Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
28-06-2024 00:04
Static task
static1
Behavioral task
behavioral1
Sample
180d4f45210ee79a6baf0bd4c798a789_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
180d4f45210ee79a6baf0bd4c798a789_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
180d4f45210ee79a6baf0bd4c798a789_JaffaCakes118.html
-
Size
28KB
-
MD5
180d4f45210ee79a6baf0bd4c798a789
-
SHA1
691563447dc17c377d4ace92b9b9452d40d85925
-
SHA256
c29209f3c4c569cf7f3cadc31bb37251a80a323e89d308eb77a78efa870fd236
-
SHA512
740d7163d30cba49d1fc7d3a3e9bad51840975f27c33e18208c08a852104261c9e26ee3fb4a9357b7e3234a71404a981206c5e51b232511b0a5d11414b762d2e
-
SSDEEP
768:Zcd9QZBC7mOdMoNpC5I9nC4rwAwXwn9Pd:gQZBCCOdF0IxCawAwXwn9Pd
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3152 msedge.exe 3152 msedge.exe 3336 msedge.exe 3336 msedge.exe 3728 identity_helper.exe 3728 identity_helper.exe 6016 msedge.exe 6016 msedge.exe 6016 msedge.exe 6016 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3336 wrote to memory of 4576 3336 msedge.exe 84 PID 3336 wrote to memory of 4576 3336 msedge.exe 84 PID 3336 wrote to memory of 3508 3336 msedge.exe 85 PID 3336 wrote to memory of 3508 3336 msedge.exe 85 PID 3336 wrote to memory of 3508 3336 msedge.exe 85 PID 3336 wrote to memory of 3508 3336 msedge.exe 85 PID 3336 wrote to memory of 3508 3336 msedge.exe 85 PID 3336 wrote to memory of 3508 3336 msedge.exe 85 PID 3336 wrote to memory of 3508 3336 msedge.exe 85 PID 3336 wrote to memory of 3508 3336 msedge.exe 85 PID 3336 wrote to memory of 3508 3336 msedge.exe 85 PID 3336 wrote to memory of 3508 3336 msedge.exe 85 PID 3336 wrote to memory of 3508 3336 msedge.exe 85 PID 3336 wrote to memory of 3508 3336 msedge.exe 85 PID 3336 wrote to memory of 3508 3336 msedge.exe 85 PID 3336 wrote to memory of 3508 3336 msedge.exe 85 PID 3336 wrote to memory of 3508 3336 msedge.exe 85 PID 3336 wrote to memory of 3508 3336 msedge.exe 85 PID 3336 wrote to memory of 3508 3336 msedge.exe 85 PID 3336 wrote to memory of 3508 3336 msedge.exe 85 PID 3336 wrote to memory of 3508 3336 msedge.exe 85 PID 3336 wrote to memory of 3508 3336 msedge.exe 85 PID 3336 wrote to memory of 3508 3336 msedge.exe 85 PID 3336 wrote to memory of 3508 3336 msedge.exe 85 PID 3336 wrote to memory of 3508 3336 msedge.exe 85 PID 3336 wrote to memory of 3508 3336 msedge.exe 85 PID 3336 wrote to memory of 3508 3336 msedge.exe 85 PID 3336 wrote to memory of 3508 3336 msedge.exe 85 PID 3336 wrote to memory of 3508 3336 msedge.exe 85 PID 3336 wrote to memory of 3508 3336 msedge.exe 85 PID 3336 wrote to memory of 3508 3336 msedge.exe 85 PID 3336 wrote to memory of 3508 3336 msedge.exe 85 PID 3336 wrote to memory of 3508 3336 msedge.exe 85 PID 3336 wrote to memory of 3508 3336 msedge.exe 85 PID 3336 wrote to memory of 3508 3336 msedge.exe 85 PID 3336 wrote to memory of 3508 3336 msedge.exe 85 PID 3336 wrote to memory of 3508 3336 msedge.exe 85 PID 3336 wrote to memory of 3508 3336 msedge.exe 85 PID 3336 wrote to memory of 3508 3336 msedge.exe 85 PID 3336 wrote to memory of 3508 3336 msedge.exe 85 PID 3336 wrote to memory of 3508 3336 msedge.exe 85 PID 3336 wrote to memory of 3508 3336 msedge.exe 85 PID 3336 wrote to memory of 3152 3336 msedge.exe 86 PID 3336 wrote to memory of 3152 3336 msedge.exe 86 PID 3336 wrote to memory of 4688 3336 msedge.exe 87 PID 3336 wrote to memory of 4688 3336 msedge.exe 87 PID 3336 wrote to memory of 4688 3336 msedge.exe 87 PID 3336 wrote to memory of 4688 3336 msedge.exe 87 PID 3336 wrote to memory of 4688 3336 msedge.exe 87 PID 3336 wrote to memory of 4688 3336 msedge.exe 87 PID 3336 wrote to memory of 4688 3336 msedge.exe 87 PID 3336 wrote to memory of 4688 3336 msedge.exe 87 PID 3336 wrote to memory of 4688 3336 msedge.exe 87 PID 3336 wrote to memory of 4688 3336 msedge.exe 87 PID 3336 wrote to memory of 4688 3336 msedge.exe 87 PID 3336 wrote to memory of 4688 3336 msedge.exe 87 PID 3336 wrote to memory of 4688 3336 msedge.exe 87 PID 3336 wrote to memory of 4688 3336 msedge.exe 87 PID 3336 wrote to memory of 4688 3336 msedge.exe 87 PID 3336 wrote to memory of 4688 3336 msedge.exe 87 PID 3336 wrote to memory of 4688 3336 msedge.exe 87 PID 3336 wrote to memory of 4688 3336 msedge.exe 87 PID 3336 wrote to memory of 4688 3336 msedge.exe 87 PID 3336 wrote to memory of 4688 3336 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\180d4f45210ee79a6baf0bd4c798a789_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3336 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd08de46f8,0x7ffd08de4708,0x7ffd08de47182⤵PID:4576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2176,15248307166085906902,10481039033527335249,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2188 /prefetch:22⤵PID:3508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2176,15248307166085906902,10481039033527335249,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2244 