Analysis
-
max time kernel
145s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11-08-2024 05:11
Static task
static1
Behavioral task
behavioral1
Sample
891efa8195f5d642f3b50a7a5f76dc9c_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
891efa8195f5d642f3b50a7a5f76dc9c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
891efa8195f5d642f3b50a7a5f76dc9c_JaffaCakes118.html
-
Size
58KB
-
MD5
891efa8195f5d642f3b50a7a5f76dc9c
-
SHA1
8d71af74cfec86994b9aba67dd501a972b8504a4
-
SHA256
49333d32908e4c0a5ebcf60e41afb3bbb1333c4e43c9adeca09ee9a8770b645a
-
SHA512
3fbfe96bec4503b510d32f43e3d3dcd5e9ef7b2a9fa931d4d2a77ec0177318b9e39b71dff78ef4b959ba62e4d79ac08a4cc05ec6cb81105b86f36270df87879b
-
SSDEEP
1536:gQZBCCOdE0IxCviSlfdf6fTfvfwf6fhfcf9fgfRfqfYfyfifBfyf3fbfIfLfufD+:gk2u0IxcFSLnYC5k1YpyA66pKPDAjGL+
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1032 msedge.exe 1032 msedge.exe 2860 msedge.exe 2860 msedge.exe 1016 identity_helper.exe 1016 identity_helper.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe 1480 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2860 wrote to memory of 4540 2860 msedge.exe 84 PID 2860 wrote to memory of 4540 2860 msedge.exe 84 PID 2860 wrote to memory of 2628 2860 msedge.exe 85 PID 2860 wrote to memory of 2628 2860 msedge.exe 85 PID 2860 wrote to memory of 2628 2860 msedge.exe 85 PID 2860 wrote to memory of 2628 2860 msedge.exe 85 PID 2860 wrote to memory of 2628 2860 msedge.exe 85 PID 2860 wrote to memory of 2628 2860 msedge.exe 85 PID 2860 wrote to memory of 2628 2860 msedge.exe 85 PID 2860 wrote to memory of 2628 2860 msedge.exe 85 PID 2860 wrote to memory of 2628 2860 msedge.exe 85 PID 2860 wrote to memory of 2628 2860 msedge.exe 85 PID 2860 wrote to memory of 2628 2860 msedge.exe 85 PID 2860 wrote to memory of 2628 2860 msedge.exe 85 PID 2860 wrote to memory of 2628 2860 msedge.exe 85 PID 2860 wrote to memory of 2628 2860 msedge.exe 85 PID 2860 wrote to memory of 2628 2860 msedge.exe 85 PID 2860 wrote to memory of 2628 2860 msedge.exe 85 PID 2860 wrote to memory of 2628 2860 msedge.exe 85 PID 2860 wrote to memory of 2628 2860 msedge.exe 85 PID 2860 wrote to memory of 2628 2860 msedge.exe 85 PID 2860 wrote to memory of 2628 2860 msedge.exe 85 PID 2860 wrote to memory of 2628 2860 msedge.exe 85 PID 2860 wrote to memory of 2628 2860 msedge.exe 85 PID 2860 wrote to memory of 2628 2860 msedge.exe 85 PID 2860 wrote to memory of 2628 2860 msedge.exe 85 PID 2860 wrote to memory of 2628 2860 msedge.exe 85 PID 2860 wrote to memory of 2628 2860 msedge.exe 85 PID 2860 wrote to memory of 2628 2860 msedge.exe 85 PID 2860 wrote to memory of 2628 2860 msedge.exe 85 PID 2860 wrote to memory of 2628 2860 msedge.exe 85 PID 2860 wrote to memory of 2628 2860 msedge.exe 85 PID 2860 wrote to memory of 2628 2860 msedge.exe 85 PID 2860 wrote to memory of 2628 2860 msedge.exe 85 PID 2860 wrote to memory of 2628 2860 msedge.exe 85 PID 2860 wrote to memory of 2628 2860 msedge.exe 85 PID 2860 wrote to memory of 2628 2860 msedge.exe 85 PID 2860 wrote to memory of 2628 2860 msedge.exe 85 PID 2860 wrote to memory of 2628 2860 msedge.exe 85 PID 2860 wrote to memory of 2628 2860 msedge.exe 85 PID 2860 wrote to memory of 2628 2860 msedge.exe 85 PID 2860 wrote to memory of 2628 2860 msedge.exe 85 PID 2860 wrote to memory of 1032 2860 msedge.exe 86 PID 2860 wrote to memory of 1032 2860 msedge.exe 86 PID 2860 wrote to memory of 2196 2860 msedge.exe 87 PID 2860 wrote to memory of 2196 2860 msedge.exe 87 PID 2860 wrote to memory of 2196 2860 msedge.exe 87 PID 2860 wrote to memory of 2196 2860 msedge.exe 87 PID 2860 wrote to memory of 2196 2860 msedge.exe 87 PID 2860 wrote to memory of 2196 2860 msedge.exe 87 PID 2860 wrote to memory of 2196 2860 msedge.exe 87 PID 2860 wrote to memory of 2196 2860 msedge.exe 87 PID 2860 wrote to memory of 2196 2860 msedge.exe 87 PID 2860 wrote to memory of 2196 2860 msedge.exe 87 PID 2860 wrote to memory of 2196 2860 msedge.exe 87 PID 2860 wrote to memory of 2196 2860 msedge.exe 87 PID 2860 wrote to memory of 2196 2860 msedge.exe 87 PID 2860 wrote to memory of 2196 2860 msedge.exe 87 PID 2860 wrote to memory of 2196 2860 msedge.exe 87 PID 2860 wrote to memory of 2196 2860 msedge.exe 87 PID 2860 wrote to memory of 2196 2860 msedge.exe 87 PID 2860 wrote to memory of 2196 2860 msedge.exe 87 PID 2860 wrote to memory of 2196 2860 msedge.exe 87 PID 2860 wrote to memory of 2196 2860 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\891efa8195f5d642f3b50a7a5f76dc9c_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa159846f8,0x7ffa15984708,0x7ffa159847182⤵PID:4540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2036,2970565291647633765,11234630243372175804,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2100 /prefetch:22⤵PID:2628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2036,2970565291647633765,11234630243372175804,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2036,2970565291647633765,11234630243372175804,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2852 /prefetch:82⤵PID:2196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,2970565291647633765,11234630243372175804,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:1820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,2970565291647633765,11234630243372175804,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,2970565291647633765,11234630243372175804,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4620 /prefetch:12⤵PID:2120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,2970565291647633765,11234630243372175804,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4880 /prefetch:12⤵PID:4492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,2970565291647633765,11234630243372175804,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5512 /prefetch:12⤵PID:2640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2036,2970565291647633765,11234630243372175804,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5912 /prefetch:82⤵PID:3144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2036,2970565291647633765,11234630243372175804,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5912 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,2970565291647633765,11234630243372175804,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5984 /prefetch:12⤵PID:4784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,2970565291647633765,11234630243372175804,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5588 /prefetch:12⤵PID:4412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,2970565291647633765,11234630243372175804,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4124 /prefetch:12⤵PID:2828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,2970565291647633765,11234630243372175804,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6232 /prefetch:12⤵PID:2380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2036,2970565291647633765,11234630243372175804,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1480
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1748
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4384
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5111c361619c017b5d09a13a56938bd54
SHA1e02b363a8ceb95751623f25025a9299a2c931e07
SHA256d7be4042a1e3511b0dbf0ab5c493245e4ac314440a4ae0732813db01a21ef8bc
SHA512fc16a4ad0b56899b82d05114d7b0ca8ee610cdba6ff0b6a67dea44faf17b3105109335359b78c0a59c9011a13152744a7f5d4f6a5b66ea519df750ef03f622b2
-
Filesize
152B
MD5983cbc1f706a155d63496ebc4d66515e
SHA1223d0071718b80cad9239e58c5e8e64df6e2a2fe
SHA256cc34b8f8e3f4bfe4c9a227d88f56ea2dd276ca3ac81df622ff5e9a8ec46b951c
SHA512d9cf2ca46d9379902730c81e615a3eb694873ffd535c6bb3ded2dc97cdbbfb71051ab11a07754ed6f610f04285605b702b5a48a6cfda3ee3287230c41c9c45cd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\6f56fa07-70de-40e0-b2f2-10b4c60ff241.tmp
Filesize6KB
MD5a002f814360e9b99b311884a76ec61cc
SHA12de658e808ee54ee13ff5323cc74d001dbca640b
SHA256eae38a9d7d4d3cde7f9dff0abecf35a4e7d0f40e922548a8be26ec64d2342cc4
SHA51262e02844bed10ee9bf4d47021ca3f5a2e1c07183af592c666b54f6910f4161afe2b098defa7e63946824f181a2204cc10f880ebb4e6018c8fc75c735799cb075
-
Filesize
210KB
MD548d2860dd3168b6f06a4f27c6791bcaa
SHA1f5f803efed91cd45a36c3d6acdffaaf0e863bf8c
SHA25604d7bf7a6586ef00516bdb3f7b96c65e0b9c6b940f4b145121ed00f6116bbb77
SHA512172da615b5b97a0c17f80ddd8d7406e278cd26afd1eb45a052cde0cb55b92febe49773b1e02cf9e9adca2f34abbaa6d7b83eaad4e08c828ef4bf26f23b95584e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize504B
MD5d54997aeb7e7516e47400d5b67726733
SHA1f59c0913e8672f0b8e7a47a7d4b1e034cc498c76
SHA2565829d8365e1e0ba7e18baf77de0b43530ef961654d86e58f8d63e40a0d3bf9d2
SHA512c09991fa5c5638aadcc10e6dc39485e174cc1020e1dd04e39214a752c5e142b6dcf844df20ce10bcd244bc46915c4c34d782c96275584e81ea36aaafaf41051f
-
Filesize
1KB
MD59ce4a5ddb91244beca696da0e6f91fd9
SHA141ebb75466182ab03ffc7fddcaffd24722835869
SHA25621f68960ba3fa4311e7c70add1221b4aa8cecd2a29323801f9b6825918f3edac
SHA512635f453b16e0bde6d1f16f9be3dbdac6fcb31535cf5cb7b6f4ebef0cf51d67cd5d11af8bc5c16f1f718486b3e9650ca3d8899fceca8e97e77fa34418fff6a46d
-
Filesize
6KB
MD5cd77943b4f0e472c5068a1230e362f66
SHA11f29aa8fb3b380e1760a21135c300f2f8f988599
SHA25602c4529a8b6c4e5d05ea93b801ef84b89c7d51ee3c8faa0c99df105c4b574150
SHA51266ff3533a5fed228e1e0d65ab7ab8faf3860bc995f99771eb8b11b29d9a222b9dd93612f5d880bb7e18cec065edcec0da0111cad54f85107746d7cc39d91a8da
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5c0e75e0621eb1cf0a24d05657cd24bf5
SHA12802113c1d7513a69adcb5287023d55fa1f7fee3
SHA2568ea2651001dd21e12697ca3720ece6127e4cea4f02f39d94224611d7400876b8
SHA512c955975c4344f174f771f156264262613c60ded20d8fa8c8036269340d2ffc25d8f4d916057073b1d920a002f7c3253bb199b79cbdb9fc7295acbcc5dd9e655e