Analysis
-
max time kernel
145s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
06/07/2024, 14:49
Static task
static1
Behavioral task
behavioral1
Sample
288afec190b80c06e8cf5343e6524f13_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
288afec190b80c06e8cf5343e6524f13_JaffaCakes118.html
Resource
win10v2004-20240704-en
General
-
Target
288afec190b80c06e8cf5343e6524f13_JaffaCakes118.html
-
Size
58KB
-
MD5
288afec190b80c06e8cf5343e6524f13
-
SHA1
a97eb3f8f1e8180984a1d40431c1b817edb620dc
-
SHA256
978e68496763e59ef3e66034d6a2c26499d9fe89cfd5a5cfe5d18e1132367624
-
SHA512
4357aa4bab912ad61a6fd58567d2c13edc8bd8db1e59c6579cd5d53161899125e6ba95aa02d0b358389c6bcd3126faf3af52e97a03111c0fcd9e9225ccc8418c
-
SSDEEP
1536:gQZBCCOdK0IxCM5kDfVfQfufHfSfbf5fEfxf/fffHfmfpfTfof4fJfLfEfofPfId:gk2I0Ix4t42fKzRcpXnfuhrQQRTcQ3gd
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3360 msedge.exe 3360 msedge.exe 916 msedge.exe 916 msedge.exe 4148 identity_helper.exe 4148 identity_helper.exe 4224 msedge.exe 4224 msedge.exe 4224 msedge.exe 4224 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 916 wrote to memory of 4764 916 msedge.exe 82 PID 916 wrote to memory of 4764 916 msedge.exe 82 PID 916 wrote to memory of 3436 916 msedge.exe 83 PID 916 wrote to memory of 3436 916 msedge.exe 83 PID 916 wrote to memory of 3436 916 msedge.exe 83 PID 916 wrote to memory of 3436 916 msedge.exe 83 PID 916 wrote to memory of 3436 916 msedge.exe 83 PID 916 wrote to memory of 3436 916 msedge.exe 83 PID 916 wrote to memory of 3436 916 msedge.exe 83 PID 916 wrote to memory of 3436 916 msedge.exe 83 PID 916 wrote to memory of 3436 916 msedge.exe 83 PID 916 wrote to memory of 3436 916 msedge.exe 83 PID 916 wrote to memory of 3436 916 msedge.exe 83 PID 916 wrote to memory of 3436 916 msedge.exe 83 PID 916 wrote to memory of 3436 916 msedge.exe 83 PID 916 wrote to memory of 3436 916 msedge.exe 83 PID 916 wrote to memory of 3436 916 msedge.exe 83 PID 916 wrote to memory of 3436 916 msedge.exe 83 PID 916 wrote to memory of 3436 916 msedge.exe 83 PID 916 wrote to memory of 3436 916 msedge.exe 83 PID 916 wrote to memory of 3436 916 msedge.exe 83 PID 916 wrote to memory of 3436 916 msedge.exe 83 PID 916 wrote to memory of 3436 916 msedge.exe 83 PID 916 wrote to memory of 3436 916 msedge.exe 83 PID 916 wrote to memory of 3436 916 msedge.exe 83 PID 916 wrote to memory of 3436 916 msedge.exe 83 PID 916 wrote to memory of 3436 916 msedge.exe 83 PID 916 wrote to memory of 3436 916 msedge.exe 83 PID 916 wrote to memory of 3436 916 msedge.exe 83 PID 916 wrote to memory of 3436 916 msedge.exe 83 PID 916 wrote to memory of 3436 916 msedge.exe 83 PID 916 wrote to memory of 3436 916 msedge.exe 83 PID 916 wrote to memory of 3436 916 msedge.exe 83 PID 916 wrote to memory of 3436 916 msedge.exe 83 PID 916 wrote to memory of 3436 916 msedge.exe 83 PID 916 wrote to memory of 3436 916 msedge.exe 83 PID 916 wrote to memory of 3436 916 msedge.exe 83 PID 916 wrote to memory of 3436 916 msedge.exe 83 PID 916 wrote to memory of 3436 916 msedge.exe 83 PID 916 wrote to memory of 3436 916 msedge.exe 83 PID 916 wrote to memory of 3436 916 msedge.exe 83 PID 916 wrote to memory of 3436 916 msedge.exe 83 PID 916 wrote to memory of 3360 916 msedge.exe 84 PID 916 wrote to memory of 3360 916 msedge.exe 84 PID 916 wrote to memory of 5112 916 msedge.exe 85 PID 916 wrote to memory of 5112 916 msedge.exe 85 PID 916 wrote to memory of 5112 916 msedge.exe 85 PID 916 wrote to memory of 5112 916 msedge.exe 85 PID 916 wrote to memory of 5112 916 msedge.exe 85 PID 916 wrote to memory of 5112 916 msedge.exe 85 PID 916 wrote to memory of 5112 916 msedge.exe 85 PID 916 wrote to memory of 5112 916 msedge.exe 85 PID 916 wrote to memory of 5112 916 msedge.exe 85 PID 916 wrote to memory of 5112 916 msedge.exe 85 PID 916 wrote to memory of 5112 916 msedge.exe 85 PID 916 wrote to memory of 5112 916 msedge.exe 85 PID 916 wrote to memory of 5112 916 msedge.exe 85 PID 916 wrote to memory of 5112 916 msedge.exe 85 PID 916 wrote to memory of 5112 916 msedge.exe 85 PID 916 wrote to memory of 5112 916 msedge.exe 85 PID 916 wrote to memory of 5112 916 msedge.exe 85 PID 916 wrote to memory of 5112 916 msedge.exe 85 PID 916 wrote to memory of 5112 916 msedge.exe 85 PID 916 wrote to memory of 5112 916 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\288afec190b80c06e8cf5343e6524f13_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:916 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe931446f8,0x7ffe93144708,0x7ffe931447182⤵PID:4764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1828,4131954974266528393,13768183398432899053,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:22⤵PID:3436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1828,4131954974266528393,13768183398432899053,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2252 