Analysis
-
max time kernel
146s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29/08/2024, 03:15
Static task
static1
Behavioral task
behavioral1
Sample
c822f9f048aec5e54ad743f910ac0e85_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
c822f9f048aec5e54ad743f910ac0e85_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c822f9f048aec5e54ad743f910ac0e85_JaffaCakes118.html
-
Size
74KB
-
MD5
c822f9f048aec5e54ad743f910ac0e85
-
SHA1
1c49833827e276cdb96abc066a9a03e450e87067
-
SHA256
9cda1b58751e22337684d5a903af9839b99c5b545f4f077a3c88692483cb943a
-
SHA512
1d89080bdb7c7e6c707de9e7639e3aa1bc8ebf8361329c0689537214567f86a9da08de8c82fed4b7797beaf53e8b05912026204a9d4390c6d8dd0b089a3106aa
-
SSDEEP
1536:o/xUdyrVGPSj9/u9tbBnCc8ScgHf4BLmuuyepBLeBLrBL5BLBmuJHqWWzYmGFyqg:cxUdyrVGcQomfqVdZZHWzYm0lZuXWsuI
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 612 msedge.exe 612 msedge.exe 5040 msedge.exe 5040 msedge.exe 3848 identity_helper.exe 3848 identity_helper.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5040 wrote to memory of 4820 5040 msedge.exe 84 PID 5040 wrote to memory of 4820 5040 msedge.exe 84 PID 5040 wrote to memory of 2312 5040 msedge.exe 85 PID 5040 wrote to memory of 2312 5040 msedge.exe 85 PID 5040 wrote to memory of 2312 5040 msedge.exe 85 PID 5040 wrote to memory of 2312 5040 msedge.exe 85 PID 5040 wrote to memory of 2312 5040 msedge.exe 85 PID 5040 wrote to memory of 2312 5040 msedge.exe 85 PID 5040 wrote to memory of 2312 5040 msedge.exe 85 PID 5040 wrote to memory of 2312 5040 msedge.exe 85 PID 5040 wrote to memory of 2312 5040 msedge.exe 85 PID 5040 wrote to memory of 2312 5040 msedge.exe 85 PID 5040 wrote to memory of 2312 5040 msedge.exe 85 PID 5040 wrote to memory of 2312 5040 msedge.exe 85 PID 5040 wrote to memory of 2312 5040 msedge.exe 85 PID 5040 wrote to memory of 2312 5040 msedge.exe 85 PID 5040 wrote to memory of 2312 5040 msedge.exe 85 PID 5040 wrote to memory of 2312 5040 msedge.exe 85 PID 5040 wrote to memory of 2312 5040 msedge.exe 85 PID 5040 wrote to memory of 2312 5040 msedge.exe 85 PID 5040 wrote to memory of 2312 5040 msedge.exe 85 PID 5040 wrote to memory of 2312 5040 msedge.exe 85 PID 5040 wrote to memory of 2312 5040 msedge.exe 85 PID 5040 wrote to memory of 2312 5040 msedge.exe 85 PID 5040 wrote to memory of 2312 5040 msedge.exe 85 PID 5040 wrote to memory of 2312 5040 msedge.exe 85 PID 5040 wrote to memory of 2312 5040 msedge.exe 85 PID 5040 wrote to memory of 2312 5040 msedge.exe 85 PID 5040 wrote to memory of 2312 5040 msedge.exe 85 PID 5040 wrote to memory of 2312 5040 msedge.exe 85 PID 5040 wrote to memory of 2312 5040 msedge.exe 85 PID 5040 wrote to memory of 2312 5040 msedge.exe 85 PID 5040 wrote to memory of 2312 5040 msedge.exe 85 PID 5040 wrote to memory of 2312 5040 msedge.exe 85 PID 5040 wrote to memory of 2312 5040 msedge.exe 85 PID 5040 wrote to memory of 2312 5040 msedge.exe 85 PID 5040 wrote to memory of 2312 5040 msedge.exe 85 PID 5040 wrote to memory of 2312 5040 msedge.exe 85 PID 5040 wrote to memory of 2312 5040 msedge.exe 85 PID 5040 wrote to memory of 2312 5040 msedge.exe 85 PID 5040 wrote to memory of 2312 5040 msedge.exe 85 PID 5040 wrote to memory of 2312 5040 msedge.exe 85 PID 5040 wrote to memory of 612 5040 msedge.exe 86 PID 5040 wrote to memory of 612 5040 msedge.exe 86 PID 5040 wrote to memory of 