Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25/08/2024, 18:58
Static task
static1
Behavioral task
behavioral1
Sample
c15fca72fdca991d680c3480ba4cabed_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c15fca72fdca991d680c3480ba4cabed_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c15fca72fdca991d680c3480ba4cabed_JaffaCakes118.html
-
Size
278KB
-
MD5
c15fca72fdca991d680c3480ba4cabed
-
SHA1
28f8d27aee9a7809692edfa67b8f9387c825f244
-
SHA256
a692bfd715919d8ed2816aed4b28f8b5008ad23fe82a68158406d49abd489603
-
SHA512
05e685d5e83e084bba5a8648bc37bcb2837741ad1dc5f1528efc40d0eb75b6fd6730a742ab963ddb822985e59a114d9f230298add320f5599771e90b8872b31f
-
SSDEEP
3072:vpUtqjIVT0rhB9CyHxX7Be7iAvtLPbAwuBNKifXTJ/:v+qj6Mz9VxLY7iAVLTBQJl/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4440 msedge.exe 4440 msedge.exe 4644 msedge.exe 4644 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4644 wrote to memory of 4220 4644 msedge.exe 84 PID 4644 wrote to memory of 4220 4644 msedge.exe 84 PID 4644 wrote to memory of 2300 4644 msedge.exe 85 PID 4644 wrote to memory of 2300 4644 msedge.exe 85 PID 4644 wrote to memory of 2300 4644 msedge.exe 85 PID 4644 wrote to memory of 2300 4644 msedge.exe 85 PID 4644 wrote to memory of 2300 4644 msedge.exe 85 PID 4644 wrote to memory of 2300 4644 msedge.exe 85 PID 4644 wrote to memory of 2300 4644 msedge.exe 85 PID 4644 wrote to memory of 2300 4644 msedge.exe 85 PID 4644 wrote to memory of 2300 4644 msedge.exe 85 PID 4644 wrote to memory of 2300 4644 msedge.exe 85 PID 4644 wrote to memory of 2300 4644 msedge.exe 85 PID 4644 wrote to memory of 2300 4644 msedge.exe 85 PID 4644 wrote to memory of 2300 4644 msedge.exe 85 PID 4644 wrote to memory of 2300 4644 msedge.exe 85 PID 4644 wrote to memory of 2300 4644 msedge.exe 85 PID 4644 wrote to memory of 2300 4644 msedge.exe 85 PID 4644 wrote to memory of 2300 4644 msedge.exe 85 PID 4644 wrote to memory of 2300 4644 msedge.exe 85 PID 4644 wrote to memory of 2300 4644 msedge.exe 85 PID 4644 wrote to memory of 2300 4644 msedge.exe 85 PID 4644 wrote to memory of 2300 4644 msedge.exe 85 PID 4644 wrote to memory of 2300 4644 msedge.exe 85 PID 4644 wrote to memory of 2300 4644 msedge.exe 85 PID 4644 wrote to memory of 2300 4644 msedge.exe 85 PID 4644 wrote to memory of 2300 4644 msedge.exe 85 PID 4644 wrote to memory of 2300 4644 msedge.exe 85 PID 4644 wrote to memory of 2300 4644 msedge.exe 85 PID 4644 wrote to memory of 2300 4644 msedge.exe 85 PID 4644 wrote to memory of 2300 4644 msedge.exe 85 PID 4644 wrote to memory of 2300 4644 msedge.exe 85 PID 4644 wrote to memory of 2300 4644 msedge.exe 85 PID 4644 wrote to memory of 2300 4644 msedge.exe 85 PID 4644 wrote to memory of 2300 4644 msedge.exe 85 PID 4644 wrote to memory of 2300 4644 msedge.exe 85 PID 4644 wrote to memory of 2300 4644 msedge.exe 85 PID 4644 wrote to memory of 2300 4644 msedge.exe 85 PID 4644 wrote to memory of 2300 4644 msedge.exe 85 PID 4644 wrote to memory of 2300 4644 msedge.exe 85 PID 4644 wrote to memory of 2300 4644 msedge.exe 85 PID 4644 wrote to memory of 2300 4644 msedge.exe 85 PID 4644 wrote to memory of 4440 4644 msedge.exe 86 PID 4644 wrote to memory of 4440 4644 msedge.exe 86 PID 4644 wrote to memory of 2976 4644 msedge.exe 87 PID 4644 wrote to memory of 2976 4644 msedge.exe 87 PID 4644 wrote to memory of 2976 4644 msedge.exe 87 PID 4644 wrote to memory of 2976 4644 msedge.exe 87 PID 4644 wrote to memory of 2976 4644 msedge.exe 87 PID 4644 wrote to memory of 2976 4644 msedge.exe 87 PID 4644 wrote to memory of 2976 4644 msedge.exe 87 PID 4644 wrote to memory of 2976 4644 msedge.exe 87 PID 4644 wrote to memory of 2976 4644 msedge.exe 87 PID 4644 wrote to memory of 2976 4644 msedge.exe 87 PID 4644 wrote to memory of 2976 4644 msedge.exe 87 PID 4644 wrote to memory of 2976 4644 msedge.exe 87 PID 4644 wrote to memory of 2976 4644 msedge.exe 87 PID 4644 wrote to memory of 2976 4644 msedge.exe 87 PID 4644 wrote to memory of 2976 4644 msedge.exe 87 PID 4644 wrote to memory of 2976 4644 msedge.exe 87 PID 4644 wrote to memory of 2976 4644 msedge.exe 87 PID 4644 wrote to memory of 2976 4644 msedge.exe 87 PID 4644 wrote to memory of 2976 4644 msedge.exe 87 PID 4644 wrote to memory of 2976 4644 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\c15fca72fdca991d680c3480ba4cabed_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4644 