Analysis
-
max time kernel
145s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
09/07/2024, 14:21
Static task
static1
Behavioral task
behavioral1
Sample
30baef7d56204f3e8e20cec5e857d4d5_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
30baef7d56204f3e8e20cec5e857d4d5_JaffaCakes118.html
Resource
win10v2004-20240704-en
General
-
Target
30baef7d56204f3e8e20cec5e857d4d5_JaffaCakes118.html
-
Size
43KB
-
MD5
30baef7d56204f3e8e20cec5e857d4d5
-
SHA1
266dd1c7d3b8abf8059b7ca557389aa7783816d6
-
SHA256
5d53c606d1ebca040a9e184a1ac81c43e916738f0f2fe5c234c7b986bdfde940
-
SHA512
97c03b3cbb635a7b5eec97e1abe08006e9c59430b2c7066663f0d7c6f07a1c71a63677b71ecaa578bbec1233f534a0c15cc45208400cc2ea257ce2f7720d3223
-
SSDEEP
768:wLlSpHvvCIoo1ox96UhZZOTqS/Z6JiCaP:wIHv7oioxYUhZZIZ6JA
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4980 msedge.exe 4980 msedge.exe 2864 msedge.exe 2864 msedge.exe 4460 identity_helper.exe 4460 identity_helper.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe 2864 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2864 wrote to memory of 3180 2864 msedge.exe 82 PID 2864 wrote to memory of 3180 2864 msedge.exe 82 PID 2864 wrote to memory of 3944 2864 msedge.exe 84 PID 2864 wrote to memory of 3944 2864 msedge.exe 84 PID 2864 wrote to memory of 3944 2864 msedge.exe 84 PID 2864 wrote to memory of 3944 2864 msedge.exe 84 PID 2864 wrote to memory of 3944 2864 msedge.exe 84 PID 2864 wrote to memory of 3944 2864 msedge.exe 84 PID 2864 wrote to memory of 3944 2864 msedge.exe 84 PID 2864 wrote to memory of 3944 2864 msedge.exe 84 PID 2864 wrote to memory of 3944 2864 msedge.exe 84 PID 2864 wrote to memory of 3944 2864 msedge.exe 84 PID 2864 wrote to memory of 3944 2864 msedge.exe 84 PID 2864 wrote to memory of 3944 2864 msedge.exe 84 PID 2864 wrote to memory of 3944 2864 msedge.exe 84 PID 2864 wrote to memory of 3944 2864 msedge.exe 84 PID 2864 wrote to memory of 3944 2864 msedge.exe 84 PID 2864 wrote to memory of 3944 2864 msedge.exe 84 PID 2864 wrote to memory of 3944 2864 msedge.exe 84 PID 2864 wrote to memory of 3944 2864 msedge.exe 84 PID 2864 wrote to memory of 3944 2864 msedge.exe 84 PID 2864 wrote to memory of 3944 2864 msedge.exe 84 PID 2864 wrote to memory of 3944 2864 msedge.exe 84 PID 2864 wrote to memory of 3944 2864 msedge.exe 84 PID 2864 wrote to memory of 3944 2864 msedge.exe 84 PID 2864 wrote to memory of 3944 2864 msedge.exe 84 PID 2864 wrote to memory of 3944 2864 msedge.exe 84 PID 2864 wrote to memory of 3944 2864 msedge.exe 84 PID 2864 wrote to memory of 3944 2864 msedge.exe 84 PID 2864 wrote to memory of 3944 2864 msedge.exe 84 PID 2864 wrote to memory of 3944 2864 msedge.exe 84 PID 2864 wrote to memory of 3944 2864 msedge.exe 84 PID 2864 wrote to memory of 3944 2864 msedge.exe 84 PID 2864 wrote to memory of 3944 2864 msedge.exe 84 PID 2864 wrote to memory of 3944 2864 msedge.exe 84 PID 2864 wrote to memory of 3944 2864 msedge.exe 84 PID 2864 wrote to memory of 3944 2864 msedge.exe 84 PID 2864 wrote to memory of 3944 2864 msedge.exe 84 PID 2864 wrote to memory of 3944 2864 msedge.exe 84 PID 2864 wrote to memory of 3944 2864 msedge.exe 84 PID 2864 wrote to memory of 3944 2864 msedge.exe 84 PID 2864 wrote to memory of 3944 2864 msedge.exe 84 PID 2864 wrote to memory of 4980 2864 msedge.exe 85 PID 2864 wrote to memory of 4980 2864 msedge.exe 85 PID 2864 wrote to memory of 1600 2864 msedge.exe 86 PID 2864 wrote to memory of 1600 2864 msedge.exe 86 PID 2864 wrote to memory of 1600 2864 msedge.exe 86 PID 2864 wrote to memory of 1600 2864 msedge.exe 86 PID 2864 wrote to memory of 1600 2864 msedge.exe 86 PID 2864 wrote to memory of 1600 2864 msedge.exe 86 PID 2864 wrote to memory of 1600 2864 msedge.exe 86 PID 2864 wrote to memory of 1600 2864 msedge.exe 86 PID 2864 wrote to memory of 1600 2864 msedge.exe 86 PID 2864 wrote to memory of 1600 2864 msedge.exe 86 PID 2864 wrote to memory of 1600 2864 msedge.exe 86 PID 2864 wrote to memory of 1600 2864 msedge.exe 86 PID 2864 wrote to memory of 1600 2864 msedge.exe 86 PID 2864 wrote to memory of 1600 2864 msedge.exe 86 PID 2864 wrote to memory of 1600 2864 msedge.exe 86 PID 2864 wrote to memory of 1600 2864 msedge.exe 86 PID 2864 wrote to memory of 1600 2864 msedge.exe 86 PID 2864 wrote to memory of 1600 2864 msedge.exe 86 PID 2864 wrote to memory of 1600 2864 msedge.exe 86 PID 2864 wrote to memory of 1600 2864 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\30baef7d56204f3e8e20cec5e857d4d5_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xd8,0x10c,0x7ff8105f46f8,0x7ff8105f4708,0x7ff8105f47182⤵PID:3180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,11595569439293805190,8226328940749174996,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:22⤵PID:3944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,11595569439293805190,8226328940749174996,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2208 