Analysis
-
max time kernel
148s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
19/07/2024, 07:03
Static task
static1
Behavioral task
behavioral1
Sample
5ae9a921b82d845112d57b6c1cd19d82_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
5ae9a921b82d845112d57b6c1cd19d82_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
5ae9a921b82d845112d57b6c1cd19d82_JaffaCakes118.html
-
Size
23KB
-
MD5
5ae9a921b82d845112d57b6c1cd19d82
-
SHA1
cde0db44f52a74f92f47dd1f47ae1f7fa69240c9
-
SHA256
182174603ad02f2c9c19c9561b5440ae54bbce398157b4d83f2c5c3660088642
-
SHA512
1df74fb706ed394177dab6f2e0e9183b6a4240bab8f22e2797083363b2340124ecdea3601319c438812ab68ccb6e54e89df93a9e0183fc0caa3cfa7693ebfcbd
-
SSDEEP
384:SZOZOI4rasyt+iSmlidVp+cmNZxoZJzLWzavgbs1j4sh83WxzXskgDE4DmRDtY4/:SZOZOIdP07xzjLlb/Glm
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3300 msedge.exe 3300 msedge.exe 3680 msedge.exe 3680 msedge.exe 3592 identity_helper.exe 3592 identity_helper.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe 3680 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3680 wrote to memory of 3372 3680 msedge.exe 83 PID 3680 wrote to memory of 3372 3680 msedge.exe 83 PID 3680 wrote to memory of 3432 3680 msedge.exe 84 PID 3680 wrote to memory of 3432 3680 msedge.exe 84 PID 3680 wrote to memory of 3432 3680 msedge.exe 84 PID 3680 wrote to memory of 3432 3680 msedge.exe 84 PID 3680 wrote to memory of 3432 3680 msedge.exe 84 PID 3680 wrote to memory of 3432 3680 msedge.exe 84 PID 3680 wrote to memory of 3432 3680 msedge.exe 84 PID 3680 wrote to memory of 3432 3680 msedge.exe 84 PID 3680 wrote to memory of 3432 3680 msedge.exe 84 PID 3680 wrote to memory of 3432 3680 msedge.exe 84 PID 3680 wrote to memory of 3432 3680 msedge.exe 84 PID 3680 wrote to memory of 3432 3680 msedge.exe 84 PID 3680 wrote to memory of 3432 3680 msedge.exe 84 PID 3680 wrote to memory of 3432 3680 msedge.exe 84 PID 3680 wrote to memory of 3432 3680 msedge.exe 84 PID 3680 wrote to memory of 3432 3680 msedge.exe 84 PID 3680 wrote to memory of 3432 3680 msedge.exe 84 PID 3680 wrote to memory of 3432 3680 msedge.exe 84 PID 3680 wrote to memory of 3432 3680 msedge.exe 84 PID 3680 wrote to memory of 3432 3680 msedge.exe 84 PID 3680 wrote to memory of 3432 3680 msedge.exe 84 PID 3680 wrote to memory of 3432 3680 msedge.exe 84 PID 3680 wrote to memory of 3432 3680 msedge.exe 84 PID 3680 wrote to memory of 3432 3680 msedge.exe 84 PID 3680 wrote to memory of 3432 3680 msedge.exe 84 PID 3680 wrote to memory of 3432 3680 msedge.exe 84 PID 3680 wrote to memory of 3432 3680 msedge.exe 84 PID 3680 wrote to memory of 3432 3680 msedge.exe 84 PID 3680 wrote to memory of 3432 3680 msedge.exe 84 PID 3680 wrote to memory of 3432 3680 msedge.exe 84 PID 3680 wrote to memory of 3432 3680 msedge.exe 84 PID 3680 wrote to memory of 3432 3680 msedge.exe 84 PID 3680 wrote to memory of 3432 3680 msedge.exe 84 PID 3680 wrote to memory of 3432 3680 msedge.exe 84 PID 3680 wrote to memory of 3432 3680 msedge.exe 84 PID 3680 wrote to memory of 3432 3680 msedge.exe 84 PID 3680 wrote to memory of 3432 3680 msedge.exe 84 PID 3680 wrote to memory of 3432 3680 msedge.exe 84 PID 3680 wrote to memory of 3432 3680 msedge.exe 84 PID 3680 wrote to memory of 3432 3680 msedge.exe 84 PID 3680 wrote to memory of 3300 3680 msedge.exe 85 PID 3680 wrote to