Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
26/08/2024, 04:20
Static task
static1
Behavioral task
behavioral1
Sample
c245729aa250b1d77effb45336e11832_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
c245729aa250b1d77effb45336e11832_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c245729aa250b1d77effb45336e11832_JaffaCakes118.html
-
Size
382KB
-
MD5
c245729aa250b1d77effb45336e11832
-
SHA1
01cfbeec1b4a23e72f4f9695cc033aa0090d7cbf
-
SHA256
02e7d9ea5009ed1ae12eb35eb5eb94fe1cbb0c7fc27127780443dd939c410166
-
SHA512
cb834d05a5d21a073d87a6854b74f0b301f1d5021e5d849cc87f95c94b172e5362e7a9921732e27e1e29068efa019165382e37af34d08325b7ef673afc175326
-
SSDEEP
6144:OjKyHI471bS5XOuEhss22HVGoob9GVkcUhLvQjuVy2un8+NQr2AXJQ0kWMouWgxY:OjBHI471bS5XOuEhss22HVGoob9GVkcK
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1872 msedge.exe 1872 msedge.exe 5068 msedge.exe 5068 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe 2324 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5068 wrote to memory of 2304 5068 msedge.exe 84 PID 5068 wrote to memory of 2304 5068 msedge.exe 84 PID 5068 wrote to memory of 1952 5068 msedge.exe 85 PID 5068 wrote to memory of 1952 5068 msedge.exe 85 PID 5068 wrote to memory of 1952 5068 msedge.exe 85 PID 5068 wrote to memory of 1952 5068 msedge.exe 85 PID 5068 wrote to memory of 1952 5068 msedge.exe 85 PID 5068 wrote to memory of 1952 5068 msedge.exe 85 PID 5068 wrote to memory of 1952 5068 msedge.exe 85 PID 5068 wrote to memory of 1952 5068 msedge.exe 85 PID 5068 wrote to memory of 1952 5068 msedge.exe 85 PID 5068 wrote to memory of 1952 5068 msedge.exe 85 PID 5068 wrote to memory of 1952 5068 msedge.exe 85 PID 5068 wrote to memory of 1952 5068 msedge.exe 85 PID 5068 wrote to memory of 1952 5068 msedge.exe 85 PID 5068 wrote to memory of 1952 5068 msedge.exe 85 PID 5068 wrote to memory of 1952 5068 msedge.exe 85 PID 5068 wrote to memory of 1952 5068 msedge.exe 85 PID 5068 wrote to memory of 1952 5068 msedge.exe 85 PID 5068 wrote to memory of 1952 5068 msedge.exe 85 PID 5068 wrote to memory of 1952 5068 msedge.exe 85 PID 5068 wrote to memory of 1952 5068 msedge.exe 85 PID 5068 wrote to memory of 1952 5068 msedge.exe 85 PID 5068 wrote to memory of 1952 5068 msedge.exe 85 PID 5068 wrote to memory of 1952 5068 msedge.exe 85 PID 5068 wrote to memory of 1952 5068 msedge.exe 85 PID 5068 wrote to memory of 1952 5068 msedge.exe 85 PID 5068 wrote to memory of 1952 5068 msedge.exe 85 PID 5068 wrote to memory of 1952 5068 msedge.exe 85 PID 5068 wrote to memory of 1952 5068 msedge.exe 85 PID 5068 wrote to memory of 1952 5068 msedge.exe 85 PID 5068 wrote to memory of 1952 5068 msedge.exe 85 PID 5068 wrote to memory of 1952 5068 msedge.exe 85 PID 5068 wrote to memory of 1952 5068 msedge.exe 85 PID 5068 wrote to memory of 1952 5068 msedge.exe 85 PID 5068 wrote to memory of 1952 5068 msedge.exe 85 PID 5068 wrote to memory of 1952 5068 msedge.exe 85 PID 5068 wrote to memory of 1952 5068 msedge.exe 85 PID 5068 wrote to memory of 1952 5068 msedge.exe 85 PID 5068 wrote to memory