Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20/08/2024, 20:00
Static task
static1
Behavioral task
behavioral1
Sample
b09f76fcd4242f5a1ab9945d5480df20_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b09f76fcd4242f5a1ab9945d5480df20_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
b09f76fcd4242f5a1ab9945d5480df20_JaffaCakes118.html
-
Size
227KB
-
MD5
b09f76fcd4242f5a1ab9945d5480df20
-
SHA1
a3ad5d59b6830bd45e6914ede0d51ab11a74b6a5
-
SHA256
e972835cc8abb7e3653198238c84f351dad462bb3c326d70a0bbe043a2f764e6
-
SHA512
8e8a13c19db276f91ab4d7791dc5141473fb66ba6221992f1bc702a8a7d6c5af2791b3c61a8da710b9c933b01c7d8a8d4880982c72f0def3c699929b27ded1d1
-
SSDEEP
3072:Lb7l7sA8RdOQJBzAcajCWvzowcXmNRSUrLAK7WgAjRvzWRpX0F+d9W+HmNJRQGFL:Lbt8RdOQJBAcajfqXmNRfuSI
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4188 msedge.exe 4188 msedge.exe 1052 msedge.exe 1052 msedge.exe 2560 msedge.exe 2560 msedge.exe 2560 msedge.exe 2560 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe 1052 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1052 wrote to memory of 396 1052 msedge.exe 84 PID 1052 wrote to memory of 396 1052 msedge.exe 84 PID 1052 wrote to memory of 4584 1052 msedge.exe 85 PID 1052 wrote to memory of 4584 1052 msedge.exe 85 PID 1052 wrote to memory of 4584 1052 msedge.exe 85 PID 1052 wrote to memory of 4584 1052 msedge.exe 85 PID 1052 wrote to memory of 4584 1052 msedge.exe 85 PID 1052 wrote to memory of 4584 1052 msedge.exe 85 PID 1052 wrote to memory of 4584 1052 msedge.exe 85 PID 1052 wrote to memory of 4584 1052 msedge.exe 85 PID 1052 wrote to memory of 4584 1052 msedge.exe 85 PID 1052 wrote to memory of 4584 1052 msedge.exe 85 PID 1052 wrote to memory of 4584 1052 msedge.exe 85 PID 1052 wrote to memory of 4584 1052 msedge.exe 85 PID 1052 wrote to memory of 4584 1052 msedge.exe 85 PID 1052 wrote to memory of 4584 1052 msedge.exe 85 PID 1052 wrote to memory of 4584 1052 msedge.exe 85 PID 1052 wrote to memory of 4584 1052 msedge.exe 85 PID 1052 wrote to memory of 4584 1052 msedge.exe 85 PID 1052 wrote to memory of 4584 1052 msedge.exe 85 PID 1052 wrote to memory of 4584 1052 msedge.exe 85 PID 1052 wrote to memory of 4584 1052 msedge.exe 85 PID 1052 wrote to memory of 4584 1052 msedge.exe 85 PID 1052 wrote to memory of 4584 1052 msedge.exe 85 PID 1052 wrote to memory of 4584 1052 msedge.exe 85 PID 1052 wrote to memory of 4584 1052 msedge.exe 85 PID 1052 wrote to memory of 4584 1052 msedge.exe 85 PID 1052 wrote to memory of 4584 1052 msedge.exe 85 PID 1052 wrote to memory of 4584 1052 msedge.exe 85 PID 1052 wrote to memory of 4584 1052 msedge.exe 85 PID 1052 wrote to memory of 4584 1052 msedge.exe 85 PID 1052 wrote to memory of 4584 1052 msedge.exe 85 PID 1052 wrote to memory of 4584 1052 msedge.exe 85 PID 1052 wrote to memory of 4584 1052 msedge.exe 85 PID 1052 wrote to memory of 4584 1052 msedge.exe 85 PID 1052 wrote to memory of 4584 1052 msedge.exe 85 PID 1052 wrote to memory of 4584 1052 msedge.exe 85 PID 1052 wrote to memory of 4584 1052 msedge.exe 85 PID 1052 wrote to memory of 4584 1052 msedge.exe 85 PID 1052 wrote to memory of 4584 1052 msedge.exe 85 PID 1052 wrote to memory of 4584 1052 msedge.exe 85 PID 1052 wrote to memory of 4584 1052 msedge.exe 85 PID 1052 wrote to memory of 4188 1052 msedge.exe 86 PID 1052 wrote to memory of 4188 1052 msedge.exe 86 PID 1052 wrote to memory of 3076 1052 msedge.exe 87 PID 1052 wrote to memory of 3076 1052 msedge.exe 87 PID 1052 wrote to memory of 3076 1052 msedge.exe 87 PID 1052 wrote to memory of 3076 1052 msedge.exe 87 PID 1052 wrote to memory of 3076 1052 msedge.exe 87 PID 1052 wrote to memory of 3076 1052 msedge.exe 87 PID 1052 wrote to memory of 3076 1052 msedge.exe 87 PID 1052 wrote to memory of 3076 1052 msedge.exe 87 PID 1052 wrote to memory of 3076 1052 msedge.exe 87 PID 1052 wrote to memory of 3076 1052 msedge.exe 87 PID 1052 wrote to memory of 3076 1052 msedge.exe 87 PID 1052 wrote to memory of 3076 1052 msedge.exe 87 PID 1052 wrote to memory of 3076 1052 msedge.exe 87 PID 1052 wrote to memory of 3076 1052 msedge.exe 87 PID 1052 wrote to memory of 3076 1052 msedge.exe 87 PID 1052 wrote to memory of 3076 1052 msedge.exe 87 PID 1052 wrote to memory of 3076 1052 msedge.exe 87 PID 1052 wrote to memory of 3076 1052 msedge.exe 87 PID 1052 wrote to memory of 3076 1052 msedge.exe 87 PID 1052 wrote to memory of 3076 1052 