Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14/08/2024, 15:01
Static task
static1
Behavioral task
behavioral1
Sample
969345c26ca4ffa828e6f6d858b7f092_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
969345c26ca4ffa828e6f6d858b7f092_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
969345c26ca4ffa828e6f6d858b7f092_JaffaCakes118.html
-
Size
183KB
-
MD5
969345c26ca4ffa828e6f6d858b7f092
-
SHA1
e69d75d509e1d05978f7040fc23c84d7be341d5c
-
SHA256
b512d2e27124cbff6350f33abe2f8505caf447fd688ed9073617ba371fca0d63
-
SHA512
f467c6078d1fe41f405ac2831437785f681a695a4451b8ed3f74282cbc37cfa332c3f5a625029a9cec79bc34aaa81f714fd1fc9981a2b6b7d09ee6ed648964c4
-
SSDEEP
1536:p6M3SambmXKj1uG3hwcOB6ndvPaFChHdlTbJcTNbUfW9ZRrpaGEY+3HFbB0m7oOD:p6MNmiG3VOB6ndHCbl3QTHzd0K
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4652 msedge.exe 4652 msedge.exe 3884 msedge.exe 3884 msedge.exe 3876 identity_helper.exe 3876 identity_helper.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3884 wrote to memory of 3204 3884 msedge.exe 84 PID 3884 wrote to memory of 3204 3884 msedge.exe 84 PID 3884 wrote to memory of 3736 3884 msedge.exe 85 PID 3884 wrote to memory of 3736 3884 msedge.exe 85 PID 3884 wrote to memory of 3736 3884 msedge.exe 85 PID 3884 wrote to memory of 3736 3884 msedge.exe 85 PID 3884 wrote to memory of 3736 3884 msedge.exe 85 PID 3884 wrote to memory of 3736 3884 msedge.exe 85 PID 3884 wrote to memory of 3736 3884 msedge.exe 85 PID 3884 wrote to memory of 3736 3884 msedge.exe 85 PID 3884 wrote to memory of 3736 3884 msedge.exe 85 PID 3884 wrote to memory of 3736 3884 msedge.exe 85 PID 3884 wrote to memory of 3736 3884 msedge.exe 85 PID 3884 wrote to memory of 3736 3884 msedge.exe 85 PID 3884 wrote to memory of 3736 3884 msedge.exe 85 PID 3884 wrote to memory of 3736 3884 msedge.exe 85 PID 3884 wrote to memory of 3736 3884 msedge.exe 85 PID 3884 wrote to memory of 3736 3884 msedge.exe 85 PID 3884 wrote to memory of 3736 3884 msedge.exe 85 PID 3884 wrote to memory of 3736 3884 msedge.exe 85 PID 3884 wrote to memory of 3736 3884 msedge.exe 85 PID 3884 wrote to memory of 3736 3884 msedge.exe 85 PID 3884 wrote to memory of 3736 3884 msedge.exe 85 PID 3884 wrote to memory of 3736 3884 msedge.exe 85 PID 3884 wrote to memory of 3736 3884 msedge.exe 85 PID 3884 wrote to memory of 3736 3884 msedge.exe 85 PID 3884 wrote to memory of 3736 3884 msedge.exe 85 PID 3884 wrote to memory of 3736 3884 msedge.exe 85 PID 3884 wrote to memory of 3736 3884 msedge.exe 85 PID 3884 wrote to memory of 3736 3884 msedge.exe 85 PID 3884 wrote to memory of 3736 3884 msedge.exe 85 PID 3884 wrote to memory of 3736 3884 msedge.exe 85 PID 3884 wrote to memory of 3736 3884 msedge.exe 85 PID 3884 wrote to memory of 3736 3884 msedge.exe 85 PID 3884 wrote to memory of 3736 3884 msedge.exe 85 PID 3884 wrote to memory of 3736 3884 msedge.exe 85 PID 3884 wrote to memory of 3736 3884 msedge.exe 85 PID 3884 wrote to memory of 3736 3884 msedge.exe 85 PID 3884 wrote to memory of 3736 3884 msedge.exe 85 PID 3884 wrote to memory of 3736 3884 msedge.exe 85 PID 3884 wrote to memory of 3736 3884 msedge.exe 85 PID 3884 wrote to memory of 3736 3884 msedge.exe 85 PID 3884 wrote to memory of 4652 3884 msedge.exe 86 PID 3884 wrote to memory of 4652 3884 msedge.exe 86 PID 3884 wrote