Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
23/07/2024, 03:12
Static task
static1
Behavioral task
behavioral1
Sample
65ea3b231b2e5902ccf96562550cbdb2_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
65ea3b231b2e5902ccf96562550cbdb2_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
65ea3b231b2e5902ccf96562550cbdb2_JaffaCakes118.html
-
Size
70KB
-
MD5
65ea3b231b2e5902ccf96562550cbdb2
-
SHA1
67d75adc42fb02882623aea82b6601f6879160f9
-
SHA256
c1ed59a8ec4f8e2dedb1ba659c267526dcaaeacc29985ceed79d853fa8a63500
-
SHA512
9ff6f8c7dea60150f502e00c77a462a7401b5e5849c1fad442a9d0a7f1c40ecaa518a026dc61a58cea46757909dbc6a589163c942db2a2dacb12c408283d9d3a
-
SSDEEP
768:SH0hqGbIiP//mdvsYSgLj/DVWmTMYq8Dfr7Vq3t40MSxjfLD+PHgkyMrj3DZ+/VC:SovIk/8tnwO8cZnucj
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4980 msedge.exe 4980 msedge.exe 4484 msedge.exe 4484 msedge.exe 468 identity_helper.exe 468 identity_helper.exe 4076 msedge.exe 4076 msedge.exe 4076 msedge.exe 4076 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4484 wrote to memory of 4252 4484 msedge.exe 84 PID 4484 wrote to memory of 4252 4484 msedge.exe 84 PID 4484 wrote to memory of 856 4484 msedge.exe 85 PID 4484 wrote to memory of 856 4484 msedge.exe 85 PID 4484 wrote to memory of 856 4484 msedge.exe 85 PID 4484 wrote to memory of 856 4484 msedge.exe 85 PID 4484 wrote to memory of 856 4484 msedge.exe 85 PID 4484 wrote to memory of 856 4484 msedge.exe 85 PID 4484 wrote to memory of 856 4484 msedge.exe 85 PID 4484 wrote to memory of 856 4484 msedge.exe 85 PID 4484 wrote to memory of 856 4484 msedge.exe 85 PID 4484 wrote to memory of 856 4484 msedge.exe 85 PID 4484 wrote to memory of 856 4484 msedge.exe 85 PID 4484 wrote to memory of 856 4484 msedge.exe 85 PID 4484 wrote to memory of 856 4484 msedge.exe 85 PID 4484 wrote to memory of 856 4484 msedge.exe 85 PID 4484 wrote to memory of 856 4484 msedge.exe 85 PID 4484 wrote to memory of 856 4484 msedge.exe 85 PID 4484 wrote to memory of 856 4484 msedge.exe 85 PID 4484 wrote to memory of 856 4484 msedge.exe 85 PID 4484 wrote to memory of 856 4484 msedge.exe 85 PID 4484 wrote to memory of 856 4484 msedge.exe 85 PID 4484 wrote to memory of 856 4484 msedge.exe 85 PID 4484 wrote to memory of 856 4484 msedge.exe 85 PID 4484 wrote to memory of 856 4484 msedge.exe 85 PID 4484 wrote to memory of 856 4484 msedge.exe 85 PID 4484 wrote to memory of 856 4484 msedge.exe 85 PID 4484 wrote to memory of 856 4484 msedge.exe 85 PID 4484 wrote to memory of 856 4484 msedge.exe 85 PID 4484 wrote to memory of 856 4484 msedge.exe 85 PID 4484 wrote to memory of 856 4484 msedge.exe 85 PID 4484 wrote to memory of 856 4484 msedge.exe 85 PID 4484 wrote to memory of 856 4484 msedge.exe 85 PID 4484 wrote to memory of 856 4484 msedge.exe 85 PID 4484 wrote to memory of 856 4484 msedge.exe 85 PID 4484 wrote to memory of 856 4484 msedge.exe 85 PID 4484 wrote to memory of 856 4484 msedge.exe 85 PID 4484 wrote to memory of 856 4484 msedge.exe 85 PID 4484 wrote to memory of 856 4484 msedge.exe 85 PID 4484 wrote to memory of 856 4484 msedge.exe 85 PID 4484 wrote to memory of 856 4484 msedge.exe 85 PID 4484 wrote to memory of 856 4484 msedge.exe 85 PID 4484 wrote to memory of 4980 4484 msedge.exe 86 PID 4484 wrote to memory of 4980 4484 msedge.exe 86 PID 4484 wrote to memory of 3600 4484 msedge.exe 87 PID 4484 wrote to memory of 3600 4484 