of 1952 5068 msedge.exe 85 PID 5068 wrote to memory of 1952 5068 msedge.exe 85 PID 5068 wrote to memory of 1952 5068 msedge.exe 85 PID 5068 wrote to memory of 1872 5068 msedge.exe 86 PID 5068 wrote to memory of 1872 5068 msedge.exe 86 PID 5068 wrote to memory of 1104 5068 msedge.exe 87 PID 5068 wrote to memory of 1104 5068 msedge.exe 87 PID 5068 wrote to memory of 1104 5068 msedge.exe 87 PID 5068 wrote to memory of 1104 5068 msedge.exe 87 PID 5068 wrote to memory of 1104 5068 msedge.exe 87 PID 5068 wrote to memory of 1104 5068 msedge.exe 87 PID 5068 wrote to memory of 1104 5068 msedge.exe 87 PID 5068 wrote to memory of 1104 5068 msedge.exe 87 PID 5068 wrote to memory of 1104 5068 msedge.exe 87 PID 5068 wrote to memory of 1104 5068 msedge.exe 87 PID 5068 wrote to memory of 1104 5068 msedge.exe 87 PID 5068 wrote to memory of 1104 5068 msedge.exe 87 PID 5068 wrote to memory of 1104 5068 msedge.exe 87 PID 5068 wrote to memory of 1104 5068 msedge.exe 87 PID 5068 wrote to memory of 1104 5068 msedge.exe 87 PID 5068 wrote to memory of 1104 5068 msedge.exe 87 PID 5068 wrote to memory of 1104 5068 msedge.exe 87 PID 5068 wrote to memory of 1104 5068 msedge.exe 87 PID 5068 wrote to memory of 1104 5068 msedge.exe 87 PID 5068 wrote to memory of 1104 5068 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\c245729aa250b1d77effb45336e11832_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5068 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xfc,0x10c,0x7ffac07e46f8,0x7ffac07e4708,0x7ffac07e47182⤵PID:2304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,12072672152689336802,9963933139649769027,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:22⤵PID:1952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,12072672152689336802,9963933139649769027,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,12072672152689336802,9963933139649769027,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2820 /prefetch:82⤵PID:1104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,12072672152689336802,9963933139649769027,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:2556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,12072672152689336802,9963933139649769027,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:1108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,12072672152689336802,9963933139649769027,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4928 /prefetch:12⤵PID:1448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,12072672152689336802,9963933139649769027,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5064 /prefetch:12⤵PID:4812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,12072672152689336802,9963933139649769027,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1780 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2324
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2096
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5112
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59b008261dda31857d68792b46af6dd6d
