Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
20/07/2024, 03:04
Static task
static1
Behavioral task
behavioral1
Sample
5ecab13fb84ec8ce5241988949eb6b97_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
5ecab13fb84ec8ce5241988949eb6b97_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
5ecab13fb84ec8ce5241988949eb6b97_JaffaCakes118.html
-
Size
16KB
-
MD5
5ecab13fb84ec8ce5241988949eb6b97
-
SHA1
ade220e516c8b5331065faea0583076479241dea
-
SHA256
d11ff1921c30786626f8e54bd9402ee881fd0b7ae8e723ea5b746eb56cb6d2ab
-
SHA512
e9a7d56e1d2837a83a9c240d16a636c3c8c5f50bf46d03a4a309f7f452e6d92db603fe8866d9f8a65eced9b20906b8c7a5b93d779e44f81efed58d7c6b879965
-
SSDEEP
384:ZXcZUVBt/8yptBs4Jfk0HqFViDnqL7yKPZJ2:xcZUVB/WOK3i2L7y3
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2464 msedge.exe 2464 msedge.exe 2768 msedge.exe 2768 msedge.exe 5096 identity_helper.exe 5096 identity_helper.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 2768 msedge.exe 2768 msedge.exe 2768 msedge.exe 2768 msedge.exe 2768 msedge.exe 2768 msedge.exe 2768 msedge.exe 2768 msedge.exe 2768 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2768 msedge.exe 2768 msedge.exe 2768 msedge.exe 2768 msedge.exe 2768 msedge.exe 2768 msedge.exe 2768 msedge.exe 2768 msedge.exe 2768 msedge.exe 2768 msedge.exe 2768 msedge.exe 2768 msedge.exe 2768 msedge.exe 2768 msedge.exe 2768 msedge.exe 2768 msedge.exe 2768 msedge.exe 2768 msedge.exe 2768 msedge.exe 2768 msedge.exe 2768 msedge.exe 2768 msedge.exe 2768 msedge.exe 2768 msedge.exe 2768 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2768 msedge.exe 2768 msedge.exe 2768 msedge.exe 2768 msedge.exe 2768 msedge.exe 2768 msedge.exe 2768 msedge.exe 2768 msedge.exe 2768 msedge.exe 2768 msedge.exe 2768 msedge.exe 2768 msedge.exe 2768 msedge.exe 2768 msedge.exe 2768 msedge.exe 2768 msedge.exe 2768 msedge.exe 2768 msedge.exe 2768 msedge.exe 2768 msedge.exe 2768 msedge.exe 2768 msedge.exe 2768 msedge.exe 2768 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2768 wrote to memory of 4184 2768 msedge.exe 84 PID 2768 wrote to memory of 4184 2768 msedge.exe 84 PID 2768 wrote to memory of 2116 2768 msedge.exe 85 PID 2768 wrote to memory of 2116 2768 msedge.exe 85 PID 2768 wrote to memory of 2116 2768 msedge.exe 85 PID 2768 wrote to memory of 2116 2768 msedge.exe 85 PID 2768 wrote to memory of 2116 2768 msedge.exe 85 PID 2768 wrote to memory of 2116 2768 msedge.exe 85 PID 2768 wrote to memory of 2116 2768 msedge.exe 85 PID 2768 wrote to memory of 2116 2768 msedge.exe 85 PID 2768 wrote to memory of 2116 2768 msedge.exe 85 PID 2768 wrote to memory of 2116 2768 msedge.exe 85 PID 2768 wrote to memory of 2116 2768 msedge.exe 85 PID 2768 wrote to memory of 2116 2768 msedge.exe 85 PID 2768 wrote to memory of 2116 2768 msedge.exe 85 PID 2768 wrote to memory of 2116 2768 msedge.exe 85 PID 2768 wrote to memory of 2116 2768 msedge.exe 85 PID 2768 wrote to memory of 2116 2768 msedge.exe 85 PID 2768 wrote to memory of 2116 2768 msedge.exe 85 PID 2768 wrote to memory of 2116 2768 msedge.exe 85 PID 2768 wrote to memory of 2116 2768 msedge.exe 85 PID 2768 wrote to memory of 2116 2768 msedge.exe 85 PID 2768 wrote to memory of 2116 2768 msedge.exe 85 PID 2768 wrote to memory of 2116 2768 msedge.exe 85 PID 2768 wrote to memory of 2116 2768 msedge.exe 85 PID 2768 wrote to memory of 2116 2768 msedge.exe 85 PID 2768 wrote to memory of 2116 2768 msedge.exe 85 PID 2768 wrote to memory of 2116 2768 msedge.exe 85 PID 2768 wrote to memory of 2116 2768 msedge.exe 85 PID 2768 wrote to memory of 2116 2768 msedge.exe 85 PID 2768 wrote to