Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
13/07/2024, 18:00
Static task
static1
Behavioral task
behavioral1
Sample
42c060667ce29a61c4ee3f92d12ef23d_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
42c060667ce29a61c4ee3f92d12ef23d_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
42c060667ce29a61c4ee3f92d12ef23d_JaffaCakes118.html
-
Size
10KB
-
MD5
42c060667ce29a61c4ee3f92d12ef23d
-
SHA1
4ddcf7e9d4981af1526c4b68099cc8a3d7788d21
-
SHA256
47a4bf7cd4ee7abca9de4c43fcb1c73ea72ed95b6b3823f7c7de440fac3b5204
-
SHA512
dc4c1c1d08a61af185eae01d6f142fd910c550e537e788efcfd3383987b98a4290c1a317123b8d2f383ac0c4bf48014dc4738071a5bd502f8ad3f80f87cc8647
-
SSDEEP
192:ER11hB5jcGc7KLGcFC5iu5nN2gmKswv9JyuDOKVsYr/Bh/CtdwVF/U8zHE7F/JU2:UbJcGmVJ2AmUJ2
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4500 msedge.exe 4500 msedge.exe 2276 msedge.exe 2276 msedge.exe 2332 identity_helper.exe 2332 identity_helper.exe 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe 4664 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2276 wrote to memory of 3288 2276 msedge.exe 83 PID 2276 wrote to memory of 3288 2276 msedge.exe 83 PID 2276 wrote to memory of 1312 2276 msedge.exe 84 PID 2276 wrote to memory of 1312 2276 msedge.exe 84 PID 2276 wrote to memory of 1312 2276 msedge.exe 84 PID 2276 wrote to memory of 1312 2276 msedge.exe 84 PID 2276 wrote to memory of 1312 2276 msedge.exe 84 PID 2276 wrote to memory of 1312 2276 msedge.exe 84 PID 2276 wrote to memory of 1312 2276 msedge.exe 84 PID 2276 wrote to memory of 1312 2276 msedge.exe 84 PID 2276 wrote to memory of 1312 2276 msedge.exe 84 PID 2276 wrote to memory of 1312 2276 msedge.exe 84 PID 2276 wrote to memory of 1312 2276 msedge.exe 84 PID 2276 wrote to memory of 1312 2276 msedge.exe 84 PID 2276 wrote to memory of 1312 2276 msedge.exe 84 PID 2276 wrote to memory of 1312 2276 msedge.exe 84 PID 2276 wrote to memory of 1312 2276 msedge.exe 84 PID 2276 wrote to memory of 1312 2276 msedge.exe 84 PID 2276 wrote to memory of 1312 2276 msedge.exe 84 PID 2276 wrote to memory of 1312 2276 msedge.exe 84 PID 2276 wrote to memory of 1312 2276 msedge.exe 84 PID 2276 wrote to memory of 1312 2276 msedge.exe 84 PID 2276 wrote to memory of 1312 2276 msedge.exe 84 PID 2276 wrote to memory of 1312 2276 msedge.exe 84 PID 2276 wrote to memory of 1312 2276 msedge.exe 84 PID 2276 wrote to memory of 1312 2276 msedge.exe 84 PID 2276 wrote to memory of 1312 2276 msedge.exe 84 PID 2276 wrote to memory of 1312 2276 msedge.exe 84 PID 2276 wrote to memory of 1312 2276 msedge.exe 84 PID 2276 wrote to memory of 1312 2276 msedge.exe 84 PID 2276 wrote to memory of 1312 2276 msedge.exe 84 PID 2276 wrote to memory of 1312 2276 msedge.exe 84 PID 2276 wrote to memory of 1312 2276 msedge.exe 84 PID 2276 wrote to memory of 1312 2276 msedge.exe 84 PID 2276 wrote to memory of 1312 2276 msedge.exe 84 PID 2276 wrote to memory of 1312 2276 msedge.exe 84 PID 2276 wrote to memory of 1312 2276 msedge.exe 84 PID 2276 wrote to memory of 1312 2276 msedge.exe 84 PID 2276 wrote to memory of 1312 2276 msedge.exe 84 PID 2276 wrote to memory of 1312 2276 msedge.exe 84 PID 2276 wrote to memory of 1312 2276 msedge.exe 84 PID 2276 wrote to memory of 1312 2276 msedge.exe 84 PID 2276 wrote to memory of 4500 2276 msedge.exe 85 PID 2276 wrote to memory of 4500 2276 msedge.exe 85 PID 2276 wrote to memory of 1828 2276 msedge.exe 86 PID 2276 wrote to memory of 1828 2276 msedge.exe 86 PID 2276 wrote to memory of 1828 2276 msedge.exe 86 PID 2276 wrote to memory of 1828 2276 msedge.exe 86 PID 2276 wrote to memory of 1828 2276 msedge.exe 86 PID 2276 wrote to memory of 1828 2276 msedge.exe 86 PID 2276 wrote to memory of 1828 2276 msedge.exe 86 PID 2276 wrote to memory of 1828 2276 msedge.exe 86 PID 2276 wrote to memory of 1828 2276 msedge.exe 86 PID 2276 wrote to memory of 1828 2276 msedge.exe 86 PID 2276 wrote to memory of 1828 2276 msedge.exe 86 PID 2276 wrote to memory of 1828 2276 msedge.exe 86 PID 2276 wrote to memory of 1828 2276 msedge.exe 86 PID 2276 wrote to memory of 1828 2276 msedge.exe 86 PID 2276 wrote to memory of 1828 2276 msedge.exe 86 PID 2276 wrote to memory of 1828 2276 msedge.exe 86 PID 2276 wrote to memory of 1828 2276 msedge.exe 86 PID 2276 wrote to memory of 1828 2276 msedge.exe 86 PID 2276 wrote to memory of 1828 2276 msedge.exe 86 PID 2276 wrote to memory of 1828 2276 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\42c060667ce29a61c4ee3f92d12ef23d_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd24f546f8,0x7ffd24f54708,0x7ffd24f547182⤵PID:3288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,6062724974505121238,2607315532069397445,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2064 /prefetch:22⤵PID:1312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2044,6062724974505121238,2607315532069397445,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2116 