Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-08-2024 15:48
Static task
static1
Behavioral task
behavioral1
Sample
ab9d4c7fd221993d97ee6156644d515b_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
ab9d4c7fd221993d97ee6156644d515b_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ab9d4c7fd221993d97ee6156644d515b_JaffaCakes118.html
-
Size
11KB
-
MD5
ab9d4c7fd221993d97ee6156644d515b
-
SHA1
3f688cdf2665268914cc193aeb9a0c3d3cf10be9
-
SHA256
4760a17ec1aa00f77b8e6a58d436637ae5178e60468ddfdb668278e7a5c2a96e
-
SHA512
8998b15f3c431bb556d5fc672da3dd0e888b0e6f225d1a281e041a09dbbb87268d0638217a7f2443946654a03333a4d9abdfb35b2b34f2a9a263c8344ebb63b6
-
SSDEEP
192:2ValIsr0r57M4uxaHT8I2/w1wvqa18LOXuBuLbdU8d:salIcIQ4uxa/2/gg8LOXguLZ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4816 msedge.exe 4816 msedge.exe 4772 msedge.exe 4772 msedge.exe 2036 identity_helper.exe 2036 identity_helper.exe 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4772 wrote to memory of 4664 4772 msedge.exe 84 PID 4772 wrote to memory of 4664 4772 msedge.exe 84 PID 4772 wrote to memory of 512 4772 msedge.exe 85 PID 4772 wrote to memory of 512 4772 msedge.exe 85 PID 4772 wrote to memory of 512 4772 msedge.exe 85 PID 4772 wrote to memory of 512 4772 msedge.exe 85 PID 4772 wrote to memory of 512 4772 msedge.exe 85 PID 4772 wrote to memory of 512 4772 msedge.exe 85 PID 4772 wrote to memory of 512 4772 msedge.exe 85 PID 4772 wrote to memory of 512 4772 msedge.exe 85 PID 4772 wrote to memory of 512 4772 msedge.exe 85 PID 4772 wrote to memory of 512 4772 msedge.exe 85 PID 4772 wrote to memory of 512 4772 msedge.exe 85 PID 4772 wrote to memory of 512 4772 msedge.exe 85 PID 4772 wrote to memory of 512 4772 msedge.exe 85 PID 4772 wrote to memory of 512 4772 msedge.exe 85 PID 4772 wrote to memory of 512 4772 msedge.exe 85 PID 4772 wrote to memory of 512 4772 msedge.exe 85 PID 4772 wrote to memory of 512 4772 msedge.exe 85 PID 4772 wrote to memory of 512 4772 msedge.exe 85 PID 4772 wrote to memory of 512 4772 msedge.exe 85 PID 4772 wrote to memory of 512 4772 msedge.exe 85 PID 4772 wrote to memory of 512 4772 msedge.exe 85 PID 4772 wrote to memory of 512 4772 msedge.exe 85 PID 4772 wrote to memory of 512 4772 msedge.exe 85 PID 4772 wrote to memory of 512 4772 msedge.exe 85 PID 4772 wrote to memory of 512 4772 msedge.exe 85 PID 4772 wrote to memory of 512 4772 msedge.exe 85 PID 4772 wrote to memory of 512 4772 msedge.exe 85 PID 4772 wrote to memory of 512 4772 msedge.exe 85 PID 4772 wrote to memory of 512 4772 msedge.exe 85 PID 4772 wrote to memory of 512 4772 msedge.exe 85 PID 4772 wrote to memory of 512 4772 msedge.exe 85 PID 4772 wrote to memory of 512 4772 msedge.exe 85 PID 4772 wrote to memory of 512 4772 msedge.exe 85 PID 4772 wrote to memory of 512 4772 msedge.exe 85 PID 4772 wrote to memory of 512 4772 msedge.exe 85 PID 4772 wrote to memory of 512 4772 msedge.exe 85 PID 4772 wrote to memory of 512 4772 msedge.exe 85 PID 4772 wrote to memory of 512 4772 msedge.exe 85 PID 4772 wrote to memory of 512 4772 msedge.exe 85 PID 4772 wrote to memory of 512 4772 msedge.exe 85 PID 4772 wrote to memory of 4816 4772 msedge.exe 86 PID 4772 wrote to memory of 4816 4772 msedge.exe 86 PID 4772 wrote to memory of 1660 4772 msedge.exe 87 PID 4772 wrote to memory of 1660 4772 msedge.exe 87 PID 4772 wrote to memory of 1660 4772 msedge.exe 87 PID 4772 wrote to memory of 1660 4772 msedge.exe 87 PID 4772 wrote to memory of 1660 4772 msedge.exe 87 PID 4772 wrote to memory of 1660 4772 msedge.exe 87 PID 4772 wrote to memory of 1660 4772 msedge.exe 87 PID 4772 wrote to memory of 1660 4772 msedge.exe 87 PID 4772 wrote to memory of 1660 4772 msedge.exe 87 PID 4772 wrote to memory of 1660 4772 msedge.exe 87 PID 4772 wrote to memory of 1660 4772 msedge.exe 87 PID 4772 wrote to memory of 1660 4772 msedge.exe 87 PID 4772 wrote to memory of 1660 4772 msedge.exe 87 PID 4772 wrote to memory of 1660 4772 msedge.exe 87 PID 4772 wrote to memory of 1660 4772 msedge.exe 87 PID 4772 wrote to memory of 1660 4772 msedge.exe 87 PID 4772 wrote to memory of 1660 4772 msedge.exe 87 PID 4772 wrote to memory of 1660 4772 msedge.exe 87 PID 4772 wrote to memory of 1660 4772 msedge.exe 87 PID 4772 wrote to memory of 1660 4772 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\ab9d4c7fd221993d97ee6156644d515b_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4772 