Analysis
-
max time kernel
145s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
22/07/2024, 09:13
Static task
static1
Behavioral task
behavioral1
Sample
62a603cb952cee4af733e3816817e927_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
62a603cb952cee4af733e3816817e927_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
62a603cb952cee4af733e3816817e927_JaffaCakes118.html
-
Size
90KB
-
MD5
62a603cb952cee4af733e3816817e927
-
SHA1
2bdbda4db59c10ae6ba325bf08132dd17f2e2ff8
-
SHA256
2eb3afa2b25b7e8d99bc5d636bc083c41a132b42c6141dda1a39b6b54050b063
-
SHA512
0aaf5db2ba765dc047188a587ac6797de0c0e5ae870a4c38511d189e8de4f8241e082f1fa015c1e4ca66b9d752192899a226ac26b3c810f785bcd27deec3523c
-
SSDEEP
1536:gQZBCCOdl0IxC2OzH19wIpTHPaNWYPz+iAOX0ODqZu+VfURbEZXragDq1pcJ0ej3:gk2P0IxgPd
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4372 msedge.exe 4372 msedge.exe 4512 msedge.exe 4512 msedge.exe 1404 identity_helper.exe 1404 identity_helper.exe 6040 msedge.exe 6040 msedge.exe 6040 msedge.exe 6040 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe 4512 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4512 wrote to memory of 2812 4512 msedge.exe 84 PID 4512 wrote to memory of 2812 4512 msedge.exe 84 PID 4512 wrote to memory of 1156 4512 msedge.exe 85 PID 4512 wrote to memory of 1156 4512 msedge.exe 85 PID 4512 wrote to memory of 1156 4512 msedge.exe 85 PID 4512 wrote to memory of 1156 4512 msedge.exe 85 PID 4512 wrote to memory of 1156 4512 msedge.exe 85 PID 4512 wrote to memory of 1156 4512 msedge.exe 85 PID 4512 wrote to memory of 1156 4512 msedge.exe 85 PID 4512 wrote to memory of 1156 4512 msedge.exe 85 PID 4512 wrote to memory of 1156 4512 msedge.exe 85 PID 4512 wrote to memory of 1156 4512 msedge.exe 85 PID 4512 wrote to memory of 1156 4512 msedge.exe 85 PID 4512 wrote to memory of 1156 4512 msedge.exe 85 PID 4512 wrote to memory of 1156 4512 msedge.exe 85 PID 4512 wrote to memory of 1156 4512 msedge.exe 85 PID 4512 wrote to memory of 1156 4512 msedge.exe 85 PID 4512 wrote to memory of 1156 4512 msedge.exe 85 PID 4512 wrote to memory of 1156 4512 msedge.exe 85 PID 4512 wrote to memory of 1156 4512 msedge.exe 85 PID 4512 wrote to memory of 1156 4512 msedge.exe 85 PID 4512 wrote to memory of 1156 4512 msedge.exe 85 PID 4512 wrote to memory of 1156 4512 msedge.exe 85 PID 4512 wrote to memory of 1156 4512 msedge.exe 85 PID 4512 wrote to memory of 1156 4512 msedge.exe 85 PID 4512 wrote to memory of 1156 4512 msedge.exe 85 PID 4512 wrote to memory of 1156 4512 msedge.exe 85 PID 4512 wrote to memory of 1156 4512 msedge.exe 85 PID 4512 wrote to memory of 1156 4512 msedge.exe 85 PID 4512 wrote to memory of 1156 4512 msedge.exe 85 PID 4512 wrote to memory of 1156 4512 msedge.exe 85 PID 4512 wrote to memory of 1156 4512 msedge.exe 85 PID 4512 wrote to memory of 1156 4512 msedge.exe 85 PID 4512 wrote to memory of 1156 4512 msedge.exe 85 PID 4512 wrote to memory of 1156 4512 msedge.exe 85 PID 4512 wrote to memory of 1156 4512 msedge.exe 85 PID 4512 wrote to memory of 1156 4512 msedge.exe 85 PID 4512 wrote to memory of 1156 4512 msedge.exe 85 PID 4512 wrote to memory of 1156 4512 msedge.exe 85 PID 4512 wrote to memory of 1156 4512 msedge.exe 85 PID 4512 wrote to memory of 1156 4512 msedge.exe 85 PID 4512 wrote to memory of 1156 4512 msedge.exe 85 PID 4512 wrote to memory of 4372 4512 msedge.exe 86 PID 4512 wrote to memory of 4372 4512 msedge.exe 86 PID 4512 wrote to memory of 404 4512 msedge.exe 87 PID 4512 wrote to memory of 404 4512 msedge.exe 87 PID 4512 wrote to memory of 404 4512 msedge.exe 87 PID 4512 wrote to memory of 404 4512 msedge.exe 87 PID 4512 wrote to memory of 404 4512 msedge.exe 87 PID 4512 wrote to memory of 404 4512 msedge.exe 87 PID 4512 wrote to memory of 404 4512 msedge.exe 87 PID 4512 wrote to memory of 404 4512 msedge.exe 87 PID 4512 wrote to memory of 404 4512 msedge.exe 87 PID 4512 wrote to memory of 404 4512 msedge.exe 87 PID 4512 wrote to memory of 404 4512 msedge.exe 87 PID 4512 wrote to memory of 404 4512 msedge.exe 87 PID 4512 wrote to memory of 404 4512 msedge.exe 87 PID 4512 wrote to memory of 404 4512 msedge.exe 87 PID 4512 wrote to memory of 404 4512 msedge.exe 87 PID 4512 wrote to memory of 404 4512 msedge.exe 87 PID 4512 wrote to memory of 404 4512 msedge.exe 87 PID 4512 wrote to memory of 404 4512 msedge.exe 87 PID 4512 wrote to memory of 404 4512 msedge.exe 87 PID 4512 wrote to memory of 404 4512 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\62a603cb952cee4af733e3816817e927_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4512 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8001546f8,0x7ff800154708,0x7ff8001547182⤵PID:2812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,6076432655997265584,2762939996923478897,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2152 /prefetch:22⤵PID:1156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2148,6076432655997265584,2762939996923478897,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2204 