Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240910-en -
resource tags
arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system -
submitted
05/10/2024, 08:21
Static task
static1
Behavioral task
behavioral1
Sample
16ea527626fb7366b7554ba18d53fbbf_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
16ea527626fb7366b7554ba18d53fbbf_JaffaCakes118.html
Resource
win10v2004-20240910-en
General
-
Target
16ea527626fb7366b7554ba18d53fbbf_JaffaCakes118.html
-
Size
1.0MB
-
MD5
16ea527626fb7366b7554ba18d53fbbf
-
SHA1
c688be9a260dc034de78934ec1942978c4b1a632
-
SHA256
fff1c1e4c6a1f1eb7c92116c7f1f5ad4410efb34f6f465881c55791633d6aa9f
-
SHA512
69dcb413664e9f021798358357b305046c68c3cb632eee7ebe0c20a7b431558ff0ced601170a737d6465b6916f713ac646212575f42c8e75c074e8e2ccba978e
-
SSDEEP
6144:FkclF6of6dhNE+0Qq2yP17rBMj3zeH0yWe5nEzDnxUOaElwdyMuLVWl:Fkcl426ZE+0Qq24rAO1jQLs
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4152 msedge.exe 4152 msedge.exe 4428 msedge.exe 4428 msedge.exe 3544 identity_helper.exe 3544 identity_helper.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4428 wrote to memory of 2472 4428 msedge.exe 84 PID 4428 wrote to memory of 2472 4428 msedge.exe 84 PID 4428 wrote to memory of 1132 4428 msedge.exe 85 PID 4428 wrote to memory of 1132 4428 msedge.exe 85 PID 4428 wrote to memory of 1132 4428 msedge.exe 85 PID 4428 wrote to memory of 1132 4428 msedge.exe 85 PID 4428 wrote to memory of 1132 4428 msedge.exe 85 PID 4428 wrote to memory of 1132 4428 msedge.exe 85 PID 4428 wrote to memory of 1132 4428 msedge.exe 85 PID 4428 wrote to memory of 1132 4428 msedge.exe 85 PID 4428 wrote to memory of 1132 4428 msedge.exe 85 PID 4428 wrote to memory of 1132 4428 msedge.exe 85 PID 4428 wrote to memory of 1132 4428 msedge.exe 85 PID 4428 wrote to memory of 1132 4428 msedge.exe 85 PID 4428 wrote to memory of 1132 4428 msedge.exe 85 PID 4428 wrote to memory of 1132 4428 msedge.exe 85 PID 4428 wrote to memory of 1132 4428 msedge.exe 85 PID 4428 wrote to memory of 1132 4428 msedge.exe 85 PID 4428 wrote to memory of 1132 4428 msedge.exe 85 PID 4428 wrote to memory of 1132 4428 msedge.exe 85 PID 4428 wrote to memory of 1132 4428 msedge.exe 85 PID 4428 wrote to memory of 1132 4428 msedge.exe 85 PID 4428 wrote to memory of 1132 4428 msedge.exe 85 PID 4428 wrote to memory of 1132 4428 msedge.exe 85 PID 4428 wrote to memory of 1132 4428 msedge.exe 85 PID 4428 wrote to memory of 1132 4428 msedge.exe 85 PID 4428 wrote to memory of 1132 4428 msedge.exe 85 PID 4428 wrote to memory of 1132 4428 msedge.exe 85 PID 4428 wrote to memory of 1132 4428 msedge.exe 85 PID 4428 wrote to memory of 1132 4428 msedge.exe 85 PID 4428 wrote to memory of 1132 4428 msedge.exe 85 PID 4428 wrote to memory of 1132 4428 msedge.exe 85 PID 4428 wrote to memory of 1132 4428 msedge.exe 85 PID 4428 wrote to memory of 1132 4428 msedge.exe 85 PID 4428 wrote to memory of 1132 4428 msedge.exe 85 PID 4428 wrote to memory of 1132 4428 msedge.exe 85 PID 4428 wrote to memory of 1132 4428 msedge.exe 85 PID 4428 wrote to memory of 1132 4428 msedge.exe 85 PID 4428 wrote to memory of 1132 4428 msedge.exe 85 PID 4428 wrote to memory of 1132 4428 msedge.exe 85 PID 4428 wrote to memory of 1132 4428 msedge.exe 85 PID 4428 wrote to memory of 1132 4428 msedge.exe 85 PID 4428 wrote to memory of 4152 4428 msedge.exe 86 PID 4428 wrote to memory of 4152 4428 msedge.exe 86 PID 4428 wrote to memory of 2320 4428 msedge.exe 87 PID 4428 wrote to memory of 2320 4428 msedge.exe 87 PID 4428 wrote to memory of 2320 4428 msedge.exe 87 PID 4428 wrote to memory of 2320 4428 msedge.exe 87 PID 4428 wrote to memory of 2320 4428 msedge.exe 87 PID 4428 wrote to memory of 2320 4428 msedge.exe 87 PID 4428 wrote to memory of 2320 4428 msedge.exe 87 PID 4428 wrote to memory of 2320 4428 msedge.exe 87 PID 4428 wrote to memory of 2320 4428 msedge.exe 87 PID 4428 wrote to memory of 2320 4428 msedge.exe 87 PID 4428 wrote to memory of 2320 4428 msedge.exe 87 PID 4428 wrote to memory of 2320 4428 msedge.exe 87 PID 4428 wrote to memory of 2320 4428 msedge.exe 87 PID 4428 wrote to memory of 2320 4428 msedge.exe 87 PID 4428 wrote to memory of 2320 4428 msedge.exe 87 PID 4428 wrote to memory of 2320 4428 msedge.exe 87 PID 4428 wrote to memory of 2320 4428 msedge.exe 87 PID 4428 wrote to memory of 2320 4428 msedge.exe 87 PID 4428 wrote to memory of 2320 4428 msedge.exe 87 PID 4428 wrote to memory of 2320 4428 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\16ea527626fb7366b7554ba18d53fbbf_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4428 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff97b3246f8,0x7ff97b324708,0x7ff97b3247182⤵PID:2472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,13216000468228874941,12498494530467870131,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2152 /prefetch:22⤵PID:1132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,13216000468228874941,12498494530467870131,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2204 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2136,13216000468228874941,12498494530467870131,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2740 /prefetch:82⤵PID:2320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,13216000468228874941,12498494530467870131,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:2264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,13216000468228874941,12498494530467870131,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:3268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,13216000468228874941,12498494530467870131,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4788 /prefetch:12⤵PID:2676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,13216000468228874941,12498494530467870131,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5132 /prefetch:12⤵PID:2732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,13216000468228874941,12498494530467870131,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5304 /prefetch:12⤵PID:4368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,13216000468228874941,12498494530467870131,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4016 /prefetch:12⤵PID:4612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,13216000468228874941,12498494530467870131,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5316 /prefetch:82⤵PID:4980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,13216000468228874941,12498494530467870131,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5316 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,13216000468228874941,12498494530467870131,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5636 /prefetch:12⤵PID:4632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,13216000468228874941,12498494530467870131,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5484 /prefetch:12⤵PID:1208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,13216000468228874941,12498494530467870131,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5784 /prefetch:12⤵PID:2852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,13216000468228874941,12498494530467870131,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5012 /prefetch:12⤵PID:2828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,13216000468228874941,12498494530467870131,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1336 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4276
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4892
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3304
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD57006aacd11b992cd29fca21e619e86ea
SHA1f224b726a114d4c73d7379236739d5fbb8e7f7b7
SHA2563c434b96841d5a0fa0a04a6b503c3c4d46f1c4e3a1be77853175e5680e182814
SHA5126de169882c0e01217c4ca01f6ead8e5ebb316a77558e51cd862532dbf9147d9e267f8db667ff6e9fa33164243724f5e437cb882392382f3cae1072dadb762c1d
-
Filesize
152B
MD5b80cf20d9e8cf6a579981bfaab1bdce2
SHA1171a886be3a882bd04206295ce7f1db5b8b7035e
SHA25610d995b136b604440ac4033b2222543975779068a321d7bddf675d0cb2a4c2b1
SHA5120233b34866be1afd214a1c8a9dcf8328d16246b3a5ef142295333547b4cfdc787c8627439a2ca03c20cb49107f7428d39696143b71f56b7f1f05029b3a14376a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize192B
MD5023966d31300792a47af58e9624faed3
SHA18c85ec23dd17366d26b22c0f111f0a308cb8de59
SHA256dfcfd591ade208c401d92c137bcffb82d0264c39c0cd2828c01728cce837555a
SHA5125f0d639478125e357a09f536bb92f4d814d1618dba7665a79b18d15d23743bc4c2e7862644e538f84699d9b1f2e2dae7f1a75aa27f59c2da64ec04244267c2fa
-
Filesize
1KB
MD5e16dfe21dbb8078ce0bd41d7afc5f81a
SHA12c395f859cefed3faee1ff86e47ffed3e66b188a
SHA2563316620c09c8367b6a972ff2173d82854447e7cc6ac62039c304f9eef9316e19
SHA512c427a7eeac18de25b6aeef0222fd1bf686a02d97e9c9cd33bd2390f916ba5587c90414546bb2a35b9ff546c8a760efff0f1542b319930a4a8247bea7efad3bb0
-
Filesize
5KB
MD58138e4c8139021918c9cba27477c2333
SHA11ef409c48898b58dd3f73820b475d6e685a63c62
SHA256246c8739a786fb777e11e6892b0570cc67b236b8b151621b28906caad44c5971
SHA512875270f0e4ce5b8f3f1cf8e88e8f5e1dd41ae75021e913ed79de0ec97261d48f1ada8365751d45a064cf780fef096f2daa3c63937341cf86639a6f7e98764738
-
Filesize
7KB
MD54c12aca945ad24800c0b919a32df49e6
SHA10f62c6118428aa39ded48774dc61b74d7f82c3a7
SHA256cb54030b3657bf29fc2f1b1426e9198202f45c7e917e5373175cf5180fe95f65
SHA512b6a9de3aa54c055727d7c3186f8bccec7d8181c7a80feb044b52f1f8eb224178c3a4f8ad92e00227a585f00aeefe294ff2f6dc435446ac5d18463f2695d3b88e
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
10KB
MD5fb130143225bb05ddc14ea829d4b6232
SHA1fd64cd0b5abb7fd90cc3c47b30263b8cea28efad
SHA2562ff051c505b720704868b402dc9354e5f6549b37b300e53cfb1c95f9ebfaf627
SHA512b86eb200703678f54d0eeea4cf8d6ecf72dcf5056433a1710d01faf4f91c39b49ffca159d5ccf1d8de9ea3e09f7c41bcc7aa3e014c28f7f2905edb0fe82ce90a