Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
28/08/2024, 20:58
Static task
static1
Behavioral task
behavioral1
Sample
c7a410e361e8ffd39ecd0353a24e504e_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c7a410e361e8ffd39ecd0353a24e504e_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c7a410e361e8ffd39ecd0353a24e504e_JaffaCakes118.html
-
Size
203KB
-
MD5
c7a410e361e8ffd39ecd0353a24e504e
-
SHA1
ebd1f7497f8861f0251e4c1823ae93ee8f7bbc4a
-
SHA256
b296705b6cf0685ea690368bca75df93c04f90bcb087a23da9c63afad79f6564
-
SHA512
579e70a0a8508e8f5cc05027083d1b9f9f273a0ec0cde70a9d111960bad7fb878a78a9635c2cb10cf0e098401522d8b116b8310d28c889f94927eff6a791f22f
-
SSDEEP
1536:Sjs+A2cOEXVpkX+OldBxnlauMiipdNhJP/jGSYncWdpAyxIVXCwzKpI4KHD2kT2A:S3LqW6KtQSiaaSMbWnEF
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1100 msedge.exe 1100 msedge.exe 3024 msedge.exe 3024 msedge.exe 4416 identity_helper.exe 4416 identity_helper.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3024 wrote to memory of 4732 3024 msedge.exe 84 PID 3024 wrote to memory of 4732 3024 msedge.exe 84 PID 3024 wrote to memory of 4876 3024 msedge.exe 85 PID 3024 wrote to memory of 4876 3024 msedge.exe 85 PID 3024 wrote to memory of 4876 3024 msedge.exe 85 PID 3024 wrote to memory of 4876 3024 msedge.exe 85 PID 3024 wrote to memory of 4876 3024 msedge.exe 85 PID 3024 wrote to memory of 4876 3024 msedge.exe 85 PID 3024 wrote to memory of 4876 3024 msedge.exe 85 PID 3024 wrote to memory of 4876 3024 msedge.exe 85 PID 3024 wrote to memory of 4876 3024 msedge.exe 85 PID 3024 wrote to memory of 4876 3024 msedge.exe 85 PID 3024 wrote to memory of 4876 3024 msedge.exe 85 PID 3024 wrote to memory of 4876 3024 msedge.exe 85 PID 3024 wrote to memory of 4876 3024 msedge.exe 85 PID 3024 wrote to memory of 4876 3024 msedge.exe 85 PID 3024 wrote to memory of 4876 3024 msedge.exe 85 PID 3024 wrote to memory of 4876 3024 msedge.exe 85 PID 3024 wrote to memory of 4876 3024 msedge.exe 85 PID 3024 wrote to memory of 4876 3024 msedge.exe 85 PID 3024 wrote to memory of 4876 3024 msedge.exe 85 PID 3024 wrote to memory of 4876 3024 msedge.exe 85 PID 3024 wrote to memory of 4876 3024 msedge.exe 85 PID 3024 wrote to memory of 4876 3024 msedge.exe 85 PID 3024 wrote to memory of 4876 3024 msedge.exe 85 PID 3024 wrote to memory of 4876 3024 msedge.exe 85 PID 3024 wrote to memory of 4876 3024 msedge.exe 85 PID 3024 wrote to memory of 4876 3024 msedge.exe 85 PID 3024 wrote to memory of 4876 3024 msedge.exe 85 PID 3024 wrote to memory of 4876 3024 msedge.exe 85 PID 3024 wrote to memory of 4876 3024 msedge.exe 85 PID 3024 wrote to memory of 4876 3024 msedge.exe 85 PID 3024 wrote to memory of 4876 3024 msedge.exe 85 PID 3024 wrote to memory of 4876 3024 msedge.exe 85 PID 3024 wrote to memory of 4876 3024 msedge.exe 85 PID 3024 wrote to memory of 4876 3024 msedge.exe 85 PID 3024 wrote to memory of 4876 3024 msedge.exe 85 PID 3024 wrote to memory of 4876 3024 msedge.exe 85 PID 3024 wrote to memory of 4876 3024 msedge.exe 85 PID 3024 wrote to memory of 4876 3024 msedge.exe 85 PID 3024 wrote to memory of 4876 3024 msedge.exe 85 PID 3024 wrote to memory of 4876 3024 msedge.exe 85 PID 3024 wrote to memory of 1100 3024 