Analysis
-
max time kernel
145s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
17-08-2024 05:22
Static task
static1
Behavioral task
behavioral1
Sample
a15674ff7800199fd2ffd7f16efdea60_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a15674ff7800199fd2ffd7f16efdea60_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
a15674ff7800199fd2ffd7f16efdea60_JaffaCakes118.html
-
Size
67KB
-
MD5
a15674ff7800199fd2ffd7f16efdea60
-
SHA1
15cd48cb96bca5cfe492752b2354be8a83aa011d
-
SHA256
b3f558ffe3b89d7f96bae7b68babd51743824d7df21fbc5207f931ff6911f307
-
SHA512
e0b3e16e711ac8c12ec37a0d38e5cc5509579973c6f9633182cf3e223fb164b7cfa2b8e1147c503fc971fcd517bdec17d65d4100a8956fa6842f62506e93c35c
-
SSDEEP
1536:mR54gn2/CKI7n1IvpNnD9UutlsV9QndZPrOzAta1ddKMp23E77Y:PuxIvpNnD9UelY9Z7Y
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4048 msedge.exe 4048 msedge.exe 3244 msedge.exe 3244 msedge.exe 4320 msedge.exe 4320 msedge.exe 4320 msedge.exe 4320 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3244 wrote to memory of 3156 3244 msedge.exe 84 PID 3244 wrote to memory of 3156 3244 msedge.exe 84 PID 3244 wrote to memory of 3716 3244 msedge.exe 85 PID 3244 wrote to memory of 3716 3244 msedge.exe 85 PID 3244 wrote to memory of 3716 3244 msedge.exe 85 PID 3244 wrote to memory of 3716 3244 msedge.exe 85 PID 3244 wrote to memory of 3716 3244 msedge.exe 85 PID 3244 wrote to memory of 3716 3244 msedge.exe 85 PID 3244 wrote to memory of 3716 3244 msedge.exe 85 PID 3244 wrote to memory of 3716 3244 msedge.exe 85 PID 3244 wrote to memory of 3716 3244 msedge.exe 85 PID 3244 wrote to memory of 3716 3244 msedge.exe 85 PID 3244 wrote to memory of 3716 3244 msedge.exe 85 PID 3244 wrote to memory of 3716 3244 msedge.exe 85 PID 3244 wrote to memory of 3716 3244 msedge.exe 85 PID 3244 wrote to memory of 3716 3244 msedge.exe 85 PID 3244 wrote to memory of 3716 3244 msedge.exe 85 PID 3244 wrote to memory of 3716 3244 msedge.exe 85 PID 3244 wrote to memory of 3716 3244 msedge.exe 85 PID 3244 wrote to memory of 3716 3244 msedge.exe 85 PID 3244 wrote to memory of 3716 3244 msedge.exe 85 PID 3244 wrote to memory of 3716 3244 msedge.exe 85 PID 3244 wrote to memory of 3716 3244 msedge.exe 85 PID 3244 wrote to memory of 3716 3244 msedge.exe 85 PID 3244 wrote to memory of 3716 3244 msedge.exe 85 PID 3244 wrote to memory of 3716 3244 msedge.exe 85 PID 3244 wrote to memory of 3716 3244 msedge.exe 85 PID 3244 wrote to memory of 3716 3244 msedge.exe 85 PID 3244 wrote to memory of 3716 3244 msedge.exe 85 PID 3244 wrote to memory of 3716 3244 msedge.exe 85 PID 3244 wrote to memory of 3716 3244 msedge.exe 85 PID 3244 wrote to memory of 3716 3244 msedge.exe 85 PID 3244 wrote to memory of 3716 3244 msedge.exe 85 PID 3244 wrote to memory of 3716 3244 msedge.exe 85 PID 3244 wrote to memory of 3716 3244 msedge.exe 85 PID 3244 wrote to memory of 3716 3244 msedge.exe 85 PID 3244 wrote to memory of 3716 3244 msedge.exe 85 PID 3244 wrote to memory of 3716 3244 msedge.exe 85 PID 3244 wrote to memory of 3716 3244 msedge.exe 85 PID 3244 wrote to memory of 3716 3244 msedge.exe 85 PID 3244 wrote to memory of 3716 3244 msedge.exe 85 PID 3244 wrote to memory of 3716 3244 msedge.exe 85 PID 3244 wrote to memory of 4048 3244 msedge.exe 86 PID 3244 wrote to memory of 4048 3244 msedge.exe 86 PID 3244 wrote to memory of 3164 3244 msedge.exe 87 PID 3244 wrote to memory of 3164 3244 msedge.exe 87 PID 3244 wrote to memory of 3164 3244 msedge.exe 87 PID 3244 wrote to memory of 3164 3244 msedge.exe 87 PID 3244 wrote to memory of 3164 3244 msedge.exe 87 PID 3244 wrote to memory of 3164 3244 msedge.exe 87 PID 3244 wrote to memory of 3164 3244 msedge.exe 87 PID 3244 wrote to memory of 3164 3244 msedge.exe 87 PID 3244 wrote to memory of 3164 3244 msedge.exe 87 PID 3244 wrote to memory of 3164 3244 msedge.exe 87 PID 3244 wrote to memory of 3164 3244 msedge.exe 87 PID 3244 wrote to memory of 3164 3244 msedge.exe 87 PID 3244 wrote to memory of 3164 3244 msedge.exe 87 PID 3244 wrote to memory of 3164 3244 msedge.exe 87 PID 3244 wrote to memory of 3164 3244 msedge.exe 87 PID 3244 wrote to memory of 3164 3244 msedge.exe 87 PID 3244 wrote to memory of 3164 3244 msedge.exe 87 PID 3244 wrote to memory of 3164 3244 msedge.exe 87 PID 3244 wrote to memory of 3164 3244 msedge.exe 87 PID 3244 wrote to memory of 3164 3244 