Analysis
-
max time kernel
145s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
23/07/2024, 06:13
Static task
static1
Behavioral task
behavioral1
Sample
666f137c36995d54c37558124834e659_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
666f137c36995d54c37558124834e659_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
666f137c36995d54c37558124834e659_JaffaCakes118.html
-
Size
137KB
-
MD5
666f137c36995d54c37558124834e659
-
SHA1
329abb7a41641857305a593ea49ba2d5cdce2383
-
SHA256
2a4e635f5d2fbb823f62b1728b1d618db91f107692d67189be6e45f73b5f22ac
-
SHA512
028c3370f1aa8e563c2d36bf4f03780ab3dd745dc5a38aca5c791a91441e5bcc65659c3644d98864d4b5612c237bdee5a3af1c730565d6ac1ba0a03daa97aa17
-
SSDEEP
3072:O4Ej8Pm+hQih8xXSgQph7TNKenTtTNKwnTzRvAwiaG9uW1:O4Ej8Pm+hQih8GJJJ8R
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3712 msedge.exe 3712 msedge.exe 1172 msedge.exe 1172 msedge.exe 4260 msedge.exe 4260 msedge.exe 4260 msedge.exe 4260 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1172 wrote to memory of 4668 1172 msedge.exe 84 PID 1172 wrote to memory of 4668 1172 msedge.exe 84 PID 1172 wrote to memory of 2984 1172 msedge.exe 85 PID 1172 wrote to memory of 2984 1172 msedge.exe 85 PID 1172 wrote to memory of 2984 1172 msedge.exe 85 PID 1172 wrote to memory of 2984 1172 msedge.exe 85 PID 1172 wrote to memory of 2984 1172 msedge.exe 85 PID 1172 wrote to memory of 2984 1172 msedge.exe 85 PID 1172 wrote to memory of 2984 1172 msedge.exe 85 PID 1172 wrote to memory of 2984 1172 msedge.exe 85 PID 1172 wrote to memory of 2984 1172 msedge.exe 85 PID 1172 wrote to memory of 2984 1172 msedge.exe 85 PID 1172 wrote to memory of 2984 1172 msedge.exe 85 PID 1172 wrote to memory of 2984 1172 msedge.exe 85 PID 1172 wrote to memory of 2984 1172 msedge.exe 85 PID 1172 wrote to memory of 2984 1172 msedge.exe 85 PID 1172 wrote to memory of 2984 1172 msedge.exe 85 PID 1172 wrote to memory of 2984 1172 msedge.exe 85 PID 1172 wrote to memory of 2984 1172 msedge.exe 85 PID 1172 wrote to memory of 2984 1172 msedge.exe 85 PID 1172 wrote to memory of 2984 1172 msedge.exe 85 PID 1172 wrote to memory of 2984 1172 msedge.exe 85 PID 1172 wrote to memory of 2984 1172 msedge.exe 85 PID 1172 wrote to memory of 2984 1172 msedge.exe 85 PID 1172 wrote to memory of 2984 1172 msedge.exe 85 PID 1172 wrote to memory of 2984 1172 msedge.exe 85 PID 1172 wrote to memory of 2984 1172 msedge.exe 85 PID 1172 wrote to memory of 2984 1172 msedge.exe 85 PID 1172 wrote to memory of 2984 1172 msedge.exe 85 PID 1172 wrote to memory of 2984 1172 msedge.exe 85 PID 1172 wrote to memory of 2984 1172 msedge.exe 85 PID 1172 wrote to memory of 2984 1172 msedge.exe 85 PID 1172 wrote to memory of 2984 1172 msedge.exe 85 PID 1172 wrote to memory of 2984 1172 msedge.exe 85 PID 1172 wrote to memory of 2984 1172 msedge.exe 85 PID 1172 wrote to memory of 2984 1172 msedge.exe 85 PID 1172 wrote to memory of 2984 1172 msedge.exe 85 PID 1172 wrote to memory of 2984 1172 msedge.exe 85 PID 1172 wrote to memory of 2984 1172 msedge.exe 85 PID 1172 wrote to memory of 2984 1172 msedge.exe 85 PID 1172 wrote to memory of 2984 1172 msedge.exe 85 PID 1172 wrote to memory of 2984 1172 msedge.exe 85 PID 1172 wrote to memory of 3712 1172 msedge.exe 86 PID 1172 wrote to memory of 3712 1172 msedge.exe 86 PID 1172 wrote to memory of 5000 1172 msedge.exe 87 PID 1172 wrote to memory of 5000 1172 msedge.exe 87 PID 1172 wrote to memory of 5000 1172 msedge.exe 87 PID 1172 wrote to memory of 5000 1172 msedge.exe 87 PID 1172 wrote to memory of 5000 1172 msedge.exe 87 PID 1172 wrote to memory of 5000 1172 msedge.exe 87 PID 1172 wrote to memory of 5000 1172 msedge.exe 87 PID 1172 wrote to memory of 5000 1172 msedge.exe 87 PID 1172 wrote to memory of 5000 1172 msedge.exe 87 PID 1172 wrote to memory of 5000 1172 msedge.exe 87 PID 1172 wrote to memory of 5000 1172 msedge.exe 87 PID 1172 wrote to memory of 5000 1172 msedge.exe 87 PID 1172 wrote to memory of 5000 1172 msedge.exe 87 PID 1172 wrote to memory of 5000 1172 msedge.exe 87 PID 1172 wrote to memory of 5000 1172 msedge.exe 87 PID 1172 wrote to memory of 5000 1172 msedge.exe 87 PID 1172 wrote to memory of 5000 1172 msedge.exe 87 PID 1172 wrote to memory of 5000 1172 msedge.exe 87 PID 1172 wrote to memory of 5000 1172 msedge.exe 87 PID 1172 wrote to memory of 5000 1172 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\666f137c36995d54c37558124834e659_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1172 