Analysis
-
max time kernel
145s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
19-07-2024 08:49
Static task
static1
Behavioral task
behavioral1
Sample
5b3b228f0f936bdf15a05078df6a3c9c_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
5b3b228f0f936bdf15a05078df6a3c9c_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
5b3b228f0f936bdf15a05078df6a3c9c_JaffaCakes118.html
-
Size
105KB
-
MD5
5b3b228f0f936bdf15a05078df6a3c9c
-
SHA1
e4eb4cfdf467cbfde2491eada4ff31aadbde2793
-
SHA256
5871c04ab74f11fa5d348afa01d652e41c7e694e44abd612b288d902d01bebb0
-
SHA512
496da4a1f9508877e3e5900731589775f6631331035f40ad7ff78c2db9ff6a6c693a4957ab7b2e1cb2d20088b28bd592a87fb9535bf945d8ae013da360632184
-
SSDEEP
1536:fpOrm46BGbSL5Y8V/YkHT/dAOeWHZLPccaw6E6dDk+Uevc1sVIWlonFnZspee2uM:I8deW5ptyyOs5jQn5X+zl
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4108 msedge.exe 4108 msedge.exe 964 msedge.exe 964 msedge.exe 4504 identity_helper.exe 4504 identity_helper.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe 964 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 964 wrote to memory of 3484 964 msedge.exe 83 PID 964 wrote to memory of 3484 964 msedge.exe 83 PID 964 wrote to memory of 1188 964 msedge.exe 84 PID 964 wrote to memory of 1188 964 msedge.exe 84 PID 964 wrote to memory of 1188 964 msedge.exe 84 PID 964 wrote to memory of 1188 964 msedge.exe 84 PID 964 wrote to memory of 1188 964 msedge.exe 84 PID 964 wrote to memory of 1188 964 msedge.exe 84 PID 964 wrote to memory of 1188 964 msedge.exe 84 PID 964 wrote to memory of 1188 964 msedge.exe 84 PID 964 wrote to memory of 1188 964 msedge.exe 84 PID 964 wrote to memory of 1188 964 msedge.exe 84 PID 964 wrote to memory of 1188 964 msedge.exe 84 PID 964 wrote to memory of 1188 964 msedge.exe 84 PID 964 wrote to memory of 1188 964 msedge.exe 84 PID 964 wrote to memory of 1188 964 msedge.exe 84 PID 964 wrote to memory of 1188 964 msedge.exe 84 PID 964 wrote to memory of 1188 964 msedge.exe 84 PID 964 wrote to memory of 1188 964 msedge.exe 84 PID 964 wrote to memory of 1188 964 msedge.exe 84 PID 964 wrote to memory of 1188 964 msedge.exe 84 PID 964 wrote to memory of 1188 964 msedge.exe 84 PID 964 wrote to memory of 1188 964 msedge.exe 84 PID 964 wrote to memory of 1188 964 msedge.exe 84 PID 964 wrote to memory of 1188 964 msedge.exe 84 PID 964 wrote to memory of 1188 964 msedge.exe 84 PID 964 wrote to memory of 1188 964 msedge.exe 84 PID 964 wrote to memory of 1188 964 msedge.exe 84 PID 964 wrote to memory of 1188 964 msedge.exe 84 PID 964 wrote to memory of 1188 964 msedge.exe 84 PID 964 wrote to memory of 1188 964 msedge.exe 84 PID 964 wrote to memory of 1188 964 msedge.exe 84 PID 964 wrote to memory of 1188 964 msedge.exe 84 PID 964 wrote to memory of 1188 964 msedge.exe 84 PID 964 wrote to memory of 1188 964 msedge.exe 84 PID 964 wrote to memory of 1188 964 msedge.exe 84 PID 964 wrote to memory of 1188 964 msedge.exe 84 PID 964 wrote to memory of 1188 964 msedge.exe 84 PID 964 wrote to memory of 1188 964 msedge.exe 84 PID 964 wrote to memory of 1188 964 msedge.exe 84 PID 964 wrote to memory of 1188 964 msedge.exe 84 PID 964 wrote to memory of 1188 964 msedge.exe 84 PID 964 wrote to memory of 4108 964 msedge.exe 85 PID 964 wrote to memory of 4108 964 msedge.exe 85 PID 964 wrote to memory of 3724 964 msedge.exe 86 PID 964 wrote to memory of 3724 964 msedge.exe 86 PID 964 wrote to memory of 3724 964 msedge.exe 86 PID 964 wrote to memory of 3724 964 msedge.exe 86 PID 964 wrote to memory of 3724 964 msedge.exe 86 PID 964 wrote to memory of 3724 964 msedge.exe 86 PID 964 wrote to memory of 3724 964 msedge.exe 86 PID 964 wrote to memory of 3724 964 msedge.exe 86 PID 964 wrote to memory of 3724 964 msedge.exe 86 PID 964 wrote to memory of 3724 964 msedge.exe 86 PID 964 wrote to memory of 3724 964 msedge.exe 86 PID 964 wrote to memory of 3724 964 msedge.exe 86 PID 964 wrote to memory of 3724 964 msedge.exe 86 PID 964 wrote to memory of 3724 964 msedge.exe 86 PID 964 wrote to memory of 3724 964 msedge.exe 86 PID 964 wrote to memory of 3724 964 msedge.exe 86 PID 964 wrote to memory of 3724 964 msedge.exe 86 PID 964 wrote to memory of 3724 964 msedge.exe 86 PID 964 wrote to memory of 3724 964 msedge.exe 86 PID 964 wrote to memory of 3724 964 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\5b3b228f0f936bdf15a05078df6a3c9c_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:964 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd3dcf46f8,0x7ffd3dcf4708,0x7ffd3dcf47182⤵PID:3484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2200,14070806438269439299,1250987773397714069,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2212 /prefetch:22⤵PID:1188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2200,14070806438269439299,1250987773397714069,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2268 