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,11595569439293805190,8226328940749174996,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2864 /prefetch:82⤵PID:1600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,11595569439293805190,8226328940749174996,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,11595569439293805190,8226328940749174996,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:1988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,11595569439293805190,8226328940749174996,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4652 /prefetch:12⤵PID:1456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,11595569439293805190,8226328940749174996,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6048 /prefetch:82⤵PID:3544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,11595569439293805190,8226328940749174996,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6048 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,11595569439293805190,8226328940749174996,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4972 /prefetch:12⤵PID:816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,11595569439293805190,8226328940749174996,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5836 /prefetch:12⤵PID:1208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,11595569439293805190,8226328940749174996,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5724 /prefetch:12⤵PID:3932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,11595569439293805190,8226328940749174996,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5672 /prefetch:12⤵PID:60
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,11595569439293805190,8226328940749174996,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1376 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3500
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2652
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4944
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5fbc957a83b42f65c351e04ce810c1c11
SHA178dcdf88beec5a9c112c145f239aefb1203d55ad
SHA2567bb59b74f42792a15762a77ca69f52bf5cc4506261a67f78cd673a2d398e6128
SHA512efad54eb0bd521c30bc4a96b9d4cb474c4ca42b4c108e08983a60c880817f61bc19d97538cc09a54b2db95ab9c8996f790672e19fb3851a5d93f174acdfac0ce
-
Filesize
152B
MD55b6ff6669a863812dff3a9e76cb311e4
SHA1355f7587ad1759634a95ae191b48b8dbaa2f1631
SHA256c7fb7eea8bea4488bd4605df51aa560c0e1b11660e9228863eb4ad1be0a07906
SHA512d153b1412fadda28c0582984e135b819ba330e01d3299bb4887062ffd6d3303da4f2c4b64a3de277773f4756da361e7bc5885c226ae2a5cfdd16ee60512e2e5e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD5b482778765e0074b56aab7e54f065373
SHA192d325222b83a0e571694d641f2ce2c7d619836f
SHA256e7d6aa6d31f90eacae88727800a7d933380b7ffd4921bbe958fb1d3fb681457e
SHA51298e7762f94d394702a578f6ce9adb974fbeaffdae352551deb6212818f074f16f096f627d7c72fcf75423c1aee82bc073d400015ee52ef457ca752f6a5a48a12
-
Filesize
1KB
MD50fa5109de120268dca25ec0f939e952a
SHA113828da6b4bc4d4ddddca80c0d5098ede2129c9f
SHA25603aa3d90f1c622514d5dc0ca326fc36575a9eb6b36c03a659a905833f0febd90
SHA51210ba93b815219ac74e1d64e05062fda9e984c16250ecc7f60924fd646745a066631b0d4cd71d803dac820ef56459b97cac695e24c7d0fc73240bff01a7593982
-
Filesize
6KB
MD587f2bdc1d3495755e524058fb4d149e0
SHA1ce59351cb2da1d1fa762c10c227a837594d64b09
SHA2564c282af6b9ef61bf15bcb3f56814c79870a27c9f6934faf9b19129247a84d1ce
SHA512d44fe74c65d78fa8544e73e5f90539ac9bb9506d5008d56658e5af380f2bf1e4b59f6f8b0d37dc1102558548bec46714a804a03e72b39b25454d4b1b0b8d4da3
-
Filesize
6KB
MD563572dbe2b1fe2cdcb0250bfac866025
SHA1f5e7c43f970dad74af629a92f1bd82102a08cad6
SHA256144e50aa3fe6673938496b3cd86a27b53e01abaf1317c99f56a5ff8f17d4ab97
SHA5126cc9c870617dfcbaa4796f4ce408697dc5172787a8a3220b6a88ec3c411f2a6b821d4cff036b4e03a684d07e3da2fcdfa8b3eb59a35f51224c2837bea32dfe52
-
Filesize
6KB
MD55f006810e442afb4233232861453565a
SHA1427ffbd628ce5726ae81104e5a693fc7f8d42fa0
SHA25651b64cad9013d03672003d22bbaa52b6e60b18efe31cc25dcd851cbd1e16e217
SHA512b530303254db1883e991525763b864601d7698bf4f529ba5df03720be41e1a8bcace97686550f08da68359468751aa29664a093fc8fe1a904eca3e5ca40f64a8
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD5da4424044387d7a0d6075dd65b5e82f0
SHA1be416a163b220d4d521ed79724bbd219ba0ff2a0
SHA256caad9d934bac3d7be001a401e584232c7b6be90562c0b2385f2eb6cbd7d79d67
SHA512a4da7d40e58e048ed19523378b1cd7ccdfcb16037ce5e21dd291f237b1c9f8409de794116bbab6219badfb57e844ad53dfcd71310e16b5ff874f1046d8989a9b