Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18/08/2024, 11:22
Static task
static1
Behavioral task
behavioral1
Sample
a6965a26fef33eda1c60ba93c8792201_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a6965a26fef33eda1c60ba93c8792201_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
a6965a26fef33eda1c60ba93c8792201_JaffaCakes118.html
-
Size
11KB
-
MD5
a6965a26fef33eda1c60ba93c8792201
-
SHA1
106665687c5841b7858961035047accc3bc2b877
-
SHA256
1b866a40d23eaae5e1443bb4dea6ed6cfa6675be141af7c2991360ee5cf92d37
-
SHA512
2092bf3f3ada68b356a0cd82b3a2ba5fb0d7e88ae5fe7fb9d3687fb54575e1a4a1e8e87ebf99edef0169b291feadf86dc0396f5ef6bab35f8cdb8891c186ac2f
-
SSDEEP
192:2VGlIsr03zw8k/w1wvqyQBMnnKvgmtq018LOXuBuLbdU8d:sGlIcuzQ/gcQBMnnKvgmtq08LOXguLZ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 424 msedge.exe 424 msedge.exe 2360 msedge.exe 2360 msedge.exe 2508 identity_helper.exe 2508 identity_helper.exe 1096 msedge.exe 1096 msedge.exe 1096 msedge.exe 1096 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2360 wrote to memory of 3052 2360 msedge.exe 84 PID 2360 wrote to memory of 3052 2360 msedge.exe 84 PID 2360 wrote to memory of 3300 2360 msedge.exe 85 PID 2360 wrote to memory of 3300 2360 msedge.exe 85 PID 2360 wrote to memory of 3300 2360 msedge.exe 85 PID 2360 wrote to memory of 3300 2360 msedge.exe 85 PID 2360 wrote to memory of 3300 2360 msedge.exe 85 PID 2360 wrote to memory of 3300 2360 msedge.exe 85 PID 2360 wrote to memory of 3300 2360 msedge.exe 85 PID 2360 wrote to memory of 3300 2360 msedge.exe 85 PID 2360 wrote to memory of 3300 2360 msedge.exe 85 PID 2360 wrote to memory of 3300 2360 msedge.exe 85 PID 2360 wrote to memory of 3300 2360 msedge.exe 85 PID 2360 wrote to memory of 3300 2360 msedge.exe 85 PID 2360 wrote to memory of 3300 2360 msedge.exe 85 PID 2360 wrote to memory of 3300 2360 msedge.exe 85 PID 2360 wrote to memory of 3300 2360 msedge.exe 85 PID 2360 wrote to memory of 3300 2360 msedge.exe 85 PID 2360 wrote to memory of 3300 2360 msedge.exe 85 PID 2360 wrote to memory of 3300 2360 msedge.exe 85 PID 2360 wrote to memory of 3300 2360 msedge.exe 85 PID 2360 wrote to memory of 3300 2360 msedge.exe 85 PID 2360 wrote to memory of 3300 2360 msedge.exe 85 PID 2360 wrote to memory of 3300 2360 msedge.exe 85 PID 2360 wrote to memory of 3300 2360 msedge.exe 85 PID 2360 wrote to memory of 3300 2360 msedge.exe 85 PID 2360 wrote to memory of 3300 2360 msedge.exe 85 PID 2360 wrote to memory of 3300 2360 msedge.exe 85 PID 2360 wrote to memory of 3300 2360 msedge.exe 85 PID 2360 wrote to memory of 3300 2360 msedge.exe 85 PID 2360 wrote to memory of 3300 2360 msedge.exe 85 PID 2360 wrote to memory of 3300 2360 msedge.exe 85 PID 2360 wrote to memory of 3300 2360 msedge.exe 85 PID 2360 wrote to memory of 3300 2360 msedge.exe 85 PID 2360 wrote to memory of 3300 2360 msedge.exe 85 PID 2360 wrote to memory of 3300 2360 msedge.exe 85 PID 2360 wrote to memory of 3300 2360 msedge.exe 85 PID 2360 wrote to memory of 3300 2360 msedge.exe 85 PID 2360 wrote to memory of 3300 2360 msedge.exe 85 PID 2360 wrote to memory of 3300 2360 msedge.exe 85 PID 2360 wrote to memory of 3300 2360 msedge.exe 85 PID 2360 wrote to memory of 3300 2360 msedge.exe 85 PID 2360 wrote to memory of 424 2360 msedge.exe 86 PID 2360 wrote to memory of 424 2360 msedge.exe 86 PID 2360 wrote to memory of 2704 2360 msedge.exe 87 PID 2360 wrote to memory of 2704 2360 msedge.exe 87 PID 2360 wrote to memory of 2704 2360 msedge.exe 87 PID 2360 wrote to memory of 2704 2360 msedge.exe 87 PID 2360 wrote to memory of 2704 2360 msedge.exe 87 PID 2360 wrote to memory of 2704 2360 msedge.exe 87 PID 2360 wrote to memory of 2704 2360 msedge.exe 87 PID 2360 wrote to memory of 2704 2360 msedge.exe 87 PID 2360 wrote to memory of 2704 2360 msedge.exe 87 PID 2360 wrote to memory of 2704 2360 msedge.exe 87 PID 2360 wrote to memory of 2704 2360 msedge.exe 87 PID 2360 wrote to memory of 2704 2360 msedge.exe 87 PID 2360 wrote to memory of 2704 2360 msedge.exe 87 PID 2360 wrote to memory of 2704 2360 msedge.exe 87 PID 2360 wrote to memory of 2704 2360 msedge.exe 87 PID 2360 wrote to memory of 2704 2360 msedge.exe 87 PID 2360 wrote to memory of 2704 2360 msedge.exe 87 PID 2360 wrote to memory of 2704 2360 msedge.exe 87 PID 2360 wrote to memory of 2704 2360 msedge.exe 87 PID 2360 wrote to memory of 2704 2360 