Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
22/07/2024, 07:37
Static task
static1
Behavioral task
behavioral1
Sample
62514abd7749f48c09c98c204c4bffcd_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
62514abd7749f48c09c98c204c4bffcd_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
62514abd7749f48c09c98c204c4bffcd_JaffaCakes118.html
-
Size
1KB
-
MD5
62514abd7749f48c09c98c204c4bffcd
-
SHA1
9dc597cd58ec954daa28e6fd6e10a2e4a1ef03d0
-
SHA256
9e4a562a3a746af82e4cc9f2d5f0ca391f4afc8430ad5dd8984e17a6398ee230
-
SHA512
80c1e8d6abb8aed7ae873f6ee64613c0a2934068505b7fae1bbfcc205a2f3565348a984d2725e0ba4bdfae90dfe3f2e06d53e2c388f8c674d7c34846080a97c1
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 756 msedge.exe 756 msedge.exe 436 msedge.exe 436 msedge.exe 4796 identity_helper.exe 4796 identity_helper.exe 2504 msedge.exe 2504 msedge.exe 2504 msedge.exe 2504 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 436 wrote to memory of 1596 436 msedge.exe 84 PID 436 wrote to memory of 1596 436 msedge.exe 84 PID 436 wrote to memory of 404 436 msedge.exe 85 PID 436 wrote to memory of 404 436 msedge.exe 85 PID 436 wrote to memory of 404 436 msedge.exe 85 PID 436 wrote to memory of 404 436 msedge.exe 85 PID 436 wrote to memory of 404 436 msedge.exe 85 PID 436 wrote to memory of 404 436 msedge.exe 85 PID 436 wrote to memory of 404 436 msedge.exe 85 PID 436 wrote to memory of 404 436 msedge.exe 85 PID 436 wrote to memory of 404 436 msedge.exe 85 PID 436 wrote to memory of 404 436 msedge.exe 85 PID 436 wrote to memory of 404 436 msedge.exe 85 PID 436 wrote to memory of 404 436 msedge.exe 85 PID 436 wrote to memory of 404 436 msedge.exe 85 PID 436 wrote to memory of 404 436 msedge.exe 85 PID 436 wrote to memory of 404 436 msedge.exe 85 PID 436 wrote to memory of 404 436 msedge.exe 85 PID 436 wrote to memory of 404 436 msedge.exe 85 PID 436 wrote to memory of 404 436 msedge.exe 85 PID 436 wrote to memory of 404 436 msedge.exe 85 PID 436 wrote to memory of 404 436 msedge.exe 85 PID 436 wrote to memory of 404 436 msedge.exe 85 PID 436 wrote to memory of 404 436 msedge.exe 85 PID 436 wrote to memory of 404 436 msedge.exe 85 PID 436 wrote to memory of 404 436 msedge.exe 85 PID 436 wrote to memory of 404 436 msedge.exe 85 PID 436 wrote to memory of 404 436 msedge.exe 85 PID 436 wrote to memory of 404 436 msedge.exe 85 PID 436 wrote to memory of 404 436 msedge.exe 85 PID 436 wrote to memory of 404 436 msedge.exe 85 PID 436 wrote to memory of 404 436 msedge.exe 85 PID 436 wrote to memory of 404 436 msedge.exe 85 PID 436 wrote to memory of 404 436 msedge.exe 85 PID 436 wrote to memory of 404 436 msedge.exe 85 PID 436 wrote to memory of 404 436 msedge.exe 85 PID 436 wrote to memory of 404 436 msedge.exe 85 PID 436 wrote to memory of 404 436 msedge.exe 85 PID 436 wrote to memory of 404 436 msedge.exe 85 PID 436 wrote to memory of 404 436 msedge.exe 85 PID 436 wrote to memory of 404 436 msedge.exe 85 PID 436 wrote to memory of 404 436 msedge.exe 85 PID 436 wrote to memory of 756 436 msedge.exe 86 PID 436 wrote to memory of 756 436 msedge.exe 86 PID 436 wrote to memory of 2600 436 msedge.exe 87 PID 436 wrote to memory of 2600 436 msedge.exe 87 PID 436 wrote to memory of 2600 436 msedge.exe 87 PID 436 wrote to memory of 2600 436 msedge.exe 87 PID 436 wrote to memory of 2600 436 msedge.exe 