Analysis
-
max time kernel
149s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
10-08-2024 03:25
Static task
static1
Behavioral task
behavioral1
Sample
84a1525e9acc2a33665cfcb48e3c9206_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
84a1525e9acc2a33665cfcb48e3c9206_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
84a1525e9acc2a33665cfcb48e3c9206_JaffaCakes118.html
-
Size
57KB
-
MD5
84a1525e9acc2a33665cfcb48e3c9206
-
SHA1
5e0a5883cf912c18f943d0dc79feb76960860269
-
SHA256
cb3bf889e6d6fad676a4834c2df58ebdfe8c62bd5e470f605ca99d3ee729c65e
-
SHA512
2fd6b38018f4e93f70b49aa31ca186fe940260eab62c0e5924b4b0ac4fc3451418b26890c10b1daf086d20148e71e3e61fe9c000bfd7be7d0979f98e3d18d59b
-
SSDEEP
1536:ijEQvK8OPHdsA1o2vgyHJv0owbd6zKD6CDK2RVrorgwpDK2RVy:ijnOPHdsR2vgyHJutDK2RVrorgwpDK2m
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1872 msedge.exe 1872 msedge.exe 4668 msedge.exe 4668 msedge.exe 2360 identity_helper.exe 2360 identity_helper.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe 1532 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe 4668 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4668 wrote to memory of 4844 4668 msedge.exe 83 PID 4668 wrote to memory of 4844 4668 msedge.exe 83 PID 4668 wrote to memory of 4928 4668 msedge.exe 84 PID 4668 wrote to memory of 4928 4668 msedge.exe 84 PID 4668 wrote to memory of 4928 4668 msedge.exe 84 PID 4668 wrote to memory of 4928 4668 msedge.exe 84 PID 4668 wrote to memory of 4928 4668 msedge.exe 84 PID 4668 wrote to memory of 4928 4668 msedge.exe 84 PID 4668 wrote to memory of 4928 4668 msedge.exe 84 PID 4668 wrote to memory of 4928 4668 msedge.exe 84 PID 4668 wrote to memory of 4928 4668 msedge.exe 84 PID 4668 wrote to memory of 4928 4668 msedge.exe 84 PID 4668 wrote to memory of 4928 4668 msedge.exe 84 PID 4668 wrote to memory of 4928 4668 msedge.exe 84 PID 4668 wrote to memory of 4928 4668 msedge.exe 84 PID 4668 wrote to memory of 4928 4668 msedge.exe 84 PID 4668 wrote to memory of 4928 4668 msedge.exe 84 PID 4668 wrote to memory of 4928 4668 msedge.exe 84 PID 4668 wrote to memory of 4928 4668 msedge.exe 84 PID 4668 wrote to memory of 4928 4668 msedge.exe 84 PID 4668 wrote to memory of 4928 4668 msedge.exe 84 PID 4668 wrote to memory of 4928 4668 msedge.exe 84 PID 4668 wrote to memory of 4928 4668 msedge.exe 84 PID 4668 wrote to memory of 4928 4668 msedge.exe 84 PID 4668 wrote to memory of 4928 4668 msedge.exe 84 PID 4668 wrote to memory of 4928 4668 msedge.exe 84 PID 4668 wrote to memory of 4928 4668 msedge.exe 84 PID 4668 wrote to memory of 4928 4668 msedge.exe 84 PID 4668 wrote to memory of 4928 4668 msedge.exe 84 PID 4668 wrote to memory of 4928 4668 msedge.exe 84 PID 4668 wrote to memory of 4928 4668 msedge.exe 84 PID 4668 wrote to memory of 4928 4668 msedge.exe 84 PID 4668 wrote to memory of 4928 4668 msedge.exe 84 PID 4668 wrote to memory of 4928 4668 msedge.exe 84 PID 4668 wrote to memory of 4928 4668 msedge.exe 84 PID 4668 wrote to memory of 4928 4668 msedge.exe 84 PID 4668 wrote to memory of 4928 4668 msedge.exe 84 PID 4668 wrote to memory of 4928 4668 msedge.exe 84 PID 4668 wrote to memory of 4928 4668 msedge.exe 84 PID 4668 wrote to memory of 4928 4668 msedge.exe 84 PID 4668 wrote to memory of 4928 4668 msedge.exe 84 PID 4668 wrote to memory of 4928 4668 msedge.exe 84 PID 4668 wrote to memory of 1872 4668 msedge.exe 85 PID 4668 wrote to memory of 1872 4668 msedge.exe 85 PID 4668 wrote to memory of 1128 4668 msedge.exe 86 PID 4668 wrote to memory of 1128 4668 msedge.exe 86 PID 4668 wrote to memory of 1128 4668 msedge.exe 86 PID 4668 wrote to memory of 1128 4668 msedge.exe 86 PID 4668 wrote to memory of 1128 4668 msedge.exe 86 PID 4668 wrote to memory of 1128 4668 msedge.exe 86 PID 4668 wrote to memory of 1128 4668 msedge.exe 86 PID 4668 wrote to memory of 1128 4668 msedge.exe 86 PID 4668 wrote to memory of 1128 4668 msedge.exe 86 PID 4668 wrote to memory of 1128 4668 msedge.exe 86 PID 4668 wrote to memory of 1128 4668 msedge.exe 86 PID 4668 wrote to memory of 1128 4668 msedge.exe 86 PID 4668 wrote to memory of 1128 4668 msedge.exe 86 PID 4668 wrote to memory of 1128 4668 msedge.exe 86 PID 4668 wrote to memory of 1128 4668 msedge.exe 86 PID 4668 wrote to memory of 1128 4668 msedge.exe 86 PID 4668 wrote to memory of 1128 4668 msedge.exe 86 PID 4668 wrote to memory of 1128 4668 msedge.exe 86 PID 4668 wrote to memory of 1128 4668 msedge.exe 86 PID 4668 wrote to memory of 1128 4668 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\84a1525e9acc2a33665cfcb48e3c9206_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4668 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd183e46f8,0x7ffd183e4708,0x7ffd183e47182⤵PID:4844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,11682290704392722217,1976088267389749306,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:22⤵PID:4928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,11682290704392722217,1976088267389749306,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,11682290704392722217,1976088267389749306,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2568 /prefetch:82⤵PID:1128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,11682290704392722217,1976088267389749306,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:2152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,11682290704392722217,1976088267389749306,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:3152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,11682290704392722217,1976088267389749306,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4708 /prefetch:12⤵PID:2380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,11682290704392722217,1976088267389749306,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2924 /prefetch:12⤵PID:716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,11682290704392722217,1976088267389749306,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4160 /prefetch:12⤵PID:4472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,11682290704392722217,1976088267389749306,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5464 /prefetch:12⤵PID:4692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,11682290704392722217,1976088267389749306,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6028 /prefetch:82⤵PID:4952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,11682290704392722217,1976088267389749306,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6028 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,11682290704392722217,1976088267389749306,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6008 /prefetch:12⤵PID:1812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,11682290704392722217,1976088267389749306,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5364 /prefetch:12⤵PID:4080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,11682290704392722217,1976088267389749306,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4920 /prefetch:12⤵PID:1232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,11682290704392722217,1976088267389749306,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4984 /prefetch:12⤵PID:4800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,11682290704392722217,1976088267389749306,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6124 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1532
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3480
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2860
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ff63763eedb406987ced076e36ec9acf
SHA116365aa97cd1a115412f8ae436d5d4e9be5f7b5d
SHA2568f460e8b7a67f0c65b7248961a7c71146c9e7a19772b193972b486dbf05b8e4c
SHA512ce90336169c8b2de249d4faea2519bf7c3df48ae9d77cdf471dd5dbd8e8542d47d9348080a098074aa63c255890850ee3b80ddb8eef8384919fdca3bb9371d9f
-
Filesize
152B
MD52783c40400a8912a79cfd383da731086
SHA1001a131fe399c30973089e18358818090ca81789
SHA256331fa67da5f67bbb42794c3aeab8f7819f35347460ffb352ccc914e0373a22c5
SHA512b7c7d3aa966ad39a86aae02479649d74dcbf29d9cb3a7ff8b9b2354ea60704da55f5c0df803fd0a7191170a8e72fdd5eacfa1a739d7a74e390a7b74bdced1685
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize792B
MD55d487dd3247b3dc89d6b79263ba4a792
SHA16196a90202957e23405978e7fe7840773c031dfe
SHA25624394666e955a426d69f93b5852671ffbd4490b14c7a0fc37ec22183328da923
SHA512e7f9d04cd7a3bed3e0eb16199db0b2f34dd34e5c02871f767587628078561a60f6e92baeed5dc3bd916347c773c0573fa794c9a35937234cfe01a59df17bcd43
-
Filesize
1KB
MD5d3288d17ebfd9d46ec25db46a2d571fc
SHA1eb99af387a3be1dd7f2145a51994d01ef050b333
SHA256e0495993a7fe642dccbaf5ff735ffe9511767172bddd61d3313c59144afd64f8
SHA512441499e2cbf9da18171a603e97e4d934d9bb20ee0b40a65a1c5144e8a1aaba0efd798a9b30b170afa084133f04f1c41cbd9f9d9c8b905b363a3c4cf796eea797
-
Filesize
6KB
MD5d31d23dc7319e7d0f9af0e907a4931d2
SHA16b6346eac14cb15ac918b6d9331ab71b0bade3a4
SHA2561121df7715e9e8c025c99215a47193651c5d8452e88816f8bc5f173d8ea34072
SHA5128f2cc4c43740b382325aab5dc72ded1958dab43f889e4439b56a554601958c0792aa68fb14b6486a0881f676321277380958f20e83521568532798ebd49ce3d2
-
Filesize
7KB
MD5389ebe0b4f82635f9e1e3c9baf95afee
SHA1ace45033d903b8a63545c9d90127703b7f0a6563
SHA2563a73d0ace7b9e53d2ca1be9121079a5d87ba3906269288615d552479b5f98b62
SHA512a7488f6c59f3269d096649b71b570c49999209afea2ae1884b5312f0df275b41dbb71ce06f4325335261c44d5184d50518509cbcba57fb21f013c941af3d7cc2
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD583d81409f111346186f04c35ac04f2d4
SHA1647c508a0418de32e314a4123b542210f5068806
SHA2565fae69edc5b6f2349cfb8d0a35fafd00224a76f91d96fd1db3ea38ded2d81c16
SHA512c9d6a10a8ad2d3700a00b7566a4c2570a11c236ab45ebcee0e25e10b8227f5d06c69ec787568762cf32d4f6107f7074282b9f0f8230482bfef70a6206416cb9b