Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
09-07-2024 15:54
Static task
static1
Behavioral task
behavioral1
Sample
3103278668f785806b446f02df195493_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
3103278668f785806b446f02df195493_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
3103278668f785806b446f02df195493_JaffaCakes118.html
-
Size
42KB
-
MD5
3103278668f785806b446f02df195493
-
SHA1
c5ab2c6b8f395e9b05f731d2e79b2d18ed8e5aaa
-
SHA256
95bd27dde6ce12c86378a21f256209536d403ae7653068170aa3192cd08f35fe
-
SHA512
1504ee9afd7c2cb3500ffc9551e2b74773ecffe15c144885f9f84c88c93e33fa258d166d1db7b0f9f95efa92a9ec7db94265b14011c67525fc8b99f6c557d9f1
-
SSDEEP
768:Zcd9QZBC7mOdMcjpC5I9nC4hFkRLQwBwowRoPxPd:gQZBCCOdf0IxCQFk9QwBwowaPxPd
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4508 msedge.exe 4508 msedge.exe 748 msedge.exe 748 msedge.exe 1912 identity_helper.exe 1912 identity_helper.exe 2548 msedge.exe 2548 msedge.exe 2548 msedge.exe 2548 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 748 wrote to memory of 3020 748 msedge.exe 79 PID 748 wrote to memory of 3020 748 msedge.exe 79 PID 748 wrote to memory of 920 748 msedge.exe 80 PID 748 wrote to memory of 920 748 msedge.exe 80 PID 748 wrote to memory of 920 748 msedge.exe 80 PID 748 wrote to memory of 920 748 msedge.exe 80 PID 748 wrote to memory of 920 748 msedge.exe 80 PID 748 wrote to memory of 920 748 msedge.exe 80 PID 748 wrote to memory of 920 748 msedge.exe 80 PID 748 wrote to memory of 920 748 msedge.exe 80 PID 748 wrote to memory of 920 748 msedge.exe 80 PID 748 wrote to memory of 920 748 msedge.exe 80 PID 748 wrote to memory of 920 748 msedge.exe 80 PID 748 wrote to memory of 920 748 msedge.exe 80 PID 748 wrote to memory of 920 748 msedge.exe 80 PID 748 wrote to memory of 920 748 msedge.exe 80 PID 748 wrote to memory of 920 748 msedge.exe 80 PID 748 wrote to memory of 920 748 msedge.exe 80 PID 748 wrote to memory of 920 748 msedge.exe 80 PID 748 wrote to memory of 920 748 msedge.exe 80 PID 748 wrote to memory of 920 748 msedge.exe 80 PID 748 wrote to memory of 920 748 msedge.exe 80 PID 748 wrote to memory of 920 748 msedge.exe 80 PID 748 wrote to memory of 920 748 msedge.exe 80 PID 748 wrote to memory of 920 748 msedge.exe 80 PID 748 wrote to memory of 920 748 msedge.exe 80 PID 748 wrote to memory of 920 748 msedge.exe 80 PID 748 wrote to memory of 920 748 msedge.exe 80 PID 748 wrote to memory of 920 748 msedge.exe 80 PID 748 wrote to memory of 920 748 msedge.exe 80 PID 748 wrote to memory of 920 748 msedge.exe 80 PID 748 wrote to memory of 920 748 msedge.exe 80 PID 748 wrote to memory of 920 748 msedge.exe 80 PID 748 wrote to memory of 920 748 msedge.exe 80 PID 748 wrote to memory of 920 748 msedge.exe 80 PID 748 wrote to memory of 920 748 msedge.exe 80 PID 748 wrote to memory of 920 748 msedge.exe 80 PID 748 wrote to memory of 920 748 msedge.exe 80 PID 748 wrote to memory of 920 748 msedge.exe 80 PID 748 wrote to memory of 920 748 msedge.exe 80 PID 748 wrote to memory of 920 748 msedge.exe 80 PID 748 wrote to memory of 920 748 msedge.exe 80 PID 748 wrote to memory of 4508 748 msedge.exe 81 PID 748 wrote to memory of 4508 748 msedge.exe 81 PID 748 wrote to memory of 4592 748 msedge.exe 82 PID 748 wrote to memory of 4592 748 msedge.exe 82 PID 748 wrote to memory of 4592 748 msedge.exe 82 PID 748 wrote to memory of 4592 748 msedge.exe 82 PID 748 wrote to memory of 4592 748 msedge.exe 82 PID 748 wrote to memory of 4592 748 msedge.exe 82 PID 748 wrote to memory of 4592 748 msedge.exe 82 PID 748 wrote to memory of 4592 748 msedge.exe 82 PID 748 wrote to memory of 4592 748 msedge.exe 82 PID 748 wrote to memory of 4592 748 msedge.exe 82 PID 748 wrote to memory of 4592 748 msedge.exe 82 PID 748 wrote to memory of 4592 748 msedge.exe 82 PID 748 wrote to memory of 4592 748 msedge.exe 82 PID 748 wrote to memory of 4592 748 msedge.exe 82 PID 748 wrote to memory of 4592 748 msedge.exe 82 PID 748 wrote to memory of 4592 748 msedge.exe 82 PID 748 wrote to memory of 4592 748 msedge.exe 82 PID 748 wrote to memory of 4592 748 msedge.exe 82 PID 748 wrote to memory of 4592 748 msedge.exe 82 PID 748 wrote to memory of 4592 748 msedge.exe 82
