Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
20/07/2024, 22:44
Static task
static1
Behavioral task
behavioral1
Sample
604854b0a5ec22899de9926f3347532d_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
604854b0a5ec22899de9926f3347532d_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
604854b0a5ec22899de9926f3347532d_JaffaCakes118.html
-
Size
38KB
-
MD5
604854b0a5ec22899de9926f3347532d
-
SHA1
288efc73d76fd2e12182819193867e21ad897585
-
SHA256
360ecea270537ee3e31004f776c342c2f5b69e3f43e6e51dcf8290231877cd0c
-
SHA512
47e081e39abac8cf4325d4dbbfe6106721fb228d515a517d12c6f900155af9932e2f1b296cce893e4d23417cc743cd255d47543f2229023973265454c099860a
-
SSDEEP
384:zSlyelOI9X1F2z2yObycPgjaXCbY7V915jBE7J3Cm3tIBu:g/9X1IHdsV915O7J3CKag
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2180 msedge.exe 2180 msedge.exe 1156 msedge.exe 1156 msedge.exe 3060 identity_helper.exe 3060 identity_helper.exe 6104 msedge.exe 6104 msedge.exe 6104 msedge.exe 6104 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 1156 msedge.exe 1156 msedge.exe 1156 msedge.exe 1156 msedge.exe 1156 msedge.exe 1156 msedge.exe 1156 msedge.exe 1156 msedge.exe 1156 msedge.exe 1156 msedge.exe 1156 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1156 msedge.exe 1156 msedge.exe 1156 msedge.exe 1156 msedge.exe 1156 msedge.exe 1156 msedge.exe 1156 msedge.exe 1156 msedge.exe 1156 msedge.exe 1156 msedge.exe 1156 msedge.exe 1156 msedge.exe 1156 msedge.exe 1156 msedge.exe 1156 msedge.exe 1156 msedge.exe 1156 msedge.exe 1156 msedge.exe 1156 msedge.exe 1156 msedge.exe 1156 msedge.exe 1156 msedge.exe 1156 msedge.exe 1156 msedge.exe 1156 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1156 msedge.exe 1156 msedge.exe 1156 msedge.exe 1156 msedge.exe 1156 msedge.exe 1156 msedge.exe 1156 msedge.exe 1156 msedge.exe 1156 msedge.exe 1156 msedge.exe 1156 msedge.exe 1156 msedge.exe 1156 msedge.exe 1156 msedge.exe 1156 msedge.exe 1156 msedge.exe 1156 msedge.exe 1156 msedge.exe 1156 msedge.exe 1156 msedge.exe 1156 msedge.exe 1156 msedge.exe 1156 msedge.exe 1156 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1156 wrote to memory of 896 1156 msedge.exe 84 PID 1156 wrote to memory of 896 1156 msedge.exe 84 PID 1156 wrote to memory of 4448 1156 msedge.exe 85 PID 1156 wrote to memory of 4448 1156 msedge.exe 85 PID 1156 wrote to memory of 4448 1156 msedge.exe 85 PID 1156 wrote to memory of 4448 1156 msedge.exe 85 PID 1156 wrote to memory of 4448 1156 msedge.exe 85 PID 1156 wrote to memory of 4448 1156 msedge.exe 85 PID 1156 wrote to memory of 4448 1156 msedge.exe 85 PID 1156 wrote to memory of 4448 1156 msedge.exe 85 PID 1156 wrote to memory of 4448 1156 msedge.exe 85 PID 1156 wrote to memory of 4448 1156 msedge.exe 85 PID 1156 wrote to memory of 4448 1156 msedge.exe 85 PID 1156 wrote to memory of 4448 1156 msedge.exe 85 PID 1156 wrote to memory of 4448 1156 msedge.exe 85 PID 1156 wrote to memory of 4448 1156 msedge.exe 85 PID 1156 wrote to memory of 4448 1156 msedge.exe 85 PID 1156 wrote to memory of 4448 1156 msedge.exe 85 PID 1156 wrote to memory of 4448 1156 msedge.exe 85 PID 1156 wrote to memory of 4448 1156 msedge.exe 85 PID 1156 wrote to memory of 4448 1156 msedge.exe 85 PID 1156 wrote to memory of 4448 1156 msedge.exe 85 PID 1156 wrote to memory of 4448 1156 msedge.exe 85 PID 1156 wrote to memory of 4448 1156 msedge.exe 85 PID 1156 wrote to memory of 4448 1156 msedge.exe 85 PID 1156 wrote to memory of 4448 1156 msedge.exe 85 PID 1156 wrote to memory of 4448 1156 msedge.exe 85 PID 1156 wrote to memory of 4448 1156 msedge.exe 85 PID 1156 wrote to memory of 4448 1156 msedge.exe 85 PID 1156 wrote to memory of 4448 1156 msedge.exe 