memory of 2116 2768 msedge.exe 85 PID 2768 wrote to memory of 2116 2768 msedge.exe 85 PID 2768 wrote to memory of 2116 2768 msedge.exe 85 PID 2768 wrote to memory of 2116 2768 msedge.exe 85 PID 2768 wrote to memory of 2116 2768 msedge.exe 85 PID 2768 wrote to memory of 2116 2768 msedge.exe 85 PID 2768 wrote to memory of 2116 2768 msedge.exe 85 PID 2768 wrote to memory of 2116 2768 msedge.exe 85 PID 2768 wrote to memory of 2116 2768 msedge.exe 85 PID 2768 wrote to memory of 2116 2768 msedge.exe 85 PID 2768 wrote to memory of 2116 2768 msedge.exe 85 PID 2768 wrote to memory of 2116 2768 msedge.exe 85 PID 2768 wrote to memory of 2464 2768 msedge.exe 86 PID 2768 wrote to memory of 2464 2768 msedge.exe 86 PID 2768 wrote to memory of 748 2768 msedge.exe 87 PID 2768 wrote to memory of 748 2768 msedge.exe 87 PID 2768 wrote to memory of 748 2768 msedge.exe 87 PID 2768 wrote to memory of 748 2768 msedge.exe 87 PID 2768 wrote to memory of 748 2768 msedge.exe 87 PID 2768 wrote to memory of 748 2768 msedge.exe 87 PID 2768 wrote to memory of 748 2768 msedge.exe 87 PID 2768 wrote to memory of 748 2768 msedge.exe 87 PID 2768 wrote to memory of 748 2768 msedge.exe 87 PID 2768 wrote to memory of 748 2768 msedge.exe 87 PID 2768 wrote to memory of 748 2768 msedge.exe 87 PID 2768 wrote to memory of 748 2768 msedge.exe 87 PID 2768 wrote to memory of 748 2768 msedge.exe 87 PID 2768 wrote to memory of 748 2768 msedge.exe 87 PID 2768 wrote to memory of 748 2768 msedge.exe 87 PID 2768 wrote to memory of 748 2768 msedge.exe 87 PID 2768 wrote to memory of 748 2768 msedge.exe 87 PID 2768 wrote to memory of 748 2768 msedge.exe 87 PID 2768 wrote to memory of 748 2768 msedge.exe 87 PID 2768 wrote to memory of 748 2768 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\5ecab13fb84ec8ce5241988949eb6b97_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8ccfe46f8,0x7ff8ccfe4708,0x7ff8ccfe47182⤵PID:4184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,12151270540990860419,10489503201235451499,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 /prefetch:22⤵PID:2116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2152,12151270540990860419,10489503201235451499,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2436 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2152,12151270540990860419,10489503201235451499,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2716 /prefetch:82⤵PID:748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,12151270540990860419,10489503201235451499,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2172 /prefetch:12⤵PID:100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,12151270540990860419,10489503201235451499,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:1344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,12151270540990860419,10489503201235451499,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4640 /prefetch:12⤵PID:856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,12151270540990860419,10489503201235451499,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4800 /prefetch:12⤵PID:2944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,12151270540990860419,10489503201235451499,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5012 /prefetch:12⤵PID:3672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,12151270540990860419,10489503201235451499,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5708 /prefetch:82⤵PID:3692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,12151270540990860419,10489503201235451499,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5708 