Analysis
-
max time kernel
145s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
26/07/2024, 18:48
Static task
static1
Behavioral task
behavioral1
Sample
754646c6717efcf9a74fb5eb393a7fea_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
754646c6717efcf9a74fb5eb393a7fea_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
754646c6717efcf9a74fb5eb393a7fea_JaffaCakes118.html
-
Size
13KB
-
MD5
754646c6717efcf9a74fb5eb393a7fea
-
SHA1
ea26acb05dd55f6e49f1e9aa742b203372c4e29c
-
SHA256
65cb0fb9cdce02777a08ba1a3707e99487c296a60d45543c3abb1ffab5116e56
-
SHA512
e779c8a76aaa33bd9e6fdf9876e15b41b3e30e334e3086cd30c536cca1513ca0989696ae17a0ffbff9b266061936c34972745f9d97a9015e845f3df4fd7759e2
-
SSDEEP
192:tK/L3dxZN+WKGL+hw8qUq6jL+13dAoUrJzDXgz2rFBIh32lXZtAG/YkXlhbgnFXD:YjZNH7lUq6/tjDhGmXZPDXUnF/oMx
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2940 msedge.exe 2940 msedge.exe 2960 msedge.exe 2960 msedge.exe 2688 identity_helper.exe 2688 identity_helper.exe 4300 msedge.exe 4300 msedge.exe 4300 msedge.exe 4300 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2960 msedge.exe 2960 msedge.exe 2960 msedge.exe 2960 msedge.exe 2960 msedge.exe 2960 msedge.exe 2960 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2960 msedge.exe 2960 msedge.exe 2960 msedge.exe 2960 msedge.exe 2960 msedge.exe 2960 msedge.exe 2960 msedge.exe 2960 msedge.exe 2960 msedge.exe 2960 msedge.exe 2960 msedge.exe 2960 msedge.exe 2960 msedge.exe 2960 msedge.exe 2960 msedge.exe 2960 msedge.exe 2960 msedge.exe 2960 msedge.exe 2960 msedge.exe 2960 msedge.exe 2960 msedge.exe 2960 msedge.exe 2960 msedge.exe 2960 msedge.exe 2960 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2960 msedge.exe 2960 msedge.exe 2960 msedge.exe 2960 msedge.exe 2960 msedge.exe 2960 msedge.exe 2960 msedge.exe 2960 msedge.exe 2960 msedge.exe 2960 msedge.exe 2960 msedge.exe 2960 msedge.exe 2960 msedge.exe 2960 msedge.exe 2960 msedge.exe 2960 msedge.exe 2960 msedge.exe 2960 msedge.exe 2960 msedge.exe 2960 msedge.exe 2960 msedge.exe 2960 msedge.exe 2960 msedge.exe 2960 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2960 wrote to memory of 1544 2960 msedge.exe 84 PID 2960 wrote to memory of 1544 2960 msedge.exe 84 PID 2960 wrote to memory of 2964 2960 msedge.exe 85 PID 2960 wrote to memory of 2964 2960 msedge.exe 85 PID 2960 wrote to memory of 2964 2960 msedge.exe 85 PID 2960 wrote to memory of 2964 2960 msedge.exe 85 PID 2960 wrote to memory of 2964 2960 msedge.exe 85 PID 2960 wrote to memory of 2964 2960 msedge.exe 85 PID 2960 wrote to memory of 2964 2960 msedge.exe 85 PID 2960 wrote to memory of 2964 2960 msedge.exe 85 PID 2960 wrote to memory of 2964 2960 msedge.exe 85 PID 2960 wrote to memory of 2964 2960 msedge.exe 85 PID 2960 wrote to memory of 2964 2960 msedge.exe 85 PID 2960 wrote to memory of 2964 2960 msedge.exe 85 PID 2960 wrote to memory of 2964 2960 msedge.exe 85 PID 2960 wrote to memory of 2964 2960 msedge.exe 85 PID 2960 wrote to memory of 2964 2960 msedge.exe 85 PID 2960 wrote to memory of 2964 2960 msedge.exe 85 PID 2960 wrote to memory of 2964 2960 msedge.exe 85 PID 2960 wrote to memory of 2964 2960 msedge.exe 85 PID 2960 wrote to memory of 2964 2960 msedge.exe 85 PID 2960 wrote to memory of 2964 2960 msedge.exe 85 PID 2960 wrote to memory of 2964 2960 msedge.exe 85 PID 2960 wrote to memory of 2964 2960 msedge.exe 85 PID 2960 wrote to memory of 2964 2960 msedge.exe 85 