Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
24-07-2024 07:35
Static task
static1
Behavioral task
behavioral1
Sample
6ac2300d82acd92c1892f0a7ad04b831_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
6ac2300d82acd92c1892f0a7ad04b831_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
6ac2300d82acd92c1892f0a7ad04b831_JaffaCakes118.html
-
Size
5KB
-
MD5
6ac2300d82acd92c1892f0a7ad04b831
-
SHA1
83d360eeeffa1ee99fe40d1b97df93e5877110e2
-
SHA256
3b3a53cb0073c326665b67f5109c2cf95da8a1504549313c96ee9c5fcfd6473d
-
SHA512
937c809b80798446560fc06f20507bc94256b77612890d9a3a11ec030c19736f83b1358ad0db942ea1418a7fd640678b07dfc7c73c9b4925dc21a40f031be246
-
SSDEEP
96:0Fw6nmqgJcbqMAPSA/pTCdajlQPwjhxblWN+HyMatXMxs1qxXT9SWptEsG21GqaY:0y6nm9cGMAPSAiaj8wjh1o+HyMJxvXTT
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1484 msedge.exe 1484 msedge.exe 2360 msedge.exe 2360 msedge.exe 1412 identity_helper.exe 1412 identity_helper.exe 5252 msedge.exe 5252 msedge.exe 5252 msedge.exe 5252 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2360 wrote to memory of 1056 2360 msedge.exe 84 PID 2360 wrote to memory of 1056 2360 msedge.exe 84 PID 2360 wrote to memory of 3268 2360 msedge.exe 85 PID 2360 wrote to memory of 3268 2360 msedge.exe 85 PID 2360 wrote to memory of 3268 2360 msedge.exe 85 PID 2360 wrote to memory of 3268 2360 msedge.exe 85 PID 2360 wrote to memory of 3268 2360 msedge.exe 85 PID 2360 wrote to memory of 3268 2360 msedge.exe 85 PID 2360 wrote to memory of 3268 2360 msedge.exe 85 PID 2360 wrote to memory of 3268 2360 msedge.exe 85 PID 2360 wrote to memory of 3268 2360 msedge.exe 85 PID 2360 wrote to memory of 3268 2360 msedge.exe 85 PID 2360 wrote to memory of 3268 2360 msedge.exe 85 PID 2360 wrote to memory of 3268 2360 msedge.exe 85 PID 2360 wrote to memory of 3268 2360 msedge.exe 85 PID 2360 wrote to memory of 3268 2360 msedge.exe 85 PID 2360 wrote to memory of 3268 2360 msedge.exe 85 PID 2360 wrote to memory of 3268 2360 msedge.exe 85 PID 2360 wrote to memory of 3268 2360 msedge.exe 85 PID 2360 wrote to memory of 3268 2360 msedge.exe 85 PID 2360 wrote to memory of 3268 2360 msedge.exe 85 PID 2360 wrote to memory of 3268 2360 msedge.exe 85 PID 2360 wrote to memory of 3268 2360 msedge.exe 85 PID 2360 wrote to memory of 3268 2360 msedge.exe 85 PID 2360 wrote to memory of 3268 2360 msedge.exe 85 PID 2360 wrote to memory of 3268 2360 msedge.exe 85 PID 2360 wrote to memory of 3268 2360 msedge.exe 85 PID 2360 wrote to memory of 3268 2360 msedge.exe 85 PID 2360 wrote to memory of 3268 2360 msedge.exe 85 PID 2360 wrote to memory of 3268 2360 msedge.exe 85 PID 2360 wrote to memory of 3268 2360 msedge.exe 85 PID 2360 wrote to memory of 3268 2360 msedge.exe 85 PID 2360 wrote to memory of 3268 2360 msedge.exe 85 PID 2360 wrote to memory of 3268 2360 msedge.exe 85 PID 2360 wrote to memory of 3268 2360 msedge.exe 85 PID 2360 wrote to memory of 3268 2360 msedge.exe 85 PID 2360 wrote to memory of 3268 2360 msedge.exe 85 PID 2360 wrote to memory of 3268 2360 msedge.exe 85 PID 2360 wrote to memory of 3268 2360 msedge.exe 85 PID 2360 wrote to memory of 3268 2360 msedge.exe 85 PID 2360 wrote to memory of 3268 2360 msedge.exe 85 PID 2360 wrote to memory of 3268 2360 msedge.exe 85 PID 2360 wrote to memory of 1484 2360 msedge.exe 86 PID 2360 wrote to memory of 1484 2360 msedge.exe 86 PID 2360 wrote to memory of 888 2360 msedge.exe 87 PID 2360 wrote to memory of 888 2360 msedge.exe 87 PID 2360 wrote to memory of 888 2360 msedge.exe 87 PID 2360 wrote to memory of 888 2360 msedge.exe 87 PID 2360 wrote to memory of 888 2360 msedge.exe 87 PID 2360 wrote to memory of 888 2360 msedge.exe 87 PID 2360 wrote to memory of 888 2360 msedge.exe 87 PID 2360 wrote to memory of 888 2360 msedge.exe 87 PID 2360 wrote to memory of 888 2360 msedge.exe 87 PID 2360 wrote to memory of 888 2360 msedge.exe 87 PID 2360 wrote to memory of 888 2360 msedge.exe 87 PID 2360 wrote to memory of 888 2360 msedge.exe 87 PID 2360 wrote to memory of 888 2360 msedge.exe 87 PID 2360 wrote to memory of 888 2360 msedge.exe 87 PID 2360 wrote to memory of 888 2360 msedge.exe 87 PID 2360 wrote to memory of 888 2360 msedge.exe 87 PID 2360 wrote to memory of 888 2360 msedge.exe 87 PID 2360 wrote to memory of 888 2360 msedge.exe 87 PID 2360 wrote to memory of 888 2360 msedge.exe 87 PID 2360 wrote to memory of 888 2360 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\6ac2300d82acd92c1892f0a7ad04b831_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc3e6046f8,0x7ffc3e604708,0x7ffc3e6047182⤵PID:1056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,5964586898724399041,6470751063962824229,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2292 /prefetch:22⤵PID:3268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,5964586898724399041,6470751063962824229,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2368 