Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04/10/2024, 12:32
Static task
static1
Behavioral task
behavioral1
Sample
135f95c12378fe95a786cdd863b35f49_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
135f95c12378fe95a786cdd863b35f49_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
135f95c12378fe95a786cdd863b35f49_JaffaCakes118.html
-
Size
57KB
-
MD5
135f95c12378fe95a786cdd863b35f49
-
SHA1
64f8686c95b8755b36e33aa2952a66b6b20a1a8a
-
SHA256
66d67cee8e4e484b1fce2ea4bb60717039db6db001663face3b2ad7ec0ce9b48
-
SHA512
3a591704d4d38fa5f8fe440cdc73dd6bc9cbd79739ca0a5d34317cf32454f2e29ae2ea25e9ebd37c18ef3ff25aef405fe13b394340e142ef605072a07de8fc18
-
SSDEEP
1536:ijEQvK8OPHdsA1o2vgyHJv0owbd6zKD6CDK2RVroTEwpDK2RVy:ijnOPHdsR2vgyHJutDK2RVroTEwpDK2m
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1100 msedge.exe 1100 msedge.exe 4820 msedge.exe 4820 msedge.exe 3176 identity_helper.exe 3176 identity_helper.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe 4820 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4820 wrote to memory of 512 4820 msedge.exe 82 PID 4820 wrote to memory of 512 4820 msedge.exe 82 PID 4820 wrote to memory of 3400 4820 msedge.exe 83 PID 4820 wrote to memory of 3400 4820 msedge.exe 83 PID 4820 wrote to memory of 3400 4820 msedge.exe 83 PID 4820 wrote to memory of 3400 4820 msedge.exe 83 PID 4820 wrote to memory of 3400 4820 msedge.exe 83 PID 4820 wrote to memory of 3400 4820 msedge.exe 83 PID 4820 wrote to memory of 3400 4820 msedge.exe 83 PID 4820 wrote to memory of 3400 4820 msedge.exe 83 PID 4820 wrote to memory of 3400 4820 msedge.exe 83 PID 4820 wrote to memory of 3400 4820 msedge.exe 83 PID 4820 wrote to memory of 3400 4820 msedge.exe 83 PID 4820 wrote to memory of 3400 4820 msedge.exe 83 PID 4820 wrote to memory of 3400 4820 msedge.exe 83 PID 4820 wrote to memory of 3400 4820 msedge.exe 83 PID 4820 wrote to memory of 3400 4820 msedge.exe 83 PID 4820 wrote to memory of 3400 4820 msedge.exe 83 PID 4820 wrote to memory of 3400 4820 msedge.exe 83 PID 4820 wrote to memory of 3400 4820 msedge.exe 83 PID 4820 wrote to memory of 3400 4820 msedge.exe 83 PID 4820 wrote to memory of 3400 4820 msedge.exe 83 PID 4820 wrote to memory of 3400 4820 msedge.exe 83 PID 4820 wrote to memory of 3400 4820 msedge.exe 83 PID 4820 wrote to memory of 3400 4820 msedge.exe 83 PID 4820 wrote to memory of 3400 4820 msedge.exe 83 PID 4820 wrote to memory of 3400 4820 msedge.exe 83 PID 4820 wrote to memory of 3400 4820 msedge.exe 83 PID 4820 wrote to memory of 3400 4820 msedge.exe 83 PID 4820 wrote to memory of 3400 4820 msedge.exe 83 PID 4820 wrote to memory of 3400 4820 msedge.exe 83 PID 4820 wrote to memory of 3400 4820 msedge.exe 83 PID 4820 wrote to memory of 3400 4820 msedge.exe 83 PID 4820 wrote to memory of 3400 4820 msedge.exe 83 PID 4820 wrote to memory of 3400 4820 msedge.exe 83 PID 4820 wrote to memory of 3400 4820 msedge.exe 83 PID 4820 wrote to memory of 3400 4820 msedge.exe 83 PID 4820 wrote to memory of 3400 4820 msedge.exe 83 PID 4820 wrote to memory of 3400 4820 msedge.exe 83 PID 4820 wrote to memory of 3400 4820 msedge.exe 83 PID 4820 wrote to memory of 3400 4820 msedge.exe 83 PID 4820 wrote to memory of 3400 4820 msedge.exe 83 PID 4820 wrote to memory of 1100 4820 msedge.exe 84 PID 4820 wrote to memory of 1100 4820 msedge.exe 84 PID 4820 wrote to memory of 1736 4820 msedge.exe 85 PID 4820 wrote to memory of 1736 4820 msedge.exe 85 PID 4820 wrote to memory of 1736 4820 msedge.exe 85 PID 4820 wrote to memory of 1736 4820 msedge.exe 85 PID 4820 wrote to memory of 1736 4820 msedge.exe 85 PID 4820 wrote to memory of 1736 4820 msedge.exe 85 PID 4820 wrote to memory of 1736 4820 msedge.exe 85 PID 4820 wrote to memory of 1736 4820 msedge.exe 85 PID 4820 wrote to memory of 1736 4820 msedge.exe 85 PID 4820 wrote to memory of 1736 4820 msedge.exe 85 PID 4820 wrote to memory of 1736 4820 msedge.exe 85 PID 4820 wrote to memory of 1736 4820 msedge.exe 85 PID 4820 wrote to memory of 1736 4820 msedge.exe 85 PID 4820 wrote to memory of 1736 4820 msedge.exe 85 PID 4820 wrote to memory of 1736 4820 msedge.exe 85 PID 4820 wrote to memory of 1736 4820 msedge.exe 85 PID 4820 wrote to memory of 1736 4820 msedge.exe 85 PID 4820 wrote to memory of 1736 4820 msedge.exe 85 PID 4820 wrote to memory of 1736 4820 msedge.exe 85 PID 4820 wrote to memory of 1736 4820 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\135f95c12378fe95a786cdd863b35f49_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4820 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbd42d46f8,0x7ffbd42d4708,0x7ffbd42d47182⤵PID:512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,2728959189010466788,2634941019395874820,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2208 /prefetch:22⤵PID:3400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,2728959189010466788,2634941019395874820,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2260 