Analysis
-
max time kernel
148s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
25/07/2024, 16:26
Static task
static1
Behavioral task
behavioral1
Sample
705bf237b0ef75978a57b67f619381e0_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
705bf237b0ef75978a57b67f619381e0_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
705bf237b0ef75978a57b67f619381e0_JaffaCakes118.html
-
Size
58KB
-
MD5
705bf237b0ef75978a57b67f619381e0
-
SHA1
31bd66f674d7a171613dc6decd1b89f78153e72d
-
SHA256
2645aef7d0ca0a41bc3e930f768f73c5093696d471040c5efcd397030c13fbc9
-
SHA512
993ef5aa616fea6f73e2f951b7c9fca02e7d375dee42b3f187fb093bc648b3262f6b754188ff2538d3c54f31293ed649f46b93cfc8f1e47be803f51244803f32
-
SSDEEP
1536:BWVZe1JnB+w5fSFkNRjwFLMwMJ1LMh713:uwJnww5WkNRjwFLMwMJ1LMh713
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 976 msedge.exe 976 msedge.exe 4980 msedge.exe 4980 msedge.exe 1752 identity_helper.exe 1752 identity_helper.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4980 wrote to memory of 3360 4980 msedge.exe 84 PID 4980 wrote to memory of 3360 4980 msedge.exe 84 PID 4980 wrote to memory of 1152 4980 msedge.exe 85 PID 4980 wrote to memory of 1152 4980 msedge.exe 85 PID 4980 wrote to memory of 1152 4980 msedge.exe 85 PID 4980 wrote to memory of 1152 4980 msedge.exe 85 PID 4980 wrote to memory of 1152 4980 msedge.exe 85 PID 4980 wrote to memory of 1152 4980 msedge.exe 85 PID 4980 wrote to memory of 1152 4980 msedge.exe 85 PID 4980 wrote to memory of 1152 4980 msedge.exe 85 PID 4980 wrote to memory of 1152 4980 msedge.exe 85 PID 4980 wrote to memory of 1152 4980 msedge.exe 85 PID 4980 wrote to memory of 1152 4980 msedge.exe 85 PID 4980 wrote to memory of 1152 4980 msedge.exe 85 PID 4980 wrote to memory of 1152 4980 msedge.exe 85 PID 4980 wrote to memory of 1152 4980 msedge.exe 85 PID 4980 wrote to memory of 1152 4980 msedge.exe 85 PID 4980 wrote to memory of 1152 4980 msedge.exe 85 PID 4980 wrote to memory of 1152 4980 msedge.exe 85 PID 4980 wrote to memory of 1152 4980 msedge.exe 85 PID 4980 wrote to memory of 1152 4980 msedge.exe 85 PID 4980 wrote to memory of 1152 4980 msedge.exe 85 PID 4980 wrote to memory of 1152 4980 msedge.exe 85 PID 4980 wrote to memory of 1152 4980 msedge.exe 85 PID 4980 wrote to memory of 1152 4980 msedge.exe 85 PID 4980 wrote to memory of 1152 4980 msedge.exe 85 PID 4980 wrote to memory of 1152 4980 msedge.exe 85 PID 4980 wrote to memory of 1152 4980 msedge.exe 85 PID 4980 wrote to memory of 1152 4980 msedge.exe 85 PID 4980 wrote to memory of 1152 4980 msedge.exe 85 PID 4980 wrote to memory of 1152 4980 msedge.exe 85 PID 4980 wrote to memory of 1152 4980 msedge.exe 85 PID 4980 wrote to memory of 1152 4980 msedge.exe 85 PID 4980 wrote to memory of 1152 4980 msedge.exe 85 PID 4980 wrote to memory of 1152 4980 msedge.exe 85 PID 4980 wrote to memory of 1152 4980 msedge.exe 85 PID 4980 wrote to memory of 1152 4980 msedge.exe 85 PID 4980 wrote to memory of 1152 4980 msedge.exe 85 PID 4980 wrote to memory of 1152 4980 msedge.exe 85 PID 4980 wrote to memory of 1152 4980 msedge.exe 85 PID 4980 wrote to memory of 1152 4980 msedge.exe 85 PID 4980 wrote to memory of 1152 4980 msedge.exe 85 PID 4980 wrote to memory of 976 4980 msedge.exe 86 PID 4980 wrote to memory of 976 4980 msedge.exe 86 PID 4980 wrote to memory of 404 4980 msedge.exe 87 PID 4980 wrote to memory of 404 4980 msedge.exe 87 PID 4980 wrote to memory of 404 4980 msedge.exe 87 PID 4980 wrote to memory of 404 4980 msedge.exe 87 PID 4980 wrote to memory of 404 4980 msedge.exe 87 PID 4980 wrote to memory of 404 4980 msedge.exe 87 PID 4980 wrote to memory of 404 4980 msedge.exe 87 PID 4980 wrote to memory of 404 4980 msedge.exe 87 PID 4980 wrote to memory of 404 4980 msedge.exe 87 PID 4980 wrote to memory of 404 4980 msedge.exe 87 PID 4980 wrote to memory of 404 4980 msedge.exe 87 PID 4980 wrote to memory of 404 4980 msedge.exe 87 PID 4980 wrote to memory of 404 4980 msedge.exe 87 PID 4980 wrote to memory of 404 4980 msedge.exe 87 PID 4980 wrote to memory of 404 4980 msedge.exe 87 PID 4980 wrote to memory of 404 4980 msedge.exe 87 PID 4980 wrote to memory of 404 4980 msedge.exe 87 PID 4980 wrote to memory of 404 4980 msedge.exe 87 PID 4980 wrote to memory of 404 4980 msedge.exe 87 PID 4980 wrote to memory of 404 4980 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\705bf237b0ef75978a57b67f619381e0_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4980 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb97a646f8,0x7ffb97a64708,0x7ffb97a647182⤵PID:3360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,13812618051002921373,2085864029507571137,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2096 /prefetch:22⤵PID:1152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,13812618051002921373,2085864029507571137,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2204 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,13812618051002921373,2085864029507571137,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2864 /prefetch:82⤵PID:404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,13812618051002921373,2085864029507571137,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:3176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,13812618051002921373,2085864029507571137,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:3500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,13812618051002921373,2085864029507571137,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4680 /prefetch:12⤵PID:3720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,13812618051002921373,2085864029507571137,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4828 /prefetch:12⤵PID:1240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,13812618051002921373,2085864029507571137,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5024 /prefetch:12⤵PID:3160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,13812618051002921373,2085864029507571137,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5140 /prefetch:12⤵PID:3668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,13812618051002921373,2085864029507571137,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3300 /prefetch:82⤵PID:1280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,13812618051002921373,2085864029507571137,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3300 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,13812618051002921373,2085864029507571137,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:4924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,13812618051002921373,2085864029507571137,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4144 /prefetch:12⤵PID:3840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,13812618051002921373,2085864029507571137,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4044 /prefetch:12⤵PID:5232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,13812618051002921373,2085864029507571137,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5232 /prefetch:12⤵PID:5240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,13812618051002921373,2085864029507571137,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1048 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3320
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2912
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5052
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5bafce9e4c53a0cb85310891b6b21791b
SHA15d70027cc137a7cbb38f5801b15fd97b05e89ee2
SHA25671fb546b5d2210a56e90b448ee10120cd92c518c8f79fb960f01b918f89f2b00
SHA512c0e4d3eccc0135ac92051539a18f64b8b8628cfe74e5b019d4f8e1dcbb51a9b49c486a1523885fe6be53da7118c013852e753c26a5490538c1e721fd0188836c
-
Filesize
152B
MD5a499254d6b5d91f97eb7a86e5f8ca573
SHA103dbfebfec8c94a9c06f9b0cd81ebe0a2b8be3d1
SHA256fb87b758c2b98989df851380293ff6786cb9a5cf2b3a384cec70d9f3eb064499
SHA512d7adcc76d0470bcd68d7644de3c8d2b6d61df8485979a4752ceea3df4d85bd1c290f72b3d8d5c8d639d5a10afa48d80e457f76b44dd8107ac97eb80fd98c7b0c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\9a71cf3f-a4c1-4053-8969-a8863120f301.tmp
Filesize6KB
MD54f2cf107abc0eadf84c04192ed0d69f2
SHA166accd4f760e193ecb933b6636fff7b16df16b76
SHA25615a179e0278e7765eda75a0b52d8e0736aa77bdc7ca62aa4dc2f60bfead7fcd0
SHA512d7dec8c56166886ee1c9b8c90ed0abdfb117cc8a2e704afcd3b863752a041f00966d0c714405c62e09a28085545950055626456259669427cbe572e85ca258c1
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD56a5b30453d42c33ef3f6347aa17da679
SHA1b10f7242d27722392ccdeeda904d2a8c48bfb0b2
SHA25612720f5c145abb62c192f26aaf7c151503e794c5ca86ddeb08a7f9faae6899d5
SHA512ac5bf436b006ed63c5c660adc48a90e692109c81976b183ab078e8087102e4b59282b525dcb3292db3ad9aa99bbec47555705926748788f8b317ecb2ddcd7591
-
Filesize
1KB
MD53183121b01e385e1f5c32713196ef73c
SHA10637d3139339ac768c4413e3cd42b4184b8ab1f4
SHA256d4c0ca6943ead511fffbd4ce343aeb9beb80374268307e1ee5f61433843e621e
SHA512c647b1f7b7c32e10d552a2787aabea463428b0e529b1eda5396d1bee48fc85acd27e44fb6920b91b5abc52013cd3ec7822cf1cf1036feda9ca1d73e343ea3d71
-
Filesize
5KB
MD5230723754453e3d5af5d9dd58c621ec7
SHA1edc33ce76010956c07af00fa5dd30eddf9d1ab6e
SHA2568b7a8ff66ddd329b6d2d44d1ad0f0ff2d5375e4aec7b1fd75617e946e8ecc1a3
SHA5129e77a1e148fccac546c690626cd0dae18f517e60e84b0d9b6d0853a7d7432f825227c1264f740a7095f984d3e11b1559a19208a7ccb10784516ca4f7691cdb68
-
Filesize
6KB
MD52895e6ca2b48375592e72b33ee94276e
SHA118c7a671f2b6bd27caa4bb20509fd468f59a79ed
SHA2562d6f43c95d42dde35ac4499e4642c38d79b454900aea3ab844c159f426b51df0
SHA512512f784484857c44ba8d3960e42d359188bdde8b474267cfddcc43734085e83312d68c3863ab027f2e5c0f0e88c65675a5ae5693cef239e187339ca8f5cd48a3
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5b8fb08042f1379e225087fb6bd3cd6b6
SHA1e54d849d2a0cb6993de86163aad33945c8aa0e00
SHA256d93b85e9068a1b73e7fefb15992a76890e959d2acf360a8aea4ff52078577044
SHA512fbf6aaf7eee34bd2c40caa345ad3a06500a2291d6e2e2d7b6b071ff845cfdb739f36e295f317a8e0d94ee4a2efa4d61da3cd9dba3268c53fe0da15929f022a0a