Analysis
-
max time kernel
145s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
19-07-2024 18:32
Static task
static1
Behavioral task
behavioral1
Sample
5d288e36599b6c42ea52832b7f734315_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
5d288e36599b6c42ea52832b7f734315_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
5d288e36599b6c42ea52832b7f734315_JaffaCakes118.html
-
Size
131KB
-
MD5
5d288e36599b6c42ea52832b7f734315
-
SHA1
b38da47150a5b8350dafc2716fa3525a471b3ecb
-
SHA256
6557dd1b24e4eb89201f40c2b01a878069c6c61fe1afe0aef6847dbbfde314c7
-
SHA512
1e7d54e4a5a5107dc11e91383b59f850ad68cf9eeee714fcd027754a4ff98f580581fd896eb424f2ce6aff42c09f9ba1f8701ca908243ee63d7684031dfc4121
-
SSDEEP
3072:zUcjvG8rMUcXmNRS72p6jeh83bIcDxWPESs3Kh:hGXmNRxP/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3428 msedge.exe 3428 msedge.exe 2304 msedge.exe 2304 msedge.exe 1340 identity_helper.exe 1340 identity_helper.exe 2832 msedge.exe 2832 msedge.exe 2832 msedge.exe 2832 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2304 wrote to memory of 5112 2304 msedge.exe 84 PID 2304 wrote to memory of 5112 2304 msedge.exe 84 PID 2304 wrote to memory of 2728 2304 msedge.exe 85 PID 2304 wrote to memory of 2728 2304 msedge.exe 85 PID 2304 wrote to memory of 2728 2304 msedge.exe 85 PID 2304 wrote to memory of 2728 2304 msedge.exe 85 PID 2304 wrote to memory of 2728 2304 msedge.exe 85 PID 2304 wrote to memory of 2728 2304 msedge.exe 85 PID 2304 wrote to memory of 2728 2304 msedge.exe 85 PID 2304 wrote to memory of 2728 2304 msedge.exe 85 PID 2304 wrote to memory of 2728 2304 msedge.exe 85 PID 2304 wrote to memory of 2728 2304 msedge.exe 85 PID 2304 wrote to memory of 2728 2304 msedge.exe 85 PID 2304 wrote to memory of 2728 2304 msedge.exe 85 PID 2304 wrote to memory of 2728 2304 msedge.exe 85 PID 2304 wrote to memory of 2728 2304 msedge.exe 85 PID 2304 wrote to memory of 2728 2304 msedge.exe 85 PID 2304 wrote to memory of 2728 2304 msedge.exe 85 PID 2304 wrote to memory of 2728 2304 msedge.exe 85 PID 2304 wrote to memory of 2728 2304 msedge.exe 85 PID 2304 wrote to memory of 2728 2304 msedge.exe 85 PID 2304 wrote to memory of 2728 2304 msedge.exe 85 PID 2304 wrote to memory of 2728 2304 msedge.exe 85 PID 2304 wrote to memory of 2728 2304 msedge.exe 85 PID 2304 wrote to memory of 2728 2304 msedge.exe 85 PID 2304 wrote to memory of 2728 2304 msedge.exe 85 PID 2304 wrote to memory of 2728 2304 msedge.exe 85 PID 2304 wrote to memory of 2728 2304 msedge.exe 85 PID 2304 wrote to memory of 2728 2304 msedge.exe 85 PID 2304 wrote to memory of 2728 2304 msedge.exe 85 PID 2304 wrote to memory of 2728 2304 msedge.exe 85 PID 2304 wrote to memory of 2728 2304 msedge.exe 85 PID 2304 wrote to memory of 2728 2304 msedge.exe 85 PID 2304 wrote to memory of 2728 2304 msedge.exe 85 PID 2304 wrote to memory of 2728 2304 msedge.exe 85 PID 2304 wrote to memory of 2728 2304 msedge.exe 85 PID 2304 wrote to memory of 2728 2304 msedge.exe 85 PID 2304 wrote to memory of 2728 2304 msedge.exe 85 PID 2304 wrote to memory of 2728 2304 msedge.exe 85 PID 2304 wrote to memory of 2728 2304 msedge.exe 85 PID 2304 wrote to memory of 2728 2304 msedge.exe 85 PID 2304 wrote to memory of 2728 2304 msedge.exe 85 PID 2304 wrote to memory of 3428 