Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25-08-2024 10:12
Static task
static1
Behavioral task
behavioral1
Sample
c0832255ef1c27edb005762f24e5e6b4_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c0832255ef1c27edb005762f24e5e6b4_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c0832255ef1c27edb005762f24e5e6b4_JaffaCakes118.html
-
Size
10KB
-
MD5
c0832255ef1c27edb005762f24e5e6b4
-
SHA1
6fba8604b40ac7be9bae79915f9ea061fe76c06b
-
SHA256
1a104b5a9458b1bc8dac82be2693da84d613997169e286fb1cafc24c221c3edb
-
SHA512
28b3b53a79b1538b9b679f2eac7debdc9c66daaefd157378ae86a709b9732ef3331df456728b6945a005089b97c9c94c1e5e31d6348fe41c233068a1d217f94f
-
SSDEEP
192:q6kB74IqLRHbmwGzb9PcIe5DuLV8WX+TzDjiYUeynRp9dFOSSJSj5QLd:1bmXz5dODgjO1yRp9m/Sq
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2336 msedge.exe 2336 msedge.exe 3184 msedge.exe 3184 msedge.exe 2364 identity_helper.exe 2364 identity_helper.exe 5560 msedge.exe 5560 msedge.exe 5560 msedge.exe 5560 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3184 wrote to memory of 2924 3184 msedge.exe 83 PID 3184 wrote to memory of 2924 3184 msedge.exe 83 PID 3184 wrote to memory of 1444 3184 msedge.exe 84 PID 3184 wrote to memory of 1444 3184 msedge.exe 84 PID 3184 wrote to memory of 1444 3184 msedge.exe 84 PID 3184 wrote to memory of 1444 3184 msedge.exe 84 PID 3184 wrote to memory of 1444 3184 msedge.exe 84 PID 3184 wrote to memory of 1444 3184 msedge.exe 84 PID 3184 wrote to memory of 1444 3184 msedge.exe 84 PID 3184 wrote to memory of 1444 3184 msedge.exe 84 PID 3184 wrote to memory of 1444 3184 msedge.exe 84 PID 3184 wrote to memory of 1444 3184 msedge.exe 84 PID 3184 wrote to memory of 1444 3184 msedge.exe 84 PID 3184 wrote to memory of 1444 3184 msedge.exe 84 PID 3184 wrote to memory of 1444 3184 msedge.exe 84 PID 3184 wrote to memory of 1444 3184 msedge.exe 84 PID 3184 wrote to memory of 1444 3184 msedge.exe 84 PID 3184 wrote to memory of 1444 3184 msedge.exe 84 PID 3184 wrote to memory of 1444 3184 msedge.exe 84 PID 3184 wrote to memory of 1444 3184 msedge.exe 84 PID 3184 wrote to memory of 1444 3184 msedge.exe 84 PID 3184 wrote to memory of 1444 3184 msedge.exe 84 PID 3184 wrote to memory of 1444 3184 msedge.exe 84 PID 3184 wrote to memory of 1444 3184 msedge.exe 84 PID 3184 wrote to memory of 1444 3184 msedge.exe 84 PID 3184 wrote to memory of 1444 3184 msedge.exe 84 PID 3184 wrote to memory of 1444 3184 msedge.exe 84 PID 3184 wrote to memory of 1444 3184 msedge.exe 84 PID 3184 wrote to memory of 1444 3184 msedge.exe 84 PID 3184 wrote to memory of 1444 3184 msedge.exe 84 PID 3184 wrote to memory of 1444 3184 msedge.exe 84 PID 3184 wrote to memory of 1444 3184 msedge.exe 84 PID 3184 wrote to memory of 1444 3184 msedge.exe 84 PID 3184 wrote to memory of 1444 3184 msedge.exe 84 PID 3184 wrote to memory of 1444 3184 msedge.exe 84 PID 3184 wrote to memory of 1444 3184 msedge.exe 84 PID 3184 wrote to memory of 1444 3184 msedge.exe 84 PID 3184 wrote to memory of 1444 3184 msedge.exe 84 PID 3184 wrote to memory of 1444 3184 msedge.exe 84 PID 3184 wrote to memory of 1444 3184 msedge.exe 84 PID 3184 wrote to memory of 1444 3184 msedge.exe 84 PID 3184 wrote to memory of 1444 3184 msedge.exe 84 PID 3184 wrote to memory of 2336 3184 msedge.exe 85 PID 3184 wrote to memory of 2336 3184 msedge.exe 85 PID 3184 wrote to memory of 1048 3184 msedge.exe 86 PID 3184 wrote to memory of 1048 3184 msedge.exe 86 PID 3184 wrote to memory of 1048 3184 msedge.exe 86 PID 3184 wrote to memory of 1048 3184 msedge.exe 86 PID 3184 wrote to memory of 1048 3184 msedge.exe 86 PID 3184 wrote to memory of 1048 3184 msedge.exe 86 PID 3184 wrote to memory of 1048 3184 msedge.exe 86 PID 3184 wrote to memory of 1048 3184 msedge.exe 86 PID 3184 wrote to memory of 1048 3184 msedge.exe 86 PID 3184 wrote to memory of 1048 3184 msedge.exe 86 PID 3184 wrote to memory of 1048 3184 msedge.exe 86 PID 3184 wrote to memory of 1048 3184 msedge.exe 86 PID 3184 wrote to memory of 1048 3184 msedge.exe 86 PID 3184 wrote to memory of 1048 3184 msedge.exe 86 PID 3184 wrote to memory of 1048 3184 msedge.exe 86 PID 3184 wrote to memory of 1048 3184 msedge.exe 86 PID 3184 wrote to memory of 1048 3184 msedge.exe 86 PID 3184 wrote to memory of 1048 3184 msedge.exe 86 PID 3184 wrote to memory of 1048 3184 msedge.exe 86 PID 3184 wrote to memory of 1048 3184 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\c0832255ef1c27edb005762f24e5e6b4_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3184 