Analysis
-
max time kernel
145s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-08-2024 02:59
Static task
static1
Behavioral task
behavioral1
Sample
a95004c950131e4686de6d61f1d7b547_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a95004c950131e4686de6d61f1d7b547_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
a95004c950131e4686de6d61f1d7b547_JaffaCakes118.html
-
Size
13KB
-
MD5
a95004c950131e4686de6d61f1d7b547
-
SHA1
ee409ea55de69bf4a78e677f92d9e03cb3136cc3
-
SHA256
c11fb4708268e8b4213528227e682fcfe3526587750dad49d676c7cba1514eb3
-
SHA512
57446add81a3bc7fa9bff2b64e29e5dfe7bf73a23f7de047f2c467df0c1780d1b5fad8387c5d4d4b1a3a15e6c79c203c58a6cc4264dcd77cdc8cf660552c59e8
-
SSDEEP
192:KbfKht5jc4cxvC+Wo/7evgPJszWVtjLDlHVAtCATOCGEfQ145JOVClmP3KTAL3vV:jZc4kC+9TSeazsjHlHWoAlGEIwJ12V
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2808 msedge.exe 2808 msedge.exe 884 msedge.exe 884 msedge.exe 684 identity_helper.exe 684 identity_helper.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 884 wrote to memory of 1392 884 msedge.exe 87 PID 884 wrote to memory of 1392 884 msedge.exe 87 PID 884 wrote to memory of 1688 884 msedge.exe 88 PID 884 wrote to memory of 1688 884 msedge.exe 88 PID 884 wrote to memory of 1688 884 msedge.exe 88 PID 884 wrote to memory of 1688 884 msedge.exe 88 PID 884 wrote to memory of 1688 884 msedge.exe 88 PID 884 wrote to memory of 1688 884 msedge.exe 88 PID 884 wrote to memory of 1688 884 msedge.exe 88 PID 884 wrote to memory of 1688 884 msedge.exe 88 PID 884 wrote to memory of 1688 884 msedge.exe 88 PID 884 wrote to memory of 1688 884 msedge.exe 88 PID 884 wrote to memory of 1688 884 msedge.exe 88 PID 884 wrote to memory of 1688 884 msedge.exe 88 PID 884 wrote to memory of 1688 884 msedge.exe 88 PID 884 wrote to memory of 1688 884 msedge.exe 88 PID 884 wrote to memory of 1688 884 msedge.exe 88 PID 884 wrote to memory of 1688 884 msedge.exe 88 PID 884 wrote to memory of 1688 884 msedge.exe 88 PID 884 wrote to memory of 1688 884 msedge.exe 88 PID 884 wrote to memory of 1688 884 msedge.exe 88 PID 884 wrote to memory of 1688 884 msedge.exe 88 PID 884 wrote to memory of 1688 884 msedge.exe 88 PID 884 wrote to memory of 1688 884 msedge.exe 88 PID 884 wrote to memory of 1688 884 msedge.exe 88 PID 884 wrote to memory of 1688 884 msedge.exe 88 PID 884 wrote to memory of 1688 884 msedge.exe 88 PID 884 wrote to memory of 1688 884 msedge.exe 88 PID 884 wrote to memory of 1688 884 msedge.exe 88 PID 884 wrote to memory of 1688 884 msedge.exe 88 PID 884 wrote to memory of 1688 884 msedge.exe 88 PID 884 wrote to memory of 1688 884 msedge.exe 88 PID 884 wrote to memory of 1688 884 msedge.exe 88 PID 884 wrote to memory of 1688 884 msedge.exe 88 PID 884 wrote to memory of 1688 884 msedge.exe 88 PID 884 wrote to memory of 1688 884 msedge.exe 88 PID 884 wrote to memory of 1688 884 msedge.exe 88 PID 884 wrote to memory of 1688 884 msedge.exe 88 PID 884 wrote to memory of 1688 884 msedge.exe 88 PID 884 wrote to memory of 1688 884 msedge.exe 88 PID 884 wrote to memory of 1688 884 msedge.exe 88 PID 884 wrote to memory of 1688 884 msedge.exe 88 PID 884 wrote to memory of 2808 884 msedge.exe 89 PID 884 wrote to memory of 2808 884 msedge.exe 89 PID 884 wrote to memory of 1188 884 msedge.exe 90 PID 884 wrote to memory of 1188 884 msedge.exe 90 PID 884 wrote to memory of 1188 884 msedge.exe 90 PID 884 wrote to