Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
16/07/2024, 02:00
Static task
static1
Behavioral task
behavioral1
Sample
4c5b16325d41fd508c047ce1718f25b8_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
4c5b16325d41fd508c047ce1718f25b8_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
4c5b16325d41fd508c047ce1718f25b8_JaffaCakes118.html
-
Size
57KB
-
MD5
4c5b16325d41fd508c047ce1718f25b8
-
SHA1
21de6f7a64073a8f55a35ceb5aca8588cecdf27e
-
SHA256
2e3fd1f6037dda92d5197e604054bb0c91724cda57df19ddfd0594de30584be7
-
SHA512
97fee606fea0866a1ca618d86ee4f938befee441e5585f985621c88b18dfdf534cc4ca8fbbe7f50ce8ad25fc17ec2b0497d23ded4f8bb0619e86669100a19051
-
SSDEEP
1536:ijEQvK8OPHdsASo2vgyHJv0owbd6zKD6CDK2RVrox+wpDK2RVy:ijnOPHds22vgyHJutDK2RVrox+wpDK2m
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4440 msedge.exe 4440 msedge.exe 368 msedge.exe 368 msedge.exe 2876 identity_helper.exe 2876 identity_helper.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe 4000 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe 368 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 368 wrote to memory of 4940 368 msedge.exe 85 PID 368 wrote to memory of 4940 368 msedge.exe 85 PID 368 wrote to memory of 5044 368 msedge.exe 86 PID 368 wrote to memory of 5044 368 msedge.exe 86 PID 368 wrote to memory of 5044 368 msedge.exe 86 PID 368 wrote to memory of 5044 368 msedge.exe 86 PID 368 wrote to memory of 5044 368 msedge.exe 86 PID 368 wrote to memory of 5044 368 msedge.exe 86 PID 368 wrote to memory of 5044 368 msedge.exe 86 PID 368 wrote to memory of 5044 368 msedge.exe 86 PID 368 wrote to memory of 5044 368 msedge.exe 86 PID 368 wrote to memory of 5044 368 msedge.exe 86 PID 368 wrote to memory of 5044 368 msedge.exe 86 PID 368 wrote to memory of 5044 368 msedge.exe 86 PID 368 wrote to memory of 5044 368 msedge.exe 86 PID 368 wrote to memory of 5044 368 msedge.exe 86 PID 368 wrote to memory of 5044 368 msedge.exe 86 PID 368 wrote to memory of 5044 368 msedge.exe 86 PID 368 wrote to memory of 5044 368 msedge.exe 86 PID 368 wrote to memory of 5044 368 msedge.exe 86 PID 368 wrote to memory of 5044 368 msedge.exe 86 PID 368 wrote to memory of 5044 368 msedge.exe 86 PID 368 wrote to memory of 5044 368 msedge.exe 86 PID 368 wrote to memory of 5044 368 msedge.exe 86 PID 368 wrote to memory of 5044 368 msedge.exe 86 PID 368 wrote to memory of 5044 368 msedge.exe 86 PID 368 wrote to memory of 5044 368 msedge.exe 86 PID 368 wrote to memory of 5044 368 msedge.exe 86 PID 368 wrote to memory of 5044 368 msedge.exe 86 PID 368 wrote to memory of 5044 368 msedge.exe 86 PID 368 wrote to memory of 5044 368 msedge.exe 86 PID 368 wrote to memory of 5044 368 msedge.exe 86 PID 368 wrote to memory of 5044 368 msedge.exe 86 PID 368 wrote to memory of 5044 368 msedge.exe 86 PID 368 wrote to memory of 5044 368 msedge.exe 86 PID 368 wrote to memory of 5044 368 msedge.exe 86 PID 368 wrote to memory of 5044 368 msedge.exe 86 PID 368 wrote to memory of 5044 368 msedge.exe 86 PID 368 wrote to memory of 5044 368 msedge.exe 86 PID 368 wrote to memory of 5044 368 msedge.exe 86 PID 368 wrote to memory of 5044 368 msedge.exe 86 PID 368 wrote to memory of 5044 368 msedge.exe 86 PID 368 wrote to memory of 4440 368 msedge.exe 87 PID 368 wrote to memory of 4440 368 msedge.exe 87 PID 368 wrote to memory of 808 368 msedge.exe 88 PID 368 wrote to memory of 808 368 msedge.exe 88 PID 368 wrote to memory of 808 368 msedge.exe 88 PID 368 wrote to memory of 808 368 msedge.exe 88 PID 368 wrote to memory of 808 368 msedge.exe 88 PID 368 wrote to memory of 808 368 msedge.exe 88 PID 368 wrote to memory of 808 368 msedge.exe 88 PID 368 wrote to memory of 808 368 msedge.exe 88 PID 368 wrote to memory of 808 368 msedge.exe 88 PID 368 wrote to memory of 808 368 msedge.exe 88 PID 368 wrote to memory of 808 368 msedge.exe 88 PID 368 wrote to memory of 808 368 msedge.exe 88 PID 368 wrote to memory of 808 368 msedge.exe 88 PID 368 wrote to memory of 808 368 msedge.exe 88 PID 368 wrote to memory of 808 368 msedge.exe 88 PID 368 wrote to memory of 808 368 msedge.exe 88 PID 368 wrote to memory of 808 368 msedge.exe 88 PID 368 wrote to memory of 808 368 msedge.exe 88 PID 368 wrote to memory of 808 368 msedge.exe 88 PID 368 wrote to memory of 808 368 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\4c5b16325d41fd508c047ce1718f25b8_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:368 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff317746f8,0x7fff31774708,0x7fff317747182⤵PID:4940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2008,6087403995592043498,10137835467470852845,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2052 /prefetch:22⤵PID:5044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2008,6087403995592043498,10137835467470852845,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2008,6087403995592043498,10137835467470852845,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2856 /prefetch:82⤵PID:808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,6087403995592043498,10137835467470852845,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:1912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,6087403995592043498,10137835467470852845,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:4608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,6087403995592043498,10137835467470852845,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4864 /prefetch:12⤵PID:3872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,6087403995592043498,10137835467470852845,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5268 /prefetch:12⤵PID:2312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,6087403995592043498,10137835467470852845,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:12⤵PID:4100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,6087403995592043498,10137835467470852845,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3428 /prefetch:12⤵PID:2476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2008,6087403995592043498,10137835467470852845,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5452 /prefetch:82⤵PID:3260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2008,6087403995592043498,10137835467470852845,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5452 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,6087403995592043498,10137835467470852845,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5824 /prefetch:12⤵PID:2244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,6087403995592043498,10137835467470852845,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5800 /prefetch:12⤵PID:2372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,6087403995592043498,10137835467470852845,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5964 /prefetch:12⤵PID:3844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,6087403995592043498,10137835467470852845,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6320 /prefetch:12⤵PID:2332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2008,6087403995592043498,10137835467470852845,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2204 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4000
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1548
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4916
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51f9d180c0bcf71b48e7bc8302f85c28f
SHA1ade94a8e51c446383dc0a45edf5aad5fa20edf3c
SHA256a17d56c41d524453a78e3f06e0d0b0081e79d090a4b75d0b693ddbc39f6f7fdc
SHA512282863df0e51288049587886ed37ad1cf5b6bfeed86454ea3b9f2bb7f0a1c591f3540c62712ebfcd6f1095e1977446dd5b13b904bb52b6d5c910a1efc208c785
-
Filesize
152B
MD560ead4145eb78b972baf6c6270ae6d72
SHA1e71f4507bea5b518d9ee9fb2d523c5a11adea842
SHA256b9e99e7387a915275e8fe4ac0b0c0cd330b4632814d5c9c446beb2755f1309a7
SHA5128cdbafd2783048f5f54f22e13f6ef890936d5b986b0bb3fa86d2420a5bfecf7bedc56f46e6d5f126eae79f492315843c134c441084b912296e269f384a73ccde
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize768B
MD5176fa4f2f0390c72957731de2795c509
SHA1034df6fd90acaa7b4b2e7658c8bf3f90e6200511
SHA2560aec7d82ad83d9da8c4cecb0fb516797657aef38e19d8d11f7c9dfaa23462182
SHA512fa9b685304fc5e153ccfb983eb312571a65e0950906624d3a2977154e2f008b4fd19e13f79e0006387a38ec72073ff86455a59586078af8f0bce5a278bc02694
-
Filesize
1KB
MD5cb510fdba38f2c0dd57d3c250e10b80b
SHA10a341524042756acb17e0184046dce6826dfdd4c
SHA2563944dbfced5e884b08a7fc8a3f37b6c1403bf925fd70d1b0045867551e35c15f
SHA5129cec29a09cfe23f8427e6e7c8af49e107ddc62c769b2add03e3f3398207d25a29c32772a7a320e29ffbeae44aa92756a81a129d10e670d49bd2c81c2a8bb289f
-
Filesize
6KB
MD5b98c8c6c89582ae6da61f3747dc836dc
SHA16dadca0e00ba1c11d5a1c5342874449fde583592
SHA25696ebb6868f7d7d2ec876f2b829d2c1c35dd7cd3cb18de5b33e76a8df3f92847e
SHA5129c0b6b4d8a85f3a9f5ac047c4af54b37316abd8e44d6080af0591d0109033f5c4ee4ec1c784ca8f6ef65499cf08a24fbd01b1c4cf9b2af7726b4c3e44ee57fd1
-
Filesize
6KB
MD58401de667b2a52dc6265500c4df5faf9
SHA169ce727c8cdf58e4fc10f456863372a73d83d843
SHA256ffbcae8212830e36e9727a944ead297f0d506a16170a52e8437fa1b25888b90c
SHA51268c2a9f15bd35609922f3b858587eb8350d8fa2b297ff7fe1040d1f97b38bc17decfb06046b6e85b4ee18d629494d6c778f4a2bd6f7056c52e44323401f6c40e
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5458a6e5013483e3fb0ce6da6562a1781
SHA1fa793f700fe0e48147a3c411430d01b6199775ed
SHA25616be15d169254c47301c386efd9574e54c4229d1523c292f48ae8641687f62b2
SHA512e1533ed20146e9a0e4199e1c952ea35f772e9b284448c94b74d21c20549c9757ae93a366bb30242c3c4a72eb4bee6b68124eda3ba4fa638a67c8b3d73878a573