SHA1e82dc88e2d1da2df7cb19d79a0346b9bb90d52b3
SHA2569ac598d4f8170f7e475d84103aead9e3c23d5f2d292741a7f56a17bde8b6f7da
SHA51278853091403a06beeec4998e2e3a4342111895ffd485f7f7cd367741a4883f7a25864cba00a6c86f27dc0c9ce9d04f08011ecc40c8ae9383d33274739ac39f10
-
Filesize
152B
MD50446fcdd21b016db1f468971fb82a488
SHA1726b91562bb75f80981f381e3c69d7d832c87c9d
SHA25662c5dc18b25e758f3508582a7c58bb46b734a774d97fc0e8a20614235caa8222
SHA5121df7c085042266959f1fe0aedc5f6d40ceba485b54159f51f0c38f17bb250b79ea941b735e1b6faf219f23fe8ab65ac4557f545519d52d5416b89ad0f9047a31
-
Filesize
23KB
MD5a0423f1305547bb6b8f5a4fb1a9fc2d8
SHA1092dcf1fe57e6bb53821eb754e04188ee70602d5
SHA2566add651cb411ed9ce9a17883c1522920a6ee3b4eb676f5b411e72d1a5e7de6e8
SHA512b8487c60b40d332e562cc5d4fc7c515e3b3c2c82311700b788905754c1376ce6f0da650583545a4691d51f04ec5da0c0204997214d167c85b788d4c85236c4c3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize216B
MD5dec1adb1597ee0ca9858135879737e9b
SHA1141612bff7c6b4ac910e85dec808feff8dfb6b8f
SHA2561d79ba2975fbb5bb32838b22f3eb5e4e07cbc547fbe238ea8247e73b055abc79
SHA5120f8867154ad41a04aa7912cc42541df5bdb1c4a14b9ffb8d1d62565b1a35491a3d09a147fd83a33081e9fd65026185c2f4b809444fdbe12495c9b4da35a12da3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize240B
MD5de491e349584f457b85d6754c5af68c2
SHA18c664150175fa0209b0f4e28d978b6e9463e20ea
SHA256ae482261a8ed4929d42880d7bfad009c15ff281fa9001bfa605baeb9b7cebe10
SHA5125a6105c6d2d499df60c7c8d1bac144a3ea44cbf6e7b5fb7ce273d04236d643ba6f0e009f35e1d3e011d11ad585eb55e349b9aae646b57ccbbd9b78bad5dc0338
-
Filesize
3KB
MD51ee58c1fdb57ec5b01e0bbf50aca4121
SHA12c1c05d6ddb624555f1164cb41523aa24efe3993
SHA2564c6086bd5c08ede8c67e4d4dd4943e0ddbf9e958d52372aef6787fcbe3988254
SHA512dc5b560df8eb624d2dee195797f8c0e0bf47a73e53d207e7a4e34e1dbe16ec3e98671547cd5290d5e8a367ae218fe9e41878a7a27efeed2a3f37b619a0ddcef3
-
Filesize
5KB
MD5d46975856dc74fdb39d3266d0fa64d26
SHA114d79f92bd742c1658eeb20f11da20dcc4982d60
SHA256d9df06519eac87fc5ec9ee8a530b732a7a2bd02ee1c7de88fa024a034c3c8cea
SHA512adf3590798fafedf83762a6b5e3c6547cddcbdff7e5b35b4eba29cae9cbe301cb1d0e8db946abf218f20e85aa839e2fd461cbae4e3b389639acc371a90480d12
-
Filesize
7KB
MD5e96ce3744f151a233121f528f9978c1f
SHA168728f11a41adff7dcea345e8cbae9beba0283e6
SHA256df7c00fcacc75872b4158c3fbcc196712b716cf1e13a7109dc1d97c56fefa464
SHA51243ee1d0f0aae5adb5e8676a90cc6a03eeff520efc14eb8b09b5ca7a60b370ff321dc443862a78c226f49109515e905c7eca03e2933cd5bc7de0a61350dc0e1f7
-
Filesize
7KB
MD506486a3002fac2d726c7d21cfac4af6d
SHA170d230378cc0c500699818ff5cbda618e3081bed
SHA25693ce14fb2bf64460a613f9996c14e67dd7780d7fabdc849f0e75a596878290fe
SHA512a752967ad3236e247a6c8b3fe2d6fa9a9b82973a7e3c261a313966f01c9669a7ffe508af8d078fea3e327aade263e66c21ceb4713ee307fec7b1e54837e498c6
-
Filesize
10KB
MD57fbb847431ba45112598c0df88ec3dbb
SHA1c4f9062539c31fdf78a760381a1a5146c7071f9b
SHA2564a9c1368f41e61fca8b6ab4303da65849deac63fa70512e03e004c2c8dedb2d2
SHA51208abf917b58ab2e81925ee7984376fae9e7948492dfe80506349615a999729230f9930dcd3802309fc1d40572d9caab8f573bc52cb4b17122ca29cbd1b9b8bf0