Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
19-07-2024 22:57
Static task
static1
Behavioral task
behavioral1
Sample
5e0816f7b559a20ad74f70ee74bd7259_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
5e0816f7b559a20ad74f70ee74bd7259_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
5e0816f7b559a20ad74f70ee74bd7259_JaffaCakes118.html
-
Size
58KB
-
MD5
5e0816f7b559a20ad74f70ee74bd7259
-
SHA1
0b0bddf2329d8c6b6a52980e41656502382f7cb5
-
SHA256
d4defac3d44a4f0120bdb56e47321c1847f6ee547b982d569e27ed2535a621a9
-
SHA512
fabeff30ba0a1a2bfc441b573b16d90a6115f3a61be6785af6163e6555521681d6579d362abe6df4435125abae5bf4e70ed641ddde6ef96d965c2b8bbdd2f78e
-
SSDEEP
1536:gQZBCCOdb0IxCqVnzfDfsf3f7fsfSfVfmfjfsfYfAf3fafifzfSfyfzf1fBf+fML:gk2t0IxJbkPzkKNebUwYvCaLaK7tJWUL
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2360 msedge.exe 2360 msedge.exe 1556 msedge.exe 1556 msedge.exe 4436 identity_helper.exe 4436 identity_helper.exe 6116 msedge.exe 6116 msedge.exe 6116 msedge.exe 6116 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 1556 msedge.exe 1556 msedge.exe 1556 msedge.exe 1556 msedge.exe 1556 msedge.exe 1556 msedge.exe 1556 msedge.exe 1556 msedge.exe 1556 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1556 msedge.exe 1556 msedge.exe 1556 msedge.exe 1556 msedge.exe 1556 msedge.exe 1556 msedge.exe 1556 msedge.exe 1556 msedge.exe 1556 msedge.exe 1556 msedge.exe 1556 msedge.exe 1556 msedge.exe 1556 msedge.exe 1556 msedge.exe 1556 msedge.exe 1556 msedge.exe 1556 msedge.exe 1556 msedge.exe 1556 msedge.exe 1556 msedge.exe 1556 msedge.exe 1556 msedge.exe 1556 msedge.exe 1556 msedge.exe 1556 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1556 msedge.exe 1556 msedge.exe 1556 msedge.exe 1556 msedge.exe 1556 msedge.exe 1556 msedge.exe 1556 msedge.exe 1556 msedge.exe 1556 msedge.exe 1556 msedge.exe 1556 msedge.exe 1556 msedge.exe 1556 msedge.exe 1556 msedge.exe 1556 msedge.exe 1556 msedge.exe 1556 msedge.exe 1556 msedge.exe 1556 msedge.exe 1556 msedge.exe 1556 msedge.exe 1556 msedge.exe 1556 msedge.exe 1556 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1556 wrote to memory of 2988 1556 msedge.exe 84 PID 1556 wrote to memory of 2988 1556 msedge.exe 84 PID 1556 wrote to memory of 4752 1556 msedge.exe 85 PID 1556 wrote to memory of 4752 1556 msedge.exe 85 PID 1556 wrote to memory of 4752 1556 msedge.exe 85 PID 1556 wrote to memory of 4752 1556 msedge.exe 85 PID 1556 wrote to memory of 4752 1556 msedge.exe 85 PID 1556 wrote to memory of 4752 1556 msedge.exe 85 PID 1556 wrote to memory of 4752 1556 msedge.exe 85 PID 1556 wrote to memory of 4752 1556 msedge.exe 85 PID 1556 wrote to memory of 4752 1556 msedge.exe 85 PID 1556 wrote to memory of 4752 1556 msedge.exe 85 PID 1556 wrote to memory of 4752 1556 msedge.exe 85 PID 1556 wrote to memory of 4752 1556 msedge.exe 85 PID 1556 wrote to memory of 4752 1556 msedge.exe 85 PID 1556 wrote to memory of 4752 1556 msedge.exe 85 PID 1556 wrote to memory of 4752 1556 msedge.exe 85 PID 1556 wrote to memory of 4752 1556 msedge.exe 85 PID 1556 wrote to memory of 4752 1556 msedge.exe 85 PID 1556 wrote to memory of 4752 1556 msedge.exe 85 PID 1556 wrote to memory of 4752 1556 msedge.exe 85 PID 1556 wrote to memory of 4752 1556 msedge.exe 85 PID 1556 wrote to memory of 4752 1556 msedge.exe 85 PID 1556 wrote to memory of 4752 1556 msedge.exe 85 PID 1556 wrote to memory of 4752 1556 msedge.exe 85 PID 1556 wrote to memory of 4752 1556 msedge.exe 85 PID 1556 wrote to memory of 4752 1556 msedge.exe 85 PID 1556 wrote to memory of 4752 1556 msedge.exe 85 PID 1556 wrote to memory of 4752 1556 msedge.exe 85 