Analysis
-
max time kernel
145s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
19-07-2024 19:22
Static task
static1
Behavioral task
behavioral1
Sample
5d521e01effc6d96a777c7cef6c88ba1_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
5d521e01effc6d96a777c7cef6c88ba1_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
5d521e01effc6d96a777c7cef6c88ba1_JaffaCakes118.html
-
Size
19KB
-
MD5
5d521e01effc6d96a777c7cef6c88ba1
-
SHA1
a0e3371b285e2d6a82fcf6d6d216d445e32a3835
-
SHA256
9045c08e5946603b7b1ad29fae7347a91b33336122bd49d2f3b95c8a66bed1a0
-
SHA512
b36c3f4ae3a4596470c41c4bf8ce35df4bd5e8afe4fa0a9a07146e89d6174255c73c5fec5bcce739411e75f54338e696bbca8fe65554d1f75f648e052ff91122
-
SSDEEP
384:4+QfPFd9QZBC7mOdMYCtKfpC5IgSnbmFe7Acw96z8LAPd:Zcd9QZBC7mOdMYHpC5I9nC4ZPd
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3848 msedge.exe 3848 msedge.exe 2184 msedge.exe 2184 msedge.exe 216 identity_helper.exe 216 identity_helper.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2184 wrote to memory of 1336 2184 msedge.exe 84 PID 2184 wrote to memory of 1336 2184 msedge.exe 84 PID 2184 wrote to memory of 3388 2184 msedge.exe 85 PID 2184 wrote to memory of 3388 2184 msedge.exe 85 PID 2184 wrote to memory of 3388 2184 msedge.exe 85 PID 2184 wrote to memory of 3388 2184 msedge.exe 85 PID 2184 wrote to memory of 3388 2184 msedge.exe 85 PID 2184 wrote to memory of 3388 2184 msedge.exe 85 PID 2184 wrote to memory of 3388 2184 msedge.exe 85 PID 2184 wrote to memory of 3388 2184 msedge.exe 85 PID 2184 wrote to memory of 3388 2184 msedge.exe 85 PID 2184 wrote to memory of 3388 2184 msedge.exe 85 PID 2184 wrote to memory of 3388 2184 msedge.exe 85 PID 2184 wrote to memory of 3388 2184 msedge.exe 85 PID 2184 wrote to memory of 3388 2184 msedge.exe 85 PID 2184 wrote to memory of 3388 2184 msedge.exe 85 PID 2184 wrote to memory of 3388 2184 msedge.exe 85 PID 2184 wrote to memory of 3388 2184 msedge.exe 85 PID 2184 wrote to memory of 3388 2184 msedge.exe 85 PID 2184 wrote to memory of 3388 2184 msedge.exe 85 PID 2184 wrote to memory of 3388 2184 msedge.exe 85 PID 2184 wrote to memory of 3388 2184 msedge.exe 85 PID 2184 wrote to memory of 3388 2184 msedge.exe 85 PID 2184 wrote to memory of 3388 2184 msedge.exe 85 PID 2184 wrote to memory of 3388 2184 msedge.exe 85 PID 2184 wrote to memory of 3388 2184 msedge.exe 85 PID 2184 wrote to memory of 3388 2184 msedge.exe 85 PID 2184 wrote to memory of 3388 2184 msedge.exe 85 PID 2184 wrote to memory of 3388 2184 msedge.exe 85 PID 2184 wrote to memory of 3388 2184 msedge.exe 85 PID 2184 wrote to memory of 3388 2184 msedge.exe 85 PID 2184 wrote to memory of 3388 2184 msedge.exe 85 PID 2184 wrote to memory of 3388 2184 msedge.exe 85 PID 2184 wrote to memory of 3388 2184 msedge.exe 85 PID 2184 wrote to memory of 3388 2184 msedge.exe 85 PID 2184 wrote to memory of 3388 2184 msedge.exe 85 PID 2184 wrote to memory of 3388 2184 msedge.exe 85 PID 2184 wrote to memory of 3388 2184 msedge.exe 85 PID 2184 wrote to memory of 3388 2184 msedge.exe 85 PID 2184 wrote to memory of 3388 2184 msedge.exe 85 PID 2184 wrote to memory of 3388 2184 msedge.exe 85 PID 2184 wrote to memory of 3388 2184 msedge.exe 85 PID 2184 wrote to memory of 3848 2184 msedge.exe 86 PID 2184 wrote to memory of 3848 2184 msedge.exe 86 PID 2184 wrote to memory of 3996 2184 msedge.exe 87 PID 2184 wrote to memory of 3996 2184 msedge.exe 87 PID 2184 wrote to memory of 3996 2184 msedge.exe 87 PID 2184 wrote to memory of 3996 2184 msedge.exe 87 PID 2184 wrote to memory of 3996 2184 msedge.exe 87 PID 2184 wrote to memory of 3996 2184 msedge.exe 87 PID 2184 wrote to memory of 3996 2184 msedge.exe 87 PID 2184 wrote to memory of 3996 2184 msedge.exe 87 PID 2184 wrote to memory of 3996 2184 msedge.exe 87 PID 2184 wrote to memory of 3996 2184 msedge.exe 87 PID 2184 wrote to memory of 3996 2184 msedge.exe 87 PID 2184 wrote to memory of 3996 2184 msedge.exe 87 PID 2184 wrote to memory of 3996 2184 msedge.exe 87 PID 2184 wrote to memory of 3996 2184 msedge.exe 87 PID 2184 wrote to memory of 3996 2184 msedge.exe 87 PID 2184 wrote to memory of 3996 2184 msedge.exe 87 PID 2184 wrote to memory of 3996 2184 msedge.exe 87 PID 2184 wrote to memory of 3996 2184 msedge.exe 87 PID 2184 wrote to memory of 3996 2184 msedge.exe 87 PID 2184 wrote to memory of 3996 2184 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\5d521e01effc6d96a777c7cef6c88ba1_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9fae146f8,0x7ff9fae14708,0x7ff9fae147182⤵PID:1336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,17855009263378286105,2295289998386821958,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:22⤵PID:3388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,17855009263378286105,2295289998386821958,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2320 