Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20-08-2024 06:37
Static task
static1
Behavioral task
behavioral1
Sample
ae327e7e820166babbe139844a1f1473_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ae327e7e820166babbe139844a1f1473_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ae327e7e820166babbe139844a1f1473_JaffaCakes118.html
-
Size
88KB
-
MD5
ae327e7e820166babbe139844a1f1473
-
SHA1
d997a77c7e5c0c3dbd1d0a42f4c2cb7c774e8b1d
-
SHA256
31312fc6c1569e26af4607095f7c29bd7cc639ca5bcfbd0d4a48da662b7c48de
-
SHA512
4533737eb6d294ea8afcd37ca7efa9746f197f2a26cd2bd451199bde6c6982008ff5850a2968a068dc35a27de8870c393d673fceba28239e2a17ebc5e79e2e7c
-
SSDEEP
1536:jAG4491wIbeOFMQNsDuHSkLE4GY/JNL2+q4JJdRIYXPb/LXxFjbpw9CtrobwpJqQ:j2491neOFMcsKNrhvq4JJdRIYXPb/LXp
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4460 msedge.exe 4460 msedge.exe 1904 msedge.exe 1904 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 1904 msedge.exe 1904 msedge.exe 1904 msedge.exe 1904 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1904 msedge.exe 1904 msedge.exe 1904 msedge.exe 1904 msedge.exe 1904 msedge.exe 1904 msedge.exe 1904 msedge.exe 1904 msedge.exe 1904 msedge.exe 1904 msedge.exe 1904 msedge.exe 1904 msedge.exe 1904 msedge.exe 1904 msedge.exe 1904 msedge.exe 1904 msedge.exe 1904 msedge.exe 1904 msedge.exe 1904 msedge.exe 1904 msedge.exe 1904 msedge.exe 1904 msedge.exe 1904 msedge.exe 1904 msedge.exe 1904 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1904 msedge.exe 1904 msedge.exe 1904 msedge.exe 1904 msedge.exe 1904 msedge.exe 1904 msedge.exe 1904 msedge.exe 1904 msedge.exe 1904 msedge.exe 1904 msedge.exe 1904 msedge.exe 1904 msedge.exe 1904 msedge.exe 1904 msedge.exe 1904 msedge.exe 1904 msedge.exe 1904 msedge.exe 1904 msedge.exe 1904 msedge.exe 1904 msedge.exe 1904 msedge.exe 1904 msedge.exe 1904 msedge.exe 1904 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1904 wrote to memory of 2572 1904 msedge.exe 84 PID 1904 wrote to memory of 2572 1904 msedge.exe 84 PID 1904 wrote to memory of 2968 1904 msedge.exe 85 PID 1904 wrote to memory of 2968 1904 msedge.exe 85 PID 1904 wrote to memory of 2968 1904 msedge.exe 85 PID 1904 wrote to memory of 2968 1904 msedge.exe 85 PID 1904 wrote to memory of 2968 1904 msedge.exe 85 PID 1904 wrote to memory of 2968 1904 msedge.exe 85 PID 1904 wrote to memory of 2968 1904 msedge.exe 85 PID 1904 wrote to memory of 2968 1904 msedge.exe 85 PID 1904 wrote to memory of 2968 1904 msedge.exe 85 PID 1904 wrote to memory of 2968 1904 msedge.exe 85 PID 1904 wrote to memory of 2968 1904 msedge.exe 85 PID 1904 wrote to memory of 2968 1904 msedge.exe 85 PID 1904 wrote to memory of 2968 1904 msedge.exe 85 PID 1904 wrote to memory of 2968 1904 msedge.exe 85 PID 1904 wrote to memory of 2968 1904 msedge.exe 85 PID 1904 wrote to memory of 2968 1904 msedge.exe 85 PID 1904 wrote to memory of 2968 1904 msedge.exe 85 PID 1904 wrote to memory of 2968 1904 msedge.exe 85 PID 1904 wrote to memory of 2968 1904 msedge.exe 85 PID 1904 wrote to memory of 2968 1904 msedge.exe 85 PID 1904 wrote to memory of 2968 1904 msedge.exe 85 PID 1904 wrote to memory of 2968 1904 msedge.exe 85 PID 1904 wrote to memory of 2968 1904 msedge.exe 85 PID 1904 wrote to memory of 2968 1904 msedge.exe 85 PID 1904 wrote to memory of 2968 1904 msedge.exe 85 PID 1904 wrote to memory of 2968 1904 msedge.exe 85 PID 1904 wrote to memory of 2968 1904 msedge.exe 85 PID 1904 wrote to memory of 2968 1904 msedge.exe 85 PID 1904 wrote to memory of 2968 1904 msedge.exe 85 PID 1904 wrote