Analysis
-
max time kernel
146s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
27-07-2024 00:55
Static task
static1
Behavioral task
behavioral1
Sample
7673b44b997b8d925cbe1245d7507e42_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
7673b44b997b8d925cbe1245d7507e42_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
7673b44b997b8d925cbe1245d7507e42_JaffaCakes118.html
-
Size
20KB
-
MD5
7673b44b997b8d925cbe1245d7507e42
-
SHA1
7b6b6d63610fc1ee0e03e04bbd61521f92b3b2a5
-
SHA256
4707f0e78fb624cef28622b9144bdd3721b8f24626a0065792aae7054316ab0f
-
SHA512
01c1b9d4bb1cfa1cae4beaa3d30d5475b46dda57d8063921f8532699f49bc6fc0a919e97072ca8853cc0f8beeb8fdcd36daa7d3383f13fdcffb46509f3bc4ae4
-
SSDEEP
192:xyvR5D5btY8wNrSn/iEUKVFTe7/Um1/k24qPLJmaO0AQoYpMFuIgJO:xQZt/QKUUsPPP7bATaI0O
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 100 msedge.exe 100 msedge.exe 1256 msedge.exe 1256 msedge.exe 1236 identity_helper.exe 1236 identity_helper.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe 3852 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1256 wrote to memory of 4116 1256 msedge.exe 84 PID 1256 wrote to memory of 4116 1256 msedge.exe 84 PID 1256 wrote to memory of 2892 1256 msedge.exe 85 PID 1256 wrote to memory of 2892 1256 msedge.exe 85 PID 1256 wrote to memory of 2892 1256 msedge.exe 85 PID 1256 wrote to memory of 2892 1256 msedge.exe 85 PID 1256 wrote to memory of 2892 1256 msedge.exe 85 PID 1256 wrote to memory of 2892 1256 msedge.exe 85 PID 1256 wrote to memory of 2892 1256 msedge.exe 85 PID 1256 wrote to memory of 2892 1256 msedge.exe 85 PID 1256 wrote to memory of 2892 1256 msedge.exe 85 PID 1256 wrote to memory of 2892 1256 msedge.exe 85 PID 1256 wrote to memory of 2892 1256 msedge.exe 85 PID 1256 wrote to memory of 2892 1256 msedge.exe 85 PID 1256 wrote to memory of 2892 1256 msedge.exe 85 PID 1256 wrote to memory of 2892 1256 msedge.exe 85 PID 1256 wrote to memory of 2892 1256 msedge.exe 85 PID 1256 wrote to memory of 2892 1256 msedge.exe 85 PID 1256 wrote to memory of 2892 1256 msedge.exe 85 PID 1256 wrote to memory of 2892 1256 msedge.exe 85 PID 1256 wrote to memory of 2892 1256 msedge.exe 85 PID 1256 wrote to memory of 2892 1256 msedge.exe 85 PID 1256 wrote to memory of 2892 1256 msedge.exe 85 PID 1256 wrote to memory of 2892 1256 msedge.exe 85 PID 1256 wrote to memory of 2892 1256 msedge.exe 85 PID 1256 wrote to memory of 2892 1256 msedge.exe 85 PID 1256 wrote to memory of 2892 1256 msedge.exe 85 PID 1256 wrote to memory of 2892 1256 msedge.exe 85 PID 1256 wrote to memory of 2892 1256 msedge.exe 85 PID 1256 wrote to memory of 2892 1256 msedge.exe 85 PID 1256 wrote to memory of 2892 1256 msedge.exe 85 PID 1256 wrote to memory of 2892 1256 msedge.exe 85 PID 1256 wrote to memory of 2892 1256 msedge.exe 85 PID 1256 wrote to memory of 2892 1256 msedge.exe 85 PID 1256 wrote to memory of 2892 1256 msedge.exe 85 PID 1256 wrote to memory of 2892 1256 msedge.exe 85 PID 1256 wrote to memory of 2892 1256 msedge.exe 85 PID 1256 wrote to memory of 2892 1256 msedge.exe 85 PID 1256 wrote to memory of 2892 1256 msedge.exe 85 PID 1256 wrote to memory of 2892 1256 msedge.exe 85 PID 1256 wrote to memory of 2892 1256 msedge.exe 85 PID 1256 wrote to memory of 2892 1256 msedge.exe 85 PID 1256 wrote to memory of 100 1256 msedge.exe 86 PID 1256 wrote to memory of 100 1256 msedge.exe 86 PID 1256 wrote to memory of 228 1256 msedge.exe 87 PID 1256 wrote to memory of 228 1256 msedge.exe 87 PID 1256 wrote to memory of 228 1256 msedge.exe 87 PID 1256 wrote to memory of 228 1256 msedge.exe 87 PID 1256 wrote to memory of 228 1256 msedge.exe 87 PID 1256 wrote to memory of 228 1256 msedge.exe 87 PID 1256 wrote to memory of 228 1256 msedge.exe 87 PID 1256 wrote to memory of 228 1256 msedge.exe 87 PID 1256 wrote to memory of 228 1256 msedge.exe 87 PID 1256 wrote to memory of 228 1256 msedge.exe 87 PID 1256 wrote to memory of 228 1256 msedge.exe 87 PID 1256 wrote to memory of 228 1256 msedge.exe 87 PID 1256 wrote to memory of 228 1256 msedge.exe 87 PID 1256 wrote to memory of 228 1256 msedge.exe 87 PID 1256 wrote to memory of 228 1256 msedge.exe 87 PID 1256 wrote to memory of 228 1256 msedge.exe 87 PID 1256 wrote to memory of 228 1256 msedge.exe 87 PID 1256 wrote to memory of 228 1256 msedge.exe 87 PID 1256 wrote to memory of 228 1256 msedge.exe 87 PID 1256 wrote to memory of 228 1256 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\7673b44b997b8d925cbe1245d7507e42_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff842eb46f8,0x7ff842eb4708,0x7ff842eb47182⤵PID:4116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,16930383215855967378,16321178491323864218,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2068 /prefetch:22⤵PID:2892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2052,16930383215855967378,16321178491323864218,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2484 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2052,16930383215855967378,16321178491323864218,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2488 /prefetch:82⤵PID:228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,16930383215855967378,16321178491323864218,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:2596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,16930383215855967378,16321178491323864218,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2060 /prefetch:12⤵PID:3208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,16930383215855967378,16321178491323864218,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5024 /prefetch:12⤵PID:4032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,16930383215855967378,16321178491323864218,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4232 /prefetch:12⤵PID:2256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,16930383215855967378,16321178491323864218,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5692 /prefetch:82⤵PID:1372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,16930383215855967378,16321178491323864218,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5692 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,16930383215855967378,16321178491323864218,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4880 /prefetch:12⤵PID:1556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,16930383215855967378,16321178491323864218,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4848 /prefetch:12⤵PID:4748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,16930383215855967378,16321178491323864218,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5912 /prefetch:12⤵PID:3932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,16930383215855967378,16321178491323864218,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4832 /prefetch:12⤵PID:1372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,16930383215855967378,16321178491323864218,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4040 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3852
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4080
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1156
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5bafce9e4c53a0cb85310891b6b21791b
SHA15d70027cc137a7cbb38f5801b15fd97b05e89ee2
SHA25671fb546b5d2210a56e90b448ee10120cd92c518c8f79fb960f01b918f89f2b00
SHA512c0e4d3eccc0135ac92051539a18f64b8b8628cfe74e5b019d4f8e1dcbb51a9b49c486a1523885fe6be53da7118c013852e753c26a5490538c1e721fd0188836c
-
Filesize
152B
MD5a499254d6b5d91f97eb7a86e5f8ca573
SHA103dbfebfec8c94a9c06f9b0cd81ebe0a2b8be3d1
SHA256fb87b758c2b98989df851380293ff6786cb9a5cf2b3a384cec70d9f3eb064499
SHA512d7adcc76d0470bcd68d7644de3c8d2b6d61df8485979a4752ceea3df4d85bd1c290f72b3d8d5c8d639d5a10afa48d80e457f76b44dd8107ac97eb80fd98c7b0c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD5a643f97977f7f44853eaed936d0d43ab
SHA1fc1c3ea30cf82f6cf78523cbdc67d851d131b434
SHA25674a83bc671bfcc86d4d740b946ba9bb8d0ee9e9d645c4e3345b37698a749f8d9
SHA512ad33d32a037fa0200be709a70c01103cd350fb968dd6dd8d5e12578850ac9a800a5dcccab5e8d2e53770965708d8ecaf9096d62f790dac119bf5b14c58da7bcf
-
Filesize
988B
MD53429bc9f506afdb906017022933d9789
SHA13d6e4ee0d6febb81271c1ea266e4e9ec49aa3eb6
SHA256dad0efc6ad7b46783ca2d78f3cae8387568852118483a0b3e422680b5287d752
SHA512d0fad5cec4eaf6a406b4218b9396f5ad8715104b75807c4e35cde614ad8d89fb61905b55e97d201eeb499ee5b47321a3685da451be00b032019c4b6847992ccc
-
Filesize
5KB
MD5f49613213ab78eea15d96d703e764fe2
SHA1e12efb4a176ffdfba17e0f354843b1a7add6e3c2
SHA256bb058669af966ee875e30bec6e638a07151e298bb1f80e44c370ed5ad7a79955
SHA512afbd138321f9a5c59fdce184b787622d0db51cffeb327d36dff6d81092a2d20ae6131542eec3406b5cb9f2678905ca752a724797a67a4516a3f51a26489ea27f
-
Filesize
7KB
MD51d5a54dae9de8b18d8df41400d779640
SHA149041f955378f0f3d3886a9d76f80593045f4325
SHA256de99ad6db62291fafe78b410919f4b214636cc8eaff3e8a0db62f7820a71bebb
SHA512703fdfb88ebf1ba91fcbe96af2a8ea626f5d42464502f4c44504f01f9bb785019e47036f06a85acf0f6804131ec4229c6270423b7ef6153c36ff3f389f921321
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\000004.dbtmp
Filesize16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5b6ca45166810b9542bd94db20a8aff62
SHA11d1507347b0159dd9c70b42b7428891fd27be74e
SHA256ecaaa20bc3d88287ee5e95185368952308cb8de3423a21216525505e7fbb59b3
SHA5125b0da59a549fdb0a96d129132745499a726bac6a7449830027c0f27cf71cd76191b854cd25db33c2848677719b344d3e0acc5fe1eb0158411bba03fb9d996c35