Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
26-07-2024 00:42
Static task
static1
Behavioral task
behavioral1
Sample
71ed1de0239d79219e1030e63a259205_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
71ed1de0239d79219e1030e63a259205_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
71ed1de0239d79219e1030e63a259205_JaffaCakes118.html
-
Size
46KB
-
MD5
71ed1de0239d79219e1030e63a259205
-
SHA1
e170bd350d0c1a7a304c7f043601358d72f6f65a
-
SHA256
48b7b2bd5cdf01973dec63394736be223eb2f520a2f9f51fc3482c365559bb48
-
SHA512
e87a2b5f6f207e65172619c740584420d724827eb98fa0df7b164623fbba9ae0f0f9aac880b9dff73353c906df41714740b7087013cce66b3b9623f2cbe23316
-
SSDEEP
768:+rGKPvngKBElr9X53Nd4KucjYsCitpuSRgYmdnBpq9iXeW9aZHP5+rhL4vWPeobw:E3ngmElr9XVNdf9jYsCitpuSRgFnS9i2
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4488 msedge.exe 4488 msedge.exe 1676 msedge.exe 1676 msedge.exe 2116 identity_helper.exe 2116 identity_helper.exe 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe 1900 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1676 msedge.exe 1676 msedge.exe 1676 msedge.exe 1676 msedge.exe 1676 msedge.exe 1676 msedge.exe 1676 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1676 msedge.exe 1676 msedge.exe 1676 msedge.exe 1676 msedge.exe 1676 msedge.exe 1676 msedge.exe 1676 msedge.exe 1676 msedge.exe 1676 msedge.exe 1676 msedge.exe 1676 msedge.exe 1676 msedge.exe 1676 msedge.exe 1676 msedge.exe 1676 msedge.exe 1676 msedge.exe 1676 msedge.exe 1676 msedge.exe 1676 msedge.exe 1676 msedge.exe 1676 msedge.exe 1676 msedge.exe 1676 msedge.exe 1676 msedge.exe 1676 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1676 msedge.exe 1676 msedge.exe 1676 msedge.exe 1676 msedge.exe 1676 msedge.exe 1676 msedge.exe 1676 msedge.exe 1676 msedge.exe 1676 msedge.exe 1676 msedge.exe 1676 msedge.exe 1676 msedge.exe 1676 msedge.exe 1676 msedge.exe 1676 msedge.exe 1676 msedge.exe 1676 msedge.exe 1676 msedge.exe 1676 msedge.exe 1676 msedge.exe 1676 msedge.exe 1676 msedge.exe 1676 msedge.exe 1676 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1676 wrote to memory of 4964 1676 msedge.exe 84 PID 1676 wrote to memory of 4964 1676 msedge.exe 84 PID 1676 wrote to memory of 4232 1676 msedge.exe 85 PID 1676 wrote to memory of 4232 1676 msedge.exe 85 PID 1676 wrote to memory of 4232 1676 msedge.exe 85 PID 1676 wrote to memory of 4232 1676 msedge.exe 85 PID 1676 wrote to memory of 4232 1676 msedge.exe 85 PID 1676 wrote to memory of 4232 1676 msedge.exe 85 PID 1676 wrote to memory of 4232 1676 msedge.exe 85 PID 1676 wrote to memory of 4232 1676 msedge.exe 85 PID 1676 wrote to memory of 4232 1676 msedge.exe 85 PID 1676 wrote to memory of 4232 1676 msedge.exe 85 PID 1676 wrote to memory of 4232 1676 msedge.exe 85 PID 1676 wrote to memory of 4232 1676 msedge.exe 85 PID 1676 wrote to memory of 4232 1676 msedge.exe 85 PID 1676 wrote to memory of 4232 1676 msedge.exe 85 PID 1676 wrote to memory of 4232 1676 msedge.exe 85 PID 1676 wrote to memory of 4232 1676 msedge.exe 85 PID 1676 wrote to memory of 4232 1676 msedge.exe 85 PID 1676 wrote to memory of 4232 1676 msedge.exe 85 PID 1676 wrote to memory of 4232 1676 msedge.exe 85 PID 1676 wrote to memory of 4232 1676 msedge.exe 85 PID 1676 wrote to memory of 4232 1676 msedge.exe 85 PID 1676 wrote to memory of 4232 1676 msedge.exe 85 PID 1676 wrote to memory of 4232 1676 msedge.exe 85 