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1828,4131954974266528393,13768183398432899053,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2852 /prefetch:82⤵PID:5112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1828,4131954974266528393,13768183398432899053,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:2196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1828,4131954974266528393,13768183398432899053,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:1688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1828,4131954974266528393,13768183398432899053,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4196 /prefetch:12⤵PID:2616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1828,4131954974266528393,13768183398432899053,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5196 /prefetch:12⤵PID:2344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1828,4131954974266528393,13768183398432899053,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5416 /prefetch:12⤵PID:1992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1828,4131954974266528393,13768183398432899053,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5704 /prefetch:82⤵PID:3640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1828,4131954974266528393,13768183398432899053,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5704 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1828,4131954974266528393,13768183398432899053,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6056 /prefetch:12⤵PID:112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1828,4131954974266528393,13768183398432899053,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5972 /prefetch:12⤵PID:4728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1828,4131954974266528393,13768183398432899053,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4916 /prefetch:12⤵PID:2016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1828,4131954974266528393,13768183398432899053,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4952 /prefetch:12⤵PID:1216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1828,4131954974266528393,13768183398432899053,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1756 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4224
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:224
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3692
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5b6c11a2e74ef272858b9bcac8f5ebf97
SHA12a06945314ebaa78f3ede1ff2b79f7357c3cb36b
SHA256f88faeb70e2a7849587be3e49e6884f5159ac76ef72b7077ac36e5fbf332d777
SHA512d577a5b3a264829494f5520cc975f4c2044648d51438885f319c2c74a080ea5dd719b6a885ed4d3401fd7a32341f88f26da5e3f29214da9afbbbd5ee950e8ec3
-
Filesize
152B
MD59abb787f6c5a61faf4408f694e89b50e
SHA1914247144868a2ff909207305255ab9bbca33d7e
SHA256ecfd876b653319de412bf6be83bd824dda753b4d9090007231a335819d29ea07
SHA5120f8139c45a7efab6de03fd9ebfe152e183ff155f20b03d4fac4a52cbbf8a3779302fed56facc9c7678a2dcf4f1ee89a26efd5bada485214edd9bf6b5cd238a55
-
Filesize
211KB
MD5151fb811968eaf8efb840908b89dc9d4
SHA17ec811009fd9b0e6d92d12d78b002275f2f1bee1
SHA256043fd8558e4a5a60aaccd2f0377f77a544e3e375242e9d7200dc6e51f94103ed
SHA51283aface0ab01da52fd077f747c9d5916e3c06b0ea5c551d7d316707ec3e8f3f986ce1c82e6f2136e48c6511a83cb0ac67ff6dc8f0e440ac72fc6854086a87674
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize504B
MD5b488d75b0af971f9defefacecf79052c
SHA1904b1ba234f1b7b308e2662537ff77085bee4997
SHA2560ff355bafe975907054bb782935e61ab95668dca7a62a175796c52a826193df4
SHA51234327d948f7fb4cd4a76aeb9156d7bd830cf5363b6f8d1651edcf80bede662cd3fefd34c30861860d976816412d0c14e6113c8c3ebd859fbbe31d0df0853062a
-
Filesize
1KB
MD5172528566cb9bd2b4812a23558055905
SHA12755eb80ab739ee7d1d7feb2c8551a203df11495
SHA256b61ba830ab0ec11fd55a2cc67ea3a2e8e9e6d75d1831d5f017a9ca77ffd80e3d
SHA5120a5e57d1d2df89c90d0a74d35ff476f44a3f430d089a9667759dc049e12b9c6693aeb89c14d955b56a3de249a6443a68a33f9fb1ff9c8e0b4a21d6ab44ad4f4b
-
Filesize
6KB
MD5fc8bcba12e722912a75834ad4e403c87
SHA1397217f65a033bf9a752f604ea054f6756c8f93b
SHA25678b89e122ace1cd140b022c5ef0e1bf2cf37043221bb410a03e42d8c3ef6bb7b
SHA5128e30fa687c409b0f5966b5677d3c0f09e4a3302180f6501b249bf313dec8cc07cfade5b86538b23cba6d1c63fae84deca46f1fc0187e3d54bfdd23cf8a31d12d
-
Filesize
6KB
MD592adae2897a534cec3df1133ade11994
SHA190dc71aa999a986cf2f4961b12054ba58e753049
SHA256c528f389dc41fa3413881d9a6b8809897aae40977dfbdaad33a5f9a35864f1c1
SHA512eb7453fc97defe7e5b2d36164c079403d5149a00a1b268279e89911782af49b4236cddd9e684e088ed92902bb8c3ccabb645ad283e3fdfe68e5ccc0a92e415ed
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5add8da2b1065f5c80097238a77ee6eb3
SHA1734af72aacb541bc608a83aec49d842921b9df1b
SHA25650426cea81b81d14510c0a7070eac2524d1de7b3776d907f5441d185496d3a39
SHA51287f1e124704a3c37f645e8f14ad0be216b903501eee0939dde9fea1ed3bb409e97c77d4135e808b0dcb411f55729bdc0019c23c753d0b0b02627bf8576447190