Analysis
-
max time kernel
145s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
23-07-2024 11:39
Static task
static1
Behavioral task
behavioral1
Sample
676f1b32279d87369422173c520cf0bf_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
676f1b32279d87369422173c520cf0bf_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
676f1b32279d87369422173c520cf0bf_JaffaCakes118.html
-
Size
69KB
-
MD5
676f1b32279d87369422173c520cf0bf
-
SHA1
b76cb749407769772226182e0840156619f70bc8
-
SHA256
979c57fbe76330d8c40fc9c4c2411c46cdddee7c5779c75efca42ad5062fafc0
-
SHA512
704bbe58b34fd79417abdf56f823c1684cba8db0ffa25d17c959b182caca8705f0555b51bf0737cd099b960e5218ef451f9267017371b224fee538cd19ac9a96
-
SSDEEP
1536:gQZBCCOdk0IxCUxajXAQ7Ema3x3PF1uo6QvgA5+pJGv58c/szZJkF3ttDiVRFoO+:gk2C0IxujXAQ7Em8x3PF1/6QvgA5+pJ2
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2976 msedge.exe 2976 msedge.exe 3468 msedge.exe 3468 msedge.exe 3460 identity_helper.exe 3460 identity_helper.exe 1568 msedge.exe 1568 msedge.exe 1568 msedge.exe 1568 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3468 wrote to memory of 3528 3468 msedge.exe 84 PID 3468 wrote to memory of 3528 3468 msedge.exe 84 PID 3468 wrote to memory of 4252 3468 msedge.exe 85 PID 3468 wrote to memory of 4252 3468 msedge.exe 85 PID 3468 wrote to memory of 4252 3468 msedge.exe 85 PID 3468 wrote to memory of 4252 3468 msedge.exe 85 PID 3468 wrote to memory of 4252 3468 msedge.exe 85 PID 3468 wrote to memory of 4252 3468 msedge.exe 85 PID 3468 wrote to memory of 4252 3468 msedge.exe 85 PID 3468 wrote to memory of 4252 3468 msedge.exe 85 PID 3468 wrote to memory of 4252 3468 msedge.exe 85 PID 3468 wrote to memory of 4252 3468 msedge.exe 85 PID 3468 wrote to memory of 4252 3468 msedge.exe 85 PID 3468 wrote to memory of 4252 3468 msedge.exe 85 PID 3468 wrote to memory of 4252 3468 msedge.exe 85 PID 3468 wrote to memory of 4252 3468 msedge.exe 85 PID 3468 wrote to memory of 4252 3468 msedge.exe 85 PID 3468 wrote to memory of 4252 3468 msedge.exe 85 PID 3468 wrote to memory of 4252 3468 msedge.exe 85 PID 3468 wrote to memory of 4252 3468 msedge.exe 85 PID 3468 wrote to memory of 4252 3468 msedge.exe 85 PID 3468 wrote to memory of 4252 3468 msedge.exe 85 PID 3468 wrote to memory of 4252 3468 msedge.exe 85 PID 3468 wrote to memory of 4252 3468 msedge.exe 85 PID 3468 wrote to memory of 4252 3468 msedge.exe 85 PID 3468 wrote to memory of 4252 3468 msedge.exe 85 PID 3468 wrote to memory of 4252 3468 msedge.exe 85 PID 3468 wrote to memory of 4252 3468 msedge.exe 85 PID 3468 wrote to memory of 4252 3468 msedge.exe 85 PID 3468 wrote to memory of 4252 3468 msedge.exe 85 PID 3468 wrote to memory of 4252 3468 msedge.exe 85 PID 3468 wrote to memory of 4252 3468 msedge.exe 85 PID 3468 wrote to memory of 4252 3468 msedge.exe 85 PID 3468 wrote to memory of 4252 3468 msedge.exe 85 PID 3468 wrote to memory of 4252 3468 msedge.exe 85 PID 3468 wrote to memory of 4252 3468 msedge.exe 85 PID 3468 wrote to memory of 4252 3468 msedge.exe 85 PID 3468 wrote to memory of 4252 3468 msedge.exe 85 PID 3468 wrote to memory of 4252 3468 msedge.exe 85 PID 3468 wrote to memory of 4252 3468 msedge.exe 85 PID 3468 wrote to memory of 4252 3468 msedge.exe 85 PID 3468 wrote to memory of 4252 3468 msedge.exe 85 PID 3468 wrote to memory of 2976 3468 msedge.exe 86 PID 3468 wrote to memory of 2976 3468 msedge.exe 86 PID 3468 wrote to memory of 2084 3468 msedge.exe 87 PID 3468 wrote to memory of 2084 3468 msedge.exe 87 PID 3468 wrote to memory of 2084 3468 msedge.exe 87 PID 3468 wrote to memory of 2084 3468 msedge.exe 87 PID 3468 wrote to memory of 2084 3468 msedge.exe 87 PID 3468 wrote to memory of 2084 3468 msedge.exe 87 PID 3468 wrote to memory of 2084 3468 msedge.exe 87 PID 3468 wrote to memory of 2084 3468 msedge.exe 87 PID 3468 wrote to memory of 2084 3468 msedge.exe 87 PID 3468 wrote to memory of 2084 3468 msedge.exe 87 PID 3468 wrote to memory of 2084 3468 msedge.exe 87 PID 3468 wrote to memory of 2084 3468 msedge.exe 87 PID 3468 wrote to memory of 2084 3468 msedge.exe 87 PID 3468 wrote to memory of 2084 3468 msedge.exe 87 PID 3468 wrote to memory of 2084 3468 msedge.exe 87 PID 3468 wrote to memory of 2084 3468 msedge.exe 87 PID 3468 wrote to memory of 2084 3468 msedge.exe 87 PID 3468 wrote to memory of 2084 3468 msedge.exe 87 PID 3468 wrote to memory of 2084 3468 msedge.exe 87 PID 3468 wrote to memory of 2084 3468 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\676f1b32279d87369422173c520cf0bf_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3468 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0x40,0x108,0x7fff268146f8,0x7fff26814708,0x7fff268147182⤵PID:3528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,13736622598552680003,16559976562448801514,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:22⤵PID:4252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,13736622598552680003,16559976562448801514,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,13736622598552680003,16559976562448801514,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2856 /prefetch:82⤵PID:2084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,13736622598552680003,16559976562448801514,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:4012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,13736622598552680003,16559976562448801514,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:5116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,13736622598552680003,16559976562448801514,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4216 /prefetch:12⤵PID:4964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,13736622598552680003,16559976562448801514,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5160 /prefetch:12⤵PID:4852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,13736622598552680003,16559976562448801514,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5504 /prefetch:12⤵PID:4192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,13736622598552680003,16559976562448801514,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5364 /prefetch:82⤵PID:2948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,13736622598552680003,16559976562448801514,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5364 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,13736622598552680003,16559976562448801514,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5984 /prefetch:12⤵PID:2540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,13736622598552680003,16559976562448801514,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5992 /prefetch:12⤵PID:1052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,13736622598552680003,16559976562448801514,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5972 /prefetch:12⤵PID:4436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,13736622598552680003,16559976562448801514,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6032 /prefetch:12⤵PID:3080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,13736622598552680003,16559976562448801514,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5356 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1568
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:996
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2948
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5bafce9e4c53a0cb85310891b6b21791b
SHA15d70027cc137a7cbb38f5801b15fd97b05e89ee2
SHA25671fb546b5d2210a56e90b448ee10120cd92c518c8f79fb960f01b918f89f2b00
SHA512c0e4d3eccc0135ac92051539a18f64b8b8628cfe74e5b019d4f8e1dcbb51a9b49c486a1523885fe6be53da7118c013852e753c26a5490538c1e721fd0188836c
-
Filesize
152B
MD5a499254d6b5d91f97eb7a86e5f8ca573
SHA103dbfebfec8c94a9c06f9b0cd81ebe0a2b8be3d1
SHA256fb87b758c2b98989df851380293ff6786cb9a5cf2b3a384cec70d9f3eb064499
SHA512d7adcc76d0470bcd68d7644de3c8d2b6d61df8485979a4752ceea3df4d85bd1c290f72b3d8d5c8d639d5a10afa48d80e457f76b44dd8107ac97eb80fd98c7b0c
-
Filesize
211KB
MD5151fb811968eaf8efb840908b89dc9d4
SHA17ec811009fd9b0e6d92d12d78b002275f2f1bee1
SHA256043fd8558e4a5a60aaccd2f0377f77a544e3e375242e9d7200dc6e51f94103ed
SHA51283aface0ab01da52fd077f747c9d5916e3c06b0ea5c551d7d316707ec3e8f3f986ce1c82e6f2136e48c6511a83cb0ac67ff6dc8f0e440ac72fc6854086a87674
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize504B
MD508363cfb0904fdfba26ad304d9d0c4e2
SHA1a716a3b77799850146040262a80bde8bfc5191b7
SHA25633e41db9ede155f3e01f30c24a4953615410330dce303bd01dd1db1871ef7d0d
SHA512af16d23458ab152db0ca4784e6e0f4136a34fb4460169fcaddf270adbf081cfccbf80ede8cf7bd3d60d2fcc2f29dc1aac7aeac0cd80ce07afa7c0a8ccd6013b3
-
Filesize
1KB
MD568b680103fb9ca6c9e81d5f59036bbfd
SHA111778aa4863edb7cf3de9cb14f0d489abcf2c0b6
SHA2564cbc57c93cfd7e9f04316c8abcd186dd93e457e142bf8bccecfdb0bee68f61e8
SHA512b86b6f1cba3266d7b26a15b3fc477e6d9077235134d71bd90e245a87543257d74285ecf69267ea6ee80c40ad29558d7e2027617981ebf6042a98dc8b29b86121
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
6KB
MD5548448bac6f234d91d7ed2aa2a83bc0c
SHA13a73f16b39a8496bf75c094a74004f8f65404865
SHA2567a9b661ca9dfb12f103382604e2bc77e57f020a75cfededc51651d5ba64fcf47
SHA51281f33ee3ddfed1cca476cd5825d2db6219f54371e7470707de64774d483bd32442d357fb0d71f728bdfc0adbbc677211f7bccced5a9c242550e51fbca87ad559
-
Filesize
5KB
MD500e1463f77c39aa8f352192cc3e4dc45
SHA188c24bbc91a0a9763bd59e15db1137b6d3ee8e5f
SHA2568d03ce19e9bd2fe52d6760ff533154de312b3562bf9ed498bf5e0f8cd0f807bc
SHA5124f23163cb9141a6541baa9864fa972ecc76855bd97a4dc2349f2759622b0566b85cc907cf086fdd0365ca9ec4f061babc4823da0aec010759e10749465032b6e
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5bdc1cbfdb8f749eaaa7523e256298e05
SHA1c2ddb5d09af07af4388ec8caca245a85f3ecd3dd
SHA2560a86c74d8c046e2f84d0389d871c6e5ded5a85a74ce3aa8a9dfbdea7ef04ef45
SHA512d4b4995595274a07cad82f397991fa2d0b0e97ea3fcf67326d6aea67cc3283b4b8984e125851bc375ce7eefd703ccf50dc12e3652e0576bcf02b966527336232