Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
13/07/2024, 16:18
Static task
static1
Behavioral task
behavioral1
Sample
426d4fee837e78f9626da434a2c67bed_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
426d4fee837e78f9626da434a2c67bed_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
426d4fee837e78f9626da434a2c67bed_JaffaCakes118.html
-
Size
14KB
-
MD5
426d4fee837e78f9626da434a2c67bed
-
SHA1
ebaffd16567775773bf31fb14dd7788ce9c4cf9e
-
SHA256
2e0b8b8501046c2c4cb414d0b84402ab2f1b9bd570753b071c7f7600ec7b282e
-
SHA512
e3bcec194003e073a62a37742fb490919ca51cf5e27d4109bc6ed5aa1e1057b22e25a8946d5d7e9376f2d3e9fad32945dcfb42294722b4e76f1c582d4b1526b3
-
SSDEEP
192:uAN+hj5jc27EqpnAz1v75SlMUGrm+3H+ED/wGXSjWZMFeOdm/580j7fbtGlmP3Ke:uAYfc2NG1v7sleJeEDRXSjW+duJM2V
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 8 msedge.exe 8 msedge.exe 5092 msedge.exe 5092 msedge.exe 4988 identity_helper.exe 4988 identity_helper.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5092 wrote to memory of 2640 5092 msedge.exe 83 PID 5092 wrote to memory of 2640 5092 msedge.exe 83 PID 5092 wrote to memory of 3640 5092 msedge.exe 85 PID 5092 wrote to memory of 3640 5092 msedge.exe 85 PID 5092 wrote to memory of 3640 5092 msedge.exe 85 PID 5092 wrote to memory of 3640 5092 msedge.exe 85 PID 5092 wrote to memory of 3640 5092 msedge.exe 85 PID 5092 wrote to memory of 3640 5092 msedge.exe 85 PID 5092 wrote to memory of 3640 5092 msedge.exe 85 PID 5092 wrote to memory of 3640 5092 msedge.exe 85 PID 5092 wrote to memory of 3640 5092 msedge.exe 85 PID 5092 wrote to memory of 3640 5092 msedge.exe 85 PID 5092 wrote to memory of 3640 5092 msedge.exe 85 PID 5092 wrote to memory of 3640 5092 msedge.exe 85 PID 5092 wrote to memory of 3640 5092 msedge.exe 85 PID 5092 wrote to memory of 3640 5092 msedge.exe 85 PID 5092 wrote to memory of 3640 5092 msedge.exe 85 PID 5092 wrote to memory of 3640 5092 msedge.exe 85 PID 5092 wrote to memory of 3640 5092 msedge.exe 85 PID 5092 wrote to memory of 3640 5092 msedge.exe 85 PID 5092 wrote to memory of 3640 5092 msedge.exe 85 PID 5092 wrote to memory of 3640 5092 msedge.exe 85 PID 5092 wrote to memory of 3640 5092 msedge.exe 85 PID 5092 wrote to memory of 3640 5092 msedge.exe 85 PID 5092 wrote to memory of 3640 5092 msedge.exe 85 PID 5092 wrote to memory of 3640 5092 msedge.exe 85 PID 5092 wrote to memory of 3640 5092 msedge.exe 85 PID 5092 wrote to memory of 3640 5092 msedge.exe 85 PID 5092 wrote to memory of 3640 5092 msedge.exe 85 PID 5092 wrote to memory of 3640 5092 msedge.exe 85 PID 5092 wrote to memory of 3640 5092 msedge.exe 85 PID 5092 wrote to memory of 3640 5092 msedge.exe 85 PID 5092 wrote to memory of 3640 5092 msedge.exe 85 PID 5092 wrote to memory of 3640 5092 msedge.exe 85 PID 5092 wrote to memory of 3640 5092 msedge.exe 85 PID 5092 wrote to memory of 3640 5092 msedge.exe 85 PID 5092 wrote to memory of 3640 5092 msedge.exe 85 PID 5092 wrote to memory of 3640 5092 msedge.exe 85 PID 5092 wrote to memory of 3640 5092 msedge.exe 85 PID 5092 wrote to memory of 3640 5092 msedge.exe 85 PID 5092 wrote to memory of 3640 5092 msedge.exe 85 PID 5092 wrote to memory of 3640 5092 msedge.exe 85 PID 5092 wrote to memory of 8 5092 msedge.exe 86 PID 5092 wrote to memory of 8 5092 msedge.exe 86 PID 5092 wrote to memory of 4840 5092 msedge.exe 87 PID 5092 wrote to memory of 4840 5092 msedge.exe 87 PID 5092 wrote to memory of 4840 5092 msedge.exe 87 PID 5092 wrote to memory of 4840 5092 msedge.exe 87 PID 5092 wrote to memory of 4840 5092 msedge.exe 87 PID 5092 wrote to memory of 4840 5092 msedge.exe 87 PID 5092 wrote to memory of 4840 5092 msedge.exe 87 PID 5092 wrote to memory of 4840 5092 msedge.exe 87 PID 5092 wrote to memory of 4840 5092 msedge.exe 87 PID 5092 wrote to memory of 4840 5092 msedge.exe 87 PID 5092 wrote to memory of 4840 5092 msedge.exe 87 PID 5092 wrote to memory of 4840 5092 msedge.exe 87 PID 5092 wrote to memory of 4840 5092 msedge.exe 87 PID 5092 wrote to memory of 4840 5092 msedge.exe 87 PID 5092 wrote to memory of 4840 5092 msedge.exe 87 PID 5092 wrote to memory of 4840 5092 msedge.exe 87 PID 5092 wrote to memory of 4840 5092 msedge.exe 87 PID 5092 wrote to memory of 4840 5092 msedge.exe 87 PID 5092 wrote to memory of 4840 5092 msedge.exe 87 PID 5092 wrote to memory of 4840 5092 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\426d4fee837e78f9626da434a2c67bed_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5092 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xb4,0x108,0x7ffa672746f8,0x7ffa67274708,0x7ffa672747182⤵PID:2640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,7048238362608331217,15250238019748947102,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:22⤵PID:3640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,7048238362608331217,15250238019748947102,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2232 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:8
