Analysis
-
max time kernel
149s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25/08/2024, 12:50
Static task
static1
Behavioral task
behavioral1
Sample
c0c78b75c9a378bc913adceb0dee4f77_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
c0c78b75c9a378bc913adceb0dee4f77_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c0c78b75c9a378bc913adceb0dee4f77_JaffaCakes118.html
-
Size
228KB
-
MD5
c0c78b75c9a378bc913adceb0dee4f77
-
SHA1
ec47fa28ae7fc54c1031ed6c98f554023681b102
-
SHA256
9561921c62a51ee7df1c150f4372d986f8b6eda2419db40c663b1e4c3fd32caf
-
SHA512
4ebd23d3451afec11fe2c9034c2f1b8cffca1b15cda3b88219e2ae0abd153483145f79e5d71645ce7c6aeb2b01c693a48b8df8c7c7445e02ec131afee2543b29
-
SSDEEP
6144:jmIs4uGA2fRo03rrqgj11DGfVwf56JgprU5uEu2yvVpnUl1ZxInmALBq1JGsxNB5:j3T1aJtxPd
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3996 msedge.exe 3996 msedge.exe 3208 msedge.exe 3208 msedge.exe 2972 identity_helper.exe 2972 identity_helper.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe 3208 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3208 wrote to memory of 1804 3208 msedge.exe 84 PID 3208 wrote to memory of 1804 3208 msedge.exe 84 PID 3208 wrote to memory of 4116 3208 msedge.exe 85 PID 3208 wrote to memory of 4116 3208 msedge.exe 85 PID 3208 wrote to memory of 4116 3208 msedge.exe 85 PID 3208 wrote to memory of 4116 3208 msedge.exe 85 PID 3208 wrote to memory of 4116 3208 msedge.exe 85 PID 3208 wrote to memory of 4116 3208 msedge.exe 85 PID 3208 wrote to memory of 4116 3208 msedge.exe 85 PID 3208 wrote to memory of 4116 3208 msedge.exe 85 PID 3208 wrote to memory of 4116 3208 msedge.exe 85 PID 3208 wrote to memory of 4116 3208 msedge.exe 85 PID 3208 wrote to memory of 4116 3208 msedge.exe 85 PID 3208 wrote to memory of 4116 3208 msedge.exe 85 PID 3208 wrote to memory of 4116 3208 msedge.exe 85 PID 3208 wrote to memory of 4116 3208 msedge.exe 85 PID 3208 wrote to memory of 4116 3208 msedge.exe 85 PID 3208 wrote to memory of 4116 3208 msedge.exe 85 PID 3208 wrote to memory of 4116 3208 msedge.exe 85 PID 3208 wrote to memory of 4116 3208 msedge.exe 85 PID 3208 wrote to memory of 4116 3208 msedge.exe 85 PID 3208 wrote to memory of 4116 3208 msedge.exe 85 PID 3208 wrote to memory of 4116 3208 msedge.exe 85 PID 3208 wrote to memory of 4116 3208 msedge.exe 85 PID 3208 wrote to memory of 4116 3208 msedge.exe 85 PID 3208 wrote to memory of 4116 3208 msedge.exe 85 PID 3208 wrote to memory of 4116 3208 msedge.exe 85 PID 3208 wrote to memory of 4116 3208 msedge.exe 85 PID 3208 wrote to memory of 4116 3208 msedge.exe 85 PID 3208 wrote to memory of 4116 3208 msedge.exe 85 PID 3208 wrote to memory of 4116 3208 msedge.exe 85 PID 3208 wrote to memory of 4116 3208 msedge.exe 85 PID 3208 wrote to memory of 4116 3208 msedge.exe 85 PID 3208 wrote to memory of 4116 3208 msedge.exe 85 PID 3208 wrote to memory of 4116 3208 msedge.exe 85 PID 3208 wrote to memory of 4116 3208 msedge.exe 85 PID 3208 wrote to memory of 4116 3208 msedge.exe 85 PID 3208 wrote to memory of 4116 3208 msedge.exe 85 PID 3208 wrote to memory of 4116 3208 msedge.exe 85 PID 3208 wrote to memory of 4116 3208 msedge.exe 85 PID 3208 wrote to memory of 4116 3208 msedge.exe 85 PID 3208 wrote to memory of 4116 3208 msedge.exe 85 PID 3208 wrote to memory of 3996 3208 msedge.exe 86 PID 3208 wrote to memory of 3996 3208 msedge.exe 86 PID 3208 wrote to memory