msedge.exe 87 PID 4484 wrote to memory of 3600 4484 msedge.exe 87 PID 4484 wrote to memory of 3600 4484 msedge.exe 87 PID 4484 wrote to memory of 3600 4484 msedge.exe 87 PID 4484 wrote to memory of 3600 4484 msedge.exe 87 PID 4484 wrote to memory of 3600 4484 msedge.exe 87 PID 4484 wrote to memory of 3600 4484 msedge.exe 87 PID 4484 wrote to memory of 3600 4484 msedge.exe 87 PID 4484 wrote to memory of 3600 4484 msedge.exe 87 PID 4484 wrote to memory of 3600 4484 msedge.exe 87 PID 4484 wrote to memory of 3600 4484 msedge.exe 87 PID 4484 wrote to memory of 3600 4484 msedge.exe 87 PID 4484 wrote to memory of 3600 4484 msedge.exe 87 PID 4484 wrote to memory of 3600 4484 msedge.exe 87 PID 4484 wrote to memory of 3600 4484 msedge.exe 87 PID 4484 wrote to memory of 3600 4484 msedge.exe 87 PID 4484 wrote to memory of 3600 4484 msedge.exe 87 PID 4484 wrote to memory of 3600 4484 msedge.exe 87 PID 4484 wrote to memory of 3600 4484 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\65ea3b231b2e5902ccf96562550cbdb2_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4484 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffae8e546f8,0x7ffae8e54708,0x7ffae8e547182⤵PID:4252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1980,13944134351911377044,6367554149061824947,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1996 /prefetch:22⤵PID:856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1980,13944134351911377044,6367554149061824947,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2100 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1980,13944134351911377044,6367554149061824947,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2848 /prefetch:82⤵PID:3600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,13944134351911377044,6367554149061824947,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:1088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,13944134351911377044,6367554149061824947,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:1172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,13944134351911377044,6367554149061824947,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6020 /prefetch:12⤵PID:3324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,13944134351911377044,6367554149061824947,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5748 /prefetch:12⤵PID:3080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,13944134351911377044,6367554149061824947,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5560 /prefetch:12⤵PID:3472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1980,13944134351911377044,6367554149061824947,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5264 /prefetch:82⤵PID:1460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1980,13944134351911377044,6367554149061824947,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5264 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,13944134351911377044,6367554149061824947,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4184 /prefetch:12⤵PID:4360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,13944134351911377044,6367554149061824947,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4996 /prefetch:12⤵PID:4888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,13944134351911377044,6367554149061824947,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6172 /prefetch:12⤵PID:1616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,13944134351911377044,6367554149061824947,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5060 /prefetch:12⤵PID:4456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1980,13944134351911377044,6367554149061824947,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4076
