Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
23/07/2024, 04:04
Static task
static1
Behavioral task
behavioral1
Sample
6610e4d98220bed073efe03da7d18ebf_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
6610e4d98220bed073efe03da7d18ebf_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
6610e4d98220bed073efe03da7d18ebf_JaffaCakes118.html
-
Size
9KB
-
MD5
6610e4d98220bed073efe03da7d18ebf
-
SHA1
46f0743118b8f4132fa80cccbf0dbf0acabe0d1a
-
SHA256
43e4d9ef88b0fcb8a7dd235fe067030ea9536b543ab1cd910a564e622b106c1e
-
SHA512
cdd8e75482ba7d3cde0c5fcd3eb8ca7590792801ae351081838d06366a52024690a6a1bb1f6a777600243d282bca297f384b115891dbaba86cda20dee4f7a2f4
-
SSDEEP
192:D2Pu4IkFuCBAnb5j3lsZRbQZKtu+/iO91w0yysW3:YICOnNj3KZF6Ktuw1w0l
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1732 msedge.exe 1732 msedge.exe 3924 msedge.exe 3924 msedge.exe 3384 identity_helper.exe 3384 identity_helper.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3924 wrote to memory of 2060 3924 msedge.exe 84 PID 3924 wrote to memory of 2060 3924 msedge.exe 84 PID 3924 wrote to memory of 2372 3924 msedge.exe 85 PID 3924 wrote to memory of 2372 3924 msedge.exe 85 PID 3924 wrote to memory of 2372 3924 msedge.exe 85 PID 3924 wrote to memory of 2372 3924 msedge.exe 85 PID 3924 wrote to memory of 2372 3924 msedge.exe 85 PID 3924 wrote to memory of 2372 3924 msedge.exe 85 PID 3924 wrote to memory of 2372 3924 msedge.exe 85 PID 3924 wrote to memory of 2372 3924 msedge.exe 85 PID 3924 wrote to memory of 2372 3924 msedge.exe 85 PID 3924 wrote to memory of 2372 3924 msedge.exe 85 PID 3924 wrote to memory of 2372 3924 msedge.exe 85 PID 3924 wrote to memory of 2372 3924 msedge.exe 85 PID 3924 wrote to memory of 2372 3924 msedge.exe 85 PID 3924 wrote to memory of 2372 3924 msedge.exe 85 PID 3924 wrote to memory of 2372 3924 msedge.exe 85 PID 3924 wrote to memory of 2372 3924 msedge.exe 85 PID 3924 wrote to memory of 2372 3924 msedge.exe 85 PID 3924 wrote to memory of 2372 3924 msedge.exe 85 PID 3924 wrote to memory of 2372 3924 msedge.exe 85 PID 3924 wrote to memory of 2372 3924 msedge.exe 85 PID 3924 wrote to memory of 2372 3924 msedge.exe 85 PID 3924 wrote to memory of 2372 3924 msedge.exe 85 PID 3924 wrote to memory of 2372 3924 msedge.exe 85 PID 3924 wrote to memory of 2372 3924 msedge.exe 85 PID 3924 wrote to memory of 2372 3924 msedge.exe 85 PID 3924 wrote to memory of 2372 3924 msedge.exe 85 PID 3924 wrote to memory of 2372 3924 msedge.exe 85 PID 3924 wrote to memory of 2372 3924 msedge.exe 85 PID 3924 wrote to memory of 2372 3924 msedge.exe 85 PID 3924 wrote to memory of 2372 3924 msedge.exe 85 PID 3924 wrote to memory of 2372 3924 msedge.exe 85 PID 3924 wrote to memory of 2372 3924 msedge.exe 85 PID 3924 wrote to memory of 2372 3924 msedge.exe 85 PID 3924 wrote to memory of 2372 3924 msedge.exe 85 PID 3924 wrote to memory of 2372 3924 msedge.exe 85 PID 3924 wrote to memory of 2372 3924 msedge.exe 85 PID 3924 wrote to memory of 2372 3924 msedge.exe 85 PID 3924 wrote to memory of 2372 3924 msedge.exe 85 PID 3924 wrote to memory of 2372 3924 msedge.exe 85 PID 3924 wrote to memory of 2372 3924 msedge.exe 85 PID 3924 wrote to memory of 1732 3924 msedge.exe 86 PID 3924 wrote to memory of 1732 3924 msedge.exe 86 PID 3924 wrote to memory of 4012 3924 msedge.exe 87 PID 3924 wrote to memory of 4012 3924 msedge.exe 87 PID 3924 wrote to memory of 4012 3924 msedge.exe 87 PID 3924 wrote to memory of 4012 3924 msedge.exe 87 PID 3924 wrote to memory of 4012 3924 msedge.exe 87 PID 3924 wrote to memory of 4012 3924 msedge.exe 87 PID 3924 wrote to memory of 4012 3924 msedge.exe 87 PID 3924 wrote to memory of 4012 3924 msedge.exe 87 PID 3924 wrote to memory of 4012 3924 msedge.exe 87 PID 3924 wrote to memory of 4012 3924 msedge.exe 87 PID 3924 wrote to memory of 4012 3924 msedge.exe 87 PID 3924 wrote to memory of 4012 3924 msedge.exe 87 PID 3924 wrote to memory of 4012 3924 msedge.exe 87 PID 3924 wrote to memory of 4012 3924 msedge.exe 87 PID 3924 wrote to memory of 4012 3924 msedge.exe 87 PID 3924 wrote to memory of 4012 3924 msedge.exe 87 PID 3924 wrote to memory of 4012 3924 msedge.exe 87 PID 3924 wrote to memory of 4012 3924 msedge.exe 87 PID 3924 wrote to memory of 4012 3924 msedge.exe 87 PID 3924 wrote to memory of 4012 3924 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\6610e4d98220bed073efe03da7d18ebf_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3924 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffba8a46f8,0x7fffba8a4708,0x7fffba8a47182⤵PID:2060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,17372530667354376502,10100931721817589912,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2100 /prefetch:22⤵PID:2372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,17372530667354376502,10100931721817589912,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2224 