Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
13/07/2024, 15:09
Static task
static1
Behavioral task
behavioral1
Sample
42346ded556d80604c98e9ef1d88a489_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
42346ded556d80604c98e9ef1d88a489_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
42346ded556d80604c98e9ef1d88a489_JaffaCakes118.html
-
Size
17KB
-
MD5
42346ded556d80604c98e9ef1d88a489
-
SHA1
9d6f1db2ea6cee463fb4d7b77f1955e8f141aee4
-
SHA256
1bcbf2ca8038df356ea04ca2abc1fd5a39a989231084869e5efbefb1f91957c4
-
SHA512
e6b9080395907ca4f8ce6b099326a0985bed6db91ba818eba69c0c7ee2b0d648c65be0943db215eb9eabe984a3a8869746bf0b8cb644aaf17aa39c51a3cce9ed
-
SSDEEP
384:L5aycIF9STA85jSAcp+FWZOT7pSwcVHzXp9Xg1J2:1cIF9S0852AhFEOTotVTv
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4144 msedge.exe 4144 msedge.exe 3736 msedge.exe 3736 msedge.exe 1056 identity_helper.exe 1056 identity_helper.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe 3628 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe 3736 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3736 wrote to memory of 3124 3736 msedge.exe 83 PID 3736 wrote to memory of 3124 3736 msedge.exe 83 PID 3736 wrote to memory of 2784 3736 msedge.exe 84 PID 3736 wrote to memory of 2784 3736 msedge.exe 84 PID 3736 wrote to memory of 2784 3736 msedge.exe 84 PID 3736 wrote to memory of 2784 3736 msedge.exe 84 PID 3736 wrote to memory of 2784 3736 msedge.exe 84 PID 3736 wrote to memory of 2784 3736 msedge.exe 84 PID 3736 wrote to memory of 2784 3736 msedge.exe 84 PID 3736 wrote to memory of 2784 3736 msedge.exe 84 PID 3736 wrote to memory of 2784 3736 msedge.exe 84 PID 3736 wrote to memory of 2784 3736 msedge.exe 84 PID 3736 wrote to memory of 2784 3736 msedge.exe 84 PID 3736 wrote to memory of 2784 3736 msedge.exe 84 PID 3736 wrote to memory of 2784 3736 msedge.exe 84 PID 3736 wrote to memory of 2784 3736 msedge.exe 84 PID 3736 wrote to memory of 2784 3736 msedge.exe 84 PID 3736 wrote to memory of 2784 3736 msedge.exe 84 PID 3736 wrote to memory of 2784 3736 msedge.exe 84 PID 3736 wrote to memory of 2784 3736 msedge.exe 84 PID 3736 wrote to memory of 2784 3736 msedge.exe 84 PID 3736 wrote to memory of 2784 3736 msedge.exe 84 PID 3736 wrote to memory of 2784 3736 msedge.exe 84 PID 3736 wrote to memory of 2784 3736 msedge.exe 84 PID 3736 wrote to memory of 2784 3736 msedge.exe 84 PID 3736 wrote to memory of 2784 3736 msedge.exe 84 PID 3736 wrote to memory of 2784 3736 msedge.exe 84 PID 3736 wrote to memory of 2784 3736 msedge.exe 84 PID 3736 wrote to memory of 2784 3736 msedge.exe 84 PID 3736 wrote to memory of 2784 3736 msedge.exe 84 PID 3736 wrote to memory of 2784 3736 msedge.exe 84 PID 3736 wrote to memory of 2784 3736 msedge.exe 84 PID 3736 wrote to memory of 2784 3736 msedge.exe 84 PID 3736 wrote to memory of 2784 3736 msedge.exe 84 PID 3736 wrote to memory of 2784 3736 msedge.exe 84 PID 3736 wrote to memory of 2784 3736 msedge.exe 84 PID 3736 wrote to memory of 2784 3736 msedge.exe 84 PID 3736 wrote to memory of 2784 3736 msedge.exe 84 PID 3736 wrote to memory of 2784 3736 msedge.exe 84 PID 3736 wrote to memory of 2784 3736 msedge.exe 84 PID 3736 wrote to memory of 2784 3736 msedge.exe 84 PID 3736 wrote to memory of 2784 3736 msedge.exe 84 PID 3736 wrote to memory of 4144 3736 msedge.exe 85 PID 3736 wrote to memory of 4144 3736 msedge.exe 85 PID 3736 wrote to memory of 3100 3736 msedge.exe 86 PID 3736 wrote to memory of 3100 3736 msedge.exe 86 PID 3736 wrote to memory of 3100 3736 msedge.exe 86 PID 3736 wrote to memory of 3100 3736 msedge.exe 86 PID 3736 wrote to memory of 3100 3736 msedge.exe 86 PID 3736 wrote to memory of 3100 3736 msedge.exe 86 PID 3736 wrote to memory of 3100 3736 msedge.exe 86 PID 3736 wrote to memory of 3100 3736 msedge.exe 86 PID 3736 wrote to memory of 3100 3736 msedge.exe 86 PID 3736 wrote to memory of 3100 3736 msedge.exe 86 PID 3736 wrote to memory of 3100 3736 msedge.exe 86 PID 3736 wrote to memory of 3100 3736 msedge.exe 86 PID 3736 wrote to memory of 3100 3736 msedge.exe 86 PID 3736 wrote to memory of 3100 3736 msedge.exe 86 PID 3736 wrote to memory of 3100 3736 msedge.exe 86 PID 3736 wrote to memory of 3100 3736 msedge.exe 86 PID 3736 wrote to memory of 3100 3736 msedge.exe 86 PID 3736 wrote to memory of 3100 3736 msedge.exe 86 PID 3736 wrote to memory of 3100 3736 msedge.exe 86 PID 3736 wrote to memory of 3100 3736 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\42346ded556d80604c98e9ef1d88a489_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3736 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc3e6046f8,0x7ffc3e604708,0x7ffc3e6047182⤵PID:3124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,3836718763536737929,18128304399007346184,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2144 /prefetch:22⤵PID:2784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,3836718763536737929,18128304399007346184,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1876 