Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
27-07-2024 04:40
Static task
static1
Behavioral task
behavioral1
Sample
7715ebb18a558f26d4cfb208ddb667aa_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
7715ebb18a558f26d4cfb208ddb667aa_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
7715ebb18a558f26d4cfb208ddb667aa_JaffaCakes118.html
-
Size
57KB
-
MD5
7715ebb18a558f26d4cfb208ddb667aa
-
SHA1
d7e2154bc9790a28275b35e3821c42ccb794eab4
-
SHA256
96d178920b794f8be97cbf66e29be2e198cbfd8ca7faec1c1fe7b2d7297adf67
-
SHA512
3151d5eeab46ba06b06f94899f4d56976c240555a2bc9054dc55100f87b08039c265bfee616be31a8894839f088ace3fd469b0d8ac17a519010fa50ee901d436
-
SSDEEP
1536:gQZBCCOdg0IxCoJE5fjfGfEfafgfgbzfAfHfLf2Bf2fOf5fTf7f6fhfqfDfkfMfN:gk2W0Ixa7ecyI434PTM+GBbTC5SbskeE
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 404 msedge.exe 404 msedge.exe 5032 msedge.exe 5032 msedge.exe 2376 identity_helper.exe 2376 identity_helper.exe 3404 msedge.exe 3404 msedge.exe 3404 msedge.exe 3404 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5032 wrote to memory of 4272 5032 msedge.exe 84 PID 5032 wrote to memory of 4272 5032 msedge.exe 84 PID 5032 wrote to memory of 1228 5032 msedge.exe 85 PID 5032 wrote to memory of 1228 5032 msedge.exe 85 PID 5032 wrote to memory of 1228 5032 msedge.exe 85 PID 5032 wrote to memory of 1228 5032 msedge.exe 85 PID 5032 wrote to memory of 1228 5032 msedge.exe 85 PID 5032 wrote to memory of 1228 5032 msedge.exe 85 PID 5032 wrote to memory of 1228 5032 msedge.exe 85 PID 5032 wrote to memory of 1228 5032 msedge.exe 85 PID 5032 wrote to memory of 1228 5032 msedge.exe 85 PID 5032 wrote to memory of 1228 5032 msedge.exe 85 PID 5032 wrote to memory of 1228 5032 msedge.exe 85 PID 5032 wrote to memory of 1228 5032 msedge.exe 85 PID 5032 wrote to memory of 1228 5032 msedge.exe 85 PID 5032 wrote to memory of 1228 5032 msedge.exe 85 PID 5032 wrote to memory of 1228 5032 msedge.exe 85 PID 5032 wrote to memory of 1228 5032 msedge.exe 85 PID 5032 wrote to memory of 1228 5032 msedge.exe 85 PID 5032 wrote to memory of 1228 5032 msedge.exe 85 PID 5032 wrote to memory of 1228 5032 msedge.exe 85 PID 5032 wrote to memory of 1228 5032 msedge.exe 85 PID 5032 wrote to memory of 1228 5032 msedge.exe 85 PID 5032 wrote to memory of 1228 5032 msedge.exe 85 PID 5032 wrote to memory of 1228 5032 msedge.exe 85 PID 5032 wrote to memory of 1228 5032 msedge.exe 85 PID 5032 wrote to memory of 1228 5032 msedge.exe 85 PID 5032 wrote to memory of 1228 5032 msedge.exe 85 PID 5032 wrote to memory of 1228 5032 msedge.exe 85 PID 5032 wrote to memory of 1228 5032 msedge.exe 85 PID 5032 wrote to memory of 1228 5032 msedge.exe 85 PID 5032 wrote to memory of 1228 5032 msedge.exe 85 PID 5032 wrote to memory of 1228 5032 msedge.exe 85 PID 5032 wrote to memory of 1228 5032 msedge.exe 85 PID 5032 wrote to memory of 1228 5032 msedge.exe 85 PID 5032 wrote to memory of 1228 5032 msedge.exe 85 PID 5032 wrote to memory of 1228 5032 msedge.exe 85 PID 5032 wrote to memory of 1228 5032 msedge.exe 85 PID 5032 wrote to memory of 1228 5032 msedge.exe 85 PID 5032 wrote to memory of 1228 5032 msedge.exe 85 PID 5032 wrote to memory of 1228 5032 msedge.exe 85 PID 5032 wrote to memory of 1228 5032 msedge.exe 85 PID 5032 wrote to memory of 404 5032 msedge.exe 86 PID 5032 wrote to memory of 404 5032 msedge.exe 86 PID 5032 wrote to memory of 2104 5032 msedge.exe 87 PID 5032 wrote to memory of 2104 5032 msedge.exe 87 PID 5032 wrote to memory of 2104 5032 msedge.exe 87 PID 5032 wrote to memory of 2104 5032 msedge.exe 87 PID 5032 wrote to memory of 2104 5032 msedge.exe 87 PID 5032 wrote to memory of 2104 5032 msedge.exe 87 PID 5032 wrote to memory of 2104 5032 msedge.exe 87 PID 5032 wrote to memory of 2104 5032 msedge.exe 87 PID 5032 wrote to memory of 2104 5032 msedge.exe 87 PID 5032 wrote to memory of 2104 5032 msedge.exe 87 PID 5032 wrote to memory of 2104 5032 msedge.exe 87 PID 5032 wrote to memory of 2104 5032 msedge.exe 87 PID 5032 wrote to memory of 2104 5032 msedge.exe 87 PID 5032 wrote to memory of 2104 5032 msedge.exe 87 PID 5032 wrote to memory of 2104 5032 msedge.exe 87 PID 5032 wrote to memory of 2104 5032 msedge.exe 87 PID 5032 wrote to memory of 2104 5032 msedge.exe 87 PID 5032 wrote to memory of 2104 5032 msedge.exe 87 PID 5032 wrote to memory of 2104 5032 msedge.exe 87 PID 5032 wrote to memory of 2104 5032 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\7715ebb18a558f26d4cfb208ddb667aa_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5032 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9b81046f8,0x7ff9b8104708,0x7ff9b81047182⤵PID:4272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,14836645855803756771,12845573738084152393,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2080 /prefetch:22⤵PID:1228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2056,14836645855803756771,12845573738084152393,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2140 