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,17372530667354376502,10100931721817589912,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2856 /prefetch:82⤵PID:4012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,17372530667354376502,10100931721817589912,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:2496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,17372530667354376502,10100931721817589912,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:2512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,17372530667354376502,10100931721817589912,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5124 /prefetch:12⤵PID:4056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,17372530667354376502,10100931721817589912,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4580 /prefetch:12⤵PID:3544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,17372530667354376502,10100931721817589912,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5736 /prefetch:82⤵PID:1664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,17372530667354376502,10100931721817589912,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5736 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,17372530667354376502,10100931721817589912,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3532 /prefetch:12⤵PID:1604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,17372530667354376502,10100931721817589912,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4984 /prefetch:12⤵PID:2436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,17372530667354376502,10100931721817589912,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4580 /prefetch:12⤵PID:4940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,17372530667354376502,10100931721817589912,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5564 /prefetch:12⤵PID:1612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,17372530667354376502,10100931721817589912,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5084 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3460
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2104
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4940
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52f842025e22e522658c640cfc7edc529
SHA14c2b24b02709acdd159f1b9bbeb396e52af27033
SHA2561191573f2a7c12f0b9b8460e06dc36ca5386305eb8c883ebbbc8eb15f4d8e23e
SHA5126e4393fd43984722229020ef662fc5981f253de31f13f30fadd6660bbc9ededcbfd163f132f6adaf42d435873322a5d0d3eea60060cf0e7f2e256262632c5d05
-
Filesize
152B
MD554aadd2d8ec66e446f1edb466b99ba8d
SHA1a94f02b035dc918d8d9a46e6886413f15be5bff0
SHA2561971045943002ef01930add9ba1a96a92ddc10d6c581ce29e33c38c2120b130e
SHA5127e077f903463da60b5587aed4f5352060df400ebda713b602b88c15cb2f91076531ea07546a9352df772656065e0bf27bd285905a60f036a5c5951076d35e994
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize192B
MD5b63f71166ad8d41d6c6e63d118ae57e4
SHA1b56d3f9c0c587dfbb368b39cb6ef04f64143c97f
SHA256062ee783a89b52cad0a06d82da04914bb7dd94e471d09f52203f8df17d98fef6
SHA51273e4eeff1f81927eded8c5fcbc2679d7b179c69db3f7505616c04ed42aa85b811c86c64f2066fbdbe15eeac3b0d9bb84d66808afacaac3ca7d4331af0d82588a
-
Filesize
277B
MD5c1784da0b7fc2e1ad01607909076626b
SHA1cb0f9841d457e41920c6f53571baab4d05f3a9dc
SHA256325b1f2d4d53588b14c5c7c4af79c4559bc039265866035d0be32bf8b8882210
SHA51265f9fcf7ad5ea6baae811e3f0315a48f9d6a3035fe57affc632682536025f47c361e95e144ee846943ba9ba48608bd0caaa8ed332b60eaf54ae138a5de0f14d1
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD56c32a92bbf82632cdfceae40f10c1c17
SHA1e0feeaede488a068999c1c533b33b22809b2b073
SHA256a8a61587be13c041b667e0dab55e46a762336d936d104c31bde68ae4a50ad393
SHA51274e25d5ce5826876183082417182143e391b14ccb8a08f22a84177050b51e114fa024c700892288cfa15fba36fd60feec2d23a896a4c225beb664c37f2f941c9
-
Filesize
6KB
MD505257b29a2dde6b25592b202741e6551
SHA1ccf88c5c8d25d85417fe3bc263b8ab5e7b7e80ec
SHA256e3390e9679030340c4abe08f1f6f1ea5cbe7d60bec0b37106b6c34b78875192d
SHA512cd77eb5bad4502d9eb8679510a0600c9fbb927999803a2b9ce685ae852554fb3884a39d8348a7100ef105e321645c4d864fe4548ec69f69712f5b3c347355c2d
-
Filesize
6KB
MD50d7ad00c771690355255eecb2f82daf0
SHA14d200fc8709beeece00e1b402140d82bdf3f234f
SHA2569af7ecb6da80379823bf74c3c933d52c0a47fe9521661f732254a23d95066b46
SHA512b0ddf274dd091dc2bf293e78f7ee37086f83efc5ef85886ffe6653cab49bde57df05ccb81d5dcff093c7976a922d8dae687ea0aa33214865162595c554c100db
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD55b73d8c5c6db46d751b27196456eed82
SHA1019d24cebb3fadf01b7998f4399d9398964733bd
SHA256eb5890227e4b7f0b0fb3d89b057223819230488c1ab4b22dcc7f579af7887259
SHA5126ce6085b7757efae95f7b47205b7ffa4e971c311aac87a45dac714c776f38c3f09ca57e132bda8d8c4c6425cf5d2915e6bcdcf78f3da91fe001a3d6e3c0ae57d