Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
20/07/2024, 00:08
Static task
static1
Behavioral task
behavioral1
Sample
5e441fecb28a3fb186a569f67217b417_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
5e441fecb28a3fb186a569f67217b417_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
5e441fecb28a3fb186a569f67217b417_JaffaCakes118.html
-
Size
47KB
-
MD5
5e441fecb28a3fb186a569f67217b417
-
SHA1
cad52b592655d982ba89a44922a2fb9ab922639d
-
SHA256
b3b76eea99e4d4216e5268f86dfc65e20cc686cfd8bca8c8d49bd8735326f3f9
-
SHA512
495dc1d81be28d1adedd0f1ae0b4979eee7858a7d24772c9bd2235744173d4b70712a1f2695909ff8a6f48c5f6344a0dcbc78003d835e4dbf7452da862e92742
-
SSDEEP
768:+3UpHvvCIoojh4ePpiZi25RrpzeVUDDkh204nVsWBNEQsFkzxJyJZ:+3cHv7okh4eE55pzeVUDDkh5cyWFxJy
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4824 msedge.exe 4824 msedge.exe 892 msedge.exe 892 msedge.exe 3960 identity_helper.exe 3960 identity_helper.exe 984 msedge.exe 984 msedge.exe 984 msedge.exe 984 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 892 msedge.exe 892 msedge.exe 892 msedge.exe 892 msedge.exe 892 msedge.exe 892 msedge.exe 892 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 892 msedge.exe 892 msedge.exe 892 msedge.exe 892 msedge.exe 892 msedge.exe 892 msedge.exe 892 msedge.exe 892 msedge.exe 892 msedge.exe 892 msedge.exe 892 msedge.exe 892 msedge.exe 892 msedge.exe 892 msedge.exe 892 msedge.exe 892 msedge.exe 892 msedge.exe 892 msedge.exe 892 msedge.exe 892 msedge.exe 892 msedge.exe 892 msedge.exe 892 msedge.exe 892 msedge.exe 892 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 892 msedge.exe 892 msedge.exe 892 msedge.exe 892 msedge.exe 892 msedge.exe 892 msedge.exe 892 msedge.exe 892 msedge.exe 892 msedge.exe 892 msedge.exe 892 msedge.exe 892 msedge.exe 892 msedge.exe 892 msedge.exe 892 msedge.exe 892 msedge.exe 892 msedge.exe 892 msedge.exe 892 msedge.exe 892 msedge.exe 892 msedge.exe 892 msedge.exe 892 msedge.exe 892 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 892 wrote to memory of 5108 892 msedge.exe 84 PID 892 wrote to memory of 5108 892 msedge.exe 84 PID 892 wrote to memory of 1092 892 msedge.exe 85 PID 892 wrote to memory of 1092 892 msedge.exe 85 PID 892 wrote to memory of 1092 892 msedge.exe 85 PID 892 wrote to memory of 1092 892 msedge.exe 85 PID 892 wrote to memory of 1092 892 msedge.exe 85 PID 892 wrote to memory of 1092 892 msedge.exe 85 PID 892 wrote to memory of 1092 892 msedge.exe 85 PID 892 wrote to memory of 1092 892 msedge.exe 85 PID 892 wrote to memory of 1092 892 msedge.exe 85 PID 892 wrote to memory of 1092 892 msedge.exe 85 PID 892 wrote to memory of 1092 892 msedge.exe 85 PID 892 wrote to memory of 1092 892 msedge.exe 85 PID 892 wrote to memory of 1092 892 msedge.exe 85 PID 892 wrote to memory of 1092 892 msedge.exe 85 PID 892 wrote to memory of 1092 892 msedge.exe 85 PID 892 wrote to memory of 1092 892 msedge.exe 85 PID 892 wrote to memory of 1092 892 msedge.exe 85 PID 892 wrote to memory of 1092 892 msedge.exe 85 PID 892 wrote to memory of 1092 892 msedge.exe 85 PID 892 wrote to memory of 1092 892 msedge.exe 85 PID 892 wrote to memory of 1092 892 msedge.exe 85 PID 892 wrote to memory of 1092 892 msedge.exe 85 PID 892 wrote to memory of 1092 892 msedge.exe 85 PID 892 wrote to memory of 1092 892 msedge.exe 85 PID 892 wrote to memory of 1092 892 msedge.exe 85 PID 892 wrote to memory of 1092 892 msedge.exe 85 PID 892 wrote