of 3752 3208 msedge.exe 87 PID 3208 wrote to memory of 3752 3208 msedge.exe 87 PID 3208 wrote to memory of 3752 3208 msedge.exe 87 PID 3208 wrote to memory of 3752 3208 msedge.exe 87 PID 3208 wrote to memory of 3752 3208 msedge.exe 87 PID 3208 wrote to memory of 3752 3208 msedge.exe 87 PID 3208 wrote to memory of 3752 3208 msedge.exe 87 PID 3208 wrote to memory of 3752 3208 msedge.exe 87 PID 3208 wrote to memory of 3752 3208 msedge.exe 87 PID 3208 wrote to memory of 3752 3208 msedge.exe 87 PID 3208 wrote to memory of 3752 3208 msedge.exe 87 PID 3208 wrote to memory of 3752 3208 msedge.exe 87 PID 3208 wrote to memory of 3752 3208 msedge.exe 87 PID 3208 wrote to memory of 3752 3208 msedge.exe 87 PID 3208 wrote to memory of 3752 3208 msedge.exe 87 PID 3208 wrote to memory of 3752 3208 msedge.exe 87 PID 3208 wrote to memory of 3752 3208 msedge.exe 87 PID 3208 wrote to memory of 3752 3208 msedge.exe 87 PID 3208 wrote to memory of 3752 3208 msedge.exe 87 PID 3208 wrote to memory of 3752 3208 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\c0c78b75c9a378bc913adceb0dee4f77_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3208 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa527746f8,0x7ffa52774708,0x7ffa527747182⤵PID:1804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,10125140829595879220,11492162468543473956,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:22⤵PID:4116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2140,10125140829595879220,11492162468543473956,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2228 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2140,10125140829595879220,11492162468543473956,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2680 /prefetch:82⤵PID:3752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,10125140829595879220,11492162468543473956,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3184 /prefetch:12⤵PID:1712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,10125140829595879220,11492162468543473956,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,10125140829595879220,11492162468543473956,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4632 /prefetch:12⤵PID:756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,10125140829595879220,11492162468543473956,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4012 /prefetch:12⤵PID:4268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,10125140829595879220,11492162468543473956,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5092 /prefetch:12⤵PID:3268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,10125140829595879220,11492162468543473956,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6272 /prefetch:82⤵PID:4052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,10125140829595879220,11492162468543473956,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6272 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,10125140829595879220,11492162468543473956,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6020 /prefetch:12⤵PID:2892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,10125140829595879220,11492162468543473956,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5932 /prefetch:12⤵PID:5000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,10125140829595879220,11492162468543473956,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4004 /prefetch:12⤵PID:5240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,10125140829595879220,11492162468543473956,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5124 /prefetch:12⤵PID:5248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,10125140829595879220,11492162468543473956,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5176 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2036
