Analysis
-
max time kernel
150s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
23-08-2024 01:00
Static task
static1
Behavioral task
behavioral1
Sample
b9c00edf91b8e33cd85d47f799e5c013_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b9c00edf91b8e33cd85d47f799e5c013_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
b9c00edf91b8e33cd85d47f799e5c013_JaffaCakes118.html
-
Size
61KB
-
MD5
b9c00edf91b8e33cd85d47f799e5c013
-
SHA1
7381e95f2bc2142e8bbdfcda569f29d8e5eec7d5
-
SHA256
f05329c148891eb5d745599cdbee0ea36c2cbed044cff60f2bf47b32869d7c22
-
SHA512
97f066e244a819bc685880a2942af504d49e510c2a538693b34486d52e5a34bdb8ee7fbe6773803705c950d8e2014066cf76507e9f6a2fed209ae8343882c69e
-
SSDEEP
1536:AtIu5zva9O3KkgeQV/oLXrQHtBBi9ByfM5x93HWsFtjnzak:A/zva9OakgeQV/oLXr+YoUt3HfFtjd
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4668 msedge.exe 4668 msedge.exe 1140 msedge.exe 1140 msedge.exe 3964 identity_helper.exe 3964 identity_helper.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1140 wrote to memory of 4568 1140 msedge.exe 84 PID 1140 wrote to memory of 4568 1140 msedge.exe 84 PID 1140 wrote to memory of 1032 1140 msedge.exe 85 PID 1140 wrote to memory of 1032 1140 msedge.exe 85 PID 1140 wrote to memory of 1032 1140 msedge.exe 85 PID 1140 wrote to memory of 1032 1140 msedge.exe 85 PID 1140 wrote to memory of 1032 1140 msedge.exe 85 PID 1140 wrote to memory of 1032 1140 msedge.exe 85 PID 1140 wrote to memory of 1032 1140 msedge.exe 85 PID 1140 wrote to memory of 1032 1140 msedge.exe 85 PID 1140 wrote to memory of 1032 1140 msedge.exe 85 PID 1140 wrote to memory of 1032 1140 msedge.exe 85 PID 1140 wrote to memory of 1032 1140 msedge.exe 85 PID 1140 wrote to memory of 1032 1140 msedge.exe 85 PID 1140 wrote to memory of 1032 1140 msedge.exe 85 PID 1140 wrote to memory of 1032 1140 msedge.exe 85 PID 1140 wrote to memory of 1032 1140 msedge.exe 85 PID 1140 wrote to memory of 1032 1140 msedge.exe 85 PID 1140 wrote to memory of 1032 1140 msedge.exe 85 PID 1140 wrote to memory of 1032 1140 msedge.exe 85 PID 1140 wrote to memory of 1032 1140 msedge.exe 85 PID 1140 wrote to memory of 1032 1140 msedge.exe 85 PID 1140 wrote to memory of 1032 1140 msedge.exe 85 PID 1140 wrote to memory of 1032 1140 msedge.exe 85 PID 1140 wrote to memory of 1032 1140 msedge.exe 85 PID 1140 wrote to memory of 1032 1140 msedge.exe 85 PID 1140 wrote to memory of 1032 1140 msedge.exe 85 PID 1140 wrote to memory of 1032 1140 msedge.exe 85 PID 1140 wrote to memory of 1032 1140 msedge.exe 85 PID 1140 wrote to memory of 1032 1140 msedge.exe 85 PID 1140 wrote to memory of 1032 1140 msedge.exe 85 PID 1140 wrote to memory of 1032 1140 msedge.exe 85 PID 1140 wrote to memory of 1032 1140 msedge.exe 85 PID 1140 wrote to memory of 1032 1140 msedge.exe 85 PID 1140 wrote to memory of 1032 1140 msedge.exe 85 PID 1140 wrote to memory of 1032 1140 msedge.exe 85 PID 1140 wrote to memory of 1032 1140 msedge.exe 85 PID 1140 wrote to memory of 1032 1140 msedge.exe 85 PID 1140 wrote to memory of 1032 1140 msedge.exe 85 PID 1140 wrote to memory of 1032 1140 msedge.exe 85 PID 1140 wrote to memory of 1032 1140 msedge.exe 85 PID 1140 wrote to memory of 1032 1140 msedge.exe 85 PID 1140 wrote to memory of 4668 1140 msedge.exe 86 PID 1140 wrote to memory of 4668 1140 msedge.exe 86 PID 1140 wrote to memory of 5056 1140 msedge.exe 87 PID 1140 wrote to memory of 5056 1140 msedge.exe 87 PID 1140 wrote to memory of 5056 1140 msedge.exe 87 PID 1140 wrote to memory of 5056 1140 msedge.exe 87 PID 1140 wrote to memory of 5056 1140 msedge.exe 87 PID 1140 wrote to memory of 5056 1140 msedge.exe 87 PID 1140 wrote to memory of 5056 1140 msedge.exe 87 PID 1140 wrote to memory of 5056 1140 msedge.exe 87 PID 1140 wrote to memory of 5056 1140 msedge.exe 87 PID 1140 wrote to memory of 5056 1140 msedge.exe 87 PID 1140 wrote to memory of 5056 1140 msedge.exe 87 PID 1140 wrote to memory of 5056 1140 msedge.exe 87 PID 1140 wrote to memory of 5056 1140 msedge.exe 87 PID 1140 wrote to memory of 5056 1140 msedge.exe 87 PID 1140 wrote to memory of 5056 1140 msedge.exe 87 PID 1140 wrote to memory of 5056 1140 msedge.exe 87 PID 1140 wrote to memory of 5056 1140 msedge.exe 87 PID 1140 wrote to memory of 5056 1140 msedge.exe 87 PID 1140 wrote to memory of 5056 1140 msedge.exe 87 PID 1140 wrote to memory of 5056 1140 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\b9c00edf91b8e33cd85d47f799e5c013_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9a02a46f8,0x7ff9a02a4708,0x7ff9a02a47182⤵PID:4568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,16033293839167645509,9548002489952328219,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:22⤵PID:1032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,16033293839167645509,9548002489952328219,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2192 