to memory of 2968 1904 msedge.exe 85 PID 1904 wrote to memory of 2968 1904 msedge.exe 85 PID 1904 wrote to memory of 2968 1904 msedge.exe 85 PID 1904 wrote to memory of 2968 1904 msedge.exe 85 PID 1904 wrote to memory of 2968 1904 msedge.exe 85 PID 1904 wrote to memory of 2968 1904 msedge.exe 85 PID 1904 wrote to memory of 2968 1904 msedge.exe 85 PID 1904 wrote to memory of 2968 1904 msedge.exe 85 PID 1904 wrote to memory of 2968 1904 msedge.exe 85 PID 1904 wrote to memory of 2968 1904 msedge.exe 85 PID 1904 wrote to memory of 2968 1904 msedge.exe 85 PID 1904 wrote to memory of 4460 1904 msedge.exe 86 PID 1904 wrote to memory of 4460 1904 msedge.exe 86 PID 1904 wrote to memory of 4332 1904 msedge.exe 87 PID 1904 wrote to memory of 4332 1904 msedge.exe 87 PID 1904 wrote to memory of 4332 1904 msedge.exe 87 PID 1904 wrote to memory of 4332 1904 msedge.exe 87 PID 1904 wrote to memory of 4332 1904 msedge.exe 87 PID 1904 wrote to memory of 4332 1904 msedge.exe 87 PID 1904 wrote to memory of 4332 1904 msedge.exe 87 PID 1904 wrote to memory of 4332 1904 msedge.exe 87 PID 1904 wrote to memory of 4332 1904 msedge.exe 87 PID 1904 wrote to memory of 4332 1904 msedge.exe 87 PID 1904 wrote to memory of 4332 1904 msedge.exe 87 PID 1904 wrote to memory of 4332 1904 msedge.exe 87 PID 1904 wrote to memory of 4332 1904 msedge.exe 87 PID 1904 wrote to memory of 4332 1904 msedge.exe 87 PID 1904 wrote to memory of 4332 1904 msedge.exe 87 PID 1904 wrote to memory of 4332 1904 msedge.exe 87 PID 1904 wrote to memory of 4332 1904 msedge.exe 87 PID 1904 wrote to memory of 4332 1904 msedge.exe 87 PID 1904 wrote to memory of 4332 1904 msedge.exe 87 PID 1904 wrote to memory of 4332 1904 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\ae327e7e820166babbe139844a1f1473_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff3b0a46f8,0x7fff3b0a4708,0x7fff3b0a47182⤵PID:2572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,11993158421015461730,14684722503824854463,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2088 /prefetch:22⤵PID:2968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2060,11993158421015461730,14684722503824854463,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2384 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2060,11993158421015461730,14684722503824854463,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2844 /prefetch:82⤵PID:4332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,11993158421015461730,14684722503824854463,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:3720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,11993158421015461730,14684722503824854463,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:2144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,11993158421015461730,14684722503824854463,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4876 /prefetch:12⤵PID:4608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,11993158421015461730,14684722503824854463,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4856 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,11993158421015461730,14684722503824854463,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4892 /prefetch:12⤵PID:1560
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2164
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1664
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ff63763eedb406987ced076e36ec9acf
SHA116365aa97cd1a115412f8ae436d5d4e9be5f7b5d
SHA2568f460e8b7a67f0c65b7248961a7c71146c9e7a19772b193972b486dbf05b8e4c
