Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20-08-2024 03:04
Static task
static1
Behavioral task
behavioral1
Sample
ada62ef803e8ca80891300dc165d673a_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
ada62ef803e8ca80891300dc165d673a_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ada62ef803e8ca80891300dc165d673a_JaffaCakes118.html
-
Size
41KB
-
MD5
ada62ef803e8ca80891300dc165d673a
-
SHA1
e17354476a3604bd772166d50463736f30020086
-
SHA256
e81975de3c4ea6c6ec7633571f79c03e6c2830cb1c01a3c264edf12486a5753f
-
SHA512
a478172e3783b30445d792ec297f55cf442d199dbffaf7fb85fab5d1ad28371fd1254d125c5b97ae38e18540106bde26af914481ff20fb7be576956ffaa131eb
-
SSDEEP
768:layHHvPWltNnbnaYcRslriL/OiCo6KAJniNtZg:l3HH2ltNn7aYcRbmiC3niNM
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1428 msedge.exe 1428 msedge.exe 4580 msedge.exe 4580 msedge.exe 1212 identity_helper.exe 1212 identity_helper.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4580 wrote to memory of 3444 4580 msedge.exe 84 PID 4580 wrote to memory of 3444 4580 msedge.exe 84 PID 4580 wrote to memory of 1480 4580 msedge.exe 85 PID 4580 wrote to memory of 1480 4580 msedge.exe 85 PID 4580 wrote to memory of 1480 4580 msedge.exe 85 PID 4580 wrote to memory of 1480 4580 msedge.exe 85 PID 4580 wrote to memory of 1480 4580 msedge.exe 85 PID 4580 wrote to memory of 1480 4580 msedge.exe 85 PID 4580 wrote to memory of 1480 4580 msedge.exe 85 PID 4580 wrote to memory of 1480 4580 msedge.exe 85 PID 4580 wrote to memory of 1480 4580 msedge.exe 85 PID 4580 wrote to memory of 1480 4580 msedge.exe 85 PID 4580 wrote to memory of 1480 4580 msedge.exe 85 PID 4580 wrote to memory of 1480 4580 msedge.exe 85 PID 4580 wrote to memory of 1480 4580 msedge.exe 85 PID 4580 wrote to memory of 1480 4580 msedge.exe 85 PID 4580 wrote to memory of 1480 4580 msedge.exe 85 PID 4580 wrote to memory of 1480 4580 msedge.exe 85 PID 4580 wrote to memory of 1480 4580 msedge.exe 85 PID 4580 wrote to memory of 1480 4580 msedge.exe 85 PID 4580 wrote to memory of 1480 4580 msedge.exe 85 PID 4580 wrote to memory of 1480 4580 msedge.exe 85 PID 4580 wrote to memory of 1480 4580 msedge.exe 85 PID 4580 wrote to memory of 1480 4580 msedge.exe 85 PID 4580 wrote to memory of 1480 4580 msedge.exe 85 PID 4580 wrote to memory of 1480 4580 msedge.exe 85 PID 4580 wrote to memory of 1480 4580 msedge.exe 85 PID 4580 wrote to memory of 1480 4580 msedge.exe 85 PID 4580 wrote to memory of 1480 4580 msedge.exe 85 PID 4580 wrote to memory of 1480 4580 msedge.exe 85 PID 4580 wrote to memory of 1480 4580 msedge.exe 85 PID 4580 wrote to memory of 1480 4580 msedge.exe 85 PID 4580 wrote to memory of 1480 4580 msedge.exe 85 PID 4580 wrote to memory of 1480 4580 msedge.exe 85 PID 4580 wrote to memory of 1480 4580 msedge.exe 85 PID 4580 wrote to memory of 1480 4580 msedge.exe 85 PID 4580 wrote to memory of 1480 4580 msedge.exe 85 PID 4580 wrote to memory of 1480 4580 msedge.exe 85 PID 4580 wrote to memory of 1480 4580 msedge.exe 85 PID 4580 wrote to memory of 1480 4580 msedge.exe 85 PID 4580 wrote to memory of 1480 4580 msedge.exe 85 PID 4580 wrote to memory of 1480 4580 msedge.exe 85 PID 4580 wrote to memory of 1428 4580 msedge.exe 86 PID 4580 wrote to memory of 1428 4580 msedge.exe 86 PID 4580 wrote to memory of 2408 4580 msedge.exe 87 PID 4580 wrote to memory of 2408 4580 msedge.exe 87 PID 4580 wrote to memory of 2408 4580 msedge.exe 87 PID 4580 wrote to memory of 2408 4580 msedge.exe 87 PID 4580 wrote to memory of 2408 4580 msedge.exe 87 PID 4580 wrote to memory of 2408 4580 msedge.exe 87 PID 4580 wrote to memory of 2408 4580 msedge.exe 87 PID 4580 wrote to memory of 2408 4580 msedge.exe 87 PID 4580 wrote to memory of 2408 4580 msedge.exe 87 PID 4580 wrote to memory of 2408 4580 msedge.exe 87 PID 4580 wrote to memory of 2408 4580 msedge.exe 87 PID 4580 wrote to memory of 2408 4580 msedge.exe 87 PID 4580 wrote to memory of 2408 4580 msedge.exe 87 PID 4580 wrote to memory of 2408 4580 msedge.exe 87 PID 4580 wrote to memory of 2408 4580 msedge.exe 87 PID 4580 wrote to memory of 2408 4580 msedge.exe 87 PID 4580 wrote to memory of 2408 4580 msedge.exe 87 PID 4580 wrote to memory of 2408 4580 msedge.exe 87 PID 4580 wrote to memory of 2408 4580 msedge.exe 87 PID 4580 wrote to memory of 2408 4580 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\ada62ef803e8ca80891300dc165d673a_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4580 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xfc,0xd8,0x7ffe72da46f8,0x7ffe72da4708,0x7ffe72da47182⤵PID:3444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,8426965681613917515,10985852110504459881,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:22⤵PID:1480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2076,8426965681613917515,10985852110504459881,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2076,8426965681613917515,10985852110504459881,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2516 /prefetch:82⤵PID:2408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,8426965681613917515,10985852110504459881,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:1608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,8426965681613917515,10985852110504459881,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:3624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,8426965681613917515,10985852110504459881,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4052 /prefetch:12⤵PID:3336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,8426965681613917515,10985852110504459881,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4880 /prefetch:12⤵PID:3540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,8426965681613917515,10985852110504459881,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4872 /prefetch:12⤵PID:1764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,8426965681613917515,10985852110504459881,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4924 /prefetch:82⤵PID:3188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,8426965681613917515,10985852110504459881,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4924 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,8426965681613917515,10985852110504459881,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2652 /prefetch:12⤵PID:4988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,8426965681613917515,10985852110504459881,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5724 /prefetch:12⤵PID:3604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,8426965681613917515,10985852110504459881,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4120 /prefetch:12⤵PID:3856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,8426965681613917515,10985852110504459881,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5916 /prefetch:12⤵PID:5092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,8426965681613917515,10985852110504459881,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1780 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2780
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4396
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1732
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD557bd56d047eeb8474c904869c8ca2ad1
SHA136573e15854aae7f96cff277cfbb0154285b50b5
SHA256e106bbd5017470b6cff3a1fda9d1e1137d6f47a9c647332a2699facee1c6c18c
SHA512b1f767b0a13e223fccdcedf6a3670beabc70d0c4c9f89f8febabaead6bb7c1c48d7c26579fde1e2c44424eb6bbc73027ca9995383846e05624640cf81cc31527
-
Filesize
152B
MD5e4f80e7950cbd3bb11257d2000cb885e
SHA110ac643904d539042d8f7aa4a312b13ec2106035
SHA2561184ee8d32d0edecddd93403fb888fad6b3e2a710d37335c3989cc529bc08124
SHA5122b92c9807fdcd937e514d4e7e1cc7c2d3e3aa162099b7289ceac2feea72d1a4afbadf1c09b3075d470efadf9a9edd63e07ea7e7a98d22243e45b3d53473fa4f0
-
Filesize
152B
MD52dc1a9f2f3f8c3cfe51bb29b078166c5
SHA1eaf3c3dad3c8dc6f18dc3e055b415da78b704402
SHA256dcb76fa365c2d9ee213b224a91cdd806d30b1e8652d72a22f2371124fa4479fa
SHA512682061d9cc86a6e5d99d022da776fb554350fc95efbf29cd84c1db4e2b7161b76cd1de48335bcc3a25633079fb0bd412e4f4795ed6291c65e9bc28d95330bb25
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD5a61a39f4cc5222d184405341d0121ad6
SHA1f37a154460365b580cba28b13a9c6c3db3dca22a
SHA25659e31f872eda7439ab1879cfc98f34f22fed6c6898a92f405161b6103b75218f
SHA51290611ba1b755092d75501744ef81ef3cb7278677b4a259dcd3af0dadd28a54ddbcb913fb6522eb9c6777440dbe105f0d4a2ee01bca23f42ce6c88ffe05e72353
-
Filesize
1KB
MD5475cd584b251b06273a887b26edafb45
SHA13acd42dc0f972b98ded5419faaa5cda83ebbed44
SHA256efee6c2047ce4e200497896d61c13a86227175098562ff8fb167b0ba50986a48
SHA5129442afc9f5759ade5115412764f2c1a70c6b14f10e9a8640efe1347fcdcaeeb247a980e10bd265c864a7bcc56d08798e9fcfac1d5138696e1d2bd20ef5fbae40
-
Filesize
5KB
MD588eb2838756b9b39a807bfb49d30be25
SHA1165478aa7337ba607dc8a67318deed4e8905b157
SHA256cebf5f1a774bdc3a3d8f9eb50a301bf8e597919f5db173ff2c50ed2e01dd45c2
SHA51229f97b5851c957fc4931ec51385f3ba8d6d8b09bd2411401ceb5d7707ea2d11c211a7956411e4cc86c27ff33c0511a7f12964086eb236524d8cb14f39b848763
-
Filesize
6KB
MD52c482aef102a2bd31d89409c90ffd55a
SHA1be3c46a7f4ed1c7a243a8bf5b8a95e647a9e5c28
SHA25696f35e3ee520b8aa37639f1ab21c6ad1655215f0f1c6a04cf0be2db472db708d
SHA51293b8fa343bd9963d93e621e4a2077011a49c26e53d0122349c72b441bdd57728c3d2fc49feabe099016a9b088af0d5453b42976f0c1971d5580b2392d51be2d2
-
Filesize
6KB
MD5ba7131cb39d60e47a07f482e99d59200
SHA16fddb65b6bcc98ae157972139c3d2917e5d36972
SHA25644bf0b4edce50f5382e02ba2d4382beaeab50abb6a1dcf78ff7acbae1f0fe7ce
SHA5127827054cb8934f8c02a21733085ad5a574f785d6b809e5196549c67bf6c19ca0c3b854a9a7cf7999d00a56e7474d33958125b60185780b8ded428be0f99eb002
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389