2304 msedge.exe 86 PID 2304 wrote to memory of 3428 2304 msedge.exe 86 PID 2304 wrote to memory of 2652 2304 msedge.exe 87 PID 2304 wrote to memory of 2652 2304 msedge.exe 87 PID 2304 wrote to memory of 2652 2304 msedge.exe 87 PID 2304 wrote to memory of 2652 2304 msedge.exe 87 PID 2304 wrote to memory of 2652 2304 msedge.exe 87 PID 2304 wrote to memory of 2652 2304 msedge.exe 87 PID 2304 wrote to memory of 2652 2304 msedge.exe 87 PID 2304 wrote to memory of 2652 2304 msedge.exe 87 PID 2304 wrote to memory of 2652 2304 msedge.exe 87 PID 2304 wrote to memory of 2652 2304 msedge.exe 87 PID 2304 wrote to memory of 2652 2304 msedge.exe 87 PID 2304 wrote to memory of 2652 2304 msedge.exe 87 PID 2304 wrote to memory of 2652 2304 msedge.exe 87 PID 2304 wrote to memory of 2652 2304 msedge.exe 87 PID 2304 wrote to memory of 2652 2304 msedge.exe 87 PID 2304 wrote to memory of 2652 2304 msedge.exe 87 PID 2304 wrote to memory of 2652 2304 msedge.exe 87 PID 2304 wrote to memory of 2652 2304 msedge.exe 87 PID 2304 wrote to memory of 2652 2304 msedge.exe 87 PID 2304 wrote to memory of 2652 2304 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\5d288e36599b6c42ea52832b7f734315_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbcf3246f8,0x7ffbcf324708,0x7ffbcf3247182⤵PID:5112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2244,15217685454764046658,10583999158234384250,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2216 /prefetch:22⤵PID:2728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2244,15217685454764046658,10583999158234384250,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2452 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2244,15217685454764046658,10583999158234384250,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2796 /prefetch:82⤵PID:2652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,15217685454764046658,10583999158234384250,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:3172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,15217685454764046658,10583999158234384250,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:2692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,15217685454764046658,10583999158234384250,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5840 /prefetch:12⤵PID:5104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2244,15217685454764046658,10583999158234384250,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5580 /prefetch:82⤵PID:3148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2244,15217685454764046658,10583999158234384250,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5580 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,15217685454764046658,10583999158234384250,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6052 /prefetch:12⤵PID:3652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,15217685454764046658,10583999158234384250,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5716 /prefetch:12⤵PID:2488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,15217685454764046658,10583999158234384250,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5084 /prefetch:12⤵PID:1960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,15217685454764046658,10583999158234384250,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5576 /prefetch:12⤵PID:1580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2244,15217685454764046658,10583999158234384250,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4824 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2832
