Analysis
-
max time kernel
145s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
27/05/2024, 02:46
Static task
static1
Behavioral task
behavioral1
Sample
77a8aa0e0a8177a64b34999b21c66790_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
77a8aa0e0a8177a64b34999b21c66790_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
77a8aa0e0a8177a64b34999b21c66790_JaffaCakes118.html
-
Size
200KB
-
MD5
77a8aa0e0a8177a64b34999b21c66790
-
SHA1
8e5df90c351a0c76a6f32ea65e6f1e91ae6ea656
-
SHA256
5a0c1428c5c43b90a442d18c9b792479386038be813730f4c9a2b341c1b61870
-
SHA512
8247a3ddd00c5858a0cb1f117eb5423a0521ed9b610aa92ce2aa936a21e75344adc4d0e6aed9778926576b7eedb559f83ef181751bd42c4351ab4f68aa067482
-
SSDEEP
3072:KVk3tAkj8zKqLGTfq+L1y8rl+KxJxKbk5U+KxeC5C:oulrQSnfSeiC
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3976 msedge.exe 3976 msedge.exe 3596 msedge.exe 3596 msedge.exe 4664 identity_helper.exe 4664 identity_helper.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3596 wrote to memory of 932 3596 msedge.exe 83 PID 3596 wrote to memory of 932 3596 msedge.exe 83 PID 3596 wrote to memory of 3580 3596 msedge.exe 84 PID 3596 wrote to memory of 3580 3596 msedge.exe 84 PID 3596 wrote to memory of 3580 3596 msedge.exe 84 PID 3596 wrote to memory of 3580 3596 msedge.exe 84 PID 3596 wrote to memory of 3580 3596 msedge.exe 84 PID 3596 wrote to memory of 3580 3596 msedge.exe 84 PID 3596 wrote to memory of 3580 3596 msedge.exe 84 PID 3596 wrote to memory of 3580 3596 msedge.exe 84 PID 3596 wrote to memory of 3580 3596 msedge.exe 84 PID 3596 wrote to memory of 3580 3596 msedge.exe 84 PID 3596 wrote to memory of 3580 3596 msedge.exe 84 PID 3596 wrote to memory of 3580 3596 msedge.exe 84 PID 3596 wrote to memory of 3580 3596 msedge.exe 84 PID 3596 wrote to memory of 3580 3596 msedge.exe 84 PID 3596 wrote to memory of 3580 3596 msedge.exe 84 PID 3596 wrote to memory of 3580 3596 msedge.exe 84 PID 3596 wrote to memory of 3580 3596 msedge.exe 84 PID 3596 wrote to memory of 3580 3596 msedge.exe 84 PID 3596 wrote to memory of 3580 3596 msedge.exe 84 PID 3596 wrote to memory of 3580 3596 msedge.exe 84 PID 3596 wrote to memory of 3580 3596 msedge.exe 84 PID 3596 wrote to memory of 3580 3596 msedge.exe 84 PID 3596 wrote to memory of 3580 3596 msedge.exe 84 PID 3596 wrote to memory of 3580 3596 msedge.exe 84 PID 3596 wrote to memory of 3580 3596 msedge.exe 84 PID 3596 wrote to memory of 3580 3596 msedge.exe 84 PID 3596 wrote to memory of 3580 3596 msedge.exe 84 PID 3596 wrote to memory of 3580 3596 msedge.exe 84 PID 3596 wrote to memory of 3580 3596 msedge.exe 84 PID 3596 wrote to memory of 3580 3596 msedge.exe 84 PID 3596 wrote to memory of 3580 3596 msedge.exe 84 PID 3596 wrote to memory of 3580 3596 msedge.exe 84 PID 3596 wrote to memory of 3580 3596 msedge.exe 84 PID 3596 wrote to memory of 3580 3596 msedge.exe 84 PID 3596 wrote to memory of 3580 3596 msedge.exe 84 PID 3596 wrote to memory of 3580 3596 msedge.exe 84 PID 3596 wrote to memory of 3580 3596 msedge.exe 84 PID 3596 wrote to memory of 3580 3596 msedge.exe 84 PID 3596 wrote to memory of 3580 3596 msedge.exe 84 PID 3596 wrote to memory of 3580 3596 msedge.exe 84 PID 3596 wrote to memory of 3976 3596 msedge.exe 85 PID 3596 wrote to memory of 3976 3596 msedge.exe 85 PID 3596 wrote to memory of 1060 3596 msedge.exe 86 PID 3596 wrote to memory of 1060 3596 msedge.exe 