Analysis
-
max time kernel
148s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
09-07-2024 01:01
Static task
static1
Behavioral task
behavioral1
Sample
2e76830ef9a44e600662d4dd324b6f5e_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2e76830ef9a44e600662d4dd324b6f5e_JaffaCakes118.html
Resource
win10v2004-20240704-en
General
-
Target
2e76830ef9a44e600662d4dd324b6f5e_JaffaCakes118.html
-
Size
57KB
-
MD5
2e76830ef9a44e600662d4dd324b6f5e
-
SHA1
048b2d31e34574f25024232211585012d0ffc37d
-
SHA256
95b0bab3a4616e7ab0967f48f6b1bbadb74fb55ca7a8096867e67767f405bcba
-
SHA512
add67a9535dbf41b51f666f8a1529ad035ffa6141af09ee8a0810a0a0545f17a4a4c08d78e56981a720c8f11d3313bec3dd97044c8ec94c5482967cc3f7b4709
-
SSDEEP
1536:gQZBCCOdg0IxCeuOGfIfXf1fmfufafMfnfufcfgf1f2fafWf4f9fyfBfofifKfV6:gk220IxSQ/9uWCEv2kodeCug1q5AqiN6
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 3996 msedge.exe 3996 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 5068 identity_helper.exe 5068 identity_helper.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe 1664 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1216 wrote to memory of 2272 1216 msedge.exe 82 PID 1216 wrote to memory of 2272 1216 msedge.exe 82 PID 1216 wrote to memory of 1124 1216 msedge.exe 83 PID 1216 wrote to memory of 1124 1216 msedge.exe 83 PID 1216 wrote to memory of 1124 1216 msedge.exe 83 PID 1216 wrote to memory of 1124 1216 msedge.exe 83 PID 1216 wrote to memory of 1124 1216 msedge.exe 83 PID 1216 wrote to memory of 1124 1216 msedge.exe 83 PID 1216 wrote to memory of 1124 1216 msedge.exe 83 PID 1216 wrote to memory of 1124 1216 msedge.exe 83 PID 1216 wrote to memory of 1124 1216 msedge.exe 83 PID 1216 wrote to memory of 1124 1216 msedge.exe 83 PID 1216 wrote to memory of 1124 1216 msedge.exe 83 PID 1216 wrote to memory of 1124 1216 msedge.exe 83 PID 1216 wrote to memory of 1124 1216 msedge.exe 83 PID 1216 wrote to memory of 1124 1216 msedge.exe 83 PID 1216 wrote to memory of 1124 1216 msedge.exe 83 PID 1216 wrote to memory of 1124 1216 msedge.exe 83 PID 1216 wrote to memory of 1124 1216 msedge.exe 83 PID 1216 wrote to memory of 1124 1216 msedge.exe 83 PID 1216 wrote to memory of 1124 1216 msedge.exe 83 PID 1216 wrote to memory of 1124 1216 msedge.exe 83 PID 1216 wrote to memory of 1124 1216 msedge.exe 83 PID 1216 wrote to memory of 1124 1216 msedge.exe 83 PID 1216 wrote to memory of 1124 1216 msedge.exe 83 PID 1216 wrote to memory of 1124 1216 msedge.exe 83 PID 1216 wrote to memory of 1124 1216 msedge.exe 83 PID 1216 wrote to memory of 1124 1216 msedge.exe 83 PID 1216 wrote to memory of 1124 1216 msedge.exe 83 PID 1216 wrote to memory of 1124 1216 msedge.exe 83 PID 1216 wrote to memory of 1124 1216 msedge.exe 83 PID 1216 wrote to memory of 1124 1216 msedge.exe 83 PID 1216 wrote to memory of 1124 1216 msedge.exe 83 PID 1216 wrote to memory of 1124 1216 msedge.exe 83 PID 1216 wrote to memory of 1124 1216 msedge.exe 83 PID 1216 wrote to memory of 1124 1216 msedge.exe 83 PID 1216 wrote to memory of 1124 1216 msedge.exe 83 PID 1216 wrote to memory of 1124 1216 msedge.exe 83 PID 1216 wrote to memory of 1124 1216 msedge.exe 83 PID 1216 wrote to memory of 1124 1216 msedge.exe 83 PID 1216 wrote to memory of 1124 1216 msedge.exe 83 PID 1216 wrote to memory of 1124 1216 msedge.exe 83 PID 1216 wrote to memory of 3996 1216 msedge.exe 84 PID 1216 wrote to memory of 3996 1216 msedge.exe 84 PID 1216 wrote to memory of 2464 1216 msedge.exe 85 PID 1216 wrote to memory of 2464 1216 msedge.exe 85 PID 1216 wrote to memory of 2464 1216 msedge.exe 85 PID 1216 wrote to memory of 2464 1216 msedge.exe 85 PID 1216 wrote to memory of 2464 1216 msedge.exe 85 PID 1216 wrote to memory of 2464 1216 msedge.exe 85 PID 1216 wrote to memory of 2464 1216 msedge.exe 85 PID 1216 wrote to memory of 2464 1216 msedge.exe 85 PID 1216 wrote to memory of 2464 1216 msedge.exe 85 PID 1216 wrote to memory of 2464 1216 msedge.exe 85 PID 1216 wrote to memory of 2464 1216 msedge.exe 85 PID 1216 wrote to memory of 2464 1216 msedge.exe 85 PID 1216 wrote to memory of 2464 1216 msedge.exe 85 PID 1216 wrote to memory of 2464 1216 msedge.exe 85 PID 1216 wrote to memory of 2464 1216 msedge.exe 85 PID 1216 wrote to memory of 2464 1216 msedge.exe 85 PID 1216 wrote to memory of 2464 1216 msedge.exe 85 PID 1216 wrote to memory of 2464 1216 msedge.exe 85 PID 1216 wrote to memory of 2464 1216 msedge.exe 85 PID 1216 wrote to memory of 2464 1216 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2e76830ef9a44e600662d4dd324b6f5e_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffbbd846f8,0x7fffbbd84708,0x7fffbbd847182⤵PID:2272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,8121670783329878793,12739876160802447824,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2168 /prefetch:22⤵PID:1124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2152,8121670783329878793,12739876160802447824,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2252 