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2044,6062724974505121238,2607315532069397445,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2720 /prefetch:82⤵PID:1828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,6062724974505121238,2607315532069397445,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,6062724974505121238,2607315532069397445,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,6062724974505121238,2607315532069397445,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4608 /prefetch:12⤵PID:3580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,6062724974505121238,2607315532069397445,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4844 /prefetch:12⤵PID:2556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,6062724974505121238,2607315532069397445,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5592 /prefetch:12⤵PID:2852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2044,6062724974505121238,2607315532069397445,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6020 /prefetch:82⤵PID:348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2044,6062724974505121238,2607315532069397445,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6020 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,6062724974505121238,2607315532069397445,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6096 /prefetch:12⤵PID:3616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,6062724974505121238,2607315532069397445,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6112 /prefetch:12⤵PID:724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,6062724974505121238,2607315532069397445,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6148 /prefetch:12⤵PID:1376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,6062724974505121238,2607315532069397445,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5600 /prefetch:12⤵PID:4376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,6062724974505121238,2607315532069397445,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2360 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4664
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3348
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2624
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5bafce9e4c53a0cb85310891b6b21791b
SHA15d70027cc137a7cbb38f5801b15fd97b05e89ee2
SHA25671fb546b5d2210a56e90b448ee10120cd92c518c8f79fb960f01b918f89f2b00
SHA512c0e4d3eccc0135ac92051539a18f64b8b8628cfe74e5b019d4f8e1dcbb51a9b49c486a1523885fe6be53da7118c013852e753c26a5490538c1e721fd0188836c
-
Filesize
152B
MD5a499254d6b5d91f97eb7a86e5f8ca573
SHA103dbfebfec8c94a9c06f9b0cd81ebe0a2b8be3d1
SHA256fb87b758c2b98989df851380293ff6786cb9a5cf2b3a384cec70d9f3eb064499
SHA512d7adcc76d0470bcd68d7644de3c8d2b6d61df8485979a4752ceea3df4d85bd1c290f72b3d8d5c8d639d5a10afa48d80e457f76b44dd8107ac97eb80fd98c7b0c
-
Filesize
211KB
MD5151fb811968eaf8efb840908b89dc9d4
SHA17ec811009fd9b0e6d92d12d78b002275f2f1bee1
SHA256043fd8558e4a5a60aaccd2f0377f77a544e3e375242e9d7200dc6e51f94103ed
SHA51283aface0ab01da52fd077f747c9d5916e3c06b0ea5c551d7d316707ec3e8f3f986ce1c82e6f2136e48c6511a83cb0ac67ff6dc8f0e440ac72fc6854086a87674
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize312B
MD51bc6fb2364dba73695ce2abe2ed7f142
SHA1bb418c891be7b8330edb79c2ecc1ba998e54d35d
SHA256f250a1747e3e0f727f50ed60134861fe7c975fe67a4d7fb96312668ba101274e
SHA512a986310623737d177735406ca5e65dad7b30822aa64e99e1f67d9e38701faf049144aef8ce6966fb857c72f6d964139e803676d450379ac7ab3ea6b192b59560
-
Filesize
1KB
MD590d2116798b77db179108ad74f4e9db3
SHA1fd9d8ea8dccea76498589214c55d96f073bfcfed
SHA256ce9d28d66faf7bd6865282f1f24340993c6e3587a201e02a49016829e04088a3
SHA512d240bb9489fc6f49b33ee01a268dc5ffa28ba093ddba107990afec70863e00ac94bb0a038eb698713cfcd87665c9826737363afc8ef6df9e1aa0f74f887e1a33
-
Filesize
6KB
MD5be6d0ff5a8561b92a36941be76a9d32c
SHA197a52225862806f6c4243a21f462888d2bff6bbd
SHA25692e6df6c5a4eefd6b6c55a8a69c19ce93c2c94141fee1bbfa70632ce1db546e9
SHA512a68d04b86ea67bdee89efc5272c36085df70149cdc7efd60b7cccf15eed24bf45688ca84399f8cef9907487e1d9cec6bcb60d4fc8a07c4b7aa32605c09f1f035
-
Filesize
7KB
MD56ab031de60de187db51231fac7ba0ab8
SHA1319b4b701c1d01a6d99b4450f43edff584b80b51
SHA25650dc70162fc94ca15dcee98b61d3a09226c082bb417a088fa0fde024a6017fc2
SHA512c511dd2409d16e0c882e6296a7dde751ade13578ac46dc799b49debd865027a21a078e1bdbbca061de80d63695a68460aff25d4d29076c09328df1ce2fa96b37
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD56c0bed0ba3e1f281e7d195c264d038ac
SHA1c1100528dde2f84b1b71f62916a8feae00c2fa66
SHA256ad4781c2f80f99c609dd66a5884b9de3ec25e0d7f33b98cca9a701cdf1e0a55f
SHA5125b1e05a94ca44770d0b87ad45457e900531c16717a8418a80e0d3465866df480e56a227edefc8663c6f05fbc38d35d76e774ed64ca74d7eea14af3c775288933