1520 5040 msedge.exe 87 PID 5040 wrote to memory of 1520 5040 msedge.exe 87 PID 5040 wrote to memory of 1520 5040 msedge.exe 87 PID 5040 wrote to memory of 1520 5040 msedge.exe 87 PID 5040 wrote to memory of 1520 5040 msedge.exe 87 PID 5040 wrote to memory of 1520 5040 msedge.exe 87 PID 5040 wrote to memory of 1520 5040 msedge.exe 87 PID 5040 wrote to memory of 1520 5040 msedge.exe 87 PID 5040 wrote to memory of 1520 5040 msedge.exe 87 PID 5040 wrote to memory of 1520 5040 msedge.exe 87 PID 5040 wrote to memory of 1520 5040 msedge.exe 87 PID 5040 wrote to memory of 1520 5040 msedge.exe 87 PID 5040 wrote to memory of 1520 5040 msedge.exe 87 PID 5040 wrote to memory of 1520 5040 msedge.exe 87 PID 5040 wrote to memory of 1520 5040 msedge.exe 87 PID 5040 wrote to memory of 1520 5040 msedge.exe 87 PID 5040 wrote to memory of 1520 5040 msedge.exe 87 PID 5040 wrote to memory of 1520 5040 msedge.exe 87 PID 5040 wrote to memory of 1520 5040 msedge.exe 87 PID 5040 wrote to memory of 1520 5040 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\c822f9f048aec5e54ad743f910ac0e85_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5040 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xd8,0x10c,0x7ffea18146f8,0x7ffea1814708,0x7ffea18147182⤵PID:4820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,16917250796574591357,10447549432947326002,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 /prefetch:22⤵PID:2312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2148,16917250796574591357,10447549432947326002,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2308 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2148,16917250796574591357,10447549432947326002,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2828 /prefetch:82⤵PID:1520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,16917250796574591357,10447549432947326002,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:5036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,16917250796574591357,10447549432947326002,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:2908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,16917250796574591357,10447549432947326002,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2116 /prefetch:12⤵PID:4592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,16917250796574591357,10447549432947326002,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5248 /prefetch:12⤵PID:2036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,16917250796574591357,10447549432947326002,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5868 /prefetch:82⤵PID:856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,16917250796574591357,10447549432947326002,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5868 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,16917250796574591357,10447549432947326002,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5444 /prefetch:12⤵PID:2856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,16917250796574591357,10447549432947326002,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5472 /prefetch:12⤵PID:4760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,16917250796574591357,10447549432947326002,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5524 /prefetch:12⤵PID:548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,16917250796574591357,10447549432947326002,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5216 /prefetch:12⤵PID:4964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,16917250796574591357,10447549432947326002,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5468 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2368
