Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
26-07-2024 17:26
Static task
static1
Behavioral task
behavioral1
Sample
75035caab2e04483c65767bf785ef67d_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
75035caab2e04483c65767bf785ef67d_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
75035caab2e04483c65767bf785ef67d_JaffaCakes118.html
-
Size
57KB
-
MD5
75035caab2e04483c65767bf785ef67d
-
SHA1
0a9271bc1d335733dbe91b0ad63edfb6bb241355
-
SHA256
44ca053e6188a0dfdb8605c3756a2d08eb012bc2b1b9933c9a0a22651fe48db1
-
SHA512
3fc1b0ab83d55fc2ef394fe6fd079a56647c6f2570dee8f8c3097a35fc148f9c1ea31c179341f1556b9f56c01ad151dbbf8efc186481d8e5ae9b478c347265ad
-
SSDEEP
1536:gQZBCCOdn0IxCAdzVfDfhvftfdfOfqf9frf2UfZf3fYf/fNf3Hfafufmf1fzfDfr:gk2d0IxZrxF1WyVDPR/wHFfCGudbbYKB
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2424 msedge.exe 2424 msedge.exe 2584 msedge.exe 2584 msedge.exe 4464 identity_helper.exe 4464 identity_helper.exe 5404 msedge.exe 5404 msedge.exe 5404 msedge.exe 5404 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe 2584 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2584 wrote to memory of 5068 2584 msedge.exe 84 PID 2584 wrote to memory of 5068 2584 msedge.exe 84 PID 2584 wrote to memory of 2768 2584 msedge.exe 85 PID 2584 wrote to memory of 2768 2584 msedge.exe 85 PID 2584 wrote to memory of 2768 2584 msedge.exe 85 PID 2584 wrote to memory of 2768 2584 msedge.exe 85 PID 2584 wrote to memory of 2768 2584 msedge.exe 85 PID 2584 wrote to memory of 2768 2584 msedge.exe 85 PID 2584 wrote to memory of 2768 2584 msedge.exe 85 PID 2584 wrote to memory of 2768 2584 msedge.exe 85 PID 2584 wrote to memory of 2768 2584 msedge.exe 85 PID 2584 wrote to memory of 2768 2584 msedge.exe 85 PID 2584 wrote to memory of 2768 2584 msedge.exe 85 PID 2584 wrote to memory of 2768 2584 msedge.exe 85 PID 2584 wrote to memory of 2768 2584 msedge.exe 85 PID 2584 wrote to memory of 2768 2584 msedge.exe 85 PID 2584 wrote to memory of 2768 2584 msedge.exe 85 PID 2584 wrote to memory of 2768 2584 msedge.exe 85 PID 2584 wrote to memory of 2768 2584 msedge.exe 85 PID 2584 wrote to memory of 2768 2584 msedge.exe 85 PID 2584 wrote to memory of 2768 2584 msedge.exe 85 PID 2584 wrote to memory of 2768 2584 msedge.exe 85 PID 2584 wrote to memory of 2768 2584 msedge.exe 85 PID 2584 wrote to memory of 2768 2584 msedge.exe 85 PID 2584 wrote to memory of 2768 2584 msedge.exe 85 PID 2584 wrote to memory of 2768 2584 msedge.exe 85 PID 2584 wrote to memory of 2768 2584 msedge.exe 85 PID 2584 wrote to memory of 2768 2584 msedge.exe 85 PID 2584 wrote to memory of 2768 2584 msedge.exe 85 PID 2584 wrote to memory of 2768 2584 msedge.exe 85 PID 2584 wrote to memory of 2768 2584 msedge.exe 85 PID 2584 wrote to memory of 2768 2584 msedge.exe 85 PID 2584 wrote to memory of 2768 2584 msedge.exe 85 PID 2584 wrote to memory of 2768 2584 msedge.exe 85 PID 2584 wrote to memory of 2768 2584 msedge.exe 85 PID 2584 wrote to memory of 2768 2584 msedge.exe 85 PID 2584 wrote to memory of 2768 2584 msedge.exe 85 PID 2584 wrote to memory of 2768 2584 msedge.exe 85 PID 2584 wrote to memory of 2768 2584 msedge.exe 85 PID 2584 wrote to memory of 2768 2584 msedge.exe 85 PID 2584 wrote to memory of 2768 2584 msedge.exe 85 PID 2584 wrote to memory of 2768 2584 msedge.exe 85 PID 2584 wrote to memory of 2424 2584 msedge.exe 86 PID 2584 wrote to memory of 2424 2584 msedge.exe 86 PID 2584 wrote to memory of 4732 2584 msedge.exe 87 PID 2584 wrote to memory of 4732 2584 msedge.exe 87 PID 2584 wrote to memory of 4732 2584 msedge.exe 87 PID 2584 wrote to memory of 4732 2584 msedge.exe 87 PID 2584 wrote to memory of 4732 2584 msedge.exe 87 PID 2584 wrote to memory of 4732 2584 msedge.exe 87 PID 2584 wrote to memory of 4732 2584 msedge.exe 87 PID 2584 wrote to memory of 4732 2584 msedge.exe 87 PID 2584 wrote to memory of 4732 2584 msedge.exe 87 PID 2584 wrote to memory of 4732 2584 msedge.exe 87 PID 2584 wrote to memory of 4732 2584 msedge.exe 87 PID 2584 wrote to memory of 4732 2584 msedge.exe 87 PID 2584 wrote to memory of 4732 2584 msedge.exe 87 PID 2584 wrote to memory of 4732 2584 msedge.exe 87 PID 2584 wrote to memory of 4732 2584 msedge.exe 87 PID 2584 wrote to memory of 4732 2584 msedge.exe 87 PID 2584 wrote to memory of 4732 2584 msedge.exe 87 PID 2584 wrote to memory of 4732 2584 msedge.exe 87 PID 2584 wrote to memory of 4732 2584 msedge.exe 87 PID 2584 wrote to memory of 4732 2584 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\75035caab2e04483c65767bf785ef67d_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb6a4b46f8,0x7ffb6a4b4708,0x7ffb6a4b47182⤵PID:5068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,12045127871713659001,8736574895898125690,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:22⤵PID:2768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,12045127871713659001,8736574895898125690,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2212 