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2292
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3080
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD56c86c838cf1dc704d2be375f04e1e6c6
SHA1ad2911a13a3addc86cc46d4329b2b1621cbe7e35
SHA256dff0886331bb45ec7711af92ab10be76291fde729dff23ca3270c86fb6e606bb
SHA512a120248263919c687f09615fed56c7cac825c8c93c104488632cebc1abfa338c39ebdc191e5f0c45ff30f054f08d4c02d12b013de6322490197606ce0c0b4f37
-
Filesize
152B
MD527f3335bf37563e4537db3624ee378da
SHA157543abc3d97c2a2b251b446820894f4b0111aeb
SHA256494425284ba12ee2fb07890e268be7890b258e1b1e5ecfa4a4dbc3411ab93b1a
SHA5122bef861f9d2d916272f6014110fdee84afced515710c9d69b3c310f6bf41728d1b2d41fee3c86441ff96c08c7d474f9326e992b9164b9a3f13627f7d24d0c485
-
Filesize
211KB
MD5151fb811968eaf8efb840908b89dc9d4
SHA17ec811009fd9b0e6d92d12d78b002275f2f1bee1
SHA256043fd8558e4a5a60aaccd2f0377f77a544e3e375242e9d7200dc6e51f94103ed
SHA51283aface0ab01da52fd077f747c9d5916e3c06b0ea5c551d7d316707ec3e8f3f986ce1c82e6f2136e48c6511a83cb0ac67ff6dc8f0e440ac72fc6854086a87674
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize192B
MD5f3d75e04f270a2ffc4bd62cf89d239e3
SHA17db304e96c9c40347f025e00245c8242b58c3dd9
SHA256ff3f83d5e59a641303b8a1bf69bf3fae296b372d277b8deadcaac0234070297b
SHA51208a15298b41eb19a3cb4e7159f01a231565fb602553de65c5ddebdae91471000e9e2f6490cc94a9d6eadf2f2bbd1878a4a2a5e983d913a5f8fa1ec6529ff22d7
-
Filesize
1KB
MD58201df81a63ced2fe24742a54653bcd7
SHA1ef398996dab5b250d43ff6068f63263c1798522b
SHA25674765ed817e563a0a297f5b934092ff594b521a12fd9a85c79e1886d40c55cc6
SHA512c26fbc437257dba65aa10be14458e81078433066b019982640583c39fa7d59fa3d1c3dfd50a495e94f505f7c4ca27d81731ea9cc9424e2995c7c398ef82c9e7f
-
Filesize
5KB
MD5c75f0d97c98d4978d926cc778bb0c2c0
SHA18626f7294579dda3f47ab9928614fb50a6d22d41
SHA256146631006e3c29c1e62c819ce899450ffec97994bf17bc4ebee8a2d48dc4fe8d
SHA512674e7da73cbbb9c41a7303e4830577108b3b478e2dd05a7dad5789eeff73cc84c5650d24c91c0426632e482b9f21f0eac4d19573d6c7d050192532e20517f304
-
Filesize
6KB
MD5fa00c336dfae2a162a787bf75b0cbf2e
SHA1411155442d50ee8d253efd22778005177c998fac
SHA256b72601838e85e09ccfd10d8b5ae37854bec974860e75524f9c3456757894fe40
SHA512189259dea41bfce6991c2c899738c912743012e96f7cb1fe64508e77b1f54101e5fe94e61719ad9b9e1a4cb97a31c08ee162fb896c4223074082fd8ff4272faa
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\fb096966-47aa-480a-b8ea-c8264ab75b59.tmp
Filesize6KB
MD544004bbba72d65deb42ba2855dfc5527
SHA164f0c2ec3a3f205fe9951a7c9c4c70b7e754f3e7
SHA2563762627df1861d38e647826a7ea28b5ab98c6b0c0adae927fe28bff565a801cd
SHA5124a4fac0342539f3fba423f06035abd8e14081a7f3e0a2325319b798c30c34b543d900b02d4defef29e2ace3d9e04814d4f9ee55561a8973604ff812827eda3c4
-
Filesize
10KB
MD59e13f7742f2c5b57af82c76d488b8031
SHA160592311a833b9eb909a69d01250aca5a74e04d0
SHA256d7b283a551b484d74bcace7e2c61895e1df31b1de6103a830440d5a382b5c4b2
SHA51237270b7030432cc8fbe1666c354209d9e8a0241fce275ecfc5242efd5fa3d9512ba4779679143687cacf5619c2596c20b78a2e35ea63fb5600a106394a69867b