Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240910-en -
resource tags
arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system -
submitted
04/10/2024, 17:56
Static task
static1
Behavioral task
behavioral1
Sample
145fa596090970f5dd5ce4c8c36d4628_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
145fa596090970f5dd5ce4c8c36d4628_JaffaCakes118.html
Resource
win10v2004-20240910-en
General
-
Target
145fa596090970f5dd5ce4c8c36d4628_JaffaCakes118.html
-
Size
71KB
-
MD5
145fa596090970f5dd5ce4c8c36d4628
-
SHA1
3bdb6a3b8650e878967ae46ef2ab25c315d08b65
-
SHA256
b3544f3987c712a2850e9332b25e52c0fe3038c8eaad38548b9c2f87c162e6e1
-
SHA512
b627390e87e2c791c27ce481d9231c1ca993879350b2caa656a0a5267d8cc98cdd6e1b7dbadafc03a25b51243e25829bd4a2a6a5e5084df35a0e28d9f85dc48c
-
SSDEEP
1536:zicLVY5abDgWVcYMfkwPem1l2MUkVttXEPqZxcbLHvIXeE:5xYXtpFl2OxEPFg1
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3980 msedge.exe 3980 msedge.exe 4916 msedge.exe 4916 msedge.exe 4344 identity_helper.exe 4344 identity_helper.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4916 wrote to memory of 2020 4916 msedge.exe 84 PID 4916 wrote to memory of 2020 4916 msedge.exe 84 PID 4916 wrote to memory of 3988 4916 msedge.exe 85 PID 4916 wrote to memory of 3988 4916 msedge.exe 85 PID 4916 wrote to memory of 3988 4916 msedge.exe 85 PID 4916 wrote to memory of 3988 4916 msedge.exe 85 PID 4916 wrote to memory of 3988 4916 msedge.exe 85 PID 4916 wrote to memory of 3988 4916 msedge.exe 85 PID 4916 wrote to memory of 3988 4916 msedge.exe 85 PID 4916 wrote to memory of 3988 4916 msedge.exe 85 PID 4916 wrote to memory of 3988 4916 msedge.exe 85 PID 4916 wrote to memory of 3988 4916 msedge.exe 85 PID 4916 wrote to memory of 3988 4916 msedge.exe 85 PID 4916 wrote to memory of 3988 4916 msedge.exe 85 PID 4916 wrote to memory of 3988 4916 msedge.exe 85 PID 4916 wrote to memory of 3988 4916 msedge.exe 85 PID 4916 wrote to memory of 3988 4916 msedge.exe 85 PID 4916 wrote to memory of 3988 4916 msedge.exe 85 PID 4916 wrote to memory of 3988 4916 msedge.exe 85 PID 4916 wrote to memory of 3988 4916 msedge.exe 85 PID 4916 wrote to memory of 3988 4916 msedge.exe 85 PID 4916 wrote to memory of 3988 4916 msedge.exe 85 PID 4916 wrote to memory of 3988 4916 msedge.exe 85 PID 4916 wrote to memory of 3988 4916 msedge.exe 85 PID 4916 wrote to memory of 3988 4916 msedge.exe 85 PID 4916 wrote to memory of 3988 4916 msedge.exe 85 PID 4916 wrote to memory of 3988 4916 msedge.exe 85 PID 4916 wrote to memory of 3988 4916 msedge.exe 85 PID 4916 wrote to memory of 3988 4916 msedge.exe 85 PID 4916 wrote to memory of 3988 4916 msedge.exe 85 PID 4916 wrote to memory of 3988 4916 msedge.exe 85 PID 4916 wrote to memory of 3988 4916 msedge.exe 85 PID 4916 wrote to memory of 3988 4916 msedge.exe 85 PID 4916 wrote to memory of 3988 4916 msedge.exe 85 PID 4916 wrote to memory of 3988 4916 msedge.exe 85 PID 4916 wrote to memory of 3988 4916 msedge.exe 85 PID 4916 wrote to memory of 3988 4916 msedge.exe 85 PID 4916 wrote to memory of 3988 4916 msedge.exe 85 PID 4916 wrote to memory of 3988 4916 msedge.exe 85 PID 4916 wrote to memory of 3988 4916 msedge.exe 85 PID 4916 wrote to memory of 3988 4916 msedge.exe 85 PID 4916 wrote to memory of 3988 4916 msedge.exe 85 PID 4916 wrote to memory of 3980 4916 msedge.exe 86 PID 4916 wrote to memory of 3980 4916 msedge.exe 86 PID 4916 wrote to memory of 2344 4916 msedge.exe 87 PID 4916 wrote to memory of 2344 4916 msedge.exe 87 PID 4916 wrote to memory of 2344 4916 msedge.exe 87 PID 4916 wrote to memory of 2344 4916 msedge.exe 87 PID 4916 wrote to memory of 2344 4916 msedge.exe 87 PID 4916 wrote to memory of 2344 4916 msedge.exe 87 PID 4916 wrote to memory of 2344 4916 msedge.exe 87 PID 4916 wrote to memory of 2344 4916 msedge.exe 87 PID 4916 wrote to memory of 2344 4916 msedge.exe 87 PID 4916 wrote to memory of 2344 4916 msedge.exe 87 PID 4916 wrote to memory of 2344 4916 msedge.exe 87 PID 4916 wrote to memory of 2344 4916 msedge.exe 87 PID 4916 wrote to memory of 2344 4916 msedge.exe 87 PID 4916 wrote to memory of 2344 4916 msedge.exe 87 PID 4916 wrote to memory of 2344 4916 msedge.exe 87 PID 4916 wrote to memory of 2344 4916 msedge.exe 87 PID 4916 wrote to memory of 2344 4916 msedge.exe 87 PID 4916 wrote to memory of 2344 4916 msedge.exe 87 PID 4916 wrote to memory of 2344 4916 msedge.exe 87 PID 4916 wrote to memory of 2344 4916 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\145fa596090970f5dd5ce4c8c36d4628_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4916 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe0d9746f8,0x7ffe0d974708,0x7ffe0d9747182⤵PID:2020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,4980163426060100111,11491144838537166895,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2152 /prefetch:22⤵PID:3988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2132,4980163426060100111,11491144838537166895,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2512 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2132,4980163426060100111,11491144838537166895,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2856 /prefetch:82⤵PID:2344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,4980163426060100111,11491144838537166895,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,4980163426060100111,11491144838537166895,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:3460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,4980163426060100111,11491144838537166895,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4248 /prefetch:12⤵PID:4508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,4980163426060100111,11491144838537166895,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5132 /prefetch:82⤵PID:2660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,4980163426060100111,11491144838537166895,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5132 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,4980163426060100111,11491144838537166895,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5248 /prefetch:12⤵PID:2972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,4980163426060100111,11491144838537166895,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5264 /prefetch:12⤵PID:372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,4980163426060100111,11491144838537166895,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4384 /prefetch:12⤵PID:4376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,4980163426060100111,11491144838537166895,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4364 /prefetch:12⤵PID:4924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,4980163426060100111,11491144838537166895,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5240 /prefetch:12⤵PID:3444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,4980163426060100111,11491144838537166895,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1716 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1924
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:60
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:760
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD57006aacd11b992cd29fca21e619e86ea
SHA1f224b726a114d4c73d7379236739d5fbb8e7f7b7
SHA2563c434b96841d5a0fa0a04a6b503c3c4d46f1c4e3a1be77853175e5680e182814
SHA5126de169882c0e01217c4ca01f6ead8e5ebb316a77558e51cd862532dbf9147d9e267f8db667ff6e9fa33164243724f5e437cb882392382f3cae1072dadb762c1d
-
Filesize
152B
MD5b80cf20d9e8cf6a579981bfaab1bdce2
SHA1171a886be3a882bd04206295ce7f1db5b8b7035e
SHA25610d995b136b604440ac4033b2222543975779068a321d7bddf675d0cb2a4c2b1
SHA5120233b34866be1afd214a1c8a9dcf8328d16246b3a5ef142295333547b4cfdc787c8627439a2ca03c20cb49107f7428d39696143b71f56b7f1f05029b3a14376a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize168B
MD554eab711f02cc8320c146a84bf798c93
SHA1f05e0886010eb945a14451ffbab21eefa78ef7c7
SHA2561d393a27e64fc68470eb20212641b39b92adac61020e19716b6a5c8715d642eb
SHA512e2749286b73b3ef27c3985d8bd902e8a9a44a52300adfd9a9fd53f3ec2e5f3e11313bf442f10e9bd44d0fbbd682c1d41534f1e4d46dfa78f3ba2b9048f87a771
-
Filesize
5KB
MD535cc690ca5ecfdaf8eaf0b4cb53a8657
SHA1c04b9e09ea01f705d250f6f98b81b94be87f287b
SHA256916855630651c9afaa043005535ece54ddbcc172b6397193e3ea1c56f7dd7241
SHA51225bd922a3b41e85150ca5ce29562e2c82c8b777f9691c349d31610773d858dd11d0c94a569ee985a55d46a55e384fdd569e5121c51260bce258d3ca929a26f30
-
Filesize
6KB
MD56160a5c8a3b19dc0327f554597c20c24
SHA1e5f4c37df44ecf5011d0d3eb64690e5ff4e7bbd6
SHA256ae9428b0f959abe7ee86488e913f74522b80de1be483a8fdecac048a68ea9de8
SHA512ac328772e21bda3f015bcbf311e04ff4f1604ea3a38e536cf98ecc76ab8bd75f0749ed9dc8e366d0a432451513796e27c3fbf8b534caa9070a0d37d170546d2b
-
Filesize
6KB
MD585075b2f3abaebabf54106feb18d95ed
SHA121aba573fb728177a9e5840ff769c8e8f164175a
SHA2562b8601ed67f74853d89a163d5e06098e6a6add716c0bfc3b295a14ed8c5f98b9
SHA5126274de0f7be9841531e0a243256f3696dbec9406036af775ea3cf1d6a40029943c176d1c627b97096df5ac1738b078c46102a29c8b18752706c5872c5e71e150
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
10KB
MD5178e7334b08315196e7554b533223c2c
SHA17284f14e642494a4ebd1bd595f3492c86063610c
SHA256917cf24480eb55586f888795b04b79cc9bec0aebc63dc0641a3128ea01294730
SHA512926059240e9796aaf3ce0ed7d33c4fc35380ca23ef6d4e7cb16e3d7e6efdd83ff8789c25c59d92f9ad23607dc6894d03adeecc48eb12a952781ad5d2347251e3