87 PID 436 wrote to memory of 2600 436 msedge.exe 87 PID 436 wrote to memory of 2600 436 msedge.exe 87 PID 436 wrote to memory of 2600 436 msedge.exe 87 PID 436 wrote to memory of 2600 436 msedge.exe 87 PID 436 wrote to memory of 2600 436 msedge.exe 87 PID 436 wrote to memory of 2600 436 msedge.exe 87 PID 436 wrote to memory of 2600 436 msedge.exe 87 PID 436 wrote to memory of 2600 436 msedge.exe 87 PID 436 wrote to memory of 2600 436 msedge.exe 87 PID 436 wrote to memory of 2600 436 msedge.exe 87 PID 436 wrote to memory of 2600 436 msedge.exe 87 PID 436 wrote to memory of 2600 436 msedge.exe 87 PID 436 wrote to memory of 2600 436 msedge.exe 87 PID 436 wrote to memory of 2600 436 msedge.exe 87 PID 436 wrote to memory of 2600 436 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\62514abd7749f48c09c98c204c4bffcd_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:436 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd3f6b46f8,0x7ffd3f6b4708,0x7ffd3f6b47182⤵PID:1596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,14734717792409482941,6321018337288322388,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2212 /prefetch:22⤵PID:404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,14734717792409482941,6321018337288322388,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2296 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,14734717792409482941,6321018337288322388,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2740 /prefetch:82⤵PID:2600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,14734717792409482941,6321018337288322388,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:5068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,14734717792409482941,6321018337288322388,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:12⤵PID:4432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,14734717792409482941,6321018337288322388,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4212 /prefetch:12⤵PID:992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,14734717792409482941,6321018337288322388,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4268 /prefetch:12⤵PID:2688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,14734717792409482941,6321018337288322388,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5952 /prefetch:82⤵PID:4272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,14734717792409482941,6321018337288322388,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5952 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,14734717792409482941,6321018337288322388,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5656 /prefetch:12⤵PID:3500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,14734717792409482941,6321018337288322388,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5620 /prefetch:12⤵PID:2404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,14734717792409482941,6321018337288322388,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:3084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,14734717792409482941,6321018337288322388,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4128 /prefetch:12⤵PID:2972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,14734717792409482941,6321018337288322388,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5044 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2504
