Analysis
-
max time kernel
146s -
max time network
162s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
07/07/2024, 22:31
Static task
static1
Behavioral task
behavioral1
Sample
29ff76cce142c22cb2971d2244061bb5_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
29ff76cce142c22cb2971d2244061bb5_JaffaCakes118.html
Resource
win10v2004-20240704-en
General
-
Target
29ff76cce142c22cb2971d2244061bb5_JaffaCakes118.html
-
Size
58KB
-
MD5
29ff76cce142c22cb2971d2244061bb5
-
SHA1
6a3944b1923dde7037c83784375810c98f322f34
-
SHA256
ca1e6aaf4a4294ae0425d6e1959345bd292d46b17619813cec977524a2ebd764
-
SHA512
c841c42c4fc047ae73bbed4906016d63d6021c23f429832a98c6227cde409ea3f3bb492db42b3d2fcf594f65fb099871051616a6a2dbdb0bd7be2818d3053020
-
SSDEEP
1536:gQZBCCOdm0IxCF5/yfnf3fdf1f2fRf1fXf/fKfNfgfffcfAfbfzfPfwftfcfBfzO:gk280IxTfvlt+JtPXyFo3EoTLXoFkJLO
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4872 msedge.exe 4872 msedge.exe 2592 msedge.exe 2592 msedge.exe 4260 identity_helper.exe 4260 identity_helper.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2592 wrote to memory of 664 2592 msedge.exe 81 PID 2592 wrote to memory of 664 2592 msedge.exe 81 PID 2592 wrote to memory of 2836 2592 msedge.exe 84 PID 2592 wrote to memory of 2836 2592 msedge.exe 84 PID 2592 wrote to memory of 2836 2592 msedge.exe 84 PID 2592 wrote to memory of 2836 2592 msedge.exe 84 PID 2592 wrote to memory of 2836 2592 msedge.exe 84 PID 2592 wrote to memory of 2836 2592 msedge.exe 84 PID 2592 wrote to memory of 2836 2592 msedge.exe 84 PID 2592 wrote to memory of 2836 2592 msedge.exe 84 PID 2592 wrote to memory of 2836 2592 msedge.exe 84 PID 2592 wrote to memory of 2836 2592 msedge.exe 84 PID 2592 wrote to memory of 2836 2592 msedge.exe 84 PID 2592 wrote to memory of 2836 2592 msedge.exe 84 PID 2592 wrote to memory of 2836 2592 msedge.exe 84 PID 2592 wrote to memory of 2836 2592 msedge.exe 84 PID 2592 wrote to memory of 2836 2592 msedge.exe 84 PID 2592 wrote to memory of 2836 2592 msedge.exe 84 PID 2592 wrote to memory of 2836 2592 msedge.exe 84 PID 2592 wrote to memory of 2836 2592 msedge.exe 84 PID 2592 wrote to memory of 2836 2592 msedge.exe 84 PID 2592 wrote to memory of 2836 2592 msedge.exe 84 PID 2592 wrote to memory of 2836 2592 msedge.exe 84 PID 2592 wrote to memory of 2836 2592 msedge.exe 84 PID 2592 wrote to memory of 2836 2592 msedge.exe 84 PID 2592 wrote to memory of 2836 2592 msedge.exe 84 PID 2592 wrote to memory of 2836 2592 msedge.exe 84 PID 2592 wrote to memory of 2836 2592 msedge.exe 84 PID 2592 wrote to memory of 2836 2592 msedge.exe 84 PID 2592 wrote to memory of 2836 2592 msedge.exe 84 PID 2592 wrote to memory of 2836 2592 msedge.exe 84 PID 2592 wrote to memory of 2836 2592 msedge.exe 84 PID 2592 wrote to memory of 2836 2592 msedge.exe 84 PID 2592 wrote to memory of 2836 2592 msedge.exe 84 PID 2592 wrote to memory of 2836 2592 msedge.exe 84 PID 2592 wrote to memory of 2836 2592 msedge.exe 84 PID 2592 wrote to memory of 2836 2592 msedge.exe 84 PID 2592 wrote to memory of 2836 2592 msedge.exe 84 PID 2592 wrote to memory of 2836 2592 msedge.exe 84 PID 2592 wrote to memory of 2836 2592 msedge.exe 84 PID 2592 wrote to memory of 2836 2592 msedge.exe 84 PID 2592 wrote to memory of 2836 2592 msedge.exe 84 PID 2592 wrote to memory of 4872 2592 msedge.exe 85 PID 2592 wrote to memory of 4872 2592 msedge.exe 85 PID 2592 wrote to memory of 4480 2592 msedge.exe 86 PID 2592 wrote to memory of 4480 2592 msedge.exe 86 PID 2592 wrote to memory of 4480 2592 msedge.exe 86 PID 2592 wrote to memory of 4480 2592 msedge.exe 86 PID 2592 wrote to memory of 4480 2592 msedge.exe 86 PID 2592 wrote to memory of 4480 2592 msedge.exe 86 PID 2592 wrote to memory of 4480 2592 msedge.exe 86 PID 2592 wrote to memory of 4480 2592 msedge.exe 86 PID 2592 wrote to memory of 4480 2592 msedge.exe 86 PID 2592 wrote to memory of 4480 2592 msedge.exe 86 PID 2592 wrote to memory of 4480 2592 msedge.exe 86 PID 2592 wrote to memory of 4480 2592 msedge.exe 86 PID 2592 wrote to memory of 4480 2592 msedge.exe 86 PID 2592 wrote to memory of 4480 2592 msedge.exe 86 PID 2592 wrote to memory of 4480 2592 msedge.exe 86 PID 2592 wrote to memory of 4480 2592 msedge.exe 86 PID 2592 wrote to memory of 4480 2592 msedge.exe 86 PID 2592 wrote to memory of 4480 2592 msedge.exe 86 PID 2592 wrote to memory of 4480 2592 msedge.exe 86 PID 2592 wrote to memory of 4480 2592 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\29ff76cce142c22cb2971d2244061bb5_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe417146f8,0x7ffe41714708,0x7ffe417147182⤵PID:664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,8553671930695248067,4053765237830143615,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 /prefetch:22⤵PID:2836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2144,8553671930695248067,4053765237830143615,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2228 