to memory of 1092 892 msedge.exe 85 PID 892 wrote to memory of 1092 892 msedge.exe 85 PID 892 wrote to memory of 1092 892 msedge.exe 85 PID 892 wrote to memory of 1092 892 msedge.exe 85 PID 892 wrote to memory of 1092 892 msedge.exe 85 PID 892 wrote to memory of 1092 892 msedge.exe 85 PID 892 wrote to memory of 1092 892 msedge.exe 85 PID 892 wrote to memory of 1092 892 msedge.exe 85 PID 892 wrote to memory of 1092 892 msedge.exe 85 PID 892 wrote to memory of 1092 892 msedge.exe 85 PID 892 wrote to memory of 1092 892 msedge.exe 85 PID 892 wrote to memory of 1092 892 msedge.exe 85 PID 892 wrote to memory of 1092 892 msedge.exe 85 PID 892 wrote to memory of 1092 892 msedge.exe 85 PID 892 wrote to memory of 4824 892 msedge.exe 86 PID 892 wrote to memory of 4824 892 msedge.exe 86 PID 892 wrote to memory of 4276 892 msedge.exe 87 PID 892 wrote to memory of 4276 892 msedge.exe 87 PID 892 wrote to memory of 4276 892 msedge.exe 87 PID 892 wrote to memory of 4276 892 msedge.exe 87 PID 892 wrote to memory of 4276 892 msedge.exe 87 PID 892 wrote to memory of 4276 892 msedge.exe 87 PID 892 wrote to memory of 4276 892 msedge.exe 87 PID 892 wrote to memory of 4276 892 msedge.exe 87 PID 892 wrote to memory of 4276 892 msedge.exe 87 PID 892 wrote to memory of 4276 892 msedge.exe 87 PID 892 wrote to memory of 4276 892 msedge.exe 87 PID 892 wrote to memory of 4276 892 msedge.exe 87 PID 892 wrote to memory of 4276 892 msedge.exe 87 PID 892 wrote to memory of 4276 892 msedge.exe 87 PID 892 wrote to memory of 4276 892 msedge.exe 87 PID 892 wrote to memory of 4276 892 msedge.exe 87 PID 892 wrote to memory of 4276 892 msedge.exe 87 PID 892 wrote to memory of 4276 892 msedge.exe 87 PID 892 wrote to memory of 4276 892 msedge.exe 87 PID 892 wrote to memory of 4276 892 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\5e441fecb28a3fb186a569f67217b417_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:892 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd4ad746f8,0x7ffd4ad74708,0x7ffd4ad747182⤵PID:5108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,15125901385893819292,9805071354083748993,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2176 /prefetch:22⤵PID:1092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2132,15125901385893819292,9805071354083748993,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2248 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2132,15125901385893819292,9805071354083748993,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2968 /prefetch:82⤵PID:4276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,15125901385893819292,9805071354083748993,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:1984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,15125901385893819292,9805071354083748993,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,15125901385893819292,9805071354083748993,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4756 /prefetch:12⤵PID:1140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,15125901385893819292,9805071354083748993,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1340 /prefetch:82⤵PID:2224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,15125901385893819292,9805071354083748993,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1340 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,15125901385893819292,9805071354083748993,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5460 /prefetch:12⤵PID:4848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,15125901385893819292,9805071354083748993,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5436 /prefetch:12⤵PID:3352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,15125901385893819292,9805071354083748993,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4144 /prefetch:12⤵PID:644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,15125901385893819292,9805071354083748993,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4784 /prefetch:12⤵PID:4592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,15125901385893819292,9805071354083748993,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6108 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:984
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3164
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5092
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5584971c8ba88c824fd51a05dddb45a98
SHA1b7c9489b4427652a9cdd754d1c1b6ac4034be421
SHA256e2d8de6c2323bbb3863ec50843d9b58a22e911fd626d31430658b9ea942cd307
SHA5125dbf1a4631a04d1149d8fab2b8e0e43ccd97b7212de43b961b9128a8bf03329164fdeb480154a8ffea5835f28417a7d2b115b8bf8d578d00b13c3682aa5ca726
-
Filesize
152B
MD5b28ef7d9f6d74f055cc49876767c886c
SHA1d6b3267f36c340979f8fc3e012fdd02c468740bf
SHA256fa6804456884789f4bdf9c3f5a4a8f29e0ededde149c4384072f3d8cc85bcc37
SHA512491f893c8f765e5d629bce8dd5067cef4e2ebc558d43bfb05e358bca43e1a66ee1285519bc266fd0ff5b5e09769a56077b62ac55fa8797c1edf6205843356e75
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD55f405192034947fcf5942aa6e45da43d
SHA1352fe59a643d27439e2d454ce876dc148a9a31cf
SHA25609c0e86ae3703c435898767b17fa044045bfe4fdf6042096c874967151a5d75f
SHA512c439a58fdc6eee68e71bb6eca800e4bc80ea5e2d926951b0f4af89c5f6f6e55cd1400ed623330893e5e8ec84debadbc79ac5de862284a0780741304e139ff348
-
Filesize
1KB
MD5eb1ee713c3aac0911856aaa6d02d7ca0
SHA13e5f67e5770ef71e20a308ee99ae6ee15199eee0
SHA2564f4dfba8ffb1c50ec45e574b0d5c4527a874749fad36f6aeb4896cf265682202
SHA5125500f74314c2d06ba4775f1945e6185f93884ecae279fdd3760f03ee022aa699b8b41e40aff10addd77069e0e8bbcf9e6b6b966a2ba1d3da2c50187724190867
-
Filesize
5KB
MD5dff862257e5a13e1cd82eff93e338f0b
SHA10729160a090686bb784536db2938187436114bb9
SHA256ca3d37aa1af86c08494e0efac30b9e6d35cc088cf51b59c93d42a8463724bacf
SHA512afbb204e32a49744017187d728539b22f0f086fe6ef17e487e05d02aaadbdc08ae8afd128d2c5da613117336ffe015a5ec0c2297de52fb488cdb01f71ddf24d3
-
Filesize
6KB
MD5d6ef9257715a113ee19589722e054254
SHA15d4daca8b323420ef5a89a5efc9e6fed998c66e4
SHA256efb99d3e0f020b7c07f9529c6aab0b29d702b811422adb2c19a50267d6232e12
SHA512fc877822d1f1fac2155751c773834d518d9b5f35ae611707931211231ca559511090fbb10e51f83dab72a85d42418425702d69808f582b4cc336be53d20f6d43
-
Filesize
6KB
MD5a4c6965580e8d2b25cfedaf3d7ca5a3d
SHA17c8ecaa463d1f9aea90c326ec12181e276450693
SHA256beb2f3af3367fc27f53688280c6bb11769e99c02f46c9e93f582818078001739
SHA512350d17d7947e51013e49240f5719d70b18ab541185eed6ed2c5bab8a55b2f63c2522845956b29b7bed30c97539172d3c7fdcac457c57e56b6e19a9d9871de733
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5d985992785d3604e7bfc1527b377471c
SHA1f2086d2b44b84712915ac0fbbfadc332fc0459a1
SHA256eef012b048f9ed4079c5ee0af5d451e37156c8a48293e990a48a251d07d342dc
SHA512fb8554261648800aab3f2515f747d09570e76d369db09e4156f83200d0793bbde8aac6c1ac14b1d5e4ae8729dab5b2d11a016a81b118c8197b69a663ef75fb64