Analysis
-
max time kernel
145s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
25/07/2024, 09:07
Static task
static1
Behavioral task
behavioral1
Sample
6ef26d6ef345cf8297d783fc504c0412_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
6ef26d6ef345cf8297d783fc504c0412_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
6ef26d6ef345cf8297d783fc504c0412_JaffaCakes118.html
-
Size
46KB
-
MD5
6ef26d6ef345cf8297d783fc504c0412
-
SHA1
8c3767dfcb0dde4f6b61776f81af8c790f4bdf4b
-
SHA256
993d049ccc075651158adf70abab49c66ba16d0b78de70496279c2c452c7a5d9
-
SHA512
1bd31dc4f66ef888ec3c3b123942cb98d4c57ff402a2a6efdb43a4fce0acdac2aeb27c361711f945e5db5a6923adcb1ae1b109f6bacbd15a09d4f6b40b6266ae
-
SSDEEP
768:payHHvPWloG03WZLD1lITEW/OiCoJSfdb4:p3HH2ll03yL3AxmiCASfdM
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3108 msedge.exe 3108 msedge.exe 2520 msedge.exe 2520 msedge.exe 804 identity_helper.exe 804 identity_helper.exe 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe 2520 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2520 wrote to memory of 3228 2520 msedge.exe 84 PID 2520 wrote to memory of 3228 2520 msedge.exe 84 PID 2520 wrote to memory of 1556 2520 msedge.exe 85 PID 2520 wrote to memory of 1556 2520 msedge.exe 85 PID 2520 wrote to memory of 1556 2520 msedge.exe 85 PID 2520 wrote to memory of 1556 2520 msedge.exe 85 PID 2520 wrote to memory of 1556 2520 msedge.exe 85 PID 2520 wrote to memory of 1556 2520 msedge.exe 85 PID 2520 wrote to memory of 1556 2520 msedge.exe 85 PID 2520 wrote to memory of 1556 2520 msedge.exe 85 PID 2520 wrote to memory of 1556 2520 msedge.exe 85 PID 2520 wrote to memory of 1556 2520 msedge.exe 85 PID 2520 wrote to memory of 1556 2520 msedge.exe 85 PID 2520 wrote to memory of 1556 2520 msedge.exe 85 PID 2520 wrote to memory of 1556 2520 msedge.exe 85 PID 2520 wrote to memory of 1556 2520 msedge.exe 85 PID 2520 wrote to memory of 1556 2520 msedge.exe 85 PID 2520 wrote to memory of 1556 2520 msedge.exe 85 PID 2520 wrote to memory of 1556 2520 msedge.exe 85 PID 2520 wrote to memory of 1556 2520 msedge.exe 85 PID 2520 wrote to memory of 1556 2520 msedge.exe 85 PID 2520 wrote to memory of 1556 2520 msedge.exe 85 PID 2520 wrote to memory of 1556 2520 msedge.exe 85 PID 2520 wrote to memory of 1556 2520 msedge.exe 85 PID 2520 wrote to memory of 1556 2520 msedge.exe 85 PID 2520 wrote to memory of 1556 2520 msedge.exe 85 PID 2520 wrote to memory of 1556 2520 msedge.exe 85 PID 2520 wrote to memory of 1556 2520 msedge.exe 85 PID 2520 wrote to memory of 1556 2520 msedge.exe 85 PID 2520 wrote to memory of 1556 2520 msedge.exe 85 PID 2520 wrote to memory of 1556 2520 msedge.exe 85 PID 2520 wrote to memory of 1556 2520 msedge.exe 85 PID 2520 wrote to memory of 1556 2520 msedge.exe 85 PID 2520 wrote to memory of 1556 2520 msedge.exe 85 PID 2520 wrote to memory of 1556 2520 msedge.exe 85 PID 2520 wrote to memory of 1556 2520 msedge.exe 85 PID 2520 wrote to memory of 1556 2520 msedge.exe 85 PID 2520 wrote to memory of 1556 2520 msedge.exe 85 PID 2520 wrote to memory of 1556 2520 msedge.exe 85 PID 2520 wrote to memory of 1556 2520 msedge.exe 85 PID 2520 wrote to memory of 1556 2520 msedge.exe 85 PID 2520 wrote to memory of 1556 2520 msedge.exe 85 PID 2520 wrote to memory of 3108 2520 msedge.exe 86 PID 2520 wrote to memory of 3108 2520 msedge.exe 86 PID 2520 wrote to memory of 2224 2520 msedge.exe 87 PID 2520 wrote to memory of 2224 2520 msedge.exe 87 PID 2520 wrote to memory of 2224 2520 msedge.exe 87 PID 2520 wrote to memory of 2224 2520 msedge.exe 87 PID 2520 wrote to memory of 2224 2520 msedge.exe 87 PID 2520 wrote to memory of 2224 2520 msedge.exe 87 PID 2520 wrote to memory of 2224 2520 msedge.exe 87 PID 2520 wrote to memory of 2224 2520 msedge.exe 87 PID 2520 wrote to memory of 2224 2520 msedge.exe 87 PID 2520 wrote to memory of 2224 2520 msedge.exe 87 PID 2520 wrote to memory of 2224 2520 msedge.exe 87 PID 2520 wrote to memory of 2224 2520 msedge.exe 87 PID 2520 wrote to memory of 2224 2520 msedge.exe 87 PID 2520 wrote to memory of 2224 2520 msedge.exe 87 PID 2520 wrote to memory of 2224 2520 msedge.exe 87 PID 2520 wrote to memory of 2224 2520 msedge.exe 87 PID 2520 wrote to memory of 2224 2520 msedge.exe 87 PID 2520 wrote to memory of 2224 2520 msedge.exe 87 PID 2520 wrote to memory of 2224 2520 msedge.exe 87 PID 2520 wrote to memory of 2224 2520 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\6ef26d6ef345cf8297d783fc504c0412_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff91ad46f8,0x7fff91ad4708,0x7fff91ad47182⤵PID:3228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,7075744974348470268,9457878378710022291,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2080 /prefetch:22⤵PID:1556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2044,7075744974348470268,9457878378710022291,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2244 