to memory of 3624 3884 msedge.exe 87 PID 3884 wrote to memory of 3624 3884 msedge.exe 87 PID 3884 wrote to memory of 3624 3884 msedge.exe 87 PID 3884 wrote to memory of 3624 3884 msedge.exe 87 PID 3884 wrote to memory of 3624 3884 msedge.exe 87 PID 3884 wrote to memory of 3624 3884 msedge.exe 87 PID 3884 wrote to memory of 3624 3884 msedge.exe 87 PID 3884 wrote to memory of 3624 3884 msedge.exe 87 PID 3884 wrote to memory of 3624 3884 msedge.exe 87 PID 3884 wrote to memory of 3624 3884 msedge.exe 87 PID 3884 wrote to memory of 3624 3884 msedge.exe 87 PID 3884 wrote to memory of 3624 3884 msedge.exe 87 PID 3884 wrote to memory of 3624 3884 msedge.exe 87 PID 3884 wrote to memory of 3624 3884 msedge.exe 87 PID 3884 wrote to memory of 3624 3884 msedge.exe 87 PID 3884 wrote to memory of 3624 3884 msedge.exe 87 PID 3884 wrote to memory of 3624 3884 msedge.exe 87 PID 3884 wrote to memory of 3624 3884 msedge.exe 87 PID 3884 wrote to memory of 3624 3884 msedge.exe 87 PID 3884 wrote to memory of 3624 3884 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\969345c26ca4ffa828e6f6d858b7f092_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3884 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff914d546f8,0x7ff914d54708,0x7ff914d547182⤵PID:3204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2020,8122217092063371073,3044775121021261123,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1992 /prefetch:22⤵PID:3736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2020,8122217092063371073,3044775121021261123,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2280 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2020,8122217092063371073,3044775121021261123,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2820 /prefetch:82⤵PID:3624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,8122217092063371073,3044775121021261123,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:4456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,8122217092063371073,3044775121021261123,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:2244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,8122217092063371073,3044775121021261123,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2124 /prefetch:12⤵PID:3956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2020,8122217092063371073,3044775121021261123,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5948 /prefetch:82⤵PID:3640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2020,8122217092063371073,3044775121021261123,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5948 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,8122217092063371073,3044775121021261123,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5476 /prefetch:12⤵PID:4816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,8122217092063371073,3044775121021261123,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3952 /prefetch:12⤵PID:4292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,8122217092063371073,3044775121021261123,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4868 /prefetch:12⤵PID:1292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,8122217092063371073,3044775121021261123,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4696 /prefetch:12⤵PID:4872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2020,8122217092063371073,3044775121021261123,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5596 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:884