memory of 3300 3680 msedge.exe 85 PID 3680 wrote to memory of 3248 3680 msedge.exe 86 PID 3680 wrote to memory of 3248 3680 msedge.exe 86 PID 3680 wrote to memory of 3248 3680 msedge.exe 86 PID 3680 wrote to memory of 3248 3680 msedge.exe 86 PID 3680 wrote to memory of 3248 3680 msedge.exe 86 PID 3680 wrote to memory of 3248 3680 msedge.exe 86 PID 3680 wrote to memory of 3248 3680 msedge.exe 86 PID 3680 wrote to memory of 3248 3680 msedge.exe 86 PID 3680 wrote to memory of 3248 3680 msedge.exe 86 PID 3680 wrote to memory of 3248 3680 msedge.exe 86 PID 3680 wrote to memory of 3248 3680 msedge.exe 86 PID 3680 wrote to memory of 3248 3680 msedge.exe 86 PID 3680 wrote to memory of 3248 3680 msedge.exe 86 PID 3680 wrote to memory of 3248 3680 msedge.exe 86 PID 3680 wrote to memory of 3248 3680 msedge.exe 86 PID 3680 wrote to memory of 3248 3680 msedge.exe 86 PID 3680 wrote to memory of 3248 3680 msedge.exe 86 PID 3680 wrote to memory of 3248 3680 msedge.exe 86 PID 3680 wrote to memory of 3248 3680 msedge.exe 86 PID 3680 wrote to memory of 3248 3680 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\5ae9a921b82d845112d57b6c1cd19d82_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3680 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb750e46f8,0x7ffb750e4708,0x7ffb750e47182⤵PID:3372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2024,7595027616240440194,15955322100915167552,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2036 /prefetch:22⤵PID:3432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2024,7595027616240440194,15955322100915167552,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2352 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2024,7595027616240440194,15955322100915167552,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2704 /prefetch:82⤵PID:3248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,7595027616240440194,15955322100915167552,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:4272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,7595027616240440194,15955322100915167552,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,7595027616240440194,15955322100915167552,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4140 /prefetch:12⤵PID:1552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,7595027616240440194,15955322100915167552,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5592 /prefetch:12⤵PID:4900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2024,7595027616240440194,15955322100915167552,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6028 /prefetch:82⤵PID:1460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2024,7595027616240440194,15955322100915167552,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6028 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,7595027616240440194,15955322100915167552,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5524 /prefetch:12⤵PID:3992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,7595027616240440194,15955322100915167552,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4956 /prefetch:12⤵PID:3564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,7595027616240440194,15955322100915167552,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5332 /prefetch:12⤵PID:4132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,7595027616240440194,15955322100915167552,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4936 /prefetch:12⤵PID:4576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2024,7595027616240440194,15955322100915167552,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5256 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3540
