Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
27/07/2024, 17:49
Static task
static1
Behavioral task
behavioral1
Sample
79066b0b16ddffaf7f2cb9a9afe582d5_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
79066b0b16ddffaf7f2cb9a9afe582d5_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
79066b0b16ddffaf7f2cb9a9afe582d5_JaffaCakes118.html
-
Size
57KB
-
MD5
79066b0b16ddffaf7f2cb9a9afe582d5
-
SHA1
79cabec2e7bed9ce9f5cc98ec1267a9d7fd39362
-
SHA256
497389918cfa995f02d22c592fa3cd5bed913a448688c22d336d14e17ddf563f
-
SHA512
f713a66e028a91ab322ea19cd6e605e10172857c20074deb3c3b8eec0a273a24f5cb8ccef7725a06158f6ac10d70ffd161032cee55589cc18bab09d9fecf0e5a
-
SSDEEP
1536:ijEQvK8OPHdyAto2vgyHJv0owbd6zKD6CDK2RVroRswpDK2RVy:ijnOPHdyP2vgyHJutDK2RVroRswpDK2m
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4140 msedge.exe 4140 msedge.exe 224 msedge.exe 224 msedge.exe 4032 identity_helper.exe 4032 identity_helper.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe 1144 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 224 wrote to memory of 3848 224 msedge.exe 84 PID 224 wrote to memory of 3848 224 msedge.exe 84 PID 224 wrote to memory of 1108 224 msedge.exe 85 PID 224 wrote to memory of 1108 224 msedge.exe 85 PID 224 wrote to memory of 1108 224 msedge.exe 85 PID 224 wrote to memory of 1108 224 msedge.exe 85 PID 224 wrote to memory of 1108 224 msedge.exe 85 PID 224 wrote to memory of 1108 224 msedge.exe 85 PID 224 wrote to memory of 1108 224 msedge.exe 85 PID 224 wrote to memory of 1108 224 msedge.exe 85 PID 224 wrote to memory of 1108 224 msedge.exe 85 PID 224 wrote to memory of 1108 224 msedge.exe 85 PID 224 wrote to memory of 1108 224 msedge.exe 85 PID 224 wrote to memory of 1108 224 msedge.exe 85 PID 224 wrote to memory of 1108 224 msedge.exe 85 PID 224 wrote to memory of 1108 224 msedge.exe 85 PID 224 wrote to memory of 1108 224 msedge.exe 85 PID 224 wrote to memory of 1108 224 msedge.exe 85 PID 224 wrote to memory of 1108 224 msedge.exe 85 PID 224 wrote to memory of 1108 224 msedge.exe 85 PID 224 wrote to memory of 1108 224 msedge.exe 85 PID 224 wrote to memory of 1108 224 msedge.exe 85 PID 224 wrote to memory of 1108 224 msedge.exe 85 PID 224 wrote to memory of 1108 224 msedge.exe 85 PID 224 wrote to memory of 1108 224 msedge.exe 85 PID 224 wrote to memory of 1108 224 msedge.exe 85 PID 224 wrote to memory of 1108 224 msedge.exe 85 PID 224 wrote to memory of 1108 224 msedge.exe 85 PID 224 wrote to memory of 1108 224 msedge.exe 85 PID 224 wrote to memory of 1108 224 msedge.exe 85 PID 224 wrote to memory of 1108 224 msedge.exe 85 PID 224 wrote to memory of 1108 224 msedge.exe 85 PID 224 wrote to memory of 1108 224 msedge.exe 85 PID 224 wrote to memory of 1108 224 msedge.exe 85 PID 224 wrote to memory of 1108 224 msedge.exe 85 PID 224 wrote to memory of 1108 224 msedge.exe 85 PID 224 wrote to memory of 1108 224 msedge.exe 85 PID 224 wrote to memory of 1108 224 msedge.exe 85 PID 224 wrote to memory of 1108 224 msedge.exe 85 PID 224 wrote to memory of 1108 224 msedge.exe 85 PID 224 wrote to memory of 1108 224 msedge.exe 85 PID 224 wrote to memory of 1108 224 msedge.exe 85 PID 224 wrote to memory of 4140 224 msedge.exe 86 PID 224 wrote to memory of 4140 224 msedge.exe 86 PID 224 wrote to memory of 2900 224 msedge.exe 87 PID 224 wrote to memory of 2900 224 msedge.exe 87 PID 224 wrote to memory of 2900 224 msedge.exe 87 PID 224 wrote to memory of 2900 224 msedge.exe 87 PID 224 wrote to memory of 2900 224 msedge.exe 87 PID 224 wrote to memory of 2900 224 msedge.exe 87 PID 224 wrote to memory of 2900 224 msedge.exe 87 PID 224 wrote to memory of 2900 224 msedge.exe 87 PID 224 wrote to memory of 2900 224 msedge.exe 87 PID 224 wrote to memory of 2900 224 msedge.exe 87 PID 224 wrote to memory of 2900 224 msedge.exe 87 PID 224 wrote to memory of 2900 224 msedge.exe 87 PID 224 wrote to memory of 2900 224 msedge.exe 87 PID 224 wrote to memory of 2900 224 msedge.exe 87 PID 224 wrote to memory of 2900 224 msedge.exe 87 PID 224 wrote to memory of 2900 224 msedge.exe 87 PID 224 wrote to memory of 2900 224 msedge.exe 87 PID 224 wrote to memory of 2900 224 msedge.exe 87 PID 224 wrote to memory of 2900 224 msedge.exe 87 PID 224 wrote to memory of 2900 224 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\79066b0b16ddffaf7f2cb9a9afe582d5_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:224 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9e45146f8,0x7ff9e4514708,0x7ff9e45147182⤵PID:3848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2204,14810686484402647586,7135290303816570646,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:22⤵PID:1108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2204,14810686484402647586,7135290303816570646,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2396 