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1344
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:748
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52f842025e22e522658c640cfc7edc529
SHA14c2b24b02709acdd159f1b9bbeb396e52af27033
SHA2561191573f2a7c12f0b9b8460e06dc36ca5386305eb8c883ebbbc8eb15f4d8e23e
SHA5126e4393fd43984722229020ef662fc5981f253de31f13f30fadd6660bbc9ededcbfd163f132f6adaf42d435873322a5d0d3eea60060cf0e7f2e256262632c5d05
-
Filesize
152B
MD554aadd2d8ec66e446f1edb466b99ba8d
SHA1a94f02b035dc918d8d9a46e6886413f15be5bff0
SHA2561971045943002ef01930add9ba1a96a92ddc10d6c581ce29e33c38c2120b130e
SHA5127e077f903463da60b5587aed4f5352060df400ebda713b602b88c15cb2f91076531ea07546a9352df772656065e0bf27bd285905a60f036a5c5951076d35e994
-
Filesize
21KB
MD5842969383c00d89ecc360dbf56ae1fe4
SHA18bc07ddd709b367e90b91eb9be5422242f2a1a72
SHA256d550afde14a7f853f43932fd40d1a586573e507f4b4a7761e8d8abddfb70808a
SHA512881c5ab66a00071968ec0f781cb3b31e9c7be5404aa70339f1930669f7738307051f10b491988dc55e201e6877cdc9ca626821b8071e22b413683d793dbd4560
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD5e77c1a00dee74a852e8a338c22e4b4e2
SHA177a01a855e3fef6cd161c8cb26a4ba0922368850
SHA25621d96b92e84cb81be22c2769a5e38eb10a606c0eda0a9d6eab3091bb0d2a038d
SHA5125ea243d916bb111c0eba0fdc6758853ac68fd7a27ac62fc2e7375aefd1a74993d4efe882cd44e21f70fdf1b3ee1a15ca7e749c621fd7423b4758190191d24f5c
-
Filesize
1KB
MD5d3a038c76f5052b3115aabdcf8af0ba5
SHA17e12633f99013c91a18d8fe985b11471ea95174e
SHA256f35f92534b3ae734199c31f71495831eace7c4fff066309dce7f4a62b0c0e79b
SHA5128cfb508f61e3be87bbb6d1d56d21d8c472eb22684f56e899b7a29513dd512df50afcb1b6c33474f14248c609eb7b1d85d4a84d5856d7a9c0a3b95268c31d6e26
-
Filesize
5KB
MD5b4fbf3a30964a9121079a48c9d453010
SHA1d46a0269252cdc8db5697f7617dcca3f3cf809de
SHA256c7d9449293d1b381af606c83f8b76df7bdfb7f9a9ae10ee10931203c3f61c306
SHA512d113b9b3e13e54a8d056921a89bc9df267ab39f614f811dd9e09d301575226d308e568baf3707223865276f3a88d1ef9fef1da6cf5c6d3134eb7f022074ada31
-
Filesize
7KB
MD534b4b22c5f8186c0828f8daabc3f676b
SHA1b65b2b4129a694f3c9903f259f8b432bc77e66f5
SHA25698734e79739a99d79699d16973b87dcd051d0ea52d3bc744cf5db308b3c1bde1
SHA512ce2f5eb99516ac4ec1c3ca80fc33384e6d768b131abb0299f81588a08d47b54cd75a0f0c8f34792e1ac0737d6865f122e0a008e63ad5ee226abd8f19afcaeaae
-
Filesize
6KB
MD5f545bbf75bf7f0277cea27c127efca0c
SHA1c5b2cac2d2b16336713233e48626772be7e1ea14
SHA256b5dd2c812ca98b94c6186d36a4094d4994d6fe5cdda90340c0dca2797cd52349
SHA512d7fc4f0b50a7f64a51878ff672de3e9bce980e5f3e29ea10f95d19050e60967eb012086ff731fe427b768fd136ac14289a08a527f8d43f82a6ff010e70e2c4f4
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD50011d96f55fae0c6d43c6c9d06b088a1
SHA1b39cd22967af9d81436e436fd4ed8090f4d9b8ea
SHA256ac5fb2568b0509a20ba0a8d459e61593ef2568773d329f7afe98e1e0644c4984
SHA512cf5a95c6568af8c1f4e2ac5273892229f4e9708d9cea00280cdafd3828fd5d77c4ba0210cffeea1a667039cc4c0515f52145a39cf00184c54fa074cf1430ed58