Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
23-08-2024 03:46
Static task
static1
Behavioral task
behavioral1
Sample
ba3b96c11c62507fb928c0a12fd9ad3b_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ba3b96c11c62507fb928c0a12fd9ad3b_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ba3b96c11c62507fb928c0a12fd9ad3b_JaffaCakes118.html
-
Size
90KB
-
MD5
ba3b96c11c62507fb928c0a12fd9ad3b
-
SHA1
5fe29af4d25423db02cbd36545b099d427200518
-
SHA256
165c7f2b3d2731dd0152cec5d92253c6e9661f3eb1e9e259d835be52785506cf
-
SHA512
bdb74e9c990f2a31ae2ffc0c202bff6891727f534566d80c82f268f554aed192327769a9537bf3a8b65b404319fee773e0b94de5ef6b7dfc713419fb4a5cd6f7
-
SSDEEP
1536:gQZBCCOdn0IxCOAuPz75Y+oB5L2K5VCvQlyqJIRnKrUeIwmhVTLOWcY0DczA9swK:gk2t0IxHPd
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2584 msedge.exe 2584 msedge.exe 4376 msedge.exe 4376 msedge.exe 2012 identity_helper.exe 2012 identity_helper.exe 5908 msedge.exe 5908 msedge.exe 5908 msedge.exe 5908 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe 4376 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4376 wrote to memory of 812 4376 msedge.exe 84 PID 4376 wrote to memory of 812 4376 msedge.exe 84 PID 4376 wrote to memory of 1488 4376 msedge.exe 85 PID 4376 wrote to memory of 1488 4376 msedge.exe 85 PID 4376 wrote to memory of 1488 4376 msedge.exe 85 PID 4376 wrote to memory of 1488 4376 msedge.exe 85 PID 4376 wrote to memory of 1488 4376 msedge.exe 85 PID 4376 wrote to memory of 1488 4376 msedge.exe 85 PID 4376 wrote to memory of 1488 4376 msedge.exe 85 PID 4376 wrote to memory of 1488 4376 msedge.exe 85 PID 4376 wrote to memory of 1488 4376 msedge.exe 85 PID 4376 wrote to memory of 1488 4376 msedge.exe 85 PID 4376 wrote to memory of 1488 4376 msedge.exe 85 PID 4376 wrote to memory of 1488 4376 msedge.exe 85 PID 4376 wrote to memory of 1488 4376 msedge.exe 85 PID 4376 wrote to memory of 1488 4376 msedge.exe 85 PID 4376 wrote to memory of 1488 4376 msedge.exe 85 PID 4376 wrote to memory of 1488 4376 msedge.exe 85 PID 4376 wrote to memory of 1488 4376 msedge.exe 85 PID 4376 wrote to memory of 1488 4376 msedge.exe 85 PID 4376 wrote to memory of 1488 4376 msedge.exe 85 PID 4376 wrote to memory of 1488 4376 msedge.exe 85 PID 4376 wrote to memory of 1488 4376 msedge.exe 85 PID 4376 wrote to memory of 1488 4376 msedge.exe 85 PID 4376 wrote to memory of 1488 4376 msedge.exe 85 PID 4376 wrote to memory of 1488 4376 msedge.exe 85 PID 4376 wrote to memory of 1488 4376 msedge.exe 85 PID 4376 wrote to memory of 1488 4376 msedge.exe 85 PID 4376 wrote to memory of 1488 4376 msedge.exe 85 PID 4376 wrote to memory of 1488 4376 msedge.exe 85 PID 4376 wrote to memory of 1488 4376 msedge.exe 85 PID 4376 wrote to memory of 1488 4376 msedge.exe 85 PID 4376 wrote to memory of 1488 4376 msedge.exe 85 PID 4376 wrote to memory of 1488 4376 msedge.exe 85 PID 4376 wrote to memory of 1488 4376 msedge.exe 85 PID 4376 wrote to memory of 1488 4376 msedge.exe 85 PID 4376 wrote to memory of 1488 4376 msedge.exe 85 PID 4376 wrote to memory of 1488 4376 msedge.exe 85 PID 4376 wrote to memory of 1488 4376 msedge.exe 85 PID 4376 wrote to memory of 1488 4376 msedge.exe 85 PID 4376 wrote to memory of 1488 4376 msedge.exe 85 PID 4376 wrote to memory of 1488 4376 msedge.exe 85 PID 4376 wrote to memory of 2584 4376 msedge.exe 86 PID 4376 wrote to memory of 2584 4376 msedge.exe 86 PID 4376 wrote to memory of 4940 4376 msedge.exe 87 PID 4376 wrote to memory of 4940 4376 msedge.exe 87 PID 4376 wrote to memory of 4940 4376 msedge.exe 87 PID 4376 wrote to memory of 4940 4376 msedge.exe 87 PID 4376 wrote to memory of 4940 4376 msedge.exe 87 PID 4376 wrote to memory of 4940 4376 msedge.exe 87 PID 4376 wrote to memory of 4940 4376 msedge.exe 87 PID 4376 wrote to memory of 4940 4376 msedge.exe 87 PID 4376 wrote to memory of 4940 4376 msedge.exe 87 PID 4376 wrote to memory of 4940 4376 msedge.exe 87 PID 4376 wrote to memory of 4940 4376 msedge.exe 87 PID 4376 wrote to memory of 4940 4376 msedge.exe 87 PID 4376 wrote to memory of 4940 4376 msedge.exe 87 PID 4376 wrote to memory of 4940 4376 msedge.exe 87 PID 4376 wrote to memory of 4940 4376 msedge.exe 87 PID 4376 wrote to memory of 4940 4376 msedge.exe 87 PID 4376 wrote to memory of 4940 4376 msedge.exe 87 PID 4376 wrote to memory of 4940 4376 msedge.exe 87 PID 4376 wrote to memory of 4940 4376 msedge.exe 87 PID 4376 wrote to memory of 4940 4376 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\ba3b96c11c62507fb928c0a12fd9ad3b_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4376 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9568446f8,0x7ff956844708,0x7ff9568447182⤵PID:812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,11403480585471950428,5721982408835431143,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:22⤵PID:1488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,11403480585471950428,5721982408835431143,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,11403480585471950428,5721982408835431143,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2648 /prefetch:82⤵PID:4940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,11403480585471950428,5721982408835431143,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,11403480585471950428,5721982408835431143,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:2988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,11403480585471950428,5721982408835431143,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3972 /prefetch:12⤵PID:4020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,11403480585471950428,5721982408835431143,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4452 /prefetch:12⤵PID:1472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,11403480585471950428,5721982408835431143,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4224 /prefetch:12⤵PID:3068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,11403480585471950428,5721982408835431143,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6220 /prefetch:82⤵PID:2472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,11403480585471950428,5721982408835431143,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6220 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,11403480585471950428,5721982408835431143,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5596 /prefetch:12⤵PID:4648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,11403480585471950428,5721982408835431143,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5568 /prefetch:12⤵PID:3928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,11403480585471950428,5721982408835431143,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4772 /prefetch:12⤵PID:2164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,11403480585471950428,5721982408835431143,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5676 /prefetch:12⤵PID:3920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,11403480585471950428,5721982408835431143,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1820 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5908
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3068
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3580
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD52c4c6bd1a282a021eb7582fb3bca8a0c
SHA1ede17828b234fc30d356ede24b2a5f0d9094597d
SHA25648bb20c7a71ed56e9bf98f58154a7f34574677f71683a837269b55c3381b1c40
SHA5128a890a88d065eab1d21fcfeea469e8c6ae07644a44b38adfec3ad4440a207a95b4cd0265fe96dd214441dd61e405c6adf242d5d2f0d5a802a2ca4f4ae7b93a28
-
Filesize
152B
MD59b008261dda31857d68792b46af6dd6d
SHA1e82dc88e2d1da2df7cb19d79a0346b9bb90d52b3
SHA2569ac598d4f8170f7e475d84103aead9e3c23d5f2d292741a7f56a17bde8b6f7da
SHA51278853091403a06beeec4998e2e3a4342111895ffd485f7f7cd367741a4883f7a25864cba00a6c86f27dc0c9ce9d04f08011ecc40c8ae9383d33274739ac39f10
-
Filesize
152B
MD50446fcdd21b016db1f468971fb82a488
SHA1726b91562bb75f80981f381e3c69d7d832c87c9d
SHA25662c5dc18b25e758f3508582a7c58bb46b734a774d97fc0e8a20614235caa8222
SHA5121df7c085042266959f1fe0aedc5f6d40ceba485b54159f51f0c38f17bb250b79ea941b735e1b6faf219f23fe8ab65ac4557f545519d52d5416b89ad0f9047a31
-
Filesize
212KB
MD52257803a7e34c3abd90ec6d41fd76a5a
SHA1f7a32e6635d8513f74bd225f55d867ea56ae4803
SHA256af23860fb3a448f2cc6107680078402555a345eb45bc5efb750f541fe5d7c174
SHA512e9f4dc90d0829885f08879e868aa62041150b500f62682fc108da258eee26ad9509dcbf6e8a55f2d0bdba7aa9118dd149a70a7d851820d4ea683db7808c48540
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize504B
MD50e3899f5b42c0f9a0871094e3ba9f628
SHA1e9d3f5a248e94059f39734250c10597c38a799b8
SHA25663d5ac1c13c61a03010989971ab52a727b5f49576ce2b9439468f5f100785732
SHA512c8534fd0d51265d1d3c7ae89406ea77d2bd672c2b343d0af6c5d07498b2d9f7da60e320289c7f3d190300eece17464ac7fb1a43be104e98634e1228a6455eaa3
-
Filesize
1KB
MD53be699250a704a4211e745d080582a05
SHA1117d9a7f3ea58b342376845af882c46aa3d1ee2e
SHA25622b13edb1ae2071c05b377339f853b08a1d55abaa4e8b5d9efbc8fc9d207ffc7
SHA51274ea4d76516ea6db5cef78b9be8946550d8515c4f8ffe54dc41ff596fc08f4f026dfdde969f4473ed8390fb729b675b47bf868be339bef126208476cebe258ca
-
Filesize
5KB
MD5d210ce63538117770b3d3c962ad563fa
SHA197ed424cc31c48e16026c0f0eaae01bb85c49757
SHA256f3666c6226597620c7f597351814f458bf6f865e03675395359b2cd47bfce5a7
SHA512d89ba6dc3a64d1eda3dfe8174ddc3c7c5c1346570d18bf7714eafc89d2cb14caf5d315e5b9937b01535ed7b94e1b6a4d230424ddff74b07b4a70a9f818e5aaaf
-
Filesize
6KB
MD53e841223aa8b237bdabd3f84fc6baeaf
SHA1722fe1935b0f4f02538a1f5196535face27367e1
SHA25644459efd8ebdb68b546fa46e7bc77f65aa51ef3c226f5e8519e7905ea377e5cd
SHA51285e0c87dedd575711624698cd8bb062ced70407282559b6a0e055e27e15e15ca8e9204ca905f412502641d05e088dbfce4e5d976fe47f19a36b781c69a1f2ae5
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389