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,12045127871713659001,8736574895898125690,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2660 /prefetch:82⤵PID:4732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,12045127871713659001,8736574895898125690,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:4412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,12045127871713659001,8736574895898125690,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:4804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,12045127871713659001,8736574895898125690,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4112 /prefetch:12⤵PID:4692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,12045127871713659001,8736574895898125690,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4268 /prefetch:12⤵PID:220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,12045127871713659001,8736574895898125690,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4972 /prefetch:12⤵PID:4008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,12045127871713659001,8736574895898125690,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6048 /prefetch:82⤵PID:2168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,12045127871713659001,8736574895898125690,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6048 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,12045127871713659001,8736574895898125690,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3900 /prefetch:12⤵PID:3608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,12045127871713659001,8736574895898125690,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5396 /prefetch:12⤵PID:4964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,12045127871713659001,8736574895898125690,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6088 /prefetch:12⤵PID:5168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,12045127871713659001,8736574895898125690,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6056 /prefetch:12⤵PID:5176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,12045127871713659001,8736574895898125690,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5080 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5404
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4176
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2168
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c00b0d6e0f836dfa596c6df9d3b2f8f2
SHA169ad27d9b4502630728f98917f67307e9dd12a30
SHA256578481cd359c669455e24983b13723c25584f58925b47283cb580019ef3142b1
SHA5120e098ab5f5772fec17880e228a0dccbbaa06dc1af14e0fd827f361599c61899fe07d612a7f7b049ff6661d27fdc495566dd20fc28ceed022b87c212bf00be5da
-
Filesize
152B
MD554f1b76300ce15e44e5cc1a3947f5ca9
SHA1c978bfaa6ec6dae05464c6426eaa6cb3c3e2f3b7
SHA25643dec5d87b7ee892a3d99cb61f772ba403882ac0772423f36034e84244c1ca24
SHA512ac26e5676c675be329eb62b5d5a36a0e6014ab8a6366684b0fc2a59ae5f061f596f462b82eb4e9f135d2235a0cbd4af96680d234eecc873a8397fd81507d277a
-
Filesize
210KB
MD55ac828ee8e3812a5b225161caf6c61da
SHA186e65f22356c55c21147ce97903f5dbdf363649f
SHA256b70465f707e42b41529b4e6d592f136d9eb307c39d040d147ad3c42842b723e7
SHA51287472912277ae0201c2a41edc228720809b8a94599c54b06a9c509ff3b4a616fcdd10484b679fa0d436e472a8fc062f4b9cf7f4fa274dde6d10f77d378c06aa6
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize504B
MD50f29cd59829320134aeb9d7a56d29e8e
SHA13422a27fb8577ed765657184a13710f2b0ea2185
SHA2565dda2c32270a2ce4a49d5cf085281a897b4c55ac5f2fb65eecfc2b900e0f2bab
SHA512df93f0e5f6570b1701df5fc8954badc4c5159971b90ceda974b279a88c2c100609c483e9bfaa7ebd87e175f77ec78add08f21c1c90f71dbf40b7dbc255c6fd92
-
Filesize
1KB
MD5a42a33b69096e9546c9baae110c48a6b
SHA1ea162e5cf49fb13fd12ebed45551aef3ff730406
SHA256070829ba0da89a760280b286b2ab8053abc287a3e0eda7109aba3b471e5abbf7
SHA512a010b4085b7b9558fec6d3b7a586ff6153f8394919dfa97b1aa2ea3b38d5266e53ad3fe69eb3b412f8e0a9f4d581938ef7f09f8f6950cd0cca0eff3f07543ba5
-
Filesize
5KB
MD52326828ca65f38a3ced866fe65c7f196
SHA11a93d3dc9e3f93efc149eaa799f26fd8a4f866d3
SHA25676ffbf22ce463ab56a45cf5c1c96d477393a11b76b9bfef264607421c4291e52
SHA5124fb9a3f10e14c731fd0814c3227141492857c39f2ce6aa06613249e4f03fd575ab369b733bd7d5460243c5e51848fcc9df9645ee67adc7c0485f8d13be8cd2ae
-
Filesize
6KB
MD5597fe662f49840d9aa72d83c90a500da
SHA1ce17c9cb830060a5b483292014f4f1ea631be64a
SHA256da70654e842cc6f02710792cfcf252805383c74a7d5116d377f921c77352dabd
SHA5123e55ee8e6c0619121a9f57d50058d35b21ccff4f2f6c82af68d0a3fd0f1324b96c67e04996130cef5e06c87bd21f5acaea21cc5b4842bc8fd8553bf4175875f9
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5bc512ced1498b3b70f41e65e80772a6b
SHA1e75161ddb4a5fad13b799e694c879f95eb4ffd35
SHA2566dee62004ab6d5ea8a5542181d0da02be493c9a9dfd87756b8ea80d1f0e83860
SHA5123db0601357c6c2243940d520fb60e4164201ec26e8565b29f6447aa3f286c62744dd9b5813e5386ff2c5bb198a426e71d2248f9c21450c6a86675e2283a9c5d5