Analysis
-
max time kernel
145s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18/08/2024, 02:41
Static task
static1
Behavioral task
behavioral1
Sample
a512a9897cc39f8f36af3b4ad208d040_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a512a9897cc39f8f36af3b4ad208d040_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
a512a9897cc39f8f36af3b4ad208d040_JaffaCakes118.html
-
Size
69KB
-
MD5
a512a9897cc39f8f36af3b4ad208d040
-
SHA1
d00d1c47c0bcaff0db092e253bccabb93fc53bcd
-
SHA256
1c58d946d6d08060efe080b00d8116df6b2a81a59e002faa96dd6bed508b9050
-
SHA512
fec6a1b2fd23dd9f3bc6b082a3286c52e9412d168ccd5f1d16410302e3d6d1972d922b3acfcd0bccb7ae49b9d54e0d5f5ca0c0229cbd9c7720cec6e1530a2450
-
SSDEEP
768:Sp0hqGbIiP//mdvsYSgLj/DVWmTMYq8Dfr7Vq3t40MSxjfLD+PHgkyMrj3DZ+/VY:SUIk/3tnwO85NucB
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2236 msedge.exe 2236 msedge.exe 1860 msedge.exe 1860 msedge.exe 1472 identity_helper.exe 1472 identity_helper.exe 2384 msedge.exe 2384 msedge.exe 2384 msedge.exe 2384 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1860 wrote to memory of 3812 1860 msedge.exe 87 PID 1860 wrote to memory of 3812 1860 msedge.exe 87 PID 1860 wrote to memory of 3440 1860 msedge.exe 88 PID 1860 wrote to memory of 3440 1860 msedge.exe 88 PID 1860 wrote to memory of 3440 1860 msedge.exe 88 PID 1860 wrote to memory of 3440 1860 msedge.exe 88 PID 1860 wrote to memory of 3440 1860 msedge.exe 88 PID 1860 wrote to memory of 3440 1860 msedge.exe 88 PID 1860 wrote to memory of 3440 1860 msedge.exe 88 PID 1860 wrote to memory of 3440 1860 msedge.exe 88 PID 1860 wrote to memory of 3440 1860 msedge.exe 88 PID 1860 wrote to memory of 3440 1860 msedge.exe 88 PID 1860 wrote to memory of 3440 1860 msedge.exe 88 PID 1860 wrote to memory of 3440 1860 msedge.exe 88 PID 1860 wrote to memory of 3440 1860 msedge.exe 88 PID 1860 wrote to memory of 3440 1860 msedge.exe 88 PID 1860 wrote to memory of 3440 1860 msedge.exe 88 PID 1860 wrote to memory of 3440 1860 msedge.exe 88 PID 1860 wrote to memory of 3440 1860 msedge.exe 88 PID 1860 wrote to memory of 3440 1860 msedge.exe 88 PID 1860 wrote to memory of 3440 1860 msedge.exe 88 PID 1860 wrote to memory of 3440 1860 msedge.exe 88 PID 1860 wrote to memory of 3440 1860 msedge.exe 88 PID 1860 wrote to memory of 3440 1860 msedge.exe 88 PID 1860 wrote to memory of 3440 1860 msedge.exe 88 PID 1860 wrote to memory of 3440 1860 msedge.exe 88 PID 1860 wrote to memory of 3440 1860 msedge.exe 88 PID 1860 wrote to memory of 3440 1860 msedge.exe 88 PID 1860 wrote to memory of 3440 1860 msedge.exe 88 PID 1860 wrote to memory of 3440 1860 msedge.exe 88 PID 1860 wrote to memory of 3440 1860 msedge.exe 88 PID 1860 wrote to memory of 3440 1860 msedge.exe 88 PID 1860 wrote to memory of 3440 1860 msedge.exe 88 PID 1860 wrote to memory of 3440 1860 msedge.exe 88 PID 1860 wrote to memory of 3440 1860 msedge.exe 88 PID 1860 wrote to memory of 3440 1860 msedge.exe 88 PID 1860 wrote to memory of 3440 1860 msedge.exe 88 PID 1860 wrote to memory of 3440 1860 msedge.exe 88 PID 1860 wrote to memory of 3440 1860 msedge.exe 88 PID 1860 wrote to memory of 3440 1860 msedge.exe 88 PID 1860 wrote to memory of 3440 1860 msedge.exe 88 PID 1860 wrote to memory of 3440 1860 msedge.exe 88 PID 1860 wrote to memory of 2236 1860 msedge.exe 89 PID 1860 wrote to memory of 2236 1860 msedge.exe 89 PID 1860 wrote to memory of 1612 1860 msedge.exe 