Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
22/07/2024, 07:06
Static task
static1
Behavioral task
behavioral1
Sample
623a7fc6eb4253e2392d7f2989a8cd03_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
623a7fc6eb4253e2392d7f2989a8cd03_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
623a7fc6eb4253e2392d7f2989a8cd03_JaffaCakes118.html
-
Size
13KB
-
MD5
623a7fc6eb4253e2392d7f2989a8cd03
-
SHA1
77307a8dc2fa140e6335b7b4513a37421fe2e048
-
SHA256
aeff96b6ea5ccf05f19e6a54ee4052abc5a8df941e99b17a6b1319e4f903f6af
-
SHA512
d5baf25741f77a52f4b827d47d80a7b1b8d05916248180fe4ba8b4f94b3f47362beba67c6b6c0f1e66f6a93d1ca61c05d580a8b1bdcf55afa2747569b7a8d35b
-
SSDEEP
192:Enwh05jcGU0FBxmKJGjbHniPJ3GlaYJwHC73P9lj8L0GN8el/qzpQ3nE+wllmP3X:EwUcQFBxT6WCLJv7lTaqzpQ3ntUJ2
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1840 msedge.exe 1840 msedge.exe 2112 msedge.exe 2112 msedge.exe 5088 identity_helper.exe 5088 identity_helper.exe 3228 msedge.exe 3228 msedge.exe 3228 msedge.exe 3228 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 2112 msedge.exe 2112 msedge.exe 2112 msedge.exe 2112 msedge.exe 2112 msedge.exe 2112 msedge.exe 2112 msedge.exe 2112 msedge.exe 2112 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2112 msedge.exe 2112 msedge.exe 2112 msedge.exe 2112 msedge.exe 2112 msedge.exe 2112 msedge.exe 2112 msedge.exe 2112 msedge.exe 2112 msedge.exe 2112 msedge.exe 2112 msedge.exe 2112 msedge.exe 2112 msedge.exe 2112 msedge.exe 2112 msedge.exe 2112 msedge.exe 2112 msedge.exe 2112 msedge.exe 2112 msedge.exe 2112 msedge.exe 2112 msedge.exe 2112 msedge.exe 2112 msedge.exe 2112 msedge.exe 2112 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2112 msedge.exe 2112 msedge.exe 2112 msedge.exe 2112 msedge.exe 2112 msedge.exe 2112 msedge.exe 2112 msedge.exe 2112 msedge.exe 2112 msedge.exe 2112 msedge.exe 2112 msedge.exe 2112 msedge.exe 2112 msedge.exe 2112 msedge.exe 2112 msedge.exe 2112 msedge.exe 2112 msedge.exe 2112 msedge.exe 2112 msedge.exe 2112 msedge.exe 2112 msedge.exe 2112 msedge.exe 2112 msedge.exe 2112 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2112 wrote to memory of 4636 2112 msedge.exe 84 PID 2112 wrote to memory of 4636 2112 msedge.exe 84 PID 2112 wrote to memory of 4528 2112 msedge.exe 85 PID 2112 wrote to memory of 4528 2112 msedge.exe 85 PID 2112 wrote to memory of 4528 2112 msedge.exe 85 PID 2112 wrote to memory of 4528 2112 msedge.exe 85 PID 2112 wrote to memory of 4528 2112 msedge.exe 85 PID 2112 wrote to memory of 4528 2112 msedge.exe 85 PID 2112 wrote to memory of 4528 2112 msedge.exe 85 PID 2112 wrote to memory of 4528 2112 msedge.exe 85 PID 2112 wrote to memory of 4528 2112 msedge.exe 85 PID 2112 wrote to memory of 4528 2112 msedge.exe 85 PID 2112 wrote to memory of 4528 2112 msedge.exe 85 PID 2112 wrote to memory of 4528 2112 msedge.exe 85 PID 2112 wrote to memory of 4528 2112 msedge.exe 85 PID 2112 wrote to memory of 4528 2112 msedge.exe 85 PID 2112 wrote to memory of 4528 2112 msedge.exe 85 PID 2112 wrote to memory of 4528 2112 msedge.exe 85 PID 2112 wrote to memory of 4528 2112 msedge.exe 85 PID 2112 wrote to memory of 4528 2112 msedge.exe 85 PID 2112 wrote to memory of 4528 2112 msedge.exe 85 PID 2112 wrote to memory of 4528 2112 msedge.exe 85 PID 2112 wrote to memory of 4528 2112 msedge.exe 85 PID 2112 wrote to memory of 4528 2112 msedge.exe 85 PID 2112 wrote to memory of 4528 2112 msedge.exe 85 PID 2112 wrote to memory of 4528 2112 msedge.exe 85 PID 2112 wrote to memory of 4528 2112 msedge.exe 85 PID 2112 wrote to memory of 4528 2112 msedge.exe 85 PID 2112 wrote to memory of 4528 2112 msedge.exe 85 PID 2112 