Analysis
-
max time kernel
145s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
10/05/2024, 00:40
Static task
static1
Behavioral task
behavioral1
Sample
2c7e63a89f6e00930a434bf2970615a9_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2c7e63a89f6e00930a434bf2970615a9_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
2c7e63a89f6e00930a434bf2970615a9_JaffaCakes118.html
-
Size
175KB
-
MD5
2c7e63a89f6e00930a434bf2970615a9
-
SHA1
f685f25c0201bcab19727680311395722cbd2c42
-
SHA256
e419dabde28f8abab62729fd8af19c5436e3753c44e1c355f83143b1f3c7e2e7
-
SHA512
22b00c01937e0345961f8b37f33872a2bc291e3d20219648104afae607c2580df8a32ee61497d2317a3717e5338a417c6ce8f4d14112cccb40c6ecec2bf875f1
-
SSDEEP
1536:SqtO8gd8Wu8pI8Cd8hd8dQgbH//WoS3vGNkFZYfBCJiZc+aeTH+WK/Lf1/hpnVSV:SaCT3v/F8BCJiDB
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 840 msedge.exe 840 msedge.exe 772 msedge.exe 772 msedge.exe 4948 identity_helper.exe 4948 identity_helper.exe 5956 msedge.exe 5956 msedge.exe 5956 msedge.exe 5956 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 772 msedge.exe 772 msedge.exe 772 msedge.exe 772 msedge.exe 772 msedge.exe 772 msedge.exe 772 msedge.exe 772 msedge.exe 772 msedge.exe 772 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 772 msedge.exe 772 msedge.exe 772 msedge.exe 772 msedge.exe 772 msedge.exe 772 msedge.exe 772 msedge.exe 772 msedge.exe 772 msedge.exe 772 msedge.exe 772 msedge.exe 772 msedge.exe 772 msedge.exe 772 msedge.exe 772 msedge.exe 772 msedge.exe 772 msedge.exe 772 msedge.exe 772 msedge.exe 772 msedge.exe 772 msedge.exe 772 msedge.exe 772 msedge.exe 772 msedge.exe 772 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 772 msedge.exe 772 msedge.exe 772 msedge.exe 772 msedge.exe 772 msedge.exe 772 msedge.exe 772 msedge.exe 772 msedge.exe 772 msedge.exe 772 msedge.exe 772 msedge.exe 772 msedge.exe 772 msedge.exe 772 msedge.exe 772 msedge.exe 772 msedge.exe 772 msedge.exe 772 msedge.exe 772 msedge.exe 772 msedge.exe 772 msedge.exe 772 msedge.exe 772 msedge.exe 772 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 772 wrote to memory of 948 772 msedge.exe 83 PID 772 wrote to memory of 948 772 msedge.exe 83 PID 772 wrote to memory of 2060 772 msedge.exe 84 PID 772 wrote to memory of 2060 772 msedge.exe 84 PID 772 wrote to memory of 2060 772 msedge.exe 84 PID 772 wrote to memory of 2060 772 msedge.exe 84 PID 772 wrote to memory of 2060 772 msedge.exe 84 PID 772 wrote to memory of 2060 772 msedge.exe 84 PID 772 wrote to memory of 2060 772 msedge.exe 84 PID 772 wrote to memory of 2060 772 msedge.exe 84 PID 772 wrote to memory of 2060 772 msedge.exe 84 PID 772 wrote to memory of 2060 772 msedge.exe 84 PID 772 wrote to memory of 2060 772 msedge.exe 84 PID 772 wrote to memory of 2060 772 msedge.exe 84 PID 772 wrote to memory of 2060 772 msedge.exe 84 PID 772 wrote to memory of 2060 772 msedge.exe 84 PID 772 wrote to memory of 2060 772 msedge.exe 84 PID 772 wrote to memory of 2060 772 msedge.exe 84 PID 772 wrote to memory of 2060 772 msedge.exe 84 PID 772 wrote to memory of 2060 772 msedge.exe 84 PID 772 wrote to memory of 2060 772 msedge.exe 84 PID 772 wrote to memory of 2060 772 msedge.exe 84 PID 772 wrote to memory of 2060 772 msedge.exe 84 PID 772 wrote to memory of 2060 772 msedge.exe 84 PID 772 wrote to memory of 2060 772 msedge.exe 84 PID 772 wrote to memory of 2060 772 msedge.exe 84 PID 772 wrote to memory of 2060 772 msedge.exe 84 PID 772 wrote to memory of 2060 772 msedge.exe 84 PID 772 wrote to memory of 2060 772 msedge.exe 84 PID 772 wrote to memory of 2060 772 msedge.exe 84 PID 772 wrote to memory of 2060 772 msedge.exe 84 PID 772 wrote to memory of 2060 772 msedge.exe 