Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
15/07/2024, 23:33
Static task
static1
Behavioral task
behavioral1
Sample
4be33558f8cb099abdb3adb9d54d7453_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
4be33558f8cb099abdb3adb9d54d7453_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
4be33558f8cb099abdb3adb9d54d7453_JaffaCakes118.html
-
Size
57KB
-
MD5
4be33558f8cb099abdb3adb9d54d7453
-
SHA1
88db4192160665de692f97b1a2e5ae1637a2a569
-
SHA256
15e457b8380267a38d135fec16a69383be9ce96a6602b08ce210c4d250806501
-
SHA512
460d48536d85d4c2ea7d70e0a4c15b63fba90f0f397c51aaf18dfbe74f406cb0ddc8fec674c6c536bf9951fc7879eb8421ac098a07b3f1ec9b30420cca47039c
-
SSDEEP
1536:ijEQvK8OPHdsAjo2vgyHJv0owbd6zKD6CDK2RVroD1wpDK2RVy:ijnOPHdsj2vgyHJutDK2RVroD1wpDK2m
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4148 msedge.exe 4148 msedge.exe 2896 msedge.exe 2896 msedge.exe 4800 identity_helper.exe 4800 identity_helper.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe 2936 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2896 wrote to memory of 1704 2896 msedge.exe 83 PID 2896 wrote to memory of 1704 2896 msedge.exe 83 PID 2896 wrote to memory of 2608 2896 msedge.exe 84 PID 2896 wrote to memory of 2608 2896 msedge.exe 84 PID 2896 wrote to memory of 2608 2896 msedge.exe 84 PID 2896 wrote to memory of 2608 2896 msedge.exe 84 PID 2896 wrote to memory of 2608 2896 msedge.exe 84 PID 2896 wrote to memory of 2608 2896 msedge.exe 84 PID 2896 wrote to memory of 2608 2896 msedge.exe 84 PID 2896 wrote to memory of 2608 2896 msedge.exe 84 PID 2896 wrote to memory of 2608 2896 msedge.exe 84 PID 2896 wrote to memory of 2608 2896 msedge.exe 84 PID 2896 wrote to memory of 2608 2896 msedge.exe 84 PID 2896 wrote to memory of 2608 2896 msedge.exe 84 PID 2896 wrote to memory of 2608 2896 msedge.exe 84 PID 2896 wrote to memory of 2608 2896 msedge.exe 84 PID 2896 wrote to memory of 2608 2896 msedge.exe 84 PID 2896 wrote to memory of 2608 2896 msedge.exe 84 PID 2896 wrote to memory of 2608 2896 msedge.exe 84 PID 2896 wrote to memory of 2608 2896 msedge.exe 84 PID 2896 wrote to memory of 2608 2896 msedge.exe 84 PID 2896 wrote to memory of 2608 2896 msedge.exe 84 PID 2896 wrote to memory of 2608 2896 msedge.exe 84 PID 2896 wrote to memory of 2608 2896 msedge.exe 84 PID 2896 wrote to memory of 2608 2896 msedge.exe 84 PID 2896 wrote to memory of 2608 2896 msedge.exe 84 PID 2896 wrote to memory of 2608 2896 msedge.exe 84 PID 2896 wrote to memory of 2608 2896 msedge.exe 84 PID 2896 wrote to memory of 2608 2896 msedge.exe 84 PID 2896 wrote to memory of 2608 2896 msedge.exe 84 PID 2896 wrote to memory of 2608 2896 msedge.exe 84 PID 2896 wrote to memory of 2608 2896 msedge.exe 84 PID 2896 wrote to memory of 2608 2896 msedge.exe 84 PID 2896 wrote to memory of 2608 2896 msedge.exe 84 PID 2896 wrote to memory of 2608 2896 msedge.exe 84 PID 2896 wrote to memory of 2608 2896 msedge.exe 84 PID 2896 wrote to memory of 2608 2896 msedge.exe 84 PID 2896 wrote to memory of 2608 2896 msedge.exe 84 PID 2896 wrote to memory of 2608 2896 msedge.exe 84 PID 2896 wrote to memory of 2608 2896 msedge.exe 84 PID 2896 wrote to memory of 2608 2896 msedge.exe 84 PID 2896 wrote to memory of 2608 2896 msedge.exe 84 PID 2896 wrote to memory of 4148 2896 msedge.exe 85 PID 2896 wrote to memory of 4148 2896 msedge.exe 85 PID 2896 wrote to memory of 4864 2896 msedge.exe 86 PID 2896 wrote to memory of 4864 2896 msedge.exe 86 PID 2896 wrote to memory of 4864 2896 msedge.exe 86 PID 2896 wrote to memory of 4864 2896 msedge.exe 86 PID 2896 wrote to memory of 4864 2896 msedge.exe 86 PID 2896 wrote to memory of 4864 2896 msedge.exe 86 PID 2896 wrote to memory of 4864 2896 msedge.exe 86 PID 2896 wrote to memory of 4864 2896 msedge.exe 86 PID 2896 wrote to memory of 4864 2896 msedge.exe 86 PID 2896 wrote to memory of 4864 2896 msedge.exe 86 PID 2896 wrote to memory of 4864 2896 msedge.exe 86 PID 2896 wrote to memory of 4864 2896 msedge.exe 86 PID 2896 wrote to memory of 4864 2896 msedge.exe 86 PID 2896 wrote to memory of 4864 2896 msedge.exe 86 PID 2896 wrote to memory of 4864 2896 msedge.exe 86 PID 2896 wrote to memory of 4864 2896 msedge.exe 86 PID 2896 wrote to memory of 4864 2896 msedge.exe 86 PID 2896 wrote to memory of 4864 2896 msedge.exe 86 PID 2896 wrote to memory of 4864 2896 msedge.exe 86 PID 2896 wrote to memory of 4864 2896 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\4be33558f8cb099abdb3adb9d54d7453_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe38ad46f8,0x7ffe38ad4708,0x7ffe38ad47182⤵PID:1704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,1035706242414568770,17955610139375934512,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2096 /prefetch:22⤵PID:2608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,1035706242414568770,17955610139375934512,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2320 