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\a6965a26fef33eda1c60ba93c8792201_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcd3eb46f8,0x7ffcd3eb4708,0x7ffcd3eb47182⤵PID:3052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,9433454263246084488,339670127286791108,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵PID:3300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,9433454263246084488,339670127286791108,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,9433454263246084488,339670127286791108,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2604 /prefetch:82⤵PID:2704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,9433454263246084488,339670127286791108,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3200 /prefetch:12⤵PID:4040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,9433454263246084488,339670127286791108,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:2152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,9433454263246084488,339670127286791108,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4580 /prefetch:12⤵PID:1208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,9433454263246084488,339670127286791108,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3452 /prefetch:12⤵PID:1916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,9433454263246084488,339670127286791108,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2216 /prefetch:12⤵PID:448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,9433454263246084488,339670127286791108,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5952 /prefetch:82⤵PID:4300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,9433454263246084488,339670127286791108,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5952 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,9433454263246084488,339670127286791108,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5784 /prefetch:12⤵PID:2576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,9433454263246084488,339670127286791108,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5752 /prefetch:12⤵PID:4404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,9433454263246084488,339670127286791108,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5016 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1096
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1540
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1308
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ecf7ca53c80b5245e35839009d12f866
SHA1a7af77cf31d410708ebd35a232a80bddfb0615bb
SHA256882a513b71b26210ff251769b82b2c5d59a932f96d9ce606ca2fab6530a13687
SHA512706722bd22ce27d854036b1b16e6a3cdb36284b66edc76238a79c2e11cee7d1307b121c898ad832eb1af73e4f08d991d64dc0bff529896ffb4ebe9b3dc381696
-
Filesize
152B
MD54dd2754d1bea40445984d65abee82b21
SHA14b6a5658bae9a784a370a115fbb4a12e92bd3390
SHA256183b8e82a0deaa83d04736553671cedb738adc909f483b3c5f822a0e6be7477d
SHA51292d44ee372ad33f892b921efa6cabc78e91025e89f05a22830763217826fa98d51d55711f85c8970ac58abf9adc6c85cc40878032cd6d2589ab226cd099f99e1
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize168B
MD555956c381a8bc233583dcc5f61cc3df9
SHA1f4371bd07ab0c90e90388f9de05f343edeea27a9
SHA256f3cb905cdfafe2a34b4a0e25742a4b67af4652579c916d49942947c24e0f8eb5
SHA5126a393e17d504e6a597dcf5b91e27d388cdcdaad95560d0bbf16f05beaa674db0395194ae2b6671b3d1c3a412a232612a46fa7ebe0e320449064433c58685f639
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
5KB
MD5b3c43252ff5ac8bbaa5b177ba9f6cc40
SHA10af57ecd25b7580232be001527d9caefd264d9cb
SHA2562942a3992d9c1175b62d53e5a0191063347333e2cb376b398abe9867e6e42624
SHA5124310ee00b3eb2e62839e0fdfbb171223c8bc361237bb2b8fc826e3a069c215b0ecfa3873032606ca3dcdc8736364ba631e9ab765c14ebd8a1528eb54b74658e3
-
Filesize
6KB
MD5d2adb89302608ec6075be1c9a0b966f5
SHA1f3ec34a3bd7977059da60c0fdb02396729b43aa6
SHA2569e6c67dc945a50728fab35cb3ec01ba35f9cef0447ea5c79d9d8a73676fa6e6a
SHA512cc4857e1702b887f6b151ec1c3e0dab439bdb4b27f7f78d259f94fc7c963d119d871c179a03aa06d358f45d1237dd17fa511559c7052d118a01d0c86fdb6ff40
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5a3d75cc20a7800f71cb07554e319b506
SHA105a7aca38aab5d5a1f59e6945e578e9d03e572b1
SHA256ff763e569aba490306ac6cc675cf33f6fdea7a5f997fd0a5bcea2d3c2bc0e9ef
SHA512f78bcb0a93e0f75d38371d256caa84c2b195442cd374f6a0d8a03a8555499d3b113665de056f2de9eec3929113ef3e75dbd6b61e5ba1d2ee29538910928a1fe7