Analysis
-
max time kernel
145s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18/08/2024, 18:00
Static task
static1
Behavioral task
behavioral1
Sample
a7a63c15a96d36297e79081d2a59fd93_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a7a63c15a96d36297e79081d2a59fd93_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
a7a63c15a96d36297e79081d2a59fd93_JaffaCakes118.html
-
Size
26KB
-
MD5
a7a63c15a96d36297e79081d2a59fd93
-
SHA1
dc9dbc04234946f984f662269db33e7092f757d6
-
SHA256
48bc0b3599380ff489f243ed3f8cd10d127115bdf4dbbeaab454180ca800ac4f
-
SHA512
24397294071f7eccf872ebadde9541ee27f9f46cf9f27a24070be7532da3aeb78ee6970b7b476abc574d6beb152b9260b5bbad42cba65ca8126a2316b6444d41
-
SSDEEP
384:4+QfPFd9QZBC7mOdMgcBKfpC5IgSnbmFe7AcZY644kJvAgo0iqApPd:Zcd9QZBC7mOdMghpC5I9nC4aIP0iqGPd
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4284 msedge.exe 4284 msedge.exe 3236 msedge.exe 3236 msedge.exe 2996 identity_helper.exe 2996 identity_helper.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3236 wrote to memory of 4904 3236 msedge.exe 83 PID 3236 wrote to memory of 4904 3236 msedge.exe 83 PID 3236 wrote to memory of 4140 3236 msedge.exe 84 PID 3236 wrote to memory of 4140 3236 msedge.exe 84 PID 3236 wrote to memory of 4140 3236 msedge.exe 84 PID 3236 wrote to memory of 4140 3236 msedge.exe 84 PID 3236 wrote to memory of 4140 3236 msedge.exe 84 PID 3236 wrote to memory of 4140 3236 msedge.exe 84 PID 3236 wrote to memory of 4140 3236 msedge.exe 84 PID 3236 wrote to memory of 4140 3236 msedge.exe 84 PID 3236 wrote to memory of 4140 3236 msedge.exe 84 PID 3236 wrote to memory of 4140 3236 msedge.exe 84 PID 3236 wrote to memory of 4140 3236 msedge.exe 84 PID 3236 wrote to memory of 4140 3236 msedge.exe 84 PID 3236 wrote to memory of 4140 3236 msedge.exe 84 PID 3236 wrote to memory of 4140 3236 msedge.exe 84 PID 3236 wrote to memory of 4140 3236 msedge.exe 84 PID 3236 wrote to memory of 4140 3236 msedge.exe 84 PID 3236 wrote to memory of 4140 3236 msedge.exe 84 PID 3236 wrote to memory of 4140 3236 msedge.exe 84 PID 3236 wrote to memory of 4140 3236 msedge.exe 84 PID 3236 wrote to memory of 4140 3236 msedge.exe 84 PID 3236 wrote to memory of 4140 3236 msedge.exe 84 PID 3236 wrote to memory of 4140 3236 msedge.exe 84 PID 3236 wrote to memory of 4140 3236 msedge.exe 84 PID 3236 wrote to memory of 4140 3236 msedge.exe 84 PID 3236 wrote to memory of 4140 3236 msedge.exe 84 PID 3236 wrote to memory of 4140 3236 msedge.exe 84 PID 3236 wrote to memory of 4140 3236 msedge.exe 84 PID 3236 wrote to memory of 4140 3236 msedge.exe 84 PID 3236 wrote to memory of 4140 3236 msedge.exe 84 PID 3236 wrote to memory of 4140 3236 msedge.exe 84 PID 3236 wrote to memory of 4140 3236 msedge.exe 84 PID 3236 wrote to memory of 4140 3236 msedge.exe 84 PID 3236 wrote to memory of 4140 3236 msedge.exe 84 PID 3236 wrote to memory of 4140 3236 msedge.exe 84 PID 3236 wrote to memory of 4140 3236 msedge.exe 84 PID 3236 wrote to memory of 4140 3236 msedge.exe 84 PID 3236 wrote to memory of 4140 3236 msedge.exe 84 PID 3236 wrote to memory of 4140 3236 msedge.exe 84 PID 3236 wrote to memory of 4140 3236 msedge.exe 84 PID 3236 wrote to memory of 4140 3236 msedge.exe 84 PID 3236 wrote to memory of 4284 3236 msedge.exe 85 PID 3236 wrote to memory of 4284 3236 msedge.exe 85 PID 3236 wrote to memory of 5068 3236 msedge.exe 86 PID 3236 wrote to memory of 5068 3236 msedge.exe 86 PID 3236 wrote to memory of 5068 3236 msedge.exe 86 PID 3236 wrote to memory of 5068 3236 msedge.exe 86 PID 3236 wrote to memory of 5068 3236 msedge.exe 86 PID 3236 wrote to memory of 5068 3236 msedge.exe 86 PID 3236 wrote to memory of 5068 3236 msedge.exe 86 PID 3236 wrote to memory of 5068 3236 msedge.exe 86 PID 3236 wrote to memory of 5068 3236 msedge.exe 86 PID 3236 wrote to memory of 5068 3236 msedge.exe 86 PID 3236 wrote to memory of 5068 3236 msedge.exe 86 PID 3236 wrote to memory of 5068 3236 msedge.exe 86 PID 3236 wrote to memory of 5068 3236 msedge.exe 86 PID 3236 wrote to memory of 5068 3236 msedge.exe 86 PID 3236 wrote to memory of 5068 3236 msedge.exe 86 PID 3236 wrote to memory of 5068 3236 msedge.exe 86 PID 3236 wrote to memory of 5068 3236 msedge.exe 86 PID 3236 wrote to memory of 5068 3236 msedge.exe 86 PID 3236 wrote to memory of 5068 3236 msedge.exe 86 PID 3236 wrote to memory of 5068 3236 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\a7a63c15a96d36297e79081d2a59fd93_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3236 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffae86e46f8,0x7ffae86e4708,0x7ffae86e47182⤵PID:4904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,12222496371067565695,3741940165224055401,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:22⤵PID:4140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,12222496371067565695,3741940165224055401,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2444 