memory of 1188 884 msedge.exe 90 PID 884 wrote to memory of 1188 884 msedge.exe 90 PID 884 wrote to memory of 1188 884 msedge.exe 90 PID 884 wrote to memory of 1188 884 msedge.exe 90 PID 884 wrote to memory of 1188 884 msedge.exe 90 PID 884 wrote to memory of 1188 884 msedge.exe 90 PID 884 wrote to memory of 1188 884 msedge.exe 90 PID 884 wrote to memory of 1188 884 msedge.exe 90 PID 884 wrote to memory of 1188 884 msedge.exe 90 PID 884 wrote to memory of 1188 884 msedge.exe 90 PID 884 wrote to memory of 1188 884 msedge.exe 90 PID 884 wrote to memory of 1188 884 msedge.exe 90 PID 884 wrote to memory of 1188 884 msedge.exe 90 PID 884 wrote to memory of 1188 884 msedge.exe 90 PID 884 wrote to memory of 1188 884 msedge.exe 90 PID 884 wrote to memory of 1188 884 msedge.exe 90 PID 884 wrote to memory of 1188 884 msedge.exe 90
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\a95004c950131e4686de6d61f1d7b547_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:884 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbe5ba46f8,0x7ffbe5ba4708,0x7ffbe5ba47182⤵PID:1392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,8903968044816191748,2452313065944583603,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 /prefetch:22⤵PID:1688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,8903968044816191748,2452313065944583603,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2192 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,8903968044816191748,2452313065944583603,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2844 /prefetch:82⤵PID:1188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,8903968044816191748,2452313065944583603,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:1972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,8903968044816191748,2452313065944583603,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:4420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,8903968044816191748,2452313065944583603,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4076 /prefetch:12⤵PID:4108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,8903968044816191748,2452313065944583603,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4436 /prefetch:12⤵PID:2568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,8903968044816191748,2452313065944583603,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3420 /prefetch:12⤵PID:3948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,8903968044816191748,2452313065944583603,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5324 /prefetch:12⤵PID:4372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,8903968044816191748,2452313065944583603,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5772 /prefetch:82⤵PID:1644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,8903968044816191748,2452313065944583603,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5772 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,8903968044816191748,2452313065944583603,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5812 /prefetch:12⤵PID:2104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,8903968044816191748,2452313065944583603,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5804 /prefetch:12⤵PID:2300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,8903968044816191748,2452313065944583603,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5292 /prefetch:12⤵PID:1644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,8903968044816191748,2452313065944583603,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6244 /prefetch:12⤵PID:4256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,8903968044816191748,2452313065944583603,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2232 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5092