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4012
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4944
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4472
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f9664c896e19205022c094d725f820b6
SHA1f8f1baf648df755ba64b412d512446baf88c0184
SHA2567121d84202a850791c2320385eb59eda4d697310dc51b1fcd4d51264aba2434e
SHA5123fa5d2c68a9e70e4a25eaac2095171d87c741eec2624c314c6a56f4fa390d6319633bf4c48b1a4af7e9a0451f346beced9693da88cfc7bcba8dfe209cbd1b3ae
-
Filesize
152B
MD5847d47008dbea51cb1732d54861ba9c9
SHA1f2099242027dccb88d6f05760b57f7c89d926c0d
SHA25610292fa05d896a2952c1d602a72d761d34bc776b44d6a7df87e49b5b613a8ac1
SHA512bd1526aa1cc1c016d95dfcc53a78b45b09dde4ce67357fc275ab835dbe1bb5b053ca386239f50cde95ad243a9c1bbb12f7505818577589beecc6084f7b94e83f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD5a854b3680586392bf1856e83066ab02c
SHA1bc163e6f0ab659a549184c72ffab5db612767064
SHA2561ae47515c9cce6e490112c1497c9e6149b066f8435dd485ce49b2ef784bdfd2a
SHA5124631606dca146aa7cd0baf625325a7fb8834e3de76273cc1aa4790d743570ac94ec3cb607a5662f7f15ad9c0e11b294710d2996731a0bd32df8c899fc0361eb4
-
Filesize
1KB
MD5c48a2d035ecaaa807aea8b00c8b5de51
SHA13e787cd819c27d64c3597dcfb6edf138d3c101df
SHA2566947f15204338e80d1d8c53b284bccdc060659c326f9d24ff5223da327b9b5e1
SHA51291aa62cb717bcd69f653fb2fa6a3d9f44da0f39aa1ee2954c9b8d27bb7372a6edefc3e11f5358ebb29e8703b3e005138fdd0811897e7037bce823d6c4bc64cb0
-
Filesize
1KB
MD5f7bc6fba4d612444891295661ead4161
SHA1166fac7ce1853f96088c9443f9189a5edccc3326
SHA256f6a506e545310f281c285dd3a6ffe434b13f18b201ddff8cea5ea98c33c00142
SHA512eb6397788b4b8157b0dab56a6b5eba1ce8f07478b28975bf76940c624ceae68987cba0f87d86dea44a4785adad3b51c772d1e583d313e4eb454ef335dad7e5fb
-
Filesize
5KB
MD5ba77c0446d300968fcbd209ac3fa5853
SHA1dbe218d53f0f4f9c677bac3bd813e53b6ffd70cd
SHA256a6f3c05690fb350bb69532a6ccfe7a3dd87632ff22219d1bd5adb9a22b2df4fe
SHA512984c57d26ad1272d51a18b8921e9240e01857df2c3373694e75c938d772950132ef22cea8a8587c0b43e7baeeca29ff85764c26c899879864ef1ea2ae4992daf
-
Filesize
6KB
MD57786629d4faa670edbb398c246b75b6d
SHA1305a7d240ad3fa418d614bf4e01c34b9ea4aee5e
SHA256fe8f61511258e9a3d0a721e395a440f084012461ff4eb6c93324fe54c35e84cf
SHA5126e18183391ea32db2c3e49ea2014581ab55cd1f407ea80b7018d2abbb548e717963076e3cc4dad4597195e5f845904d5eece6d6cf87b36742476763af3d65138
-
Filesize
6KB
MD5797f8fa3f3694f2b15f2477f3d430b21
SHA19f499e3ff31258efa45219ee580466848901f31a
SHA2563c81f74bf05f8da17dc52a1da6976e356df823007638f287de1de9859c646358
SHA512055b9fae195b26ddfeb1f288455e6094bca5ef463f7ab0d7ebdf950229af5059579dac3e59157b869d662cabaa2f573e09e712022819080f4cf0979f83bc3823
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5ed9e4c1b4cf949c8fe80cc848336a02e
SHA1940cf40a258db14f639b8098e655d383f03ae02a
SHA2564cd8c36592348de13b6d53090e39d849c0c6c386bdb192e4b6e292434f25dfcb
SHA51231b0e8932a6e1c73015b9ea51a50ce659feefa17add7757c8bf8b4b13bd02128a770d8a37a8171b35fcb417fe5a8f8d1803c13011842926825710f6a462af25c