Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14/08/2024, 13:57
Static task
static1
Behavioral task
behavioral1
Sample
96608c957e53b7460ffc47bcecb18da3_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
96608c957e53b7460ffc47bcecb18da3_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
96608c957e53b7460ffc47bcecb18da3_JaffaCakes118.html
-
Size
53KB
-
MD5
96608c957e53b7460ffc47bcecb18da3
-
SHA1
537a4e5feca0aae596f5b74a78836a6d8e20a07d
-
SHA256
54a0cce5cb8713b309c0190a4e2581434be081d88905c0ba4a1e0feea55a155f
-
SHA512
571d53893ec0a0e3cccbba5d6fa231dea90b92a6afd98fdf1fec1de5a933a4f8cef1107c0839570d5f3ebcc2de5e821cafe72d9dd24a4f11e4944e75276c0f77
-
SSDEEP
1536:6I2lMSpnB+dJfuwztWOCVuTkNAqwVK7gBEEoTz7EA9omcL2RcNX:QlMS0joTnEbmcL2RcNX
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1744 msedge.exe 1744 msedge.exe 4212 msedge.exe 4212 msedge.exe 4932 identity_helper.exe 4932 identity_helper.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe 4212 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4212 wrote to memory of 1300 4212 msedge.exe 84 PID 4212 wrote to memory of 1300 4212 msedge.exe 84 PID 4212 wrote to memory of 1252 4212 msedge.exe 85 PID 4212 wrote to memory of 1252 4212 msedge.exe 85 PID 4212 wrote to memory of 1252 4212 msedge.exe 85 PID 4212 wrote to memory of 1252 4212 msedge.exe 85 PID 4212 wrote to memory of 1252 4212 msedge.exe 85 PID 4212 wrote to memory of 1252 4212 msedge.exe 85 PID 4212 wrote to memory of 1252 4212 msedge.exe 85 PID 4212 wrote to memory of 1252 4212 msedge.exe 85 PID 4212 wrote to memory of 1252 4212 msedge.exe 85 PID 4212 wrote to memory of 1252 4212 msedge.exe 85 PID 4212 wrote to memory of 1252 4212 msedge.exe 85 PID 4212 wrote to memory of 1252 4212 msedge.exe 85 PID 4212 wrote to memory of 1252 4212 msedge.exe 85 PID 4212 wrote to memory of 1252 4212 msedge.exe 85 PID 4212 wrote to memory of 1252 4212 msedge.exe 85 PID 4212 wrote to memory of 1252 4212 msedge.exe 85 PID 4212 wrote to memory of 1252 4212 msedge.exe 85 PID 4212 wrote to memory of 1252 4212 msedge.exe 85 PID 4212 wrote to memory of 1252 4212 msedge.exe 85 PID 4212 wrote to memory of 1252 4212 msedge.exe 85 PID 4212 wrote to memory of 1252 4212 msedge.exe 85 PID 4212 wrote to memory of 1252 4212 msedge.exe 85 PID 4212 wrote to memory of 1252 4212 msedge.exe 85 PID 4212 wrote to memory of 1252 4212 msedge.exe 85 PID 4212 wrote to memory of 1252 4212 msedge.exe 85 PID 4212 wrote to memory of 1252 4212 msedge.exe 85 PID 4212 wrote to memory of 1252 4212 msedge.exe 85 PID 4212 wrote to memory of 1252 4212 msedge.exe 85 PID 4212 wrote to memory of 1252 4212 msedge.exe 85 PID 4212 wrote to memory of 1252 4212 msedge.exe 85 PID 4212 wrote to memory of 1252 4212 msedge.exe 85 PID 4212 wrote to memory of 1252 4212 msedge.exe 85 PID 4212 wrote to memory of 1252 4212 msedge.exe 85 PID 4212 wrote to memory of 1252 4212 msedge.exe 85 PID 4212 wrote to memory of 1252 4212 msedge.exe 85 PID 4212 wrote to memory of 1252 4212 msedge.exe 85 PID 4212 wrote to memory of 1252 4212 msedge.exe 85 PID 4212 wrote to memory of 1252 4212 msedge.exe 85 PID 4212 wrote to memory of 1252 4212 msedge.exe 85 PID 4212 wrote to memory of 1252 4212 msedge.exe 85 PID 4212 wrote to memory of 1744 4212 msedge.exe 86 PID 4212 wrote to memory of 1744 4212 msedge.exe 86 PID 4212 wrote to memory of 1468 4212 msedge.exe 