Analysis
-
max time kernel
145s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
22/08/2024, 04:13
Static task
static1
Behavioral task
behavioral1
Sample
b64d123b71b3ae781e217a9700825049_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b64d123b71b3ae781e217a9700825049_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
b64d123b71b3ae781e217a9700825049_JaffaCakes118.html
-
Size
55KB
-
MD5
b64d123b71b3ae781e217a9700825049
-
SHA1
b3397ebdac35d7a36eb04cf0f4683aae5c1a5b09
-
SHA256
500a6f1d50bb123631984c171c3e3d6a954c3c1c8415ce9caf012b5dcced277a
-
SHA512
4c10f3bbb3d9bd2827b38cd2c26a558eb778f814b1655145f40b164871fd3e8c151c6241eeb38645e431aeab0c12325401f23b1bc9ae61abe3034a697616f662
-
SSDEEP
768:9rTpHvvCIoo9jemcO9fXOQQjHXCq1/UcdwugV+:9ZHv7oSjedO9fXOQ8ZUcdt
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1072 msedge.exe 1072 msedge.exe 3828 msedge.exe 3828 msedge.exe 5044 identity_helper.exe 5044 identity_helper.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe 3828 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3828 wrote to memory of 3680 3828 msedge.exe 84 PID 3828 wrote to memory of 3680 3828 msedge.exe 84 PID 3828 wrote to memory of 3836 3828 msedge.exe 85 PID 3828 wrote to memory of 3836 3828 msedge.exe 85 PID 3828 wrote to memory of 3836 3828 msedge.exe 85 PID 3828 wrote to memory of 3836 3828 msedge.exe 85 PID 3828 wrote to memory of 3836 3828 msedge.exe 85 PID 3828 wrote to memory of 3836 3828 msedge.exe 85 PID 3828 wrote to memory of 3836 3828 msedge.exe 85 PID 3828 wrote to memory of 3836 3828 msedge.exe 85 PID 3828 wrote to memory of 3836 3828 msedge.exe 85 PID 3828 wrote to memory of 3836 3828 msedge.exe 85 PID 3828 wrote to memory of 3836 3828 msedge.exe 85 PID 3828 wrote to memory of 3836 3828 msedge.exe 85 PID 3828 wrote to memory of 3836 3828 msedge.exe 85 PID 3828 wrote to memory of 3836 3828 msedge.exe 85 PID 3828 wrote to memory of 3836 3828 msedge.exe 85 PID 3828 wrote to memory of 3836 3828 msedge.exe 85 PID 3828 wrote to memory of 3836 3828 msedge.exe 85 PID 3828 wrote to memory of 3836 3828 msedge.exe 85 PID 3828 wrote to memory of 3836 3828 msedge.exe 85 PID 3828 wrote to memory of 3836 3828 msedge.exe 85 PID 3828 wrote to memory of 3836 3828 msedge.exe 85 PID 3828 wrote to memory of 3836 3828 msedge.exe 85 PID 3828 wrote to memory of 3836 3828 msedge.exe 85 PID 3828 wrote to memory of 3836 3828 msedge.exe 85 PID 3828 wrote to memory of 3836 3828 msedge.exe 85 PID 3828 wrote to memory of 3836 3828 msedge.exe 85 PID 3828 wrote to memory of 3836 3828 msedge.exe 85 PID 3828 wrote to memory of 3836 3828 msedge.exe 85 PID 3828 wrote to memory of 3836 3828 msedge.exe 85 PID 3828 wrote to memory of 3836 3828 msedge.exe 85 PID 3828 wrote to memory of 3836 3828 msedge.exe 85 PID 3828 wrote to memory of 3836 3828 msedge.exe 85 PID 3828 wrote to memory of 3836 3828 msedge.exe 85 PID 3828 wrote to memory of 3836 3828 msedge.exe 85 PID 3828 wrote to memory of 3836 3828 msedge.exe 85 PID 3828 wrote to memory of 3836 3828 msedge.exe 85 PID 3828 wrote to memory of 3836 3828 msedge.exe 85 PID 3828 wrote to memory of 3836 3828 msedge.exe 85 PID 3828 wrote to memory of 3836 3828 msedge.exe 85 PID 3828 wrote to memory of 3836 3828 msedge.exe 85 PID 3828 wrote to memory of 1072 3828 msedge.exe 86 PID 3828 wrote to memory of 1072 3828 msedge.exe 86 PID 3828 wrote to memory of 4772 3828 msedge.exe 87 PID 3828 wrote to memory of 4772 3828 msedge.exe 87 PID 3828 wrote to memory of 4772 3828 msedge.exe 87 PID 3828 wrote to memory of 4772 3828 msedge.exe 87 PID 3828 wrote to memory of 4772 3828 msedge.exe 87 PID 3828 wrote to memory of 4772 3828 msedge.exe 87 PID 3828 wrote to memory of 4772 3828 msedge.exe 87 PID 3828 wrote to memory of 4772 3828 msedge.exe 87 PID 3828 wrote to memory of 4772 3828 msedge.exe 87 PID 3828 wrote to memory of 4772 3828 msedge.exe 87 PID 3828 wrote to memory of 4772 3828 msedge.exe 87 PID 3828 wrote to memory of 4772 3828 msedge.exe 87 PID 3828 wrote to memory of 4772 3828 msedge.exe 87 PID 3828 wrote to memory of 4772 3828 msedge.exe 87 PID 3828 wrote to memory of 4772 3828 msedge.exe 87 PID 3828 wrote to memory of 4772 3828 msedge.exe 87 PID 3828 wrote to memory of 4772 3828 msedge.exe 87 PID 3828 wrote to memory of 4772 3828 msedge.exe 87 PID 3828 wrote to memory of 4772 3828 msedge.exe 87 PID 3828 wrote to memory of 4772 3828 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\b64d123b71b3ae781e217a9700825049_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3828 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff91c4a46f8,0x7ff91c4a4708,0x7ff91c4a47182⤵PID:3680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,13285119690930184950,2625000822233879019,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2144 /prefetch:22⤵PID:3836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,13285119690930184950,2625000822233879019,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2284 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2136,13285119690930184950,2625000822233879019,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2712 /prefetch:82⤵PID:4772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,13285119690930184950,2625000822233879019,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:4644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,13285119690930184950,2625000822233879019,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:4884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,13285119690930184950,2625000822233879019,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4716 /prefetch:12⤵PID:2308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,13285119690930184950,2625000822233879019,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6096 /prefetch:82⤵PID:2900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,13285119690930184950,2625000822233879019,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6096 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,13285119690930184950,2625000822233879019,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6076 /prefetch:12⤵PID:2380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,13285119690930184950,2625000822233879019,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5436 /prefetch:12⤵PID:3524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,13285119690930184950,2625000822233879019,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4072 /prefetch:12⤵PID:820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,13285119690930184950,2625000822233879019,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4744 /prefetch:12⤵PID:3416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,13285119690930184950,2625000822233879019,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5668 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1408
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4156
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4756
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD553bc70ecb115bdbabe67620c416fe9b3
SHA1af66ec51a13a59639eaf54d62ff3b4f092bb2fc1
SHA256b36cad5c1f7bc7d07c7eaa2f3cad2959ddb5447d4d3adcb46eb6a99808e22771
SHA512cad44933b94e17908c0eb8ac5feeb53d03a7720d97e7ccc8724a1ed3021a5bece09e1f9f3cec56ce0739176ebbbeb20729e650f8bca04e5060c986b75d8e4921
-
Filesize
152B
MD5e765f3d75e6b0e4a7119c8b14d47d8da
SHA1cc9f7c7826c2e1a129e7d98884926076c3714fc0
SHA256986443556d3878258b710d9d9efbf4f25f0d764c3f83dc54217f2b12a6eccd89
SHA512a1872a849f27da78ebe9adb9beb260cb49ed5f4ca2d403f23379112bdfcd2482446a6708188100496e45db1517cdb43aba8bb93a75e605713c3f97cd716b1079
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD5e6ad30a2a8240295dad63f1d3b4993a3
SHA164aec6928246aa99de9392219236abe87d3b5fee
SHA25641533c1b4b8316f7975c31cf655d231a961ccb61aeaf2346316b64fd0b42a91a
SHA51238a1329324bd265f217069eaa47c893458e2baebc2e6283544991f01054848eac057e0b3955d49044ecdfcbb79f8ea487c178ca4bc4bf9678938a44bf99fe465
-
Filesize
1KB
MD5d4d1f703ed0bef36b540ec2e34b900c2
SHA135f077d3f898364c3426ac0edead4591b4378473
SHA2563dcf8f4ca4401be590572ce9786058d2e8912ab185a2f1f2439c13fee99d1203
SHA512c0902ffa927658f182a7f8c6bab6215735ffc8b37817cb2c120b1f01e3e512584961f23fbd4bf670fcc16cfdd04dfb31d1d82c013f912611f3966ff075a04143
-
Filesize
5KB
MD5da7be2755280fce8354ce3b277ffb848
SHA12a0ad58fa20708b4e7a136fabf57fdc34214abf9
SHA25683e83628d53419ba7a1e6fbfecc3baf421754ddfccda94552552132a1d4a7b21
SHA5122a4f7d0779572ec9931518519e1c7ff72b13973bc108a64d77c6b1886dfe77faac927544b1867a0bf84aad7571b70170ccc4b9b6b569de407e4ed8f9aa917c9a
-
Filesize
6KB
MD57a1182d211859f959ab59a47cc6c74c9
SHA18b6b1ffd956d9f6adbd96f3ae3f9cc4defa68061
SHA256edcde0e3f8f4ce1233ffc8e4acb1b4b1b279cee67d5a2c9119ca73e04338b5dd
SHA5121540129e5ec2837a638557f34f2b8325d194da4a3b7ea44471254cea4c6020a147619b6f1977a7271f621e86d3e14da66c1ff723531df19565769eb1cd4605bc
-
Filesize
6KB
MD5883f7244d3eb051f2a379427cdad775d
SHA1ec118b4795fb1713c4807a0ce9d1e31d1ca142a0
SHA256c58846ad968b4e12c592989ef254d1f32a1cadaea534f661af75a6c4864e98fc
SHA512a776de4f640e9607d85cea4b18257b99fa32ae84ecd7acd4ff5ef49dce7946e7df9905ee79f17d99cc595731c5accc28cd716d41a508b5d28cd23a79e46a82dd
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD59b4226aec2432cc0f141295e118b4fbc
SHA1bff68bf026babc9bf4adb484aa9d6d18ffe9c98a
SHA2561dcf28c58e2bcfee542e575e85888654989b86dfeca314bc94c7f185f59536dd
SHA512789b4510ae306f6a9f986eaff405fb80870ff513d81de94e10ed736d375f3b99b944d8a13e73937dc8530486221237584404c96bf92a1bec67ed4030cbafe534