Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
09-07-2024 11:14
Static task
static1
Behavioral task
behavioral1
Sample
302405ce5601f31d8c1657fd59b55791_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
302405ce5601f31d8c1657fd59b55791_JaffaCakes118.html
Resource
win10v2004-20240704-en
General
-
Target
302405ce5601f31d8c1657fd59b55791_JaffaCakes118.html
-
Size
39KB
-
MD5
302405ce5601f31d8c1657fd59b55791
-
SHA1
eaea90cc7a7d1de36f553f2af161461c5d0ff7ef
-
SHA256
d5d66b4b34907c0f970b234114eb30fcec77861993b048a48d6f815f315d19cb
-
SHA512
430062714c5cb13d7823879b7b81042b0e65446a444ed57df14c3c4cd5cc06c89401e41d7f2d561d88507d7188701d0662c093b713c94b035702eb558eae67ee
-
SSDEEP
768:Zcd9QZBC7mOdM4MpC5I9nC4DxRQoPONewBwowLLOCPd:gQZBCCOdA0IxCMxRQzewBwowvOCPd
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4300 msedge.exe 4300 msedge.exe 3124 msedge.exe 3124 msedge.exe 1148 identity_helper.exe 1148 identity_helper.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3124 wrote to memory of 2128 3124 msedge.exe 82 PID 3124 wrote to memory of 2128 3124 msedge.exe 82 PID 3124 wrote to memory of 3736 3124 msedge.exe 83 PID 3124 wrote to memory of 3736 3124 msedge.exe 83 PID 3124 wrote to memory of 3736 3124 msedge.exe 83 PID 3124 wrote to memory of 3736 3124 msedge.exe 83 PID 3124 wrote to memory of 3736 3124 msedge.exe 83 PID 3124 wrote to memory of 3736 3124 msedge.exe 83 PID 3124 wrote to memory of 3736 3124 msedge.exe 83 PID 3124 wrote to memory of 3736 3124 msedge.exe 83 PID 3124 wrote to memory of 3736 3124 msedge.exe 83 PID 3124 wrote to memory of 3736 3124 msedge.exe 83 PID 3124 wrote to memory of 3736 3124 msedge.exe 83 PID 3124 wrote to memory of 3736 3124 msedge.exe 83 PID 3124 wrote to memory of 3736 3124 msedge.exe 83 PID 3124 wrote to memory of 3736 3124 msedge.exe 83 PID 3124 wrote to memory of 3736 3124 msedge.exe 83 PID 3124 wrote to memory of 3736 3124 msedge.exe 83 PID 3124 wrote to memory of 3736 3124 msedge.exe 83 PID 3124 wrote to memory of 3736 3124 msedge.exe 83 PID 3124 wrote to memory of 3736 3124 msedge.exe 83 PID 3124 wrote to memory of 3736 3124 msedge.exe 83 PID 3124 wrote to memory of 3736 3124 msedge.exe 83 PID 3124 wrote to memory of 3736 3124 msedge.exe 83 PID 3124 wrote to memory of 3736 3124 msedge.exe 83 PID 3124 wrote to memory of 3736 3124 msedge.exe 83 PID 3124 wrote to memory of 3736 3124 msedge.exe 83 PID 3124 wrote to memory of 3736 3124 msedge.exe 83 PID 3124 wrote to memory of 3736 3124 msedge.exe 83 PID 3124 wrote to memory of 3736 3124 msedge.exe 83 PID 3124 wrote to memory of 3736 3124 msedge.exe 83 PID 3124 wrote to memory of 3736 3124 msedge.exe 83 PID 3124 wrote to memory of 3736 3124 msedge.exe 83 PID 3124 wrote to memory of 3736 3124 msedge.exe 83 PID 3124 wrote to memory of 3736 3124 msedge.exe 83 PID 3124 wrote to memory of 3736 3124 msedge.exe 83 PID 3124 wrote to memory of 3736 3124 msedge.exe 83 PID 3124 wrote to memory of 3736 3124 msedge.exe 83 PID 3124 wrote to memory of 3736 3124 msedge.exe 83 PID 3124 wrote to memory of 3736 3124 msedge.exe 83 PID 3124 wrote to memory of 3736 3124 msedge.exe 83 PID 3124 wrote to memory of 3736 3124 msedge.exe 83 PID 3124 wrote to memory of 4300 3124 msedge.exe 84 PID 3124 wrote to memory of 4300 3124 msedge.exe 84 PID 3124 wrote to memory of 3052 3124 msedge.exe 85 PID 3124 wrote to memory of 3052 3124 msedge.exe 85 PID 3124 wrote to memory of 3052 3124 msedge.exe 85 PID 3124 wrote to memory of 3052 3124 msedge.exe 85 PID 3124 wrote to memory of 3052 3124 msedge.exe 85 PID 3124 wrote to memory of 3052 3124 msedge.exe 85 PID 3124 wrote to memory of 3052 3124 msedge.exe 85 PID 3124 wrote to memory of 3052 3124 msedge.exe 85 PID 3124 wrote to memory of 3052 3124 msedge.exe 85 PID 3124 wrote to memory of 3052 3124 msedge.exe 85 PID 3124 wrote to memory of 3052 3124 msedge.exe 85 PID 3124 wrote to memory of 3052 3124 msedge.exe 85 PID 3124 wrote to memory of 3052 3124 msedge.exe 85 PID 3124 wrote to memory of 3052 3124 msedge.exe 85 PID 3124 wrote to memory of 3052 3124 msedge.exe 85 PID 3124 wrote to memory of 3052 3124 msedge.exe 85 PID 3124 wrote to memory of 3052 3124 msedge.exe 85 PID 3124 wrote to memory of 3052 3124 msedge.exe 85 PID 3124 wrote to memory of 3052 3124 msedge.exe 85 PID 3124 wrote to memory of 3052 3124 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\302405ce5601f31d8c1657fd59b55791_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3124 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe201746f8,0x7ffe20174708,0x7ffe201747182⤵PID:2128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2024,13238968413666850343,2162627926828145613,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2052 /prefetch:22⤵PID:3736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2024,13238968413666850343,2162627926828145613,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2272 