87 PID 4212 wrote to memory of 1468 4212 msedge.exe 87 PID 4212 wrote to memory of 1468 4212 msedge.exe 87 PID 4212 wrote to memory of 1468 4212 msedge.exe 87 PID 4212 wrote to memory of 1468 4212 msedge.exe 87 PID 4212 wrote to memory of 1468 4212 msedge.exe 87 PID 4212 wrote to memory of 1468 4212 msedge.exe 87 PID 4212 wrote to memory of 1468 4212 msedge.exe 87 PID 4212 wrote to memory of 1468 4212 msedge.exe 87 PID 4212 wrote to memory of 1468 4212 msedge.exe 87 PID 4212 wrote to memory of 1468 4212 msedge.exe 87 PID 4212 wrote to memory of 1468 4212 msedge.exe 87 PID 4212 wrote to memory of 1468 4212 msedge.exe 87 PID 4212 wrote to memory of 1468 4212 msedge.exe 87 PID 4212 wrote to memory of 1468 4212 msedge.exe 87 PID 4212 wrote to memory of 1468 4212 msedge.exe 87 PID 4212 wrote to memory of 1468 4212 msedge.exe 87 PID 4212 wrote to memory of 1468 4212 msedge.exe 87 PID 4212 wrote to memory of 1468 4212 msedge.exe 87 PID 4212 wrote to memory of 1468 4212 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\96608c957e53b7460ffc47bcecb18da3_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4212 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd2a9f46f8,0x7ffd2a9f4708,0x7ffd2a9f47182⤵PID:1300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,13228548144025751829,16929471561896924710,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2156 /prefetch:22⤵PID:1252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2140,13228548144025751829,16929471561896924710,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2264 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2140,13228548144025751829,16929471561896924710,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2704 /prefetch:82⤵PID:1468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,13228548144025751829,16929471561896924710,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:3432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,13228548144025751829,16929471561896924710,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:3964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,13228548144025751829,16929471561896924710,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1264 /prefetch:12⤵PID:4344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,13228548144025751829,16929471561896924710,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5864 /prefetch:82⤵PID:496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,13228548144025751829,16929471561896924710,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5864 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,13228548144025751829,16929471561896924710,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5140 /prefetch:12⤵PID:3708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,13228548144025751829,16929471561896924710,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4244 /prefetch:12⤵PID:944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,13228548144025751829,16929471561896924710,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6108 /prefetch:12⤵PID:3360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,13228548144025751829,16929471561896924710,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5772 /prefetch:12⤵PID:2772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,13228548144025751829,16929471561896924710,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4876 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4964