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2144,8553671930695248067,4053765237830143615,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2888 /prefetch:82⤵PID:4480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,8553671930695248067,4053765237830143615,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:12⤵PID:4708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,8553671930695248067,4053765237830143615,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3484 /prefetch:12⤵PID:696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,8553671930695248067,4053765237830143615,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4300 /prefetch:12⤵PID:2996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,8553671930695248067,4053765237830143615,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5244 /prefetch:12⤵PID:1056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,8553671930695248067,4053765237830143615,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5668 /prefetch:12⤵PID:5020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,8553671930695248067,4053765237830143615,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4928 /prefetch:82⤵PID:2740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,8553671930695248067,4053765237830143615,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4928 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,8553671930695248067,4053765237830143615,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6164 /prefetch:12⤵PID:1944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,8553671930695248067,4053765237830143615,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5148 /prefetch:12⤵PID:1996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,8553671930695248067,4053765237830143615,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6044 /prefetch:12⤵PID:3612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,8553671930695248067,4053765237830143615,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5760 /prefetch:12⤵PID:3768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,8553671930695248067,4053765237830143615,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1872 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4000
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:864
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4012
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e1fe3a26bd35b84102bb4203f31e74c7
SHA145fdfa8433789b575eb64e116718e62e0e0cf4a0
SHA25626e0d51529de906dd285ba48288e25eaf5213c0f0bab9bc5f119ecbc5e1b93ee
SHA512d528db2e9b917d4fbe24b1b5c6f4cb274f4f91c84f63e5119e041fa89ae0cd01a370e314f8b6aca9d6fa958e79feabc720f4b54b3d8aed69aab11fa84cad36bd
-
Filesize
152B
MD52915233ace3b11bc8898c958f245aa9a
SHA168c6aa983da303b825d656ac3284081db682f702
SHA256b2cb442f2ca27619c8df087f56fcbbb53186c53f8fd131af886ee3712220477e
SHA512e3f1b70d39b615e212f84d587ee816598236ee6ce144d919593894fcce4a0900343a9e8b837a0d1bd10921fff1c976c84c4a570eda776fe84d374a69e7a54890
-
Filesize
211KB
MD5151fb811968eaf8efb840908b89dc9d4
SHA17ec811009fd9b0e6d92d12d78b002275f2f1bee1
SHA256043fd8558e4a5a60aaccd2f0377f77a544e3e375242e9d7200dc6e51f94103ed
SHA51283aface0ab01da52fd077f747c9d5916e3c06b0ea5c551d7d316707ec3e8f3f986ce1c82e6f2136e48c6511a83cb0ac67ff6dc8f0e440ac72fc6854086a87674
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize504B
MD5ecf4885803c6ab9b74740ebd0648c28b
SHA17c58e2d7aceceb4cdc0a186d91c8a18a100cfb01
SHA256456b7c0b88f18a0e032bf8a669032232bddc747031a59e877e56900b7cab43b7
SHA512383fab01f0523f4c3917e843381e036d09500b459432b8dc8970df45cc354f7edc3a6cece6db1be4002e81a2c6f5788f352fe84557e4303bc5cb8223725cb362
-
Filesize
1KB
MD55983458a0cb43991eb20f9cb25457027
SHA1cd976d50abddd68e0924878e338c85397c2d1096
SHA256fae195672649afa815fc8761401087cdf7ff29910932ce13c2b40baafbab0146
SHA512febdf4fae0378e735c221e94df5fdc1216f61f175b8695679bc2137eeca5eed6646b1f43467577a02f09f42b8a8dd951603b3ccbb931bf00f1f62a8d588610ff
-
Filesize
6KB
MD589a8cae556bbd20bb4c84d88c2493375
SHA1850c84a046eec100c41eba00686c4342c1c3feae
SHA256b5079db72cc57fde43849b420e1d19fe4032d38bad1791a29ff80799a594b66d
SHA5122aa35169a6570bca4997b7f4220da84be3ba4b0d41a6ba023eee9fa134a6f974144c45f71ea3194b765832e4e57f3a347d9fae457b9ca4548944513a8ae2e59c
-
Filesize
6KB
MD592497150224b474fce23c8c276f423ef
SHA10e7b57d1033aa92586d297724a2f876aa6d10dbb
SHA256068b3f0681972d96576e6e62f9c9ac066473a462194aae73d098877eab010383
SHA5127d85ec19ee520ea221e8afbc470c4dfcc1cb068112b5b2f75785d0dedf1ab5efce0c9256b070972aa0a58c25d03d6a91b3ac39521b7f19752a96b0b2822ffe58
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5586976f5a4927ef918917a08d358153f
SHA1c9401a65839bfa8a78bd353bb6af44a9982e5267
SHA256063a999cc9636bca7e7eaf581bdffeb8bfcc93a068fbf60cb54578ac232cee9b
SHA512a16bf9ec04435c41aac74b5aeb7d1dc48b744050f926e8ef174190f4951179782da8c6a29569e2a0af16694ec168185fc8723469ef1b1bf79d015dc4c8fbf8a0