Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
14/07/2024, 04:55
Static task
static1
Behavioral task
behavioral1
Sample
446345acfcd7fdf94b1c46eeaa2b3df3_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
446345acfcd7fdf94b1c46eeaa2b3df3_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
446345acfcd7fdf94b1c46eeaa2b3df3_JaffaCakes118.html
-
Size
13KB
-
MD5
446345acfcd7fdf94b1c46eeaa2b3df3
-
SHA1
1bc27224ad193c4d3d07100bae4e487352a15e1f
-
SHA256
151a9c64776c70ada6ee2bec9b5a3795a31b3acdd8568a7423ecf40eba6e658a
-
SHA512
d1b83b5ed8d396309e83e48110805dca680b516b90494725229aed00bbb1a87d1e4a337ecd58a8971b019149630aa470d6311cb9c47d464033766bffc8a379ab
-
SSDEEP
384:m7acJawIQ6OPRnZkBiAHhRstveDnvTZcJ2:hcJaJQdOAAH3OQvTT
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 100 msedge.exe 100 msedge.exe 4792 msedge.exe 4792 msedge.exe 3412 identity_helper.exe 3412 identity_helper.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4792 wrote to memory of 1176 4792 msedge.exe 83 PID 4792 wrote to memory of 1176 4792 msedge.exe 83 PID 4792 wrote to memory of 1768 4792 msedge.exe 84 PID 4792 wrote to memory of 1768 4792 msedge.exe 84 PID 4792 wrote to memory of 1768 4792 msedge.exe 84 PID 4792 wrote to memory of 1768 4792 msedge.exe 84 PID 4792 wrote to memory of 1768 4792 msedge.exe 84 PID 4792 wrote to memory of 1768 4792 msedge.exe 84 PID 4792 wrote to memory of 1768 4792 msedge.exe 84 PID 4792 wrote to memory of 1768 4792 msedge.exe 84 PID 4792 wrote to memory of 1768 4792 msedge.exe 84 PID 4792 wrote to memory of 1768 4792 msedge.exe 84 PID 4792 wrote to memory of 1768 4792 msedge.exe 84 PID 4792 wrote to memory of 1768 4792 msedge.exe 84 PID 4792 wrote to memory of 1768 4792 msedge.exe 84 PID 4792 wrote to memory of 1768 4792 msedge.exe 84 PID 4792 wrote to memory of 1768 4792 msedge.exe 84 PID 4792 wrote to memory of 1768 4792 msedge.exe 84 PID 4792 wrote to memory of 1768 4792 msedge.exe 84 PID 4792 wrote to memory of 1768 4792 msedge.exe 84 PID 4792 wrote to memory of 1768 4792 msedge.exe 84 PID 4792 wrote to memory of 1768 4792 msedge.exe 84 PID 4792 wrote to memory of 1768 4792 msedge.exe 84 PID 4792 wrote to memory of 1768 4792 msedge.exe 84 PID 4792 wrote to memory of 1768 4792 msedge.exe 84 PID 4792 wrote to memory of 1768 4792 msedge.exe 84 PID 4792 wrote to memory of 1768 4792 msedge.exe 84 PID 4792 wrote to memory of 1768 4792 msedge.exe 84 PID 4792 wrote to memory of 1768 4792 msedge.exe 84 PID 4792 wrote to memory of 1768 4792 msedge.exe 84 PID 4792 wrote to memory of 1768 4792 msedge.exe 84 PID 4792 wrote to memory of 1768 4792 msedge.exe 84 PID 4792 wrote to memory of 1768 4792 msedge.exe 84 PID 4792 wrote to memory of 1768 4792 msedge.exe 84 PID 4792 wrote to memory of 1768 4792 msedge.exe 84 PID 4792 wrote to memory of 1768 4792 msedge.exe 84 PID 4792 wrote to memory of 1768 4792 msedge.exe 84 PID 4792 wrote to memory of 1768 4792 msedge.exe 84 PID 4792 wrote to memory of 1768 4792 msedge.exe 84 PID 4792 wrote to memory of 1768 4792 msedge.exe 84 PID 4792 wrote to memory of 1768 4792 msedge.exe 84 PID 4792 wrote to memory of 1768 4792 msedge.exe 84 PID 4792 wrote to memory of 100 4792 msedge.exe 85 PID 4792 wrote to memory of 100 4792 msedge.exe 85 PID 4792 wrote to memory of 4184 4792 msedge.exe 86 PID 4792 wrote to memory of 4184 4792 msedge.exe 86 PID 4792 wrote to memory of 4184 4792 msedge.exe 86 PID 4792 wrote to memory of 4184 4792 msedge.exe 86 PID 4792 wrote to memory of 4184 4792 msedge.exe 86 PID 4792 wrote to memory of 4184 4792 msedge.exe 86 PID 4792 wrote to memory of 4184 4792 msedge.exe 86 PID 4792 wrote to memory of 4184 4792 msedge.exe 86 PID 4792 wrote to memory of 4184 4792 msedge.exe 86 PID 4792 wrote to memory of 4184 4792 msedge.exe 86 PID 4792 wrote to memory of 4184 4792 msedge.exe 86 PID 4792 wrote to memory of 4184 4792 msedge.exe 86 PID 4792 wrote to memory of 4184 4792 msedge.exe 86 PID 4792 wrote to memory of 4184 4792 msedge.exe 86 PID 4792 wrote to memory of 4184 4792 msedge.exe 86 PID 4792 wrote to memory of 4184 4792 msedge.exe 86 PID 4792 wrote to memory of 4184 4792 msedge.exe 86 PID 4792 wrote to memory of 4184 4792 msedge.exe 86 PID 4792 wrote to memory of 4184 4792 msedge.exe 86 PID 4792 wrote to memory of 4184 4792 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\446345acfcd7fdf94b1c46eeaa2b3df3_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4792 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff6b9446f8,0x7fff6b944708,0x7fff6b9447182⤵PID:1176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,1396399745270469056,16081510174835954958,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 /prefetch:22⤵PID:1768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2132,1396399745270469056,16081510174835954958,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2192 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2132,1396399745270469056,16081510174835954958,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2736 /prefetch:82⤵PID:4184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,1396399745270469056,16081510174835954958,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3160 /prefetch:12⤵PID:3504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,1396399745270469056,16081510174835954958,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3168 /prefetch:12⤵PID:3628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,1396399745270469056,16081510174835954958,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4136 /prefetch:12⤵PID:2440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,1396399745270469056,16081510174835954958,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5568 /prefetch:12⤵PID:1552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,1396399745270469056,16081510174835954958,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5412 /prefetch:12⤵PID:2092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,1396399745270469056,16081510174835954958,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6192 /prefetch:82⤵PID:3332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,1396399745270469056,16081510174835954958,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6192 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,1396399745270469056,16081510174835954958,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6112 /prefetch:12⤵PID:1676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,1396399745270469056,16081510174835954958,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6036 /prefetch:12⤵PID:2144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,1396399745270469056,16081510174835954958,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5132 /prefetch:12⤵PID:3004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,1396399745270469056,16081510174835954958,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4900 /prefetch:12⤵PID:2000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,1396399745270469056,16081510174835954958,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4980 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1448
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4884
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3332
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD58dc45b70cbe29a357e2c376a0c2b751b
SHA125d623cea817f86b8427db53b82340410c1489b2
SHA256511cfb6bedbad2530b5cc5538b6ec2184fc4f85947ba4c8166d0bb9f5fe2703a
SHA5123ce0f52675feb16d6e62aae1c50767da178b93bdae28bacf6df3a2f72b8cc75b09c5092d9065e0872e5d09fd9ffe0c6931d6ae1943ddb1927b85d60659ef866e
-
Filesize
152B
MD51790c766c15938258a4f9b984cf68312
SHA115c9827d278d28b23a8ea0389d42fa87e404359f
SHA2562e3978bb58c701f3c6b05de9349b7334a194591bec7bcf73f53527dc0991dc63
SHA5122682d9c60c9d67608cf140b6ca4958d890bcbc3c8a8e95fcc639d2a11bb0ec348ca55ae99a5840e1f50e5c5bcf3e27c97fc877582d869d98cc4ea3448315aafb
-
Filesize
211KB
MD5151fb811968eaf8efb840908b89dc9d4
SHA17ec811009fd9b0e6d92d12d78b002275f2f1bee1
SHA256043fd8558e4a5a60aaccd2f0377f77a544e3e375242e9d7200dc6e51f94103ed
SHA51283aface0ab01da52fd077f747c9d5916e3c06b0ea5c551d7d316707ec3e8f3f986ce1c82e6f2136e48c6511a83cb0ac67ff6dc8f0e440ac72fc6854086a87674
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize312B
MD58dd3db7fe43b889588aac5666cefea57
SHA108cade1487af2aed766899c3d963dc3d08c0455a
SHA256b0228f7d3aaebb4a2679ce28eccc232e3c5319b3f1f34d32a3a98fede25eceab
SHA51254402dbc3123e8d8809faf7132c92cd8ca3abaae43b5fb590bd39cd3440309ceca0399625e28dce52899e6587b42269c7bd567db6f8a44bdb60c2c1424759b54
-
Filesize
1KB
MD526a459e07eb683e3251ed3bc46b4635e
SHA12bd2d00525fa2baebe0d90085e3212c360cc0603
SHA256f481a70419a6bd29b981dc825b35c06b65663e4ef27ddbf03892df7ed03c2448
SHA512bb66709262afead9bf4fe0bdd4ad3eed4f504aa4bb2ddf464e5a5413e43cf53c12a0c1fcc3c7e08d453f02a86eed4a9a7ad844295d61c9a2d97848ddf6d16ad0
-
Filesize
6KB
MD55c061c81b0a13ec8c72d312ba812c584
SHA143db7224d1dc78402b2731d360e3a9051475f7d2
SHA2565140e4e8a3d9dcce4dd7694d5ccea1aaca27a4483d6a636f986c8839c2a99844
SHA512c9a9220880e75a2e8c8e22488783ae3aa799c036715629520ef5cfc24801a17468de43c965fae5cddf6526d707235ab397bd96acd7678a7d24f488538d63e34d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\a09eef77-f14f-4a22-b099-68908bd1cb50.tmp
Filesize6KB
MD516c03304baeccf65e75ba5578bb85f9e
SHA1848af6a9c69f2e2e0c7b81b6251b7ce552193767
SHA2565f8b1fb762c8de4c3373899557c5ce1cc0115a2ad913369bce27783fff3a6d1e
SHA512745cb5ce0699b953571f7ffff5da02828d13f293773b468bda71c19f0da262a69b07e3c18a53a4276ae7adce3c8043e4997d5a9835fd92c476f6ee7ce583c8b6
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5f1db00757edb9d47cfa7a2d8c0173045
SHA1ec553ebdc371baec103c130bd83c663bc5c55f92
SHA25629b67ea98462e19ed7fc2291bf2b1eb77ac84d92bc4f91b6b1b0d26629a2ef2c
SHA5127b139b623cfe60b6fdf512161e4e75ce1189b2fcb7c782ca079585d1f4124d4915836a36e3d6fa6ca7f3b0eacd6e1750b96818c829f35a4985f7a56bde2ca773