Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
23-07-2024 17:40
Static task
static1
Behavioral task
behavioral1
Sample
6891f48ae88b207c5e8ee1e4c5a9cfe7_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
6891f48ae88b207c5e8ee1e4c5a9cfe7_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
6891f48ae88b207c5e8ee1e4c5a9cfe7_JaffaCakes118.html
-
Size
14KB
-
MD5
6891f48ae88b207c5e8ee1e4c5a9cfe7
-
SHA1
72f704f3523808fc88fd105db49005ab83c85e80
-
SHA256
76c3139019a0a2e34b5d4d7a032b53713acc2f4937bc5932341b5c19dfbae755
-
SHA512
93e474acb677af5fec72d58f4a0cf318253df17b560d8da2e8f94a5b85c4b0799c53b0a1f5505a7b061c40d6a1ddb8240f327ce5dbb5ca19f2a6a927e318a769
-
SSDEEP
384:srEc7dS9eW0mcuqC/arrcDWZAV00KiGJ2:zc5+MmpqC/gwbHz
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3948 msedge.exe 3948 msedge.exe 2852 msedge.exe 2852 msedge.exe 2764 identity_helper.exe 2764 identity_helper.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe 4948 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe 2852 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2852 wrote to memory of 4284 2852 msedge.exe 84 PID 2852 wrote to memory of 4284 2852 msedge.exe 84 PID 2852 wrote to memory of 3252 2852 msedge.exe 85 PID 2852 wrote to memory of 3252 2852 msedge.exe 85 PID 2852 wrote to memory of 3252 2852 msedge.exe 85 PID 2852 wrote to memory of 3252 2852 msedge.exe 85 PID 2852 wrote to memory of 3252 2852 msedge.exe 85 PID 2852 wrote to memory of 3252 2852 msedge.exe 85 PID 2852 wrote to memory of 3252 2852 msedge.exe 85 PID 2852 wrote to memory of 3252 2852 msedge.exe 85 PID 2852 wrote to memory of 3252 2852 msedge.exe 85 PID 2852 wrote to memory of 3252 2852 msedge.exe 85 PID 2852 wrote to memory of 3252 2852 msedge.exe 85 PID 2852 wrote to memory of 3252 2852 msedge.exe 85 PID 2852 wrote to memory of 3252 2852 msedge.exe 85 PID 2852 wrote to memory of 3252 2852 msedge.exe 85 PID 2852 wrote to memory of 3252 2852 msedge.exe 85 PID 2852 wrote to memory of 3252 2852 msedge.exe 85 PID 2852 wrote to memory of 3252 2852 msedge.exe 85 PID 2852 wrote to memory of 3252 2852 msedge.exe 85 PID 2852 wrote to memory of 3252 2852 msedge.exe 85 PID 2852 wrote to memory of 3252 2852 msedge.exe 85 PID 2852 wrote to memory of 3252 2852 msedge.exe 85 PID 2852 wrote to memory of 3252 2852 msedge.exe 85 PID 2852 wrote to memory of 3252 2852 msedge.exe 85 PID 2852 wrote to memory of 3252 2852 msedge.exe 85 PID 2852 wrote to memory of 3252 2852 msedge.exe 85 PID 2852 wrote to memory of 3252 2852 msedge.exe 85 PID 2852 wrote to memory of 3252 2852 msedge.exe 85 PID 2852 wrote to memory of 3252 2852 msedge.exe 85 PID 2852 wrote to memory of 3252 2852 msedge.exe 85 PID 2852 wrote to memory of 3252 2852 msedge.exe 85 PID 2852 wrote to memory of 3252 2852 msedge.exe 85 PID 2852 wrote to memory of 3252 2852 msedge.exe 85 PID 2852 wrote to memory of 3252 2852 msedge.exe 85 PID 2852 wrote to memory of 3252 2852 msedge.exe 85 PID 2852 wrote to memory of 3252 2852 msedge.exe 85 PID 2852 wrote to memory of 3252 2852 msedge.exe 85 PID 2852 wrote to memory of 3252 2852 msedge.exe 85 PID 2852 wrote to memory of 3252 2852 msedge.exe 85 PID 2852 wrote to memory of 3252 2852 msedge.exe 85 PID 2852 wrote to memory of 3252 2852 msedge.exe 85 PID 2852 wrote to memory of 3948 2852 msedge.exe 86 PID 2852 wrote to memory of 3948 2852 msedge.exe 86 PID 2852 wrote to memory of 2488 2852 msedge.exe 87 PID 2852 wrote to memory of 2488 2852 msedge.exe 87 PID 2852 wrote to memory of 2488 2852 msedge.exe 87 PID 2852 wrote to memory of 2488 2852 msedge.exe 87 PID 2852 wrote to memory of 2488 2852 msedge.exe 87 PID 2852 wrote to memory of 2488 2852 msedge.exe 87 PID 2852 wrote to memory of 2488 2852 msedge.exe 87 PID 2852 wrote to memory of 2488 2852 msedge.exe 87 PID 2852 wrote to memory of 2488 2852 msedge.exe 87 PID 2852 wrote to memory of 2488 2852 msedge.exe 87 PID 2852 wrote to memory of 2488 2852 msedge.exe 87 PID 2852 wrote to memory of 2488 2852 msedge.exe 87 PID 2852 wrote to memory of 2488 2852 msedge.exe 87 PID 2852 wrote to memory of 2488 2852 msedge.exe 87 PID 2852 wrote to memory of 2488 2852 msedge.exe 87 PID 2852 wrote to memory of 2488 2852 msedge.exe 87 PID 2852 wrote to memory of 2488 2852 msedge.exe 87 PID 2852 wrote to memory of 2488 2852 msedge.exe 87 PID 2852 wrote to memory of 2488 2852 msedge.exe 87 PID 2852 wrote to memory of 2488 2852 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\6891f48ae88b207c5e8ee1e4c5a9cfe7_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc8dd046f8,0x7ffc8dd04708,0x7ffc8dd047182⤵PID:4284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,13537177963502407521,11372005112691498287,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2084 /prefetch:22⤵PID:3252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2076,13537177963502407521,11372005112691498287,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2664 