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2452
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1280
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5bafce9e4c53a0cb85310891b6b21791b
SHA15d70027cc137a7cbb38f5801b15fd97b05e89ee2
SHA25671fb546b5d2210a56e90b448ee10120cd92c518c8f79fb960f01b918f89f2b00
SHA512c0e4d3eccc0135ac92051539a18f64b8b8628cfe74e5b019d4f8e1dcbb51a9b49c486a1523885fe6be53da7118c013852e753c26a5490538c1e721fd0188836c
-
Filesize
152B
MD5a499254d6b5d91f97eb7a86e5f8ca573
SHA103dbfebfec8c94a9c06f9b0cd81ebe0a2b8be3d1
SHA256fb87b758c2b98989df851380293ff6786cb9a5cf2b3a384cec70d9f3eb064499
SHA512d7adcc76d0470bcd68d7644de3c8d2b6d61df8485979a4752ceea3df4d85bd1c290f72b3d8d5c8d639d5a10afa48d80e457f76b44dd8107ac97eb80fd98c7b0c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize312B
MD5a0c665837e3e1d0df6403133f4c89062
SHA14185f0030bfb5986270996394c7a721109823b5c
SHA25661a229df5bd5ff0da4b353c2e6de158121ca8ed994541144ea55670c95e7201d
SHA51220ea939e8cc00dd4cc22d5476ac835fe3609372f7dd5f305906de0c21721938e99c994e3314ba5d87b0bfb1ceaa7b4823d142eebd9b783ae41e7037696c9028b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize288B
MD5e31d9f6b55cb8be633c34b9dca9405dc
SHA19ca0c086f6e5d6c146dae9f6efdd4a272a82bfd7
SHA2562136b688aa12efee530001333ae5b325e670b4ae4e4e6f03688bb4df94720ca9
SHA51294d5ef9442fc695e59fbe4e8995cc542df186a25d206ac8e660e7a3920d861663be9fba2d1305028061d54d0d37deb7b08dfc6d859052fc940c9a41ffebc3314
-
Filesize
1KB
MD5f52ffe9bd6481b607ee445aacab09b26
SHA1d022210eda29a6e1407d1b14bc10c39299205bc7
SHA2563f0af4d81e2104916d75b14c0f0c5ec4fbf53f49e7b32a08b754b6995b477787
SHA51278295f710364351cb1b3d21e5455249a4b1e267dbed6bb494cbf04f31ef01b06492e26748e11e31a8156effc695e07e575cc99d34dd4b2035e244df4c9c25f83
-
Filesize
6KB
MD577135fe1721e50b99b0a52f0f2dac779
SHA1eb848125edad0b790fbbbe0c12368c7ee9e0c428
SHA25607a4190b9ac3a2e31ecfdbb58d24ba997d0ac89074f24ea8b87fce84839f5803
SHA512ff360e9f4e115816853a281289a8a463fcadab00552c2b4673a1847bafedad6dbe05cf0e2ca1f6fa796cb4b3c5537ac61b32d2c5d1af920147eb18d1d91df07b
-
Filesize
5KB
MD5c6f53440db3e8647a5cf1fb36c2ffe63
SHA191f88268d00265bde1feaece670490415ad7a04c
SHA256a0e62bebe6b8946c32262fe111b02b86aa6cd2d40c039606fef7abb2f52decfb
SHA5127001749079fceaa86c3b667466767ac22d6f63e471272b7c55f34ace046251542a182417c7e3cbc601363ff9b5c5cae49f79092a302b05ef16cea2d64dd7b25f
-
Filesize
370B
MD554666a4d51d0d9049ab6268a8c9295af
SHA1991b962018ba209b86206346f548ff5a9d818312
SHA2566aab8c9d3e15cacef848a815da0136ae87a212a14839e532021b7442e3cd0aaa
SHA512993620f7b0ab1486cce28d2468879c328d47155d6ede1660782ac86e8bef855f3588355fd9bf012fea6a17afd36c7906da583084e9d6b16e457853c8d6dd0072
-
Filesize
203B
MD5656cb82bf02cc2509247d9f88f40d3b2
SHA1d2af63761922d0c75a36f4c721d9ae02aff53ee7
SHA2562c4cbbfac7b7e6094bfe9c1089e3927e71eaf9958fc66a07ee2cb53f5aed3d4b
SHA5127c49d129d791d950624d3199b2627dcc148e8d880e412a88ee904d9e7d3cd79a534290705894fe6ff2ef7099f2981e2cffbceca0a813c5352a6d63c8a4bd2188
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD56a1883750a4aad369f765a183a6d39a4
SHA1fa326cc2f698d7f4be3a827cf0f3032707a4edb6
SHA256017930754cf9b84071951804713e3687f6df0abb35eec8975ab914f6b9190390
SHA5120f2dbf2ae066f2caa29cf6d5df6b67dd4fdfa5d2d7de37419eda654437cdcd78f4026a34f1e99e36cb96832446b596190eb3b49e1746f4dd2ba206a28df26016