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\a15674ff7800199fd2ffd7f16efdea60_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3244 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8540646f8,0x7ff854064708,0x7ff8540647182⤵PID:3156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,5953337613408653481,8188293371194400135,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2144 /prefetch:22⤵PID:3716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2132,5953337613408653481,8188293371194400135,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2208 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2132,5953337613408653481,8188293371194400135,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2768 /prefetch:82⤵PID:3164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,5953337613408653481,8188293371194400135,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:3396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,5953337613408653481,8188293371194400135,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,5953337613408653481,8188293371194400135,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5136 /prefetch:12⤵PID:1068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,5953337613408653481,8188293371194400135,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5160 /prefetch:12⤵PID:3632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,5953337613408653481,8188293371194400135,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5652 /prefetch:12⤵PID:3028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,5953337613408653481,8188293371194400135,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1296 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4320
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1820
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4464
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD55f5d98defb608767d03f17ce93c82f61
SHA1f9594a21eebb5d0b378106710aa93c8bfeaaf500
SHA256f17bff1274d281249888e477c7c66ffacb5cb4249da1af79b465a816d473fda5
SHA5127a18003484bb8e843df8312c7f7b33594e33741d9b989eeec9675582db394870b649bc962849baa390c679dfd464e803b85967f27bd024d1dd10b49d990abc97
-
Filesize
152B
MD59e3fc58a8fb86c93d19e1500b873ef6f
SHA1c6aae5f4e26f5570db5e14bba8d5061867a33b56
SHA256828f4eacac1c40b790fd70dbb6fa6ba03dcc681171d9b2a6579626d27837b1c4
SHA512e5e245b56fa82075e060f468a3224cf2ef43f1b6d87f0351a2102d85c7c897e559be4caeaecfdc4059af29fdc674681b61229319dda95cb2ee649b2eb98d313e
-
Filesize
152B
MD527304926d60324abe74d7a4b571c35ea
SHA178b8f92fcaf4a09eaa786bbe33fd1b0222ef29c1
SHA2567039ad5c2b40f4d97c8c2269f4942be13436d739b2e1f8feb7a0c9f9fdb931de
SHA512f5b6181d3f432238c7365f64fc8a373299e23ba8178bcc419471916ef8b23e909787c7c0617ab22e4eb90909c02bd7b84f1386fbc61e2bdb5a0eb474175da4bd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD570c11460ea538d01ddbb82efd9f7f7c4
SHA17e08e0b232eff3975de2dec2836710a153727c33
SHA256effa27e16b5cfba13e14ca326810411062a7f5fdf47b2a99be9cdfa04d5dedc2
SHA512c701b23b990d76e2e878f673898d3881b61087455dc1613f725005e9edf806963214365a779fb7e8196b6970c36c34ce33378fc60ce2329cfca467cc504a4617
-
Filesize
614B
MD5e170acd91962fd9af1599afdd0ef2592
SHA1dc6e4af87d16bd237bbc340e136868e42f82961b
SHA2566f5b730e6e7273f856a15cd886bccc19f9460cc82953821370cb8ce886705dd7
SHA512975b571055d7a0feef16d45ffc8234168bbb3a3b410b76551e0682365d5ba2eb8b5847bcede4255772d56e3abfc9966ab797d8772aab12e3fe4f9cfb56e92e95
-
Filesize
5KB
MD5cdf7336106a783e90e20e13b78c576d9
SHA16ab5d33fd1d772964118feb4274852d42a8b33e8
SHA256f2336aa0fda7c2ef20994663ca37db4536632a17cc1689760c47aeb1ae5bdf0a
SHA51288f58882276d41b52a2d12de62c72928e5132d9375c2638aeefa5d57adb04cf698ea6d70fc4043bba577213ae963a7a6b9f6975f27274b632b24b0b623bf8790
-
Filesize
6KB
MD595332737315af5b030b26cbf4da24dd6
SHA102a76d54f96f519cc7f1801536100aac09f072fb
SHA2568d3089f7c21b125ae872f8ac80bb231ec2775d083ba282c2e8639d066d1faba6
SHA5129e734a18ef8dfd9eed201a89c9060447e5d8c42cfe0f873e82d5c7943f66190532817af71d6ce70f628462d9e5ab77901613fe985fa04e37ef462d3f56e3fceb
-
Filesize
6KB
MD58325589e6e8ac75ceaf086a20c188ec0
SHA1d33c5b2e1b6c2583e88c66b1fcfd2c2f0e096d07
SHA256e08d42b9957a1dc895df1ac1b131b3a2b553caa79dc13f84bb21a9f2defb4ece
SHA5129c6b46bb48ecdd87c9fde556ffc9e94729e4cd8fafe15aaffcb61c76e6cc0ee16a574245c7d19d4282489238c25c3834679ff9ecda4ab6b1dd3f145e7073406e