Analysis
-
max time kernel
149s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
13/07/2024, 14:41
Static task
static1
Behavioral task
behavioral1
Sample
421bccccac9cf9deb9deb1050fca6d78_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
421bccccac9cf9deb9deb1050fca6d78_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
421bccccac9cf9deb9deb1050fca6d78_JaffaCakes118.html
-
Size
14KB
-
MD5
421bccccac9cf9deb9deb1050fca6d78
-
SHA1
0eab81339cbfd76dcf4068ed10b5932fbf1405c5
-
SHA256
9e7a2dde43e76bd96635a26e562e3bcc1877cc366529fb511f4e8ea4e4de0aa1
-
SHA512
d86d72cd48d701ca06e968cea5f874a03b7bd8cd242ff370e173f9bff6a42f2fc7e2e0e5603c8b96636074671b59a2700dafa696258ed1faeec2ebece3a4ce71
-
SSDEEP
192:S1NGEKqSJChDD8JB4i4qMRU6RoK18lGQ8S23yf9Sm5715:SOqSJChD8JBuW6RPynyylSmB15
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 764 msedge.exe 764 msedge.exe 3232 msedge.exe 3232 msedge.exe 2700 identity_helper.exe 2700 identity_helper.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3232 wrote to memory of 5004 3232 msedge.exe 85 PID 3232 wrote to memory of 5004 3232 msedge.exe 85 PID 3232 wrote to memory of 1424 3232 msedge.exe 87 PID 3232 wrote to memory of 1424 3232 msedge.exe 87 PID 3232 wrote to memory of 1424 3232 msedge.exe 87 PID 3232 wrote to memory of 1424 3232 msedge.exe 87 PID 3232 wrote to memory of 1424 3232 msedge.exe 87 PID 3232 wrote to memory of 1424 3232 msedge.exe 87 PID 3232 wrote to memory of 1424 3232 msedge.exe 87 PID 3232 wrote to memory of 1424 3232 msedge.exe 87 PID 3232 wrote to memory of 1424 3232 msedge.exe 87 PID 3232 wrote to memory of 1424 3232 msedge.exe 87 PID 3232 wrote to memory of 1424 3232 msedge.exe 87 PID 3232 wrote to memory of 1424 3232 msedge.exe 87 PID 3232 wrote to memory of 1424 3232 msedge.exe 87 PID 3232 wrote to memory of 1424 3232 msedge.exe 87 PID 3232 wrote to memory of 1424 3232 msedge.exe 87 PID 3232 wrote to memory of 1424 3232 msedge.exe 87 PID 3232 wrote to memory of 1424 3232 msedge.exe 87 PID 3232 wrote to memory of 1424 3232 msedge.exe 87 PID 3232 wrote to memory of 1424 3232 msedge.exe 87 PID 3232 wrote to memory of 1424 3232 msedge.exe 87 PID 3232 wrote to memory of 1424 3232 msedge.exe 87 PID 3232 wrote to memory of 1424 3232 msedge.exe 87 PID 3232 wrote to memory of 1424 3232 msedge.exe 87 PID 3232 wrote to memory of 1424 3232 msedge.exe 87 PID 3232 wrote to memory of 1424 3232 msedge.exe 87 PID 3232 wrote to memory of 1424 3232 msedge.exe 87 PID 3232 wrote to memory of 1424 3232 msedge.exe 87 PID 3232 wrote to memory of 1424 3232 msedge.exe 87 PID 3232 wrote to memory of 1424 3232 msedge.exe 87 PID 3232 wrote to memory of 1424 3232 msedge.exe 87 PID 3232 wrote to memory of 1424 3232 msedge.exe 87 PID 3232 wrote to memory of 1424 3232 msedge.exe 87 PID 3232 wrote to memory of 1424 3232 msedge.exe 87 PID 3232 wrote to memory of 1424 3232 msedge.exe 87 PID 3232 wrote to memory of 1424 3232 msedge.exe 87 PID 3232 wrote to memory of 1424 3232 msedge.exe 87 PID 3232 wrote to memory of 1424 3232 msedge.exe 87 PID 3232 wrote to memory of 1424 3232 msedge.exe 87 PID 3232 wrote to memory of 1424 3232 msedge.exe 87 PID 3232 wrote to memory of 1424 3232 msedge.exe 87 PID 3232 wrote to memory of 764 3232 msedge.exe 88 PID 3232 wrote to memory of 764 3232 msedge.exe 88 PID 3232 wrote to memory of 4352 3232 msedge.exe 89 PID 3232 wrote to memory of 4352 3232 msedge.exe 89 PID 3232 wrote to memory of 4352 3232 msedge.exe 89 PID 3232 wrote to memory of 4352 3232 msedge.exe 89 PID 3232 wrote to memory of 4352 3232 msedge.exe 89 PID 3232 wrote to memory of 4352 3232 msedge.exe 89 PID 3232 wrote to memory of 4352 3232 msedge.exe 89 PID 3232 wrote to memory of 4352 3232 msedge.exe 89 PID 3232 wrote to memory of 4352 3232 msedge.exe 89 PID 3232 wrote to memory of 4352 3232 msedge.exe 89 PID 3232 wrote to memory of 4352 3232 msedge.exe 89 PID 3232 wrote to memory of 4352 3232 msedge.exe 89 PID 3232 wrote to memory of 4352 3232 msedge.exe 89 PID 3232 wrote to memory of 4352 3232 msedge.exe 89 PID 3232 wrote to memory of 4352 3232 msedge.exe 89 PID 3232 wrote to memory of 4352 3232 msedge.exe 89 PID 3232 wrote to memory of 4352 3232 msedge.exe 89 PID 3232 wrote to memory of 4352 3232 msedge.exe 89 PID 3232 wrote to memory of 4352 3232 msedge.exe 89 PID 3232 wrote to memory of 4352 3232 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\421bccccac9cf9deb9deb1050fca6d78_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3232 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe97da46f8,0x7ffe97da4708,0x7ffe97da47182⤵PID:5004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,1798482384692611239,15937627780381159474,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:22⤵PID:1424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,1798482384692611239,15937627780381159474,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2184 