Analysis
-
max time kernel
145s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
25/07/2024, 11:05
Static task
static1
Behavioral task
behavioral1
Sample
6f4ecb860ead1141d413390020bbeca2_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
6f4ecb860ead1141d413390020bbeca2_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
6f4ecb860ead1141d413390020bbeca2_JaffaCakes118.html
-
Size
13KB
-
MD5
6f4ecb860ead1141d413390020bbeca2
-
SHA1
6226dbc9eebf6ddc9253db07e8baf44549eee5af
-
SHA256
2569cf53c223a31a5c27792adfe5df05c85dc6a7273e9d6fefec62a673a52d2c
-
SHA512
1bf97547a4245ce8c0e4b7b310128ce79306e714cd1798a3892e6eaa18d6cdeb6661a95b4c1e3539775b30504deb9c28f8e8112187fabcb55cfc6964181ae8d4
-
SSDEEP
384:u/K3zNTtpQ1bkFfRdNoTZx3HUId2Yh7/sY/4ZF:uS3z1tpQ1bkFfRdNoTZx3L8YhQVb
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1832 msedge.exe 1832 msedge.exe 4408 msedge.exe 4408 msedge.exe 3268 identity_helper.exe 3268 identity_helper.exe 5768 msedge.exe 5768 msedge.exe 5768 msedge.exe 5768 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4408 wrote to memory of 4796 4408 msedge.exe 86 PID 4408 wrote to memory of 4796 4408 msedge.exe 86 PID 4408 wrote to memory of 3384 4408 msedge.exe 87 PID 4408 wrote to memory of 3384 4408 msedge.exe 87 PID 4408 wrote to memory of 3384 4408 msedge.exe 87 PID 4408 wrote to memory of 3384 4408 msedge.exe 87 PID 4408 wrote to memory of 3384 4408 msedge.exe 87 PID 4408 wrote to memory of 3384 4408 msedge.exe 87 PID 4408 wrote to memory of 3384 4408 msedge.exe 87 PID 4408 wrote to memory of 3384 4408 msedge.exe 87 PID 4408 wrote to memory of 3384 4408 msedge.exe 87 PID 4408 wrote to memory of 3384 4408 msedge.exe 87 PID 4408 wrote to memory of 3384 4408 msedge.exe 87 PID 4408 wrote to memory of 3384 4408 msedge.exe 87 PID 4408 wrote to memory of 3384 4408 msedge.exe 87 PID 4408 wrote to memory of 3384 4408 msedge.exe 87 PID 4408 wrote to memory of 3384 4408 msedge.exe 87 PID 4408 wrote to memory of 3384 4408 msedge.exe 87 PID 4408 wrote to memory of 3384 4408 msedge.exe 87 PID 4408 wrote to memory of 3384 4408 msedge.exe 87 PID 4408 wrote to memory of 3384 4408 msedge.exe 87 PID 4408 wrote to memory of 3384 4408 msedge.exe 87 PID 4408 wrote to memory of 3384 4408 msedge.exe 87 PID 4408 wrote to memory of 3384 4408 msedge.exe 87 PID 4408 wrote to memory of 3384 4408 msedge.exe 87 PID 4408 wrote to memory of 3384 4408 msedge.exe 87 PID 4408 wrote to memory of 3384 4408 msedge.exe 87 PID 4408 wrote to memory of 3384 4408 msedge.exe 87 PID 4408 wrote to memory of 3384 4408 msedge.exe 87 PID 4408 wrote to memory of 3384 4408 msedge.exe 87 PID 4408 wrote to memory of 3384 4408 msedge.exe 87 PID 4408 wrote to memory of 3384 4408 msedge.exe 87 PID 4408 wrote to memory of 3384 4408 msedge.exe 87 PID 4408 wrote to memory of 3384 4408 msedge.exe 87 PID 4408 wrote to memory of 3384 4408 msedge.exe 87 PID 4408 wrote to memory of 3384 4408 msedge.exe 87 PID 4408 wrote to memory of 3384 4408 msedge.exe 87 PID 4408 wrote to memory of 3384 4408 msedge.exe 87 PID 4408 wrote to memory of 3384 4408 msedge.exe 87 PID 4408 wrote to memory of 3384 4408 msedge.exe 87 PID 4408 wrote to memory of 3384 4408 msedge.exe 87 PID 4408 wrote to memory of 3384 4408 msedge.exe 87 PID 4408 wrote to memory of 1832 4408 msedge.exe 88 PID 4408 wrote to memory of 1832 4408 msedge.exe 88 PID 4408 wrote to memory of 1476 4408 msedge.exe 89 PID 4408 wrote to memory of 1476 4408 msedge.exe 89 PID 4408 wrote to memory of 1476 4408 msedge.exe 89 PID 4408 wrote to memory of 1476 4408 msedge.exe 89 PID 4408 wrote to memory of 1476 4408 msedge.exe 89 PID 4408 wrote to memory of 1476 4408 msedge.exe 89 PID 4408 wrote to memory of 1476 4408 msedge.exe 89 PID 4408 wrote to memory of 1476 4408 msedge.exe 89 PID 4408 wrote to memory of 1476 4408 msedge.exe 89 PID 4408 wrote to memory of 1476 4408 msedge.exe 89 PID 4408 wrote to memory of 1476 4408 msedge.exe 89 PID 4408 wrote to memory of 1476 4408 msedge.exe 89 PID 4408 wrote to memory of 1476 4408 msedge.exe 89 PID 4408 wrote to memory of 1476 4408 msedge.exe 89 PID 4408 wrote to memory of 1476 4408 msedge.exe 89 PID 4408 wrote to memory of 1476 4408 msedge.exe 89 PID 4408 wrote to memory of 1476 4408 msedge.exe 89 PID 4408 wrote to memory of 1476 4408 msedge.exe 89 PID 4408 wrote to memory of 1476 4408 msedge.exe 89 PID 4408 wrote to memory of 1476 4408 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\6f4ecb860ead1141d413390020bbeca2_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4408 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdfe9146f8,0x7ffdfe914708,0x7ffdfe9147182⤵PID:4796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2172,6105479243831672614,7848559936202825164,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2196 /prefetch:22⤵PID:3384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2172,6105479243831672614,7848559936202825164,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2264 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2172,6105479243831672614,7848559936202825164,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2876 /prefetch:82⤵PID:1476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,6105479243831672614,7848559936202825164,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:2448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,6105479243831672614,7848559936202825164,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:3912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,6105479243831672614,7848559936202825164,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4916 /prefetch:12⤵PID:2908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,6105479243831672614,7848559936202825164,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5092 /prefetch:12⤵PID:2356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,6105479243831672614,7848559936202825164,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6000 /prefetch:12⤵PID:4984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,6105479243831672614,7848559936202825164,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6016 /prefetch:12⤵PID:1628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2172,6105479243831672614,7848559936202825164,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6308 /prefetch:82⤵PID:5052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2172,6105479243831672614,7848559936202825164,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6308 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,6105479243831672614,7848559936202825164,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5516 /prefetch:12⤵PID:2940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,6105479243831672614,7848559936202825164,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6352 /prefetch:12⤵PID:384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2172,6105479243831672614,7848559936202825164,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3084 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5768
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1848
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:740
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5584971c8ba88c824fd51a05dddb45a98
SHA1b7c9489b4427652a9cdd754d1c1b6ac4034be421
SHA256e2d8de6c2323bbb3863ec50843d9b58a22e911fd626d31430658b9ea942cd307
SHA5125dbf1a4631a04d1149d8fab2b8e0e43ccd97b7212de43b961b9128a8bf03329164fdeb480154a8ffea5835f28417a7d2b115b8bf8d578d00b13c3682aa5ca726
-
Filesize
152B
MD5b28ef7d9f6d74f055cc49876767c886c
SHA1d6b3267f36c340979f8fc3e012fdd02c468740bf
SHA256fa6804456884789f4bdf9c3f5a4a8f29e0ededde149c4384072f3d8cc85bcc37
SHA512491f893c8f765e5d629bce8dd5067cef4e2ebc558d43bfb05e358bca43e1a66ee1285519bc266fd0ff5b5e09769a56077b62ac55fa8797c1edf6205843356e75
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD562a6f22f699e63ebce510b3034ba7f0b
SHA176eda34c09956d6b30fe01f24d0427ef9f3f740c
SHA256a494a86f31e044f88a057371c6cd4696178eeb2f9ebeb62acb5afea49561d958
SHA51216dae9a9367ae58bf415d78fbc08767b8e60791c074285ded064fd0ecbbd75aa1faef6915bfb66cf3cc3fef0c080b45981cdbf85b3ea0347042624d98b4844e9
-
Filesize
645B
MD503a9d7c42129ec21c1aab2343349db9c
SHA1839403bcb366b9aaa4169b9842fada3cf3c4b509
SHA2563c594c3ebede170c4043fed595445eff657ec3c714769f801a44de24f8cd4a01
SHA512470aa668881333a930ab45d8b9393bb8f0098423383979d02d6f085474a971738bba3c8ed9e0bad21230b6e0ff2b0bc18d13a87dbd3362779de00d37fa29c75e
-
Filesize
5KB
MD518564f405057acb63257cb32c603810a
SHA19413ed82c965918a3df56e22964081a98564ce50
SHA256d9fb20402de99dfc9b54b6facdde3108e5b666741cb32a0a379f164cff76814f
SHA512ef2f29fced86d3c29d8872b18805db0ac87f6f749bf100d17fb1ab2b4c0035d9e6c9139dd88d255bf5761f1801c0c3cc5f889f7e9042098ba85545ded9b1b89b
-
Filesize
6KB
MD583335f14cc147b65285a33250335c034
SHA1f346327a033b10b094c02744a34fc909dd4e1ecd
SHA2563055f1fd1d680ef471d8916a15a0197094c0404647c191671a72840711e2a1d5
SHA51238dae29680ec2bf82ff6539bba13213a9a054e28e8ca6bea0bff2c6cf5bb6864435eec58651aebfc327d39c8b8aec35f627ab791eb693cc39afd05b30d26ce76
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD587b3a2b6416651558a46e09c2fea1373
SHA1db8017961dafe5cbe28afb9e8b0b09d99dbd8e06
SHA2564c21457cb7b989fff96cdf0ad88168c52a50b6f93583e9a6bf636e07b75bc5cd
SHA512db873793c83e85228137a3bad6ae858992a59171914f9b1bf12f2392717e09789a3d317a10c1b6918b3c6ffc32932007fbc8d04b779e80ef64896ea1125b9d55