Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
09-07-2024 02:59
Static task
static1
Behavioral task
behavioral1
Sample
2ec3e9b735fa930249617f01f2462feb_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2ec3e9b735fa930249617f01f2462feb_JaffaCakes118.html
Resource
win10v2004-20240704-en
General
-
Target
2ec3e9b735fa930249617f01f2462feb_JaffaCakes118.html
-
Size
34KB
-
MD5
2ec3e9b735fa930249617f01f2462feb
-
SHA1
02f6ca77ee169043ccf9d244580d73b202857751
-
SHA256
5732319ba456b0e9118c665d77ca1e889ed27edada999cc0cc139a98ed801229
-
SHA512
7d7ee3e58c4d7928fe070970a814ebba15ba08989808359dc2dc26f7d2f5b6d40aa2cba96884168c7739ce6febe76564ff2c4f2a33117c0acd240433f95f4548
-
SSDEEP
768:S9ohPnhjJohPnhTBohPnhiXepeel4gIohPnhTohPnhIFhkvMcUHpohPnhwhVva:SJepeel4gzFhkvMcUHjhVva
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3852 msedge.exe 3852 msedge.exe 4880 msedge.exe 4880 msedge.exe 2392 identity_helper.exe 2392 identity_helper.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe 2424 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4880 wrote to memory of 4116 4880 msedge.exe 82 PID 4880 wrote to memory of 4116 4880 msedge.exe 82 PID 4880 wrote to memory of 4748 4880 msedge.exe 83 PID 4880 wrote to memory of 4748 4880 msedge.exe 83 PID 4880 wrote to memory of 4748 4880 msedge.exe 83 PID 4880 wrote to memory of 4748 4880 msedge.exe 83 PID 4880 wrote to memory of 4748 4880 msedge.exe 83 PID 4880 wrote to memory of 4748 4880 msedge.exe 83 PID 4880 wrote to memory of 4748 4880 msedge.exe 83 PID 4880 wrote to memory of 4748 4880 msedge.exe 83 PID 4880 wrote to memory of 4748 4880 msedge.exe 83 PID 4880 wrote to memory of 4748 4880 msedge.exe 83 PID 4880 wrote to memory of 4748 4880 msedge.exe 83 PID 4880 wrote to memory of 4748 4880 msedge.exe 83 PID 4880 wrote to memory of 4748 4880 msedge.exe 83 PID 4880 wrote to memory of 4748 4880 msedge.exe 83 PID 4880 wrote to memory of 4748 4880 msedge.exe 83 PID 4880 wrote to memory of 4748 4880 msedge.exe 83 PID 4880 wrote to memory of 4748 4880 msedge.exe 83 PID 4880 wrote to memory of 4748 4880 msedge.exe 83 PID 4880 wrote to memory of 4748 4880 msedge.exe 83 PID 4880 wrote to memory of 4748 4880 msedge.exe 83 PID 4880 wrote to memory of 4748 4880 msedge.exe 83 PID 4880 wrote to memory of 4748 4880 msedge.exe 83 PID 4880 wrote to memory of 4748 4880 msedge.exe 83 PID 4880 wrote to memory of 4748 4880 msedge.exe 83 PID 4880 wrote to memory of 4748 4880 msedge.exe 83 PID 4880 wrote to memory of 4748 4880 msedge.exe 83 PID 4880 wrote to memory of 4748 4880 msedge.exe 83 PID 4880 wrote to memory of 4748 4880 msedge.exe 83 PID 4880 wrote to memory of 4748 4880 msedge.exe 83 PID 4880 wrote to memory of 4748 4880 msedge.exe 83 PID 4880 wrote to memory of 4748 4880 msedge.exe 83 PID 4880 wrote to memory of 4748 4880 msedge.exe 83 PID 4880 wrote to memory of 4748 4880 msedge.exe 83 PID 4880 wrote to memory of 4748 4880 msedge.exe 83 PID 4880 wrote to memory of 4748 4880 msedge.exe 83 PID 4880 wrote to memory of 4748 4880 msedge.exe 83 PID 4880 wrote to memory of 4748 4880 msedge.exe 83 PID 4880 wrote to memory of 4748 4880 msedge.exe 83 PID 4880 wrote to memory of 4748 4880 msedge.exe 83 PID 4880 wrote to memory of 4748 4880 msedge.exe 83 PID 4880 wrote to memory of 3852 4880 msedge.exe 84 PID 4880 wrote to memory of 3852 4880 msedge.exe 84 PID 4880 wrote to memory of 3160 4880 msedge.exe 85 PID 4880 wrote to memory of 3160 4880 msedge.exe 85 PID 4880 wrote to memory of 3160 4880 msedge.exe 85 PID 4880 wrote to memory of 3160 4880 msedge.exe 85 PID 4880 wrote to memory of 3160 4880 msedge.exe 85 PID 4880 wrote to memory of 3160 4880 msedge.exe 85 PID 4880 wrote to memory of 3160 4880 msedge.exe 85 PID 4880 wrote to memory of 3160 4880 msedge.exe 85 PID 4880 wrote to memory of 3160 4880 msedge.exe 85 PID 4880 wrote to memory of 3160 4880 msedge.exe 85 PID 4880 wrote to memory of 3160 4880 msedge.exe 85 PID 4880 wrote to memory of 3160 4880 msedge.exe 85 PID 4880 wrote to memory of 3160 4880 msedge.exe 85 PID 4880 wrote to memory of 3160 4880 msedge.exe 85 PID 4880 wrote to memory of 3160 4880 msedge.exe 85 PID 4880 wrote to memory of 3160 4880 msedge.exe 85 PID 4880 wrote to memory of 3160 4880 msedge.exe 85 PID 4880 wrote to memory of 3160 4880 msedge.exe 85 PID 4880 wrote to memory of 3160 4880 msedge.exe 85 PID 4880 wrote to memory of 3160 4880 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2ec3e9b735fa930249617f01f2462feb_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4880 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9f52046f8,0x7ff9f5204708,0x7ff9f52047182⤵PID:4116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2196,6117288496804729006,7683426592644914691,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2236 /prefetch:22⤵PID:4748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2196,6117288496804729006,7683426592644914691,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2224 