86 PID 3596 wrote to memory of 1060 3596 msedge.exe 86 PID 3596 wrote to memory of 1060 3596 msedge.exe 86 PID 3596 wrote to memory of 1060 3596 msedge.exe 86 PID 3596 wrote to memory of 1060 3596 msedge.exe 86 PID 3596 wrote to memory of 1060 3596 msedge.exe 86 PID 3596 wrote to memory of 1060 3596 msedge.exe 86 PID 3596 wrote to memory of 1060 3596 msedge.exe 86 PID 3596 wrote to memory of 1060 3596 msedge.exe 86 PID 3596 wrote to memory of 1060 3596 msedge.exe 86 PID 3596 wrote to memory of 1060 3596 msedge.exe 86 PID 3596 wrote to memory of 1060 3596 msedge.exe 86 PID 3596 wrote to memory of 1060 3596 msedge.exe 86 PID 3596 wrote to memory of 1060 3596 msedge.exe 86 PID 3596 wrote to memory of 1060 3596 msedge.exe 86 PID 3596 wrote to memory of 1060 3596 msedge.exe 86 PID 3596 wrote to memory of 1060 3596 msedge.exe 86 PID 3596 wrote to memory of 1060 3596 msedge.exe 86 PID 3596 wrote to memory of 1060 3596 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\77a8aa0e0a8177a64b34999b21c66790_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3596 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbcb3246f8,0x7ffbcb324708,0x7ffbcb3247182⤵PID:932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,13070885150150385276,16328403882626878975,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2192 /prefetch:22⤵PID:3580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,13070885150150385276,16328403882626878975,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2320 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2080,13070885150150385276,16328403882626878975,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2660 /prefetch:82⤵PID:1060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,13070885150150385276,16328403882626878975,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:12⤵PID:3436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,13070885150150385276,16328403882626878975,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3364 /prefetch:12⤵PID:2984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,13070885150150385276,16328403882626878975,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6120 /prefetch:12⤵PID:2496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,13070885150150385276,16328403882626878975,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2908 /prefetch:12⤵PID:3648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,13070885150150385276,16328403882626878975,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3044 /prefetch:12⤵PID:4380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,13070885150150385276,16328403882626878975,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5684 /prefetch:82⤵PID:3512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,13070885150150385276,16328403882626878975,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5684 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,13070885150150385276,16328403882626878975,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5640 /prefetch:12⤵PID:832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,13070885150150385276,16328403882626878975,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5880 /prefetch:12⤵PID:2348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,13070885150150385276,16328403882626878975,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3124 /prefetch:12⤵PID:4564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,13070885150150385276,16328403882626878975,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4744 /prefetch:12⤵PID:1780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,13070885150150385276,16328403882626878975,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3908 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4444
