Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
22/08/2024, 07:24
Static task
static1
Behavioral task
behavioral1
Sample
b6d114c4cae4a1f193179440d694275d_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b6d114c4cae4a1f193179440d694275d_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
b6d114c4cae4a1f193179440d694275d_JaffaCakes118.html
-
Size
14KB
-
MD5
b6d114c4cae4a1f193179440d694275d
-
SHA1
620640b9547ffc6f123797291587901f38e9c49c
-
SHA256
e1acc87be0670e58c11779ea1e6a7a16783f9b1da3d0c387ecb42e991d36a3f5
-
SHA512
c560fdbc48f73162a246721a6353c86438c8d610776daa279d0026ee389d50aed86433509216e2562e28075b0848c0f53110039326f00cda60048d5de4803f62
-
SSDEEP
384:nIcudm6bcMz9AonxEuyw/Io6TgntU0XX+ywFTA0ele4J/CnJ2:cciFdrR
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4556 msedge.exe 4556 msedge.exe 3924 msedge.exe 3924 msedge.exe 3308 identity_helper.exe 3308 identity_helper.exe 6016 msedge.exe 6016 msedge.exe 6016 msedge.exe 6016 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3924 wrote to memory of 4804 3924 msedge.exe 84 PID 3924 wrote to memory of 4804 3924 msedge.exe 84 PID 3924 wrote to memory of 2872 3924 msedge.exe 85 PID 3924 wrote to memory of 2872 3924 msedge.exe 85 PID 3924 wrote to memory of 2872 3924 msedge.exe 85 PID 3924 wrote to memory of 2872 3924 msedge.exe 85 PID 3924 wrote to memory of 2872 3924 msedge.exe 85 PID 3924 wrote to memory of 2872 3924 msedge.exe 85 PID 3924 wrote to memory of 2872 3924 msedge.exe 85 PID 3924 wrote to memory of 2872 3924 msedge.exe 85 PID 3924 wrote to memory of 2872 3924 msedge.exe 85 PID 3924 wrote to memory of 2872 3924 msedge.exe 85 PID 3924 wrote to memory of 2872 3924 msedge.exe 85 PID 3924 wrote to memory of 2872 3924 msedge.exe 85 PID 3924 wrote to memory of 2872 3924 msedge.exe 85 PID 3924 wrote to memory of 2872 3924 msedge.exe 85 PID 3924 wrote to memory of 2872 3924 msedge.exe 85 PID 3924 wrote to memory of 2872 3924 msedge.exe 85 PID 3924 wrote to memory of 2872 3924 msedge.exe 85 PID 3924 wrote to memory of 2872 3924 msedge.exe 85 PID 3924 wrote to memory of 2872 3924 msedge.exe 85 PID 3924 wrote to memory of 2872 3924 msedge.exe 85 PID 3924 wrote to memory of 2872 3924 msedge.exe 85 PID 3924 wrote to memory of 2872 3924 msedge.exe 85 PID 3924 wrote to memory of 2872 3924 msedge.exe 85 PID 3924 wrote to memory of 2872 3924 msedge.exe 85 PID 3924 wrote to memory of 2872 3924 msedge.exe 85 PID 3924 wrote to memory of 2872 3924 msedge.exe 85 PID 3924 wrote to memory of 2872 3924 msedge.exe 85 PID 3924 wrote to memory of 2872 3924 msedge.exe 85 PID 3924 wrote to memory of 2872 3924 msedge.exe 85 PID 3924 wrote to memory of 2872 3924 msedge.exe 85 PID 3924 wrote to memory of 2872 3924 msedge.exe 85 PID 3924 wrote to memory of 2872 3924 msedge.exe 85 PID 3924 wrote to memory of 2872 3924 msedge.exe 85 PID 3924 wrote to memory of 2872 3924 msedge.exe 85 PID 3924 wrote to memory of 2872 3924 msedge.exe 85 PID 3924 wrote to memory of 2872 3924 msedge.exe 85 PID 3924 wrote to memory of 2872 3924 msedge.exe 85 PID 3924 wrote to memory of 2872 3924 msedge.exe 85 PID 3924 wrote to memory of 2872 3924 msedge.exe 85 PID 3924 wrote to memory of 2872 3924 msedge.exe 85 PID 3924 wrote to memory of 4556 3924 msedge.exe 86 PID 3924 wrote to memory of 4556 3924 msedge.exe 86 PID 3924 wrote to memory of 1276 3924 msedge.exe 87 PID 3924 wrote to