Analysis
-
max time kernel
145s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
10/07/2024, 16:46
Static task
static1
Behavioral task
behavioral1
Sample
358e564616499032939377ef7ea13928_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
358e564616499032939377ef7ea13928_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
358e564616499032939377ef7ea13928_JaffaCakes118.html
-
Size
57KB
-
MD5
358e564616499032939377ef7ea13928
-
SHA1
7de6b3228241ca0f2541296e81511c7a2620058a
-
SHA256
d8ee80d2df5a62954e58ff03b1bb19771d5a7728c034bf46fcf70f29f0322705
-
SHA512
e6da8f24ad89c564e8f20515dd12d50d143fe7b4b8cd46005a0aa9f2bf66b167675fe1060ef98baa34f0e99ff299e61a0dcf7e7f7639093abb5100befd19b298
-
SSDEEP
1536:gQZBCCOdz0IxCI0+/fxfvf5SfYf0fKfDfbf9fGfNfOfmfRfxfffyfofzfGfJfef8:gk2x0Ixj5noQcSbDFulGeJJX6AruRGVq
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4884 msedge.exe 4884 msedge.exe 2164 msedge.exe 2164 msedge.exe 2948 identity_helper.exe 2948 identity_helper.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe 2164 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2164 wrote to memory of 2668 2164 msedge.exe 83 PID 2164 wrote to memory of 2668 2164 msedge.exe 83 PID 2164 wrote to memory of 4936 2164 msedge.exe 84 PID 2164 wrote to memory of 4936 2164 msedge.exe 84 PID 2164 wrote to memory of 4936 2164 msedge.exe 84 PID 2164 wrote to memory of 4936 2164 msedge.exe 84 PID 2164 wrote to memory of 4936 2164 msedge.exe 84 PID 2164 wrote to memory of 4936 2164 msedge.exe 84 PID 2164 wrote to memory of 4936 2164 msedge.exe 84 PID 2164 wrote to memory of 4936 2164 msedge.exe 84 PID 2164 wrote to memory of 4936 2164 msedge.exe 84 PID 2164 wrote to memory of 4936 2164 msedge.exe 84 PID 2164 wrote to memory of 4936 2164 msedge.exe 84 PID 2164 wrote to memory of 4936 2164 msedge.exe 84 PID 2164 wrote to memory of 4936 2164 msedge.exe 84 PID 2164 wrote to memory of 4936 2164 msedge.exe 84 PID 2164 wrote to memory of 4936 2164 msedge.exe 84 PID 2164 wrote to memory of 4936 2164 msedge.exe 84 PID 2164 wrote to memory of 4936 2164 msedge.exe 84 PID 2164 wrote to memory of 4936 2164 msedge.exe 84 PID 2164 wrote to memory of 4936 2164 msedge.exe 84 PID 2164 wrote to memory of 4936 2164 msedge.exe 84 PID 2164 wrote to memory of 4936 2164 msedge.exe 84 PID 2164 wrote to memory of 4936 2164 msedge.exe 84 PID 2164 wrote to memory of 4936 2164 msedge.exe 84 PID 2164 wrote to memory of 4936 2164 msedge.exe 84 PID 2164 wrote to memory of 4936 2164 msedge.exe 84 PID 2164 wrote to memory of 4936 2164 msedge.exe 84 PID 2164 wrote to memory of 4936 2164 msedge.exe 84 PID 2164 wrote to memory of 4936 2164 msedge.exe 84 PID 2164 wrote to memory of 4936 2164 msedge.exe 84 PID 2164 wrote to memory of 4936 2164 msedge.exe 84 PID 2164 wrote to memory of 4936 2164 msedge.exe 84 PID 2164 wrote to memory of 4936 2164 msedge.exe 84 PID 2164 wrote to memory of 4936 2164 msedge.exe 84 PID 2164 wrote to memory of 4936 2164 msedge.exe 84 PID 2164 wrote to memory of 4936 2164 msedge.exe 84 PID 2164 wrote to memory of 4936 2164 msedge.exe 84 PID 2164 wrote to memory of 4936 2164 msedge.exe 84 PID 2164 wrote to memory of 4936 2164 msedge.exe 84 PID 2164 wrote to memory of 4936 2164 msedge.exe 84 PID 2164 wrote to memory of 4936 2164 msedge.exe 84 PID 2164 wrote to memory of 4884 2164 msedge.exe 85 PID 2164 wrote to memory of 4884 2164 msedge.exe 85 PID 2164 wrote to memory of 4920 2164 msedge.exe 86 PID 2164 wrote to memory of 4920 2164 msedge.exe 86 PID 2164 wrote to memory of 4920 2164 msedge.exe 86 PID 2164 wrote to memory of 4920 2164 msedge.exe 86 PID 2164 wrote to memory of 4920 2164 msedge.exe 86 PID 2164 wrote to memory of 4920 2164 msedge.exe 86 PID 2164 wrote to memory of 4920 2164 msedge.exe 86 PID 2164 wrote to memory of 4920 2164 msedge.exe 86 PID 2164 wrote to memory of 4920 2164 msedge.exe 86 PID 2164 wrote to memory of 4920 2164 msedge.exe 86 PID 2164 wrote to memory of 4920 2164 msedge.exe 86 PID 2164 wrote to memory of 4920 2164 msedge.exe 86 PID 2164 wrote to memory of 4920 2164 msedge.exe 86 PID 2164 wrote to memory of 4920 2164 msedge.exe 86 PID 2164 wrote to memory of 4920 2164 msedge.exe 86 PID 2164 wrote to memory of 4920 2164 msedge.exe 86 PID 2164 wrote to memory of 4920 2164 msedge.exe 86 PID 2164 wrote to memory of 4920 2164 msedge.exe 86 PID 2164 wrote to memory of 4920 2164 msedge.exe 86 PID 2164 wrote to memory of 4920 2164 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\358e564616499032939377ef7ea13928_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9a87346f8,0x7ff9a8734708,0x7ff9a87347182⤵PID:2668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,17869522742217206604,2815924524876831294,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:22⤵PID:4936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,17869522742217206604,2815924524876831294,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2196 