Analysis
-
max time kernel
145s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/08/2024, 02:25
Static task
static1
Behavioral task
behavioral1
Sample
a9362b9cf2eea944728391d9ab9dfc7f_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a9362b9cf2eea944728391d9ab9dfc7f_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
a9362b9cf2eea944728391d9ab9dfc7f_JaffaCakes118.html
-
Size
83KB
-
MD5
a9362b9cf2eea944728391d9ab9dfc7f
-
SHA1
20cc6a05827c8111b13df00a3707974f3164e4ce
-
SHA256
8b137b1bb0c0f47ec3914439c415e52de7101b61ebd9a08b76b8adac7b9f1f5c
-
SHA512
3d62d1078da9392357f7a992ea4ffa616f918e2562065a05982a8451767996c5d61cd64a2b8f0b0b1c9096ec95a5f8c641b266e7178e8dbf9d9a328e962e02e2
-
SSDEEP
768:0kR3xs0MHvvCIynoWgGQjT4o2kFZkxw7TVzSih3q+bxJaAp5KYtbI5WKv1egQrMU:0VBHv7ynv+jT4o1DkcpnJa05fafQrh
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3688 msedge.exe 3688 msedge.exe 5024 msedge.exe 5024 msedge.exe 2536 identity_helper.exe 2536 identity_helper.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe 5024 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5024 wrote to memory of 1784 5024 msedge.exe 84 PID 5024 wrote to memory of 1784 5024 msedge.exe 84 PID 5024 wrote to memory of 3564 5024 msedge.exe 85 PID 5024 wrote to memory of 3564 5024 msedge.exe 85 PID 5024 wrote to memory of 3564 5024 msedge.exe 85 PID 5024 wrote to memory of 3564 5024 msedge.exe 85 PID 5024 wrote to memory of 3564 5024 msedge.exe 85 PID 5024 wrote to memory of 3564 5024 msedge.exe 85 PID 5024 wrote to memory of 3564 5024 msedge.exe 85 PID 5024 wrote to memory of 3564 5024 msedge.exe 85 PID 5024 wrote to memory of 3564 5024 msedge.exe 85 PID 5024 wrote to memory of 3564 5024 msedge.exe 85 PID 5024 wrote to memory of 3564 5024 msedge.exe 85 PID 5024 wrote to memory of 3564 5024 msedge.exe 85 PID 5024 wrote to memory of 3564 5024 msedge.exe 85 PID 5024 wrote to memory of 3564 5024 msedge.exe 85 PID 5024 wrote to memory of 3564 5024 msedge.exe 85 PID 5024 wrote to memory of 3564 5024 msedge.exe 85 PID 5024 wrote to memory of 3564 5024 msedge.exe 85 PID 5024 wrote to memory of 3564 5024 msedge.exe 85 PID 5024 wrote to memory of 3564 5024 msedge.exe 85 PID 5024 wrote to memory of 3564 5024 msedge.exe 85 PID 5024 wrote to memory of 3564 5024 msedge.exe 85 PID 5024 wrote to memory of 3564 5024 msedge.exe 85 PID 5024 wrote to memory of 3564 5024 msedge.exe 85 PID 5024 wrote to memory of 3564 5024 msedge.exe 85 PID 5024 wrote to memory of 3564 5024 msedge.exe 85 PID 5024 wrote to memory of 3564 5024 msedge.exe 85 PID 5024 wrote to memory of 3564 5024 msedge.exe 85 PID 5024 wrote to memory of 3564 5024 msedge.exe 85 PID 5024 wrote to memory of 3564 5024 msedge.exe 85 PID 5024 wrote to memory of 3564 5024 msedge.exe 85 PID 5024 wrote to memory of 3564 5024 msedge.exe 85 PID 5024 wrote to memory of 3564 5024 msedge.exe 85 PID 5024 wrote to memory of 3564 5024 msedge.exe 85 PID 5024 wrote to memory of 3564 5024 msedge.exe 85 PID 5024 wrote to memory of 3564 5024 msedge.exe 85 PID 5024 wrote to memory of 3564 5024 msedge.exe 85 PID 5024 wrote to memory of 3564 5024 msedge.exe 85 PID 5024 wrote to memory of 3564 5024 msedge.exe 85 PID 5024 wrote to memory of 3564 5024 msedge.exe 85 PID 5024 wrote to memory of 3564 5024 msedge.exe 85 PID 5024 wrote to memory of 3688 5024 msedge.exe 86 PID 5024 wrote to memory of 3688 5024 msedge.exe 86 PID 5024 wrote to memory of 4156 5024 msedge.exe 87 PID 5024 wrote to memory of 4156 5024 msedge.exe 87 PID 5024 wrote to memory of 4156 5024 msedge.exe 87 PID 5024 wrote to memory of 4156 5024 msedge.exe 87 PID 5024 wrote to memory of 4156 5024 msedge.exe 87 PID 5024 wrote to memory of 4156 5024 msedge.exe 87 PID 5024 wrote to memory of 4156 5024 msedge.exe 87 PID 5024 wrote to memory of 4156 5024 msedge.exe 87 PID 5024 wrote to memory of 4156 5024 msedge.exe 87 PID 5024 wrote to memory of 4156 5024 msedge.exe 87 PID 5024 wrote to memory of 4156 5024 msedge.exe 87 PID 5024 wrote to memory of 4156 5024 msedge.exe 87 PID 5024 wrote to memory of 4156 5024 msedge.exe 87 PID 5024 wrote to memory of 4156 5024 msedge.exe 87 PID 5024 wrote to memory of 4156 5024 msedge.exe 87 PID 5024 wrote to memory of 4156 5024 msedge.exe 87 PID 5024 wrote to memory of 4156 5024 msedge.exe 87 PID 5024 wrote to memory of 4156 5024 msedge.exe 87 PID 5024 wrote to memory of 4156 5024 msedge.exe 87 PID 5024 wrote to memory of 4156 5024 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\a9362b9cf2eea944728391d9ab9dfc7f_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5024 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffc86946f8,0x7fffc8694708,0x7fffc86947182⤵PID:1784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2040,4802507084694470758,11375221179076449910,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2056 /prefetch:22⤵PID:3564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2040,4802507084694470758,11375221179076449910,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2080 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2040,4802507084694470758,11375221179076449910,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1544 /prefetch:82⤵PID:4156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,4802507084694470758,11375221179076449910,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:4140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,4802507084694470758,11375221179076449910,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3412 /prefetch:12⤵PID:4672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,4802507084694470758,11375221179076449910,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4684 /prefetch:12⤵PID:3736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,4802507084694470758,11375221179076449910,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4928 /prefetch:12⤵PID:1232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,4802507084694470758,11375221179076449910,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5536 /prefetch:12⤵PID:1592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,4802507084694470758,11375221179076449910,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5520 /prefetch:12⤵PID:4336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2040,4802507084694470758,11375221179076449910,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6412 /prefetch:82⤵PID:4544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2040,4802507084694470758,11375221179076449910,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6412 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,4802507084694470758,11375221179076449910,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5716 /prefetch:12⤵PID:3952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,4802507084694470758,11375221179076449910,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1796 /prefetch:12⤵PID:4024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2040,4802507084694470758,11375221179076449910,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5176 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1168
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2448
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4612
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59b008261dda31857d68792b46af6dd6d
SHA1e82dc88e2d1da2df7cb19d79a0346b9bb90d52b3
SHA2569ac598d4f8170f7e475d84103aead9e3c23d5f2d292741a7f56a17bde8b6f7da
SHA51278853091403a06beeec4998e2e3a4342111895ffd485f7f7cd367741a4883f7a25864cba00a6c86f27dc0c9ce9d04f08011ecc40c8ae9383d33274739ac39f10
-
Filesize
152B
MD50446fcdd21b016db1f468971fb82a488
SHA1726b91562bb75f80981f381e3c69d7d832c87c9d
SHA25662c5dc18b25e758f3508582a7c58bb46b734a774d97fc0e8a20614235caa8222
SHA5121df7c085042266959f1fe0aedc5f6d40ceba485b54159f51f0c38f17bb250b79ea941b735e1b6faf219f23fe8ab65ac4557f545519d52d5416b89ad0f9047a31
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD5265a09f895d8ab9e2bbf9b2f031f37e4
SHA1148b67614a1e9484e6d2e81688c2f1bbc24f6c9d
SHA256506c42c310fb36e2dc2041c1f550ab242292b97eb14b134d126de39504abb9cd
SHA51202a286b8df8e0e586c84b3278f70f2fb99065d107d1e9fed4f05ea1c5102f80e42317021c86eaa0c0de56e7f2a9bbfbadb4d81417c58e05033c3f8f71ea1bb1d
-
Filesize
982B
MD512915c8ea64ef928d50c7fabc4403b7f
SHA16b833bf3ff43d018647ce2e69470dc3ed55c39ec
SHA2566ec99f8ad116f88a8d8ce6374e69a8d77f6006cb870277f93c79c326b3df20c1
SHA512d725b460efced26d3d65cad9976b269aadb918318c7b36ac7864aaa2838418b30bbdf5c6a33501aaf36dfe2189ceaf562fdc3f3ff521e40599005848afff391d
-
Filesize
5KB
MD569d1ae5d7158e3d4c2788929343ba2d3
SHA1a7971d0101ee834b8b94a38268b8fc4ca4d978df
SHA256bddd00d9f00ecefab359aa94f7dfa69a7f964e06b0a7f5a56d36be5cf90cb3f3
SHA5128369778fade23c212b4bfa7390cbf1b1eb4afb04401dde3930b266ea8aa16e46f8ad038816bfc0208b028c556494871a5ca5671561a06902963e6e57a1eb45a1
-
Filesize
7KB
MD50394ce725fb4338a1892168875cfb5db
SHA1cda43678bb13122485e4aa189a50bed1bfd7f74a
SHA2566b03616d07b95cb875468327baba6689444c3c7f84c9b2670c839e9423a2983e
SHA51215fc0d53b18d178b92595f5b7b5ec38cddd2097c8931ead59c6416ab311966cc10129fb81788bd1209fc3fc1c1e8933f7a7353718bb393f54fa66e353e177772
-
Filesize
7KB
MD53887716bda5181dcc5e283eebd994fc6
SHA14674c94d47efbb78e763135c3ba1e27f18f1e0f2
SHA256ba4f58a748cbd813643fca3542cc354522b959f34023622f37a0c0f84b2cde7c
SHA512f359f800f7a9c09d912a762981adfe66298ba4e894a1825b256720908d58f3ea6c1655237200f2556c16f7e8519804859f9bf67c382247ac38ed74585d13f397
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5ed4451706355919fba4b0524434c0e2d
SHA172236eb5cb5d2249ce524a302bdd4b8e8121d190
SHA25665f4499a57ab05b00b985a4515436f7ecdc38cee6483508d3b269bd3d76c08c7
SHA5125ddbe1ed62cfc20bd4632fe8f822a7ec276765a7a3c9b7ddcc75e22baf4f9cd6918741d913b32ac2a4294eae589d84769accdddc186a454216e8c66984bd54e9