90 PID 1860 wrote to memory of 1612 1860 msedge.exe 90 PID 1860 wrote to memory of 1612 1860 msedge.exe 90 PID 1860 wrote to memory of 1612 1860 msedge.exe 90 PID 1860 wrote to memory of 1612 1860 msedge.exe 90 PID 1860 wrote to memory of 1612 1860 msedge.exe 90 PID 1860 wrote to memory of 1612 1860 msedge.exe 90 PID 1860 wrote to memory of 1612 1860 msedge.exe 90 PID 1860 wrote to memory of 1612 1860 msedge.exe 90 PID 1860 wrote to memory of 1612 1860 msedge.exe 90 PID 1860 wrote to memory of 1612 1860 msedge.exe 90 PID 1860 wrote to memory of 1612 1860 msedge.exe 90 PID 1860 wrote to memory of 1612 1860 msedge.exe 90 PID 1860 wrote to memory of 1612 1860 msedge.exe 90 PID 1860 wrote to memory of 1612 1860 msedge.exe 90 PID 1860 wrote to memory of 1612 1860 msedge.exe 90 PID 1860 wrote to memory of 1612 1860 msedge.exe 90 PID 1860 wrote to memory of 1612 1860 msedge.exe 90 PID 1860 wrote to memory of 1612 1860 msedge.exe 90 PID 1860 wrote to memory of 1612 1860 msedge.exe 90
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\a512a9897cc39f8f36af3b4ad208d040_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1860 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd15f846f8,0x7ffd15f84708,0x7ffd15f847182⤵PID:3812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2172,4347566768005000729,10862142668579979868,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2180 /prefetch:22⤵PID:3440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2172,4347566768005000729,10862142668579979868,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2232 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2172,4347566768005000729,10862142668579979868,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2804 /prefetch:82⤵PID:1612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,4347566768005000729,10862142668579979868,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:4312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,4347566768005000729,10862142668579979868,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:2716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,4347566768005000729,10862142668579979868,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5956 /prefetch:12⤵PID:3056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,4347566768005000729,10862142668579979868,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5828 /prefetch:12⤵PID:4884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,4347566768005000729,10862142668579979868,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5532 /prefetch:12⤵PID:3876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2172,4347566768005000729,10862142668579979868,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5284 /prefetch:82⤵PID:4696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2172,4347566768005000729,10862142668579979868,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5284 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,4347566768005000729,10862142668579979868,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5076 /prefetch:12⤵PID:2964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,4347566768005000729,10862142668579979868,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5100 /prefetch:12⤵PID:2848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,4347566768005000729,10862142668579979868,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5368 /prefetch:12⤵PID:5164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,4347566768005000729,10862142668579979868,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4768 /prefetch:12⤵PID:5172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2172,4347566768005000729,10862142668579979868,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2276 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2384