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2136,2728959189010466788,2634941019395874820,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2824 /prefetch:82⤵PID:1736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,2728959189010466788,2634941019395874820,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3124 /prefetch:12⤵PID:724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,2728959189010466788,2634941019395874820,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3148 /prefetch:12⤵PID:232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,2728959189010466788,2634941019395874820,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4684 /prefetch:12⤵PID:2108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,2728959189010466788,2634941019395874820,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4148 /prefetch:12⤵PID:2252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,2728959189010466788,2634941019395874820,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4672 /prefetch:12⤵PID:2680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,2728959189010466788,2634941019395874820,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:1180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,2728959189010466788,2634941019395874820,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5884 /prefetch:82⤵PID:3136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,2728959189010466788,2634941019395874820,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5884 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,2728959189010466788,2634941019395874820,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6436 /prefetch:12⤵PID:2968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,2728959189010466788,2634941019395874820,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6416 /prefetch:12⤵PID:1424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,2728959189010466788,2634941019395874820,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6164 /prefetch:12⤵PID:1720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,2728959189010466788,2634941019395874820,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6128 /prefetch:12⤵PID:4504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,2728959189010466788,2634941019395874820,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3032 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3308
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4924
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4044
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ab8ce148cb7d44f709fb1c460d03e1b0
SHA144d15744015155f3e74580c93317e12d2cc0f859
SHA256014006a90e43ea9a1903b08b843a5aab8ad3823d22e26e5b113fad5f9fa620ff
SHA512f685423b1eaee18a2a06030b4b2977335f62499c0041c142a92f6e6f846c2b9ce54324b6ae94efbbb303282dcda70e2b1597c748fddc251c0b3122a412c2d7c4
-
Filesize
152B
MD538f59a47b777f2fc52088e96ffb2baaf
SHA1267224482588b41a96d813f6d9e9d924867062db
SHA25613569c5681c71dc42ab57d34879f5a567d7b94afe0e8f6d7c6f6c1314fb0087b
SHA5124657d13e1bb7cdd7e83f5f2562f5598cca12edf839626ae96da43e943b5550fab46a14b9018f1bec90de88cc714f637605531ccda99deb9e537908ddb826113b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize792B
MD5314e00639d017b3380c70194118b00aa
SHA101486c05fd7dd1a9f2144bcbc4ec41c36dff2140
SHA2563884e20339f2eb04845f5b4425a7b6bcf16b26098fe0f515e4a60ed9117c07c6
SHA512fc95cb60a0a87372bb411142267e720563372b83c0783dc88cbc0ebcc8b222f01829776d1fe294e6cddd8cae99ea69f42225ea739a5e759d1114f3b5f29a93f4
-
Filesize
1KB
MD5ca169e0fca85bb93272094101a78d272
SHA18477fd415d7dc0f449e00f843148871c98a6a4b4
SHA2565ec76846f7335a8daeb1a5e866fa040e7cd65bd4fee2b71280d62571334ce063
SHA51293c202cb52b989b17c111b868a5d1d6ae0080108fcd421ff4d4004ff2e987b05ac4698077a251f602f9c48ba96f5a2c7af03e816e56d44f397a43d147b702bc5
-
Filesize
5KB
MD504421bf3ef78f47162f2a7374eb669b5
SHA1dfece9eeb26d2807cb93eba8d49025821137aa67
SHA256b68a5d3d5fc3d12014b6b05393844f1263be0f043f7bcc0aa10ff4659c5575e2
SHA51214fb2e1a5ee48d06f63de49ad639d8600d6fc66f37f989e3da1fe8edc526e5db4744925e8a25b10826685ec9d8fc2d86807de3666fe7d62e4393545b2b7a1a3a
-
Filesize
6KB
MD54c599288957a32ee2f68265edf106739
SHA16d87d6caf4c37d447fb00c56d517448ec5c2c7cd
SHA256ac859042239ac0c00c95370b11b9e2d61fa00419a9e463849e66f4ede219e300
SHA5120567f10a69e58348f4be13ec42d18918cc7d7152b3023aa050b7262176b5eab3c00a729e3e808540f355b7cb047e9fec72f682444f5cf01c0ab14c1598330447
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD55d838af274368e9587a5328003468750
SHA128c4274f52029d28909b4b624934828ad9f5cae8
SHA256a657fc4e038c28c058b591259091e959d6aaf54232132c635315290fd6c928b7
SHA51201c1863a134c5e98a53b53e862d615ac485cc41cf1bf050289436198fd046d99ade17c22190698484e12d1caf8e7054009b19e79115f5c609eb975bfbfee0dd2