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2044,7075744974348470268,9457878378710022291,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2868 /prefetch:82⤵PID:2224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,7075744974348470268,9457878378710022291,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:4936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,7075744974348470268,9457878378710022291,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:3980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,7075744974348470268,9457878378710022291,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3992 /prefetch:12⤵PID:1008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,7075744974348470268,9457878378710022291,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4920 /prefetch:12⤵PID:4160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,7075744974348470268,9457878378710022291,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5064 /prefetch:12⤵PID:3276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2044,7075744974348470268,9457878378710022291,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5036 /prefetch:82⤵PID:1528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2044,7075744974348470268,9457878378710022291,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5036 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,7075744974348470268,9457878378710022291,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5780 /prefetch:12⤵PID:2496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,7075744974348470268,9457878378710022291,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5700 /prefetch:12⤵PID:4960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,7075744974348470268,9457878378710022291,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4120 /prefetch:12⤵PID:4832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,7075744974348470268,9457878378710022291,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5852 /prefetch:12⤵PID:2760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,7075744974348470268,9457878378710022291,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5208 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4220
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1524
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4976
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d406f3135e11b0a0829109c1090a41dc
SHA1810f00e803c17274f9af074fc6c47849ad6e873e
SHA25691f57909a10174b06c862089a9c1f3b3aeafea74a70ee1942ce11bb80d9eace4
SHA5122b9f0f94b1e8a1b62ab38af8df2add0ec9e4c6dfa94d9c84cc24fe86d2d57d4fc0d9ec8a9775cf42a859ddfd130260128185a0e2588992bca8fd4ebf5ee6d409
-
Filesize
152B
MD57f37f119665df6beaa925337bbff0e84
SHA1c2601d11f8aa77e12ab3508479cbf20c27cbd865
SHA2561073dbff3ec315ac85361c35c8ba791cc4198149b097c7b287dda1d791925027
SHA5128e180e41dd27c51e81788564b19b8ff411028890da506fbf767d394b1e73ec53e046c8d07235b2ec7c1c593c976bbf74ed9b7d442d68b526a0a77a9b5b0ab817
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD5800b71e362735f1e06d212b4b0a998f2
SHA1b7f6ae63e2b8db63db4cd4e0920e7d78aa1beabd
SHA2569254fef7b9cd40a4394c6391c50fbb1793a3a251ad9b21e0acc62a03bc4918e8
SHA512f309ad7093ade2b9d9f31e334ab6f38e6a35adc9c5196a556884a8fdc47ccc94b583c1b94a4f7a26f50c95f56d6d45e40b8498546eaa182da71591fc71093213
-
Filesize
1KB
MD52149bc18b006631b2141e3f7dac6137a
SHA1bbfd528c30ccd1d14f9015fc3893d63b6421dbe0
SHA25660e0b692ae0a8ee14eb390912a4cf9e7cdf3934b16d3472473cb8bb3b2f93881
SHA512606c6362f6afab9aa5a0c2b6db2aa9baa81d6a67b0b7f5bdd8b1af7cec2611f8e884e18637e33821cac97e0d30f9c32ca175d9c82bd43084a84962e871bd338a
-
Filesize
5KB
MD5f68239cd14c7915c60c889a2c6f25d3c
SHA1fc55f22dcad6e9d4d3f0dccbd980fc0ffcfc5f47
SHA2565f61ac568d005f8951d163cc13e2b3b048eed8be82f18bef7802a74b456f2ba7
SHA512bbc04241b340db976740b19b7731b7114c08c3bbd40d78d999f2483b9088260a2c91fda2c2f232ac182a486288e02dda3c9806857a6859c08a160cd4fbde2624
-
Filesize
7KB
MD54dc60b18acfa7a972d6a863ac7d653a0
SHA11c9b5f165ebac1f73b4682647291a65140124e1b
SHA256dcfa8ace703e5a26b4a8e40c2d41c3ded808edde853a06a3ba0cc6ad707b8369
SHA51243aed422517ad7fe7e458cc916ee4f59a965e6186a1fa2fb86c29c204d8b2b143bac7c86897479e6b1523163c27468edbfba9bf62e96a2907ea5d20f2a8a1803
-
Filesize
6KB
MD5dfa9f576e40cac7c9559a37a43c442c8
SHA15a28928e71fb0746e635575ef8da78139627299a
SHA256fee11fcad6fafaaca017a459411132b560ee5f518175b8015a3f6e9f9b688c1a
SHA5121a5b20c87a044962c363aec6678223135a5541095a76e230aedd501651e1881fe41edb17fa81cc2ff7312d03b52d546ed156fd221d1dc8a074a0f81332c06aa0
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
10KB
MD5c0903502cd31c637388c7adfe535d2b9
SHA10d1822d7a638523a54e707c08d9be72b05dd7ae8
SHA256b034c006666a643b4577933e831b2d785658f889174e7f5487df5d0d46da98dd
SHA5120a0f5979a091d4cc43049c761c8e49af60645a78bf14225846a2beb53948e3bbb3dcfc8a3ce24098379ff28dcd3128eb4d39028aa23ebdb750da99ec0302e418