.exe 83 PID 1248 wrote to memory of 4200 1248 msedge.exe 83 PID 1248 wrote to memory of 4200 1248 msedge.exe 83 PID 1248 wrote to memory of 4200 1248 msedge.exe 83 PID 1248 wrote to memory of 4200 1248 msedge.exe 83 PID 1248 wrote to memory of 4200 1248 msedge.exe 83 PID 1248 wrote to memory of 4200 1248 msedge.exe 83 PID 1248 wrote to memory of 4200 1248 msedge.exe 83 PID 1248 wrote to memory of 4200 1248 msedge.exe 83 PID 1248 wrote to memory of 4200 1248 msedge.exe 83 PID 1248 wrote to memory of 4200 1248 msedge.exe 83 PID 1248 wrote to memory of 4200 1248 msedge.exe 83 PID 1248 wrote to memory of 4200 1248 msedge.exe 83 PID 1248 wrote to memory of 4200 1248 msedge.exe 83 PID 1248 wrote to memory of 4200 1248 msedge.exe 83 PID 1248 wrote to memory of 4200 1248 msedge.exe 83 PID 1248 wrote to memory of 4200 1248 msedge.exe 83 PID 1248 wrote to memory of 4200 1248 msedge.exe 83 PID 1248 wrote to memory of 4200 1248 msedge.exe 83 PID 1248 wrote to memory of 4200 1248 msedge.exe 83 PID 1248 wrote to memory of 4200 1248 msedge.exe 83 PID 1248 wrote to memory of 4200 1248 msedge.exe 83 PID 1248 wrote to memory of 4200 1248 msedge.exe 83 PID 1248 wrote to memory of 4200 1248 msedge.exe 83 PID 1248 wrote to memory of 4200 1248 msedge.exe 83 PID 1248 wrote to memory of 4200 1248 msedge.exe 83 PID 1248 wrote to memory of 4200 1248 msedge.exe 83 PID 1248 wrote to memory of 4200 1248 msedge.exe 83 PID 1248 wrote to memory of 4200 1248 msedge.exe 83 PID 1248 wrote to memory of 4200 1248 msedge.exe 83 PID 1248 wrote to memory of 4200 1248 msedge.exe 83 PID 1248 wrote to memory of 4200 1248 msedge.exe 83 PID 1248 wrote to memory of 4200 1248 msedge.exe 83 PID 1248 wrote to memory of 4200 1248 msedge.exe 83 PID 1248 wrote to memory of 4200 1248 msedge.exe 83 PID 1248 wrote to memory of 4200 1248 msedge.exe 83 PID 1248 wrote to memory of 4200 1248 msedge.exe 83 PID 1248 wrote to memory of 5076 1248 msedge.exe 84 PID 1248 wrote to memory of 5076 1248 msedge.exe 84 PID 1248 wrote to memory of 5020 1248 msedge.exe 85 PID 1248 wrote to memory of 5020 1248 msedge.exe 85 PID 1248 wrote to memory of 5020 1248 msedge.exe 85 PID 1248 wrote to memory of 5020 1248 msedge.exe 85 PID 1248 wrote to memory of 5020 1248 msedge.exe 85 PID 1248 wrote to memory of 5020 1248 msedge.exe 85 PID 1248 wrote to memory of 5020 1248 msedge.exe 85 PID 1248 wrote to memory of 5020 1248 msedge.exe 85 PID 1248 wrote to memory of 5020 1248 msedge.exe 85 PID 1248 wrote to memory of 5020 1248 msedge.exe 85 PID 1248 wrote to memory of 5020 1248 msedge.exe 85 PID 1248 wrote to memory of 5020 1248 msedge.exe 85 PID 1248 wrote to memory of 5020 1248 msedge.exe 85 PID 1248 wrote to memory of 5020 1248 msedge.exe 85 PID 1248 wrote to memory of 5020 1248 msedge.exe 85 PID 1248 wrote to memory of 5020 1248 msedge.exe 85 PID 1248 wrote to memory of 5020 1248 msedge.exe 85 PID 1248 wrote to memory of 5020 1248 msedge.exe 85 PID 1248 wrote to memory of 5020 1248 msedge.exe 85 PID 1248 wrote to memory of 5020 1248 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\11bdf0c52c2c43979cc8902eabd19d22_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff815d46f8,0x7fff815d4708,0x7fff815d47182⤵PID:4920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,14481148928411192786,24088623332830487,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2144 /prefetch:22⤵PID:4200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2132,14481148928411192786,24088623332830487,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2196 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2132,14481148928411192786,24088623332830487,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2916 /prefetch:82⤵PID:5020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,14481148928411192786,24088623332830487,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:1732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,14481148928411192786,24088623332830487,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:1612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,14481148928411192786,24088623332830487,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4716 /prefetch:12⤵PID:4188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,14481148928411192786,24088623332830487,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5088 /prefetch:12⤵PID:1492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,14481148928411192786,24088623332830487,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5936 /prefetch:82⤵PID:2416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,14481148928411192786,24088623332830487,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5936 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,14481148928411192786,24088623332830487,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5668 /prefetch:12⤵PID:920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,14481148928411192786,24088623332830487,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5928 /prefetch:12⤵PID:4868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,14481148928411192786,24088623332830487,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4148 /prefetch:12⤵PID:3392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,14481148928411192786,24088623332830487,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5824 /prefetch:12⤵PID:428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,14481148928411192786,24088623332830487,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6012 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4952
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3308
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2928
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5eeaa8087eba2f63f31e599f6a7b46ef4
SHA1f639519deee0766a39cfe258d2ac48e3a9d5ac03
SHA25650fe80c9435f601c30517d10f6a8a0ca6ff8ca2add7584df377371b5a5dbe2d9
SHA512eaabfad92c84f422267615c55a863af12823c5e791bdcb30cabe17f72025e07df7383cf6cf0f08e28aa18a31c2aac5985cf5281a403e22fbcc1fb5e61c49fc3c
-
Filesize
152B
MD5b9569e123772ae290f9bac07e0d31748
SHA15806ed9b301d4178a959b26d7b7ccf2c0abc6741
SHA25620ab88e23fb88186b82047cd0d6dc3cfa23422e4fd2b8f3c8437546a2a842c2b
SHA512cfad8ce716ac815b37e8cc0e30141bfb3ca7f0d4ef101289bddcf6ed3c579bc34d369f2ec2f2dab98707843015633988eb97f1e911728031dd897750b8587795
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD5aa9ab74c92819030f49d986235dce952
SHA167342a50623e8dc1bb5d53389611e3cbc77af8ef
SHA256040f34545764f54023c882d35376cc8ffc64779f924c3d7a12bbaa55b0f0c440
SHA512b423e874edc98886f871e45fbc5f28d2e27c0ad76fdd4a24370c395a413f3dba0b4633aa686054905ad328d9794d00db1b59707c583feb164c8e744dbb8e94ff
-
Filesize
883B
MD5ca6482e1922507ced83bd6eb187ee5db
SHA189c9243814c665e2be545a30ce63eff5eec33d8e
SHA25670cd064e5438cfe9105a566f5f3ff579fed81228927731df183d2d8fa6c16b05
SHA512958a88618d95e8c87ecd8a622bb2184dcc7e5f01800897dd5107a1b1aeaa7fb5853090c0c058dd8511c9ec98d80c3469461bc230e592e14dae23f4d990e2cd24
-
Filesize
5KB
MD5c9d1d3f437494344be7949424c9a4be6
SHA1b63666bef45d91c2085d301d2172d766d2e428cc
SHA256a9ea6332a319c8c9632af58924da261dbc0165537066810882b92b1119964feb
SHA5123fdbbc75956ced8c063a70b140dd4a5dff40878707662087afeab20c80734261e7fc9edd082d23062edf5796656e643623629d3ae2940f64871f9b29d61a13e0
-
Filesize
6KB
MD59cbba690d9c4ce35f737e29a7ccf05a5
SHA1cb43dbcb7c5dcc1d95d8606fb9eef171ba253ee2
SHA25634b5153e6c0ed8e2898d1115348e6de4dc4ce12eeb2df0f6e753cbca02ac0e14
SHA5125d9e00b0b081518825656e330d314e825b426d4b0127936e515ce696ce84e89b8f492fe4e8aaf5e5038b81b2619bcc6b0c9c036263af38f38e72adbc1395c121
-
Filesize
6KB
MD5f1beb9cc82657b05dc18d70a5e2b106a
SHA13c071e5a2e8325203d5a3cdcb3f54610015a28e1
SHA256c296bbfaab898aeb73719d96a79e492d0f4494958dcf5801e5fdee4920b3a96e
SHA5125e6f818d0d89c0f3a4f4969032d011a7219c13f6009a39ca21ddff8ee71bc8a0321d99769f4c18bd202c6c99b8a40c41b0fdc3cb758d2f23d25e1275f8042d05
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD52716860abc1ca429028403cde4c18382
SHA1bae91be8a2f4d1ec3e7b50fe37441278d63cb86b
SHA256bad2c74f66ffdb676c227598e910ec9eb6e9968f8d81d72945a7472e60fda0e7
SHA5124c51020f258c8a652d0080b239801a5db6e700594f66dba98272c651fdc20c7447d9716b0e64ae4dc1bb90e4843ed5017935d307232282fc0064be4734e2ac14