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffce26946f8,0x7ffce2694708,0x7ffce26947182⤵PID:4220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2188,11517163692870136966,14906107416625723344,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2196 /prefetch:22⤵PID:2300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2188,11517163692870136966,14906107416625723344,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2248 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2188,11517163692870136966,14906107416625723344,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2408 /prefetch:82⤵PID:2976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,11517163692870136966,14906107416625723344,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:1512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,11517163692870136966,14906107416625723344,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:1352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,11517163692870136966,14906107416625723344,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5668 /prefetch:12⤵PID:1792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,11517163692870136966,14906107416625723344,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1708 /prefetch:12⤵PID:2216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2188,11517163692870136966,14906107416625723344,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1716 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4588
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2168
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1312
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2736
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59b008261dda31857d68792b46af6dd6d
SHA1e82dc88e2d1da2df7cb19d79a0346b9bb90d52b3
SHA2569ac598d4f8170f7e475d84103aead9e3c23d5f2d292741a7f56a17bde8b6f7da
SHA51278853091403a06beeec4998e2e3a4342111895ffd485f7f7cd367741a4883f7a25864cba00a6c86f27dc0c9ce9d04f08011ecc40c8ae9383d33274739ac39f10
-
Filesize
152B
MD50446fcdd21b016db1f468971fb82a488
SHA1726b91562bb75f80981f381e3c69d7d832c87c9d
SHA25662c5dc18b25e758f3508582a7c58bb46b734a774d97fc0e8a20614235caa8222
SHA5121df7c085042266959f1fe0aedc5f6d40ceba485b54159f51f0c38f17bb250b79ea941b735e1b6faf219f23fe8ab65ac4557f545519d52d5416b89ad0f9047a31
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD556e7d5033f3b7e78a567956df206e8cd
SHA15a0287fa871dfc62fa0b9a595d0661a1794d0bbf
SHA25675f94e31961936e114188ac981bbd4abcfd984b87450d9c156b436d6a5bd75f8
SHA512edd7e3ce06914289e3ea3ff9d36da429d6cf34c5517e3ca05f05b6b89d97e9436100f77d7d607d0aefa794f60168a3f0b5310f284c0065a4f9e1ae385495cdaa
-
Filesize
1KB
MD556c1be6ac14c615b9df2310b878ae8e3
SHA1b1b501a716227a22b99a11df4de80430b6af4278
SHA256b5a728e94301b185996d8dab1e9fc165e8d0412a4afca2fd3dfd865127d0a8e9
SHA5120a8f2d1f51fc82d1ea33b25581f8a5273674d2f7457e25b54e3808c5b8ae115745935b1b0eeedb1deeb7225467839ca9adec87cb85d3031c7ae38d4e446c0e8e
-
Filesize
1KB
MD5ea8b1db20f64eb1bd65f957bc8dd02d3
SHA16bf4feceff5967a7cde5c747295dde26ef0a96f5
SHA25671a171dd3062877c85a77cd082bdc21c57c1feb3857d02f8ced70b15c462da38
SHA512dcb7eb557f076b26f192c24c90e6abfa7597dd8bf2f8216b17ed0e8994f02ed74c22337ce6a49fc097d225219df0b9054b4d755ca151bd103fe4a23862759ed6
-
Filesize
5KB
MD5e567542d63da3570a9563f62d76618a3
SHA1a53b5eeb42f6274007728ddfecb9d550514a6c48
SHA25691337f5ce93660382f97cc6fca9bd9667ef77202d7eb0b139327d88ef06cef39
SHA5129a39b6159f717daa17b1b4ce9f85f8c4d4a1dc3becb3cd612d89826127efbc18250f8bd1a6808264fd0d9634dc618935aec42386668a7ce41aa9d8ea9a52b8a3
-
Filesize
6KB
MD5e471637359354de29757467931e39ccc
SHA187d9ad9758f58d5c1a54726428f454c41b9c8d66
SHA256f2169df18afcc08c25bbeefc699021f41f007d002c6155aa531e6295614d5511
SHA512f2f62877fd8cd0a940c82d2e7112ae9d6aaf15e8ea0e0794929915badaf2f76f21390c83378288bea1689e2bb443659bedfe2c40b80a42e745ce8504de09c788
-
Filesize
6KB
MD5dcd9e6c7cfab684f752ebdd61260663a
SHA1c7fd4208ede1ff9b29057da19707d2a952681ed1
SHA256fb84bc1b6c5c2df30e8676b9f281b7f69b25a92b0b0794422f41a5e4beb9038c
SHA512d36a15a6f49fa228585594669f2ad895f2c85cf6bd554a1be635b489ca84cb663d611bf1b2595082f1134627c27ce2cbaffb8ca84741aeb0292bec1295fbb45c
-
Filesize
10KB
MD5410a2eff1eed7ede6a15fc386998f378
SHA1fcb3f733afff7e42be17a593257168526a252d8d
SHA2569b844920f144aa8ccd216e9d9149178873a4242bff90853ad55aa0177e7b556b
SHA5122c7659cc68df81d49dfe5854652f0034cfb42c403cb96ff8cb8acf1a578ba6ed855e2442fd8ae18b613ad1105ceb45884f957b39e564b15faeca7cf8fac44631