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1608
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1464
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f61fa5143fe872d1d8f1e9f8dc6544f9
SHA1df44bab94d7388fb38c63085ec4db80cfc5eb009
SHA256284a24b5b40860240db00ef3ae6a33c9fa8349ab5490a634e27b2c6e9a191c64
SHA512971000784a6518bb39c5cf043292c7ab659162275470f5f6b632ea91a6bcae83bc80517ceb983dd5abfe8fb4e157344cb65c27e609a879eec00b33c5fad563a6
-
Filesize
152B
MD587f7abeb82600e1e640b843ad50fe0a1
SHA1045bbada3f23fc59941bf7d0210fb160cb78ae87
SHA256b35d6906050d90a81d23646f86c20a8f5d42f058ffc6436fb0a2b8bd71ee1262
SHA512ea8e7f24ab823ad710ce079c86c40aa957353a00d2775732c23e31be88a10d212e974c4691279aa86016c4660f5795febf739a15207833df6ed964a9ed99d618
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD5b0ddd03a93dab35e942d0b0b905f3108
SHA1f436b1ab54843c6d953df9ec362d09d1f41d4c02
SHA25622f5dbfb0cfa79a9fe1c7fd082f2ca63530a450e6994eff6bd16255db12eddf8
SHA512b942b47739f88e8a7c09c0304418aa641879aef4924b1285a770e918644e21705896e28d8e0382849d2775990464519764294a980d90561ea9ecc16d6210bfe1
-
Filesize
1KB
MD5f860239410a1f0039038690a2aeccab2
SHA1e49df5c9306e0a9afaf3a6e19ac54bc446faf890
SHA256c665352efe1eb052eff79fd47742ef62a25c20788564d60440740a2b9aeeeeac
SHA512d15990381ced75945e1a58fb26f6f467a82b2fb05cd762ad9dbbdb303437567d16f44c5660b357d7156c35aede8de3de67e373f8a75abea826aecfeca819fb23
-
Filesize
1KB
MD52ecd4a114db514e5df80a59a9a315fcf
SHA13a32a3651251b8cf11b15c0a8335f37aa017bf47
SHA256cbe2f2f1202a76aebb88ba54cb32dd141c41af094f34a6f100e22b89b2731dc8
SHA5127bcd956bea4dca232b66744552cc930a06a670c91d6e2f8ea647c3adfe06b248f84a0f9991c8748e7178bee71f3d24e828b4f6153d9e758d6b0ba9d7b8e8af9e
-
Filesize
6KB
MD5e3c330cec2291307b53cb32c0c2c1430
SHA12fc5b7a950a521fa2d6abd11f87976e53b2381c4
SHA2562c11537f9081dad6ec8a0372acfbd70d22bf25b38eff06eb6a26ae576e565d9b
SHA5120380766716189d0e797251cfc31032d345f8a22d555ba152e5021299c705fd9c20a1e61d764c03668d38a2fc306c2fed56ca59df8c97fde8586b2fac11142092
-
Filesize
5KB
MD56cc9919d9f6b2a0c110ca2ba695cc7d8
SHA114750c3e52727576fe83203b7ca3cc604a1e0a48
SHA256734aa970ba40fa9decfbe12c47923b1ac551c2858bc973e926e81a2e9b01f641
SHA5125ede5d193e0edd0af850fc4d4338a0d297e5bed28c7a282a5dbb22c176bcab6a22849f6564f68668d752bd689333b5164d075c2dda2ff5824eded53b505222ac
-
Filesize
7KB
MD5cc4a60527ede25e2dffdd348c3fca779
SHA1e18c2fca922c8d488b35427efc7f01b18e57c3c0
SHA256d5cb962adcca0a17d312621913a97a41cbf85cbd37fee583011d2c0786e801b9
SHA512bc490072cc491dd98c35c3f750579a53d64e66c9eb6736cb566b991a91c6fde8b9a7facc1407004c0091a418d2bf344355654a09dfbb5498eb98f4572a7ecf90
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5eb664eb8c337fe7ac46941dd91c0a19a
SHA12d42de0df3589ae019b8e7ce4e9c74d24e7b5651
SHA25608eab5df907f436f631b823746a6d1476e6fd6e7135e56de6f7a8c4c8c2667ac
SHA51275d6c7e485434805bbedcecc874b4738d2fd09dd6ca860b39d2d7d424eb34fd4c6e114e6e2fcc741018a66875f6d560730d496fdeb27d41b8c5a15a0364c1a68