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2176,15248307166085906902,10481039033527335249,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2872 /prefetch:82⤵PID:4688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,15248307166085906902,10481039033527335249,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:2164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,15248307166085906902,10481039033527335249,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:1932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,15248307166085906902,10481039033527335249,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4228 /prefetch:12⤵PID:4104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,15248307166085906902,10481039033527335249,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4368 /prefetch:12⤵PID:1664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,15248307166085906902,10481039033527335249,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6140 /prefetch:12⤵PID:2424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2176,15248307166085906902,10481039033527335249,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6288 /prefetch:82⤵PID:3440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2176,15248307166085906902,10481039033527335249,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6288 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,15248307166085906902,10481039033527335249,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5864 /prefetch:12⤵PID:5008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,15248307166085906902,10481039033527335249,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5884 /prefetch:12⤵PID:3752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,15248307166085906902,10481039033527335249,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5996 /prefetch:12⤵PID:5312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,15248307166085906902,10481039033527335249,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5132 /prefetch:12⤵PID:5320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2176,15248307166085906902,10481039033527335249,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2972 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:6016
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1652
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2668
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD581e892ca5c5683efdf9135fe0f2adb15
SHA139159b30226d98a465ece1da28dc87088b20ecad
SHA256830f394548cff6eed3608476190a7ee7d65fe651adc638c5b27ce58639a91e17
SHA512c943f4cfe8615ac159cfac13c10b67e6c0c9093851dd3ac6dda3b82e195d3554e3c37962010a2d0ae5074828d376402624f0dda5499c9997e962e4cfd26444c0
-
Filesize
152B
MD556067634f68231081c4bd5bdbfcc202f
SHA15582776da6ffc75bb0973840fc3d15598bc09eb1
SHA2568c08b0cbceb301c8f960aa674c6e7f6dbf40b4a1c2684e6fb0456ec5ff0e56b4
SHA512c4657393e0b9ec682570d7e251644a858d33e056ccd0f3eebffd0fde25244b3a699b8d9244bcdac00d6f74b49833629b270e099c2b557f729a9066922583f784
-
Filesize
211KB
MD5151fb811968eaf8efb840908b89dc9d4
SHA17ec811009fd9b0e6d92d12d78b002275f2f1bee1
SHA256043fd8558e4a5a60aaccd2f0377f77a544e3e375242e9d7200dc6e51f94103ed
SHA51283aface0ab01da52fd077f747c9d5916e3c06b0ea5c551d7d316707ec3e8f3f986ce1c82e6f2136e48c6511a83cb0ac67ff6dc8f0e440ac72fc6854086a87674
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize504B
MD50ab88adc2b132501a589866e160a7c38
SHA1371d9cf3f951ad870b5118b1bbc62e102225ea99
SHA2561604cd50b9d1e36c574998bbaf84e5968cb0de5864064f522c0df04fac099376
SHA5123f4898a3f4ac264e00bf8f6147d4b7f8d2df8fdf079910b965e3aa6ee68e429f67dec8574ba2d80cd7f2cd9cf312e70f33c84959230a9cc4c0a5c0fec4ad464e
-
Filesize
1KB
MD559cfcf56a4a511ae47b64868b2d478c0
SHA1f067af6c70f176bb7850cbb3fcc34e0839400f86
SHA25651788cbfcda9c46e5f680131218e7a85e48a6bd15ccfd4d14b2da4055920f74b
SHA5127420e2f279e382e9524d426b45ed17562c69c9587fa73168bc06bc2ca11cfe5c4f8c7d3db22c17d0d833d80a93e29c8dbf1158768393ecf165335cbc9c2b498f
-
Filesize
5KB
MD58513dbd22234114e4d24bdcfba169093
SHA116abaea2da1dfef22f691d7b42cb7015d6d5fb0b
SHA256b7216fe6f93c67d245dc43e6ea8e70de1c3b812db924aec5df1eb6bc996a2277
SHA5121affeda86b24f411274c7491334ac320749a3e8f2f137aad6faf7bce37570bd7f3aef704dc804345234dbb1c76565124c72655ecf1c841751d2da115935f22de
-
Filesize
6KB
MD5b66572e220d9ea9bd0d837f930fa090a
SHA196bed9ea35afd0770e26efa84235a0bdcb55bf7a
SHA256146daeda85305b15610c5cf9402dbd125a7e0f9c7bf4c139723d792691352c23
SHA51264fa4188692d9c4746c7c541af5d9abfcb4127923d483b17751bc8e9698c6f7b75c599d9b2692d4f81673386f108a5112073330f73630a85c56b9a4e2e43088e
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD56b13f8462d2ac225f3d6df2157422239
SHA194bedcd1a35b1521d3d2ef130412793001224fba
SHA25662d368976a5660947d377eceabb79b348734a9018c574c5e12a282fd69e3ca35
SHA512fb2437b2da3c600dbda743458e79daf566d4e5789c1b925246780df488a9898168856eba9b30fd64a5193f3973d4f7bd027b2de673bc21c623f5a07cbd49a11b