msedge.exe 86 PID 3024 wrote to memory of 1100 3024 msedge.exe 86 PID 3024 wrote to memory of 2032 3024 msedge.exe 87 PID 3024 wrote to memory of 2032 3024 msedge.exe 87 PID 3024 wrote to memory of 2032 3024 msedge.exe 87 PID 3024 wrote to memory of 2032 3024 msedge.exe 87 PID 3024 wrote to memory of 2032 3024 msedge.exe 87 PID 3024 wrote to memory of 2032 3024 msedge.exe 87 PID 3024 wrote to memory of 2032 3024 msedge.exe 87 PID 3024 wrote to memory of 2032 3024 msedge.exe 87 PID 3024 wrote to memory of 2032 3024 msedge.exe 87 PID 3024 wrote to memory of 2032 3024 msedge.exe 87 PID 3024 wrote to memory of 2032 3024 msedge.exe 87 PID 3024 wrote to memory of 2032 3024 msedge.exe 87 PID 3024 wrote to memory of 2032 3024 msedge.exe 87 PID 3024 wrote to memory of 2032 3024 msedge.exe 87 PID 3024 wrote to memory of 2032 3024 msedge.exe 87 PID 3024 wrote to memory of 2032 3024 msedge.exe 87 PID 3024 wrote to memory of 2032 3024 msedge.exe 87 PID 3024 wrote to memory of 2032 3024 msedge.exe 87 PID 3024 wrote to memory of 2032 3024 msedge.exe 87 PID 3024 wrote to memory of 2032 3024 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\c7a410e361e8ffd39ecd0353a24e504e_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff5b8946f8,0x7fff5b894708,0x7fff5b8947182⤵PID:4732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,2951220373635234266,10960429232892102285,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:22⤵PID:4876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,2951220373635234266,10960429232892102285,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,2951220373635234266,10960429232892102285,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2860 /prefetch:82⤵PID:2032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2951220373635234266,10960429232892102285,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3084 /prefetch:12⤵PID:4852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2951220373635234266,10960429232892102285,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3092 /prefetch:12⤵PID:3556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2951220373635234266,10960429232892102285,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5112 /prefetch:12⤵PID:336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2951220373635234266,10960429232892102285,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6032 /prefetch:12⤵PID:1424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2951220373635234266,10960429232892102285,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5972 /prefetch:12⤵PID:4480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,2951220373635234266,10960429232892102285,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5304 /prefetch:82⤵PID:4252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,2951220373635234266,10960429232892102285,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5304 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2951220373635234266,10960429232892102285,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4776 /prefetch:12⤵PID:4892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2951220373635234266,10960429232892102285,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5612 /prefetch:12⤵PID:4688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,2951220373635234266,10960429232892102285,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5916 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1700
