Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
06/07/2024, 15:30
Static task
static1
Behavioral task
behavioral1
Sample
28a8d477d3571fcbc16aaa8fac5d198c_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
28a8d477d3571fcbc16aaa8fac5d198c_JaffaCakes118.html
Resource
win10v2004-20240704-en
General
-
Target
28a8d477d3571fcbc16aaa8fac5d198c_JaffaCakes118.html
-
Size
57KB
-
MD5
28a8d477d3571fcbc16aaa8fac5d198c
-
SHA1
d1a09d508ebf00b5b278b4f8955048c883c48818
-
SHA256
cc74e80ed8e722c8959d3a8a338a06c291b568de1456b7be192e7b17519e9c14
-
SHA512
e8d810d59d3eb0e87a010f612c2f50e6940236706ded7dc10d2b771944ceda194e96da32e959a9bf8fc08482679326746ad2fde5b6c128c45506a8d2ab01e490
-
SSDEEP
1536:ijEQvK8OPHdFAeo2vgyHJv0owbd6zKD6CDK2RVroHcwpDK2RVy:ijnOPHdFk2vgyHJutDK2RVroHcwpDK2m
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2644 msedge.exe 2644 msedge.exe 4196 msedge.exe 4196 msedge.exe 1932 identity_helper.exe 1932 identity_helper.exe 4624 msedge.exe 4624 msedge.exe 4624 msedge.exe 4624 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe 4196 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4196 wrote to memory of 3468 4196 msedge.exe 82 PID 4196 wrote to memory of 3468 4196 msedge.exe 82 PID 4196 wrote to memory of 4972 4196 msedge.exe 83 PID 4196 wrote to memory of 4972 4196 msedge.exe 83 PID 4196 wrote to memory of 4972 4196 msedge.exe 83 PID 4196 wrote to memory of 4972 4196 msedge.exe 83 PID 4196 wrote to memory of 4972 4196 msedge.exe 83 PID 4196 wrote to memory of 4972 4196 msedge.exe 83 PID 4196 wrote to memory of 4972 4196 msedge.exe 83 PID 4196 wrote to memory of 4972 4196 msedge.exe 83 PID 4196 wrote to memory of 4972 4196 msedge.exe 83 PID 4196 wrote to memory of 4972 4196 msedge.exe 83 PID 4196 wrote to memory of 4972 4196 msedge.exe 83 PID 4196 wrote to memory of 4972 4196 msedge.exe 83 PID 4196 wrote to memory of 4972 4196 msedge.exe 83 PID 4196 wrote to memory of 4972 4196 msedge.exe 83 PID 4196 wrote to memory of 4972 4196 msedge.exe 83 PID 4196 wrote to memory of 4972 4196 msedge.exe 83 PID 4196 wrote to memory of 4972 4196 msedge.exe 83 PID 4196 wrote to memory of 4972 4196 msedge.exe 83 PID 4196 wrote to memory of 4972 4196 msedge.exe 83 PID 4196 wrote to memory of 4972 4196 msedge.exe 83 PID 4196 wrote to memory of 4972 4196 msedge.exe 83 PID 4196 wrote to memory of 4972 4196 msedge.exe 83 PID 4196 wrote to memory of 4972 4196 msedge.exe 83 PID 4196 wrote to memory of 4972 4196 msedge.exe 83 PID 4196 wrote to memory of 4972 4196 msedge.exe 83 PID 4196 wrote to memory of 4972 4196 msedge.exe 83 PID 4196 wrote to memory of 4972 4196 msedge.exe 83 PID 4196 wrote to memory of 4972 4196 msedge.exe 83 PID 4196 wrote to memory of 4972 4196 msedge.exe 83 PID 4196 wrote to memory of 4972 4196 msedge.exe 83 PID 4196 wrote to memory of 4972 4196 msedge.exe 83 PID 4196 wrote to memory of 4972 4196 msedge.exe 83 PID 4196 wrote to memory of 4972 4196 msedge.exe 83 PID 4196 wrote to memory of 4972 4196 msedge.exe 83 PID 4196 wrote to memory of 4972 4196 msedge.exe 83 PID 4196 wrote to memory of 4972 4196 msedge.exe 83 PID 4196 wrote to memory of 4972 4196 msedge.exe 83 PID 4196 wrote to memory of 4972 4196 msedge.exe 83 PID 4196 wrote to memory of 4972 4196 msedge.exe 83 PID 4196 wrote to memory of 4972 4196 msedge.exe 83 PID 4196 wrote to memory of 2644 4196 msedge.exe 84 PID 4196 wrote to memory of 2644 4196 msedge.exe 84 PID 4196 wrote to memory of 1644 4196 msedge.exe 85 PID 4196 wrote to memory of 1644 4196 msedge.exe 85 PID 4196 wrote to memory of 1644 4196 msedge.exe 85 PID 4196 wrote to memory of 1644 4196 msedge.exe 85 PID 4196 wrote to memory of 1644 4196 msedge.exe 85 PID 4196 wrote to memory of 1644 4196 msedge.exe 85 PID 4196 wrote to memory of 1644 4196 msedge.exe 85 PID 4196 wrote to memory of 1644 4196 msedge.exe 85 PID 4196 wrote to memory of 1644 4196 msedge.exe 85 PID 4196 wrote to memory of 1644 4196 msedge.exe 85 PID 4196 wrote to memory of 1644 4196 msedge.exe 85 PID 4196 wrote to memory of 1644 4196 msedge.exe 85 PID 4196 wrote to memory of 1644 4196 msedge.exe 85 PID 4196 wrote to memory of 1644 4196 msedge.exe 85 PID 4196 wrote to memory of 1644 4196 msedge.exe 85 PID 4196 wrote to memory of 1644 4196 msedge.exe 85 PID 4196 wrote to memory of 1644 4196 msedge.exe 85 PID 4196 wrote to memory of 1644 4196 msedge.exe 85 PID 4196 wrote to memory of 1644 4196 msedge.exe 85 PID 4196 wrote to memory of 1644 4196 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\28a8d477d3571fcbc16aaa8fac5d198c_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4196 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb25b146f8,0x7ffb25b14708,0x7ffb25b147182⤵PID:3468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,14286455269394645960,1081033094666512571,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:22⤵PID:4972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,14286455269394645960,1081033094666512571,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,14286455269394645960,1081033094666512571,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2924 /prefetch:82⤵PID:1644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,14286455269394645960,1081033094666512571,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:12⤵PID:2868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,14286455269394645960,1081033094666512571,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3364 /prefetch:12⤵PID:3312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,14286455269394645960,1081033094666512571,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5000 /prefetch:12⤵PID:972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,14286455269394645960,1081033094666512571,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5320 /prefetch:12⤵PID:2160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,14286455269394645960,1081033094666512571,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5432 /prefetch:12⤵PID:3268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,14286455269394645960,1081033094666512571,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3464 /prefetch:12⤵PID:4952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,14286455269394645960,1081033094666512571,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5892 /prefetch:82⤵PID:3224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,14286455269394645960,1081033094666512571,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5892 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,14286455269394645960,1081033094666512571,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5816 /prefetch:12⤵PID:1016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,14286455269394645960,1081033094666512571,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5792 /prefetch:12⤵PID:3760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,14286455269394645960,1081033094666512571,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:12⤵PID:1524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,14286455269394645960,1081033094666512571,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6412 /prefetch:12⤵PID:3472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,14286455269394645960,1081033094666512571,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2244 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4624
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:916
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4356
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e1fe3a26bd35b84102bb4203f31e74c7
SHA145fdfa8433789b575eb64e116718e62e0e0cf4a0
SHA25626e0d51529de906dd285ba48288e25eaf5213c0f0bab9bc5f119ecbc5e1b93ee
SHA512d528db2e9b917d4fbe24b1b5c6f4cb274f4f91c84f63e5119e041fa89ae0cd01a370e314f8b6aca9d6fa958e79feabc720f4b54b3d8aed69aab11fa84cad36bd
-
Filesize
152B
MD52915233ace3b11bc8898c958f245aa9a
SHA168c6aa983da303b825d656ac3284081db682f702
SHA256b2cb442f2ca27619c8df087f56fcbbb53186c53f8fd131af886ee3712220477e
SHA512e3f1b70d39b615e212f84d587ee816598236ee6ce144d919593894fcce4a0900343a9e8b837a0d1bd10921fff1c976c84c4a570eda776fe84d374a69e7a54890
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize792B
MD5b5170a14572829f23a003b91549d2c95
SHA126cf7a977b06a06573fcc13d5fe3b41fd5e6dd2d
SHA256de2799aaa82b674dd90b20dc7a97dd50a31f1760e324260bb5a3b0098906f980
SHA512c32783d174f1be6ef9ea7cba643f66fad020253286e8fb124be0717b2c1d293938cc090bbf33882b5b350391cf1ebcd23d4fe166c89e390b3ca3967a4e077abd
-
Filesize
1KB
MD5331780423a93fc104148c19907986f7a
SHA17ec99ce2bb41bb1493791b314e7e65b569b2a222
SHA256bdf9b5cbf3b853618467f93b156484b3ab850482f231e250307aaf8eb225d249
SHA512b7773e2484ec30e62d8d24cfb473cf87a668d0e63ababc15f60dd7aa51d3cd93c88772c0fab591b8a55270f10d0ed6b126ec8cdff174cf94c72996d19553909a
-
Filesize
6KB
MD5a614fbf75a71f9480b08fc0560961eca
SHA1d843f5d59f14efdc370d6eadfa570ae5c8f3f631
SHA2561bcd348ea8d54daed775b5f1d80dade1f9fce27382b3a989c00b6486d8dfcf54
SHA5128e54115e1558e5ae2df27bca80d05684d1526e53f711253734ea66ef37bf953a1b503452bacc65add951314161927d4161ef98daef0f49f65e53bee009b03c60
-
Filesize
6KB
MD58dcfe536822e7a2aac49618ef7d2939d
SHA13493477c9f1502820f8d148b8205702532a9c626
SHA25669f17e80ff670f4a89b2ad11abc2ec8a710b3bc248c6a9a5930d4f4500e64838
SHA5123959cb00f682e9c56fccc496d37a3cfe560c3bdad989bffc01ae1dc13f72584c689290bf2c24efabad72bf2a7a4ca7044fa21ca7d3dfed7adf6c90b818cef6b1
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD55a5bd35eff2192576e4090f0965df5e7
SHA1387c8141479673986e4547c3baca07f4b540bc3a
SHA256965dcd4e70c118e0d496c38eaea3b9ca600d2d4694ee8b0d4e3cf2ff4a440c66
SHA512550449b6c17ea95a0c7a54893390c5c54d55bdce22267a54dd556b7040f80048259ad0c6408e3ccbb9aaf8b591be18f66c75066d293cddb25f1acfca0f5624f3