PID 2960 wrote to memory of 2964 2960 msedge.exe 85 PID 2960 wrote to memory of 2964 2960 msedge.exe 85 PID 2960 wrote to memory of 2964 2960 msedge.exe 85 PID 2960 wrote to memory of 2964 2960 msedge.exe 85 PID 2960 wrote to memory of 2964 2960 msedge.exe 85 PID 2960 wrote to memory of 2964 2960 msedge.exe 85 PID 2960 wrote to memory of 2964 2960 msedge.exe 85 PID 2960 wrote to memory of 2964 2960 msedge.exe 85 PID 2960 wrote to memory of 2964 2960 msedge.exe 85 PID 2960 wrote to memory of 2964 2960 msedge.exe 85 PID 2960 wrote to memory of 2964 2960 msedge.exe 85 PID 2960 wrote to memory of 2964 2960 msedge.exe 85 PID 2960 wrote to memory of 2964 2960 msedge.exe 85 PID 2960 wrote to memory of 2964 2960 msedge.exe 85 PID 2960 wrote to memory of 2964 2960 msedge.exe 85 PID 2960 wrote to memory of 2964 2960 msedge.exe 85 PID 2960 wrote to memory of 2964 2960 msedge.exe 85 PID 2960 wrote to memory of 2940 2960 msedge.exe 86 PID 2960 wrote to memory of 2940 2960 msedge.exe 86 PID 2960 wrote to memory of 4852 2960 msedge.exe 87 PID 2960 wrote to memory of 4852 2960 msedge.exe 87 PID 2960 wrote to memory of 4852 2960 msedge.exe 87 PID 2960 wrote to memory of 4852 2960 msedge.exe 87 PID 2960 wrote to memory of 4852 2960 msedge.exe 87 PID 2960 wrote to memory of 4852 2960 msedge.exe 87 PID 2960 wrote to memory of 4852 2960 msedge.exe 87 PID 2960 wrote to memory of 4852 2960 msedge.exe 87 PID 2960 wrote to memory of 4852 2960 msedge.exe 87 PID 2960 wrote to memory of 4852 2960 msedge.exe 87 PID 2960 wrote to memory of 4852 2960 msedge.exe 87 PID 2960 wrote to memory of 4852 2960 msedge.exe 87 PID 2960 wrote to memory of 4852 2960 msedge.exe 87 PID 2960 wrote to memory of 4852 2960 msedge.exe 87 PID 2960 wrote to memory of 4852 2960 msedge.exe 87 PID 2960 wrote to memory of 4852 2960 msedge.exe 87 PID 2960 wrote to memory of 4852 2960 msedge.exe 87 PID 2960 wrote to memory of 4852 2960 msedge.exe 87 PID 2960 wrote to memory of 4852 2960 msedge.exe 87 PID 2960 wrote to memory of 4852 2960 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\754646c6717efcf9a74fb5eb393a7fea_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff158a46f8,0x7fff158a4708,0x7fff158a47182⤵PID:1544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,12371752653924440735,17536347330959659520,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2068 /prefetch:22⤵PID:2964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2056,12371752653924440735,17536347330959659520,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2176 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2056,12371752653924440735,17536347330959659520,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2600 /prefetch:82⤵PID:4852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,12371752653924440735,17536347330959659520,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:4268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,12371752653924440735,17536347330959659520,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:2948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,12371752653924440735,17536347330959659520,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4744 /prefetch:12⤵PID:3036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,12371752653924440735,17536347330959659520,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5596 /prefetch:12⤵PID:4684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,12371752653924440735,17536347330959659520,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5620 /prefetch:12⤵PID:3672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,12371752653924440735,17536347330959659520,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5880 /prefetch:82⤵PID:3756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,12371752653924440735,17536347330959659520,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5880 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,12371752653924440735,17536347330959659520,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4128 /prefetch:12⤵PID:4800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,12371752653924440735,17536347330959659520,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4768 /prefetch:12⤵PID:5096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,12371752653924440735,17536347330959659520,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5104 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4300
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4224
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4188
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5bafce9e4c53a0cb85310891b6b21791b
SHA15d70027cc137a7cbb38f5801b15fd97b05e89ee2
SHA25671fb546b5d2210a56e90b448ee10120cd92c518c8f79fb960f01b918f89f2b00
SHA512c0e4d3eccc0135ac92051539a18f64b8b8628cfe74e5b019d4f8e1dcbb51a9b49c486a1523885fe6be53da7118c013852e753c26a5490538c1e721fd0188836c
-
Filesize
152B
MD5a499254d6b5d91f97eb7a86e5f8ca573
SHA103dbfebfec8c94a9c06f9b0cd81ebe0a2b8be3d1
SHA256fb87b758c2b98989df851380293ff6786cb9a5cf2b3a384cec70d9f3eb064499
SHA512d7adcc76d0470bcd68d7644de3c8d2b6d61df8485979a4752ceea3df4d85bd1c290f72b3d8d5c8d639d5a10afa48d80e457f76b44dd8107ac97eb80fd98c7b0c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize528B
MD5778c62469275b6ee99ff3e31ef5a1b3c
SHA1ee56af0bfc60b1022c5d182bf3224fa5cb47ba44
SHA25601f7157ff333c39f972fd921b9f8335b5aa71244b85f285d34f0d97fa29137e0
SHA5127146510731d2e355e4897571f2e105e7e08daad191e362327f8321cf360f82b741f61ba597f82e16bd9b7d5e2c0ef65190aec021f5c4952c516a0025908fe0c7
-
Filesize
1KB
MD56b59cdfaab696dac0b9679f23e093c77
SHA1d165e63861200dda8572e855cfeb0d36688235fa
SHA256e81fb29dd42260dc9d878ba0adeea6ee8c74872c18c5134f44892e49a27a3918
SHA512189be20d9ca1dfcf6d1638b0a4dab1ad6d88e0a5f26ab7b8d329baae1c7e7c77019decf3419f181ad8e20ec4c8ca52de5f92c52bf16b0581849368bcaf161307
-
Filesize
5KB
MD508251f869083b1ffda1a0c9eceab0ce7
SHA180d22e745e86c3ff04deb674fb821b631f0cd2c5
SHA256ba95e2671d28f23e2f3c6b925b2194705b899c5bf1f6314134b08ab2fc76ae52
SHA512769f9077079bb0c31c2033816bedbdd9cabaabdebd0c8ab9b2250f612f5016d5829bf95a5b3e720bfb9f9bf8ab15263b9688969ea2a918076f79c7ff24757638
-
Filesize
7KB
MD592e19545eedf160cb35458617003b821
SHA1dd7d44eecd81c6f147850a54375e53ea6995d654
SHA25608c63f4e69a8430d3beeaa493dc32752d0736431874c6ec9a854d9a2c7303b04
SHA512e1bb72b6abb10a066a3d720494f72dc61a7cff2e7d403142f1a1b2dc8e4b9593142441a888ca92a931d3e0f50d86dfc4c0c073913720766d2e7e50d53be3addc
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5802f32ee0edc3f73ffc2324638ef6315
SHA14b019fd5ecda8194a553fdb93dbc651a3c2ed405
SHA2567a425f25f0697fc84072b626caee86589ab8c43e71e6111540db6baa970f2d15
SHA512e8f20d7e1f66e1685b0e9ea2e9ddc4d1c2c0818e4aaa6cf12676077a6040628f9cc4fded1cb410f9dbe28f80f1330994d1ec87e7d7f730be2c8593e44dd48ed4