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2136,3836718763536737929,18128304399007346184,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2796 /prefetch:82⤵PID:3100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,3836718763536737929,18128304399007346184,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:3224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,3836718763536737929,18128304399007346184,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:3228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,3836718763536737929,18128304399007346184,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4192 /prefetch:12⤵PID:1432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,3836718763536737929,18128304399007346184,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5248 /prefetch:12⤵PID:2204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,3836718763536737929,18128304399007346184,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5344 /prefetch:12⤵PID:1800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,3836718763536737929,18128304399007346184,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5748 /prefetch:82⤵PID:4860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,3836718763536737929,18128304399007346184,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5748 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,3836718763536737929,18128304399007346184,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5812 /prefetch:12⤵PID:4312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,3836718763536737929,18128304399007346184,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5828 /prefetch:12⤵PID:4036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,3836718763536737929,18128304399007346184,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6092 /prefetch:12⤵PID:4308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,3836718763536737929,18128304399007346184,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3944 /prefetch:12⤵PID:4024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,3836718763536737929,18128304399007346184,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4988 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3628
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4492
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5024
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5584971c8ba88c824fd51a05dddb45a98
SHA1b7c9489b4427652a9cdd754d1c1b6ac4034be421
SHA256e2d8de6c2323bbb3863ec50843d9b58a22e911fd626d31430658b9ea942cd307
SHA5125dbf1a4631a04d1149d8fab2b8e0e43ccd97b7212de43b961b9128a8bf03329164fdeb480154a8ffea5835f28417a7d2b115b8bf8d578d00b13c3682aa5ca726
-
Filesize
152B
MD5b28ef7d9f6d74f055cc49876767c886c
SHA1d6b3267f36c340979f8fc3e012fdd02c468740bf
SHA256fa6804456884789f4bdf9c3f5a4a8f29e0ededde149c4384072f3d8cc85bcc37
SHA512491f893c8f765e5d629bce8dd5067cef4e2ebc558d43bfb05e358bca43e1a66ee1285519bc266fd0ff5b5e09769a56077b62ac55fa8797c1edf6205843356e75
-
Filesize
211KB
MD5151fb811968eaf8efb840908b89dc9d4
SHA17ec811009fd9b0e6d92d12d78b002275f2f1bee1
SHA256043fd8558e4a5a60aaccd2f0377f77a544e3e375242e9d7200dc6e51f94103ed
SHA51283aface0ab01da52fd077f747c9d5916e3c06b0ea5c551d7d316707ec3e8f3f986ce1c82e6f2136e48c6511a83cb0ac67ff6dc8f0e440ac72fc6854086a87674
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize312B
MD5a3f91b0fd25c2c9e0270510a3d4b94f8
SHA126804f9e89a4d3064844cba85a7ad7dac161a3b6
SHA256d3762af6e41c467d8ecb8a9808438ce9c6efd5633cebaf0e1099fb5c12920607
SHA512d0bf98d92c018a1d7ca2701b3e358c45d11f07374b17dd8fcb55406a5a30396f050cf524d2ce3f1ba3b9a337ae1d6dc842b44148f4a251b9ff56bb734788c7d1
-
Filesize
1KB
MD5a193e29d329971660e1146cd3aece561
SHA10b5d3aefc208742d85160a21371a959b06b1aa26
SHA25674310cdbf04773e2038241e2bf1b5d24fb2b95c8b20acc8fd47c0a81a0c9581c
SHA5124445cd9bb3c74b934d1155d393a13213b8d028eec2424dfd7bbf8332083c1a95d660979f3f337f651df802eef1733d733543965a3307e5cfd553e27a7a2eb52b
-
Filesize
6KB
MD5d9ef47b1d56c0439621ae4a81cffbaa0
SHA1f26e1bc44369c244f1ff1ae436eabf6d51d203a2
SHA256819a6a3f727b16f5763ee29a963b22604495810da7ed138581c70c2481cf55e3
SHA512e99ee1078a14163ba5de0a06e6a323bd4bcfe5dd7b9166e91a28839b491fd9c3ee12a956b368a345df706b506d21c1439f4721b33e96b9e861deedd150d878eb
-
Filesize
7KB
MD56b728ac1ed92225baec30c598791fd69
SHA181a0d5e99a0b70e22c1a3e2756f82fcdf556e888
SHA256fbf2c426033ddadc5b2595eb328217774e55021fda1f9dd190f7a8d05a74c6a7
SHA5124fc89286235f1ab466970dc9870daad55a22258dfc8b3e56bc343a15de67a2c1285dc8cf0276991ab9101cd815a9978e5ff003d6487f7aeb55c2d1180560cbe7
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5b3a0747c1417aa6fcee6b861a7b022a2
SHA1140e5dcc997f55e9e68e3980ee9c0a30c55133f9
SHA256350c7cc9d220483c8a7d407b765e98fcb2a13c210e4093facf7078a8a64daa1c
SHA5123b09c4335a853392efb26d4bebd8b81145aaa54d518c8b45bcb264bddc70bb594b0414d45b37012992395ca1e8e674be655df70ed9341ae693c4a79f2d76dfc6