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2116,1798482384692611239,15937627780381159474,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2728 /prefetch:82⤵PID:4352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,1798482384692611239,15937627780381159474,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:1084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,1798482384692611239,15937627780381159474,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3380 /prefetch:12⤵PID:4680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,1798482384692611239,15937627780381159474,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4124 /prefetch:12⤵PID:3296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,1798482384692611239,15937627780381159474,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5236 /prefetch:12⤵PID:872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,1798482384692611239,15937627780381159474,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5776 /prefetch:82⤵PID:100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,1798482384692611239,15937627780381159474,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5776 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,1798482384692611239,15937627780381159474,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5496 /prefetch:12⤵PID:2368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,1798482384692611239,15937627780381159474,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5456 /prefetch:12⤵PID:4668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,1798482384692611239,15937627780381159474,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3196 /prefetch:12⤵PID:4452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,1798482384692611239,15937627780381159474,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4268 /prefetch:12⤵PID:4576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,1798482384692611239,15937627780381159474,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5012 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1652
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1736
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3208
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51f9d180c0bcf71b48e7bc8302f85c28f
SHA1ade94a8e51c446383dc0a45edf5aad5fa20edf3c
SHA256a17d56c41d524453a78e3f06e0d0b0081e79d090a4b75d0b693ddbc39f6f7fdc
SHA512282863df0e51288049587886ed37ad1cf5b6bfeed86454ea3b9f2bb7f0a1c591f3540c62712ebfcd6f1095e1977446dd5b13b904bb52b6d5c910a1efc208c785
-
Filesize
152B
MD560ead4145eb78b972baf6c6270ae6d72
SHA1e71f4507bea5b518d9ee9fb2d523c5a11adea842
SHA256b9e99e7387a915275e8fe4ac0b0c0cd330b4632814d5c9c446beb2755f1309a7
SHA5128cdbafd2783048f5f54f22e13f6ef890936d5b986b0bb3fa86d2420a5bfecf7bedc56f46e6d5f126eae79f492315843c134c441084b912296e269f384a73ccde
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD5b022b75f139035ccb85648a9670cf431
SHA1bd9c965003f9d978320980f94945f495ba74f2ed
SHA256b1f5ab8fd88cebcfcf806cde9f1950564409a902911abcbe3172df4e7e8ed322
SHA5125c6373da4b909ee8b99439f32e0d4713bf77a564f1e1929aec889852d1ccd9fabffdd4f38c292cc00c0f92db8733dd1a2a25b537d976a2934fe7c4b2a24c5c95
-
Filesize
1KB
MD513c8661456ed37a2bc1b13ff337f2a72
SHA10ce1edf91c6da7960bf34c222dc3423c3a2772be
SHA256591d22f2e1a75dba70395fa11b4d1581bd7c569a05bbfbbf6993494181b4e216
SHA5121a191b1ab8f947070bbec4ffb6a5de5c3f2f84bddf621edb7466e6dcc028293912a86ed6445802c7de4f292a26d8f83f34ddb22c479851b329d502405fb2e523
-
Filesize
6KB
MD5933819de011ab5fb553f477646818ab4
SHA1e0a2d7dbfd541e5fdabd77230ab96f499c36c47f
SHA256015e4fc1d4bfb4cf94a0ce033a8664a4929f581c8c5cded0c654631f8169641c
SHA5129153c9768235b51220e26d8318805bd8e1e739b1ffa78823acec3caae313308e73f59797366107c2c7369b014e8a51753d92b304b65c8635b912232a07d5a1b7
-
Filesize
6KB
MD525cd9601da622e3dbdbbba4b6d29385d
SHA10bd13cadea38e5e523801f4ab42991d74eb501d4
SHA25688d4958134f99463eb4d1bb46357a0537f1df2bd361f9a27a6f6038b81bfb158
SHA5121e9dd53bfc8d0217e5bc50f05c3db4b19bfe29fd1656b846e6b5c56c02979db537b14df17d46bf7c9601e185271413e966b3a10c960da9aefa152af24c2ac66b
-
Filesize
6KB
MD53d56e184e4e0c779f7b8a96e8f7482a1
SHA18f67f6f4abb24c67fc6ab8d3fa15949a46753d33
SHA256d018eeaa322ada7df1647dfd238b65f235c3f7c41c088a01dc810c57ff351f48
SHA51259246ce7fc2153c760b1f7705ae2f3b47450e800f99a529a36d9220ca00c6a17139ca76c7a5465d33f0ce5ac4538da7b6c64b08bf05044d62a8c2ffd46e335f3
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD563e6b62a9df34d9892999afdc8237983
SHA13de5e064824792de4fea5c8de2962ffd18769462
SHA256d5911366fab0f62c0ae76847e6839978bb6fdd55c09b97126e51910ad4f3f458
SHA5123e5d3f58063d0b85b93b376ecae9ffba9adacf2affcb03effaa3bf8ba10ed188cf46fece62f482936c89b19ad778710833e9586ee82bc74faa1963782c7821e3