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4408
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3888
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD553bc70ecb115bdbabe67620c416fe9b3
SHA1af66ec51a13a59639eaf54d62ff3b4f092bb2fc1
SHA256b36cad5c1f7bc7d07c7eaa2f3cad2959ddb5447d4d3adcb46eb6a99808e22771
SHA512cad44933b94e17908c0eb8ac5feeb53d03a7720d97e7ccc8724a1ed3021a5bece09e1f9f3cec56ce0739176ebbbeb20729e650f8bca04e5060c986b75d8e4921
-
Filesize
152B
MD5e765f3d75e6b0e4a7119c8b14d47d8da
SHA1cc9f7c7826c2e1a129e7d98884926076c3714fc0
SHA256986443556d3878258b710d9d9efbf4f25f0d764c3f83dc54217f2b12a6eccd89
SHA512a1872a849f27da78ebe9adb9beb260cb49ed5f4ca2d403f23379112bdfcd2482446a6708188100496e45db1517cdb43aba8bb93a75e605713c3f97cd716b1079
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD5bfedba7e33856f513c9aebd6e11f264f
SHA162188c3b4106c6a9e5bceb5ffb2a746bb22d46e7
SHA256747f79aa40381cf8d3f86d86adc70d2afb304c134498038889e62bfa5646ebc8
SHA51285f44bb1301feb63c4d00f8e00fe614a4a47540ff26b97aac3d19d2758e49af5114f94cb559458706e138bc494207c506567d433e72a653b44eb0d3cd1fbfd34
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
1KB
MD55594956723a9f42fac718284e2d0f78d
SHA134f22fdbb9f3a8819deca806cfeb5641bddf5a21
SHA256cba8487c9c2b97562dc740cf0b930e79e948016ed35bf9095cf32b8b6cd5e62c
SHA512d2e0c77e99fd95cc65d7f98817966c11dea7354b52b37478dfc1ca3c8d86ecfafda7ad107ec0916c522052e58154494a3a8098b1fe6807ed808c30e009e3cb4a
-
Filesize
1KB
MD56fbd8c6f6e191dafa00626ef32b3ed02
SHA127273a45cb85d63a45344e99964b90f80f0acf83
SHA256dbee8e003cfc53455aca52b42d48a8f0974e133ea63a1c005e063e40b9e632eb
SHA5120c149ea31be79d7a4b7071c083f1621f7f3a0173a0297b62de248f6d5963026604d0a9f35cffd58c77f2575090b6a47ac6a808dc4922749a8c7adae5b0b2b64b
-
Filesize
6KB
MD581b82fe8a8c0be650ea38cfbf1fb8362
SHA1d8d30d3c94350b49050d96467041cbf2382cf3a4
SHA256554e4a5c5196fc27c6e75127ead0ea8620a33892f42dd759cc3242ffbbf31c61
SHA5124a02d181cd5ec1d265a4f632b0cc3fc0c16078190a1062e64e61b07194a30191cda8f3751a30e152c66ee506588817086974b0ecd6899a391635aac5cdbe59e5
-
Filesize
6KB
MD5c025f54dca34c35af47d26385072ca05
SHA1f0dc56792191b5bdf545eab4d61606239d9c8673
SHA256d6664a8f4bf005a948891fe20eac272eb585b0542bb7230af05cc76571fc6f04
SHA512d112f36ebe0775d320615764530dc838b1c888f2922e12dc9f6022a728598abfefaaba6bcd684b7ea3a8bf4652228847dc4f70c4a55112577b77d30c618d2b59
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\a2aa6a78-9598-4c49-b9d2-71aff2ff4c86.tmp
Filesize6KB
MD5045a8ae213093d34f54102c0401458d5
SHA19057ff88f1df1a60d303b2194b572d940a039521
SHA2565f2f358a793bb7ef93bf2e14941f9481268b3c9282db30945f17147b91bcc196
SHA512e738a1421c7ece366c66dc0813ffe371c426b2c15284ea268b526469d8b8af80351a4d4a1328e4d9513f7faad6a3153a702270f8757d18d5bf677fe74a6d7774
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD50a20fc5c6f5b4a33494bee963450a8e8
SHA103498ba6ba266b8983eaf93938a7c6881db423ee
SHA256f35296254f0ca600a145803aa23fec7597ccd65865f2d88d52f50bfe029f91c3
SHA5123bb6e755360a19c12203c2a0fa865077f87dbbb61416009149ec857c7580a1669e026cf0ef3b3244c8ac9f86e227f084e2164c638c3a3e2fa2614a838cd31fbc