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,5964586898724399041,6470751063962824229,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2836 /prefetch:82⤵PID:888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,5964586898724399041,6470751063962824229,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:4564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,5964586898724399041,6470751063962824229,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:12⤵PID:4496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,5964586898724399041,6470751063962824229,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4176 /prefetch:12⤵PID:4472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,5964586898724399041,6470751063962824229,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5280 /prefetch:12⤵PID:4692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,5964586898724399041,6470751063962824229,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5444 /prefetch:12⤵PID:4800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,5964586898724399041,6470751063962824229,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5428 /prefetch:82⤵PID:2612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,5964586898724399041,6470751063962824229,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5428 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,5964586898724399041,6470751063962824229,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4220 /prefetch:12⤵PID:4444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,5964586898724399041,6470751063962824229,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4920 /prefetch:12⤵PID:316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,5964586898724399041,6470751063962824229,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6076 /prefetch:12⤵PID:4752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,5964586898724399041,6470751063962824229,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6008 /prefetch:12⤵PID:4792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,5964586898724399041,6470751063962824229,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1124 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5252
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2576
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1052
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5584971c8ba88c824fd51a05dddb45a98
SHA1b7c9489b4427652a9cdd754d1c1b6ac4034be421
SHA256e2d8de6c2323bbb3863ec50843d9b58a22e911fd626d31430658b9ea942cd307
SHA5125dbf1a4631a04d1149d8fab2b8e0e43ccd97b7212de43b961b9128a8bf03329164fdeb480154a8ffea5835f28417a7d2b115b8bf8d578d00b13c3682aa5ca726
-
Filesize
152B
MD5b28ef7d9f6d74f055cc49876767c886c
SHA1d6b3267f36c340979f8fc3e012fdd02c468740bf
SHA256fa6804456884789f4bdf9c3f5a4a8f29e0ededde149c4384072f3d8cc85bcc37
SHA512491f893c8f765e5d629bce8dd5067cef4e2ebc558d43bfb05e358bca43e1a66ee1285519bc266fd0ff5b5e09769a56077b62ac55fa8797c1edf6205843356e75
-
Filesize
210KB
MD55ac828ee8e3812a5b225161caf6c61da
SHA186e65f22356c55c21147ce97903f5dbdf363649f
SHA256b70465f707e42b41529b4e6d592f136d9eb307c39d040d147ad3c42842b723e7
SHA51287472912277ae0201c2a41edc228720809b8a94599c54b06a9c509ff3b4a616fcdd10484b679fa0d436e472a8fc062f4b9cf7f4fa274dde6d10f77d378c06aa6
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize168B
MD592c5b10c26a3badfb0ea9b3ae28d6bcf
SHA12971baf07689c26e660972abeb95908d900c7efa
SHA2562759371d555d488d3deb493191877a5b7bd6a748ee6b615c0144d9b6dc600f43
SHA51212d9719c10a1fd5d31281cbd9a7438b1b657f988b7f2deeea7875bb09899694a8e06cb08118762743d68963294296aa051fe73c99c85b2e2f119fdd299ff5e92
-
Filesize
818B
MD5ebf578a1b99bf04660535dee6ca01025
SHA17536d9ea90ee78b4d60315829e1c9dd489870bac
SHA256b19f66e822b909189447802396eca1fe2414057ff4cf352c1005d4c3958151fc
SHA512381ffffdc561479587ffeed60d408cfe0f35ad7dcd1510d3eea5e3e30fe9e6801765fee865b32fe1ac04a9e9fec7a2038a03178a622ba9c0b5fb001d2f5160d6
-
Filesize
5KB
MD50ba6d6d3cae87b2c2d77d1c05bc69f58
SHA10f36bdf7dd66a11fd6d6d6dbe7263ef4a2ff4020
SHA25602bc2ea4c8a3a9c68a3fcb03c32aaef2002770dad396fd5941abc7684d2bbb53
SHA512fb242e58551e366acb5b274217da213a223c962e5d756f3c854ddedb92c8c4e776fc6096141a44f5a5fb076df18d1dbb67244287f5ccabaff36b35b9115eabe9
-
Filesize
6KB
MD5106bc614daa652c6975508f5c45e08f6
SHA12ca0e0528c08030f413de2c3a90eb0076e7090c2
SHA256352f7293c9af27325a65f6ed094bbf8f025acdce95b1374a8729ba5eb572b144
SHA512b603186068d712825a4f28843d6724eb4ffe18ae10163cdf44921fa8f73f29a677e298774afdb0d6230da6469897312bf2cfa8f8d40949ab0918a36d90816ff3
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5085a2e36092747813576afe80509ae2b
SHA1a2a1625cd47901d0c96949cc29f1fa29afa7e2ce
SHA2564637b71800b9c7cb4864c1f36ab8c0c36e49a771f1db651cab10489e60d45616
SHA512af056a0a2972e3a4a119750d59d9babdcac7eac18f28c203db2219859bfa35eef8ffd58c2f1e008214b5f670ca4fdfd1230a526c72be7fe94c1e082d79a5435f