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\b09f76fcd4242f5a1ab9945d5480df20_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1052 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe074446f8,0x7ffe07444708,0x7ffe074447182⤵PID:396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,16188311917965198729,1383277126668053050,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵PID:4584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2076,16188311917965198729,1383277126668053050,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2184 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2076,16188311917965198729,1383277126668053050,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2940 /prefetch:82⤵PID:3076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,16188311917965198729,1383277126668053050,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3196 /prefetch:12⤵PID:3944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,16188311917965198729,1383277126668053050,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:2008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,16188311917965198729,1383277126668053050,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4984 /prefetch:12⤵PID:4416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,16188311917965198729,1383277126668053050,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3732 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2560
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3672
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4184
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59e3fc58a8fb86c93d19e1500b873ef6f
SHA1c6aae5f4e26f5570db5e14bba8d5061867a33b56
SHA256828f4eacac1c40b790fd70dbb6fa6ba03dcc681171d9b2a6579626d27837b1c4
SHA512e5e245b56fa82075e060f468a3224cf2ef43f1b6d87f0351a2102d85c7c897e559be4caeaecfdc4059af29fdc674681b61229319dda95cb2ee649b2eb98d313e
-
Filesize
152B
MD527304926d60324abe74d7a4b571c35ea
SHA178b8f92fcaf4a09eaa786bbe33fd1b0222ef29c1
SHA2567039ad5c2b40f4d97c8c2269f4942be13436d739b2e1f8feb7a0c9f9fdb931de
SHA512f5b6181d3f432238c7365f64fc8a373299e23ba8178bcc419471916ef8b23e909787c7c0617ab22e4eb90909c02bd7b84f1386fbc61e2bdb5a0eb474175da4bd
-
Filesize
67KB
MD5b4b711f3e747704ffe02b49791ce8cac
SHA1ac7ce4cbd3c8ee66e3c8d9d209c1352c160c3b89
SHA256f65bf40e2f0ce993b54772f703f72d53f0fa925457346fa8ec2031879ffa91d1
SHA512b738deba57337a9147927f7dd35eab7c999dea6d2ff11f57fdc2e5b6f64326028a54778886548ba128a3f03ee333cc9e43de5162d8b578b85c290626577042db
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD5c3eed684fd161d1dfb228dc99af16de4
SHA13c65be0eba2eee0d8f7a2c6b9e9834a3a6c4bed9
SHA256fcf7e3ef79253491659bca9d609a6832266d5e381a00f89d0464fb0ce06a9b41
SHA512c660c16216d36b7a5b97473e153ba1baaccc9739650f07143157230635e0452ea853b874a313c7ae34230acbe8ad8c69f5e8b8e941cabd717bf767ab5d937317
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD5570cec8c755434bc18bf049efbb18a60
SHA1668b6bda6481f8cd837b80415514572fb79c798c
SHA25672598a1ed33b1f6b6ff3f425de71e5b7626cf15f6b8de23aaeda5c540acfa38d
SHA512713e8225e1636910cffda3d6ffda881c2abbd5ccf243cfc41d949dae5833ca45ea5f6353777b8c37080c5db6c988d2ff9c88e289508b624d4cb9551a598208d4
-
Filesize
2KB
MD5c2d6b7879ead8a18b4be72109ba49b2b
SHA152155552865950a5e456125f4c350d3565a47d85
SHA256bdeac41978a2a0ee36bfb52bec643f150bd88a897602a0d352f1007a276fafe6
SHA512fcd2819ea4b420581fa505e1be1f44b48a156584d5218d785164414e61fc8e87c9d89e9bf66ece189b377cc86238a397cc8d2f6073aff8d50a3d107fef996b1a
-
Filesize
7KB
MD5097f81559f3843c02a27736a0f9bb5cd
SHA1e46b4ad41fbfffc950d7f668f1e5f713d392c460
SHA2564bd881ed81b66c0948d97244bfbfb60d6e240fe27b4383f232cc5c39009e2348
SHA512127b2456e2845fb6753cfabae9888a81dc89ffe9d7fb1a35e4aa71692abc2adaa08eb6b05d623ec589592be8620c80021ad12767026bf0c1c11dc9c19aa471e8
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\ba257e87-207d-4583-82f6-f2553e5e4bff.tmp
Filesize5KB
MD5004135c64badacca684b06f73af68e8d
SHA198c8f59ca1f4987999fdeb7423e74771120dc191
SHA25662cc4846852d08393edf8d8ef7751e5a6a8ef52d44cef1e2cbc705fbeb720b44
SHA51294c86424262b6e0e7a91d9b16da9c47485e8f3853a0cf0c60fbd119c923a1066c0e9f1ad2b9a9a44b804fdc431f53cd0cfe7cc5bee31d19fbdb4e8aceda47855
-
Filesize
10KB
MD5ac624d2909c9f4e8638f66ae43580b8d
SHA195b3108b3a48b9f3c14ccc4d55b24461baed910a
SHA2567463209c6ff402e083b85fbf1fe30afd40c923fb9e32a620ad4f829136e751ab
SHA51205d9bfd29415bb39a67cd7bf9d3496144f33d00e8f5982ee5f29682a67de94ac58065f0029926851521b4e04794e7d211f79e8e102d5fde697b96973f676dfda