Analysis
-
max time kernel
145s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29-08-2024 09:11
Static task
static1
Behavioral task
behavioral1
Sample
c889deefb8868d8617089813124ace9f_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
c889deefb8868d8617089813124ace9f_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c889deefb8868d8617089813124ace9f_JaffaCakes118.html
-
Size
47KB
-
MD5
c889deefb8868d8617089813124ace9f
-
SHA1
306527775e5407284e907e940d096b02e295274a
-
SHA256
f1ac1ba73017d199e537a8d76bf823c93d54b65b62a0337bf016230bb95a2706
-
SHA512
634de93cb1c7e22d6850488c270344620571133796690cfd1e3ea74a64e71e6e194079673cbe244f9116d086ecdb76b13121522c4ecc901b7b8e039156b22f7c
-
SSDEEP
768:wLPpHvvCIoopBC5+vo3Hmm+a9DeDqm/Di9z+gVS:wlHv7oWBCMSmm+a9DKDi98
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2900 msedge.exe 2900 msedge.exe 536 msedge.exe 536 msedge.exe 1288 identity_helper.exe 1288 identity_helper.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe 4660 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 536 wrote to memory of 4356 536 msedge.exe 86 PID 536 wrote to memory of 4356 536 msedge.exe 86 PID 536 wrote to memory of 796 536 msedge.exe 87 PID 536 wrote to memory of 796 536 msedge.exe 87 PID 536 wrote to memory of 796 536 msedge.exe 87 PID 536 wrote to memory of 796 536 msedge.exe 87 PID 536 wrote to memory of 796 536 msedge.exe 87 PID 536 wrote to memory of 796 536 msedge.exe 87 PID 536 wrote to memory of 796 536 msedge.exe 87 PID 536 wrote to memory of 796 536 msedge.exe 87 PID 536 wrote to memory of 796 536 msedge.exe 87 PID 536 wrote to memory of 796 536 msedge.exe 87 PID 536 wrote to memory of 796 536 msedge.exe 87 PID 536 wrote to memory of 796 536 msedge.exe 87 PID 536 wrote to memory of 796 536 msedge.exe 87 PID 536 wrote to memory of 796 536 msedge.exe 87 PID 536 wrote to memory of 796 536 msedge.exe 87 PID 536 wrote to memory of 796 536 msedge.exe 87 PID 536 wrote to memory of 796 536 msedge.exe 87 PID 536 wrote to memory of 796 536 msedge.exe 87 PID 536 wrote to memory of 796 536 msedge.exe 87 PID 536 wrote to memory of 796 536 msedge.exe 87 PID 536 wrote to memory of 796 536 msedge.exe 87 PID 536 wrote to memory of 796 536 msedge.exe 87 PID 536 wrote to memory of 796 536 msedge.exe 87 PID 536 wrote to memory of 796 536 msedge.exe 87 PID 536 wrote to memory of 796 536 msedge.exe 87 PID 536 wrote to memory of 796 536 msedge.exe 87 PID 536 wrote to memory of 796 536 msedge.exe 87 PID 536 wrote to memory of 796 536 msedge.exe 87 PID 536 wrote to memory of 796 536 msedge.exe 87 PID 536 wrote to memory of 796 536 msedge.exe 87 PID 536 wrote to memory of 796 536 msedge.exe 87 PID 536 wrote to memory of 796 536 msedge.exe 87 PID 536 wrote to memory of 796 536 msedge.exe 87 PID 536 wrote to memory of 796 536 msedge.exe 87 PID 536 wrote to memory of 796 536 msedge.exe 87 PID 536 wrote to memory of 796 536 msedge.exe 87 PID 536 wrote to memory of 796 536 msedge.exe 87 PID 536 wrote to memory of 796 536 msedge.exe 87 PID 536 wrote to memory of 796 536 msedge.exe 87 PID 536 wrote to memory of 796 536 msedge.exe 87 PID 536 wrote to memory of 2900 536 msedge.exe 88 PID 536 wrote to memory of 2900 536 msedge.exe 88 PID 536 wrote to memory of 4988 536 msedge.exe 89 PID 536 wrote to memory of 4988 536 msedge.exe 89 PID 536 wrote to memory of 4988 536 msedge.exe 89 PID 536 wrote to memory of 4988 536 msedge.exe 89 PID 536 wrote to memory of 4988 536 msedge.exe 89 PID 536 wrote to memory of 4988 536 msedge.exe 89 PID 536 wrote to memory of 4988 536 msedge.exe 89 PID 536 wrote to memory of 4988 536 msedge.exe 89 PID 536 wrote to memory of 4988 536 msedge.exe 89 PID 536 wrote to memory of 4988 536 msedge.exe 89 PID 536 wrote to memory of 4988 536 msedge.exe 89 PID 536 wrote to memory of 4988 536 msedge.exe 89 PID 536 wrote to memory of 4988 536 msedge.exe 89 PID 536 wrote to memory of 4988 536 msedge.exe 89 PID 536 wrote to memory of 4988 536 msedge.exe 89 PID 536 wrote to memory of 4988 536 msedge.exe 89 PID 536 wrote to memory of 4988 536 msedge.exe 89 PID 536 wrote to memory of 4988 536 msedge.exe 89 PID 536 wrote to memory of 4988 536 msedge.exe 89 PID 536 wrote to memory of 4988 536 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\c889deefb8868d8617089813124ace9f_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:536 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe7d4a46f8,0x7ffe7d4a4708,0x7ffe7d4a47182⤵PID:4356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1924,127556399473167923,8687031666251851343,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1992 /prefetch:22⤵PID:796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1924,127556399473167923,8687031666251851343,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2312 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1924,127556399473167923,8687031666251851343,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2828 /prefetch:82⤵PID:4988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,127556399473167923,8687031666251851343,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:4876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,127556399473167923,8687031666251851343,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:1752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,127556399473167923,8687031666251851343,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4656 /prefetch:12⤵PID:4912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1924,127556399473167923,8687031666251851343,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5612 /prefetch:82⤵PID:4916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1924,127556399473167923,8687031666251851343,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5612 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,127556399473167923,8687031666251851343,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2264 /prefetch:12⤵PID:2768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,127556399473167923,8687031666251851343,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5456 /prefetch:12⤵PID:220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,127556399473167923,8687031666251851343,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4708 /prefetch:12⤵PID:3448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,127556399473167923,8687031666251851343,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4884 /prefetch:12⤵PID:2400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1924,127556399473167923,8687031666251851343,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3996 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4660
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4276
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2692
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ff63763eedb406987ced076e36ec9acf
SHA116365aa97cd1a115412f8ae436d5d4e9be5f7b5d
SHA2568f460e8b7a67f0c65b7248961a7c71146c9e7a19772b193972b486dbf05b8e4c
SHA512ce90336169c8b2de249d4faea2519bf7c3df48ae9d77cdf471dd5dbd8e8542d47d9348080a098074aa63c255890850ee3b80ddb8eef8384919fdca3bb9371d9f
-
Filesize
152B
MD52783c40400a8912a79cfd383da731086
SHA1001a131fe399c30973089e18358818090ca81789
SHA256331fa67da5f67bbb42794c3aeab8f7819f35347460ffb352ccc914e0373a22c5
SHA512b7c7d3aa966ad39a86aae02479649d74dcbf29d9cb3a7ff8b9b2354ea60704da55f5c0df803fd0a7191170a8e72fdd5eacfa1a739d7a74e390a7b74bdced1685
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD549dd6779cc3a996083e7eca90748d4c6
SHA183edcc9d0a16561bbd7b0ed579874be3219aa43f
SHA256789e59a7cb2aaadc0ad03438ba7304fc2b0aab1dc67ed699283097d17b4c4b14
SHA51214b845074dc8900bd9e76b55d932db293afffffd00be9e51d1f27fa87f33ef57003ab3e04e59b13177587527f841b6581db72d27ab3f627284716473e3282067
-
Filesize
1KB
MD59294387e08b2411133c655bbd93e9a1f
SHA158b52b69368ccd1dc26e324df832d76a1a0f46c8
SHA256f6658d2196dc9489c07c6e72f082536f188f29e3c05a9c99e3f65deba8416203
SHA512a5fbb2bb49ee7342545790f6fe96901ed72c98bc002e591adc36560118ce92de3c277f413d015ff7b27bdef9dc371bd36d0f0961dda3a94f4347ab3c87faed5b
-
Filesize
5KB
MD5ba8580bd205451c6c1219e4bd001e49f
SHA145deceaaae8518b550aa90d30e4874a08f5ef9d6
SHA2563c7d2dcdf545c1cc1aaabecbdea47e97b7a1a1890df8ceeae868e9319f78cf72
SHA512dab6c1d3ba463bd79041413491a416f62d9d3b0315919dce753171597115fb0cbc7bcadb7b591b6b6f91bc2bb2c2d5eed635d3fac62be833214adfd604144c92
-
Filesize
6KB
MD511f91e21741712a3633fcbf42bdf4913
SHA19461556e08b20645e70db2ff02455b194425c6d2
SHA256d4bcf104a982d01948cc1076fb2c8a84204866d80c8c2e4cbe8293042459738d
SHA512d0e5add529f42ca8baeff7ea28eb778fdeb38a86fa8773d87c8d7039ce63f1a418e3cd1ce76d37cfa58eb2cacad0f86214d9a8743ae7f79322ef717f63ed41b3
-
Filesize
6KB
MD599f72f4b86b1a2064b724ddefbec8323
SHA1805219a3c950c8d920ca87313aa5c4196c98447e
SHA2566f8e391c53456e29edf51af45ecc7f1e451153954873033ef8aaab60176df433
SHA51270391efbe48527dec448069a641a54527c9de70b226d70bfc55d49043797e795a765e610452eeca47431f929b3544b1ef35ef2e466c0f9df3dd4c3a9bc0d8800
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5c2a56d7c59b1ebff603c36315e513fb3
SHA113832a5c77549be59d85793295ae9fabbc72edc9
SHA2563bc5b422312cb28df2e7746b2894a88a22f75c18ed1450813195445bfabbdb5f
SHA5121264516b31cd36bdf7074f3aef102a5ba4b8ec38bdbcd66e00a51d04e1a38f9556489562db4023754c5df2d41c705779f16325cf0f2806e19784e1e2c7e15bf7