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2148,6076432655997265584,2762939996923478897,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2832 /prefetch:82⤵PID:404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,6076432655997265584,2762939996923478897,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3184 /prefetch:12⤵PID:3300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,6076432655997265584,2762939996923478897,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3196 /prefetch:12⤵PID:4160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,6076432655997265584,2762939996923478897,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4700 /prefetch:12⤵PID:4820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,6076432655997265584,2762939996923478897,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4868 /prefetch:12⤵PID:2056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,6076432655997265584,2762939996923478897,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5096 /prefetch:12⤵PID:5004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,6076432655997265584,2762939996923478897,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6104 /prefetch:82⤵PID:884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,6076432655997265584,2762939996923478897,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6104 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,6076432655997265584,2762939996923478897,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6272 /prefetch:12⤵PID:1136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,6076432655997265584,2762939996923478897,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6220 /prefetch:12⤵PID:436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,6076432655997265584,2762939996923478897,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6384 /prefetch:12⤵PID:5200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,6076432655997265584,2762939996923478897,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6348 /prefetch:12⤵PID:5208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,6076432655997265584,2762939996923478897,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3652 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:6040
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3684
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4716
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52f842025e22e522658c640cfc7edc529
SHA14c2b24b02709acdd159f1b9bbeb396e52af27033
SHA2561191573f2a7c12f0b9b8460e06dc36ca5386305eb8c883ebbbc8eb15f4d8e23e
SHA5126e4393fd43984722229020ef662fc5981f253de31f13f30fadd6660bbc9ededcbfd163f132f6adaf42d435873322a5d0d3eea60060cf0e7f2e256262632c5d05
-
Filesize
152B
MD554aadd2d8ec66e446f1edb466b99ba8d
SHA1a94f02b035dc918d8d9a46e6886413f15be5bff0
SHA2561971045943002ef01930add9ba1a96a92ddc10d6c581ce29e33c38c2120b130e
SHA5127e077f903463da60b5587aed4f5352060df400ebda713b602b88c15cb2f91076531ea07546a9352df772656065e0bf27bd285905a60f036a5c5951076d35e994
-
Filesize
211KB
MD5151fb811968eaf8efb840908b89dc9d4
SHA17ec811009fd9b0e6d92d12d78b002275f2f1bee1
SHA256043fd8558e4a5a60aaccd2f0377f77a544e3e375242e9d7200dc6e51f94103ed
SHA51283aface0ab01da52fd077f747c9d5916e3c06b0ea5c551d7d316707ec3e8f3f986ce1c82e6f2136e48c6511a83cb0ac67ff6dc8f0e440ac72fc6854086a87674
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize504B
MD5c78bc6bd9da98914d4ee8ac97dd1e9dd
SHA1d5146ef6d88506cdb7ac3492c2398a9df46826fb
SHA25697a57f8860aa02dbe012161410167bddd9c679c5edb7be0772a6e428e3a9dc08
SHA512aa23afd0494a6837d3d81f7814e29777ae6335686810db7bcb6597ccefc773d6d3bca33f75f18c47e9ed0dc028c4b022839ac41e0f006d01b9132fecdfae8da8
-
Filesize
1KB
MD5aa58556d6b3dfe0500264fe892d1a95f
SHA1df74768b2d8052200947474d723b86716cd9a1bf
SHA256724501684aa8e887873004e8740eb53cfc63355fb49957c7206d61a2dbbe6ef2
SHA5126d2300438552e6c5c30670c1402b21cb5b655b8b90fef098858b438fbae82c4e96266c91f2b5e1632fcce28aed047dad4093eee9886f1c50840430e3d980e3a8
-
Filesize
5KB
MD5534bc48af192000fef9ab0f95ecc0fc0
SHA19e3509c8f5bfe31bb14d99f360680b5b441b9603
SHA25648550284a5635135d5409858e71cce31eaeccf51f8079536a206290fa7fc6cdb
SHA51276eb99a43dc3943eb053442562de1542ee7973a094ddc0a7c94469a13f4cce6b95df44058e910631548cfad8d13905849bf65e63193abd0b37b9ef469f3f67fd
-
Filesize
6KB
MD5af12d33c43d173bc7acd3486425291a4
SHA19c16385a94de58c7d1b625ff0a4eef8588e581ba
SHA25601b6221f0fa4c4b21c64ecb518529bbdc9d07932f6118b29f94991906a5a5d78
SHA5125b3e930fa4fd483456abe1e5d03c8f8bf2fcfed4d04c691c43a689cbd93d06b31a378a2963238c32632d446b6102dd0c6da6b3ab2f340e9d67b26101be5d8226
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD50f5c1f7bf3df462b79a627d4d3e6e8e5
SHA114ab50ea0fdf9194274dd167e556b6cb1a4e9c6f
SHA256c89ef6f654e5c690e5067b815587a461407f8e9e76b12e8ba2dc876d59625de2
SHA5125d1d9dfd815bd60ee822d8d76a7c75e6d9377514882b9673146f5df98e32ff8ffb8831a92a07b8b5c1454e4dfc70db8340f4b4395fa8929d0343dd91f141a3d1