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2056,14836645855803756771,12845573738084152393,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2656 /prefetch:82⤵PID:2104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,14836645855803756771,12845573738084152393,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3192 /prefetch:12⤵PID:3720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,14836645855803756771,12845573738084152393,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:4876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,14836645855803756771,12845573738084152393,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4564 /prefetch:12⤵PID:2452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,14836645855803756771,12845573738084152393,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5084 /prefetch:12⤵PID:2428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,14836645855803756771,12845573738084152393,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5776 /prefetch:12⤵PID:3548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,14836645855803756771,12845573738084152393,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6220 /prefetch:82⤵PID:1048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,14836645855803756771,12845573738084152393,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6220 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,14836645855803756771,12845573738084152393,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5512 /prefetch:12⤵PID:980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,14836645855803756771,12845573738084152393,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5592 /prefetch:12⤵PID:668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,14836645855803756771,12845573738084152393,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5744 /prefetch:12⤵PID:5232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,14836645855803756771,12845573738084152393,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5384 /prefetch:12⤵PID:5240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,14836645855803756771,12845573738084152393,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4140 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3404
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1064
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3892
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52f842025e22e522658c640cfc7edc529
SHA14c2b24b02709acdd159f1b9bbeb396e52af27033
SHA2561191573f2a7c12f0b9b8460e06dc36ca5386305eb8c883ebbbc8eb15f4d8e23e
SHA5126e4393fd43984722229020ef662fc5981f253de31f13f30fadd6660bbc9ededcbfd163f132f6adaf42d435873322a5d0d3eea60060cf0e7f2e256262632c5d05
-
Filesize
152B
MD554aadd2d8ec66e446f1edb466b99ba8d
SHA1a94f02b035dc918d8d9a46e6886413f15be5bff0
SHA2561971045943002ef01930add9ba1a96a92ddc10d6c581ce29e33c38c2120b130e
SHA5127e077f903463da60b5587aed4f5352060df400ebda713b602b88c15cb2f91076531ea07546a9352df772656065e0bf27bd285905a60f036a5c5951076d35e994
-
Filesize
210KB
MD55ac828ee8e3812a5b225161caf6c61da
SHA186e65f22356c55c21147ce97903f5dbdf363649f
SHA256b70465f707e42b41529b4e6d592f136d9eb307c39d040d147ad3c42842b723e7
SHA51287472912277ae0201c2a41edc228720809b8a94599c54b06a9c509ff3b4a616fcdd10484b679fa0d436e472a8fc062f4b9cf7f4fa274dde6d10f77d378c06aa6
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize504B
MD5bc8719dcc5bff41c7f17e6261e901478
SHA1cd612b9687e01106994e9be38aa275c9cf3eb7c2
SHA2561201204887420ce959f94ec37eb566ff6e69d62db24bdb0dbcda4782ca964f58
SHA512882415b50d885a477b2c5faccd158cc2dea162d2415d2d67c54ac641eeb178f6c7751e78f77c3c64a01cc5b7349e3aafa78d530d7b01309a5c70ab160e4f689c
-
Filesize
1KB
MD57a091b7731900dd6e11d441aba2bbbe5
SHA1aa26736eaae04a0c01f6b38d7eae5819fa87a891
SHA256f3f387c84e11038126d16a7cba939a9e78eb0e921848b5ba50850a3b92a5160f
SHA51251f35afc6e63ca77f073f2f99b816a9d2848030b6b7220c0e50d1b9a37c98a60038899156e1a6e73c8f06aaac6f55bdd8cb5e5db6b4964885d2e6f1838ac7aa4
-
Filesize
5KB
MD59d621dd6193cc3d7e8684eae3ed4c4fc
SHA17e54656dba5a9c382a1904a8779ebb5901c472b7
SHA25620fb92d59a9810adf29d18b1af63d29d54742bf0bf71b1b614c71219800e6466
SHA512186380c2f54520bd9d42d47f2b8054ceb0114cfcec2c248e3ba1a3a9d39321058cdcc6b1216c61a73fd7a83c0ff4572172b67e114ae68e9b9ca3f517940d5429
-
Filesize
6KB
MD5b8d7a36bd4059f1970446956f2efbbf1
SHA1f2a50938db3445421e042784a15d77a9b575f9d4
SHA2569e2eec181e15436a9c9c889401eaf72f3f1d0a0bf8c44efc168a0d8b1b80251c
SHA5123ed98de6bc8fd848e1afd43662d28fa28b5006b15355b2f33a1eb3f5d0995f13a2ee90a510a142a366c7c41e7160039d837d6c5902b55a787ddc8619f403a5e2
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5ba4a60931cda437221f597385d27b983
SHA1ee6f5f37f563b89e1b11d8764b7016c9c80d7c95
SHA256022d248ad181f0e3bd76052cd566b5a5e8b15580fe1e1fcbd53c776ed926cfe2
SHA512c635a954befd3e0a207cc296dd37519b037a12dfe3184be5e605ab8bfc7242349af10308c067e86a89ed98cc33996004c6b31e8c7ceb7b1e393d8b5a12ad4335