Analysis
-
max time kernel
145s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
14/07/2024, 14:40
Static task
static1
Behavioral task
behavioral1
Sample
464088e29c84b2cc1b614bc300277e90_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
464088e29c84b2cc1b614bc300277e90_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
464088e29c84b2cc1b614bc300277e90_JaffaCakes118.html
-
Size
56KB
-
MD5
464088e29c84b2cc1b614bc300277e90
-
SHA1
e8c577ec54bdbcfa3b430ac8cd0466e405a3130b
-
SHA256
c89bdca4253517a84ac7dd0cedbd7cd5c011a1af96421dfc4f3a962439e0d192
-
SHA512
8d8842050512b0bd6638c84bb8737dda4f1c818cff00da1408b0f7b1a877352692072ddeab385979df526439dc9c0cadf138cde302638e7429af46c199a09a08
-
SSDEEP
1536:gQZBCCOdT0IxCq3hLfmf4fifZfo0fmfnfufif6fMfWf3fuf8f5fLfbfpf6fKfNf6:gk2R0IxHOwqBA0+fWKiUePG0BDTxSCFS
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2040 msedge.exe 2040 msedge.exe 3672 msedge.exe 3672 msedge.exe 3688 identity_helper.exe 3688 identity_helper.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3672 wrote to memory of 4504 3672 msedge.exe 83 PID 3672 wrote to memory of 4504 3672 msedge.exe 83 PID 3672 wrote to memory of 1596 3672 msedge.exe 84 PID 3672 wrote to memory of 1596 3672 msedge.exe 84 PID 3672 wrote to memory of 1596 3672 msedge.exe 84 PID 3672 wrote to memory of 1596 3672 msedge.exe 84 PID 3672 wrote to memory of 1596 3672 msedge.exe 84 PID 3672 wrote to memory of 1596 3672 msedge.exe 84 PID 3672 wrote to memory of 1596 3672 msedge.exe 84 PID 3672 wrote to memory of 1596 3672 msedge.exe 84 PID 3672 wrote to memory of 1596 3672 msedge.exe 84 PID 3672 wrote to memory of 1596 3672 msedge.exe 84 PID 3672 wrote to memory of 1596 3672 msedge.exe 84 PID 3672 wrote to memory of 1596 3672 msedge.exe 84 PID 3672 wrote to memory of 1596 3672 msedge.exe 84 PID 3672 wrote to memory of 1596 3672 msedge.exe 84 PID 3672 wrote to memory of 1596 3672 msedge.exe 84 PID 3672 wrote to memory of 1596 3672 msedge.exe 84 PID 3672 wrote to memory of 1596 3672 msedge.exe 84 PID 3672 wrote to memory of 1596 3672 msedge.exe 84 PID 3672 wrote to memory of 1596 3672 msedge.exe 84 PID 3672 wrote to memory of 1596 3672 msedge.exe 84 PID 3672 wrote to memory of 1596 3672 msedge.exe 84 PID 3672 wrote to memory of 1596 3672 msedge.exe 84 PID 3672 wrote to memory of 1596 3672 msedge.exe 84 PID 3672 wrote to memory of 1596 3672 msedge.exe 84 PID 3672 wrote to memory of 1596 3672 msedge.exe 84 PID 3672 wrote to memory of 1596 3672 msedge.exe 84 PID 3672 wrote to memory of 1596 3672 msedge.exe 84 PID 3672 wrote to memory of 1596 3672 msedge.exe 84 PID 3672 wrote to memory of 1596 3672 msedge.exe 84 PID 3672 wrote to memory of 1596 3672 msedge.exe 84 PID 3672 wrote to memory of 1596 3672 msedge.exe 84 PID 3672 wrote to memory of 1596 3672 msedge.exe 84 PID 3672 wrote to memory of 1596 3672 msedge.exe 84 PID 3672 wrote to memory of 1596 3672 msedge.exe 84 PID 3672 wrote to memory of 1596 3672 msedge.exe 84 PID 3672 wrote to memory of 1596 3672 msedge.exe 84 PID 3672 wrote to memory of 1596 3672 msedge.exe 84 PID 3672 wrote to memory of 1596 3672 msedge.exe 84 PID 3672 wrote to memory of 1596 3672 msedge.exe 84 PID 3672 wrote to memory of 1596 3672 msedge.exe 84 PID 3672 wrote to memory of 2040 3672 msedge.exe 85 PID 3672 wrote to memory of 2040 3672 msedge.exe 85 PID 3672 wrote to memory of 4660 3672 msedge.exe 86 PID 3672 wrote to memory of 4660 3672 msedge.exe 86 PID 3672 wrote to memory of 4660 3672 msedge.exe 86 PID 3672 wrote to memory of 4660 3672 msedge.exe 86 PID 3672 wrote to memory of 4660 3672 msedge.exe 86 PID 3672 wrote to memory of 4660 3672 msedge.exe 86 PID 3672 wrote to memory of 4660 3672 msedge.exe 86 PID 3672 wrote to memory of 4660 3672 msedge.exe 86 PID 3672 wrote to memory of 4660 3672 msedge.exe 86 PID 3672 wrote to memory of 4660 3672 msedge.exe 86 PID 3672 wrote to memory of 4660 3672 msedge.exe 86 PID 3672 wrote to memory of 4660 3672 msedge.exe 86 PID 3672 wrote to memory of 4660 3672 msedge.exe 86 PID 3672 wrote to memory of 4660 3672 msedge.exe 86 PID 3672 wrote to memory of 4660 3672 msedge.exe 86 PID 3672 wrote to memory of 4660 3672 msedge.exe 86 PID 3672 wrote to memory of 4660 3672 msedge.exe 86 PID 3672 wrote to memory of 4660 3672 msedge.exe 86 PID 3672 wrote to memory of 4660 3672 msedge.exe 86 PID 3672 wrote to memory of 4660 3672 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\464088e29c84b2cc1b614bc300277e90_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3672 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd787e46f8,0x7ffd787e4708,0x7ffd787e47182⤵PID:4504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,11756217362835792052,11937408762378746736,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:22⤵PID:1596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,11756217362835792052,11937408762378746736,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,11756217362835792052,11937408762378746736,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2776 /prefetch:82⤵PID:4660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,11756217362835792052,11937408762378746736,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,11756217362835792052,11937408762378746736,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:3248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,11756217362835792052,11937408762378746736,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4204 /prefetch:12⤵PID:4032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,11756217362835792052,11937408762378746736,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4852 /prefetch:12⤵PID:3520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,11756217362835792052,11937408762378746736,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5128 /prefetch:12⤵PID:4424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,11756217362835792052,11937408762378746736,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5944 /prefetch:82⤵PID:4100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,11756217362835792052,11937408762378746736,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5944 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,11756217362835792052,11937408762378746736,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5552 /prefetch:12⤵PID:4056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,11756217362835792052,11937408762378746736,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3960 /prefetch:12⤵PID:4064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,11756217362835792052,11937408762378746736,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4060 /prefetch:12⤵PID:988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,11756217362835792052,11937408762378746736,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5416 /prefetch:12⤵PID:4580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,11756217362835792052,11937408762378746736,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3096 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1824
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1056
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5108
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5584971c8ba88c824fd51a05dddb45a98
SHA1b7c9489b4427652a9cdd754d1c1b6ac4034be421
SHA256e2d8de6c2323bbb3863ec50843d9b58a22e911fd626d31430658b9ea942cd307
SHA5125dbf1a4631a04d1149d8fab2b8e0e43ccd97b7212de43b961b9128a8bf03329164fdeb480154a8ffea5835f28417a7d2b115b8bf8d578d00b13c3682aa5ca726
-
Filesize
152B
MD5b28ef7d9f6d74f055cc49876767c886c
SHA1d6b3267f36c340979f8fc3e012fdd02c468740bf
SHA256fa6804456884789f4bdf9c3f5a4a8f29e0ededde149c4384072f3d8cc85bcc37
SHA512491f893c8f765e5d629bce8dd5067cef4e2ebc558d43bfb05e358bca43e1a66ee1285519bc266fd0ff5b5e09769a56077b62ac55fa8797c1edf6205843356e75
-
Filesize
211KB
MD5151fb811968eaf8efb840908b89dc9d4
SHA17ec811009fd9b0e6d92d12d78b002275f2f1bee1
SHA256043fd8558e4a5a60aaccd2f0377f77a544e3e375242e9d7200dc6e51f94103ed
SHA51283aface0ab01da52fd077f747c9d5916e3c06b0ea5c551d7d316707ec3e8f3f986ce1c82e6f2136e48c6511a83cb0ac67ff6dc8f0e440ac72fc6854086a87674
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize504B
MD5e6a60cc144c30d8fd86baf6313a55cca
SHA1b0e373ee406ba0e36d814f9ffb1741741c56b5b9
SHA256385c7f80459c4e5ac55141646efae2e43b06f543601a9f187393523d773dd352
SHA512c6c4470da9a77a79095f22a30ffaba316ef6f0323fdf0112b07747e8441bd9f7030cd0b3061a8c4fd3fdafa79de9424a36817cebb5792c8bfd3c1100f7d1dbec
-
Filesize
1KB
MD59bec906ed7b6f9201fb5ba7da3626de2
SHA1594c85cd1e4103f6b33b979db758e8a3bbc2bf2d
SHA25692dfceb2884a2967f6012d42cae6f7afea970c48510a00fb106e118ff807aea9
SHA512bb4965e957f5d654292d34b9699bc2b4eb02bb81fa0b8738f0664f96d23ea387ef2227b1abf74ec6120e00826b6030a87d91c79c7cad70739e036f0b0743358e
-
Filesize
6KB
MD548685d2087e28458745cd818a2987201
SHA19d700f8a597fc6889429aedf89a2ed9498960f93
SHA25692db989104554c65ca87cfac55b60e1a76fcde9e3868678b68cad5f6f88903e5
SHA512d5b0eaace5c6e7c76fa23074588a16a5bd6d1ff508dab83622c1f79a0d17749eb9dd99551932fdaa2472029c8f6cdddb5b0a128224ec9c7c250cf336085be1d8
-
Filesize
6KB
MD53d11915d2143950c8f9677723f84f1ef
SHA177afca07877b3a63f0ba52a9a5b4bc7fd31986ed
SHA2560569faae850216723ba17441f86aa92c96d1828b2043438b5651249f519b460b
SHA512a12e51e8f261323b5de9d4cdd2bfe5736c8d29c69a9d807a096b3263c1ce929cdcf3795682fbfd0cbfa3eea6d7060c7c3bb3fe855918a73a54c11fd8841177c5
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD50584f582d7302d2b461d3338f1f981db
SHA1665d1d14fcd6c8e8bc88ebe6f6c694350f9d6a55
SHA256caa81292143d10e2d1dd7fb2e9cf6107fe10a9c29ed208500b59cd9b6f801d94
SHA51209f670f546c288ad4d56418a5036ec9285bbdd7e5d38a58ee784ca9f7f8cf7ed897fbf1f823341c0f7f6716e2c8c8a2fa2b250371a9468aa3099c87de8fdb90c