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff96f2046f8,0x7ff96f204708,0x7ff96f2047182⤵PID:2924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,7443806583302198433,13696858918261091245,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵PID:1444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,7443806583302198433,13696858918261091245,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2316 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,7443806583302198433,13696858918261091245,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2900 /prefetch:82⤵PID:1048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,7443806583302198433,13696858918261091245,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:2156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,7443806583302198433,13696858918261091245,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:3572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,7443806583302198433,13696858918261091245,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4280 /prefetch:12⤵PID:4032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,7443806583302198433,13696858918261091245,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5152 /prefetch:12⤵PID:4832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,7443806583302198433,13696858918261091245,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4456 /prefetch:82⤵PID:3276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,7443806583302198433,13696858918261091245,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4456 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,7443806583302198433,13696858918261091245,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5532 /prefetch:12⤵PID:3148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,7443806583302198433,13696858918261091245,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5548 /prefetch:12⤵PID:3784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,7443806583302198433,13696858918261091245,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5908 /prefetch:12⤵PID:3752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,7443806583302198433,13696858918261091245,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5840 /prefetch:12⤵PID:5040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,7443806583302198433,13696858918261091245,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5228 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5560
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4464
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:624
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d7114a6cd851f9bf56cf771c37d664a2
SHA1769c5d04fd83e583f15ab1ef659de8f883ecab8a
SHA256d2c75c7d68c474d4b8847b4ba6cfd09fe90717f46dd398c86483d825a66e977e
SHA51233bdae2305ae98e7c0de576de5a6600bd70a425e7b891d745cba9de992036df1b3d1df9572edb0f89f320e50962d06532dae9491985b6b57fd37d5f46f7a2ff8
-
Filesize
152B
MD5719923124ee00fb57378e0ebcbe894f7
SHA1cc356a7d27b8b27dc33f21bd4990f286ee13a9f9
SHA256aa22ab845fa08c786bd3366ec39f733d5be80e9ac933ed115ff048ff30090808
SHA512a207b6646500d0d504cf70ee10f57948e58dab7f214ad2e7c4af0e7ca23ce1d37c8c745873137e6c55bdcf0f527031a66d9cc54805a0eac3678be6dd497a5bbc
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize192B
MD5eaff825865fd46b241b60355dea52f31
SHA1a005755f668dc1a12ffc6ef71fb36768419ad0c1
SHA256a1e3f089c4c952074942b9da046edd2122826fe08146ead8d6281664987c9ab5
SHA512803778a586fc9ef3271f0f8fa7eb018a160bac429890e8a113d69ee0359fa68845a36acc64b1dd0a75bd07c1d446349ae4771b44e98acb300190ed5a2cb929b5
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
277B
MD5c1784da0b7fc2e1ad01607909076626b
SHA1cb0f9841d457e41920c6f53571baab4d05f3a9dc
SHA256325b1f2d4d53588b14c5c7c4af79c4559bc039265866035d0be32bf8b8882210
SHA51265f9fcf7ad5ea6baae811e3f0315a48f9d6a3035fe57affc632682536025f47c361e95e144ee846943ba9ba48608bd0caaa8ed332b60eaf54ae138a5de0f14d1
-
Filesize
5KB
MD5fee6ffc1259e68ea8d51dd9cca79f594
SHA1a0e45e48d7fdd22c8259da305967a2790aba76f7
SHA256f57508867b83e04700a5f197a6e5648e4b102c6466044c728d0825bfabd41a62
SHA512d21766ded8a7718d912fffa4a30ddcf3542767abb6e465973deb158d2ed7c6c1689ae28b23e7d09fa12945bcbb8b09f22eeb2be6bfc08e93dfa7c48104e298c6
-
Filesize
6KB
MD58d4bd17fd4b8daac114675b8a55b5b83
SHA19003767e36675a1643f86c95553e24388bf7a4ac
SHA25607a0d3ad13337ca208e5478b8519fb8850a90c83f7d87f3c02aca334bc40bf83
SHA512da0d7f0e2c2ff4a3f22180b59309b6187152dab57fe1bdd72c49383e71f37fabba83a3d9c860b4be184b21bae87683f8cdee50f37b72ea6ea979d38c155ff6fb
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD569d1264d4e8277e081c03de8d39d7604
SHA13b0eb0e0d5e202d4d447d4289a1df2e5897822cd
SHA256889649b28802701e6cccc09d9b08915314e1064ebfff783cb2394b29c723ce64
SHA512f7e9cff93714b432dded7472d31a3bb9ddde2c608ecd61ccad2dc34ad10b0c0ebf7c404c1ca16724c054c85d7d0f436ca3614fa4785bd6da12776479c8eccc77