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,17855009263378286105,2295289998386821958,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2848 /prefetch:82⤵PID:3996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,17855009263378286105,2295289998386821958,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3192 /prefetch:12⤵PID:4640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,17855009263378286105,2295289998386821958,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3204 /prefetch:12⤵PID:3068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,17855009263378286105,2295289998386821958,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4188 /prefetch:12⤵PID:3800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,17855009263378286105,2295289998386821958,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4212 /prefetch:12⤵PID:1188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,17855009263378286105,2295289998386821958,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4892 /prefetch:12⤵PID:5016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,17855009263378286105,2295289998386821958,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6236 /prefetch:82⤵PID:2976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,17855009263378286105,2295289998386821958,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6236 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,17855009263378286105,2295289998386821958,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6152 /prefetch:12⤵PID:2856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,17855009263378286105,2295289998386821958,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6096 /prefetch:12⤵PID:4220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,17855009263378286105,2295289998386821958,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6256 /prefetch:12⤵PID:2932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,17855009263378286105,2295289998386821958,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5396 /prefetch:12⤵PID:2320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,17855009263378286105,2295289998386821958,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3860 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:752
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1356
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3300
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d406f3135e11b0a0829109c1090a41dc
SHA1810f00e803c17274f9af074fc6c47849ad6e873e
SHA25691f57909a10174b06c862089a9c1f3b3aeafea74a70ee1942ce11bb80d9eace4
SHA5122b9f0f94b1e8a1b62ab38af8df2add0ec9e4c6dfa94d9c84cc24fe86d2d57d4fc0d9ec8a9775cf42a859ddfd130260128185a0e2588992bca8fd4ebf5ee6d409
-
Filesize
152B
MD57f37f119665df6beaa925337bbff0e84
SHA1c2601d11f8aa77e12ab3508479cbf20c27cbd865
SHA2561073dbff3ec315ac85361c35c8ba791cc4198149b097c7b287dda1d791925027
SHA5128e180e41dd27c51e81788564b19b8ff411028890da506fbf767d394b1e73ec53e046c8d07235b2ec7c1c593c976bbf74ed9b7d442d68b526a0a77a9b5b0ab817
-
Filesize
211KB
MD5151fb811968eaf8efb840908b89dc9d4
SHA17ec811009fd9b0e6d92d12d78b002275f2f1bee1
SHA256043fd8558e4a5a60aaccd2f0377f77a544e3e375242e9d7200dc6e51f94103ed
SHA51283aface0ab01da52fd077f747c9d5916e3c06b0ea5c551d7d316707ec3e8f3f986ce1c82e6f2136e48c6511a83cb0ac67ff6dc8f0e440ac72fc6854086a87674
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize504B
MD5a3cb8a2468ab985140ee3f00680d54c9
SHA138072c7798ee2cc017cb8d03124f19f3f1826061
SHA256e493703355a3c89df80c9120b5e523afb0210e92f4c720cce9e8600632a610ad
SHA512c13082d9c44454a40586c8891630ab7faa4420d1ed0751b56bdf189897ae5257505eb9759614ff2fe8acca02bd0b2af6de5aec637d30276517c5293a04b907ac
-
Filesize
1KB
MD55da4f98b9244a23e7c8b3a396caf77eb
SHA1fbc0d1053f57646df07e35080244926793cbce07
SHA256606e2d99ef440d3d31c53c2e84445262114666afa47776d94be54c63948512c7
SHA512c8086a5b6a618db435381ac0488edc059d8fcf3f7f1386c760d346ce31506865d9fc2d486a90978aecdde42a11cd4e4df21f8d8ebacb819c175065a71bd8bccb
-
Filesize
5KB
MD50167cb8f3908edb563af037497697bc0
SHA1c0e8b1940fb5ff0fa3f63f6316f6f7a8c3446822
SHA2561a188f7da387addde58968b167e6e551aff00abb8a2cca0513e1b8fd9cefc93e
SHA5120b045039cf4ae348cc713566501710edf129ba47d96c541c177b55f79b58c7c4cb4246c3f3757b8907d494bc276478ceb7c45f1cfb8ad051e1fc9973e7af9ffe
-
Filesize
6KB
MD50a442fde00a7e983b90afa1f9fc0655f
SHA1ebb477a4ba12b5659e8a7885decaa48f5ef0db38
SHA2565ea98a2ccd1ef741aceafc02d1d9a389c4e9794adbbbcdcceaf7e422e12f5036
SHA5122a2659b1095f5cfdb255e0b3afd6664b584cf81663922c1e2b6595833292d3273fa23875e9fdd4375f42b161cf7cddede0ba40947e587d4be844d47703b191ba
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD592d11c3481fbfa606048abd71689f619
SHA1d5f838f03c7ee6c0aeab05a57fe5a8d6eac19d85
SHA256e23cd477f7906cd6a7c708a2a0f7e7c131913ec7d68f08039f732b4525e7fc78
SHA51282a0d8e0b6d5956e96043502dc684f408b10b62b9a5aa21ab85876168b1148e0bf6d2bf97f9fe604dab43d7e7d1f550d3e5539a66b78e4531022d73a480035ea