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4512
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2056
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f9664c896e19205022c094d725f820b6
SHA1f8f1baf648df755ba64b412d512446baf88c0184
SHA2567121d84202a850791c2320385eb59eda4d697310dc51b1fcd4d51264aba2434e
SHA5123fa5d2c68a9e70e4a25eaac2095171d87c741eec2624c314c6a56f4fa390d6319633bf4c48b1a4af7e9a0451f346beced9693da88cfc7bcba8dfe209cbd1b3ae
-
Filesize
152B
MD5847d47008dbea51cb1732d54861ba9c9
SHA1f2099242027dccb88d6f05760b57f7c89d926c0d
SHA25610292fa05d896a2952c1d602a72d761d34bc776b44d6a7df87e49b5b613a8ac1
SHA512bd1526aa1cc1c016d95dfcc53a78b45b09dde4ce67357fc275ab835dbe1bb5b053ca386239f50cde95ad243a9c1bbb12f7505818577589beecc6084f7b94e83f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize192B
MD5af4158b75980d6177d9e15aedcc02a92
SHA11835f7cb12508d69e7c4d92b04516b3ec8c8891d
SHA2563bc7cb1d994d9aea33de9f18efadee0292d55ec3c7c43f33426b85a270869379
SHA5124a7fc6c5117be04ad63de0fa1af4e6c95e30b126928800caed58e92dddac90747b73f62386943158598608427a599bec82e8e6562a9a714aab5f8d6afd2c494d
-
Filesize
262B
MD58c5bd48250406a0ca7eb2b3c75adb820
SHA1ffeacf3a1eb1e0549219b6428ec4af8c5054e060
SHA256a13323db9208c5d8edff0eab641bc5b9ef44044a8b4773b7e026661388089e1b
SHA512b58eebc062b32b6c526160393b9f8758024d09a9b14c0583f2252effb82bff52b83b48efdd10ff814c04bb417e93eedf5bb27d14c224681084ec64b27ae40f00
-
Filesize
6KB
MD57c6a1060ecf8735360caea40f55c4fa3
SHA1e07ab7b63009a4170d01186a8d243a367f119d5d
SHA256e469f3ccf83a1f4e595977d7625c77969b3caa6c3bbbed3612e1d2718bf04b9f
SHA512b94fd382d3453ab024d6e03ef9ee5be83381b698b0a7c7e70bcc19ca6522560eb5a2eb03eb123ed74a0a85029dc05a49c3c4297022ddde2af77b1a8216d1a081
-
Filesize
6KB
MD5a981f71f1a1fa9753cde74d149692461
SHA1a09e7f97a565a56cd636eff8b3c8454654f60574
SHA2565e82dbe4b381c64eadd8496339c74b510160b0578564f6fad81c901cb4f1c957
SHA512473ae130e8160f6ed770b1c8e992d73dc0ee38a166b29c7a1eee43412c4e87482d24ce76be00188c62b9e811ae883628704b984cd36b9f90de1cc49cbe26c871
-
Filesize
6KB
MD5af8faf4d5a94718ba575112279f98118
SHA1333e0643a689ae7fc9c50d271cfc0e7e8678946e
SHA256cecdc34b30488230c4e4ccc7eab9a8590b8b182e12c0c766973bdfa8dd9675ea
SHA5121dcf965f550b2dbdaa86859fed0bd747904f4b0ce4c45eadb1890619711d9956adb2c094354d99ce0a1088a50e67b93051e058922e1ee54700c4c77d3f5a7f45
-
Filesize
371B
MD5a101c4b28b7a4e3ca65f1eb30586d552
SHA16f79b43cb05a97d316311ed729088ec6b7c0be20
SHA25641d61f68115dff36f5426012d6ec777f7e9122e5c7accb5b328778c0141b9e5b
SHA512fbbda9529d661e3d8cc5968e05e6a1dafcdae423559cf80871365c5b48108a9ea5e6fdf51debf6bcab6de6e48d87f92c562cdee3145ddc73d4a178383ed6b1b2
-
Filesize
371B
MD595246b37266c0d0b10c152bfc3e077d7
SHA199bf6766224c0044da991d7beb788eaa62eaf392
SHA2569c0171329c18ea220d6bcb944e7b6fc681c1812c1ae2c45b58a468564fe20614
SHA5122bd28da8f6ab235c61c3044671ae33463768b50f1a5045ead7774bd43aa2fc8e026fc270a847a582040a742ba78d37d0c3f2d29a1d34403686dfecb7a9efd93d
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD5d276fcc332fbda073f9adae87c772dee
SHA14f2315c59f47653592fb74ced560c60f430f5fee
SHA25650b98c8acb2b8b4974769f749cd12955bb0d491cf1fa03678cd5bfd5fe33b884
SHA5125d1df4cc00ac2a5a6b40b3b1da73f44024f473bb31502dea55218eeaa21d329303567d5fe98d47e0b47899408130b5069811a241bd3efb4277560818975d5795