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5032
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2248
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5584971c8ba88c824fd51a05dddb45a98
SHA1b7c9489b4427652a9cdd754d1c1b6ac4034be421
SHA256e2d8de6c2323bbb3863ec50843d9b58a22e911fd626d31430658b9ea942cd307
SHA5125dbf1a4631a04d1149d8fab2b8e0e43ccd97b7212de43b961b9128a8bf03329164fdeb480154a8ffea5835f28417a7d2b115b8bf8d578d00b13c3682aa5ca726
-
Filesize
152B
MD5b28ef7d9f6d74f055cc49876767c886c
SHA1d6b3267f36c340979f8fc3e012fdd02c468740bf
SHA256fa6804456884789f4bdf9c3f5a4a8f29e0ededde149c4384072f3d8cc85bcc37
SHA512491f893c8f765e5d629bce8dd5067cef4e2ebc558d43bfb05e358bca43e1a66ee1285519bc266fd0ff5b5e09769a56077b62ac55fa8797c1edf6205843356e75
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD5ce217cb2f35cafd3a5899e7867bbf857
SHA17a49f987e2fecb8f7852850153f893aa50dc4da6
SHA25674fc4c442f308c3ad9b6a7f01e65ef82131a278c496a1d1e3b0bb6392c714063
SHA51295cb541c985cd91dd3f5ee44608e6d01be249a9951c655324408f2748e2e475c5bae2ea1317e264af2af7102cc38dffb4c98ebb16226e82bfde00c1cf80aad3e
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
1KB
MD5b804304a088f820a6d7aaea238aa6619
SHA115c4cb8e2a12ec1a9e8fd3b1404857688ff7da1d
SHA25650c4763cd06c13e989e1066288d19ad802af92aaca3bb725030ceaea1fd5b49a
SHA512f2623b082bdaacbb9aeb6f0f84c563be0f62625fb2682ec8e88fd24283c60b802bda79485642c676f79e92af42d03328caf89af0acbe5d22ee44c549e7cf7650
-
Filesize
6KB
MD5cc25dc574f285baba2354a7c6418cf9c
SHA1f1ae5b75107facc7682a73ac8f34e8e48c5ff8e7
SHA25699972607bdc3214b4634feeab350cc606ac5506a27f72309cf556f70002d4743
SHA5120746e6f8ffa2670c50f012d0c3d91a25dd897da16328b7b474083ecac3c81f8b2182666cbf8e81999e24bafa399762307b205f7b6932c85b309e49a60b2f689d
-
Filesize
5KB
MD5e3081928c364eac54ac7cd0e4e8fd81f
SHA1a78d6bfd210936ca764c6626b8ac588304b2a6c3
SHA256488c799db12cd51c888468e624e2e8433d84b4c73a6e779760163c51b1c19442
SHA512e10f9e5e1c13433b562597384202cce867e8fc468c3c92e790346c461e27b4d76ee7636cb540ec491c1b5cfc0a592d48f8601f4c40ae55bb355fe2bb888f1c52
-
Filesize
706B
MD583c65265454fde4155c4be6da199dac5
SHA1e2c1fa41b2965ea37e76d93b9db1afd4edc9230c
SHA256d79e4a579e576f87bf5bbe86885718c3d40d8c35ba262a02e16513a28cc69e2c
SHA51258616a67420f23bcc84a77ac332a07c5e9b16eb102ff58ad49159415fe40c19f57ee6289f2bde00e656d8013ba400dfeceb5c3748c19f7e4fc73f39acc4fcfc2
-
Filesize
706B
MD5c358e86b57d288fab0e2a5b128fdeb63
SHA1ea5616fbf23e9d6bd1436458b24a11444eeda23c
SHA25611f262600fad70d84b0a2ab53e87d9aca0203dbbc7d4495d4386b8a072ccbc25
SHA512f9dcd4ea8450ab64a660046c6fbab8b7a85397dfb3da82a409fa38b73fe2b191d5dd1bebfacbcdf25f7ff99a9e6651f5873c0bbeaa9b9a80030f6d1dad24ce51
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5acf6e6318a37a8ee9de80e1dec7a9a79
SHA18fcf5dab951105b4c50d3496365ae87f946dc50f
SHA2566aa5450b2b55983d8600a5b0be7d7c035c5b6e73e05ea34eef17b7bb53f1fbb8
SHA512917ea48676946852319e4e1cf615f9f1cf0f94a95a3a4e95cda6c776e2184283c1134cc8eb08cf0ceabc282e3af920dd3cabd967ee3ab5acc6540cb27437ff2a