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,16033293839167645509,9548002489952328219,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2648 /prefetch:82⤵PID:5056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,16033293839167645509,9548002489952328219,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:4400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,16033293839167645509,9548002489952328219,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:3804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,16033293839167645509,9548002489952328219,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4936 /prefetch:12⤵PID:3800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,16033293839167645509,9548002489952328219,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5092 /prefetch:12⤵PID:4360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,16033293839167645509,9548002489952328219,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5464 /prefetch:12⤵PID:1688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,16033293839167645509,9548002489952328219,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5872 /prefetch:82⤵PID:3992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,16033293839167645509,9548002489952328219,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5872 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,16033293839167645509,9548002489952328219,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5764 /prefetch:12⤵PID:4652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,16033293839167645509,9548002489952328219,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5752 /prefetch:12⤵PID:1804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,16033293839167645509,9548002489952328219,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4068 /prefetch:12⤵PID:4304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,16033293839167645509,9548002489952328219,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5636 /prefetch:12⤵PID:5076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,16033293839167645509,9548002489952328219,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5108 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3388
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3572
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2488
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d7114a6cd851f9bf56cf771c37d664a2
SHA1769c5d04fd83e583f15ab1ef659de8f883ecab8a
SHA256d2c75c7d68c474d4b8847b4ba6cfd09fe90717f46dd398c86483d825a66e977e
SHA51233bdae2305ae98e7c0de576de5a6600bd70a425e7b891d745cba9de992036df1b3d1df9572edb0f89f320e50962d06532dae9491985b6b57fd37d5f46f7a2ff8
-
Filesize
152B
MD5719923124ee00fb57378e0ebcbe894f7
SHA1cc356a7d27b8b27dc33f21bd4990f286ee13a9f9
SHA256aa22ab845fa08c786bd3366ec39f733d5be80e9ac933ed115ff048ff30090808
SHA512a207b6646500d0d504cf70ee10f57948e58dab7f214ad2e7c4af0e7ca23ce1d37c8c745873137e6c55bdcf0f527031a66d9cc54805a0eac3678be6dd497a5bbc
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD51619d6d92bf24931fada30fd96241618
SHA1e2bbd7cf9addb42c6cc80eb92940fb97ea7bb0bf
SHA256a148b28ab20663ea06edf0b59d3a97a12a348528d6ddc59581260d2601b12e58
SHA5122b10d2b462b9dc64eafa4218eb3c98f73e864e76f8e60a9d626bbc2db740274e69cacc9c1d272906ad70582bd8b30ffffb9f22119d807d93766b09931190c379
-
Filesize
5KB
MD59540d60f34ff7c65720db30d1e542032
SHA11a63ff1f784a342ae3f67402763c847ab88337e4
SHA256e60e3f9aea75dddc2a122ea3359628f2bee2ef3129739dcea9d2ec39b5a7a866
SHA512d9dc161219bd70fea6a4bf3b002d161ab435114037631591124703a0cdd7a53a9b931bd721eb5e02518a71264f48e60ed179494360fedae69fa13fd2e040ed3c
-
Filesize
6KB
MD50f49992f1d56b524e7a16f96afbeb433
SHA19df29a45bf85d48f1dddf04b2c2dc3d6ef60d22e
SHA256e0f3eb360f44aa930634a787943767ce8270d7963fcc2a9cf018b2438a0ee386
SHA512a966feab6891eccb35bfe44e42bfc6ea5a5a8eb8c19726f9959a9931804d2c4c751dde355c5b6073920a2c4ff11a8052a94dca99d92c2eb032b2799f1eee837f
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\ec0345b9-39d1-4897-bc18-72f9fe44d757.tmp
Filesize1KB
MD5feeb3c0d9fbda171f2a41a05b3778151
SHA1072c0bf704ad9058657a0a5685bad163ab90a28a
SHA256b2ce495c6cd9e9f8d62a8cec4fdb0aac6e02f7ca63c1daeb390e3f1754e05ed0
SHA512ed15f3177bb61897ac0a412bb6591326cdd2411926e58cbca7dbd017eb1e735514cd21c7216b552e44f3f8de2797f7b181f3cc747f2d568f9ba0af28cec7b27a
-
Filesize
10KB
MD557d9a92912065c96643a88398c58c873
SHA1450b85346fbc5e86327ae0ba515b68196646bb7b
SHA256c9ce8dcddb1263c64203fadbcefc055ab2f1d2a57902c9cd2f96e977973453d5
SHA512e51e350a198b5e098e2b6355821b5b4f324d6a9f4f1982053a81f336ccc79c53391ba201a7f64ad6e2f7887bbaeb1056aa6e0dfbe8398525ba716e9ac47ac432