Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
10/08/2024, 23:35
Static task
static1
Behavioral task
behavioral1
Sample
881f478213b8c2f6af9ebe17e56a596b_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
881f478213b8c2f6af9ebe17e56a596b_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
881f478213b8c2f6af9ebe17e56a596b_JaffaCakes118.html
-
Size
57KB
-
MD5
881f478213b8c2f6af9ebe17e56a596b
-
SHA1
18f3ad0d550fd52b0c701c2910a7a863464b6636
-
SHA256
49357e51c4226f98082b522508c6ae330bdb9ea99ca6beacd5d646c3ef7858e1
-
SHA512
319d51544ac77d5d8302de224ffb7cf5847db35ad16440f7fe54afe55be570f5679d305289e9ad8bb4de985d9556f55c910eb03765f4422b34a335c11c60ee25
-
SSDEEP
1536:ijEQvK8OPHdsAjo2vgyHJv0owbd6zKD6CDK2RVroDewpDK2RVy:ijnOPHdsj2vgyHJutDK2RVroDewpDK2m
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1412 msedge.exe 1412 msedge.exe 1440 msedge.exe 1440 msedge.exe 4380 identity_helper.exe 4380 identity_helper.exe 1676 msedge.exe 1676 msedge.exe 1676 msedge.exe 1676 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe 1440 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1440 wrote to memory of 1356 1440 msedge.exe 83 PID 1440 wrote to memory of 1356 1440 msedge.exe 83 PID 1440 wrote to memory of 3628 1440 msedge.exe 84 PID 1440 wrote to memory of 3628 1440 msedge.exe 84 PID 1440 wrote to memory of 3628 1440 msedge.exe 84 PID 1440 wrote to memory of 3628 1440 msedge.exe 84 PID 1440 wrote to memory of 3628 1440 msedge.exe 84 PID 1440 wrote to memory of 3628 1440 msedge.exe 84 PID 1440 wrote to memory of 3628 1440 msedge.exe 84 PID 1440 wrote to memory of 3628 1440 msedge.exe 84 PID 1440 wrote to memory of 3628 1440 msedge.exe 84 PID 1440 wrote to memory of 3628 1440 msedge.exe 84 PID 1440 wrote to memory of 3628 1440 msedge.exe 84 PID 1440 wrote to memory of 3628 1440 msedge.exe 84 PID 1440 wrote to memory of 3628 1440 msedge.exe 84 PID 1440 wrote to memory of 3628 1440 msedge.exe 84 PID 1440 wrote to memory of 3628 1440 msedge.exe 84 PID 1440 wrote to memory of 3628 1440 msedge.exe 84 PID 1440 wrote to memory of 3628 1440 msedge.exe 84 PID 1440 wrote to memory of 3628 1440 msedge.exe 84 PID 1440 wrote to memory of 3628 1440 msedge.exe 84 PID 1440 wrote to memory of 3628 1440 msedge.exe 84 PID 1440 wrote to memory of 3628 1440 msedge.exe 84 PID 1440 wrote to memory of 3628 1440 msedge.exe 84 PID 1440 wrote to memory of 3628 1440 msedge.exe 84 PID 1440 wrote to memory of 3628 1440 msedge.exe 84 PID 1440 wrote to memory of 3628 1440 msedge.exe 84 PID 1440 wrote to memory of 3628 1440 msedge.exe 84 PID 1440 wrote to memory of 3628 1440 msedge.exe 84 PID 1440 wrote to memory of 3628 1440 msedge.exe 84 PID 1440 wrote to memory of 3628 1440 msedge.exe 84 PID 1440 wrote to memory of 3628 1440 msedge.exe 84 PID 1440 wrote to memory of 3628 1440 msedge.exe 84 PID 1440 wrote to memory of 3628 1440 msedge.exe 84 PID 1440 wrote to memory of 3628 1440 msedge.exe 84 PID 1440 wrote to memory of 3628 1440 msedge.exe 84 PID 1440 wrote to memory of 3628 1440 msedge.exe 84 PID 1440 wrote to memory of 3628 1440 msedge.exe 84 PID 1440 wrote to memory of 3628 1440 msedge.exe 84 PID 1440 wrote to memory of 3628 1440 msedge.exe 84 PID 1440 wrote to memory of 3628 1440 msedge.exe 84 PID 1440 wrote to memory of 3628 1440 msedge.exe 84 PID 1440 wrote to memory of 1412 1440 msedge.exe 85 PID 1440 wrote to memory of 1412 1440 msedge.exe 85 PID 1440 wrote to memory of 3580 1440 msedge.exe 86 PID 1440 wrote to memory of 3580 1440 msedge.exe 86 PID 1440 wrote to memory of 3580 1440 msedge.exe 86 PID 1440 wrote to memory of 3580 1440 msedge.exe 86 PID 1440 wrote to memory of 3580 1440 msedge.exe 86 PID 1440 wrote to memory of 3580 1440 msedge.exe 86 PID 1440 wrote to memory of 3580 1440 msedge.exe 86 PID 1440 wrote to memory of 3580 1440 msedge.exe 86 PID 1440 wrote to memory of 3580 1440 msedge.exe 86 PID 1440 wrote to memory of 3580 1440 msedge.exe 86 PID 1440 wrote to memory of 3580 1440 msedge.exe 86 PID 1440 wrote to memory of 3580 1440 msedge.exe 86 PID 1440 wrote to memory of 3580 1440 msedge.exe 86 PID 1440 wrote to memory of 3580 1440 msedge.exe 86 PID 1440 wrote to memory of 3580 1440 msedge.exe 86 PID 1440 wrote to memory of 3580 1440 msedge.exe 86 PID 1440 wrote to memory of 3580 1440 msedge.exe 86 PID 1440 wrote to memory of 3580 1440 msedge.exe 86 PID 1440 wrote to memory of 3580 1440 msedge.exe 86 PID 1440 wrote to memory of 3580 1440 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\881f478213b8c2f6af9ebe17e56a596b_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1440 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffae86e46f8,0x7ffae86e4708,0x7ffae86e47182⤵PID:1356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,12975192169058555741,11118803229508005653,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2072 /prefetch:22⤵PID:3628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2060,12975192169058555741,11118803229508005653,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2400 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2060,12975192169058555741,11118803229508005653,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2708 /prefetch:82⤵PID:3580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,12975192169058555741,11118803229508005653,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:1180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,12975192169058555741,11118803229508005653,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:4784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,12975192169058555741,11118803229508005653,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4684 /prefetch:12⤵PID:4740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,12975192169058555741,11118803229508005653,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5156 /prefetch:12⤵PID:1808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,12975192169058555741,11118803229508005653,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4188 /prefetch:12⤵PID:4520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,12975192169058555741,11118803229508005653,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4660 /prefetch:12⤵PID:836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,12975192169058555741,11118803229508005653,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5936 /prefetch:82⤵PID:3488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,12975192169058555741,11118803229508005653,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5936 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,12975192169058555741,11118803229508005653,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6128 /prefetch:12⤵PID:4076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,12975192169058555741,11118803229508005653,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6008 /prefetch:12⤵PID:4612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,12975192169058555741,11118803229508005653,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3404 /prefetch:12⤵PID:4244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,12975192169058555741,11118803229508005653,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4652 /prefetch:12⤵PID:4132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,12975192169058555741,11118803229508005653,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5412 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1676
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3408
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:664
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e4f80e7950cbd3bb11257d2000cb885e
SHA110ac643904d539042d8f7aa4a312b13ec2106035
SHA2561184ee8d32d0edecddd93403fb888fad6b3e2a710d37335c3989cc529bc08124
SHA5122b92c9807fdcd937e514d4e7e1cc7c2d3e3aa162099b7289ceac2feea72d1a4afbadf1c09b3075d470efadf9a9edd63e07ea7e7a98d22243e45b3d53473fa4f0
-
Filesize
152B
MD52dc1a9f2f3f8c3cfe51bb29b078166c5
SHA1eaf3c3dad3c8dc6f18dc3e055b415da78b704402
SHA256dcb76fa365c2d9ee213b224a91cdd806d30b1e8652d72a22f2371124fa4479fa
SHA512682061d9cc86a6e5d99d022da776fb554350fc95efbf29cd84c1db4e2b7161b76cd1de48335bcc3a25633079fb0bd412e4f4795ed6291c65e9bc28d95330bb25
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize792B
MD560da73103371dba73cd4b0fccca6c8b2
SHA1df7ac5fd6755c5ab42274179ce957a4414e3c6ed
SHA256ff9fd48e84103f6ba289fcb8722875b7b4c4968215beae27648f430196104c1e
SHA512e34ce6cbadebcac04c311b8187bd720ccf549bc37fb8cd273dea37a52085441425d962c18af41fc82dbc550c2d8192c0a1d1856e8ee7a7a06bfa956f716fed72
-
Filesize
1KB
MD5f8809e00373efa9dd770ca06140ae8b2
SHA141ca1e327594897067de7ce013f9e71c019f891a
SHA25664c99def074e7f316b22117ea9158c08cc9d1c6cce3b52b8e01d67cc45e3f36c
SHA512e505c1b260a5745320b8b5dab261609d7123d6e3c9d979935a5065d3eb2d0504de63b2b347044a35a11751df854792dca7716e23a2abd1aee676ab0d99014196
-
Filesize
6KB
MD540baba70da53b26ae1d90ffb405319da
SHA1ebfd9cc6ae88404a8b148ef41967a2eb7aec1c80
SHA25653bca8b50e11f6d54e2bd120828b08f3188e779ccdfe27b0519c36e2a8771b73
SHA5124cb838e4bf72ce6dee2d873f9adef2ce6944a90b98b39bcbfef255fa696ffb1d7777ae4cfaced79879b1c14f8fee0039edb8cfdc481ae2b85232f670a89d5122
-
Filesize
6KB
MD59e6e5468222fd2d20e6efc74c423eba8
SHA1220a33b33dde1b9b6588e18c1dd3f812f84428f0
SHA256296c8ed41e91e7f8d56d21a5ce6a8e6cc9b477d1762cf1daf59b47dbb924aec5
SHA51260c0228fb47d7a4eea9fd648395a6ac228e1f64f1928364c76fe7e41264dcdb2cad6b504687b41ee6383fd5b26c16a9656565d29823c4573e940e1bae3355e7d
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD50f89e13560681f195dfafc426205de8d
SHA14ffa297647335ac1df23fb11df2adcc9c9aa4c89
SHA256a1c9fc2f6c7062cd7787a5f8009c2b9bbe2cf250c9e26733f8647bcfca13801a
SHA512dba2a9973c932f6142ccbb9310b7db809565eff5e0d9bf0e07c4bef213ac4627294af525e3e9bcd8efd5873fdf4e5eeb216e7e37444fdefd6cfe06667deff70b