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3120
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4252
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD596142ba45f7203a8c4d877b2d70588b6
SHA1e1d1ac761b3c41ba0a3409d7bec68ca22ae1fac7
SHA256dac3fb834fb077720a5a79f49add75e37c15bd07ac063b5516061ffc611c334b
SHA512fe09d408370c5ddfa3264f870118fd2edb2e4184871a8029bb62a438be6da78a8e1f72d176149ce6a4963e9981136dc878aedb1e0c660833482a9850680a4beb
-
Filesize
152B
MD5b367ffa3cd6896506992c5bb8b91addf
SHA193c9bded12fd3a814e4a87d1ab6b102818a9996e
SHA256a2e0b202caf41d3a5fbde3824043e423cc9ce0ec9653a9d1a2d23b04c1467b96
SHA51244e2745fad967ce9b7a2be00b75d6617d441ebe2763d81a8c038d57906b1c94d6d57c930141331c39e032a284b59014646dd9054be213fd973e75a2269466a8a
-
Filesize
212KB
MD52257803a7e34c3abd90ec6d41fd76a5a
SHA1f7a32e6635d8513f74bd225f55d867ea56ae4803
SHA256af23860fb3a448f2cc6107680078402555a345eb45bc5efb750f541fe5d7c174
SHA512e9f4dc90d0829885f08879e868aa62041150b500f62682fc108da258eee26ad9509dcbf6e8a55f2d0bdba7aa9118dd149a70a7d851820d4ea683db7808c48540
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize504B
MD5a406d411563ec4db62e186a6414b6a9d
SHA1abb5026e4a4301effd42950ca97b77ec7b557707
SHA256c80f58802e51138cfdddc16d362b6494b32e4d571969a6ada9a3e7885313de49
SHA512902ef27b436944e840933305862f8a1953bd6bf6c4d125c0297be373e82924593b1156ce888345f901de14c254158e62be57f92ee36d227f53d45583ead61626
-
Filesize
1KB
MD50f01db8756a1f8c33797fef7a41aa6ba
SHA133dd44b3dbfa61c3b9aae8ff8b7ef861fcac9f58
SHA2568a52ab2277fd8df107a03acc3b8705153224339289c64daa27cf6c8d8e1493c3
SHA512366179d41a8a0cf21539185a027c38d002d43c19a3629651ff7c4200652d7dcee5fc0e38e2ca2b911e084c3b4a11a556ea94406ea51708ce79d21f714e215e2f
-
Filesize
5KB
MD5e390286c32fa5687c8c2add2000015ed
SHA16c82e89dcb43b51fecce0f8f37d5c159c2ca4bab
SHA2565f15330c09de1736a65ed0f73263ff582e97e84b0f29d89a9da27bffdbbd76f3
SHA5126822415c5ba3eb311416e3fcf21c66ef316603d80f91be3cf55deb291509f68ac627edef1a3a7f1875ce69be38ea8eeb746459792d9cbd8080860bea912d2c95
-
Filesize
5KB
MD5c0ded1619ed74bb0795763a32a600f4e
SHA1550a0e044ebf4fbe5b8640be216050f871355016
SHA256770a3f6adc29a0372cbcca6b35788f8cff77333ad639677232b3a39fcfcb552e
SHA51230256caaf5110ded64eec1b745aecb2e6d3b5471fe89fe1a8d0e02c1e17e2a92671e6a80e17201e9986f0243a397f849ded69c023922e639874bf4146df96cd7
-
Filesize
24KB
MD5852d886f30a60b001ee9e16d15da655c
SHA1713ae02473e2af931fb4455db3be07a00c734e97
SHA2560c05a4e24bafde15c1c9cfa778ac25eb5552c22b1a589b7b473eebc752a6ca68
SHA51209625a70076a264b7138dc14f2fe81b0e8ad6cc0ecb3cc4f5d5bd73eb58fab1e2528c5e3a3a40837740895a5a694b94b2fa174a8595960ef122823a4132d4f73
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5488efcf3bf32bb41537637f39e514735
SHA1040619705343debcbf85f10cb6d8f58f84942cdf
SHA25616f76a512d26609fbf33c78cd49a7cb056356e0c71db4e888cd2a3bf06daee46
SHA5121319407b43765b9a48fa1d6cf73c0a6253fd31713c9468f835181b785f03ea2fec3574f027ab257a24878246a5450be099233c9b9925b0b42fb52ac8c0c3f2df