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1608
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1532
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ff63763eedb406987ced076e36ec9acf
SHA116365aa97cd1a115412f8ae436d5d4e9be5f7b5d
SHA2568f460e8b7a67f0c65b7248961a7c71146c9e7a19772b193972b486dbf05b8e4c
SHA512ce90336169c8b2de249d4faea2519bf7c3df48ae9d77cdf471dd5dbd8e8542d47d9348080a098074aa63c255890850ee3b80ddb8eef8384919fdca3bb9371d9f
-
Filesize
152B
MD52783c40400a8912a79cfd383da731086
SHA1001a131fe399c30973089e18358818090ca81789
SHA256331fa67da5f67bbb42794c3aeab8f7819f35347460ffb352ccc914e0373a22c5
SHA512b7c7d3aa966ad39a86aae02479649d74dcbf29d9cb3a7ff8b9b2354ea60704da55f5c0df803fd0a7191170a8e72fdd5eacfa1a739d7a74e390a7b74bdced1685
-
Filesize
209KB
MD53e552d017d45f8fd93b94cfc86f842f2
SHA1dbeebe83854328e2575ff67259e3fb6704b17a47
SHA25627d9c4613df7a3c04da0b79c13217aa69992b441acb7e44bf2a7578ca87d97d6
SHA512e616436f2f15615429c7c5c37de3990c3e86c5e1da7d75a0f524fc458b75d44a5be1a3648a628d63e1cf8aa062e08b538f2f2bc9c6a0b42157beb24f82c571d9
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize192B
MD5297c342cc59970de964c27c117c213c6
SHA16a22df9a2245b15a9de19dfb27513341e710ecae
SHA2564c537abab5c8949b13145158eaf8952564cc44ae819aa226fbea3879273bd2a7
SHA5122793e3d552ee50d6b0ae911bc64f61cb3d2e352a29673705122cf0d05038c22859b3e49776fdd263808a30b3e21d1b9d7c264ae5ff1746c5bd63fcbe0fd5104c
-
Filesize
1015B
MD536c934eb1125c3e72904301d243696a5
SHA1608f992b388427423528bb37bde184725408c50b
SHA256c9e62964ae400925c9f4a12685a08ddeb4ebb89e92394c5b3c59b402e3af16bc
SHA5128800bcb4bcb6af5a3fb00329b2318bf6bd350d7b58b549096f0aaea3d7b29c2df0a98b09565be85adc7b547e8a0ed1844de07aabd2f501194ff6f352a0d732dd
-
Filesize
6KB
MD5eb9675095cd2d300ccc410c751a579c6
SHA12c0b6a0ec672cf6d075fab06c73e89fbc418ad80
SHA25687661cee46cdb7d4f11e7e8bfd5f3204b52592b5be8d7c9a843db263675b4a88
SHA51229c8d896150ec271a07314f57bec43b529825773dd1bf5c9be1298984804fd5a67b51ad648f99f2c57adee733d16eaec6678090ddec60530500fa3ef5ae9fde3
-
Filesize
5KB
MD531d8c11bc837bca9a877668d6560c556
SHA12a0fc0e6fab292880185a8b0de7eb7da3a3fef9b
SHA256098f98b59833862133aae6878462aaa27bbfe50dc1e945267ef6e02562a1cfb1
SHA5122a69fdabb49f8df6e7242e4fafb6a7a04120869e017ec22008a4620cdaa5ad6872805756b1718f1611509e00e384bbeb47b1a092bcdaa3fc8d57719476a454d3
-
Filesize
6KB
MD533a940c7891305fb417defcae21ab9fb
SHA13b0541bf8de947dd5dfd18697dd45ec51175eefe
SHA256b4220ca95366dc52cfd9285f143044173a8cd7928cb04b4c2eaf5a83ebe61bdf
SHA5127e8e04db2cb2231f53db7fe235de4c7b37b13e1435289abae520a843f34be376429310c43bfb4d1082bb6422eaaefc4d73a921c5e8700f4a5896e516278d7611
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD52e905364407583c5792e3261351b1652
SHA1a2ad5601b1a5af960da1a0e38e6094a93bda0d89
SHA25667e4fe2f2f973e2a0c79922c174fa55852a7b6ebccb5b87fa97b71a1a04cd0df
SHA512443570496b81bc5225223a944d11a1e23c916494952470275d7e4a80fcb457af8bfa5706161ee6c49a41b580b64c7f903233c95c4ffc5240bfcba63a60a564ae