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,17869522742217206604,2815924524876831294,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2764 /prefetch:82⤵PID:4920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,17869522742217206604,2815924524876831294,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1496 /prefetch:12⤵PID:1212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,17869522742217206604,2815924524876831294,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:4984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,17869522742217206604,2815924524876831294,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4220 /prefetch:12⤵PID:4004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,17869522742217206604,2815924524876831294,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4340 /prefetch:12⤵PID:3324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,17869522742217206604,2815924524876831294,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5028 /prefetch:12⤵PID:1308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,17869522742217206604,2815924524876831294,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6236 /prefetch:82⤵PID:220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,17869522742217206604,2815924524876831294,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6236 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,17869522742217206604,2815924524876831294,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5880 /prefetch:12⤵PID:384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,17869522742217206604,2815924524876831294,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5928 /prefetch:12⤵PID:1300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,17869522742217206604,2815924524876831294,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5516 /prefetch:12⤵PID:580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,17869522742217206604,2815924524876831294,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5576 /prefetch:12⤵PID:1584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,17869522742217206604,2815924524876831294,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1380 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4008
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4456
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3904
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD504b60a51907d399f3685e03094b603cb
SHA1228d18888782f4e66ca207c1a073560e0a4cc6e7
SHA25687a9d9f1bd99313295b2ce703580b9d37c3a68b9b33026fdda4c2530f562e6a3
SHA5122a8e3da94eaf0a6c4a2f29da6fec2796ba6a13cad6425bb650349a60eb3204643fc2fd1ab425f0251610cb9cce65e7dba459388b4e00c12ba3434a1798855c91
-
Filesize
152B
MD59622e603d436ca747f3a4407a6ca952e
SHA1297d9aed5337a8a7290ea436b61458c372b1d497
SHA256ace0e47e358fba0831b508cd23949a503ae0e6a5c857859e720d1b6479ff2261
SHA512f774c5c44f0fcdfb45847626f6808076dccabfbcb8a37d00329ec792e2901dc59636ef15c95d84d0080272571542d43b473ce11c2209ac251bee13bd611b200a
-
Filesize
211KB
MD5151fb811968eaf8efb840908b89dc9d4
SHA17ec811009fd9b0e6d92d12d78b002275f2f1bee1
SHA256043fd8558e4a5a60aaccd2f0377f77a544e3e375242e9d7200dc6e51f94103ed
SHA51283aface0ab01da52fd077f747c9d5916e3c06b0ea5c551d7d316707ec3e8f3f986ce1c82e6f2136e48c6511a83cb0ac67ff6dc8f0e440ac72fc6854086a87674
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize504B
MD5301496c999b8eabb5151e66c748b4c8a
SHA1669ca056ff39dc169ee26ea62f4d28ecf616646a
SHA256d2ff7e618fc05d84c4b244d9aa9a9af46471b266e4593c69952a18e48e289b92
SHA512c4b646d5ab785e342b54563d26c8a4641c1e951b328a7186da947cb974c88ffea0ef315f0859ef48f34c2350db8c6cb455a52ec72f4fab372807d1080ab38fc4
-
Filesize
1KB
MD5de0c510c586761dbb595b1c07217b4bc
SHA124d34707da1f0e4f2be0cdf504d914008d304a55
SHA25660dd77f46dda0f8f4d7496cf61bf33bd23505d9565cf6e9f8dd6f7d890966395
SHA5120854db5caa917fd030ddb06bdab0671e1e54f9597096e0e79c1d20b2a8432dbcb96497b8f53c8d2e5f668a613fb2e25402e351904bb6aefbbbd419263a93fd1e
-
Filesize
6KB
MD509fb1b659b655591f2931f639cab5512
SHA17d2c440ecbe2248dead13593b569c854630d3aa5
SHA256ebf0f8ce67bc4db08a7ef33fce1ea397971fdd809c1754496f7c3b026348e457
SHA5129f40dc646235732a4e40e7d008cb95802dd1b975a44121eb403397a469415e5504811a749612dce42cee1f43218adbcb8dad68bc44a56bebb61def3f25e3581a
-
Filesize
6KB
MD5a46f10f8270979682e9a0bf29755233a
SHA1259973d2164388c9fea741e51eb0900dcdcd2009
SHA256aaa2abd3e77ad028bd581e041517782b2db1571e721ae915ba23a511a5275e16
SHA512b0f424b89dbe7d1661880ae4834847a5a29b580fc29afa9dad71ab57d6b08c69dd95f6e0c1ccb5848a27f2bbe83d9999d5697571f765b0d59af1deae2299ce77
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD5b52612abcae2b4b9d777d3e46a468245
SHA1ffbea94e3763b8cfaa00670fdd9b6438f2fe14a4
SHA25683027d15feb4a8c3d39ed6800c00e2ec10e2d8e8ee02c74221a90bac39760323
SHA5120a9efd6422061ff7a91c8823314605ce7074a44f2d880d819d22c91bc92e3cabc4405e370c51a9d133be68769b6088f92faa23a4c7695fc25835423d7572fc56