Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18-08-2024 09:53
Static task
static1
Behavioral task
behavioral1
Sample
a6516944cabfe827707bd7b15ae2b976_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
a6516944cabfe827707bd7b15ae2b976_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
a6516944cabfe827707bd7b15ae2b976_JaffaCakes118.html
-
Size
187KB
-
MD5
a6516944cabfe827707bd7b15ae2b976
-
SHA1
eb0a4ff183d962dabc43098ba1dd4278db2497e2
-
SHA256
87973f7074618fab6263633633aabfc92de1e4de5200d23b952c23f16147a603
-
SHA512
be8c971946efc89492374d88657b8bed8a22c6441cbda63cb301fdea110ec751361675c6c58506166c684999a1310895309498c8a4605a138772e55d4eec0cce
-
SSDEEP
3072:FHWSU/5SjDTuh26Q+DdndIKs0VFQ3IuQAkjDyT4eml+:FHWb5SjDTuh26Q+Ddndhs0V2IuQAkjc
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2196 msedge.exe 2196 msedge.exe 2184 msedge.exe 2184 msedge.exe 3756 identity_helper.exe 3756 identity_helper.exe 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2184 wrote to memory of 3288 2184 msedge.exe 83 PID 2184 wrote to memory of 3288 2184 msedge.exe 83 PID 2184 wrote to memory of 3432 2184 msedge.exe 84 PID 2184 wrote to memory of 3432 2184 msedge.exe 84 PID 2184 wrote to memory of 3432 2184 msedge.exe 84 PID 2184 wrote to memory of 3432 2184 msedge.exe 84 PID 2184 wrote to memory of 3432 2184 msedge.exe 84 PID 2184 wrote to memory of 3432 2184 msedge.exe 84 PID 2184 wrote to memory of 3432 2184 msedge.exe 84 PID 2184 wrote to memory of 3432 2184 msedge.exe 84 PID 2184 wrote to memory of 3432 2184 msedge.exe 84 PID 2184 wrote to memory of 3432 2184 msedge.exe 84 PID 2184 wrote to memory of 3432 2184 msedge.exe 84 PID 2184 wrote to memory of 3432 2184 msedge.exe 84 PID 2184 wrote to memory of 3432 2184 msedge.exe 84 PID 2184 wrote to memory of 3432 2184 msedge.exe 84 PID 2184 wrote to memory of 3432 2184 msedge.exe 84 PID 2184 wrote to memory of 3432 2184 msedge.exe 84 PID 2184 wrote to memory of 3432 2184 msedge.exe 84 PID 2184 wrote to memory of 3432 2184 msedge.exe 84 PID 2184 wrote to memory of 3432 2184 msedge.exe 84 PID 2184 wrote to memory of 3432 2184 msedge.exe 84 PID 2184 wrote to memory of 3432 2184 msedge.exe 84 PID 2184 wrote to memory of 3432 2184 msedge.exe 84 PID 2184 wrote to memory of 3432 2184 msedge.exe 84 PID 2184 wrote to memory of 3432 2184 msedge.exe 84 PID 2184 wrote to memory of 3432 2184 msedge.exe 84 PID 2184 wrote to memory of 3432 2184 msedge.exe 84 PID 2184 wrote to memory of 3432 2184 msedge.exe 84 PID 2184 wrote to memory of 3432 2184 msedge.exe 84 PID 2184 wrote to memory of 3432 2184 msedge.exe 84 PID 2184 wrote to memory of 3432 2184 msedge.exe 84 PID 2184 wrote to memory of 3432 2184 msedge.exe 84 PID 2184 wrote to memory of 3432 2184 msedge.exe 84 PID 2184 wrote to memory of 3432 2184 msedge.exe 84 PID 2184 wrote to memory of 3432 2184 msedge.exe 84 PID 2184 wrote to memory of 3432 2184 msedge.exe 84 PID 2184 wrote to memory of 3432 2184 msedge.exe 84 PID 2184 wrote to memory of 3432 2184 msedge.exe 84 PID 2184 wrote to memory of 3432 2184 msedge.exe 84 PID 2184 wrote to memory of 3432 2184 msedge.exe 84 PID 2184 wrote to memory of 3432 2184 msedge.exe 84 PID 2184 wrote to memory of 2196 2184 msedge.exe 85 PID 2184 wrote to memory of 2196 2184 msedge.exe 85 PID 2184 wrote to memory of 1108 2184 msedge.exe 86 PID 2184 wrote to memory of 1108 2184 msedge.exe 86 PID 2184 wrote to memory of 1108 2184 msedge.exe 86 PID 2184 wrote to memory of 1108 2184 msedge.exe 86 PID 2184 wrote to memory of 1108 2184 msedge.exe 86 PID 2184 wrote to memory of 1108 2184 msedge.exe 86 PID 2184 wrote to memory of 1108 2184 msedge.exe 86 PID 2184 wrote to memory of 1108 2184 msedge.exe 86 PID 2184 wrote to memory of 1108 2184 msedge.exe 86 PID 2184 wrote to memory of 1108 2184 msedge.exe 86 PID 2184 wrote to memory of 1108 2184 msedge.exe 86 PID 2184 wrote to memory of 1108 2184 msedge.exe 86 PID 2184 wrote to memory of 1108 2184 msedge.exe 86 PID 2184 wrote to memory of 1108 2184 msedge.exe 86 PID 2184 wrote to memory of 1108 2184 msedge.exe 86 PID 2184 wrote to memory of 1108 2184 msedge.exe 86 PID 2184 wrote to memory of 1108 2184 msedge.exe 86 PID 2184 wrote to memory of 1108 2184 msedge.exe 86 PID 2184 wrote to memory of 1108 2184 msedge.exe 86 PID 2184 wrote to memory of 1108 2184 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\a6516944cabfe827707bd7b15ae2b976_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8e84246f8,0x7ff8e8424708,0x7ff8e84247182⤵PID:3288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,16419867844245589720,18389351644438533449,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:22⤵PID:3432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,16419867844245589720,18389351644438533449,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2208 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,16419867844245589720,18389351644438533449,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2904 /prefetch:82⤵PID:1108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,16419867844245589720,18389351644438533449,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:2920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,16419867844245589720,18389351644438533449,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:4376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,16419867844245589720,18389351644438533449,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5088 /prefetch:12⤵PID:4660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,16419867844245589720,18389351644438533449,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5588 /prefetch:12⤵PID:1808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,16419867844245589720,18389351644438533449,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5220 /prefetch:12⤵PID:4852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,16419867844245589720,18389351644438533449,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5860 /prefetch:12⤵PID:536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,16419867844245589720,18389351644438533449,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6040 /prefetch:82⤵PID:1388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,16419867844245589720,18389351644438533449,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6040 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,16419867844245589720,18389351644438533449,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5176 /prefetch:12⤵PID:1440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,16419867844245589720,18389351644438533449,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5460 /prefetch:12⤵PID:3604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,16419867844245589720,18389351644438533449,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5444 /prefetch:12⤵PID:5152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,16419867844245589720,18389351644438533449,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5692 /prefetch:12⤵PID:5160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,16419867844245589720,18389351644438533449,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4396 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1272
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2032
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:460
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5eeaa8087eba2f63f31e599f6a7b46ef4
SHA1f639519deee0766a39cfe258d2ac48e3a9d5ac03
SHA25650fe80c9435f601c30517d10f6a8a0ca6ff8ca2add7584df377371b5a5dbe2d9
SHA512eaabfad92c84f422267615c55a863af12823c5e791bdcb30cabe17f72025e07df7383cf6cf0f08e28aa18a31c2aac5985cf5281a403e22fbcc1fb5e61c49fc3c
-
Filesize
152B
MD5b9569e123772ae290f9bac07e0d31748
SHA15806ed9b301d4178a959b26d7b7ccf2c0abc6741
SHA25620ab88e23fb88186b82047cd0d6dc3cfa23422e4fd2b8f3c8437546a2a842c2b
SHA512cfad8ce716ac815b37e8cc0e30141bfb3ca7f0d4ef101289bddcf6ed3c579bc34d369f2ec2f2dab98707843015633988eb97f1e911728031dd897750b8587795
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD554fd1310614debab31b73984854bfadb
SHA1b563c77b1f3ffa599f324460d425350482562452
SHA256ed4502d86a9512aea459e199505e675430fac11249ffaf17da1d81c2bd35330d
SHA51227bc0fe04a35339fc324f3f3be3503f7b47e4a7194159c816919fa6d22edf928f4f4d0760aac76473308a7bde0c913f6810eabd842c38d3855768e093650e6d0
-
Filesize
1KB
MD56d5d8fa8b6969ff4781e02f84ae52a2f
SHA1ffdae2bf7bdbfdd68a0d291365f9116638503102
SHA2568c0fb8d2a1d9001d9dc48ba15bcdefcdee7a5f2eabb2c9f36af62f5a343d37ed
SHA512ae3565321d5783c9b0607299ad869881d054efd73aa53733e017798bdf10e1934a3128008962139f85a2db4f8ba9ec4561c61b3c0ebc59a17bef88816fec869d
-
Filesize
5KB
MD507f29f803fd87e99e62ce68133b02eed
SHA1734ec0bd0eed4a54c7472053c0988391b56c3ec9
SHA256a362790cfa49f080e7789089abb0cd3ad7b2fac6f3f9ea0e554aa7060da72124
SHA512b2497dabf1ed4d32a33af30387cd3788a2a9dcbb7d49b28971e884e13553068dce1e364a98b26c0c35303ec72f2f082a0a27e87b59ed46e8ad743c5ab78312d8
-
Filesize
6KB
MD550987ca39208994ea4843a3391353d94
SHA15212aabd8111594bd27381b50548a247ef783b9b
SHA25606847bb6ce846fe00166bd2a62c7e19365f05124194ea6043ed052dd595e2f68
SHA512c8c44d8b6539904d37926e7de350271a98e1c6f728554c61d825927fd39e458f0a9580ff1844b87973e6c8dfe4a6ef2785ec4af4f3268a2864cb853f1626c9aa
-
Filesize
6KB
MD5f8e5e5919a6b9f4cbcbd3386de025ad7
SHA1e595038cb109f1931597543e2e9c29f0b575255b
SHA256a5d6c5b80461e2b7821ba5c8b030255555c6f052c4163f127f8a503b530015c5
SHA51201918abd2102ee2aee905be00af3bfd45ad381c3bbd4a1281618f9fdd16df6b2619bcd1b703fe17ebbca448eeba8df3d8fca80649847f896d524e54f5edaa483
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD59df20da31007af90ce8b0f89ae11b99c
SHA137bdc1a95fc12204cfc4e19a45f854d529e095d6
SHA25663e9fc91fae151b0530894898558c774f6233224a3cbb0811433954cf0a9740b
SHA512f9d2b48a9f25b432902dd54f7b315199f1768e91878b311d6909e96ef78e01d5b77102d3c8bb43d0e16d7fd733dba77f3732e73e1e889a3281b2e390b45221c7