Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
26-08-2024 07:02
Static task
static1
Behavioral task
behavioral1
Sample
c280b6d5315b723e78f981594f031495_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
c280b6d5315b723e78f981594f031495_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c280b6d5315b723e78f981594f031495_JaffaCakes118.html
-
Size
150KB
-
MD5
c280b6d5315b723e78f981594f031495
-
SHA1
b740b34db9862721c2169ebf8eb4ef90aedfca34
-
SHA256
b4cd8c7ad3f2d9f2ad448d132e8fd1a048f974868f1df376c726dfbae0fdf225
-
SHA512
f859c3f3295c5bdd795886c6dd2f7aef34de7d01c38ee31da675cc4cee4931324f55f4e5e54ea4f6b032cec41e36b9feba4d92f37c4621e7e5f32954a0d36cbc
-
SSDEEP
3072:5BMvptNLcHu37p3nEgcKL+rDDAxqcsL0Z3WQI4SgOvh:5BMvptNLcHu37p3GJEm
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1124 msedge.exe 1124 msedge.exe 1308 msedge.exe 1308 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1308 wrote to memory of 5112 1308 msedge.exe 84 PID 1308 wrote to memory of 5112 1308 msedge.exe 84 PID 1308 wrote to memory of 4884 1308 msedge.exe 85 PID 1308 wrote to memory of 4884 1308 msedge.exe 85 PID 1308 wrote to memory of 4884 1308 msedge.exe 85 PID 1308 wrote to memory of 4884 1308 msedge.exe 85 PID 1308 wrote to memory of 4884 1308 msedge.exe 85 PID 1308 wrote to memory of 4884 1308 msedge.exe 85 PID 1308 wrote to memory of 4884 1308 msedge.exe 85 PID 1308 wrote to memory of 4884 1308 msedge.exe 85 PID 1308 wrote to memory of 4884 1308 msedge.exe 85 PID 1308 wrote to memory of 4884 1308 msedge.exe 85 PID 1308 wrote to memory of 4884 1308 msedge.exe 85 PID 1308 wrote to memory of 4884 1308 msedge.exe 85 PID 1308 wrote to memory of 4884 1308 msedge.exe 85 PID 1308 wrote to memory of 4884 1308 msedge.exe 85 PID 1308 wrote to memory of 4884 1308 msedge.exe 85 PID 1308 wrote to memory of 4884 1308 msedge.exe 85 PID 1308 wrote to memory of 4884 1308 msedge.exe 85 PID 1308 wrote to memory of 4884 1308 msedge.exe 85 PID 1308 wrote to memory of 4884 1308 msedge.exe 85 PID 1308 wrote to memory of 4884 1308 msedge.exe 85 PID 1308 wrote to memory of 4884 1308 msedge.exe 85 PID 1308 wrote to memory of 4884 1308 msedge.exe 85 PID 1308 wrote to memory of 4884 1308 msedge.exe 85 PID 1308 wrote to memory of 4884 1308 msedge.exe 85 PID 1308 wrote to memory of 4884 1308 msedge.exe 85 PID 1308 wrote to memory of 4884 1308 msedge.exe 85 PID 1308 wrote to memory of 4884 1308 msedge.exe 85 PID 1308 wrote to memory of 4884 1308 msedge.exe 85 PID 1308 wrote to memory of 4884 1308 msedge.exe 85 PID 1308 wrote to memory of 4884 1308 msedge.exe 85 PID 1308 wrote to memory of 4884 1308 msedge.exe 85 PID 1308 wrote to memory of 4884 1308 msedge.exe 85 PID 1308 wrote to memory of 4884 1308 msedge.exe 85 PID 1308 wrote to memory of 4884 1308 msedge.exe 85 PID 1308 wrote to memory of 4884 1308 msedge.exe 85 PID 1308 wrote to memory of 4884 1308 msedge.exe 85 PID 1308 wrote to memory of 4884 1308 msedge.exe 85 PID 1308 wrote to memory of 4884 1308 msedge.exe 85 PID 1308 wrote to memory of 4884 1308 msedge.exe 85 PID 1308 wrote to memory of 4884 1308 msedge.exe 85 PID 1308 wrote to memory of 1124 1308 msedge.exe 86 PID 1308 wrote to memory of 1124 1308 msedge.exe 86 PID 1308 wrote to memory of 728 1308 msedge.exe 87 PID 1308 wrote to memory of 728 1308 msedge.exe 87 PID 1308 wrote to memory of 728 1308 msedge.exe 87 PID 1308 wrote to memory of 728 1308 msedge.exe 87 PID 1308 wrote to memory of 728 1308 msedge.exe 87 PID 1308 wrote to memory of 728 1308 msedge.exe 87 PID 1308 wrote to memory of 728 1308 msedge.exe 87 PID 1308 wrote to memory of 728 1308 msedge.exe 87 PID 1308 wrote to memory of 728 1308 msedge.exe 87 PID 1308 wrote to memory of 728 1308 msedge.exe 87 PID 1308 wrote to memory of 728 1308 msedge.exe 87 PID 1308 wrote to memory of 728 1308 msedge.exe 87 PID 1308 wrote to memory of 728 1308 msedge.exe 87 PID 1308 wrote to memory of 728 1308 msedge.exe 87 PID 1308 wrote to memory of 728 1308 msedge.exe 87 PID 1308 wrote to memory of 728 1308 msedge.exe 87 PID 1308 wrote to memory of 728 1308 msedge.exe 87 PID 1308 wrote to memory of 728 1308 msedge.exe 87 PID 1308 wrote to memory of 728 1308 msedge.exe 