85 PID 1156 wrote to memory of 4448 1156 msedge.exe 85 PID 1156 wrote to memory of 4448 1156 msedge.exe 85 PID 1156 wrote to memory of 4448 1156 msedge.exe 85 PID 1156 wrote to memory of 4448 1156 msedge.exe 85 PID 1156 wrote to memory of 4448 1156 msedge.exe 85 PID 1156 wrote to memory of 4448 1156 msedge.exe 85 PID 1156 wrote to memory of 4448 1156 msedge.exe 85 PID 1156 wrote to memory of 4448 1156 msedge.exe 85 PID 1156 wrote to memory of 4448 1156 msedge.exe 85 PID 1156 wrote to memory of 4448 1156 msedge.exe 85 PID 1156 wrote to memory of 4448 1156 msedge.exe 85 PID 1156 wrote to memory of 4448 1156 msedge.exe 85 PID 1156 wrote to memory of 2180 1156 msedge.exe 86 PID 1156 wrote to memory of 2180 1156 msedge.exe 86 PID 1156 wrote to memory of 3948 1156 msedge.exe 87 PID 1156 wrote to memory of 3948 1156 msedge.exe 87 PID 1156 wrote to memory of 3948 1156 msedge.exe 87 PID 1156 wrote to memory of 3948 1156 msedge.exe 87 PID 1156 wrote to memory of 3948 1156 msedge.exe 87 PID 1156 wrote to memory of 3948 1156 msedge.exe 87 PID 1156 wrote to memory of 3948 1156 msedge.exe 87 PID 1156 wrote to memory of 3948 1156 msedge.exe 87 PID 1156 wrote to memory of 3948 1156 msedge.exe 87 PID 1156 wrote to memory of 3948 1156 msedge.exe 87 PID 1156 wrote to memory of 3948 1156 msedge.exe 87 PID 1156 wrote to memory of 3948 1156 msedge.exe 87 PID 1156 wrote to memory of 3948 1156 msedge.exe 87 PID 1156 wrote to memory of 3948 1156 msedge.exe 87 PID 1156 wrote to memory of 3948 1156 msedge.exe 87 PID 1156 wrote to memory of 3948 1156 msedge.exe 87 PID 1156 wrote to memory of 3948 1156 msedge.exe 87 PID 1156 wrote to memory of 3948 1156 msedge.exe 87 PID 1156 wrote to memory of 3948 1156 msedge.exe 87 PID 1156 wrote to memory of 3948 1156 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\604854b0a5ec22899de9926f3347532d_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1156 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9428746f8,0x7ff942874708,0x7ff9428747182⤵PID:896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2220,15440215819116396784,16240340754705420110,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2212 /prefetch:22⤵PID:4448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2220,15440215819116396784,16240340754705420110,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2296 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2220,15440215819116396784,16240340754705420110,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2868 /prefetch:82⤵PID:3948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,15440215819116396784,16240340754705420110,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:3884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,15440215819116396784,16240340754705420110,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:3292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,15440215819116396784,16240340754705420110,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4748 /prefetch:12⤵PID:4332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,15440215819116396784,16240340754705420110,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4856 /prefetch:12⤵PID:1388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,15440215819116396784,16240340754705420110,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4868 /prefetch:12⤵PID:4880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,15440215819116396784,16240340754705420110,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5160 /prefetch:12⤵PID:4368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,15440215819116396784,16240340754705420110,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5132 /prefetch:12⤵PID:2124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,15440215819116396784,16240340754705420110,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6540 /prefetch:12⤵PID:4868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,15440215819116396784,16240340754705420110,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6576 /prefetch:12⤵PID:2644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2220,15440215819116396784,16240340754705420110,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6896 /prefetch:82⤵PID:3444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2220,15440215819116396784,16240340754705420110,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6896 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,15440215819116396784,16240340754705420110,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4072 /prefetch:12⤵PID:3820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,15440215819116396784,16240340754705420110,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5140 /prefetch:12⤵PID:436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2220,15440215819116396784,16240340754705420110,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2600 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:6104
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3732
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4848
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52f842025e22e522658c640cfc7edc529
SHA14c2b24b02709acdd159f1b9bbeb396e52af27033
SHA2561191573f2a7c12f0b9b8460e06dc36ca5386305eb8c883ebbbc8eb15f4d8e23e
SHA5126e4393fd43984722229020ef662fc5981f253de31f13f30fadd6660bbc9ededcbfd163f132f6adaf42d435873322a5d0d3eea60060cf0e7f2e256262632c5d05
-
Filesize
152B
MD554aadd2d8ec66e446f1edb466b99ba8d
SHA1a94f02b035dc918d8d9a46e6886413f15be5bff0
SHA2561971045943002ef01930add9ba1a96a92ddc10d6c581ce29e33c38c2120b130e
SHA5127e077f903463da60b5587aed4f5352060df400ebda713b602b88c15cb2f91076531ea07546a9352df772656065e0bf27bd285905a60f036a5c5951076d35e994
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize408B
MD57d5fb57fa60d61ac6fd63f3107c3344e
SHA1632d800280bca21c75db499135f8cd0cbd27a2f7
SHA2567c3a37fd31e0593b3409c51d1d89b565a3b3fcfd1491a3f67abf0b2be9edf991
SHA5124081420e77d7321391de99e40b35c55c0e97890218fc89a053a1e4b7699ffd23f164e060c7edcb34659880094e966b7ddcf22d47f7852aca8422896000d32a94
-
Filesize
756B
MD5f866f8d097de3de56e1104082fe70015
SHA1f197b01f8f528d4f6ec010273bfc1d3bfc54899f
SHA256af09d94a8111c65281d0eb84e3213b2a6a457943e6c8e0374e2f876b85ad7208
SHA512e2700c7b4d53deb716ac644d72d91b36439b9f9e60cbce7133462200c88e402f424e005be849374d888cd24d12af83a76f6f185264da8f2b7b3e981a479c8590
-
Filesize
5KB
MD57397265d15703f9b2a68406b14223f3f
SHA1495387f45ed46108fe6b5695f838313d08807553
SHA2568d57b1f5a26f0c0e25f6e2d7cb127c535e4b4761918d884f911a297ca556699d
SHA512dd4b91ce9e21228338933229c4955edd2d521399ba3621d09ba8e6b71a672c7f28119e5e154563745b4e09526e170ae993aceec9fb01eb41cdbc6620882e205e
-
Filesize
6KB
MD5c091c5cd41268db785ac43d28d120dd6
SHA1f3a00b25610105ef7bb86cbab406b825c00c7931
SHA256539a78b4f7f68ef36436b432c77d43f6388e65f773fd1f29ae7b41067b30b43c
SHA512e39e978dd9cec168e140472f12fea4ad0764e1aa33c5795e65269ac68fe10d3f9831e09bf055e74c5ce418bbdec496dd5e844f3bfc7429efd227ee40b4d35fc7
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5f928f2c350119e11e280081bfd7ae4ae
SHA12749c1f16c3e45dcca043c6431d5fda17f2bc843
SHA25673d9203d2935f3404c9e7e42e21377907cd3eae552021fc8207019180cc34f4d
SHA512fa3bfe0e133c7a665d66f1bd50ac6e85bd7649a286e081b98f6e80a12cb8fc6665ef4197c694e584be014a4745567188e746c5b73d3b0e010034ed364e6f1814