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2200,14070806438269439299,1250987773397714069,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2944 /prefetch:82⤵PID:3724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,14070806438269439299,1250987773397714069,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:2312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,14070806438269439299,1250987773397714069,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3516 /prefetch:12⤵PID:4940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,14070806438269439299,1250987773397714069,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4748 /prefetch:12⤵PID:636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,14070806438269439299,1250987773397714069,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4752 /prefetch:12⤵PID:440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,14070806438269439299,1250987773397714069,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4792 /prefetch:12⤵PID:4036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2200,14070806438269439299,1250987773397714069,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5644 /prefetch:82⤵PID:2832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2200,14070806438269439299,1250987773397714069,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5644 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,14070806438269439299,1250987773397714069,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5288 /prefetch:12⤵PID:4600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,14070806438269439299,1250987773397714069,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5284 /prefetch:12⤵PID:1044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,14070806438269439299,1250987773397714069,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5952 /prefetch:12⤵PID:1240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,14070806438269439299,1250987773397714069,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6100 /prefetch:12⤵PID:1788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2200,14070806438269439299,1250987773397714069,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1792 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:684
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4216
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1592
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4480
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5eaaad45aced1889a90a8aa4c39f92659
SHA15c0130d9e8d1a64c97924090d9a5258b8a31b83c
SHA2565e3237f26b6047f64459cd5d3a6bc3563e2642b98d75b97011c93e0a9bd26f3b
SHA5120db1c6bdb51f4e6ba5ef4dc12fc73886e599ab28f1eec5d943110bc3d856401ca31c05baa9026dd441b69f3de92307eb77d93f089ba6e2b84eea6e93982620e4
-
Filesize
152B
MD53ee50fb26a9d3f096c47ff8696c24321
SHA1a8c83e798d2a8b31fec0820560525e80dfa4fe66
SHA256d80ec29cb17280af0c7522b30a80ffa19d1e786c0b09accfe3234b967d23eb6f
SHA512479c0d2b76850aa79b58f9e0a8ba5773bd8909d915b98c2e9dc3a95c0ac18d7741b2ee571df695c0305598d89651c7aef2ff7c2fedb8b6a6aa30057ecfc872c5
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize384B
MD59f5a89df5d9bb50852a21df61dc0ba69
SHA1215c9805b2ad7d02d3463d50c9ef662bdf786e92
SHA256694a48779888e227afe8a56ea8f3b20b62107270164ac38c3e0d97bc94874192
SHA512f3cb67061c583007fa6d8f7daa4de6d3eb85a3d7bf2f2454092977a60696bd7cd66b5f62c796306736842e10de18106bfd075099c2db43093a0a6c65e835de62
-
Filesize
1KB
MD5fa06886edaf56d9998406e7d8731bdd4
SHA14891e9b16414a3e9179d8e5194766d5fff8453ec
SHA256c2cd2d95de667f70e6cd05f42d059dea3b12d360c9c039f69467323b8e57e753
SHA51286c4f4020050f09897c44bfbce7f11d04295ed7e55348672a3279cd74bdd32e5b6f449a4214bc941d11b46355e1f31bb7be744e81949a1eeab2199251be4dd41
-
Filesize
1KB
MD5f50695000d6b01f063fc15cf3d183216
SHA1f007c0bfdc1157e021e7595418184fba07cd4d62
SHA25688f23de89a968c16b4663735655eb7afee0e5bb24f96b2d3862727ec0b124c40
SHA51253c91a4d3518a913fa65f4a93af12b0231de3c01dcb2ddcee2e3f759b33b2101129285d24200c4a37a554cf20f91fbc1c30d9ae94171854df432109f84e8aa07
-
Filesize
6KB
MD5562c4a10bb804334bede02d4c2418b75
SHA17da7b5c9e29418d05ee5511b0202499674f71e3b
SHA256a3c44186b5c60a715b82b71f3233186ecbdb2d73ea031e604b762cb4a3538fa5
SHA5129e236486890ddaefd6a236da2d35212aa3e1ad2e1eea51cbd442e7cc7296187a05748833b8320b7f3a1169bc6b787c19d487f7bfdef58636e85c9c93696da207
-
Filesize
5KB
MD55a1b4b17510fa2bec96596507de785c3
SHA11eedf5fda39191129f7540157e1a8135a83b7a38
SHA25688f371b33b9cee9dd2fe04042054c1f986bc99410e0ead12d76f3854fdb8a643
SHA5122650c1ee90c9d68ec8d093a8113126301613e98ce433f37083936cf178bf08bd59acf65728748ec94ba621288b100dd2f4baf740769eee8468569c596c6dc3fc
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5896523553362b8cdf74586af3d42cc0e
SHA12bc0826b94a63e09525e4def43317dbf0d6632b0
SHA25646f7389e4795ecfd00af045887f0706452edbbc6ba0183ea4b91f28c3c6b2443
SHA512da836ff6ad3ed03d52cf9b6a49f74743f23f8414ee9f2089f11188dfb0084c4a975adaaef3d9668bf074c4f5817c5ee5645ba073b1496901f8bd0c73ba72922c