memory of 1276 3924 msedge.exe 87 PID 3924 wrote to memory of 1276 3924 msedge.exe 87 PID 3924 wrote to memory of 1276 3924 msedge.exe 87 PID 3924 wrote to memory of 1276 3924 msedge.exe 87 PID 3924 wrote to memory of 1276 3924 msedge.exe 87 PID 3924 wrote to memory of 1276 3924 msedge.exe 87 PID 3924 wrote to memory of 1276 3924 msedge.exe 87 PID 3924 wrote to memory of 1276 3924 msedge.exe 87 PID 3924 wrote to memory of 1276 3924 msedge.exe 87 PID 3924 wrote to memory of 1276 3924 msedge.exe 87 PID 3924 wrote to memory of 1276 3924 msedge.exe 87 PID 3924 wrote to memory of 1276 3924 msedge.exe 87 PID 3924 wrote to memory of 1276 3924 msedge.exe 87 PID 3924 wrote to memory of 1276 3924 msedge.exe 87 PID 3924 wrote to memory of 1276 3924 msedge.exe 87 PID 3924 wrote to memory of 1276 3924 msedge.exe 87 PID 3924 wrote to memory of 1276 3924 msedge.exe 87 PID 3924 wrote to memory of 1276 3924 msedge.exe 87 PID 3924 wrote to memory of 1276 3924 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\b6d114c4cae4a1f193179440d694275d_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3924 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8234d46f8,0x7ff8234d4708,0x7ff8234d47182⤵PID:4804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,11966623608047888579,3746939364957804381,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵PID:2872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,11966623608047888579,3746939364957804381,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2192 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,11966623608047888579,3746939364957804381,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2828 /prefetch:82⤵PID:1276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,11966623608047888579,3746939364957804381,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3204 /prefetch:12⤵PID:696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,11966623608047888579,3746939364957804381,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:1884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,11966623608047888579,3746939364957804381,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1936 /prefetch:12⤵PID:4000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,11966623608047888579,3746939364957804381,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4860 /prefetch:12⤵PID:1636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,11966623608047888579,3746939364957804381,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5412 /prefetch:12⤵PID:1728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,11966623608047888579,3746939364957804381,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5728 /prefetch:82⤵PID:2500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,11966623608047888579,3746939364957804381,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5728 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,11966623608047888579,3746939364957804381,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5800 /prefetch:12⤵PID:1256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,11966623608047888579,3746939364957804381,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5816 /prefetch:12⤵PID:1160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,11966623608047888579,3746939364957804381,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5760 /prefetch:12⤵PID:2500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,11966623608047888579,3746939364957804381,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3964 /prefetch:12⤵PID:4108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,11966623608047888579,3746939364957804381,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1700 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:6016
