Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20/08/2024, 10:57
Static task
static1
Behavioral task
behavioral1
Sample
aef3aebea2960ddfb7f24bfc4893b2e2_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
aef3aebea2960ddfb7f24bfc4893b2e2_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
aef3aebea2960ddfb7f24bfc4893b2e2_JaffaCakes118.html
-
Size
44KB
-
MD5
aef3aebea2960ddfb7f24bfc4893b2e2
-
SHA1
c863f950708e6f63bf709326210bdcfc7c0d16a5
-
SHA256
958017be70c559b0e82593d60a8bd230b3c78c1ae13412961510714ad0685aa0
-
SHA512
8ec0bd71d4aca51861f472d4ccb1963616e16255bfd9388be8df3a4b2fdf57be4c58f5a013b8e98f00f5820bcfc94ae89fc4a13acabe2096f3a2b65a9ade1259
-
SSDEEP
768:Zcd9QZBC7mOdMYvpC5I9nC43lKpdEm7hvYAxhzqqeiWwuwDw/AwoPd:gQZBCCOdj0IxCGlKpdBhv2wuwDwIwoPd
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4176 msedge.exe 4176 msedge.exe 1148 msedge.exe 1148 msedge.exe 3740 identity_helper.exe 3740 identity_helper.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1148 wrote to memory of 2240 1148 msedge.exe 85 PID 1148 wrote to memory of 2240 1148 msedge.exe 85 PID 1148 wrote to memory of 3648 1148 msedge.exe 86 PID 1148 wrote to memory of 3648 1148 msedge.exe 86 PID 1148 wrote to memory of 3648 1148 msedge.exe 86 PID 1148 wrote to memory of 3648 1148 msedge.exe 86 PID 1148 wrote to memory of 3648 1148 msedge.exe 86 PID 1148 wrote to memory of 3648 1148 msedge.exe 86 PID 1148 wrote to memory of 3648 1148 msedge.exe 86 PID 1148 wrote to memory of 3648 1148 msedge.exe 86 PID 1148 wrote to memory of 3648 1148 msedge.exe 86 PID 1148 wrote to memory of 3648 1148 msedge.exe 86 PID 1148 wrote to memory of 3648 1148 msedge.exe 86 PID 1148 wrote to memory of 3648 1148 msedge.exe 86 PID 1148 wrote to memory of 3648 1148 msedge.exe 86 PID 1148 wrote to memory of 3648 1148 msedge.exe 86 PID 1148 wrote to memory of 3648 1148 msedge.exe 86 PID 1148 wrote to memory of 3648 1148 msedge.exe 86 PID 1148 wrote to memory of 3648 1148 msedge.exe 86 PID 1148 wrote to memory of 3648 1148 msedge.exe 86 PID 1148 wrote to memory of 3648 1148 msedge.exe 86 PID 1148 wrote to memory of 3648 1148 msedge.exe 86 PID 1148 wrote to memory of 3648 1148 msedge.exe 86 PID 1148 wrote to memory of 3648 1148 msedge.exe 86 PID 1148 wrote to memory of 3648 1148 msedge.exe 86 PID 1148 wrote to memory of 3648 1148 msedge.exe 86 PID 1148 wrote to memory of 3648 1148 msedge.exe 86 PID 1148 wrote to memory of 3648 1148 msedge.exe 86 PID 1148 wrote to memory of 3648 1148 msedge.exe 86 PID 1148 wrote to memory of 3648 1148 msedge.exe 86 PID 1148 wrote to memory of 3648 1148 msedge.exe 86 PID 1148 wrote to memory of 3648 1148 msedge.exe 86 PID 1148 wrote to memory of 3648 1148 msedge.exe 86 PID 1148 wrote to memory of 3648 1148 msedge.exe 86 PID 1148 wrote to memory of 3648 1148 msedge.exe 86 PID 1148 wrote to memory of 3648 1148 msedge.exe 86 PID 1148 wrote to memory of 3648 1148 msedge.exe 86 PID 1148 wrote to memory of 3648 1148 msedge.exe 86 PID 1148 wrote to memory of 3648 1148 msedge.exe 86 PID 1148 wrote to memory of 3648 1148 msedge.exe 86 PID 1148 wrote to memory of 3648 1148 msedge.exe 86 PID 1148 wrote to memory of 3648 1148 msedge.exe 86 PID 1148 wrote to memory of 4176 1148 msedge.exe 87 PID 1148 wrote to memory of 4176 1148 msedge.exe 87 PID 1148 wrote to memory of 2144 1148 msedge.exe 88 PID 1148 wrote to memory of 2144 1148 msedge.exe 88 PID 1148 wrote to memory of 2144 1148 msedge.exe 88 PID 1148 wrote to memory of 2144 1148 msedge.exe 88 PID 1148 wrote to memory of 2144 1148 msedge.exe 88 PID 1148 wrote to memory of 2144 1148 msedge.exe 88 PID 1148 wrote to memory of 2144 1148 msedge.exe 88 PID 1148 wrote to memory of 2144 1148 msedge.exe 88 PID 1148 wrote to memory of 2144 1148 msedge.exe 88 PID 1148 wrote to memory of 2144 1148 msedge.exe 88 PID 1148 wrote to memory of 2144 1148 msedge.exe 88 PID 1148 wrote to memory of 2144 1148 msedge.exe 88 PID 1148 wrote to memory of 2144 1148 msedge.exe 88 PID 1148 wrote to memory of 2144 1148 msedge.exe 88 PID 1148 wrote to memory of 2144 1148 msedge.exe 88 PID 1148 wrote to memory of 2144 1148 msedge.exe 88 PID 1148 wrote to memory of 2144 1148 msedge.exe 88 PID 1148 wrote to memory of 2144 1148 msedge.exe 88 PID 1148 wrote to memory of 2144 1148 msedge.exe 88 PID 1148 wrote to memory of 2144 1148 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\aef3aebea2960ddfb7f24bfc4893b2e2_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb538f46f8,0x7ffb538f4708,0x7ffb538f47182⤵PID:2240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,16296110426984289573,4044927279048902040,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵PID:3648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2056,16296110426984289573,4044927279048902040,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2056,16296110426984289573,4044927279048902040,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2776 /prefetch:82⤵PID:2144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,16296110426984289573,4044927279048902040,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:1228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,16296110426984289573,4044927279048902040,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:1192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,16296110426984289573,4044927279048902040,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4148 /prefetch:12⤵PID:4152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,16296110426984289573,4044927279048902040,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5060 /prefetch:12⤵PID:2516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,16296110426984289573,4044927279048902040,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5244 /prefetch:12⤵PID:5016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,16296110426984289573,4044927279048902040,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5824 /prefetch:82⤵PID:1400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,16296110426984289573,4044927279048902040,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5824 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,16296110426984289573,4044927279048902040,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5452 /prefetch:12⤵PID:4696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,16296110426984289573,4044927279048902040,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4080 /prefetch:12⤵PID:4836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,16296110426984289573,4044927279048902040,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6068 /prefetch:12⤵PID:5208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,16296110426984289573,4044927279048902040,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4028 /prefetch:12⤵PID:5216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,16296110426984289573,4044927279048902040,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5940 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2172
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2476
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4496
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ecf7ca53c80b5245e35839009d12f866
SHA1a7af77cf31d410708ebd35a232a80bddfb0615bb
SHA256882a513b71b26210ff251769b82b2c5d59a932f96d9ce606ca2fab6530a13687
SHA512706722bd22ce27d854036b1b16e6a3cdb36284b66edc76238a79c2e11cee7d1307b121c898ad832eb1af73e4f08d991d64dc0bff529896ffb4ebe9b3dc381696
-
Filesize
152B
MD54dd2754d1bea40445984d65abee82b21
SHA14b6a5658bae9a784a370a115fbb4a12e92bd3390
SHA256183b8e82a0deaa83d04736553671cedb738adc909f483b3c5f822a0e6be7477d
SHA51292d44ee372ad33f892b921efa6cabc78e91025e89f05a22830763217826fa98d51d55711f85c8970ac58abf9adc6c85cc40878032cd6d2589ab226cd099f99e1
-
Filesize
209KB
MD53e552d017d45f8fd93b94cfc86f842f2
SHA1dbeebe83854328e2575ff67259e3fb6704b17a47
SHA25627d9c4613df7a3c04da0b79c13217aa69992b441acb7e44bf2a7578ca87d97d6
SHA512e616436f2f15615429c7c5c37de3990c3e86c5e1da7d75a0f524fc458b75d44a5be1a3648a628d63e1cf8aa062e08b538f2f2bc9c6a0b42157beb24f82c571d9
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize504B
MD5bd87692da25da5a3e89ed1bdd3c1aa9d
SHA1310a8bb3422a2978964dcaa61a6f35ad4307ca55
SHA256238ba97ee8b9d952e9a94d6e363d4b6b8dc156cd7f4a3e17ece0415eb5f86dc6
SHA51220fdf99c778c7f38551187dbf7e6092e6da1a2379406434c414362886cace266738de7bd067f6da47c8bf65f6d760637a63f1519509dc424eae9434c1b9c53fd
-
Filesize
1KB
MD5f72778fc2c27a411da2a5d3a66027461
SHA18154c158e9f416e9ff4878c594af69da4fe3794b
SHA2562f75baf3e1547fb753fd5a0fbbb25d72a20790980cdb675c42658bbbe6f89334
SHA512de39f2fae08519d6dd43c9b4975001b113131144f6294d9e77755431971aad98a4c718e1b1ab8bfa366d89dbe216c21c028695c53bbef0812a126cc8dcbf71e0
-
Filesize
5KB
MD5c6dcb416dca295ae058b1278d6bc1e49
SHA1c90717302d44de4234338a1c0c89abe8fde3c346
SHA25690339fb1c03ee1253568678b57fbbde62d2b8b0ffb6b526b5a38539df4e996be
SHA512b795dd89f8ef7efa3a96bc377308c4df57a1ef7c0641a11c9ef22f8538a439bb0b975256c5e2ae4c405510553c28b8c492252287cddf9d0a314b104677160703
-
Filesize
6KB
MD53aab7c2ea5714940fa01c7f8a6225349
SHA1e0bfd2a258be9048f1028d2a566a97ed446a7c80
SHA2564ee4682559ad3ac9048c42eea470ea5a4dd3cc22f1fe39c3e54b37396d9b0e8c
SHA51208aec32b2cee7f866361ffdd2c0ace4e9c8816714932b4ab63c30440e5bdfe8ca6b86cb5ed912a14212446c016b8125f6f87fa77baf162e4f9d16727ab5aebe7
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD59e89897c7b1af0151a9a230203ba102c
SHA11f27e694a8e5d4e4246340cce463c095983822c7
SHA25639ad09518f8668e97dc78d272f81dc3d17bcf0cf9d1a60160fee1e18c5276ee3
SHA5126c7b307aeaae53683101cc4d96aa9d944f25ccaa7ad09a9245c8b2d62776f7bbba922131aa88f284514144fdab56db12550d8ddf4adedb696fbbd6cba12b02ea