SHA512ce90336169c8b2de249d4faea2519bf7c3df48ae9d77cdf471dd5dbd8e8542d47d9348080a098074aa63c255890850ee3b80ddb8eef8384919fdca3bb9371d9f
-
Filesize
152B
MD52783c40400a8912a79cfd383da731086
SHA1001a131fe399c30973089e18358818090ca81789
SHA256331fa67da5f67bbb42794c3aeab8f7819f35347460ffb352ccc914e0373a22c5
SHA512b7c7d3aa966ad39a86aae02479649d74dcbf29d9cb3a7ff8b9b2354ea60704da55f5c0df803fd0a7191170a8e72fdd5eacfa1a739d7a74e390a7b74bdced1685
-
Filesize
67KB
MD5b4b711f3e747704ffe02b49791ce8cac
SHA1ac7ce4cbd3c8ee66e3c8d9d209c1352c160c3b89
SHA256f65bf40e2f0ce993b54772f703f72d53f0fa925457346fa8ec2031879ffa91d1
SHA512b738deba57337a9147927f7dd35eab7c999dea6d2ff11f57fdc2e5b6f64326028a54778886548ba128a3f03ee333cc9e43de5162d8b578b85c290626577042db
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD57c26e450f2a92b156b4dce38a3d03fe1
SHA16b3f5deb8d68a3662d2f946d7c9ca4423d600eb4
SHA2569cb25b2b1b83938dc5a374505a3d8a4412983d233e371ba2c7bc654c3f762492
SHA512f8bd3c5ed7f69ca9273403ace0e61f5b8f80900aea1de46ef505de15167a5a206f1cf19622a65ba282412659b03d98e3cc30d257e5fca50249b0d9c428e88737
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD5e5a49e37cced41462feff579b656e4f6
SHA11a89e7237c154dc3cba06444ee467336de7bbaf8
SHA256aec675687322977255f5177ed193ad11541d7caddae0397f92b8a474227e20fe
SHA51258195798d1c9070252aae21aeecf8d0fd2e4c54cbda965787a6901dc2049185d079d704a0b2a72e37c1c728d51b5e5eef12f2498c59a8496bd517869e4dae320
-
Filesize
879B
MD50ba5c0f49a399fe272f0ef9edeb2ccf8
SHA12bed19d74a56813ab78715962dbb0f42a081bd65
SHA256faf41a1aae9873b9c38cba4bde625f3eef981f0196689c190ba6c9939e963647
SHA51219bbfd2892a90dcfb01b3f18850cf850d6e915c3e2516d8b4ead4a7e31547f8a08ae26decacedbb4433bc66e25ff8e4fc7650022e02a6f061381e9df29070f08
-
Filesize
1KB
MD54ae1886ea87041f2b1a9a433a159535b
SHA1e1b88012093043251e47199b9de911a1315fde9c
SHA2561aebf972491c6fc4c3941f75ed6971532e503119d85b03eb5c31ebab9fee43ba
SHA512ea81b78bc636b3a9912b8152d6da10614483bfa8eaed59f1476fbd199b48dd762e669e050a881d061baddfb1fd58e36b609cede3de12126e8ab3e9d9147b9cca
-
Filesize
5KB
MD55c3fa2a53be92189e36a748611959b87
SHA13ab6cc3c2672de862229a4af613d06f81578da45
SHA2567759e38ca6e7d9fbb75ee41bee158dd85f597d7f45b393a7462309190eccb541
SHA51243feeb15d51013b254d270dff8454f94e39657c15ee15dea4f3f3ebe26dd678303cc29459238f717ab61d869f7d2356712d5fc017e9198619690a5403cca6a91
-
Filesize
6KB
MD541d226e953c25b39425079d875dbacad
SHA10eed3eeb79ed3d17ea0050a64a30cb505a4981ee
SHA2564c2231bbf8fb4c1dcf379dc1fb9258786c42797b054d15f9b15682cfbad45356
SHA512cf4fc2654576c628b49eb8dd99d7e4f5342e4abd4b9d50eb7874b0702f8ad6396ea8bb40fb7ca17c58d0960746e07383d6fdfb57369c80c16c79925e6a16e2df
-
Filesize
370B
MD5cdc6f46a132c5d6eede50a5eac35c79c
SHA1eadde4dc45d8fcf064ea50b0d19916568f26bc2a
SHA256c29bffaef0ff8e9dc2b48d227121fc37e9818358934a721ac03ef77da660cf82
SHA512dd5169aeebd776b3f4bf0abc5569f1aeee1d3272b9b1c5753ac0e13292dd253d73f9c746dcad4c79bda3916a422bae0ab770aa6e6eee33b23f47dc2e2b134780
-
Filesize
203B
MD5a83f8911792383e910352be6df4bd9fe
SHA1bdcf1781ef29c5f3014916c6f16959f8c49e3b02
SHA2560035faa531ad45b4039fe9f979190e21856bf9c2baf7502238a2cde8db4bfab9
SHA51267046ce4e38d8a208a2e3e3a602abf0c862de2266e8af844f68725a83b5c050408109dca4616bb98abce0586be7531dea0c503ecb6ea3611840d23dca1f06010
-
Filesize
10KB
MD59f1c7f3984f20b647ca280e77b2b4992
SHA1d23b290b2f029b5fbd225cb2f3acbc8be8ac5bae
SHA256fa0779bf9a83417e14149a8cb20b26c3d8a4b8d69529d1fac502f80717ea4063
SHA5122485cb2dc85b5b8dec457fbc68a05307c5187239996f53be08179bdaf81538f0a150d71a8cd0a486392638f558c6be34f679791d150128a0fe244e82e3fcb9c1