Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11-08-2024 06:27
Static task
static1
Behavioral task
behavioral1
Sample
89565d6fd743ac72122439213065b521_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
89565d6fd743ac72122439213065b521_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
89565d6fd743ac72122439213065b521_JaffaCakes118.html
-
Size
65KB
-
MD5
89565d6fd743ac72122439213065b521
-
SHA1
5cfa57743803e17c61a3ec2b9dc80e491cc040a2
-
SHA256
97971d74f00596e3f54fd10aa3e8962d007ac373a25cd3baca38613a056359c0
-
SHA512
015609bc7dd4cdef50dc47497619d82271e5b33b21b4aac4c9e833d74d151e5da478587d049c0e947b12fa74ab5b63eb540dea673d2e4d2a5394c5d5c23f15a4
-
SSDEEP
1536:8zSpe73Z5LySoxQo/zFY+a0xNeFIm+/O/:8zSpe7ptu3/ZY+aZIm+/O/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 700 msedge.exe 700 msedge.exe 4556 msedge.exe 4556 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe 3212 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4556 wrote to memory of 2840 4556 msedge.exe 84 PID 4556 wrote to memory of 2840 4556 msedge.exe 84 PID 4556 wrote to memory of 5072 4556 msedge.exe 85 PID 4556 wrote to memory of 5072 4556 msedge.exe 85 PID 4556 wrote to memory of 5072 4556 msedge.exe 85 PID 4556 wrote to memory of 5072 4556 msedge.exe 85 PID 4556 wrote to memory of 5072 4556 msedge.exe 85 PID 4556 wrote to memory of 5072 4556 msedge.exe 85 PID 4556 wrote to memory of 5072 4556 msedge.exe 85 PID 4556 wrote to memory of 5072 4556 msedge.exe 85 PID 4556 wrote to memory of 5072 4556 msedge.exe 85 PID 4556 wrote to memory of 5072 4556 msedge.exe 85 PID 4556 wrote to memory of 5072 4556 msedge.exe 85 PID 4556 wrote to memory of 5072 4556 msedge.exe 85 PID 4556 wrote to memory of 5072 4556 msedge.exe 85 PID 4556 wrote to memory of 5072 4556 msedge.exe 85 PID 4556 wrote to memory of 5072 4556 msedge.exe 85 PID 4556 wrote to memory of 5072 4556 msedge.exe 85 PID 4556 wrote to memory of 5072 4556 msedge.exe 85 PID 4556 wrote to memory of 5072 4556 msedge.exe 85 PID 4556 wrote to memory of 5072 4556 msedge.exe 85 PID 4556 wrote to memory of 5072 4556 msedge.exe 85 PID 4556 wrote to memory of 5072 4556 msedge.exe 85 PID 4556 wrote to memory of 5072 4556 msedge.exe 85 PID 4556 wrote to memory of 5072 4556 msedge.exe 85 PID 4556 wrote to memory of 5072 4556 msedge.exe 85 PID 4556 wrote to memory of 5072 4556 msedge.exe 85 PID 4556 wrote to memory of 5072 4556 msedge.exe 85 PID 4556 wrote to memory of 5072 4556 msedge.exe 85 PID 4556 wrote to memory of 5072 4556 msedge.exe 85 PID 4556 wrote to memory of 5072 4556 msedge.exe 85 PID 4556 wrote to memory of 5072 4556 msedge.exe 85 PID 4556 wrote to memory of 5072 4556 msedge.exe 85 PID 4556 wrote to memory of 5072 4556 msedge.exe 85 PID 4556 wrote to memory of 5072 4556 msedge.exe 85 PID 4556 wrote to memory of 5072 4556 msedge.exe 85 PID 4556 wrote to memory of 5072 4556 msedge.exe 85 PID 4556 wrote to memory of 5072 4556 msedge.exe 85 PID 4556 wrote to memory of 5072 4556 msedge.exe 85 PID 4556 wrote to memory of 5072 4556 msedge.exe 85 PID 4556 wrote to memory of 5072 4556 msedge.exe 85 PID 4556 wrote to memory of 5072 4556 msedge.exe 85 PID 4556 wrote to memory of 700 4556 msedge.exe 86 PID 4556 wrote to memory of 700 4556 msedge.exe 86 PID 4556 wrote to memory of 4416 4556 msedge.exe 87 PID 4556 wrote to memory of 4416 4556 msedge.exe 87 PID 4556 wrote to memory of 4416 4556 msedge.exe 87 PID 4556 wrote to memory of 4416 4556 msedge.exe 87 PID 4556 wrote to memory of 4416 4556 msedge.exe 87 PID 4556 wrote to memory of 4416 4556 msedge.exe 87 PID 4556 wrote to memory of 4416 4556 msedge.exe 87 PID 4556 wrote to memory of 4416 4556 msedge.exe 87 PID 4556 wrote to memory of 4416 4556 msedge.exe 87 PID 4556 wrote to memory of 4416 4556 msedge.exe 87 PID 4556 wrote to memory of 4416 4556 msedge.exe 87 PID 4556 wrote to memory of 4416 4556 msedge.exe 87 PID 4556 wrote to memory of 4416 4556 msedge.exe 87 PID 4556 wrote to memory of 4416 4556 msedge.exe 87 PID 4556 wrote to memory of 4416 4556 msedge.exe 87 PID 4556 wrote to memory of 4416 4556 msedge.exe 87 PID 4556 wrote to memory of 4416 4556 