Analysis
-
max time kernel
145s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
15-07-2024 11:31
Static task
static1
Behavioral task
behavioral1
Sample
4997b003007372515158c81d2058426e_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
4997b003007372515158c81d2058426e_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
4997b003007372515158c81d2058426e_JaffaCakes118.html
-
Size
49KB
-
MD5
4997b003007372515158c81d2058426e
-
SHA1
6d7defb56b6017c522fb690cf8130c7eb77bc732
-
SHA256
34a6603ecca2596a80fc6848918ae42143cdf5f7ee72544d5bbe4d1144d01b4d
-
SHA512
1e2649ccba042e955324ed34c214d680190aad6fc91bd72f3cc575b298eab195450dd3457faee9a873ee3b210148d1afafc1bbe9a8ebb99a0f470ebcb29f146a
-
SSDEEP
768:hUCJ91LYpij6eufzdtCcmLDMvAHCI9/mXsHqCISOt8SWiVrSWEVU:zufbm/MYiI9/mXsHNUhHVePVU
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3444 msedge.exe 3444 msedge.exe 1392 msedge.exe 1392 msedge.exe 2508 identity_helper.exe 2508 identity_helper.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 1392 msedge.exe 1392 msedge.exe 1392 msedge.exe 1392 msedge.exe 1392 msedge.exe 1392 msedge.exe 1392 msedge.exe 1392 msedge.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 3832 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 3832 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1392 msedge.exe 1392 msedge.exe 1392 msedge.exe 1392 msedge.exe 1392 msedge.exe 1392 msedge.exe 1392 msedge.exe 1392 msedge.exe 1392 msedge.exe 1392 msedge.exe 1392 msedge.exe 1392 msedge.exe 1392 msedge.exe 1392 msedge.exe 1392 msedge.exe 1392 msedge.exe 1392 msedge.exe 1392 msedge.exe 1392 msedge.exe 1392 msedge.exe 1392 msedge.exe 1392 msedge.exe 1392 msedge.exe 1392 msedge.exe 1392 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1392 msedge.exe 1392 msedge.exe 1392 msedge.exe 1392 msedge.exe 1392 msedge.exe 1392 msedge.exe 1392 msedge.exe 1392 msedge.exe 1392 msedge.exe 1392 msedge.exe 1392 msedge.exe 1392 msedge.exe 1392 msedge.exe 1392 msedge.exe 1392 msedge.exe 1392 msedge.exe 1392 msedge.exe 1392 msedge.exe 1392 msedge.exe 1392 msedge.exe 1392 msedge.exe 1392 msedge.exe 1392 msedge.exe 1392 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1392 wrote to memory of 4124 1392 msedge.exe 83 PID 1392 wrote to memory of 4124 1392 msedge.exe 83 PID 1392 wrote to memory of 3844 1392 msedge.exe 84 PID 1392 wrote to memory of 3844 1392 msedge.exe 84 PID 1392 wrote to memory of 3844 1392 msedge.exe 84 PID 1392 wrote to memory of 3844 1392 msedge.exe 84 PID 1392 wrote to memory of 3844 1392 msedge.exe 84 PID 1392 wrote to memory of 3844 1392 msedge.exe 84 PID 1392 wrote to memory of 3844 1392 msedge.exe 84 PID 1392 wrote to memory of 3844 1392 msedge.exe 84 PID 1392 wrote to memory of 3844 1392 msedge.exe 84 PID 1392 wrote to memory of 3844 1392 msedge.exe 84 PID 1392 wrote to memory of 3844 1392 msedge.exe 84 PID 1392 wrote to memory of 3844 1392 msedge.exe 84 PID 1392 wrote to memory of 3844 1392 msedge.exe 84 PID 1392 wrote to memory of 3844 1392 msedge.exe 84 PID 1392 wrote to memory of 3844 1392 msedge.exe 84 PID 1392 wrote to memory of 3844 1392 msedge.exe 84 PID 1392 wrote to memory of 3844 1392 msedge.exe 84 PID 1392 wrote to memory of 3844 1392 msedge.exe 84 PID 1392 wrote to memory of 3844 1392 msedge.exe 84 PID 1392 wrote to memory of 3844 1392 msedge.exe 84 PID 1392 wrote to memory of 3844 1392 msedge.exe 84 PID 1392 wrote to memory of 3844 1392 msedge.exe 84 PID 1392 wrote to memory of 3844 1392 msedge.exe 84 PID 1392 wrote to memory of 3844 1392 msedge.exe 84 PID 1392 wrote to memory of 3844 1392 msedge.exe 84 PID 1392 wrote to memory of 3844 