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffabc4646f8,0x7ffabc464708,0x7ffabc4647182⤵PID:4664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,7978348218799941139,15473463335192660403,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:22⤵PID:512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2044,7978348218799941139,15473463335192660403,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2208 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2044,7978348218799941139,15473463335192660403,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2892 /prefetch:82⤵PID:1660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,7978348218799941139,15473463335192660403,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:8
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,7978348218799941139,15473463335192660403,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,7978348218799941139,15473463335192660403,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4664 /prefetch:12⤵PID:536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2044,7978348218799941139,15473463335192660403,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6080 /prefetch:82⤵PID:4576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2044,7978348218799941139,15473463335192660403,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6080 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,7978348218799941139,15473463335192660403,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5408 /prefetch:12⤵PID:4684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,7978348218799941139,15473463335192660403,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5480 /prefetch:12⤵PID:2260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,7978348218799941139,15473463335192660403,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6004 /prefetch:12⤵PID:2884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,7978348218799941139,15473463335192660403,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4908 /prefetch:12⤵PID:4924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,7978348218799941139,15473463335192660403,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1592 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4504
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2264
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1616
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d7114a6cd851f9bf56cf771c37d664a2
SHA1769c5d04fd83e583f15ab1ef659de8f883ecab8a
SHA256d2c75c7d68c474d4b8847b4ba6cfd09fe90717f46dd398c86483d825a66e977e
SHA51233bdae2305ae98e7c0de576de5a6600bd70a425e7b891d745cba9de992036df1b3d1df9572edb0f89f320e50962d06532dae9491985b6b57fd37d5f46f7a2ff8
-
Filesize
152B
MD5719923124ee00fb57378e0ebcbe894f7
SHA1cc356a7d27b8b27dc33f21bd4990f286ee13a9f9
SHA256aa22ab845fa08c786bd3366ec39f733d5be80e9ac933ed115ff048ff30090808
SHA512a207b6646500d0d504cf70ee10f57948e58dab7f214ad2e7c4af0e7ca23ce1d37c8c745873137e6c55bdcf0f527031a66d9cc54805a0eac3678be6dd497a5bbc
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize168B
MD5062b8786fd5b9271e50213d645136ceb
SHA14f4f2f7b8f2bbc04282f5b9627bdcc02f6db53c1
SHA256c16ed6b5bfeb38bff7b5f28ff338a7f68b810e7db2913eb64e1af2b9e064d88f
SHA5127a84cd95040e4e6a4341f14afffc5ca701ca1d77b47b45e7d4b04ec3d7da434cf918972ebb169f257cd32b494e08957cf38a131a9a1e61955fe9065d1cadd4bb
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
5KB
MD538af4441092f755470a14af7d9716d91
SHA152b0e20113052d9404da1d629e6bec742d3e06c4
SHA256e3071dfab270d303a73d08fb4270fac21d02fcf53b731f21f3295097be4cc306
SHA5124a3be53a335e49f4b4cd80c465c0189fadd46552ef31c1beb4a1f6c267489190f117b3e377d87b6fe9af9d0f631d53f33ce8c9372aad4e4717b8938748500b0d
-
Filesize
6KB
MD528daf449f8ae3d013470c293c93dcf02
SHA1968b83a6727342b1b327325622b48091892266b6
SHA256dd2f3a8c1f0fa5554f69bc4e5891d07945292f3d7f8a320bd2ed63ece4d55fc3
SHA5121dd26b3587224afc003c70e1dc814b0b1212c1025079725d2c0277ba683fdeb3b029abeb8c466cace9cbea15156f8065c64a18fa614f950d57ea2ceb4080d89b
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD529657def4e286db5e4119871860f0a06
SHA1724c9f907ae8120921bba2645d47a60f9e70b7e1
SHA256cd15ee6f7591ac60d2f116ac9b87e3d0251d3110f3297beacfdd5d7b90ad7b1b
SHA51227818358cff96b9789a96e03fa79d1d05a3cd7eb4ff01cd4184776ffd8e8748e902c16d731115005ae7d00722518bdafa5c2d2a5c8123546c968eaed1ac4f54d