Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
17/08/2024, 03:21
Static task
static1
Behavioral task
behavioral1
Sample
a1042a8fa1cfd2696923261cbace4fa4_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a1042a8fa1cfd2696923261cbace4fa4_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
a1042a8fa1cfd2696923261cbace4fa4_JaffaCakes118.html
-
Size
22KB
-
MD5
a1042a8fa1cfd2696923261cbace4fa4
-
SHA1
7b39ae201163a26aae7887d14d2b2e0b1dc111d8
-
SHA256
4310f648921b12ea02a4aefaca69020fda4f97fae57033333d2e6dd08250c5ff
-
SHA512
2c9b009ccaeb740cfd1e7ed6eed805e78d350b3aad591632133ed27e41fb3c059ea55d42c71a6f3223428b800e2b397262a32e72f583bea087213ac17b6a6354
-
SSDEEP
384:4+QfPFd9QZBC7mOdM0WOKfpC5IgSnbmFe7Ac8V6TSHAtPd:Zcd9QZBC7mOdM0WpC5I9nC4mWPd
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 5108 msedge.exe 5108 msedge.exe 1512 msedge.exe 1512 msedge.exe 4356 identity_helper.exe 4356 identity_helper.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1512 wrote to memory of 2516 1512 msedge.exe 86 PID 1512 wrote to memory of 2516 1512 msedge.exe 86 PID 1512 wrote to memory of 1912 1512 msedge.exe 87 PID 1512 wrote to memory of 1912 1512 msedge.exe 87 PID 1512 wrote to memory of 1912 1512 msedge.exe 87 PID 1512 wrote to memory of 1912 1512 msedge.exe 87 PID 1512 wrote to memory of 1912 1512 msedge.exe 87 PID 1512 wrote to memory of 1912 1512 msedge.exe 87 PID 1512 wrote to memory of 1912 1512 msedge.exe 87 PID 1512 wrote to memory of 1912 1512 msedge.exe 87 PID 1512 wrote to memory of 1912 1512 msedge.exe 87 PID 1512 wrote to memory of 1912 1512 msedge.exe 87 PID 1512 wrote to memory of 1912 1512 msedge.exe 87 PID 1512 wrote to memory of 1912 1512 msedge.exe 87 PID 1512 wrote to memory of 1912 1512 msedge.exe 87 PID 1512 wrote to memory of 1912 1512 msedge.exe 87 PID 1512 wrote to memory of 1912 1512 msedge.exe 87 PID 1512 wrote to memory of 1912 1512 msedge.exe 87 PID 1512 wrote to memory of 1912 1512 msedge.exe 87 PID 1512 wrote to memory of 1912 1512 msedge.exe 87 PID 1512 wrote to memory of 1912 1512 msedge.exe 87 PID 1512 wrote to memory of 1912 1512 msedge.exe 87 PID 1512 wrote to memory of 1912 1512 msedge.exe 87 PID 1512 wrote to memory of 1912 1512 msedge.exe 87 PID 1512 wrote to memory of 1912 1512 msedge.exe 87 PID 1512 wrote to memory of 1912 1512 msedge.exe 87 PID 1512 wrote to memory of 1912 1512 msedge.exe 87 PID 1512 wrote to memory of 1912 1512 msedge.exe 87 PID 1512 wrote to memory of 1912 1512 msedge.exe 87 PID 1512 wrote to memory of 1912 1512 msedge.exe 87 PID 1512 wrote to memory of 1912 1512 msedge.exe 87 PID 1512 wrote to memory of 1912 1512 msedge.exe 87 PID 1512 wrote to memory of 1912 1512 msedge.exe 87 PID 1512 wrote to memory of 1912 1512 msedge.exe 87 PID 1512 wrote to memory of 1912 1512 msedge.exe 87 PID 1512 wrote to memory of 1912 1512 msedge.exe 87 PID 1512 wrote to memory of 1912 1512 msedge.exe 87 PID 1512 wrote to memory of 1912 1512 msedge.exe 87 PID 1512 wrote to memory of 1912 1512 msedge.exe 87 PID 1512 wrote to memory of 1912 1512 msedge.exe 87 PID 1512 wrote to memory of 1912 1512 msedge.exe 87 PID 1512 wrote to memory of 1912 1512 msedge.exe 87 PID 1512 wrote to memory of 5108 1512 msedge.exe 88 PID 1512 wrote to memory of 5108 1512 msedge.exe 88 PID 1512 wrote to memory of 4588 1512 msedge.exe 89 PID 1512 wrote to memory of 4588 1512 msedge.exe 89 PID 1512 wrote to memory of 4588 1512 msedge.exe 89 PID 1512 wrote to memory of 4588 1512 msedge.exe 89 PID 1512 wrote to memory of 4588 1512 msedge.exe 89 PID 1512 wrote to memory of 4588 1512 msedge.exe 89 PID 1512 wrote to memory of 4588 1512 msedge.exe 89 PID 1512 wrote to memory of 4588 1512 msedge.exe 89 PID 1512 wrote to memory of 4588 1512 msedge.exe 89 PID 1512 wrote to memory of 4588 1512 msedge.exe 89 PID 1512 wrote to memory of 4588 1512 msedge.exe 89 PID 1512 wrote to memory of 4588 1512 msedge.exe 89 PID 1512 wrote to memory of 4588 1512 msedge.exe 89 PID 1512 wrote to memory of 4588 1512 msedge.exe 89 PID 1512 wrote to memory of 4588 1512 msedge.exe 89 PID 1512 wrote to memory of 4588 1512 msedge.exe 89 PID 1512 wrote to memory of 4588 1512 msedge.exe 89 PID 1512 wrote to memory of 4588 1512 msedge.exe 89 PID 1512 wrote to memory of 4588 1512 msedge.exe 89 PID 1512 wrote to memory of 4588 1512 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\a1042a8fa1cfd2696923261cbace4fa4_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9e39c46f8,0x7ff9e39c4708,0x7ff9e39c47182⤵PID:2516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,11547056275718378228,403759663289976368,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵PID:1912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2060,11547056275718378228,403759663289976368,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2060,11547056275718378228,403759663289976368,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2448 /prefetch:82⤵PID:4588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,11547056275718378228,403759663289976368,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:4256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,11547056275718378228,403759663289976368,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:5024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,11547056275718378228,403759663289976368,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4632 /prefetch:12⤵PID:3736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,11547056275718378228,403759663289976368,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4872 /prefetch:12⤵PID:392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,11547056275718378228,403759663289976368,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5156 /prefetch:12⤵PID:4732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,11547056275718378228,403759663289976368,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5492 /prefetch:82⤵PID:4060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,11547056275718378228,403759663289976368,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5492 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,11547056275718378228,403759663289976368,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6112 /prefetch:12⤵PID:1732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,11547056275718378228,403759663289976368,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5412 /prefetch:12⤵PID:3524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,11547056275718378228,403759663289976368,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4104 /prefetch:12⤵PID:5280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,11547056275718378228,403759663289976368,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5800 /prefetch:12⤵PID:5288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,11547056275718378228,403759663289976368,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2156 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3132
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4856
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:872
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD553bc70ecb115bdbabe67620c416fe9b3
SHA1af66ec51a13a59639eaf54d62ff3b4f092bb2fc1
SHA256b36cad5c1f7bc7d07c7eaa2f3cad2959ddb5447d4d3adcb46eb6a99808e22771
SHA512cad44933b94e17908c0eb8ac5feeb53d03a7720d97e7ccc8724a1ed3021a5bece09e1f9f3cec56ce0739176ebbbeb20729e650f8bca04e5060c986b75d8e4921
-
Filesize
152B
MD5e765f3d75e6b0e4a7119c8b14d47d8da
SHA1cc9f7c7826c2e1a129e7d98884926076c3714fc0
SHA256986443556d3878258b710d9d9efbf4f25f0d764c3f83dc54217f2b12a6eccd89
SHA512a1872a849f27da78ebe9adb9beb260cb49ed5f4ca2d403f23379112bdfcd2482446a6708188100496e45db1517cdb43aba8bb93a75e605713c3f97cd716b1079
-
Filesize
209KB
MD53e552d017d45f8fd93b94cfc86f842f2
SHA1dbeebe83854328e2575ff67259e3fb6704b17a47
SHA25627d9c4613df7a3c04da0b79c13217aa69992b441acb7e44bf2a7578ca87d97d6
SHA512e616436f2f15615429c7c5c37de3990c3e86c5e1da7d75a0f524fc458b75d44a5be1a3648a628d63e1cf8aa062e08b538f2f2bc9c6a0b42157beb24f82c571d9
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize504B
MD57e4ebea3b8e52b8134ab870e30736861
SHA18527c6626fd92dfa6331e34830eed904bba29ebb
SHA25685fe82da25de5cd8ec3f1144be9b04b936ebda7a8dada844ba5394e1ed784b31
SHA512b2859b1bf375620251152061ff45d12e7ae27a3d542e1b28fac68133568da368dcdb44e6ec6d295d4b5db08045850199cea24930b1e416b404933d933ca87e3f
-
Filesize
1KB
MD512029b64061a5bb9f196f9c3f979ae23
SHA1f9fc16775dcdc54788d844106f3b4b6c21e0c718
SHA256f34c92c5bd8c55f84a5988132ff1f37e52e97f442fb050e33b58c6ebc169cddf
SHA512372c1cd5f1d50477ae710fcdb0adb2d74f95780cd3e69e3d17ae741ad6433b05443d45919214b442a053be64e6702e9c6cd4c92d19a6ac9fe8df8fc8e41455f5
-
Filesize
6KB
MD5f2cc1acf570624e5bcfe2ee01184e8ae
SHA1507f83ea53b6bc98040807b8f00196cde5324d4a
SHA256cb511d23212da67f86fc84bb742366573535f5b89454b8e6d9e910a539fc5d42
SHA5122e7c1870d12f5289a49e1a6b1ac707f556d0ee3c318f6091ae1e0d5be5d221408e8c4242a803690027bf2b4cc69c7323b54cc832ac358e75c2878458eab33e50
-
Filesize
5KB
MD5ae82a52f22e1d0f4e158154ad9684fe7
SHA1ee4f230f5dcca448a0b74793a06694168f73942f
SHA2568c5006402e62f5e78e61f46c7a5e23cb5483706b0c6e6450f5c96528068348bb
SHA512ff70e429efa109eb33dd09533d3fe69b73688f649ad8cd188bab1cc55b9f0813f04d25f7e2684425562937b20a5999899a2aaf23f7ddcd0a3c62225acef15e35
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD58aacc0dd3a3c0b72c7137bc90b300556
SHA1e232142e70d9f00c53938bdedfdaf23a4c02c491
SHA2562144894adc47028c7a9073580defc4998d304e2fa993ecd92dd4f82f2116d84a
SHA5128be954749829ca7a3f7ba7165662981709ee101c0d3cbbbe5f207103a681ebceccbe083d70d737bb144a81119a3aa08350691a76f1fee276163a26886c705b9a