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2204,14810686484402647586,7135290303816570646,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2868 /prefetch:82⤵PID:2900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,14810686484402647586,7135290303816570646,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:2756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,14810686484402647586,7135290303816570646,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,14810686484402647586,7135290303816570646,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4720 /prefetch:12⤵PID:2320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,14810686484402647586,7135290303816570646,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4952 /prefetch:12⤵PID:4264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,14810686484402647586,7135290303816570646,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5360 /prefetch:12⤵PID:564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,14810686484402647586,7135290303816570646,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5620 /prefetch:12⤵PID:2956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2204,14810686484402647586,7135290303816570646,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6224 /prefetch:82⤵PID:3924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2204,14810686484402647586,7135290303816570646,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6224 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,14810686484402647586,7135290303816570646,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6100 /prefetch:12⤵PID:3412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,14810686484402647586,7135290303816570646,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5364 /prefetch:12⤵PID:4716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,14810686484402647586,7135290303816570646,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6388 /prefetch:12⤵PID:5284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,14810686484402647586,7135290303816570646,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6436 /prefetch:12⤵PID:5292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2204,14810686484402647586,7135290303816570646,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2328 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1144
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4464
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:372
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5584971c8ba88c824fd51a05dddb45a98
SHA1b7c9489b4427652a9cdd754d1c1b6ac4034be421
SHA256e2d8de6c2323bbb3863ec50843d9b58a22e911fd626d31430658b9ea942cd307
SHA5125dbf1a4631a04d1149d8fab2b8e0e43ccd97b7212de43b961b9128a8bf03329164fdeb480154a8ffea5835f28417a7d2b115b8bf8d578d00b13c3682aa5ca726
-
Filesize
152B
MD5b28ef7d9f6d74f055cc49876767c886c
SHA1d6b3267f36c340979f8fc3e012fdd02c468740bf
SHA256fa6804456884789f4bdf9c3f5a4a8f29e0ededde149c4384072f3d8cc85bcc37
SHA512491f893c8f765e5d629bce8dd5067cef4e2ebc558d43bfb05e358bca43e1a66ee1285519bc266fd0ff5b5e09769a56077b62ac55fa8797c1edf6205843356e75
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize792B
MD51239acff8a2ab8a34a4aee49af8ade03
SHA1225056f938465665a366e3a287ef707eb8080d60
SHA25626aa6f6616541745d017b829ce192049b35fc8af367662060db4ba33984b052a
SHA5121f826cd927da59f4e393b1df93a9d58327dd58a57061b04d21993757f3587449b523eeab2eb4473437dbca1c17c47ef17d610dc3e5a4e1377a6ecbfe29a1be7d
-
Filesize
1KB
MD5b55a96360df4b104b561d3d46cf6f6e6
SHA14a2c4d43850f66a2376911ec50c6c40090077643
SHA2568c1197070780b9931c2ed06c3b1910b9bc227ce4eb70ce708ffb40ebd5c892f4
SHA512e5a087235a34c60e165837fbaf7e221dc0d2513dce1b076fd1b8dba1ca28276a1ecfe27e1df77267f48f3b49a1a5dca1b1e3c78d3b9e3bef11d4da854a1ade39
-
Filesize
5KB
MD54aad8b47a78cf4def43021c2ab00b201
SHA1176d17fde3ec2aa36e38034109dd04ed6b4c1d39
SHA256786765190348c064473eaab56af786c73f75278d038226a3d48ee53dc0392c1a
SHA512af956c5feb83cc77e743ef542a8c369fe60e261c8f208816682b28a82ebaf22f700c9ce473769fec58f908ba9afa2a496f74e2ab6915735d9c500c6171fedd92
-
Filesize
6KB
MD558018f8efd168493c99bd710d8498a46
SHA16798cbc0308ee8702365325574cf878ea686ebb4
SHA25684061b6ebd2fe5d718f851c50d58e566399a1c83f9a885d527aec71dd34eaa30
SHA5124d6c0ec1dd86dfbec926e44b7158655bfb97cf5853c768c1a8c87264c00f0b49d9a87df48b1c7e19c898daae9608aeb868aedb2456ef34b26d62db8bd8570221
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5343a4b6ca4adc3231d0358729494d2c2
SHA191220acefe046a231c22f937ce641931e1f36183
SHA256ae7724f0862760aabe7f6098fba9dddc81e9259496d7b44909e8c437b871ec77
SHA512903b7577318827b64bfa01a0c5188abf073ad7f3458b8904f96c1fc2d733e0b56848e68123ecdbd21a1629d21f48c0cddb4e99160926f7451a771a9b21635dca