Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
14-07-2024 23:58
Static task
static1
Behavioral task
behavioral1
Sample
4757a7ae580824ff806a2170b31c8a6a_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
4757a7ae580824ff806a2170b31c8a6a_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
4757a7ae580824ff806a2170b31c8a6a_JaffaCakes118.html
-
Size
57KB
-
MD5
4757a7ae580824ff806a2170b31c8a6a
-
SHA1
a1028b8a736b4ddea098b214d8ee99c78b92ee9d
-
SHA256
46abadd7308bebe991236daebf825cf34d72b549394263bfe3fe5322d6e98d01
-
SHA512
96489624d4be890fed59620253b842b2fd181382fbf749a06cb06098a2825b87fec76a68d5228c6948e9a66385b8b1e21a9ed718304c979c94b06966924a848a
-
SSDEEP
1536:ijEQvK8OPHdsA1o2vgyHJv0owbd6zKD6CDK2RVroTNwpDK2RVy:ijnOPHdsR2vgyHJutDK2RVroTNwpDK2m
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4664 msedge.exe 4664 msedge.exe 1376 msedge.exe 1376 msedge.exe 5108 identity_helper.exe 5108 identity_helper.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1376 wrote to memory of 748 1376 msedge.exe 85 PID 1376 wrote to memory of 748 1376 msedge.exe 85 PID 1376 wrote to memory of 3852 1376 msedge.exe 86 PID 1376 wrote to memory of 3852 1376 msedge.exe 86 PID 1376 wrote to memory of 3852 1376 msedge.exe 86 PID 1376 wrote to memory of 3852 1376 msedge.exe 86 PID 1376 wrote to memory of 3852 1376 msedge.exe 86 PID 1376 wrote to memory of 3852 1376 msedge.exe 86 PID 1376 wrote to memory of 3852 1376 msedge.exe 86 PID 1376 wrote to memory of 3852 1376 msedge.exe 86 PID 1376 wrote to memory of 3852 1376 msedge.exe 86 PID 1376 wrote to memory of 3852 1376 msedge.exe 86 PID 1376 wrote to memory of 3852 1376 msedge.exe 86 PID 1376 wrote to memory of 3852 1376 msedge.exe 86 PID 1376 wrote to memory of 3852 1376 msedge.exe 86 PID 1376 wrote to memory of 3852 1376 msedge.exe 86 PID 1376 wrote to memory of 3852 1376 msedge.exe 86 PID 1376 wrote to memory of 3852 1376 msedge.exe 86 PID 1376 wrote to memory of 3852 1376 msedge.exe 86 PID 1376 wrote to memory of 3852 1376 msedge.exe 86 PID 1376 wrote to memory of 3852 1376 msedge.exe 86 PID 1376 wrote to memory of 3852 1376 msedge.exe 86 PID 1376 wrote to memory of 3852 1376 msedge.exe 86 PID 1376 wrote to memory of 3852 1376 msedge.exe 86 PID 1376 wrote to memory of 3852 1376 msedge.exe 86 PID 1376 wrote to memory of 3852 1376 msedge.exe 86 PID 1376 wrote to memory of 3852 1376 msedge.exe 86 PID 1376 wrote to memory of 3852 1376 msedge.exe 86 PID 1376 wrote to memory of 3852 1376 msedge.exe 86 PID 1376 wrote to memory of 3852 1376 msedge.exe 86 PID 1376 wrote to memory of 3852 1376 msedge.exe 86 PID 1376 wrote to memory of 3852 1376 msedge.exe 86 PID 1376 wrote to memory of 3852 1376 msedge.exe 86 PID 1376 wrote to memory of 3852 1376 msedge.exe 86 PID 1376 wrote to memory of 3852 1376 msedge.exe 86 PID 1376 wrote to memory of 3852 1376 msedge.exe 86 PID 1376 wrote to memory of 3852 1376 msedge.exe 86 PID 1376 wrote to memory of 3852 1376 msedge.exe 86 PID 1376 wrote to memory of 3852 1376 msedge.exe 86 PID 1376 wrote to memory of 3852 1376 msedge.exe 86 PID 1376 wrote to memory of 3852 1376 msedge.exe 86 PID 1376 wrote to memory of 3852 1376 msedge.exe 86 PID 1376 wrote to memory of 4664 1376 msedge.exe 87 PID 1376 wrote to memory of 4664 1376 msedge.exe 87 PID 1376 wrote to memory of 1872 1376 msedge.exe 88 PID 1376 wrote to memory of 1872 1376 msedge.exe 88 PID 1376 wrote to memory of 1872 1376 msedge.exe 88 PID 1376 wrote to memory of 1872 1376 msedge.exe 88 PID 1376 wrote to memory of 1872 1376 msedge.exe 88 PID 1376 wrote to memory of 1872 1376 msedge.exe 88 PID 1376 wrote to memory of 1872 1376 msedge.exe 88 PID 1376 wrote to memory of 1872 1376 msedge.exe 88 PID 1376 wrote to memory of 1872 1376 msedge.exe 88 PID 1376 wrote to memory of 1872 1376 msedge.exe 88 PID 1376 wrote to memory of 1872 1376 msedge.exe 88 PID 1376 wrote to memory of 1872 1376 msedge.exe 88 PID 1376 wrote to memory of 1872 1376 msedge.exe 88 PID 1376 wrote to memory of 1872 1376 msedge.exe 88 PID 1376 wrote to memory of 1872 1376 msedge.exe 88 PID 1376 wrote to memory of 1872 1376 msedge.exe 88 PID 1376 wrote to memory of 1872 1376 msedge.exe 88 PID 1376 wrote to memory of 1872 1376 msedge.exe 88 PID 1376 wrote to memory of 1872 1376 msedge.exe 88 PID 1376 wrote to memory of 1872 1376 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\4757a7ae580824ff806a2170b31c8a6a_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1376 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9e6a246f8,0x7ff9e6a24708,0x7ff9e6a247182⤵PID:748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1480,17081570201227715380,10964861738702086421,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:22⤵PID:3852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1480,17081570201227715380,10964861738702086421,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2488 