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4580
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1436
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59e3fc58a8fb86c93d19e1500b873ef6f
SHA1c6aae5f4e26f5570db5e14bba8d5061867a33b56
SHA256828f4eacac1c40b790fd70dbb6fa6ba03dcc681171d9b2a6579626d27837b1c4
SHA512e5e245b56fa82075e060f468a3224cf2ef43f1b6d87f0351a2102d85c7c897e559be4caeaecfdc4059af29fdc674681b61229319dda95cb2ee649b2eb98d313e
-
Filesize
152B
MD527304926d60324abe74d7a4b571c35ea
SHA178b8f92fcaf4a09eaa786bbe33fd1b0222ef29c1
SHA2567039ad5c2b40f4d97c8c2269f4942be13436d739b2e1f8feb7a0c9f9fdb931de
SHA512f5b6181d3f432238c7365f64fc8a373299e23ba8178bcc419471916ef8b23e909787c7c0617ab22e4eb90909c02bd7b84f1386fbc61e2bdb5a0eb474175da4bd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD5f013e7724adbb15938ad67a7aaae84fc
SHA18f43655b59dc3801a23a7419b8d8d83289c23b22
SHA256e55fd741833a18edbf28e35c3a89709193cb5da9be0f92f7123a7738dda7eca8
SHA5126b2477f5db0abbd0f470f9e583ef371c4d43078620aed9860ff02f6a0f2cc107ece09051c50e0002600076c410708364a7c371926a87c56686ac9df90b0d09ce
-
Filesize
562B
MD5332d06c92f097e52d3ea291acf31270c
SHA19d370c0c8dd8e7edc9de3fa0e577ad79d0da4492
SHA256a3b148d2f023adc39be9f124655d7162f5e3daee81367a0c10a492b7a7e1fd0b
SHA512ffa85c1c3ff064ff9f5c92a0d0fabf5cbe9722a3873e07cc2b0c06ddb62e30c423249eaf8cef722136774813db4aab159050569c13a71242791ebb327bc14e90
-
Filesize
1KB
MD53aaa893acf295f19cc64c27c86b29472
SHA1be6b55169fc344334c8d812ee898c71f12b8d083
SHA256fd5492f27aab7972d3b2ac2a8fd4636ac1d16469c92c1390197909b563afc132
SHA512ec6961b75b2bbff14d370c239607cd081c53ac8373c62658bd00f3b96b8a72a7b0b136698ee3b691c1f1b7259d3c1965b948c37ba10893b643ad6cd977280e8c
-
Filesize
5KB
MD51c8ee260a717bda731155b2a08112cff
SHA1fbe737614f69f79da034e9dfddc74bb51bc6d848
SHA256918c99802dfb0e6e16e1fa12f8e9eca5ce41f047addb5f639d6a1561f666a988
SHA5128bf0aa4ef51a5e5867dcb086689d9d1bdcdda5577ef9842b11a867975d7364acbc42c690f30e0f5a8a5c3ca60a65a3060cffa6358e43e3368741479c493a1cca
-
Filesize
7KB
MD5a9076480a3cb25874cfc7bbcd27aaf9b
SHA1e33a20156d527544164df1cadb718c5e02e5f15c
SHA2568fb0bb8217e0fc4a5946f8f1d4ad4cbdb151040bb6914fca9862a990e0daac31
SHA512c26cc9345c977df81101a28a01082862f6712f634104370ea527fdef78d33465cc225d3c5b82022a0986de6e848ec85e0096afb03fa8185c5d2696200be46350
-
Filesize
6KB
MD590747584a7939802f1feb5349e60ee0c
SHA10c57d923120e281ea3322071f556870ef1e7806f
SHA2561f8710618911475b880ade145de199bdc8bf9680d5cddb9f3cbbd7cd135d79c7
SHA512a6f1e4967cdd3c9b5b4927a0c17d807e6d131f47fe8dd0be8f6f4658d93603e5bfef2ba8fe51e21c03b58502da112af73c5938845a22a88a6d7a8e78d8bfaf52
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD5aad67d591cbf3bd45f6ff9191ac052b4
SHA1aa9d544ccab0d14aaf887cd0d06e64a3303f223e
SHA256e025f73ee7863e1bab74e8dfcef2638d6a8ef41386f29ed0585dc299d27e59e1
SHA51251f0176b33d462e79def31c45c205b1cdacd860d4356b6136d1940afad1549b67091d518d39988a7f904e22aff521798c4260f94df3670ac742c40e7f9ff0257