Analysis
-
max time kernel
145s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25/08/2024, 17:32
Static task
static1
Behavioral task
behavioral1
Sample
c13af29b1d18df75808797d55fd419b4_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c13af29b1d18df75808797d55fd419b4_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c13af29b1d18df75808797d55fd419b4_JaffaCakes118.html
-
Size
49KB
-
MD5
c13af29b1d18df75808797d55fd419b4
-
SHA1
9b784f83904453a874a9e43bd6228c32765bcece
-
SHA256
82385e86d84460217ddaa2ade7ac50183a49d22a15aa221ea29cf214e9e26ad9
-
SHA512
bfd2aec4a3bd2bf564280e5ab2f932b88e0b9031bed102176e41f0d4101c022671ca9cdd0186bc6e58825107aede0fa25df34faeee09c9737164906304c7bf91
-
SSDEEP
1536:wbKeZcZMWVxA+djEOuGTnCLvpjto3FkF96jPsCVEGkzTi9LGCxUEBlM22E5k:5eaGWV4lJQkF96jPsCVEGkzTi9LGCxUJ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2940 msedge.exe 2940 msedge.exe 2400 msedge.exe 2400 msedge.exe 4676 identity_helper.exe 4676 identity_helper.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe 2400 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2400 wrote to memory of 1256 2400 msedge.exe 84 PID 2400 wrote to memory of 1256 2400 msedge.exe 84 PID 2400 wrote to memory of 2728 2400 msedge.exe 85 PID 2400 wrote to memory of 2728 2400 msedge.exe 85 PID 2400 wrote to memory of 2728 2400 msedge.exe 85 PID 2400 wrote to memory of 2728 2400 msedge.exe 85 PID 2400 wrote to memory of 2728 2400 msedge.exe 85 PID 2400 wrote to memory of 2728 2400 msedge.exe 85 PID 2400 wrote to memory of 2728 2400 msedge.exe 85 PID 2400 wrote to memory of 2728 2400 msedge.exe 85 PID 2400 wrote to memory of 2728 2400 msedge.exe 85 PID 2400 wrote to memory of 2728 2400 msedge.exe 85 PID 2400 wrote to memory of 2728 2400 msedge.exe 85 PID 2400 wrote to memory of 2728 2400 msedge.exe 85 PID 2400 wrote to memory of 2728 2400 msedge.exe 85 PID 2400 wrote to memory of 2728 2400 msedge.exe 85 PID 2400 wrote to memory of 2728 2400 msedge.exe 85 PID 2400 wrote to memory of 2728 2400 msedge.exe 85 PID 2400 wrote to memory of 2728 2400 msedge.exe 85 PID 2400 wrote to memory of 2728 2400 msedge.exe 85 PID 2400 wrote to memory of 2728 2400 msedge.exe 85 PID 2400 wrote to memory of 2728 2400 msedge.exe 85 PID 2400 wrote to memory of 2728 2400 msedge.exe 85 PID 2400 wrote to memory of 2728 2400 msedge.exe 85 PID 2400 wrote to memory of 2728 2400 msedge.exe 85 PID 2400 wrote to memory of 2728 2400 msedge.exe 85 PID 2400 wrote to memory of 2728 2400 msedge.exe 85 PID 2400 wrote to memory of 2728 2400 msedge.exe 85 PID 2400 wrote to memory of 2728 2400 msedge.exe 85 PID 2400 wrote to memory of 2728 2400 msedge.exe 85 PID 2400 wrote to memory of 2728 2400 msedge.exe 85 PID 2400 wrote to memory of 2728 2400 msedge.exe 85 PID 2400 wrote to memory of 2728 2400 msedge.exe 85 PID 2400 wrote to memory of 2728 2400 msedge.exe 85 PID 2400 wrote to memory of 2728 2400 msedge.exe 85 PID 2400 wrote to memory of 2728 2400 msedge.exe 85 PID 2400 wrote to memory of 2728 2400 msedge.exe 85 PID 2400 wrote to memory of 2728 2400 msedge.exe 85 PID 2400 wrote to memory of 2728 2400 msedge.exe 85 PID 2400 wrote to memory of 2728 2400 msedge.exe 85 PID 2400 wrote to memory of 2728 2400 msedge.exe 85 PID 2400 wrote to memory of 2728 2400 msedge.exe 85 PID 2400 wrote to memory of 2940 2400 msedge.exe 86 PID 2400 wrote to memory of 2940 2400 msedge.exe 86 PID 2400 wrote to memory of 4816 2400 msedge.exe 87 PID 2400 wrote to