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2024,13238968413666850343,2162627926828145613,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2676 /prefetch:82⤵PID:3052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,13238968413666850343,2162627926828145613,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:2200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,13238968413666850343,2162627926828145613,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:5056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,13238968413666850343,2162627926828145613,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4172 /prefetch:12⤵PID:4856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,13238968413666850343,2162627926828145613,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4920 /prefetch:12⤵PID:2692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,13238968413666850343,2162627926828145613,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3948 /prefetch:12⤵PID:4436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2024,13238968413666850343,2162627926828145613,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6404 /prefetch:82⤵PID:3776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2024,13238968413666850343,2162627926828145613,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6404 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,13238968413666850343,2162627926828145613,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5660 /prefetch:12⤵PID:4576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,13238968413666850343,2162627926828145613,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5436 /prefetch:12⤵PID:2900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,13238968413666850343,2162627926828145613,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5456 /prefetch:12⤵PID:3448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,13238968413666850343,2162627926828145613,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5516 /prefetch:12⤵PID:4212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2024,13238968413666850343,2162627926828145613,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1708 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1136
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1096
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3380
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e1fe3a26bd35b84102bb4203f31e74c7
SHA145fdfa8433789b575eb64e116718e62e0e0cf4a0
SHA25626e0d51529de906dd285ba48288e25eaf5213c0f0bab9bc5f119ecbc5e1b93ee
SHA512d528db2e9b917d4fbe24b1b5c6f4cb274f4f91c84f63e5119e041fa89ae0cd01a370e314f8b6aca9d6fa958e79feabc720f4b54b3d8aed69aab11fa84cad36bd
-
Filesize
152B
MD52915233ace3b11bc8898c958f245aa9a
SHA168c6aa983da303b825d656ac3284081db682f702
SHA256b2cb442f2ca27619c8df087f56fcbbb53186c53f8fd131af886ee3712220477e
SHA512e3f1b70d39b615e212f84d587ee816598236ee6ce144d919593894fcce4a0900343a9e8b837a0d1bd10921fff1c976c84c4a570eda776fe84d374a69e7a54890
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\71c504aa-6d08-4109-90aa-e2b77a917e39.tmp
Filesize6KB
MD52bd7f179675f5761999e1f78e30463b5
SHA136c0f18bf4284f144f48c39a63ab1186bec5fc8d
SHA256e164cb9e97e9ea0b77f07f49903c738e2eb225d91b75e67d6bc767e1f5d758db
SHA512e3babbb7c687c8ae9d6c97e98fa7b52307a35d75af0b1d0ac8b3b2aa98ce123d93a13086d70590591ad010c6b85a0d28db580bdf030ec0b925574d6224117e78
-
Filesize
211KB
MD5151fb811968eaf8efb840908b89dc9d4
SHA17ec811009fd9b0e6d92d12d78b002275f2f1bee1
SHA256043fd8558e4a5a60aaccd2f0377f77a544e3e375242e9d7200dc6e51f94103ed
SHA51283aface0ab01da52fd077f747c9d5916e3c06b0ea5c551d7d316707ec3e8f3f986ce1c82e6f2136e48c6511a83cb0ac67ff6dc8f0e440ac72fc6854086a87674
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize504B
MD5adc77a58f9845a92b2c323003cae2aaf
SHA1791e46226010b2a0922f2211e5b32abd3439a486
SHA2562a245640076ce135398a25950ce57289af3a7eb7ce931abbd1449b52980258a5
SHA51262419d2ae213c37f2e6b85e46d441c2f849599f705369df541a8d0abfa965606112cb5cdfa4aa7b6eaf419efb3eb83c435dbc93c08a41689743640ad8d5f4e3e
-
Filesize
1KB
MD527ed4ff318a4b5e67b00df7512201cb9
SHA106a28d3247a4e774b1dc05c069467c6ca6ef6eb6
SHA256e094964c9710cdda4b10c10b6ae69c0d5d7ad3146285720506f67fde7eed1e1e
SHA512e395b2368e6a334f04c072f97bee3d961a0856105f4c500228ebd5f040b879b982ca1ae55c9c9c325e4205187705bfc5f4fe937848c5d44d8cf78dbcebc9cb5e
-
Filesize
6KB
MD52490c116cc7a94fa894c081447be03a0
SHA17b87af51189414e72096a176d42b65dfcf8b87ff
SHA256f1c60c875a68c7738879b80a52691970441d3be011072d310d113ef62a0b0c34
SHA512c20d3c4e710626e74909e82809462522c0a94c8133afeb09a8643c1e285c18ed4e8997d4b75b7a0498a476368d60e29d9b0cfbaa36c6ad83d7c335749b5c4301
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5ff4218b20726f5cee0a99dd8723c4bd3
SHA13a357aff8aa3ba2b6dc4706f3e8b0057fe8ee8e2
SHA25694a63e3cfc7116ae3069bd8de49143239734705cd228565e902535999dc24b3f
SHA512c62b40bf37e8e888a68ec6493189fb3f7d9aedbeab5c4e08582a1ee6b0c0d9d4a2aafc3c1e62fa5fc55052d3031ca0044d58e1425f364c75b1eeba81f8c985e3