PID 1556 wrote to memory of 4752 1556 msedge.exe 85 PID 1556 wrote to memory of 4752 1556 msedge.exe 85 PID 1556 wrote to memory of 4752 1556 msedge.exe 85 PID 1556 wrote to memory of 4752 1556 msedge.exe 85 PID 1556 wrote to memory of 4752 1556 msedge.exe 85 PID 1556 wrote to memory of 4752 1556 msedge.exe 85 PID 1556 wrote to memory of 4752 1556 msedge.exe 85 PID 1556 wrote to memory of 4752 1556 msedge.exe 85 PID 1556 wrote to memory of 4752 1556 msedge.exe 85 PID 1556 wrote to memory of 4752 1556 msedge.exe 85 PID 1556 wrote to memory of 4752 1556 msedge.exe 85 PID 1556 wrote to memory of 4752 1556 msedge.exe 85 PID 1556 wrote to memory of 4752 1556 msedge.exe 85 PID 1556 wrote to memory of 2360 1556 msedge.exe 86 PID 1556 wrote to memory of 2360 1556 msedge.exe 86 PID 1556 wrote to memory of 1856 1556 msedge.exe 87 PID 1556 wrote to memory of 1856 1556 msedge.exe 87 PID 1556 wrote to memory of 1856 1556 msedge.exe 87 PID 1556 wrote to memory of 1856 1556 msedge.exe 87 PID 1556 wrote to memory of 1856 1556 msedge.exe 87 PID 1556 wrote to memory of 1856 1556 msedge.exe 87 PID 1556 wrote to memory of 1856 1556 msedge.exe 87 PID 1556 wrote to memory of 1856 1556 msedge.exe 87 PID 1556 wrote to memory of 1856 1556 msedge.exe 87 PID 1556 wrote to memory of 1856 1556 msedge.exe 87 PID 1556 wrote to memory of 1856 1556 msedge.exe 87 PID 1556 wrote to memory of 1856 1556 msedge.exe 87 PID 1556 wrote to memory of 1856 1556 msedge.exe 87 PID 1556 wrote to memory of 1856 1556 msedge.exe 87 PID 1556 wrote to memory of 1856 1556 msedge.exe 87 PID 1556 wrote to memory of 1856 1556 msedge.exe 87 PID 1556 wrote to memory of 1856 1556 msedge.exe 87 PID 1556 wrote to memory of 1856 1556 msedge.exe 87 PID 1556 wrote to memory of 1856 1556 msedge.exe 87 PID 1556 wrote to memory of 1856 1556 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\5e0816f7b559a20ad74f70ee74bd7259_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1556 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe6e0446f8,0x7ffe6e044708,0x7ffe6e0447182⤵PID:2988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,17945938701931872462,1889610382835727160,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:22⤵PID:4752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2076,17945938701931872462,1889610382835727160,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2076,17945938701931872462,1889610382835727160,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2828 /prefetch:82⤵PID:1856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,17945938701931872462,1889610382835727160,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:4764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,17945938701931872462,1889610382835727160,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:12⤵PID:2256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,17945938701931872462,1889610382835727160,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4136 /prefetch:12⤵PID:2632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,17945938701931872462,1889610382835727160,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4868 /prefetch:12⤵PID:2340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,17945938701931872462,1889610382835727160,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5128 /prefetch:12⤵PID:3232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,17945938701931872462,1889610382835727160,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6100 /prefetch:82⤵PID:3268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,17945938701931872462,1889610382835727160,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6100 