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffacc6446f8,0x7ffacc644708,0x7ffacc6447182⤵PID:4668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,5239555087482986928,6888324456244768751,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2164 /prefetch:22⤵PID:2984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,5239555087482986928,6888324456244768751,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,5239555087482986928,6888324456244768751,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2756 /prefetch:82⤵PID:5000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,5239555087482986928,6888324456244768751,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:1632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,5239555087482986928,6888324456244768751,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:12⤵PID:3992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,5239555087482986928,6888324456244768751,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4856 /prefetch:12⤵PID:2632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,5239555087482986928,6888324456244768751,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2236 /prefetch:12⤵PID:220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,5239555087482986928,6888324456244768751,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6024 /prefetch:12⤵PID:4280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,5239555087482986928,6888324456244768751,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5828 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4260
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2700
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4272
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5eaaad45aced1889a90a8aa4c39f92659
SHA15c0130d9e8d1a64c97924090d9a5258b8a31b83c
SHA2565e3237f26b6047f64459cd5d3a6bc3563e2642b98d75b97011c93e0a9bd26f3b
SHA5120db1c6bdb51f4e6ba5ef4dc12fc73886e599ab28f1eec5d943110bc3d856401ca31c05baa9026dd441b69f3de92307eb77d93f089ba6e2b84eea6e93982620e4
-
Filesize
152B
MD53ee50fb26a9d3f096c47ff8696c24321
SHA1a8c83e798d2a8b31fec0820560525e80dfa4fe66
SHA256d80ec29cb17280af0c7522b30a80ffa19d1e786c0b09accfe3234b967d23eb6f
SHA512479c0d2b76850aa79b58f9e0a8ba5773bd8909d915b98c2e9dc3a95c0ac18d7741b2ee571df695c0305598d89651c7aef2ff7c2fedb8b6a6aa30057ecfc872c5
-
Filesize
115KB
MD555dbb8d67b4ecf3c728a2a33b2a4eb0a
SHA17c7858d00be1c8fb2de390a377c5893e5521e862
SHA25691ca690b13099276b96f78968b5d1cfdd59ada8863c7dfbb187ac763df26a222
SHA512aa269927262576021b54cd7e4e88aceb7c0546b892586b79bfe608c0a4056856c1476f669c7d4b3881c1625ede6fec5932f0b63629af670ed4ca92d0268b5e24
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize264B
MD5163a446aee6391a6de795e6d78b6faf4
SHA1b042d084b20acfeefcf9ac5045ae6b3002029b3d
SHA2566506019b3140cea4aa8ab2c7f497dd344b37eac5e457e1129f0b9570d76ead4f
SHA512e1f8695ec529663d4db5d975e35eb2b142fe57793504dda56f974a8d0266f36c16c30104c1cafaf81069ed89d5252331ef86356eeab26e1131f3156257d48ff4
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
789B
MD50f187256e057e5f72a47897dfb229700
SHA1406255b4dc346ae09ebe010724eb2da8f79ef4ea
SHA2567a7fdaecae6938d2a5d8d622f4ce129fbe67d484cc892c5bc6596ad7e0c6bd87
SHA51275ac6762ca548b1530d60fa2d7fc5e9ae29a68cec7a0ca1825abe48011c9ee2cae89581addd9a47de0a528478445f75034344d63b56e626609b738a48ebce45a
-
Filesize
789B
MD5fcb610054b26342867a813959d180ac1
SHA12c04a05c97d5fea3ea488bd9845efd07b06a23de
SHA25681b0faf065f3f5fe4adda74674a9fec135799d2d5507b5c2ec6c813b50aa845b
SHA5127784d00fd9f9b7f74b57b1d66ee17203e2d4a0bbefe023bf865ecb49dcd4424f0e5532113e3bdefa0588241da3017c36d52aba56b8b6c109fed6de50463f82c2
-
Filesize
5KB
MD5a72ea341aed1193c352ef314baf9c1b3
SHA18efddc3f3249b6e84533319dd09b5819c913a64e
SHA2564981f8eb7b9d3957e4c80cfff329c6c8a90fa8ec55121b430f6477e2a27990eb
SHA5126247c1f6e8b3b04341e9c4cd03f5b8bc741da73e4cda959a8596af664bb6a7d479b976e89982946d9022a2b3fa07643b30e5d46b4febaadc79beaff74449e2e2
-
Filesize
6KB
MD5205b097f9f8d02a8b474e295c99bbfa1
SHA15487a7c2dea7acb587cc5b5009b457e9e2d7b27b
SHA2568d49341a24641efb0623f89a1e1c570733b1cbef539711d979ddee4c87f94902
SHA5124b32f379752f55688dfaedc01c60d506453b4e5f9a11b681ae7946e12d0d8940c0e480983b0a66bc6df25b089ad0ff2037f401945ab3eb01927b1d0c39b9ea3c
-
Filesize
10KB
MD5bea96ff54dda83d2e503b80cdd7e837b
SHA1276ccca55d7acf0d1e69b9686f1906a007ea6613
SHA256ee4076529ec49560ffdbed6b381b4fd4d3d2241c8edc7a95482bacde0b5b2fbc
SHA512c0543d11f3e9e2600f64170419720f8cc0eb6c1cd7eac8bc9f7a9e80dbfa71210ad34b40be2a956ca28e8a0514932ed61807e6ffab7e5879a45659e4b470fddc