1392 msedge.exe 84 PID 1392 wrote to memory of 3844 1392 msedge.exe 84 PID 1392 wrote to memory of 3844 1392 msedge.exe 84 PID 1392 wrote to memory of 3844 1392 msedge.exe 84 PID 1392 wrote to memory of 3844 1392 msedge.exe 84 PID 1392 wrote to memory of 3844 1392 msedge.exe 84 PID 1392 wrote to memory of 3844 1392 msedge.exe 84 PID 1392 wrote to memory of 3844 1392 msedge.exe 84 PID 1392 wrote to memory of 3844 1392 msedge.exe 84 PID 1392 wrote to memory of 3844 1392 msedge.exe 84 PID 1392 wrote to memory of 3844 1392 msedge.exe 84 PID 1392 wrote to memory of 3844 1392 msedge.exe 84 PID 1392 wrote to memory of 3844 1392 msedge.exe 84 PID 1392 wrote to memory of 3844 1392 msedge.exe 84 PID 1392 wrote to memory of 3844 1392 msedge.exe 84 PID 1392 wrote to memory of 3444 1392 msedge.exe 85 PID 1392 wrote to memory of 3444 1392 msedge.exe 85 PID 1392 wrote to memory of 4576 1392 msedge.exe 86 PID 1392 wrote to memory of 4576 1392 msedge.exe 86 PID 1392 wrote to memory of 4576 1392 msedge.exe 86 PID 1392 wrote to memory of 4576 1392 msedge.exe 86 PID 1392 wrote to memory of 4576 1392 msedge.exe 86 PID 1392 wrote to memory of 4576 1392 msedge.exe 86 PID 1392 wrote to memory of 4576 1392 msedge.exe 86 PID 1392 wrote to memory of 4576 1392 msedge.exe 86 PID 1392 wrote to memory of 4576 1392 msedge.exe 86 PID 1392 wrote to memory of 4576 1392 msedge.exe 86 PID 1392 wrote to memory of 4576 1392 msedge.exe 86 PID 1392 wrote to memory of 4576 1392 msedge.exe 86 PID 1392 wrote to memory of 4576 1392 msedge.exe 86 PID 1392 wrote to memory of 4576 1392 msedge.exe 86 PID 1392 wrote to memory of 4576 1392 msedge.exe 86 PID 1392 wrote to memory of 4576 1392 msedge.exe 86 PID 1392 wrote to memory of 4576 1392 msedge.exe 86 PID 1392 wrote to memory of 4576 1392 msedge.exe 86 PID 1392 wrote to memory of 4576 1392 msedge.exe 86 PID 1392 wrote to memory of 4576 1392 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\4997b003007372515158c81d2058426e_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1392 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x104,0x108,0x10c,0xe0,0x110,0x7ffd314c46f8,0x7ffd314c4708,0x7ffd314c47182⤵PID:4124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,16042749048914675744,15182083013698966503,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:22⤵PID:3844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2132,16042749048914675744,15182083013698966503,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2256 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2132,16042749048914675744,15182083013698966503,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2820 /prefetch:82⤵PID:4576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,16042749048914675744,15182083013698966503,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:2212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,16042749048914675744,15182083013698966503,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:2616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,16042749048914675744,15182083013698966503,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5048 /prefetch:12⤵PID:1412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,16042749048914675744,15182083013698966503,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5284 /prefetch:12⤵PID:4788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,16042749048914675744,15182083013698966503,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5676 /prefetch:82⤵PID:4292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,16042749048914675744,15182083013698966503,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5676 