Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
27/07/2024, 03:12
Static task
static1
Behavioral task
behavioral1
Sample
76d89ea01eb5aefeb992dcb52c103e24_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
76d89ea01eb5aefeb992dcb52c103e24_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
76d89ea01eb5aefeb992dcb52c103e24_JaffaCakes118.html
-
Size
12KB
-
MD5
76d89ea01eb5aefeb992dcb52c103e24
-
SHA1
7b1a01f5bf99e1384feecf4f0bdcd5984e1e41ec
-
SHA256
48a41606a7822fc5e2a602bafb1b8a2bc73d566fa3783f2101b48268828ff543
-
SHA512
8eb6477bbd22773ebd284269eed7bd22db8344649564b0a3e98f8098350c6b734d457dfa53a747fba72ed600f4c121aacf4b7e121cbc653fffb478de545ee640
-
SSDEEP
192:2VQlIsr0KXyJxVCNN5mb8k/w1wvqLkZABfZXnVQ29601e6uBuLbdU8d:sQlIcwVQjmN/guABfZXnVQ2960e6guLZ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4856 msedge.exe 4856 msedge.exe 4448 msedge.exe 4448 msedge.exe 2196 identity_helper.exe 2196 identity_helper.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4448 wrote to memory of 4320 4448 msedge.exe 84 PID 4448 wrote to memory of 4320 4448 msedge.exe 84 PID 4448 wrote to memory of 3060 4448 msedge.exe 85 PID 4448 wrote to memory of 3060 4448 msedge.exe 85 PID 4448 wrote to memory of 3060 4448 msedge.exe 85 PID 4448 wrote to memory of 3060 4448 msedge.exe 85 PID 4448 wrote to memory of 3060 4448 msedge.exe 85 PID 4448 wrote to memory of 3060 4448 msedge.exe 85 PID 4448 wrote to memory of 3060 4448 msedge.exe 85 PID 4448 wrote to memory of 3060 4448 msedge.exe 85 PID 4448 wrote to memory of 3060 4448 msedge.exe 85 PID 4448 wrote to memory of 3060 4448 msedge.exe 85 PID 4448 wrote to memory of 3060 4448 msedge.exe 85 PID 4448 wrote to memory of 3060 4448 msedge.exe 85 PID 4448 wrote to memory of 3060 4448 msedge.exe 85 PID 4448 wrote to memory of 3060 4448 msedge.exe 85 PID 4448 wrote to memory of 3060 4448 msedge.exe 85 PID 4448 wrote to memory of 3060 4448 msedge.exe 85 PID 4448 wrote to memory of 3060 4448 msedge.exe 85 PID 4448 wrote to memory of 3060 4448 msedge.exe 85 PID 4448 wrote to memory of 3060 4448 msedge.exe 85 PID 4448 wrote to memory of 3060 4448 msedge.exe 85 PID 4448 wrote to memory of 3060 4448 msedge.exe 85 PID 4448 wrote to memory of 3060 4448 msedge.exe 85 PID 4448 wrote to memory of 3060 4448 msedge.exe 85 PID 4448 wrote to memory of 3060 4448 msedge.exe 85 PID 4448 wrote to memory of 3060 4448 msedge.exe 85 PID 4448 wrote to memory of 3060 4448 msedge.exe 85 PID 4448 wrote to memory of 3060 4448 msedge.exe 85 PID 4448 wrote to memory of 3060 4448 msedge.exe 85 PID 4448 wrote to memory of 3060 4448 msedge.exe 85 PID 4448 wrote to memory of 3060 4448 msedge.exe 85 PID 4448 wrote to memory of 3060 4448 msedge.exe 85 PID 4448 wrote to memory of 3060 4448 msedge.exe 85 PID 4448 wrote to memory of 3060 4448 msedge.exe 85 PID 4448 wrote to memory of 3060 4448 msedge.exe 85 PID 4448 wrote to memory of 3060 4448 msedge.exe 85 PID 4448 wrote to memory of 3060 4448 msedge.exe 85 PID 4448 wrote to memory of 3060 4448 msedge.exe 85 PID 4448 wrote to memory of 3060 4448 msedge.exe 85 PID 4448 wrote to memory of 3060 4448 msedge.exe 85 PID 4448 wrote to memory of 3060 4448 msedge.exe 85 PID 4448 wrote to memory of 4856 4448 msedge.exe 86 PID 4448 wrote to memory of 4856 4448 msedge.exe 86 PID 4448 wrote to memory of 3600 4448 msedge.exe 87 PID 4448 wrote to memory of 3600 4448 msedge.exe 87 PID 4448 wrote to memory of 3600 4448 msedge.exe 87 PID 4448 wrote to memory of 3600 4448 msedge.exe 87 PID 4448 wrote to memory of 3600 4448 msedge.exe 87 PID 4448 wrote to memory of 3600 4448 msedge.exe 87 PID 4448 wrote to memory of 3600 4448 msedge.exe 87 PID 4448 wrote to memory of 3600 4448 msedge.exe 87 PID 4448 wrote to memory of 3600 4448 msedge.exe 87 PID 4448 wrote to memory of 3600 4448 msedge.exe 87 PID 4448 wrote to memory of 3600 4448 msedge.exe 87 PID 4448 wrote to memory of 3600 4448 msedge.exe 87 PID 4448 wrote to memory of 3600 4448 msedge.exe 87 PID 4448 wrote to memory of 3600 4448 msedge.exe 87 PID 4448 wrote to memory of 3600 4448 msedge.exe 87 PID 4448 wrote to memory of 3600 4448 msedge.exe 87 PID 4448 wrote to memory of 3600 4448 msedge.exe 87 PID 4448 wrote to memory of 3600 4448 msedge.exe 87 PID 4448 wrote to memory of 3600 4448 msedge.exe 87 PID 4448 wrote to memory of 3600 4448 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\76d89ea01eb5aefeb992dcb52c103e24_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4448 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc883446f8,0x7ffc88344708,0x7ffc883447182⤵PID:4320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,8945978104553266814,15650606280331940093,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2176 /prefetch:22⤵PID:3060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2084,8945978104553266814,15650606280331940093,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2268 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2084,8945978104553266814,15650606280331940093,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2896 /prefetch:82⤵PID:3600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,8945978104553266814,15650606280331940093,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:2340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,8945978104553266814,15650606280331940093,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:1436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,8945978104553266814,15650606280331940093,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4632 /prefetch:12⤵PID:3856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,8945978104553266814,15650606280331940093,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1760 /prefetch:12⤵PID:3304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,8945978104553266814,15650606280331940093,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3732 /prefetch:12⤵PID:4660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,8945978104553266814,15650606280331940093,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5776 /prefetch:82⤵PID:4084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,8945978104553266814,15650606280331940093,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5776 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,8945978104553266814,15650606280331940093,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4968 /prefetch:12⤵PID:2804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,8945978104553266814,15650606280331940093,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3968 /prefetch:12⤵PID:3580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,8945978104553266814,15650606280331940093,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4112
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1844
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1508
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD575c9f57baeefeecd6c184627de951c1e
SHA152e0468e13cbfc9f15fc62cc27ce14367a996cff
SHA256648ba270261690bb792f95d017e134d81a612ef4fc76dc41921c9e5b8f46d98f
SHA512c4570cc4bb4894de3ecc8eee6cd8bfa5809ea401ceef683557fb170175ff4294cc21cdc6834db4e79e5e82d3bf16105894fff83290d26343423324bc486d4a15
-
Filesize
152B
MD510fa19df148444a77ceec60cabd2ce21
SHA1685b599c497668166ede4945d8885d204fd8d70f
SHA256c3b5deb970d0f06a05c8111da90330ffe25da195aafa4e182211669484d1964b
SHA5123518ce16fef66c59e0bdb772db51aeaa9042c44ca399be61ca3d9979351f93655393236711cf2b1988d5f90a5b9318a7569a8cef3374fc745a8f9aa8323691ef
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD5e0f644afe63006118092aa0959c6ce61
SHA1c3cece6c2f4112453a614258bb03b3f12538566d
SHA256f875c8143717d4a0d8865d7431dad3ad4e4572ad89210bb1394759757b1deb06
SHA512306ed136ba1a222cf788b14bccc67089bbfc2385193f8d7c9b0ed6fbf3ca53d2da1141e362ed88ea6ad276a97feb12f5a45d2e2aafae88f45c9e9b43ad5c56df
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize168B
MD5cee12f05737be675168ce7437f8e40fa
SHA1fcf05c8b96fc7bf1b258f192155369ca70049c24
SHA256422acec62294e7a71c0c0238da5b6ed6402a31bc57ecd92cf211187e95afe377
SHA5129172038a1462733c9e5a8ad4c71c8e7e70d04e43f7031c48617b5d1fd722591c62d7688ef0c9d1d8df5c80a6ede5fb16d8a4fe9aa3890623bddc31734b972620
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
5KB
MD570952ede812b50e1be13cd0afaa5b30e
SHA154ddb155092235d2a6d9b30ddfd3397131cca6b9
SHA256fd29d56dc8360c2bd8e50bf312e317a25d9b33b1d5d9475b6d30a2f0ce5d72cd
SHA512509543007541687c98b3a4b4ee2aa14f57b367e44bf0a3cb63eb3b995f3f16d62e525bfd2e0cde6140df967984bd2d454771f1c1e7864b82d6abe08bbf3f98dc
-
Filesize
6KB
MD581440310a718a23e409f9355d1ff4cc5
SHA1d4db8ff406a48daef9800d8f547ad0b991f816ca
SHA256cc49c026fddd6194c83e12805978f3aa29d4c4fc3d43d766ceb2ffbe6eb81ecf
SHA512c160fef7a15c9b2b3ec99bb2311adf65fcfe3fbc69bddf597a3294fbd1c19810e7951dfd5db46d426f5567f778b76a9ccfdb7116e08f79b359027aed267fd3c6
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD5d668dddeef9f03b599b22b0fcf4e0fd9
SHA1d6581ce76000942c3efac321e623d3ace559e6cb
SHA256ac9b407c9fed042655559167c3c4f5cda727d1e28e4f6d989f227eaedb647b37
SHA512568c4bc92ec32c6e75b9116de4cec62bf4823359a3696b2c7c09868b2d2d542d64dbe4d94cdb4abbf3c6c5852bcf18369cb060a98d89617bc16d88a046673442