PID 1676 wrote to memory of 4232 1676 msedge.exe 85 PID 1676 wrote to memory of 4232 1676 msedge.exe 85 PID 1676 wrote to memory of 4232 1676 msedge.exe 85 PID 1676 wrote to memory of 4232 1676 msedge.exe 85 PID 1676 wrote to memory of 4232 1676 msedge.exe 85 PID 1676 wrote to memory of 4232 1676 msedge.exe 85 PID 1676 wrote to memory of 4232 1676 msedge.exe 85 PID 1676 wrote to memory of 4232 1676 msedge.exe 85 PID 1676 wrote to memory of 4232 1676 msedge.exe 85 PID 1676 wrote to memory of 4232 1676 msedge.exe 85 PID 1676 wrote to memory of 4232 1676 msedge.exe 85 PID 1676 wrote to memory of 4232 1676 msedge.exe 85 PID 1676 wrote to memory of 4232 1676 msedge.exe 85 PID 1676 wrote to memory of 4232 1676 msedge.exe 85 PID 1676 wrote to memory of 4232 1676 msedge.exe 85 PID 1676 wrote to memory of 4232 1676 msedge.exe 85 PID 1676 wrote to memory of 4232 1676 msedge.exe 85 PID 1676 wrote to memory of 4488 1676 msedge.exe 86 PID 1676 wrote to memory of 4488 1676 msedge.exe 86 PID 1676 wrote to memory of 3000 1676 msedge.exe 87 PID 1676 wrote to memory of 3000 1676 msedge.exe 87 PID 1676 wrote to memory of 3000 1676 msedge.exe 87 PID 1676 wrote to memory of 3000 1676 msedge.exe 87 PID 1676 wrote to memory of 3000 1676 msedge.exe 87 PID 1676 wrote to memory of 3000 1676 msedge.exe 87 PID 1676 wrote to memory of 3000 1676 msedge.exe 87 PID 1676 wrote to memory of 3000 1676 msedge.exe 87 PID 1676 wrote to memory of 3000 1676 msedge.exe 87 PID 1676 wrote to memory of 3000 1676 msedge.exe 87 PID 1676 wrote to memory of 3000 1676 msedge.exe 87 PID 1676 wrote to memory of 3000 1676 msedge.exe 87 PID 1676 wrote to memory of 3000 1676 msedge.exe 87 PID 1676 wrote to memory of 3000 1676 msedge.exe 87 PID 1676 wrote to memory of 3000 1676 msedge.exe 87 PID 1676 wrote to memory of 3000 1676 msedge.exe 87 PID 1676 wrote to memory of 3000 1676 msedge.exe 87 PID 1676 wrote to memory of 3000 1676 msedge.exe 87 PID 1676 wrote to memory of 3000 1676 msedge.exe 87 PID 1676 wrote to memory of 3000 1676 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\71ed1de0239d79219e1030e63a259205_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8a68146f8,0x7ff8a6814708,0x7ff8a68147182⤵PID:4964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2216,16477221015005496310,17564196805365892323,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2228 /prefetch:22⤵PID:4232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2216,16477221015005496310,17564196805365892323,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2316 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2216,16477221015005496310,17564196805365892323,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2936 /prefetch:82⤵PID:3000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,16477221015005496310,17564196805365892323,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,16477221015005496310,17564196805365892323,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:12⤵PID:744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,16477221015005496310,17564196805365892323,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4932 /prefetch:12⤵PID:4596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2216,16477221015005496310,17564196805365892323,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5508 /prefetch:82⤵PID:1844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2216,16477221015005496310,17564196805365892323,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5508 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,16477221015005496310,17564196805365892323,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5540 /prefetch:12⤵PID:4404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,16477221015005496310,17564196805365892323,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5556 /prefetch:12⤵PID:2412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,16477221015005496310,17564196805365892323,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5872 /prefetch:12⤵PID:4440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,16477221015005496310,17564196805365892323,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5788 /prefetch:12⤵PID:3284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2216,16477221015005496310,17564196805365892323,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2748 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1900
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3744
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2116
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5bafce9e4c53a0cb85310891b6b21791b
SHA15d70027cc137a7cbb38f5801b15fd97b05e89ee2
SHA25671fb546b5d2210a56e90b448ee10120cd92c518c8f79fb960f01b918f89f2b00
SHA512c0e4d3eccc0135ac92051539a18f64b8b8628cfe74e5b019d4f8e1dcbb51a9b49c486a1523885fe6be53da7118c013852e753c26a5490538c1e721fd0188836c
-
Filesize
152B
MD5a499254d6b5d91f97eb7a86e5f8ca573
SHA103dbfebfec8c94a9c06f9b0cd81ebe0a2b8be3d1
SHA256fb87b758c2b98989df851380293ff6786cb9a5cf2b3a384cec70d9f3eb064499
SHA512d7adcc76d0470bcd68d7644de3c8d2b6d61df8485979a4752ceea3df4d85bd1c290f72b3d8d5c8d639d5a10afa48d80e457f76b44dd8107ac97eb80fd98c7b0c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD597c61835bbf5bbc1166e6629b17f2ca8
SHA1fe3af8cad0df390641c7c59900345882609e9e69
SHA256367b2e9d74c41fab06d88486749fc3f2f3ecaa59cec18ebca8939bb3c39eaad7
SHA512bbca03978a874d5de627bb2e207b7e5d2967fe387dc6ce161a0c01061ac8c025459dcbe0fc6a0d58dcc8fb0c6929cafb3d36b521c0eeb96968e0674677caff82
-
Filesize
1KB
MD57598513b1f6fad99b31c1bf94b341af1
SHA1ebbc1672b77618a10f7f4e06475bf56a0e252b72
SHA256ff9702e0084a193f3099b3742816ac9d3a3b540ae711498220847e229ff949da
SHA512fe963a18411c4ca90fa934dfba7a3872472d5e9191717d67d2e93f3d9d05af8b0accf0feda98c0e47d8a927101ceefb7fbef0e0c4d38ad1085206cd03df912b7
-
Filesize
5KB
MD55c8cdcc010945b0a6cbced9f43b4e986
SHA1537474f9562bbeb1bee37ae7fa7d414335179577
SHA2561d8d877bac1d8cb0559d88eb29e95172f306f469af8a3d909f7e4e967cd8df5a
SHA512e9869192a10d203306442206edd34c83cbafa6e96982f9da19cd8d3dc9dd451dd040a1647469aad5cb1d87adbfd26ccec07880862f2834f81493b0255fbe4e2e
-
Filesize
6KB
MD5dc9f178a9de9c560d37fb9a54c2ddf74
SHA1f48264ff06d0f71709ffbc73e65ca87fbde9b830
SHA2566d2aa99d304830aca6ce138d4edd69af433201bf838b664b0017928a4c36ff29
SHA512f4bed20213499aa609f281269cdee138d73242a6b7d4d82d009c1471b8f21ce06d16cd2cee5a51a639e56d35f1d94f40df5659588078ef694d8f72bea6c45106
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD55769c3189e9ece2182acd88c218abd5a
SHA11b63d9606cdf6e0d5bfd7690bb47ad9f50a69fd6
SHA256f7f0e54d3e6ef1236438acd6be6b2fe73f0f818b28d3137653157351457e721d
SHA5127c4563dff798ce3ceedb13eff2e82fad909f4aaefda543081f86f9e60aa9505b39d7abf978128de746f90b99f2eaf82f44d0549ddfe5a4ca4f0ceac83da8f6e1