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,12151270540990860419,10489503201235451499,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5792 /prefetch:12⤵PID:4156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,12151270540990860419,10489503201235451499,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5772 /prefetch:12⤵PID:4224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,12151270540990860419,10489503201235451499,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4084 /prefetch:12⤵PID:228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,12151270540990860419,10489503201235451499,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5848 /prefetch:12⤵PID:224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,12151270540990860419,10489503201235451499,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5216 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2484
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4976
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4696
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52f842025e22e522658c640cfc7edc529
SHA14c2b24b02709acdd159f1b9bbeb396e52af27033
SHA2561191573f2a7c12f0b9b8460e06dc36ca5386305eb8c883ebbbc8eb15f4d8e23e
SHA5126e4393fd43984722229020ef662fc5981f253de31f13f30fadd6660bbc9ededcbfd163f132f6adaf42d435873322a5d0d3eea60060cf0e7f2e256262632c5d05
-
Filesize
152B
MD554aadd2d8ec66e446f1edb466b99ba8d
SHA1a94f02b035dc918d8d9a46e6886413f15be5bff0
SHA2561971045943002ef01930add9ba1a96a92ddc10d6c581ce29e33c38c2120b130e
SHA5127e077f903463da60b5587aed4f5352060df400ebda713b602b88c15cb2f91076531ea07546a9352df772656065e0bf27bd285905a60f036a5c5951076d35e994
-
Filesize
211KB
MD5151fb811968eaf8efb840908b89dc9d4
SHA17ec811009fd9b0e6d92d12d78b002275f2f1bee1
SHA256043fd8558e4a5a60aaccd2f0377f77a544e3e375242e9d7200dc6e51f94103ed
SHA51283aface0ab01da52fd077f747c9d5916e3c06b0ea5c551d7d316707ec3e8f3f986ce1c82e6f2136e48c6511a83cb0ac67ff6dc8f0e440ac72fc6854086a87674
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize312B
MD52d42a19bc6ece676d9b5010d2eefb0ef
SHA1ffdac02a30c26282a41552c0a3c2aae6670b2f87
SHA25658beef8999fa496ad4c767ffcde0adc6f144ebf57b4d50750bce37fe2bbd78a4
SHA512a054d98936382466531341ae198b46ecf91ca7e72fccd0b53b938ffe5a1cea7979e632bb494b81b4d711586cb611c24573d47a424b0b1ce6886ef040779d70b1
-
Filesize
1KB
MD5d83da6f926263a463138e080303bf0d4
SHA1ae69a44979eefe137ee9ea9b3a7f25b5b74fe18b
SHA2567d0b707fd2efaf85c2ed6bc31d0fcb2f2815463e167a9e056858bc21c2be2c09
SHA512ebfbf2ca1efaf40707a88016e76ddefad780c78c19ed7673450f0aea479ee17764a833af6f66cbd2bb145c0644d70abfc49a50264e51852d8e970fff218b30e7
-
Filesize
5KB
MD5e5274f6e74c8e487e642f1b96fe512cb
SHA1700be05436bb1f191359acf9249da1f5cd72c4ce
SHA256a43daaa3f3cc7bd5095aca4138cb3407d60c670dd5da1ef3760287608f74da1a
SHA5129a84a1c28572970a5394cd456beae8a032f83dc6654fddcc4e5c29616df947c8ae037b16ee3acb4aace26e758294d33d91ab9e173e4fbe25067bb451c4b2770d
-
Filesize
6KB
MD5c9f060af7b1f4a67cf39a012ace2a20e
SHA10f812f69668563848c8286e8dcf9420ccbac66f3
SHA25698b0042f25c0b9ae27e5db38095ab0cfcc4f672e733f0d39cd5beb4220291e49
SHA51234cf569becd53f8bc4129d372ed5cdef6553f24d1228bd1f23e2ca184bdbab6d65799d1044408e041c636f079d3618cc1997809ec6327b6f6a48201aae851d18
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD554adaf4ae25ada112fbab1a4e152bd64
SHA19813226579e57980099c5a5dfb469cff5241068b
SHA256fdf0f354571b84d68e69a999ae108d24b4b059cf414e566be58cfe82207228f6
SHA5120cf2b9db60500e82c52d9876b86f69344db6839a6ac7484c5829e05991d380c53ddd5f5228eb434d2adaa822eca195eb0d8d3cbf56e5775abc3207f153ccd330