84 PID 772 wrote to memory of 2060 772 msedge.exe 84 PID 772 wrote to memory of 2060 772 msedge.exe 84 PID 772 wrote to memory of 2060 772 msedge.exe 84 PID 772 wrote to memory of 2060 772 msedge.exe 84 PID 772 wrote to memory of 2060 772 msedge.exe 84 PID 772 wrote to memory of 2060 772 msedge.exe 84 PID 772 wrote to memory of 2060 772 msedge.exe 84 PID 772 wrote to memory of 2060 772 msedge.exe 84 PID 772 wrote to memory of 2060 772 msedge.exe 84 PID 772 wrote to memory of 2060 772 msedge.exe 84 PID 772 wrote to memory of 840 772 msedge.exe 85 PID 772 wrote to memory of 840 772 msedge.exe 85 PID 772 wrote to memory of 4544 772 msedge.exe 86 PID 772 wrote to memory of 4544 772 msedge.exe 86 PID 772 wrote to memory of 4544 772 msedge.exe 86 PID 772 wrote to memory of 4544 772 msedge.exe 86 PID 772 wrote to memory of 4544 772 msedge.exe 86 PID 772 wrote to memory of 4544 772 msedge.exe 86 PID 772 wrote to memory of 4544 772 msedge.exe 86 PID 772 wrote to memory of 4544 772 msedge.exe 86 PID 772 wrote to memory of 4544 772 msedge.exe 86 PID 772 wrote to memory of 4544 772 msedge.exe 86 PID 772 wrote to memory of 4544 772 msedge.exe 86 PID 772 wrote to memory of 4544 772 msedge.exe 86 PID 772 wrote to memory of 4544 772 msedge.exe 86 PID 772 wrote to memory of 4544 772 msedge.exe 86 PID 772 wrote to memory of 4544 772 msedge.exe 86 PID 772 wrote to memory of 4544 772 msedge.exe 86 PID 772 wrote to memory of 4544 772 msedge.exe 86 PID 772 wrote to memory of 4544 772 msedge.exe 86 PID 772 wrote to memory of 4544 772 msedge.exe 86 PID 772 wrote to memory of 4544 772 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2c7e63a89f6e00930a434bf2970615a9_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:772 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb014846f8,0x7ffb01484708,0x7ffb014847182⤵PID:948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2196,18096854159444989570,18383445474000665028,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2212 /prefetch:22⤵PID:2060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2196,18096854159444989570,18383445474000665028,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2264 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2196,18096854159444989570,18383445474000665028,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2824 /prefetch:82⤵PID:4544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,18096854159444989570,18383445474000665028,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:3644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,18096854159444989570,18383445474000665028,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:1328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,18096854159444989570,18383445474000665028,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4796 /prefetch:12⤵PID:936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,18096854159444989570,18383445474000665028,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4912 /prefetch:12⤵PID:4088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,18096854159444989570,18383445474000665028,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5300 /prefetch:12⤵PID:2040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,18096854159444989570,18383445474000665028,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4780 /prefetch:12⤵PID:5028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2196,18096854159444989570,18383445474000665028,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5524 /prefetch:82⤵PID:1612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2196,18096854159444989570,18383445474000665028,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5524 