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,16042749048914675744,15182083013698966503,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4772 /prefetch:12⤵PID:3412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,16042749048914675744,15182083013698966503,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4808 /prefetch:12⤵PID:1068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2132,16042749048914675744,15182083013698966503,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5324 /prefetch:82⤵PID:3096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,16042749048914675744,15182083013698966503,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6100 /prefetch:12⤵PID:1228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,16042749048914675744,15182083013698966503,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6120 /prefetch:12⤵PID:4176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,16042749048914675744,15182083013698966503,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1260 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4788
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:860
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:212
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x2fc 0x4581⤵
- Suspicious use of AdjustPrivilegeToken
PID:3832
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5bafce9e4c53a0cb85310891b6b21791b
SHA15d70027cc137a7cbb38f5801b15fd97b05e89ee2
SHA25671fb546b5d2210a56e90b448ee10120cd92c518c8f79fb960f01b918f89f2b00
SHA512c0e4d3eccc0135ac92051539a18f64b8b8628cfe74e5b019d4f8e1dcbb51a9b49c486a1523885fe6be53da7118c013852e753c26a5490538c1e721fd0188836c
-
Filesize
152B
MD5a499254d6b5d91f97eb7a86e5f8ca573
SHA103dbfebfec8c94a9c06f9b0cd81ebe0a2b8be3d1
SHA256fb87b758c2b98989df851380293ff6786cb9a5cf2b3a384cec70d9f3eb064499
SHA512d7adcc76d0470bcd68d7644de3c8d2b6d61df8485979a4752ceea3df4d85bd1c290f72b3d8d5c8d639d5a10afa48d80e457f76b44dd8107ac97eb80fd98c7b0c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize504B
MD59ea23541e1a7cd994be124102ee5f6a7
SHA1e15861b5f75716a57e4c44dea5aa2314f36b27b8
SHA256ff6f6b790e3c55aa0bc51f0703e09f1e4f956e81e2f4c315446213093f887989
SHA512384792ae1385f5d7616fc0787d5eb6d41dfbe3e640aea1dfa75f13d4d3e613fd5a41826d590bc05112e65e698a0cb8c0656b8eb233ec87b91a21faccfe6d61e5
-
Filesize
1KB
MD55845f2424cdde83d72fcc8880aa791d9
SHA112d8cb02bf376790bc89f6beb8245bf0e6648956
SHA256356c10b8f8d2cce84b69fe99a3e553bfd9be237d8d15f34b8666595477a795f6
SHA5122949f8123f68e1aa18cc0d1102c32a9b73d47c89ddf03a30f1c1b5f921f94b5cf554ab24c2bf490d0d29dc4adda68ddd1ad22d4cdb775e497563073e007fe3f2
-
Filesize
7KB
MD5a3b3c09c9bf10dec91fa47a8d88d51ec
SHA1b393455e2b02cd3c6032be3ea45fe7b8b91fe768
SHA25614a984d428be874ffea0357fc27d74605a2abbb27b5c20e732006943d8155a43
SHA5127b9cc24066a80abf9aeef304f26ba9668365dc31da5099374f0790322328a30f3c21898b8084947d43f9a6d00fa37fe1a0f5140331e2822fb225688dd0ca11ec
-
Filesize
6KB
MD55001da5d707ee7d244ea067bd1aad6d0
SHA10fefad9df6cc33983929803d8ce6b847e5c88cba
SHA2565fa784c44a90ef0de295d6fee14eddcf417246a127a305db4af4d658a14f4e05
SHA512ade4d61d9efc4ab53a7d11b4340f18772c6671e988289009c24c28703e6e93cd1f63617e615bf51d7d873a34abed273a09abb10d8f18d686bf9525caf454cb90
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5d436941635b8ed82789490d616c20f7f
SHA10e5922581b826e195632ca579722045276af8fa8
SHA2564bf5c3ca42023eeab82242a54dd6fea1aa82e6145ac69e633455f092ab64a18c
SHA51207c12b4700443a3c00d06be564207022be86110932ac79e052c83d10a2d9aa38038733e927c9047084a773b4323a15b9e52e405393f6d66ecff54f558b93f9e4