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\3103278668f785806b446f02df195493_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:748 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff83c5346f8,0x7ff83c534708,0x7ff83c5347182⤵PID:3020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,14196287116534456003,11142123587469198928,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵PID:920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,14196287116534456003,11142123587469198928,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2224 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,14196287116534456003,11142123587469198928,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2812 /prefetch:82⤵PID:4592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,14196287116534456003,11142123587469198928,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:1624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,14196287116534456003,11142123587469198928,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:3048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,14196287116534456003,11142123587469198928,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4200 /prefetch:12⤵PID:1664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,14196287116534456003,11142123587469198928,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5156 /prefetch:12⤵PID:3452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,14196287116534456003,11142123587469198928,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5508 /prefetch:12⤵PID:1652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,14196287116534456003,11142123587469198928,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6348 /prefetch:82⤵PID:2152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,14196287116534456003,11142123587469198928,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6348 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,14196287116534456003,11142123587469198928,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6064 /prefetch:12⤵PID:2200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,14196287116534456003,11142123587469198928,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4900 /prefetch:12⤵PID:3852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,14196287116534456003,11142123587469198928,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6116 /prefetch:12⤵PID:5080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,14196287116534456003,11142123587469198928,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6052 /prefetch:12⤵PID:4896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,14196287116534456003,11142123587469198928,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5024 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2548
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2660
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3100
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD58dc45b70cbe29a357e2c376a0c2b751b
SHA125d623cea817f86b8427db53b82340410c1489b2
SHA256511cfb6bedbad2530b5cc5538b6ec2184fc4f85947ba4c8166d0bb9f5fe2703a
SHA5123ce0f52675feb16d6e62aae1c50767da178b93bdae28bacf6df3a2f72b8cc75b09c5092d9065e0872e5d09fd9ffe0c6931d6ae1943ddb1927b85d60659ef866e
-
Filesize
152B
MD51790c766c15938258a4f9b984cf68312
SHA115c9827d278d28b23a8ea0389d42fa87e404359f
SHA2562e3978bb58c701f3c6b05de9349b7334a194591bec7bcf73f53527dc0991dc63
SHA5122682d9c60c9d67608cf140b6ca4958d890bcbc3c8a8e95fcc639d2a11bb0ec348ca55ae99a5840e1f50e5c5bcf3e27c97fc877582d869d98cc4ea3448315aafb
-
Filesize
211KB
MD5151fb811968eaf8efb840908b89dc9d4
SHA17ec811009fd9b0e6d92d12d78b002275f2f1bee1
SHA256043fd8558e4a5a60aaccd2f0377f77a544e3e375242e9d7200dc6e51f94103ed
SHA51283aface0ab01da52fd077f747c9d5916e3c06b0ea5c551d7d316707ec3e8f3f986ce1c82e6f2136e48c6511a83cb0ac67ff6dc8f0e440ac72fc6854086a87674
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize504B
MD58d324da6d59bbda398c6bcb9a6d07ed3
SHA1624eb0a81de548ed07d01bcc0aa5f6f25ffa28f2
SHA2566c0dfe9279a12a20ae1700ffe0685db11375ec9854be936c6764fc323b65ad61
SHA5128dea9c035b114df1596788d3a970884ded3f3528fe2e648ded3330a5d903fdcefc0c5854f22a0221ba05b4e98e1c45ad146414bdbc86f19ba5db1d158352957e
-
Filesize
1KB
MD51dfedb03d655a25faf1eff7e56d2bb17
SHA146508e946ae37c7cfd0c0f88b2dec2c0600dd3c0
SHA256c07e521ea93735048ae89ea4405ee907a4a75eb6201a302d64cb2cd88cad7b0c
SHA51275ae6951e0be506780beb115464bee24a3c9670d5c09907305868dc0dc1d440f671fc7967073dbca5fc8ffee7b69e4fbf94dc432c3bc2fefca416a517847fed4
-
Filesize
6KB
MD5c7009c15034b2caeb675d5c71196c987
SHA1f84d44e11a7dd1ff6e9b052608937c53425e96f9
SHA256e6633d0a2ebd113aac3c2b12fa5968d6f72cf8611a532eeec08dbde56c0dc662
SHA5126bdc3386ead2017ce2f8a4544bea8ac81c4e5bea48c5ef6555e3b33fa851a95b11ed470e474f36f65aff82687d3bd0b4a6f289685184ae6710f4843812930680
-
Filesize
6KB
MD555c909dbe9912e42fedffbffc39370b5
SHA11e42aa956504a68010cb132c98b49b3f2f446cb4
SHA2564c55add7dfd1703fb39107163139a52a76890baf510e5da86d45c66611c95300
SHA5127cfd2b326f9a84608bd33daff3f88d32b5b57cec472a20689510b9641af1df13f3a7c72e7ecbbc07baafcfe08348d9ff2f90e3d99309aa44149445f3c09d8495
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD55ca85b6c8e3b8c8a5593c085260a48b6
SHA1d4436c56e1835a2b6c07b1afe63cab43d10f7e1a
SHA256e961f23826e91ae8612b4fe57bd3893ed7709781fbd0f3761a73209053866516
SHA5125efbdb15df726417810e17c7f192485a3cb4f1ee2996b7f5e50a960bf8f7110dbf7999033eec1cc76bc5899b439753cda2da06302dcee9f79908c4112e2b1d65