Resubmissions
25/08/2024, 00:35
240825-axla3azemj 425/08/2024, 00:34
240825-awv4waycna 324/08/2024, 16:42
240824-t7pwsazamf 324/08/2024, 16:40
240824-t6x6rs1dnm 424/08/2024, 16:39
240824-t54l6ayhrf 324/08/2024, 16:36
240824-t4bjzsyhkf 824/08/2024, 16:35
240824-t34t5syhkb 119/08/2024, 04:12
240819-es18yaxckl 119/08/2024, 03:49
240819-edsy1swelq 119/08/2024, 03:45
240819-ebjbsssejf 1Analysis
-
max time kernel
1680s -
max time network
1685s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
24/08/2024, 16:42
Static task
static1
Behavioral task
behavioral1
Sample
a968ae8b341fea64aeb3983d7dda9f1d_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
a968ae8b341fea64aeb3983d7dda9f1d_JaffaCakes118.html
-
Size
57KB
-
MD5
a968ae8b341fea64aeb3983d7dda9f1d
-
SHA1
4ac62bfa417f114e5c3618f843265ff18d51b239
-
SHA256
45ca25a430084beca91207992ca058af879cd2317c80a99e26b8feb30512dd0a
-
SHA512
e6023dd9748d2a1a477851c2116fb944c6b5a9478617ce12a4ca2ccbcd30f6d12ab0bd5a939f48bccb5e608bef81d5148e04d82d15d2fd6c9c184c48c2cf28aa
-
SSDEEP
1536:ijEQvK8OPHdsATo2vgyHJv0owbd6zKD6CDK2RVroTvwpDK2RVy:ijnOPHdsd2vgyHJutDK2RVroTvwpDK2m
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2620 msedge.exe 2620 msedge.exe 3352 msedge.exe 3352 msedge.exe 2796 identity_helper.exe 2796 identity_helper.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe 3352 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3352 wrote to memory of 3948 3352 msedge.exe 84 PID 3352 wrote to memory of 3948 3352 msedge.exe 84 PID 3352 wrote to memory of 1316 3352 msedge.exe 85 PID 3352 wrote to memory of 1316 3352 msedge.exe 85 PID 3352 wrote to memory of 1316 3352 msedge.exe 85 PID 3352 wrote to memory of 1316 3352 msedge.exe 85 PID 3352 wrote to memory of 1316 3352 msedge.exe 85 PID 3352 wrote to memory of 1316 3352 msedge.exe 85 PID 3352 wrote to memory of 1316 3352 msedge.exe 85 PID 3352 wrote to memory of 1316 3352 msedge.exe 85 PID 3352 wrote to memory of 1316 3352 msedge.exe 85 PID 3352 wrote to memory of 1316 3352 msedge.exe 85 PID 3352 wrote to memory of 1316 3352 msedge.exe 85 PID 3352 wrote to memory of 1316 3352 msedge.exe 85 PID 3352 wrote to memory of 1316 3352 msedge.exe 85 PID 3352 wrote to memory of 1316 3352 msedge.exe 85 PID 3352 wrote to memory of 1316 3352 msedge.exe 85 PID 3352 wrote to memory of 1316 3352 msedge.exe 85 PID 3352 wrote to memory of 1316 3352 msedge.exe 85 PID 3352 wrote to memory of 1316 3352 msedge.exe 85 PID 3352 wrote to memory of 1316 3352 msedge.exe 85 PID 3352 wrote to memory of 1316 3352 msedge.exe 85 PID 3352 wrote to memory of 1316 3352 msedge.exe 85 PID 3352 wrote to memory of 1316 3352 msedge.exe 85 PID 3352 wrote to memory of 1316 3352 msedge.exe 85 PID 3352 wrote to memory of 1316 3352 msedge.exe 85 PID 3352 wrote to memory of 1316 3352 msedge.exe 85 PID 3352 wrote to memory of 1316 3352 msedge.exe 85 PID 3352 wrote to memory of 1316 3352 msedge.exe 85 PID 3352 wrote to memory of 1316 3352 msedge.exe 85 PID 3352 wrote to memory of 1316 3352 msedge.exe 85 PID 3352 wrote to memory of 1316 3352 msedge.exe 85 PID 3352 wrote to memory of 1316 3352 msedge.exe 85 PID 3352 wrote to memory of 1316 3352 msedge.exe 85 PID 3352 wrote to memory of 1316 3352 msedge.exe 85 PID 3352 wrote to memory of 1316 3352 msedge.exe 85 PID 3352 wrote to memory of 1316 3352 msedge.exe 85 PID 3352 wrote to memory of 1316 3352 msedge.exe 85 PID 3352 wrote to memory of 1316 3352 msedge.exe 85 PID 3352 wrote to memory of 1316 3352 msedge.exe 85 PID 3352 wrote to memory of 1316 3352 msedge.exe 85 PID 3352 wrote to memory of 1316 3352 msedge.exe 85 PID 3352 wrote to memory of 2620 3352 msedge.exe 86 PID 3352 wrote to memory of 2620 3352 msedge.exe 86 PID 3352 wrote to memory of 2244 3352 msedge.exe 87 PID 3352 wrote to memory of 2244 3352 msedge.exe 87 PID 3352 wrote to memory of 2244 3352 msedge.exe 87 PID 3352 wrote to memory of 2244 3352 msedge.exe 87 PID 3352 wrote to memory of 2244 3352 msedge.exe 87 PID 3352 wrote to memory of 2244 3352 msedge.exe 87 PID 3352 wrote to memory of 2244 3352 msedge.exe 87 PID 3352 wrote to memory of 2244 3352 msedge.exe 87 PID 3352 wrote to memory of 2244 3352 msedge.exe 87 PID 3352 wrote to memory of 2244 3352 msedge.exe 87 PID 3352 wrote to memory of 2244 3352 msedge.exe 87 PID 3352 wrote to memory of 2244 3352 msedge.exe 87 PID 3352 wrote to memory of 2244 3352 msedge.exe 87 PID 3352 wrote to memory of 2244 3352 msedge.exe 87 PID 3352 wrote to memory of 2244 3352 msedge.exe 87 PID 3352 wrote to memory of 2244 3352 msedge.exe 87 PID 3352 wrote to memory of 2244 3352 msedge.exe 87 PID 3352 wrote to memory of 2244 3352 msedge.exe 87 PID 3352 wrote to memory of 2244 3352 msedge.exe 87 PID 3352 wrote to memory of 2244 3352 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\a968ae8b341fea64aeb3983d7dda9f1d_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3352 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa94f546f8,0x7ffa94f54708,0x7ffa94f547182⤵PID:3948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,10570820146448840378,1625264956770334016,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2144 /prefetch:22⤵PID:1316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2152,10570820146448840378,1625264956770334016,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2236 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2152,10570820146448840378,1625264956770334016,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2884 /prefetch:82⤵PID:2244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,10570820146448840378,1625264956770334016,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2156 /prefetch:12⤵PID:5064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,10570820146448840378,1625264956770334016,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:3048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,10570820146448840378,1625264956770334016,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4264 /prefetch:12⤵PID:1276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,10570820146448840378,1625264956770334016,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5216 /prefetch:12⤵PID:624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,10570820146448840378,1625264956770334016,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3772 /prefetch:12⤵PID:312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,10570820146448840378,1625264956770334016,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5372 /prefetch:12⤵PID:3632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,10570820146448840378,1625264956770334016,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5928 /prefetch:12⤵PID:3884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,10570820146448840378,1625264956770334016,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5944 /prefetch:12⤵PID:1708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,10570820146448840378,1625264956770334016,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6372 /prefetch:82⤵PID:1676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,10570820146448840378,1625264956770334016,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6372 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,10570820146448840378,1625264956770334016,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5408 /prefetch:12⤵PID:5264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,10570820146448840378,1625264956770334016,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6520 /prefetch:12⤵PID:5272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,10570820146448840378,1625264956770334016,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3244 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1536
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4752
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:448
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5111c361619c017b5d09a13a56938bd54
SHA1e02b363a8ceb95751623f25025a9299a2c931e07
SHA256d7be4042a1e3511b0dbf0ab5c493245e4ac314440a4ae0732813db01a21ef8bc
SHA512fc16a4ad0b56899b82d05114d7b0ca8ee610cdba6ff0b6a67dea44faf17b3105109335359b78c0a59c9011a13152744a7f5d4f6a5b66ea519df750ef03f622b2
-
Filesize
152B
MD5983cbc1f706a155d63496ebc4d66515e
SHA1223d0071718b80cad9239e58c5e8e64df6e2a2fe
SHA256cc34b8f8e3f4bfe4c9a227d88f56ea2dd276ca3ac81df622ff5e9a8ec46b951c
SHA512d9cf2ca46d9379902730c81e615a3eb694873ffd535c6bb3ded2dc97cdbbfb71051ab11a07754ed6f610f04285605b702b5a48a6cfda3ee3287230c41c9c45cd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize840B
MD5885c6b30a589ffbc0cf6b8ff68d093bb
SHA1dc98797dccc54c381610ed5f1ff014259f660c57
SHA2566d7b4db947bbbae00a70e81f26e2c8235c7308799074083a7e3145d627ed0f65
SHA51290256e158a74f300b1b66ded3abcea67ca8f70c506e040e140a1f8442320073cc49919d2f677fea167ddd66929f13a0d04d87a88092532ea21ac040a6fd92ff4
-
Filesize
2KB
MD59a4cd0ea4b19f246ae26c3f0662e384c
SHA1b8755baa98a963143596a782f2b9838785741835
SHA25674b1a360c468087be738e6b8983bceff444b47bc93aad7ab81de87ed276211d5
SHA512dca4ef3075ef51ede44c5cdd41f558bb847565053326fa887b50f9aa8bf15039d68a04379bf9733a9c1faaaa815d1b029d1cb6556a31dfdc1dbf0585ef770754
-
Filesize
6KB
MD52703229e4e36d9ef41556e20b6601136
SHA1e0f92cc41f9bcfa5c0c1d6bab2dfaf4f64c981bc
SHA25606ed0ceb33ca1d513a66aa0ef0514c26f7d1d0997a4afe06a687ffde09abc789
SHA5126e62c63e78850ba7719a54e7e05b049627b78ee7ea4860ee23a385cd94b54c1708d73fb862c8140242906a2ae3643f57a7fd2fd34c0a0f813c0fcc875d05f515
-
Filesize
5KB
MD5f3d73def98d9c75e3c8ff715da84c0b2
SHA174d634decc3f910efc6b8677684005fa35dfce3d
SHA25699395fe9ece101eba6467575f9bd9f0b48e3039ea379ec59db167b335fca6c1d
SHA5129bd966835b0f5302f79de2bd2905804bc96263517970258487c19f318b81bbbdae299a597188b0e8ec430149723fd53f73adf629f8597e995936196d15d5947f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD579ad06ac67eee8b808c72b4a669e1942
SHA13dff094da54c924ac2e357cbdf18d75ec359795d
SHA25675d7e85766c56b035f338d720fb2e271a059a4f774edd21a829623e1eb5043e5
SHA5126139f79b3865fe6e1ed8751451d8120fbeb52d95fa50655aab46603ac59990461247942454fac02af06b9abe11a1f5f6936992aac2af0fefea465142aef839a4