wrote to memory of 4528 2112 msedge.exe 85 PID 2112 wrote to memory of 4528 2112 msedge.exe 85 PID 2112 wrote to memory of 4528 2112 msedge.exe 85 PID 2112 wrote to memory of 4528 2112 msedge.exe 85 PID 2112 wrote to memory of 4528 2112 msedge.exe 85 PID 2112 wrote to memory of 4528 2112 msedge.exe 85 PID 2112 wrote to memory of 4528 2112 msedge.exe 85 PID 2112 wrote to memory of 4528 2112 msedge.exe 85 PID 2112 wrote to memory of 4528 2112 msedge.exe 85 PID 2112 wrote to memory of 4528 2112 msedge.exe 85 PID 2112 wrote to memory of 4528 2112 msedge.exe 85 PID 2112 wrote to memory of 4528 2112 msedge.exe 85 PID 2112 wrote to memory of 4528 2112 msedge.exe 85 PID 2112 wrote to memory of 1840 2112 msedge.exe 86 PID 2112 wrote to memory of 1840 2112 msedge.exe 86 PID 2112 wrote to memory of 4772 2112 msedge.exe 87 PID 2112 wrote to memory of 4772 2112 msedge.exe 87 PID 2112 wrote to memory of 4772 2112 msedge.exe 87 PID 2112 wrote to memory of 4772 2112 msedge.exe 87 PID 2112 wrote to memory of 4772 2112 msedge.exe 87 PID 2112 wrote to memory of 4772 2112 msedge.exe 87 PID 2112 wrote to memory of 4772 2112 msedge.exe 87 PID 2112 wrote to memory of 4772 2112 msedge.exe 87 PID 2112 wrote to memory of 4772 2112 msedge.exe 87 PID 2112 wrote to memory of 4772 2112 msedge.exe 87 PID 2112 wrote to memory of 4772 2112 msedge.exe 87 PID 2112 wrote to memory of 4772 2112 msedge.exe 87 PID 2112 wrote to memory of 4772 2112 msedge.exe 87 PID 2112 wrote to memory of 4772 2112 msedge.exe 87 PID 2112 wrote to memory of 4772 2112 msedge.exe 87 PID 2112 wrote to memory of 4772 2112 msedge.exe 87 PID 2112 wrote to memory of 4772 2112 msedge.exe 87 PID 2112 wrote to memory of 4772 2112 msedge.exe 87 PID 2112 wrote to memory of 4772 2112 msedge.exe 87 PID 2112 wrote to memory of 4772 2112 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\623a7fc6eb4253e2392d7f2989a8cd03_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff946d546f8,0x7ff946d54708,0x7ff946d547182⤵PID:4636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,13449203924873499329,9229853384786400180,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2100 /prefetch:22⤵PID:4528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,13449203924873499329,9229853384786400180,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2156 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2080,13449203924873499329,9229853384786400180,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2708 /prefetch:82⤵PID:4772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,13449203924873499329,9229853384786400180,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:2044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,13449203924873499329,9229853384786400180,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3440 /prefetch:12⤵PID:4928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,13449203924873499329,9229853384786400180,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4248 /prefetch:12⤵PID:3332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,13449203924873499329,9229853384786400180,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5264 /prefetch:12⤵PID:212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,13449203924873499329,9229853384786400180,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3920 /prefetch:12⤵PID:1676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,13449203924873499329,9229853384786400180,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5780 /prefetch:82⤵PID:2860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,13449203924873499329,9229853384786400180,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5780 