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,12222496371067565695,3741940165224055401,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2848 /prefetch:82⤵PID:5068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,12222496371067565695,3741940165224055401,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:1092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,12222496371067565695,3741940165224055401,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:4072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,12222496371067565695,3741940165224055401,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4152 /prefetch:12⤵PID:4560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,12222496371067565695,3741940165224055401,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4876 /prefetch:12⤵PID:1808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,12222496371067565695,3741940165224055401,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5572 /prefetch:12⤵PID:972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,12222496371067565695,3741940165224055401,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6248 /prefetch:82⤵PID:3808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,12222496371067565695,3741940165224055401,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6248 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,12222496371067565695,3741940165224055401,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6244 /prefetch:12⤵PID:1128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,12222496371067565695,3741940165224055401,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5868 /prefetch:12⤵PID:316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,12222496371067565695,3741940165224055401,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5588 /prefetch:12⤵PID:5288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,12222496371067565695,3741940165224055401,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5500 /prefetch:12⤵PID:5296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,12222496371067565695,3741940165224055401,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4316 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4976
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2528
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:224
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e4f80e7950cbd3bb11257d2000cb885e
SHA110ac643904d539042d8f7aa4a312b13ec2106035
SHA2561184ee8d32d0edecddd93403fb888fad6b3e2a710d37335c3989cc529bc08124
SHA5122b92c9807fdcd937e514d4e7e1cc7c2d3e3aa162099b7289ceac2feea72d1a4afbadf1c09b3075d470efadf9a9edd63e07ea7e7a98d22243e45b3d53473fa4f0
-
Filesize
152B
MD52dc1a9f2f3f8c3cfe51bb29b078166c5
SHA1eaf3c3dad3c8dc6f18dc3e055b415da78b704402
SHA256dcb76fa365c2d9ee213b224a91cdd806d30b1e8652d72a22f2371124fa4479fa
SHA512682061d9cc86a6e5d99d022da776fb554350fc95efbf29cd84c1db4e2b7161b76cd1de48335bcc3a25633079fb0bd412e4f4795ed6291c65e9bc28d95330bb25
-
Filesize
209KB
MD53e552d017d45f8fd93b94cfc86f842f2
SHA1dbeebe83854328e2575ff67259e3fb6704b17a47
SHA25627d9c4613df7a3c04da0b79c13217aa69992b441acb7e44bf2a7578ca87d97d6
SHA512e616436f2f15615429c7c5c37de3990c3e86c5e1da7d75a0f524fc458b75d44a5be1a3648a628d63e1cf8aa062e08b538f2f2bc9c6a0b42157beb24f82c571d9
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize504B
MD515eeb916e6e8d862323deb073854c609
SHA1807de763affabb5755250b301eba826cf4d461a0
SHA256be89c429e34fd838d41da5b164e614c9d950a6ae4049ac817b974dc44ff9c9de
SHA512c6f951ba942fe6b8eb5ec83a2e09b73121ae7fcd286dae48e462964d4c354c2d67301c23f3bbc0c0339090f1b0f089443e96c44d51ef6667f487933e9fcc440c
-
Filesize
1KB
MD567fca9178c246b421349115d52733746
SHA1b9376769580833e669f40b463c00a3e6b16c398f
SHA2564ca70af183fd8b39bee103f368362007217424278bfc8cd1b2a9e9ab8c105a36
SHA512689a9bb256d19c6b060767532df0a065c764a9179f869324e0f73ede439011b8ec0500b4042d6fa5624ff6fd52bfd81a13662adaa28f404821f0f7474fa47ec9
-
Filesize
5KB
MD55634b39a2a24507965e9489b3e4d27b6
SHA10ce8b759777a5df1b4ff19ceb0c31f346c8b732f
SHA256d6ffbbb2c3d02a82a176671e4b577012c86eb74dfa63ba7cd2660a768341e5f2
SHA512127b30f6f44142bc524244e3428878af4eb9a854a06aee81861c510595490bae56844e6743377dd96e0738dc418fe80ac554817af203aa2425223d30e9327bfa
-
Filesize
6KB
MD5ddc221a64d07361335c552a65a9132bf
SHA12c66289cc38d48d1688f25505a19f2143fb96b5f
SHA25607b60644d940f2f8be3cbc39139185cee959ea66578a40a7f22263191b219e17
SHA5122e8bd3efe9467d29f6f8ca91d6a4a28e2fcc5947e0c4c894e8e01ed199f8378707bc424728317ece7b6d20f3de576dcac6fa516b9d106df21a8c181496291f7f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5621a1cd54d5d6a69f63fcd053eda3ad9
SHA1ca8b9011d5560384e89b199a2b9d9a4390416d30
SHA2564e1b9f06dfc097630a561073c4b07e7b3e98425f1d0a12f20d22768fdb4e9575
SHA512979434a9726726f4982110ebc30e4148d37ff8a129ec2119496dc2c73571b61855f0c75f1bd85c4a1d903ac921440f379f9163b32cef8fd0e4976f91f791d350