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2076,13537177963502407521,11372005112691498287,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2300 /prefetch:82⤵PID:2488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,13537177963502407521,11372005112691498287,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:1196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,13537177963502407521,11372005112691498287,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:5072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,13537177963502407521,11372005112691498287,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4208 /prefetch:12⤵PID:3428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,13537177963502407521,11372005112691498287,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5216 /prefetch:12⤵PID:3760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,13537177963502407521,11372005112691498287,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5572 /prefetch:12⤵PID:2256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,13537177963502407521,11372005112691498287,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5820 /prefetch:82⤵PID:1484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,13537177963502407521,11372005112691498287,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5820 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,13537177963502407521,11372005112691498287,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5892 /prefetch:12⤵PID:2588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,13537177963502407521,11372005112691498287,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5908 /prefetch:12⤵PID:3104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,13537177963502407521,11372005112691498287,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5932 /prefetch:12⤵PID:2224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,13537177963502407521,11372005112691498287,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3504 /prefetch:12⤵PID:3480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,13537177963502407521,11372005112691498287,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2372 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4948
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4828
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4488
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD56c86c838cf1dc704d2be375f04e1e6c6
SHA1ad2911a13a3addc86cc46d4329b2b1621cbe7e35
SHA256dff0886331bb45ec7711af92ab10be76291fde729dff23ca3270c86fb6e606bb
SHA512a120248263919c687f09615fed56c7cac825c8c93c104488632cebc1abfa338c39ebdc191e5f0c45ff30f054f08d4c02d12b013de6322490197606ce0c0b4f37
-
Filesize
152B
MD527f3335bf37563e4537db3624ee378da
SHA157543abc3d97c2a2b251b446820894f4b0111aeb
SHA256494425284ba12ee2fb07890e268be7890b258e1b1e5ecfa4a4dbc3411ab93b1a
SHA5122bef861f9d2d916272f6014110fdee84afced515710c9d69b3c310f6bf41728d1b2d41fee3c86441ff96c08c7d474f9326e992b9164b9a3f13627f7d24d0c485
-
Filesize
211KB
MD5151fb811968eaf8efb840908b89dc9d4
SHA17ec811009fd9b0e6d92d12d78b002275f2f1bee1
SHA256043fd8558e4a5a60aaccd2f0377f77a544e3e375242e9d7200dc6e51f94103ed
SHA51283aface0ab01da52fd077f747c9d5916e3c06b0ea5c551d7d316707ec3e8f3f986ce1c82e6f2136e48c6511a83cb0ac67ff6dc8f0e440ac72fc6854086a87674
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize312B
MD514442da3f09e33dca0eeb6cdbb27260d
SHA187abce6d4ebc1c455aec9ea578bae37f0ad32747
SHA25675393c89df90b2dfd077f505f60743443c12d31bbbb9929cb98c3aa7dcaa4c99
SHA512ee68b2db50dffe4d75a196fb068d0a0f0f3450dd935956306787c7e64e7d886d81219f8199f4888d1cb3b194a85234e8cd1b412c89f5f1f9e5e277f99b53d77a
-
Filesize
1KB
MD5ddb99f951469537a4a2b0e0788612e55
SHA197846350f75d824126214050514aec57dd2a0db8
SHA256a47a04ccf661ce20d7d91b9cc5fa4c78548151f6a17c21f957d06d2164d317ff
SHA5122f0f8ee67f9113aa9a71649038be2d9380e8a7d6eb4d14c9b958b0393baae263fac99e7a5ff18b14197308e51e67c1a63fb7dbbd9760122110abfd0b88d36b6e
-
Filesize
5KB
MD5133698ec68a78c86517f7a14959010b1
SHA1d93bc522255a7f203e19f11eb88cc69789ccc182
SHA256d19bb188096772a4bd7fa200f854ab8b56c81af758aa409c4c74b6032aea2dbe
SHA512ef92ee4bb47a0e1eacd54d95bb1c60530d313e6172b2ca06fd2a9417588b3566ad303a31506a99a651a75b00f01ef597512990c5978d24b3fb4ec69cc2b4a2ab
-
Filesize
6KB
MD54e154b3b081ba44c4d4324f13afe24a8
SHA18cef36f2df165cb352d7347d4da37c602e8bab77
SHA25638bbad767729be8417c596dc59f19a55fadadb9b39ccfd496bf29a77beb1d230
SHA51262fc89ca047fa042f4657abe340e8c94926e5d1cc8241d1931bf8c521e4ebab42c790bd30fd65b6ebabb386e5f75d9f8cfc28dbe558a2f96050bee19fa06cf8f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD52b8f552da9cba5922e6bb1c69f59903a
SHA1090ed76eb8f6e265736dd2bc06e631876e81d965
SHA256b3539bd220a4bf3769ceead54c226bffe0926eab72de193d238eb60253f62f36
SHA51221df5e98acc0b036cb119d3d793389a81214729cd7b8bcc1cf97ded47ec0679b4b4ede9f1ce7397e1fbaf3774bef79557f9552d4eed003fa6b48f12b01e4c17e