Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
14/07/2024, 08:18
Static task
static1
Behavioral task
behavioral1
Sample
45044fc452f2223d3df637643cbf423c_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
45044fc452f2223d3df637643cbf423c_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
45044fc452f2223d3df637643cbf423c_JaffaCakes118.html
-
Size
57KB
-
MD5
45044fc452f2223d3df637643cbf423c
-
SHA1
afc0e70183c7784b58ed8ae587b1d0e029c67dae
-
SHA256
d0fed9432eba734f9090977e68c4d9689d5e275f5c4dce0b225f4e9a1c75457c
-
SHA512
24322e1144ce65e0fd87178ae488970d8867d76b277965051b87299bd45ace9741a8b6ac53e72651c5206943cb2fb114c588dac53dd281f1ab56f130302b932c
-
SSDEEP
1536:gQZBCCOd40IxCReq5rAQBxZRpW/u0JsMlc8YhwmqQt8EOwuGz1PD+R+GwEmfZwYH:gk2W0Ix25rAQBxZRpW/u0JsMlcRhwmq6
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4528 msedge.exe 4528 msedge.exe 4752 msedge.exe 4752 msedge.exe 1804 identity_helper.exe 1804 identity_helper.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe 1988 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4752 wrote to memory of 4544 4752 msedge.exe 83 PID 4752 wrote to memory of 4544 4752 msedge.exe 83 PID 4752 wrote to memory of 4356 4752 msedge.exe 84 PID 4752 wrote to memory of 4356 4752 msedge.exe 84 PID 4752 wrote to memory of 4356 4752 msedge.exe 84 PID 4752 wrote to memory of 4356 4752 msedge.exe 84 PID 4752 wrote to memory of 4356 4752 msedge.exe 84 PID 4752 wrote to memory of 4356 4752 msedge.exe 84 PID 4752 wrote to memory of 4356 4752 msedge.exe 84 PID 4752 wrote to memory of 4356 4752 msedge.exe 84 PID 4752 wrote to memory of 4356 4752 msedge.exe 84 PID 4752 wrote to memory of 4356 4752 msedge.exe 84 PID 4752 wrote to memory of 4356 4752 msedge.exe 84 PID 4752 wrote to memory of 4356 4752 msedge.exe 84 PID 4752 wrote to memory of 4356 4752 msedge.exe 84 PID 4752 wrote to memory of 4356 4752 msedge.exe 84 PID 4752 wrote to memory of 4356 4752 msedge.exe 84 PID 4752 wrote to memory of 4356 4752 msedge.exe 84 PID 4752 wrote to memory of 4356 4752 msedge.exe 84 PID 4752 wrote to memory of 4356 4752 msedge.exe 84 PID 4752 wrote to memory of 4356 4752 msedge.exe 84 PID 4752 wrote to memory of 4356 4752 msedge.exe 84 PID 4752 wrote to memory of 4356 4752 msedge.exe 84 PID 4752 wrote to memory of 4356 4752 msedge.exe 84 PID 4752 wrote to memory of 4356 4752 msedge.exe 84 PID 4752 wrote to memory of 4356 4752 msedge.exe 84 PID 4752 wrote to memory of 4356 4752 msedge.exe 84 PID 4752 wrote to memory of 4356 4752 msedge.exe 84 PID 4752 wrote to memory of 4356 4752 msedge.exe 84 PID 4752 wrote to memory of 4356 4752 msedge.exe 84 PID 4752 wrote to memory of 4356 4752 msedge.exe 84 PID 4752 wrote to memory of 4356 4752 msedge.exe 84 PID 4752 wrote to memory of 4356 4752 msedge.exe 84 PID 4752 wrote to memory of 4356 4752 msedge.exe 84 PID 4752 wrote to memory of 4356 4752 msedge.exe 84 PID 4752 wrote to memory of 4356 4752 msedge.exe 84 PID 4752 wrote to memory of 4356 4752 msedge.exe 84 PID 4752 wrote to memory of 4356 4752 msedge.exe 84 PID 4752 wrote to memory of 4356 4752 msedge.exe 84 PID 4752 wrote to memory of 4356 4752 msedge.exe 84 PID 4752 wrote to memory of 4356 4752 msedge.exe 84 PID 4752 wrote to memory of 4356 4752 msedge.exe 84 PID 4752 wrote to memory of 4528 4752 msedge.exe 85 PID 4752 wrote to memory of 4528 4752 msedge.exe 85 PID 4752 wrote to memory of 4936 4752 msedge.exe 86 PID 4752 wrote to memory of 4936 4752 msedge.exe 86 PID 4752 wrote to memory of 4936 4752 msedge.exe 86 PID 4752 wrote to memory of 4936 4752 msedge.exe 86 PID 4752 wrote to memory of 4936 4752 msedge.exe 86 PID 4752 wrote to memory of 4936 4752 msedge.exe 86 PID 4752 wrote to memory of 4936 4752 msedge.exe 86 PID 4752 wrote to memory of 4936 4752 msedge.exe 86 PID 4752 wrote to memory of 4936 4752 msedge.exe 86 PID 4752 wrote to memory of 4936 4752 msedge.exe 86 PID 4752 wrote to memory of 4936 4752 msedge.exe 86 PID 4752 wrote to memory of 4936 4752 msedge.exe 86 PID 4752 wrote to memory of 4936 4752 msedge.exe 86 PID 4752 wrote to memory of 4936 4752 msedge.exe 86 PID 4752 wrote to memory of 4936 4752 msedge.exe 86 PID 4752 wrote to memory of 4936 4752 msedge.exe 86 PID 4752 wrote to memory of 4936 4752 msedge.exe 86 PID 4752 wrote to memory of 4936 4752 msedge.exe 86 PID 4752 wrote to memory of 4936 4752 msedge.exe 86 PID 4752 wrote to memory of 4936 4752 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\45044fc452f2223d3df637643cbf423c_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4752 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffafcdc46f8,0x7ffafcdc4708,0x7ffafcdc47182⤵PID:4544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,16367732555382498571,8845007554006367292,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:22⤵PID:4356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,16367732555382498571,8845007554006367292,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,16367732555382498571,8845007554006367292,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2648 /prefetch:82⤵PID:4936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,16367732555382498571,8845007554006367292,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,16367732555382498571,8845007554006367292,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,16367732555382498571,8845007554006367292,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4140 /prefetch:12⤵PID:4812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,16367732555382498571,8845007554006367292,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4408 /prefetch:12⤵PID:2868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,16367732555382498571,8845007554006367292,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5548 /prefetch:12⤵PID:452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,16367732555382498571,8845007554006367292,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6224 /prefetch:82⤵PID:3916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,16367732555382498571,8845007554006367292,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6224 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,16367732555382498571,8845007554006367292,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5968 /prefetch:12⤵PID:4600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,16367732555382498571,8845007554006367292,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5948 /prefetch:12⤵PID:1988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,16367732555382498571,8845007554006367292,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5444 /prefetch:12⤵PID:2636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,16367732555382498571,8845007554006367292,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5980 /prefetch:12⤵PID:548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,16367732555382498571,8845007554006367292,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4868 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1988
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4124
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:748
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5bafce9e4c53a0cb85310891b6b21791b
SHA15d70027cc137a7cbb38f5801b15fd97b05e89ee2
SHA25671fb546b5d2210a56e90b448ee10120cd92c518c8f79fb960f01b918f89f2b00
SHA512c0e4d3eccc0135ac92051539a18f64b8b8628cfe74e5b019d4f8e1dcbb51a9b49c486a1523885fe6be53da7118c013852e753c26a5490538c1e721fd0188836c
-
Filesize
152B
MD5a499254d6b5d91f97eb7a86e5f8ca573
SHA103dbfebfec8c94a9c06f9b0cd81ebe0a2b8be3d1
SHA256fb87b758c2b98989df851380293ff6786cb9a5cf2b3a384cec70d9f3eb064499
SHA512d7adcc76d0470bcd68d7644de3c8d2b6d61df8485979a4752ceea3df4d85bd1c290f72b3d8d5c8d639d5a10afa48d80e457f76b44dd8107ac97eb80fd98c7b0c
-
Filesize
211KB
MD5151fb811968eaf8efb840908b89dc9d4
SHA17ec811009fd9b0e6d92d12d78b002275f2f1bee1
SHA256043fd8558e4a5a60aaccd2f0377f77a544e3e375242e9d7200dc6e51f94103ed
SHA51283aface0ab01da52fd077f747c9d5916e3c06b0ea5c551d7d316707ec3e8f3f986ce1c82e6f2136e48c6511a83cb0ac67ff6dc8f0e440ac72fc6854086a87674
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize504B
MD5050d0d8370fe67ee2480ecd6bab64e96
SHA1309fe88103cc57ca0dc94610b5bda6c38d75acc8
SHA256a66794db175e5174cdaef59cb9a80f96b650beda73e6ac525a9e2860aa832183
SHA5120805fb07f1e3bf4b487c34cb06daf91f2e854abfd284d3067a2235e87184c972413642bcdbe4a11b27f13dfeab196bd481aa2401ae52cb3de6d40f89fe6415a6
-
Filesize
1KB
MD50b5ac77db663999c86504be06809eeb5
SHA1868f9232134e04aa7f74d6e4dd8441a9056309b5
SHA25635bed42bed4fb6ee39023ca3d658df3bb2a3f85a0e315d0c50f3176b2df1a344
SHA512d6a67ac3104490c844368ac63a148cfa667f4bc412d0018c2dd7fba330f1ebf6f532a6f82ac0e9efd6c83ca4dbc3ce7ab8b303f9f3706051ba77410b7852dec1
-
Filesize
6KB
MD545903671a9ffd3f4e0bbe4bbea1071d9
SHA1f2a5ef75d9d63b09a2fe4efade639e696854841a
SHA25637c3f0341cbd2bfcbf11e2dd91a7e69cfee4934bfee7335958c19976fdfa8008
SHA5127c07dd48663462bf1a9d58f472353a597d8238fe1319cb299676ea098e108ebe1ea2e2671f1e3990b80451c9e0d6f03f037bda5c0d75adffbc00f4a5ebe21c37
-
Filesize
6KB
MD51b3cfb470b1b9938f5d032b0d6af3e01
SHA18d6ed6133487c1df0b08a27cf6ed3a6254190657
SHA2569ee41ceb016de19a1d810725dee5b75fc3f61c06998f478c32488ce0b7885f3a
SHA5129323522b7e42d30774c9ae36f1c98cd7b99a4682883f967a7bf86f8664b7cabfe422c0f5521e22c5a2664be70fb2d66e4a78e8f74a7f63a65aa656267d7ae23f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD56528b25e3b7ec8cb09bc989231423206
SHA17db7949e730dbc6548281d0b85fd9e318d039c35
SHA256623041926b5a53ff5dc4d30ec083f02a55d381e6b3ed3d00d97172a83bfbdeec
SHA5129ec04705b1b0131a7974ea23c38bbd40fc55372f1b4e0cc44cd2614d5cea0432a67d60f378d8763568c2c54dd8908e71bf748d58ff7283fe3be540d4244a9f01