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,13449203924873499329,9229853384786400180,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5848 /prefetch:12⤵PID:1992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,13449203924873499329,9229853384786400180,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5868 /prefetch:12⤵PID:1940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,13449203924873499329,9229853384786400180,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6164 /prefetch:12⤵PID:1964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,13449203924873499329,9229853384786400180,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6148 /prefetch:12⤵PID:1192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,13449203924873499329,9229853384786400180,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1312 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3228
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2864
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2100
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52f842025e22e522658c640cfc7edc529
SHA14c2b24b02709acdd159f1b9bbeb396e52af27033
SHA2561191573f2a7c12f0b9b8460e06dc36ca5386305eb8c883ebbbc8eb15f4d8e23e
SHA5126e4393fd43984722229020ef662fc5981f253de31f13f30fadd6660bbc9ededcbfd163f132f6adaf42d435873322a5d0d3eea60060cf0e7f2e256262632c5d05
-
Filesize
152B
MD554aadd2d8ec66e446f1edb466b99ba8d
SHA1a94f02b035dc918d8d9a46e6886413f15be5bff0
SHA2561971045943002ef01930add9ba1a96a92ddc10d6c581ce29e33c38c2120b130e
SHA5127e077f903463da60b5587aed4f5352060df400ebda713b602b88c15cb2f91076531ea07546a9352df772656065e0bf27bd285905a60f036a5c5951076d35e994
-
Filesize
211KB
MD5151fb811968eaf8efb840908b89dc9d4
SHA17ec811009fd9b0e6d92d12d78b002275f2f1bee1
SHA256043fd8558e4a5a60aaccd2f0377f77a544e3e375242e9d7200dc6e51f94103ed
SHA51283aface0ab01da52fd077f747c9d5916e3c06b0ea5c551d7d316707ec3e8f3f986ce1c82e6f2136e48c6511a83cb0ac67ff6dc8f0e440ac72fc6854086a87674
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize312B
MD57a519e63a8127d07b229c57321c623c8
SHA1ca2e4e90d422839cd51006932de7a3cf309c6293
SHA256004f5483ddc86d100b000a0e73108d4225c2b5633808c25bca33d92c6d1e923a
SHA5128e6c5be66c084405dd2a21814529de73cea43721aa0a79d9a3eb3a1bd4954213794482e2da52ea49385e94f6b43757390498410a0f0b3bd521a4d0a6b9bb36b8
-
Filesize
1KB
MD53fbd3f31d4ab3de52045e185fee42c6c
SHA1a94d0ada4db4ee7a656f615b7941f721d3b57ca7
SHA256c26affddf054e7ca2074cd9227cf7ede2ce6442d8bea0c8e045686ed3791a7ca
SHA512feda47d2273ec317dac7cd7e48dbe6d8ed4a0582cd4764001e505f6bf8b444eef3327ce9afb61cad3332ab5ce55df98b0dbbec9db52ad7a0a7885406e868b5f6
-
Filesize
5KB
MD5dbb4be4615ee04a2c801065e32df3950
SHA140cb7b618cec8cc8f0c8b7bcca5fd055e637785d
SHA25613583b45f4cc6de26d4fb26145815eb71508713fd454832e24fba867a152926b
SHA512ef984e676afee17bae1ca9efdf9d5272b3aa4dd00840b737e4fdbee4da31f6c9f4434f674f2238334be057a44364ede69b71f48134d7194b5e0c6a2d6ee93a1d
-
Filesize
6KB
MD55334b3e41a46e106b9a54095f57e019e
SHA1b8d228638ee2692e1d30efb7b4315b3acedd756d
SHA25661ef1d98ad5320f5a746ae5680e68cffecc8bcde08ca458fc558794e10eb1caf
SHA5129f4e3aae25339b51ef37fa2d55baf5b36024bac5a111b02ba05106f06d6dc5b46c4d2c412ae5ebc1d55e4f225ec7e5f92524e4a3a0811904ac46f42dbf7216a1
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5fe4a6f77fcab865611a2a9805afcc819
SHA1cfdee3d1fe6b85080954d1c21256276edf15d57d
SHA256d0478af39b7ab302c2954b718d01203f571fbd5a630417771df9d123d85ce09c
SHA512eecdcbda65018d089176396eddc3f39ffd1720fe588058971257381b22bf55f61199eee4e9701de38327ae403a5eeaa180fd99e3a3865b8a985a4b966b780e8a