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,7048238362608331217,15250238019748947102,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2720 /prefetch:82⤵PID:4840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,7048238362608331217,15250238019748947102,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:1516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,7048238362608331217,15250238019748947102,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:1248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,7048238362608331217,15250238019748947102,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4668 /prefetch:12⤵PID:2228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,7048238362608331217,15250238019748947102,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5244 /prefetch:12⤵PID:1912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,7048238362608331217,15250238019748947102,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5372 /prefetch:12⤵PID:4736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,7048238362608331217,15250238019748947102,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5744 /prefetch:82⤵PID:4332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,7048238362608331217,15250238019748947102,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5744 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,7048238362608331217,15250238019748947102,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5808 /prefetch:12⤵PID:1008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,7048238362608331217,15250238019748947102,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5820 /prefetch:12⤵PID:5020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,7048238362608331217,15250238019748947102,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5468 /prefetch:12⤵PID:2668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,7048238362608331217,15250238019748947102,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4924 /prefetch:12⤵PID:1436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,7048238362608331217,15250238019748947102,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2608 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4400
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3868
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2152
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52f842025e22e522658c640cfc7edc529
SHA14c2b24b02709acdd159f1b9bbeb396e52af27033
SHA2561191573f2a7c12f0b9b8460e06dc36ca5386305eb8c883ebbbc8eb15f4d8e23e
SHA5126e4393fd43984722229020ef662fc5981f253de31f13f30fadd6660bbc9ededcbfd163f132f6adaf42d435873322a5d0d3eea60060cf0e7f2e256262632c5d05
-
Filesize
152B
MD554aadd2d8ec66e446f1edb466b99ba8d
SHA1a94f02b035dc918d8d9a46e6886413f15be5bff0
SHA2561971045943002ef01930add9ba1a96a92ddc10d6c581ce29e33c38c2120b130e
SHA5127e077f903463da60b5587aed4f5352060df400ebda713b602b88c15cb2f91076531ea07546a9352df772656065e0bf27bd285905a60f036a5c5951076d35e994
-
Filesize
211KB
MD5151fb811968eaf8efb840908b89dc9d4
SHA17ec811009fd9b0e6d92d12d78b002275f2f1bee1
SHA256043fd8558e4a5a60aaccd2f0377f77a544e3e375242e9d7200dc6e51f94103ed
SHA51283aface0ab01da52fd077f747c9d5916e3c06b0ea5c551d7d316707ec3e8f3f986ce1c82e6f2136e48c6511a83cb0ac67ff6dc8f0e440ac72fc6854086a87674
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize312B
MD596ce658acc64ebcfbd78388c6ef478a2
SHA19b17dc82180b61c1e3fb7c8239890c48205d7412
SHA256364eeead21058976a2bb7764a2ed5e622c4beb210e4f731a708fdadc1ce6e08c
SHA5124d1d31aaa6dd6cef4fd5e4d1cc24349a960f8b8d3331200ed49fac50b2491d7bd1f52b030e2df12db544df3aabb11b6c0673ea31b873796a3de67f47c51fe24f
-
Filesize
1KB
MD5ac98b4300cd075203421773b37598f43
SHA1375e8cdcf5eacb1f304e235b431944bcea358046
SHA256b7c5931b61f0696f295ae55c025c2a14e43a46f6a79415ae96da091931be942d
SHA512748f667ced79d9d3aeba4edc030bd896123ab75019cb9cbb94399f76a8db30280812bd019ee73a3324d895ef6820150737fca5ac63a91d086fb1f782da6ed7fe
-
Filesize
6KB
MD5d197f1433c81bcd5daf53c78b071d8e6
SHA16886dc5c6d69d297c54119479dad9f6904b737f6
SHA256e848c94b60c329ce787f5502d1bb31da91f6953bf0f3b7dbb9cf884fabdbbc6d
SHA51210c891aa2b2f063c8019f94b58b7832cc63d5617a306c604ede28d33cd3c70b920fa700b17ea14207c846d10073f7132aab53efd63a906c5248de0fe4a5e099a
-
Filesize
7KB
MD5e8f1d71259d0081e2440946988437423
SHA1ebc7cea6cebcc6bf8ce5e1ab72a259d4c3619dd4
SHA2564c037c9e6b8eb53a48294144f939a579127e558cc8d19cb80f9c306c800b0c30
SHA512c42900ec29d1af94dcfc323620692375750f3192e500365f5a4883cbdc2765d1063d00af847f0de36bd1205e054d02091db87b412a42f048bb02f3c6bed042a7
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD527b614e43b4eb33fe8f66966ddfcc6ce
SHA196ec5d167a5ee59fe42994685390a7f7a04f8716
SHA256374da96a37f92d30c8dfabd606b6ae12b07749692354d6a71ffcdbd72122ca88
SHA5127cf9766bd6fce8ed7ef158172be227e7e40a009d78f42e535c25fe1373cb5ea305eb8e8250252cd0ebc0acd5299661609de1770304a2ce6235d668408a1a809b