Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
11-07-2024 13:50
Static task
static1
Behavioral task
behavioral1
Sample
396599c8a59348a5e0cacdd8f4f16211_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
396599c8a59348a5e0cacdd8f4f16211_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
396599c8a59348a5e0cacdd8f4f16211_JaffaCakes118.html
-
Size
111KB
-
MD5
396599c8a59348a5e0cacdd8f4f16211
-
SHA1
b71fcfa03be6199901e778f0c3b6870d487c1736
-
SHA256
a6ee79afa504765f8027f7d20bbfab67856737366e415c1309dae5c531c60122
-
SHA512
bc52e1aac2ab4b6029cc02bf76735774226696ca07b2c816159e2db23b407087844edeeb00a82710aa07d5191487e298513404411b3778b330a86f444400394b
-
SSDEEP
768:STODQAJll6O6hD+GkkjmnGlqTAePXmLbF0lrUPwPErxMvqUdwas1HFXVRbZZi:SDq6O6hCZEkGlqTAlFc+wPOMvfe3XDLi
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 852 msedge.exe 852 msedge.exe 3992 msedge.exe 3992 msedge.exe 4292 identity_helper.exe 4292 identity_helper.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3992 wrote to memory of 2760 3992 msedge.exe 83 PID 3992 wrote to memory of 2760 3992 msedge.exe 83 PID 3992 wrote to memory of 1004 3992 msedge.exe 84 PID 3992 wrote to memory of 1004 3992 msedge.exe 84 PID 3992 wrote to memory of 1004 3992 msedge.exe 84 PID 3992 wrote to memory of 1004 3992 msedge.exe 84 PID 3992 wrote to memory of 1004 3992 msedge.exe 84 PID 3992 wrote to memory of 1004 3992 msedge.exe 84 PID 3992 wrote to memory of 1004 3992 msedge.exe 84 PID 3992 wrote to memory of 1004 3992 msedge.exe 84 PID 3992 wrote to memory of 1004 3992 msedge.exe 84 PID 3992 wrote to memory of 1004 3992 msedge.exe 84 PID 3992 wrote to memory of 1004 3992 msedge.exe 84 PID 3992 wrote to memory of 1004 3992 msedge.exe 84 PID 3992 wrote to memory of 1004 3992 msedge.exe 84 PID 3992 wrote to memory of 1004 3992 msedge.exe 84 PID 3992 wrote to memory of 1004 3992 msedge.exe 84 PID 3992 wrote to memory of 1004 3992 msedge.exe 84 PID 3992 wrote to memory of 1004 3992 msedge.exe 84 PID 3992 wrote to memory of 1004 3992 msedge.exe 84 PID 3992 wrote to memory of 1004 3992 msedge.exe 84 PID 3992 wrote to memory of 1004 3992 msedge.exe 84 PID 3992 wrote to memory of 1004 3992 msedge.exe 84 PID 3992 wrote to memory of 1004 3992 msedge.exe 84 PID 3992 wrote to memory of 1004 3992 msedge.exe 84 PID 3992 wrote to memory of 1004 3992 msedge.exe 84 PID 3992 wrote to memory of 1004 3992 msedge.exe 84 PID 3992 wrote to memory of 1004 3992 msedge.exe 84 PID 3992 wrote to memory of 1004 3992 msedge.exe 84 PID 3992 wrote to memory of 1004 3992 msedge.exe 84 PID 3992 wrote to memory of 1004 3992 msedge.exe 84 PID 3992 wrote to memory of 1004 3992 msedge.exe 84 PID 3992 wrote to memory of 1004 3992 msedge.exe 84 PID 3992 wrote to memory of 1004 3992 msedge.exe 84 PID 3992 wrote to memory of 1004 3992 msedge.exe 84 PID 3992 wrote to memory of 1004 3992 msedge.exe 84 PID 3992 wrote to memory of 1004 3992 msedge.exe 84 PID 3992 wrote to memory of 1004 3992 msedge.exe 84 PID 3992 wrote to memory of 1004 3992 msedge.exe 84 PID 3992 wrote to memory of 1004 3992 msedge.exe 84 PID 3992 wrote to memory of 1004 3992 msedge.exe 84 PID 3992 wrote to memory of 1004 3992 msedge.exe 84 PID 3992 wrote to memory of 852 3992 msedge.exe 85 PID 3992 wrote to memory of 852 3992 msedge.exe 85 PID 3992 wrote to memory of 1968 3992 msedge.exe 86 PID 3992 wrote to memory of 1968 3992 msedge.exe 86 PID 3992 wrote to memory of 1968 3992 msedge.exe 86 PID 3992 wrote to memory of 1968 3992 msedge.exe 86 PID 3992 wrote to memory of 1968 3992 msedge.exe 86 PID 3992 wrote to memory of 1968 3992 msedge.exe 86 PID 3992 wrote to memory of 1968 3992 msedge.exe 86 PID 3992 wrote to memory of 1968 3992 msedge.exe 86 PID 3992 wrote to memory of 1968 3992 msedge.exe 86 PID 3992 wrote to memory of 1968 3992 msedge.exe 86 PID 3992 wrote to memory of 1968 3992 msedge.exe 86 PID 3992 wrote to memory of 1968 3992 msedge.exe 86 PID 3992 wrote to memory of 1968 3992 msedge.exe 86 PID 3992 wrote to memory of 1968 3992 msedge.exe 86 PID 3992 wrote to memory of 1968 3992 msedge.exe 86 PID 3992 wrote to memory of 1968 3992 msedge.exe 86 PID 3992 wrote to memory of 1968 3992 msedge.exe 86 PID 3992 wrote to memory of 1968 3992 msedge.exe 86 PID 3992 wrote to memory of 1968 3992 msedge.exe 86 PID 3992 wrote to memory of 1968 3992 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\396599c8a59348a5e0cacdd8f4f16211_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3992 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8e54146f8,0x7ff8e5414708,0x7ff8e54147182⤵PID:2760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,15769283397613680944,17198280730107016943,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2152 /prefetch:22⤵PID:1004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,15769283397613680944,17198280730107016943,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2228 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2136,15769283397613680944,17198280730107016943,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2880 /prefetch:82⤵PID:1968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,15769283397613680944,17198280730107016943,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:2736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,15769283397613680944,17198280730107016943,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:1880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,15769283397613680944,17198280730107016943,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4264 /prefetch:12⤵PID:3788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,15769283397613680944,17198280730107016943,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5292 /prefetch:12⤵PID:784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,15769283397613680944,17198280730107016943,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5824 /prefetch:82⤵PID:3556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,15769283397613680944,17198280730107016943,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5824 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,15769283397613680944,17198280730107016943,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5448 /prefetch:12⤵PID:3092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,15769283397613680944,17198280730107016943,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5504 /prefetch:12⤵PID:764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,15769283397613680944,17198280730107016943,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5288 /prefetch:12⤵PID:4572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,15769283397613680944,17198280730107016943,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5396 /prefetch:12⤵PID:420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,15769283397613680944,17198280730107016943,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5196 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3968
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:628
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2484
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5eaaad45aced1889a90a8aa4c39f92659
SHA15c0130d9e8d1a64c97924090d9a5258b8a31b83c
SHA2565e3237f26b6047f64459cd5d3a6bc3563e2642b98d75b97011c93e0a9bd26f3b
SHA5120db1c6bdb51f4e6ba5ef4dc12fc73886e599ab28f1eec5d943110bc3d856401ca31c05baa9026dd441b69f3de92307eb77d93f089ba6e2b84eea6e93982620e4
-
Filesize
152B
MD53ee50fb26a9d3f096c47ff8696c24321
SHA1a8c83e798d2a8b31fec0820560525e80dfa4fe66
SHA256d80ec29cb17280af0c7522b30a80ffa19d1e786c0b09accfe3234b967d23eb6f
SHA512479c0d2b76850aa79b58f9e0a8ba5773bd8909d915b98c2e9dc3a95c0ac18d7741b2ee571df695c0305598d89651c7aef2ff7c2fedb8b6a6aa30057ecfc872c5
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD5c1b7fa2104649567a98ebfe854c1726c
SHA116752dddf2af859cc61b5f72b959f2588cc13227
SHA2564e4d0a832c8cffabf65b18b2e8d173bd0520c4ce56b3ff9da9078277d17af786
SHA51203d1d7c355601325a855121066d83cc89329578421a0d87fc799dd0238cf24550f65d2f7411b4077178e09868008512099d8108a983a553ae23ba814ab852e5d
-
Filesize
1KB
MD5eafbac2744c022ac2ffd706112ffee0f
SHA1236211ab0622ce5e390e1f9a537f034b7f46041b
SHA2561ca568b4a502e728b7ea694dd1aafb372a41f2f2f51bbc5886b7656101918bdd
SHA5125a032ddd225760a11916143d220d0a4164c0857f13940a22950404a663a30ae27543e060e2e8da202be74e8286c0ad6f066b1604465aca6d30fc58a7d2f6fbe8
-
Filesize
6KB
MD515fde90bc12296cf926d2d99469fac1b
SHA19290a2348612dd05d81244125efcf2a3ab318ac3
SHA256d25cf76c76804af51c9138e15add3f20a60697945df5ea215cf26e9c5ee42a21
SHA51299ceca3262be8653d50321df46bec968c31d661fc1ef28b50b1329b38a55e74fef56cdab722ee9e57097f8eca34cd6c8b9d431df17c4fdf0bf9307d527a8660e
-
Filesize
6KB
MD5bc1d6d49e2edc41cd8d1f0d2e8ebfbe7
SHA1e02f68599ed5ceed0536704ac5807bf2dbfdbc6c
SHA25688b0855692b78a4599ef85564f98bb0db3b81694b57a8aacff7eb1c6b29c20df
SHA512992ea24a828e06b5a6cf839d0447d9df6a4adc7778c26125b0e5929e2c1760716fcb7c2eba277a426552de08028f4e4e875adce9c4b5885e2c81c921a7c88afd
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5aa60e75876c84d4096cdff0fec25616e
SHA167c6509cd488dd52829f8963b0fb5e543cf243da
SHA256660a4272e2c427527d605e2ca67f8afbc75efedb5a63d3cd5a6e4ed29e1b02d6
SHA51216f93cdecadef856d0528b3aca6b6b7107e6c341bb13d1ac000fc2fc1ee244b72da37599f0a9c9ad3303cdaa361060641820d9b036e26fff6db940297837bd33