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,1035706242414568770,17955610139375934512,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2684 /prefetch:82⤵PID:4864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,1035706242414568770,17955610139375934512,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:1004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,1035706242414568770,17955610139375934512,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:1784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,1035706242414568770,17955610139375934512,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4764 /prefetch:12⤵PID:2632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,1035706242414568770,17955610139375934512,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3964 /prefetch:12⤵PID:1936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,1035706242414568770,17955610139375934512,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4728 /prefetch:12⤵PID:320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,1035706242414568770,17955610139375934512,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3460 /prefetch:12⤵PID:736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,1035706242414568770,17955610139375934512,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5408 /prefetch:82⤵PID:4912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,1035706242414568770,17955610139375934512,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5408 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,1035706242414568770,17955610139375934512,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6176 /prefetch:12⤵PID:1984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,1035706242414568770,17955610139375934512,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6172 /prefetch:12⤵PID:4892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,1035706242414568770,17955610139375934512,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4144 /prefetch:12⤵PID:2148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,1035706242414568770,17955610139375934512,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6424 /prefetch:12⤵PID:1660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,1035706242414568770,17955610139375934512,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4772 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2936
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3284
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5008
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5eaaad45aced1889a90a8aa4c39f92659
SHA15c0130d9e8d1a64c97924090d9a5258b8a31b83c
SHA2565e3237f26b6047f64459cd5d3a6bc3563e2642b98d75b97011c93e0a9bd26f3b
SHA5120db1c6bdb51f4e6ba5ef4dc12fc73886e599ab28f1eec5d943110bc3d856401ca31c05baa9026dd441b69f3de92307eb77d93f089ba6e2b84eea6e93982620e4
-
Filesize
152B
MD53ee50fb26a9d3f096c47ff8696c24321
SHA1a8c83e798d2a8b31fec0820560525e80dfa4fe66
SHA256d80ec29cb17280af0c7522b30a80ffa19d1e786c0b09accfe3234b967d23eb6f
SHA512479c0d2b76850aa79b58f9e0a8ba5773bd8909d915b98c2e9dc3a95c0ac18d7741b2ee571df695c0305598d89651c7aef2ff7c2fedb8b6a6aa30057ecfc872c5
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize768B
MD598ad6820ea02c81c282e073bafe44d66
SHA1816c79c0a6b4efc95afab646035c485370ad0180
SHA25677eb9ea23bad2f5f181587357f0b8373ba65f119fc7f8aaadb69634f620ae657
SHA5122252186ed56c9ce95d63aa77dca6befc6a22cd844e41d41c115c776e4f951ce440ce88cfb647ef3f5a10105fe4648739bc9116236fd0b7ee2e53cca8b8037781
-
Filesize
1KB
MD5c9c61a225ef255b87fa8e5006e56a4a0
SHA11559dcce6048f89a3c7523a4f2047a5c1827cd28
SHA2569b9e0ad19b79f869cf0466548a1fe7e4cf375e5c46fffd640b17023ad0bd14aa
SHA5126eb20505e05011be0c210a1dca2893f20d1602ddbe57802716de93f913cc5cf092e7834608f1bc64a42739c0d16034528fb048d28fd0db5febd799d3d849f2ab
-
Filesize
6KB
MD51dffc2b66a9d8153dedd25f23908c2b2
SHA1f17f0bcea35e93b5533f3593dfc0c29a302b1583
SHA2560e93d658cfd95fdc8346fffa613571c6b01176c4006d6cf68c56a30a22faaecf
SHA51217ca7e7def64e0cb42e71a8276f29e8f415556dd647146d9fbeba9e4674fb8c97902aa2132cda197cb3c9bb58461c888c331acb9a07925dfd4d8f6fb85245d7b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\d2544d35-07a3-4fb3-8158-7a6888566532.tmp
Filesize6KB
MD51595f1febbd10e1288dbbb1f4307a1c2
SHA1a97f2bba3368a6f984e3f3fa6a786e2f3144bd24
SHA256d91b58d54522a6d6f19753f1cfbf61944bb80becad158693a7af190c687bf1bf
SHA512e45bf713c07856494d9850a2e99e6d479b5d20dbaab1572beec10bebe5a53db914f0134494fc34920252be1f264b4f33259cfdaa4fea2969fc72e75b9111b239
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5b09e699d3d452a0860416b8b01d6d240
SHA1e80cb54795a6191a4f8768b0692dd1170c4d7044
SHA2562aef03d0527785a64d588c0f99da2a8a2d10a33f8fad158c842c2abee513f8bf
SHA5126f67541aef4a72ab3e97d23de56e905009d7b60058fef2475ad90ddb9b6369c5cd6920dffad1cf221533eda88aea3510083099a2624fe987205e526abee6dbfb