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,18096854159444989570,18383445474000665028,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5592 /prefetch:12⤵PID:3768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,18096854159444989570,18383445474000665028,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5596 /prefetch:12⤵PID:816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,18096854159444989570,18383445474000665028,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6068 /prefetch:12⤵PID:1456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,18096854159444989570,18383445474000665028,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6064 /prefetch:12⤵PID:2872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2196,18096854159444989570,18383445474000665028,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2064 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5956
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3248
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:224
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2796
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5537815e7cc5c694912ac0308147852e4
SHA12ccdd9d9dc637db5462fe8119c0df261146c363c
SHA256b4b69d099507d88abdeff4835e06cc6711e1c47464c963d013cef0a278e52d4f
SHA51263969a69af057235dbdecddc483ef5ce0058673179a3580c5aa12938c9501513cdb72dd703a06fa7d4fc08d074f17528283338c795334398497c771ecbd1350a
-
Filesize
152B
MD58b167567021ccb1a9fdf073fa9112ef0
SHA13baf293fbfaa7c1e7cdacb5f2975737f4ef69898
SHA25626764cedf35f118b55f30b3a36e0693f9f38290a5b2b6b8b83a00e990ae18513
SHA512726098001ef1acf1dd154a658752fa27dea32bca8fbb66395c142cb666102e71632adbad1b7e2f717071cd3e3af3867471932a71707f2ae97b989f4be468ab54
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize456B
MD5ac28fe033fdc5769fe7dc1a334ade690
SHA1d8aab281f5c41213a5c719a0259dca74126ed38a
SHA25688281a7b0b38737f324f6667414d4293c69e61a08d2fe783e2ba7559dfe9c776
SHA5125bd0ede1ca366ca41f1694c7fc716ba887297610eeb0596b9c9a98a6cb87a35c83207a6bb4cb84d8f5f5ac351ea11012ad6f4a96d8c5e794c618cb67ac9762ea
-
Filesize
2KB
MD5f0b0b59d54d1466c62280d7fc35cc133
SHA1202c07d1e054b29a881fb55376d386c74a57cb8c
SHA2566163d6a4da27d81f06a63b0674223ee1bd4688608ceb6b06d8bf003b02d01e7c
SHA512d04b19c77a8275293d524d2a7067b188dd1021bc4cbc8f49c4e249fa96e986002f74f090dcd61291041ab721f0e4e4af28802551900c4cd75c64262ad284b1bb
-
Filesize
2KB
MD5c8e0c354ecfa4e59ac42a1b0606169c0
SHA1c41be36b3f392e088d19185ddd4150d89a5272f3
SHA2566161bf93d02d0deaf6c5aaa0fc2a2effa25c2ea70559be372881597c5eb97bf8
SHA512a7daca1d38bfdf416aef3cd2238982dfc7e6733a0d7c339e65c321ffe47d03d8bd88cf2e5c175a7e05e5e507dd728003886dcaacd279dbbc81bc42ff02022781
-
Filesize
5KB
MD5ff53fc1eef7dd5e550bff4b8739e2752
SHA1eca198406680153715586b198523e08b4708eefd
SHA256d39d0e22bdcdd75698b9566ecf7d14918c919d5e48cc708b8a709e4e1dc3d6c6
SHA51242b6e764050caa1f24f3f9b20fb684deef7aad6fbb8727840da16d9d287e5d951bbe181a2ff1e619ed233fab4ba592389903bd87a0493d6c420df24a7626b304
-
Filesize
7KB
MD5a19e6b1501df23733a2e220951adfb2f
SHA1644fa90ef66db35ff85fcb41697b26fc0865610a
SHA25618c132706df2c0741549a1cc87bae2f0101b8b607303c11c984df5431c47f998
SHA5120ffbeaf0b86c2098a18c8a67a3f1db34c1d41d2f02caf41dd910aaeb2eabd9375ba575a5b84a00c9b6a1221aed822934a304998498c605531c89e160dd3bd7d3
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD565e41af993dd00c2b3a1cefbb9b6e271
SHA16f450f2596bff370a6ce5249ed84f0020bd03087
SHA2562143a5d5067239b2a3453717be6a38736b7d63afdc0b000985961fd86f2d62fd
SHA512efcb5d296566b945b53ac6ea1592202513ca7f533fe95c040eb2cf690b41a6577772faa3fc567cc0dea458c9611be01810049f76cb26ff95dfe03aff7ae7ba19