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2488
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:768
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d4829218222c8bedb9ffe89dffd37095
SHA1aae577f33f413ec3d09f2e7ff5d9cc20a602241c
SHA25649239b229a2519583ba5d6de3702480b8a8ebf3cfaa8945100dbab25fcb02b7b
SHA51203e26a2e3de41b8a829b5543da504c7d7ccdc4c112d629efcac24dcda23acb50a52b5b99572b5efb2a01cf392a457cf9fac85663b3d63f7606be00dba218f8f1
-
Filesize
152B
MD515e9c4b4eefb3e1c08a010e748e10f58
SHA13172378f2c7a00553ce086dbf53fcf3126c5a724
SHA25607b56a769467e8b57f9b7acd9d32da266ca5000803758c18bb6818ac236c7000
SHA512811058b539e914a812c88543bb6657de736f691d18d6dadb5e1f6ced286780fb334dc5f575babbcf4fd2dceda30d1bf4004b374c5775e7f278346b100b29eb7e
-
Filesize
212KB
MD52257803a7e34c3abd90ec6d41fd76a5a
SHA1f7a32e6635d8513f74bd225f55d867ea56ae4803
SHA256af23860fb3a448f2cc6107680078402555a345eb45bc5efb750f541fe5d7c174
SHA512e9f4dc90d0829885f08879e868aa62041150b500f62682fc108da258eee26ad9509dcbf6e8a55f2d0bdba7aa9118dd149a70a7d851820d4ea683db7808c48540
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize312B
MD5da7b977820c019a8fbfdf88f3f99ecde
SHA11a92b14521c60c52d44acbc29d1896bd8b9bb383
SHA2560b8577f839edf332d54d725c89a18b7a79d62252e9cc01085ac6a640352e359b
SHA5122a6697c5b81f081514513c3c6af1aa57c641e274e2cdb235fe8302f1b01b73cbb2744d0304c1f87b6594d50ad7e08aa87045c67bdea792ff09b3a7025f748602
-
Filesize
1KB
MD54b1cee5dc55f8a5fcc899cebd0b518d5
SHA12140f54b887da4b530cf44bd64fe7fbb10c40a8b
SHA256d9ad302085e88680f41061059ec51e9542d6f59f9937d5ed1e7863d2bc4df2a6
SHA51201a3f12fe6262fba07561d2807955b3e6f1387c28b256fa3cc06750442cbb9f5a49dd1588608df4fad5c304c73ee512e40e25cad8e66544c4cf1f2a373d77509
-
Filesize
5KB
MD58a3aceb6d5affdbbfaf8de7a0d3f79a9
SHA1fc915bc846eca849e977e767915159e6ed8ba7ba
SHA25673301948af12380a886ba209b023077f5240cc8df69b5d85563be8cd96d007eb
SHA512f47d7f753bb18d5ca91906efe03ac5e76556faf669b910012f18d53607a715e21e0bfaa148710518e2453b68e0c4a4b2a1513326ef737fbb13baadfbaec7fbea
-
Filesize
6KB
MD5a3389a6b2379730e039f78dacb72dd99
SHA11f454a440dbfe19673f72d884236d45362fad339
SHA256474b7d106c4d66bced1f65ad0b9e481e03b4edfa4700440c51939c4bd20d4abf
SHA512974ee931b0ce331e2988cea9aa291cc554dda1449f57cffbf7761575425ed9d8eb53aff5728d4ce775955212775735dfc1230545069fdd55e1678681e4e6e306
-
Filesize
24KB
MD57915ba0545666aa5833cf9f9f86d45d6
SHA1743ecc319bc2a54973582d4a5198042a48fbe8db
SHA256f8fcc045da13bde0f5dec3ada86342105cbff34ebc2442bcf51e8ed509a95b20
SHA512a53036251a22cdc95579ea8641c5574f1dc1f7dfd0390f00ebeafbbea0c1a2c0c3e6dba23bbbb8d8e2c77a3e1e816ccfaf84a97da1c334019c8df1414999d1f9
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5daeea06dfaef66b6957b8493901960ec
SHA1f361764d837ae64bb9f6c11737f14a9bb082fc91
SHA2564d1da992ae4cffb108e28e0510432208b186f898d98d38d3dd75d01029945d61
SHA5129c0567a30ea071c9fbfc7c9511947f1c4a6dd57e70183f3299a33e265bc52f12eb5604ccec7f75c0c59d4e7ab897a940c8fc746f6cedb64463c5cfd1fbcab800