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2152,8121670783329878793,12739876160802447824,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2844 /prefetch:82⤵PID:2464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,8121670783329878793,12739876160802447824,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,8121670783329878793,12739876160802447824,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:2256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,8121670783329878793,12739876160802447824,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4224 /prefetch:12⤵PID:2400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,8121670783329878793,12739876160802447824,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5136 /prefetch:12⤵PID:1480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,8121670783329878793,12739876160802447824,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4888 /prefetch:12⤵PID:2612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,8121670783329878793,12739876160802447824,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6092 /prefetch:82⤵PID:3484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,8121670783329878793,12739876160802447824,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6092 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,8121670783329878793,12739876160802447824,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5460 /prefetch:12⤵PID:4716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,8121670783329878793,12739876160802447824,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5452 /prefetch:12⤵PID:2996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,8121670783329878793,12739876160802447824,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4044 /prefetch:12⤵PID:3932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,8121670783329878793,12739876160802447824,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6028 /prefetch:12⤵PID:368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,8121670783329878793,12739876160802447824,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1868 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1664
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2268
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3680
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5b6c11a2e74ef272858b9bcac8f5ebf97
SHA12a06945314ebaa78f3ede1ff2b79f7357c3cb36b
SHA256f88faeb70e2a7849587be3e49e6884f5159ac76ef72b7077ac36e5fbf332d777
SHA512d577a5b3a264829494f5520cc975f4c2044648d51438885f319c2c74a080ea5dd719b6a885ed4d3401fd7a32341f88f26da5e3f29214da9afbbbd5ee950e8ec3
-
Filesize
152B
MD59abb787f6c5a61faf4408f694e89b50e
SHA1914247144868a2ff909207305255ab9bbca33d7e
SHA256ecfd876b653319de412bf6be83bd824dda753b4d9090007231a335819d29ea07
SHA5120f8139c45a7efab6de03fd9ebfe152e183ff155f20b03d4fac4a52cbbf8a3779302fed56facc9c7678a2dcf4f1ee89a26efd5bada485214edd9bf6b5cd238a55
-
Filesize
211KB
MD5151fb811968eaf8efb840908b89dc9d4
SHA17ec811009fd9b0e6d92d12d78b002275f2f1bee1
SHA256043fd8558e4a5a60aaccd2f0377f77a544e3e375242e9d7200dc6e51f94103ed
SHA51283aface0ab01da52fd077f747c9d5916e3c06b0ea5c551d7d316707ec3e8f3f986ce1c82e6f2136e48c6511a83cb0ac67ff6dc8f0e440ac72fc6854086a87674
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize504B
MD537580eec6c12ee0299506fc128aee4b7
SHA1fa79ccffd1b6ff170585cb3b89a3981452314c3d
SHA256772fc896c021b030d3a68e606066a9dd7bd65fc37b88899733824c8df1317cba
SHA5124cfaaf85646c2262a3c3f8fed99b41a2298857bcae952ab0c893c198ae03af2b4143b29c3d3aec115e1b5c6dcb24147a835d7984b5b0f4f25fea04cb30b818aa
-
Filesize
1KB
MD5fec80d8d1cffc7fe93023e1389b790c8
SHA1774b98d1b6986eb2a65dcb0c3dc137aae172cc3d
SHA256437a20c037ccc99562a3d0adcfa408530de7ffca9738ce7d25e9f3902a38891b
SHA512588c6a1d830b80394e1c712c28fe71a6bbdfbb077b776276a0921c3c62b6ac1760def06d78af00310300f418eaf85b56b2c5a93300f8438724007eef2ac8f262
-
Filesize
6KB
MD58c240ccd2d8b5c8808787d72e29db30a
SHA1eb119bf0144ac7a0f009badce54f086e190a7af8
SHA25660041e34da049595f18a81deeba96de364e9d1ac32d82118103813607a2afd51
SHA5128bd095e10eae97f051046bd2abf1f0913e315e5da7c89561ad04c447c6f7a243daa6f6c0a5dcbd98fd9c291840103abbdca716c406ffafd5bbef96a0c3895870
-
Filesize
6KB
MD53e3f432ade0bd81ba13487dd8658ce40
SHA1b97a7753235a40138097d3b534fe38de48450ff4
SHA2567e708f478c11c0c1957c869b73ede0bbca095012b9bc5ea8a8f8d1d4fd5d0fb9
SHA512209c37b17e0ddffa9b6af043bddddbe913440d9697fc27d4144bbadad896af3e4d368d83955f0535a74bf6c8a4386e9e1edc7a3e68b1a712971c8bb1fe4bc652
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5d31a6eed554a92772f8585d17715f25a
SHA19c646367853272adfdf62aac70fdacafb72afa40
SHA256f31b7541e8d282bb2015bee2836260cb1c75efaa803816c04e4211758a02cb25
SHA512b549739c80dddf4b23751138d0493ebcd2ae668bb57839ae763bbb78849b242155c28253c437bb63cab00c6e7104c48591c8e805d154643339e836edfdee8e23