87 PID 1308 wrote to memory of 728 1308 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\c280b6d5315b723e78f981594f031495_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1308 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xc4,0x108,0x7ff807f246f8,0x7ff807f24708,0x7ff807f247182⤵PID:5112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,12411038351817183698,18247209011937567750,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:22⤵PID:4884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,12411038351817183698,18247209011937567750,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2220 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2136,12411038351817183698,18247209011937567750,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2916 /prefetch:82⤵PID:728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,12411038351817183698,18247209011937567750,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:3728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,12411038351817183698,18247209011937567750,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:3484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,12411038351817183698,18247209011937567750,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6124 /prefetch:12⤵PID:396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,12411038351817183698,18247209011937567750,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5952 /prefetch:12⤵PID:2388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,12411038351817183698,18247209011937567750,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4712 /prefetch:12⤵PID:5096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,12411038351817183698,18247209011937567750,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2744 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3656
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2704
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5048
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD553bc70ecb115bdbabe67620c416fe9b3
SHA1af66ec51a13a59639eaf54d62ff3b4f092bb2fc1
SHA256b36cad5c1f7bc7d07c7eaa2f3cad2959ddb5447d4d3adcb46eb6a99808e22771
SHA512cad44933b94e17908c0eb8ac5feeb53d03a7720d97e7ccc8724a1ed3021a5bece09e1f9f3cec56ce0739176ebbbeb20729e650f8bca04e5060c986b75d8e4921
-
Filesize
152B
MD5e765f3d75e6b0e4a7119c8b14d47d8da
SHA1cc9f7c7826c2e1a129e7d98884926076c3714fc0
SHA256986443556d3878258b710d9d9efbf4f25f0d764c3f83dc54217f2b12a6eccd89
SHA512a1872a849f27da78ebe9adb9beb260cb49ed5f4ca2d403f23379112bdfcd2482446a6708188100496e45db1517cdb43aba8bb93a75e605713c3f97cd716b1079
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD5e1ebd23e795129577d832f9787fe2f9b
SHA196f4890fc6a03d8eab2ae0e96199ff09c93641b7
SHA2560e542600e8288b276e2ed4066ce5fcf2b9cf2bfaec42883bf67fb0169f9ea805
SHA51243d47310d7810f2f07a5eec00414eb313bc5c1970fd0b3376fac97873328086d463333e8dc1451f325d40cff61b274f22fad33283c3738e5389b4f33080d44c4
-
Filesize
1KB
MD53176a7b5b0306f629d5bbb24b4a44231
SHA14beb7d07298a2fdd048e1b569e305ad7de402fcd
SHA256b8987cac93be0f6f530fb773962b2a90754708d4599f4f9f8f248df737d006b2
SHA512075489416822a1899da9dbd7eb9e19f26dd06375d98eb5e42a9744fdbf84054ea81770a8d5fd891f752cb069e62e2f5b0e2b6ff6823b164f4827032be6e6058a
-
Filesize
5KB
MD517ba766de961ee62898eefc16214038a
SHA166dcb3974575476cf6c8c4f64c2f8c59d7f9b9d9
SHA25696a83bf939c161ebb4a255bafb5552f7e10ddf36c5fdbf1ca01ea652ccc29726
SHA512b6b92bcbd34ad9cadc05e6bc88ccaddd105e206e6f261316ad30d716c73a75b1e8700b13c8493adee29d2301948d8cb95d099278ec8a25b0d2bfebd546650cdf
-
Filesize
6KB
MD5be2c0bca03178a3e6d5223561855f1cf
SHA15217d82cc18e8f207d0d6978015026b8150a70fd
SHA256b7b4fb7144225529cfcd5412457158119de5e00734abf41256a3b839e01bc331
SHA5123fa46c1254cdb8fd67a205e5b3dcfdbba9fb62218c23a94591a4523d9cf80f6c8af70410a02b70108f7de3d396f0405668958a4d00ef568431c405e9d5c59aec
-
Filesize
10KB
MD567b89de06ac475267c628bdbb2946a63
SHA163d281d657269ae441906990ae298f3d27ab3e5a
SHA256827da5d9d429e96be5f23c2647abfb3c879ecce2c435811f1f9be1c9790f926b
SHA5123a30f2e2f46b25a20eebd51a35135bc5f36f47d64f8a0a72b7b15454b45022b1116d8015d29c17d0b6029bf58d9c57e39c4a74b4f4b475804dc99d0829b481c5