memory of 4816 2400 msedge.exe 87 PID 2400 wrote to memory of 4816 2400 msedge.exe 87 PID 2400 wrote to memory of 4816 2400 msedge.exe 87 PID 2400 wrote to memory of 4816 2400 msedge.exe 87 PID 2400 wrote to memory of 4816 2400 msedge.exe 87 PID 2400 wrote to memory of 4816 2400 msedge.exe 87 PID 2400 wrote to memory of 4816 2400 msedge.exe 87 PID 2400 wrote to memory of 4816 2400 msedge.exe 87 PID 2400 wrote to memory of 4816 2400 msedge.exe 87 PID 2400 wrote to memory of 4816 2400 msedge.exe 87 PID 2400 wrote to memory of 4816 2400 msedge.exe 87 PID 2400 wrote to memory of 4816 2400 msedge.exe 87 PID 2400 wrote to memory of 4816 2400 msedge.exe 87 PID 2400 wrote to memory of 4816 2400 msedge.exe 87 PID 2400 wrote to memory of 4816 2400 msedge.exe 87 PID 2400 wrote to memory of 4816 2400 msedge.exe 87 PID 2400 wrote to memory of 4816 2400 msedge.exe 87 PID 2400 wrote to memory of 4816 2400 msedge.exe 87 PID 2400 wrote to memory of 4816 2400 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\c13af29b1d18df75808797d55fd419b4_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff379446f8,0x7fff37944708,0x7fff379447182⤵PID:1256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,10912139349808952891,12726223876257885395,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:22⤵PID:2728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,10912139349808952891,12726223876257885395,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,10912139349808952891,12726223876257885395,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2920 /prefetch:82⤵PID:4816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,10912139349808952891,12726223876257885395,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:1264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,10912139349808952891,12726223876257885395,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:3576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,10912139349808952891,12726223876257885395,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1784 /prefetch:12⤵PID:2284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,10912139349808952891,12726223876257885395,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5568 /prefetch:82⤵PID:3940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,10912139349808952891,12726223876257885395,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5568 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,10912139349808952891,12726223876257885395,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4256 /prefetch:12⤵PID:4716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,10912139349808952891,12726223876257885395,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4248 /prefetch:12⤵PID:3432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,10912139349808952891,12726223876257885395,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4200 /prefetch:12⤵PID:4964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,10912139349808952891,12726223876257885395,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2800 /prefetch:12⤵PID:516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,10912139349808952891,12726223876257885395,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5184 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3932
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1980
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5004