msedge.exe 87 PID 4556 wrote to memory of 4416 4556 msedge.exe 87 PID 4556 wrote to memory of 4416 4556 msedge.exe 87 PID 4556 wrote to memory of 4416 4556 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\89565d6fd743ac72122439213065b521_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4556 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8ef2a46f8,0x7ff8ef2a4708,0x7ff8ef2a47182⤵PID:2840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2028,15236999488750974095,13651953703162661562,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2044 /prefetch:22⤵PID:5072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2028,15236999488750974095,13651953703162661562,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2148 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2028,15236999488750974095,13651953703162661562,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2864 /prefetch:82⤵PID:4416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,15236999488750974095,13651953703162661562,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:1848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,15236999488750974095,13651953703162661562,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:12⤵PID:2184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,15236999488750974095,13651953703162661562,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4676 /prefetch:12⤵PID:4872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,15236999488750974095,13651953703162661562,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5140 /prefetch:12⤵PID:704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2028,15236999488750974095,13651953703162661562,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5040 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3212
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3468
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3588
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ecf7ca53c80b5245e35839009d12f866
SHA1a7af77cf31d410708ebd35a232a80bddfb0615bb
SHA256882a513b71b26210ff251769b82b2c5d59a932f96d9ce606ca2fab6530a13687
SHA512706722bd22ce27d854036b1b16e6a3cdb36284b66edc76238a79c2e11cee7d1307b121c898ad832eb1af73e4f08d991d64dc0bff529896ffb4ebe9b3dc381696
-
Filesize
152B
MD54dd2754d1bea40445984d65abee82b21
SHA14b6a5658bae9a784a370a115fbb4a12e92bd3390
SHA256183b8e82a0deaa83d04736553671cedb738adc909f483b3c5f822a0e6be7477d
SHA51292d44ee372ad33f892b921efa6cabc78e91025e89f05a22830763217826fa98d51d55711f85c8970ac58abf9adc6c85cc40878032cd6d2589ab226cd099f99e1
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD5d1e943aad6ba2cc3ba03d9822cc219be
SHA10ad2209407f62df5d3bcf44b87f9e476007ff128
SHA256a8b1f541f6512be55f3daa972ebe13a7097738dbe3484983e4b362d94ef97cc7
SHA512f26726a4cec64c795982ef324d7e296d7ec7206f835c1fd28764871033260f2175b8d00a70254618bb87fcf1e6347bbb584419954a7aa11348515f5564d4f85a
-
Filesize
2KB
MD56a3cec61e423a1f4f8311e5bd1374623
SHA1495d0a50b9ccf6332b7c7832ea2a3ce675e7b7db
SHA2563b92ea1e71eac1524ecb67544cbbcb1e59e3f8c70049ea27e35110454a44ac03
SHA512ca812d5ed45947fcdb9b2bfcac7099477c884610444463c3c9e0e7b3cfb95b5632cd297205fb4f4d2279d1173a8442a1b792b5d8f4105ff937a4cde6c85994ce
-
Filesize
7KB
MD5b06e6e18100355bd65ba930d15ffcf0e
SHA1d183c86bd356e2575410c108177b345d398668e7
SHA256f79adfcb9cf69429f76532417fc3fbf04f10ded13aa4ed7aaa56cf8cbe33175d
SHA512a936042e960e61ddd5d4f71f7285dedf7a5da4f9b98f7bc6cdfd53b09eb14a7258fc336fe5c955098bd52bbb52e04a74ef7324e6174a1e8c6a23d6b1676d2572
-
Filesize
6KB
MD53b984f199c801ba40927e57ccd748435
SHA1f5d475396180018e13a4d77922fe6f74bc2c6d34
SHA2561820a2b107fb6058525994d628af2a906498051b0726e64e75b3ea20020d077a
SHA512dddc237b27c01ccf284f9f5eee08df9c4fc8084f862e3c75f6732b36a0a3d1e1b71841c59c330d9ffc94836676433722bb68fa4ebdc4486492c36c507623d247
-
Filesize
10KB
MD5207960356e3bf09c770c0496ebf14001
SHA121cd5d7eb61783d5a5128cb960cf56303e3b1b03
SHA2568b620f8e394d80e073da951704560652af74b6db106bd3c8543dd87a6ce55315
SHA5124d22bd026143e03d078d707abe4a1b25cb7eaf6063c203a593872a9043ccbf6548072c31a804cc6726a95d4ec9a7babafa57ec30a0058b5a622ed4ffb328eb7f