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1480,17081570201227715380,10964861738702086421,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2760 /prefetch:82⤵PID:1872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1480,17081570201227715380,10964861738702086421,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:4780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1480,17081570201227715380,10964861738702086421,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:3560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1480,17081570201227715380,10964861738702086421,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4668 /prefetch:12⤵PID:1656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1480,17081570201227715380,10964861738702086421,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5108 /prefetch:12⤵PID:2492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1480,17081570201227715380,10964861738702086421,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:3892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1480,17081570201227715380,10964861738702086421,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:4180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1480,17081570201227715380,10964861738702086421,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5896 /prefetch:82⤵PID:624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1480,17081570201227715380,10964861738702086421,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5896 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1480,17081570201227715380,10964861738702086421,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5960 /prefetch:12⤵PID:3456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1480,17081570201227715380,10964861738702086421,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5972 /prefetch:12⤵PID:3504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1480,17081570201227715380,10964861738702086421,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4928 /prefetch:12⤵PID:1500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1480,17081570201227715380,10964861738702086421,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6008 /prefetch:12⤵PID:4724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1480,17081570201227715380,10964861738702086421,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2076 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1296
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1648
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2764
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD58dc45b70cbe29a357e2c376a0c2b751b
SHA125d623cea817f86b8427db53b82340410c1489b2
SHA256511cfb6bedbad2530b5cc5538b6ec2184fc4f85947ba4c8166d0bb9f5fe2703a
SHA5123ce0f52675feb16d6e62aae1c50767da178b93bdae28bacf6df3a2f72b8cc75b09c5092d9065e0872e5d09fd9ffe0c6931d6ae1943ddb1927b85d60659ef866e
-
Filesize
152B
MD51790c766c15938258a4f9b984cf68312
SHA115c9827d278d28b23a8ea0389d42fa87e404359f
SHA2562e3978bb58c701f3c6b05de9349b7334a194591bec7bcf73f53527dc0991dc63
SHA5122682d9c60c9d67608cf140b6ca4958d890bcbc3c8a8e95fcc639d2a11bb0ec348ca55ae99a5840e1f50e5c5bcf3e27c97fc877582d869d98cc4ea3448315aafb
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize768B
MD58c5b06a8c2c8de026929929cf0a9eb26
SHA14dfb1484a672c830bfee7374288c55f3743c6b12
SHA2566f2a150790ef5a5d0730dbe8340e76fb1c8e1a4d7c8a68d6c65cbd8e4a94080f
SHA51248aa7ce8794dea365e6d13ebe15d16599f64e0f9223941ab8143514df3e48b8adc6cdaf8a00d42d239d2abdcb315439fe1045f67b5405e056ccc01f62661eb11
-
Filesize
1KB
MD53af025626e0ff8e8cf03c35d9f6f1cda
SHA1f1dca7eee109762103d4dbb9a416472eb2c9bcad
SHA256d729e1653b28249a730c8115333175550f550950e8abd4b6b381a0d4c2687a0f
SHA512303b75e563080efbc86e45decfc9d76e87870dacbb45ebb7cab7f73b8d9b0476843a2ec7cefcb12b43dc77ee2fedc444e9ba0b6cb64d96950963563d022d1bea
-
Filesize
6KB
MD550f02788930f71cb8f33e298f09dcb5e
SHA1f9ca7c0371316cc501e3d67c123a8dcc0a95805b
SHA2562d188fbdfefd7333741c3c9bea4759688d6e8b58817698d9d0e7e2355359fc64
SHA5128c0fabddeb6e97971d93c90802c1ac3f9b5211f8827ec73cd539788bac90b59fa19e9c98d8441a644b83b1ee457b2825a94dcff8b9c1cc47eceb3cad2752efa9
-
Filesize
6KB
MD55f93c05d7d1bea5d012e8de80261f031
SHA13beba3a1af75d51017d87680042f31a7f636459d
SHA2568d784bd92bd315e37ddf7e46f810e11152fe0086dcf2b81b5fc0ede9eb2b8174
SHA512cb72a2eebb7e0574cf4f7907bc8aa850f3b2c6a45a1c528e8b8779d5d6d2c853903e68f58ec01cf39029b6f4489d7ed5016c571a7af9f26402f4abef3981670d
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5aeaa69714fdf3883e02ee8f6a1051415
SHA1eca9d9181e7a885565147b896d7ba3a1674c7b7b
SHA2561b108f3e20da99f49b4ca9b89abdee92b9737fcb56b1c3f2b465a4398f72e836
SHA5126417beb2e3723e03f3c6a6fcac5a5bae08e47d2ee792264b4dba7a7d97ad7dd2116eb6f23a9ea0bf0c1b702880e30ccdc2e79ad739232864d1b237defd74693a