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2196,6117288496804729006,7683426592644914691,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2704 /prefetch:82⤵PID:3160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,6117288496804729006,7683426592644914691,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,6117288496804729006,7683426592644914691,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:1044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,6117288496804729006,7683426592644914691,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5044 /prefetch:12⤵PID:4488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,6117288496804729006,7683426592644914691,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5348 /prefetch:12⤵PID:4524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,6117288496804729006,7683426592644914691,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5160 /prefetch:12⤵PID:3756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2196,6117288496804729006,7683426592644914691,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5760 /prefetch:82⤵PID:4568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2196,6117288496804729006,7683426592644914691,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5760 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,6117288496804729006,7683426592644914691,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3856 /prefetch:12⤵PID:2288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,6117288496804729006,7683426592644914691,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4996 /prefetch:12⤵PID:4560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,6117288496804729006,7683426592644914691,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4136 /prefetch:12⤵PID:1164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,6117288496804729006,7683426592644914691,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5984 /prefetch:12⤵PID:2212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2196,6117288496804729006,7683426592644914691,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3056 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2424
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3340
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3040
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3260
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e1fe3a26bd35b84102bb4203f31e74c7
SHA145fdfa8433789b575eb64e116718e62e0e0cf4a0
SHA25626e0d51529de906dd285ba48288e25eaf5213c0f0bab9bc5f119ecbc5e1b93ee
SHA512d528db2e9b917d4fbe24b1b5c6f4cb274f4f91c84f63e5119e041fa89ae0cd01a370e314f8b6aca9d6fa958e79feabc720f4b54b3d8aed69aab11fa84cad36bd
-
Filesize
152B
MD52915233ace3b11bc8898c958f245aa9a
SHA168c6aa983da303b825d656ac3284081db682f702
SHA256b2cb442f2ca27619c8df087f56fcbbb53186c53f8fd131af886ee3712220477e
SHA512e3f1b70d39b615e212f84d587ee816598236ee6ce144d919593894fcce4a0900343a9e8b837a0d1bd10921fff1c976c84c4a570eda776fe84d374a69e7a54890
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize216B
MD5a93b61033c7736d81cf015b373d0a4f4
SHA14100dd373277cbec866837e0568d271b6ff323a3
SHA2561352af9c277b289464fce59b523576e68dbb099cc1905222de59e62ea5770388
SHA512653e738a0e64318d810cdd19248782b77862802711c897170733f6e4154f81e94e9b8c59dede2b03220c5065f41ef6fd1be43a72aaff08429e818efc14871604
-
Filesize
2KB
MD5eff939f7a6617781c7175c047d7fabe0
SHA14d922f9cc612b1e139c626c2393f07f14709e185
SHA2567522beab8179aaf8d74c90a46c11066f319c71c9dee45d6d7b2ad8d86f5dca09
SHA512918dbfe502cafa918a96c6883c19ab507784679cc682e384c6d4992edb83c470d32ec8356b165697bf3bce51773bfcd666826cce91cf7b7b348bf5e6eb40080c
-
Filesize
2KB
MD5837f485a073710fb94eb270ec7bb6f16
SHA1d0db6c18ce9e28b5442e81dfa99784b7df33539b
SHA2564d9b685e0ad5f9aa9924758ba7e067b07c88fc748e6d06346b55f4b0bd55d021
SHA512ac17cb13561b2a2af818b53ffcf42ddbb24172484873bc70aadad9b4ff7f1d556ed8eeb8454c5c26ad4c66b2f1894218299f592693a6c8a57dfb22112b3adbc4
-
Filesize
6KB
MD5b5f2c3ae574234056046945acec94f33
SHA126257170b8f2b75b895a4ab14cd943eb51128d78
SHA256281cdb405905d7392d55d15eb411b741bad569e3698bbcd3d5d38f9a034c5ed6
SHA512eec40826f74eabec7497e3150225ab09568372d67fe449e2bc44406d9219dd208cd7a9b77d56e9d13d58c71876e70338840805f37db7b08a870b72162b9e4577
-
Filesize
7KB
MD5051f299ef4bde298bea87cf828380c7f
SHA18dda8b7d8ae60e3a427bb2ce73db2e07d9cf4c3c
SHA2561457c21d733b83a586a19061938a5f427f1280e76ed967d2cb681a7f7a631664
SHA512a6cb42837ce8a7ee35bb61018e7eccc80b98242a3fe5e4b30d33fe31f6cc07b13b759637f1c68a0bf591cd3de41a7284671e1dbe4f9a14a24e05f7b0691d9cd0
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD559784498a3b691ca3290a1beb9445351
SHA1f64540abbf9cbf87200adb2939829c347ec95055
SHA256f5a448f37ebe77fcbcd69f96322c6ecfa0a646a8e42f1a00f9ead44364cdeab0
SHA5122dd9127b1cb7bed1f1bad7a7edb509ef76476843dbe6c568a071a42081307f252a832ef12fc2f6ac382fd84a36152228ba16d4cb1ba3abbef302d16ce278a591