Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
19-07-2024 00:13
Static task
static1
Behavioral task
behavioral1
Sample
59af16252beb186954fbd5f872de73e8_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
59af16252beb186954fbd5f872de73e8_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
59af16252beb186954fbd5f872de73e8_JaffaCakes118.html
-
Size
49KB
-
MD5
59af16252beb186954fbd5f872de73e8
-
SHA1
b84e30b4451d7baf9ef378179158e2c8d42dab13
-
SHA256
7cd2c5458ea55eff8ae61de778f7a8268471f2b9d08e5c5ffb318d0eefe7c14a
-
SHA512
dd186169057bb11ac214bc2b95e93a0340dc6b6c708d3ea5e232e76378ecdbfd991c2368ec82aaa09b9cc0aa6116f40e3ed39e16070ba6143dc1dc5bb8b68ca1
-
SSDEEP
768:9pHvvCIoy5KXddcilarMH+zBB55FSw/u5s96Sg9ZH1d2SVSP:HHv7oy5KXfzlarMH+zBB55FSw/MZH1q
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2332 msedge.exe 2332 msedge.exe 3660 msedge.exe 3660 msedge.exe 1872 identity_helper.exe 1872 identity_helper.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe 832 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3660 wrote to memory of 3000 3660 msedge.exe 84 PID 3660 wrote to memory of 3000 3660 msedge.exe 84 PID 3660 wrote to memory of 2664 3660 msedge.exe 85 PID 3660 wrote to memory of 2664 3660 msedge.exe 85 PID 3660 wrote to memory of 2664 3660 msedge.exe 85 PID 3660 wrote to memory of 2664 3660 msedge.exe 85 PID 3660 wrote to memory of 2664 3660 msedge.exe 85 PID 3660 wrote to memory of 2664 3660 msedge.exe 85 PID 3660 wrote to memory of 2664 3660 msedge.exe 85 PID 3660 wrote to memory of 2664 3660 msedge.exe 85 PID 3660 wrote to memory of 2664 3660 msedge.exe 85 PID 3660 wrote to memory of 2664 3660 msedge.exe 85 PID 3660 wrote to memory of 2664 3660 msedge.exe 85 PID 3660 wrote to memory of 2664 3660 msedge.exe 85 PID 3660 wrote to memory of 2664 3660 msedge.exe 85 PID 3660 wrote to memory of 2664 3660 msedge.exe 85 PID 3660 wrote to memory of 2664 3660 msedge.exe 85 PID 3660 wrote to memory of 2664 3660 msedge.exe 85 PID 3660 wrote to memory of 2664 3660 msedge.exe 85 PID 3660 wrote to memory of 2664 3660 msedge.exe 85 PID 3660 wrote to memory of 2664 3660 msedge.exe 85 PID 3660 wrote to memory of 2664 3660 msedge.exe 85 PID 3660 wrote to memory of 2664 3660 msedge.exe 85 PID 3660 wrote to memory of 2664 3660 msedge.exe 85 PID 3660 wrote to memory of 2664 3660 msedge.exe 85 PID 3660 wrote to memory of 2664 3660 msedge.exe 85 PID 3660 wrote to memory of 2664 3660 msedge.exe 85 PID 3660 wrote to memory of 2664 3660 msedge.exe 85 PID 3660 wrote to memory of 2664 3660 msedge.exe 85 PID 3660 wrote to memory of 2664 3660 msedge.exe 85 PID 3660 wrote to memory of 2664 3660 msedge.exe 85 PID 3660 wrote to memory of 2664 3660 msedge.exe 85 PID 3660 wrote to memory of 2664 3660 msedge.exe 85 PID 3660 wrote to memory of 2664 3660 msedge.exe 85 PID 3660 wrote to memory of 2664 3660 msedge.exe 85 PID 3660 wrote to memory of 2664 3660 msedge.exe 85 PID 3660 wrote to memory of 2664 3660 msedge.exe 85 PID 3660 wrote to memory of 2664 3660 msedge.exe 85 PID 3660 wrote to memory of 2664 3660 msedge.exe 85 PID 3660 wrote to memory of 2664 3660 msedge.exe 85 PID 3660 wrote to memory of 2664 3660 msedge.exe 85 PID 3660 wrote to memory of 2664 3660 msedge.exe 85 PID 3660 wrote to memory of 2332 3660 msedge.exe 86 PID 3660 wrote to memory of 2332 3660 msedge.exe 86 PID 3660 wrote to memory of 2384 3660 msedge.exe 87 PID 3660 wrote to memory of 2384 3660 msedge.exe 87 PID 3660 wrote to memory of 2384 3660 msedge.exe 87 PID 3660 wrote to memory of 2384 3660 msedge.exe 87 PID 3660 wrote to memory of 2384 3660 msedge.exe 87 PID 3660 wrote to memory of 2384 3660 msedge.exe 87 PID 3660 wrote to memory of 2384 3660 msedge.exe 87 PID 3660 wrote to memory of 2384 3660 msedge.exe 87 PID 3660 wrote to memory of 2384 3660 msedge.exe 87 PID 3660 wrote to memory of 2384 3660 msedge.exe 87 PID 3660 wrote to memory of 2384 3660 msedge.exe 87 PID 3660 wrote to memory of 2384 3660 msedge.exe 87 PID 3660 wrote to memory of 2384 3660 msedge.exe 87 PID 3660 wrote to memory of 2384 3660 msedge.exe 87 PID 3660 wrote to memory of 2384 3660 msedge.exe 87 PID 3660 wrote to memory of 2384 3660 msedge.exe 87 PID 3660 wrote to memory of 2384 3660 msedge.exe 87 PID 3660 wrote to memory of 2384 3660 msedge.exe 87 PID 3660 wrote to memory of 2384 3660 msedge.exe 87 PID 3660 wrote to memory of 2384 3660 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\59af16252beb186954fbd5f872de73e8_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3660 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffaaf9446f8,0x7ffaaf944708,0x7ffaaf9447182⤵PID:3000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,3484494864529284663,4860205516181954570,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:22⤵PID:2664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,3484494864529284663,4860205516181954570,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2224 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,3484494864529284663,4860205516181954570,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2732 /prefetch:82⤵PID:2384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,3484494864529284663,4860205516181954570,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3196 /prefetch:12⤵PID:2456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,3484494864529284663,4860205516181954570,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3204 /prefetch:12⤵PID:2320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,3484494864529284663,4860205516181954570,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4728 /prefetch:12⤵PID:5072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,3484494864529284663,4860205516181954570,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4840 /prefetch:12⤵PID:4396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,3484494864529284663,4860205516181954570,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5036 /prefetch:12⤵PID:4116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,3484494864529284663,4860205516181954570,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5512 /prefetch:12⤵PID:2980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,3484494864529284663,4860205516181954570,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2628 /prefetch:82⤵PID:4964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,3484494864529284663,4860205516181954570,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2628 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,3484494864529284663,4860205516181954570,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2656 /prefetch:12⤵PID:5076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,3484494864529284663,4860205516181954570,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5904 /prefetch:12⤵PID:3864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,3484494864529284663,4860205516181954570,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4148 /prefetch:12⤵PID:368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,3484494864529284663,4860205516181954570,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5180 /prefetch:12⤵PID:2772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,3484494864529284663,4860205516181954570,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5100 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:832
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1628
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2068
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5584971c8ba88c824fd51a05dddb45a98
SHA1b7c9489b4427652a9cdd754d1c1b6ac4034be421
SHA256e2d8de6c2323bbb3863ec50843d9b58a22e911fd626d31430658b9ea942cd307
SHA5125dbf1a4631a04d1149d8fab2b8e0e43ccd97b7212de43b961b9128a8bf03329164fdeb480154a8ffea5835f28417a7d2b115b8bf8d578d00b13c3682aa5ca726
-
Filesize
152B
MD5b28ef7d9f6d74f055cc49876767c886c
SHA1d6b3267f36c340979f8fc3e012fdd02c468740bf
SHA256fa6804456884789f4bdf9c3f5a4a8f29e0ededde149c4384072f3d8cc85bcc37
SHA512491f893c8f765e5d629bce8dd5067cef4e2ebc558d43bfb05e358bca43e1a66ee1285519bc266fd0ff5b5e09769a56077b62ac55fa8797c1edf6205843356e75
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD54eadaaa60c7e97e26df94b29ab579a0c
SHA103bf3d3f3aaae16535116af9a6cb11961d87cc53
SHA25663819580f3c54f00e3d6829f891f32542f1d2333a058f6163fa5e56bcf97032d
SHA512c7af10af6b9e5243ae55c533bf7eff3332ea379de829c2b4d59b94922f3ca1fc4b929367b6766a4d77d7e571c8010ff71f2979ff45bf69304ff55453d8801a2f
-
Filesize
925B
MD56b1fb3e92aff19cc679dd9ef93ca077b
SHA10da1bb3cf80f32c64f794b173dda26992ef46266
SHA25698c77ddf94eef3769c790745dda9c06353cf316a3582a6f6dee8b5b3d7ddffb4
SHA5126494c12a9714f873ffba6dd60aea463f9b537e4c2dd2ee537ce537868cf918c7eb70fdcc11c5e9208bd6bf25247ac38dcce2b10be2ebe933e22c339dee61c3a9
-
Filesize
5KB
MD5e8cde1dd51eb29aa158dafa74f70c242
SHA1c3ab614764238008bb930569840536c301ab39ac
SHA256087c01b251ddec81da3d266ce91936e6db68b5d2ad5668d36601b79f78e9d9e2
SHA5124320e18586125e6a769a894a09951d10377689a7506c4f877bf60b09cebb21c6e4646cbd1fa577de9bada194331ea6a71cc2d9e0e374fa6eff3203fbfde6a1b3
-
Filesize
6KB
MD5631e3136009f7e2d0e25a3a1ab52dbc5
SHA1b1458a9898997f5079b15472c7e2e14df2368dbe
SHA2562a121bff750f1682e2c1bf54f098b22fac646671bddf54932971ce4a3f627522
SHA5123f77c6702ae857b4f3f5c893e498bfb8167fa7fc59ccab483ba702574d00e59cd118ba0bb1f622c4d486526b195148960754b47bda72ec5647b07d9150018d5b
-
Filesize
6KB
MD56e3f730d2a42c43dd80182b8a263c20e
SHA1c33aa33c8f6cbe3a20105bf3a7cf429e94098baa
SHA2561138128db14f69e0c0c8f0659825d61c31efedcc8758356929bec10bfd7c8db9
SHA512e1908c2da2066cb7ce6a0e838a47116da6cd500dfa0ea94a2b67d1b1f692f7c4b413075611296a15f5874d598b957becad8650ab1139d3c6b29650b36ef1d5fb
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD50c749665a4ef78657e3a674b42d541d2
SHA14d76a75ce96f0f3b60452ab9dd6a56143c16c7a4
SHA25643d615037834dad8fc1a23edbffecfb353125e9c481a41dee74e8edfb00ade8c
SHA512c78fc2b7f66e350af75b70b64543d77af9f1d5ddaa690bbb9cf36e8bf7929a3dcd49e7fa5e1c7e34b1e71ded97acc6b5c4053218a9fc461dc302344830510411