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4976
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1280
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5709c6f4a32b317f6487b598788b6353d
SHA150f44d43be9630018f0bd2acb1528df07cd05b7f
SHA256353aff71e8cf078c88c836e66d86be266ddbe36496a597b9b5a5a87d21eae83b
SHA5124f33792eb73a792c88e8e2dc8bef7b00a2af7b1b91f4bab0cd5076dd2cb9abbb752eb7e60a4c6204d15f9bca1562915f2468b94e5f01f79279e1e7469055f0a3
-
Filesize
152B
MD59ebc024cdb324eb41f33c6ec63d1458d
SHA1f623e96981ee63c1b6879f682c4364fd5c2265e5
SHA25623b9bd7316816043f42a80784e7f247f3afebd3dbe370fbc702189a6a0dddb1f
SHA5126971b6430bc01a36c48bc1e41cf8c4bed65a2890837f7778a896072159940ae739d11834176cc7be6cf6fa0f2ea9e6764c30cd23beadcc88c390e5573bbad097
-
Filesize
209KB
MD53e552d017d45f8fd93b94cfc86f842f2
SHA1dbeebe83854328e2575ff67259e3fb6704b17a47
SHA25627d9c4613df7a3c04da0b79c13217aa69992b441acb7e44bf2a7578ca87d97d6
SHA512e616436f2f15615429c7c5c37de3990c3e86c5e1da7d75a0f524fc458b75d44a5be1a3648a628d63e1cf8aa062e08b538f2f2bc9c6a0b42157beb24f82c571d9
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize312B
MD5ca051d8c7c1cc9dbfed0524635a4df95
SHA1e7e51dea9ab6baaeff7ce11d7f450372fa6f54e6
SHA25662df66743237a3f5290d87f495128a950d56a899969e9a9fbb56fa7e32085988
SHA512ccf675a81b4e2e410f1959c449ee8ace159d17ced190ea432c393102f42abd679b7f6df965e08f457a9f5d471f5b7b03ab5abbed9398312816f90def9d1dfd39
-
Filesize
1KB
MD5a7e18064f5f6ac668fa903aa9c97c8a8
SHA1b4ee12a229892f42b668cd458ccdafcd18e069ad
SHA25683afb46ed3480f25bce676f6abbe1374e3aaa8341c4adb0ba2b15213a4ffa86d
SHA5122e2d015d1a74802ff774e6a1f13839fe89be76d270f2586e0916e9134de008721e4f36f453ec6a4ad68529e652cf0e55eb3bbf097f5849674652f7cd5d38be19
-
Filesize
5KB
MD5ab2dd96720bb1b52cbbdb038a1505383
SHA1844df090c2021cb32e7591ddd674ddbc6a8164fc
SHA256a92e91bfe06ab346fa4815d735042c27c02697fb75aa67637eeb3bee0065670e
SHA512c5105e9b2506010a578d0f6c101d447195bdefb0bb420734a3d991d82ba0f5b3220a7152544efff70b8c7e14a8af6804b14c881035d669ac3c1131a9328733fa
-
Filesize
6KB
MD5da9a9ada558c10574fcbe6edd6c7f618
SHA18ef0682419fe314398651ce7a849ca9826194954
SHA2562858b8617eaeaaca88e145f8aedb913eacd9cd90bf07a2bf9194a543db6d7f58
SHA51231f142917f49f6dd16a5932c8730ad469bcc83791ec94416de3dff6a0ee762ec3235f99775fdac0575a8573f5a4570b1ced896ac65c1f58ba91b180a3d2d6321
-
Filesize
24KB
MD5494a861dfe3fb61b7f6e9a8e1f92d179
SHA1903db9c91a888cdd2a359e921ea2c1a958228aa9
SHA25646ffd9cec0b1524402f64218ea9584cb751cd61e56eae54ac0ad61c55273c690
SHA512f97bfb87546ee38f100ef52f6ee6d102d05feb378a940954a1953f5dc301e6ae7a91de2b2176dcac165a61abf867e06e3e31572a378b1abd9ea2768de76e7175
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD586d0603207d36b9e3054261ff993650f
SHA1dc3284ff6791ca222c9ede8f1a746f8b15a4736f
SHA256e9676a3e4e54048c7345d2bdce2a8216c4bda96a963a40237e0789a4132f8da2
SHA512b2056212f6e062f7451538eeab33f54b17c50458f4d93d370f55f94696d2422328ac4b80c40d79c69629071bf0d629b936ec8f234df9adcc247e4f97f954291f