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,17945938701931872462,1889610382835727160,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5928 /prefetch:12⤵PID:4260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,17945938701931872462,1889610382835727160,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5992 /prefetch:12⤵PID:4448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,17945938701931872462,1889610382835727160,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5988 /prefetch:12⤵PID:5184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,17945938701931872462,1889610382835727160,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5980 /prefetch:12⤵PID:5192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,17945938701931872462,1889610382835727160,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5196 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:6116
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:864
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4860
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52f842025e22e522658c640cfc7edc529
SHA14c2b24b02709acdd159f1b9bbeb396e52af27033
SHA2561191573f2a7c12f0b9b8460e06dc36ca5386305eb8c883ebbbc8eb15f4d8e23e
SHA5126e4393fd43984722229020ef662fc5981f253de31f13f30fadd6660bbc9ededcbfd163f132f6adaf42d435873322a5d0d3eea60060cf0e7f2e256262632c5d05
-
Filesize
152B
MD554aadd2d8ec66e446f1edb466b99ba8d
SHA1a94f02b035dc918d8d9a46e6886413f15be5bff0
SHA2561971045943002ef01930add9ba1a96a92ddc10d6c581ce29e33c38c2120b130e
SHA5127e077f903463da60b5587aed4f5352060df400ebda713b602b88c15cb2f91076531ea07546a9352df772656065e0bf27bd285905a60f036a5c5951076d35e994
-
Filesize
211KB
MD5151fb811968eaf8efb840908b89dc9d4
SHA17ec811009fd9b0e6d92d12d78b002275f2f1bee1
SHA256043fd8558e4a5a60aaccd2f0377f77a544e3e375242e9d7200dc6e51f94103ed
SHA51283aface0ab01da52fd077f747c9d5916e3c06b0ea5c551d7d316707ec3e8f3f986ce1c82e6f2136e48c6511a83cb0ac67ff6dc8f0e440ac72fc6854086a87674
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize504B
MD55423aed014e100fdba9321e68d47c814
SHA1ca8bca3f4b44e86186d53262bec5c8e64f7428b4
SHA256238b0106b5780f9cb7d54a71c174e8c3e07390a0fcd5d7728b5ad00023d2b3ae
SHA5123e795adb380bd79842d4646a6a4133613af4a743ab3034c7c2689914b27c260a9df0c370972078dae3292ac47ec2c40f5e297efa1d9b1659dfa5e9f9d380ec08
-
Filesize
1KB
MD55e9286482b829f78c34961d39ca6bd7a
SHA13164097241eed03129380b1e0766acf96c464802
SHA256fe1bf28af2cb23499f257c061d39f91e13ce3d23200b0c22ffc7f3f1384b27a3
SHA512da9f6a6666d972bc3f56cccd5bb43d1c5c08019c59cb3e028e4a00a2e62c33b49ddc8e6fe21053f43f568db051b8b2f3d1ab12f75017db75833d5be6868675bb
-
Filesize
5KB
MD5aae8dfd62a128579aa907edeedeb57dd
SHA132a148f1f0ca896021615b744ef25a3c11d78e5c
SHA256c5e208c10cfa7cc5186aec2f27b8f4070805acfd3378fb35c0fe59592a34414f
SHA5128de4a209ecbc8f3ac2a67cd3b5acaebdd36c87802ae80e6ec677fb16163f66229d42a253c4217210089f32aec23a68b7a351228394212e9fa037e17eb78e7e64
-
Filesize
6KB
MD52ce5042a5f598ad178efca052dedf6b8
SHA17784c49020dc29a9f37f9d6b9f3102ca448324c2
SHA256c0505bc9d93f5772381139869ec7211e89602eca508195279ba416bab106fe94
SHA51247bbfc84fc74347a6d90b7d783bfdc91769bc8ea0153b60f6cb55d2ad5fc4372e5ec88765a2a3d07604658dcff849a21087357915a8d23d5a0d7c2878cc77e58
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD59da6636a2c120cd873442e229f3204d3
SHA1cdf1dd8c0a7fba89bbbfcfbf73cc957a77996b0c
SHA2568b922ca041e4a334246978c3e0b271694a968aceb380f64a2193356567d3489f
SHA512b4e5b6bef9544d41a6f2cedf0d549a1c32f4ab80ea418abe7505fe548fc4b95fdbdab4b0f23d12681686be4673214cd619189ddabdce77cf26e697818966323d