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ab8ce148cb7d44f709fb1c460d03e1b0
SHA144d15744015155f3e74580c93317e12d2cc0f859
SHA256014006a90e43ea9a1903b08b843a5aab8ad3823d22e26e5b113fad5f9fa620ff
SHA512f685423b1eaee18a2a06030b4b2977335f62499c0041c142a92f6e6f846c2b9ce54324b6ae94efbbb303282dcda70e2b1597c748fddc251c0b3122a412c2d7c4
-
Filesize
152B
MD538f59a47b777f2fc52088e96ffb2baaf
SHA1267224482588b41a96d813f6d9e9d924867062db
SHA25613569c5681c71dc42ab57d34879f5a567d7b94afe0e8f6d7c6f6c1314fb0087b
SHA5124657d13e1bb7cdd7e83f5f2562f5598cca12edf839626ae96da43e943b5550fab46a14b9018f1bec90de88cc714f637605531ccda99deb9e537908ddb826113b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize480B
MD5af6fb7989b64cd8bde4ec727262b8e66
SHA1296239a0f7103cc9e95079f3b35638f354d2f8c5
SHA256c8553431b8540cbb8984e460bf0cbc766af504a5509358c479cf7a556a96a037
SHA5127b4557312a7f9306ed8ea1dbdd892a7813571127f41a3689271f4436cd81da773e7637c17596856e1a25a0f8161f7578e5ae36b43a6fbb44520d912720eab675
-
Filesize
405B
MD58c089b26314de8e297465005e12631c2
SHA1d2416108684f84468dd9b9bf0c2df6d00b8fe441
SHA2568a4de5d52281d1583c5be968dbf9f5ee92c8e12ae8dacac6d5bdb4f62db6b730
SHA512364d7721f815b5c765826e2a188d1ac24c3d19b1c46ad33eafc84f7ba26ac0d467ed1c14d4cf9e865f65750a563490d012004845992336aa16ad1621de3dbfa9
-
Filesize
5KB
MD505d8b9d86915d6e6a076f044bd1cde82
SHA1f6e46cac9ffedd4526b87f6f0bb6a38deac57413
SHA256615ccc4690d711e0cee8e135c233ceda9252eebc0c9b1b820438e8b5b489a1bb
SHA51209f1cbf6e7bb3157f299f80237b69e6edef027ce7e13d3da11030d187e5a23ea7274f4930271026d45906cff7029d544e37b22700e3018c0b3bc54dd73c0c4c3
-
Filesize
6KB
MD504ec82d8ab4d0e0b1d50e90541ee8b3e
SHA17522a3c14f384303362992f9538827dbaff2b24b
SHA2563c221b2eb3807519a00afcfa71f952dceafa912b2f3d4e2d306751cc1a703613
SHA512467d4df81cb16bcf6925fc7e25b0166158e88b5d4bc715d9da4cafdfb16e1704199cad3c4a8c674e878ee0959a00cf3f9ba31b964556e41d661c22e726c522e5
-
Filesize
6KB
MD5a6a07120d33268f4d7a6a3ad36ec8463
SHA1bcefaaf8c1504ac0bd9350ae81cc77392a8ab967
SHA256b61d683ee105a9a5a333aca12e37dcd11feb361bb40ff3b5099905323d5357dd
SHA5127052a46782c16bfbf43aae4946a2808a44aa1b8b60c3d7f7afa62c3b6f40b671879b2da36a7044b0b5ea0c385fccab44d9039931f149fda0e8adafc9cee75b4d
-
Filesize
6KB
MD5b8157009a48bc571bb1c2ff0869dac1e
SHA18ca31630e7caf059de76483260459aba87e65e8f
SHA2561f99d5d87c29b2685056dc7bdba6d7be836e24c46a7a7bc0b46231c6d725ff8f
SHA5127192f513076f6e12f21403c1c5c0d024f48d7addd188bc3a65e32caadf25c3694eb00c8946fe95ce37ca96ef4b4df730e23cc51a98dbdb27901b8127f442b4c9
-
Filesize
705B
MD57994065ac83d2e2ea61f74bd98bd1831
SHA11ea4c4b6a113061c133fc4312caf6d235a574f8f
SHA25642bd645772e9fbff40721badd38ed0a0221322f910f64cc5e4a7be79a04c84eb
SHA512175dd39de13b4436a9f34f691423bba2bb607a06a7600117dce035cc7358b2a57c0be785a857eb1d711cd1d5844a77ed5b5d928d3379ddee9224c83d131e1dad
-
Filesize
203B
MD5f31c1404d884b03fdef1eedf061eadc5
SHA1b51964beadaf16d3be8307c3adaa38af8e4d8f32
SHA256537cac179078e566949342fe1065681d43aa052293a6390760ef85136278a30a
SHA5126a567f482f5ef9a040e0e33cbecff9cc2eb9ff055a365ad01c66c53db0e525e033c9db3231d7b90f7a4abd01f4ff05016abda208eb4038a975530702bd2414ac
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD526071c9a2287accfb49a0b907621c75b
SHA10746ada7f153e6c7295c3dabbe19a936c4222af2
SHA256a8ee1b9a5891aa158d455a63dc66b2725ec0c884d13fff3e79625295e5f39f6b
SHA51203263bde7f191a1773dc2e56b3ac534fb3fe793373dcb99a332b2866a78cd7386a1dd1f525c1d5be877742481dbf723e3ea01b7de4dc0635a2d2f47e1cddd408