Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29/08/2024, 10:13
Static task
static1
Behavioral task
behavioral1
Sample
c89fecdf14cbe02aa0f8c7f708c06afe_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c89fecdf14cbe02aa0f8c7f708c06afe_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c89fecdf14cbe02aa0f8c7f708c06afe_JaffaCakes118.html
-
Size
292KB
-
MD5
c89fecdf14cbe02aa0f8c7f708c06afe
-
SHA1
eb41943da6d0a4a9baaa85fa2215bf8f375c05f1
-
SHA256
94627c087ce6eb178c54ba530f124a5ca9a932f07469b6383b03dccfa0d625f7
-
SHA512
18a3679e913d938b4c4b5170c849901cb2a5a6143b3927414d344483a7f363adc405fcefd43d0de21f5f61a1f3fd8b9f4d0a5f7814745004ae413c45ef43e825
-
SSDEEP
3072:sdSoyuNd7HmsTEZqvyXvuZwle7ILtUqmTlftmRVS7:5oyumsTEZ7/3loILtU3
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4800 msedge.exe 4800 msedge.exe 3304 msedge.exe 3304 msedge.exe 4184 msedge.exe 4184 msedge.exe 4184 msedge.exe 4184 msedge.exe 4264 identity_helper.exe 4264 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3304 wrote to memory of 4288 3304 msedge.exe 84 PID 3304 wrote to memory of 4288 3304 msedge.exe 84 PID 3304 wrote to memory of 1188 3304 msedge.exe 85 PID 3304 wrote to memory of 1188 3304 msedge.exe 85 PID 3304 wrote to memory of 1188 3304 msedge.exe 85 PID 3304 wrote to memory of 1188 3304 msedge.exe 85 PID 3304 wrote to memory of 1188 3304 msedge.exe 85 PID 3304 wrote to memory of 1188 3304 msedge.exe 85 PID 3304 wrote to memory of 1188 3304 msedge.exe 85 PID 3304 wrote to memory of 1188 3304 msedge.exe 85 PID 3304 wrote to memory of 1188 3304 msedge.exe 85 PID 3304 wrote to memory of 1188 3304 msedge.exe 85 PID 3304 wrote to memory of 1188 3304 msedge.exe 85 PID 3304 wrote to memory of 1188 3304 msedge.exe 85 PID 3304 wrote to memory of 1188 3304 msedge.exe 85 PID 3304 wrote to memory of 1188 3304 msedge.exe 85 PID 3304 wrote to memory of 1188 3304 msedge.exe 85 PID 3304 wrote to memory of 1188 3304 msedge.exe 85 PID 3304 wrote to memory of 1188 3304 msedge.exe 85 PID 3304 wrote to memory of 1188 3304 msedge.exe 85 PID 3304 wrote to memory of 1188 3304 msedge.exe 85 PID 3304 wrote to memory of 1188 3304 msedge.exe 85 PID 3304 wrote to memory of 1188 3304 msedge.exe 85 PID 3304 wrote to memory of 1188 3304 msedge.exe 85 PID 3304 wrote to memory of 1188 3304 msedge.exe 85 PID 3304 wrote to memory of 1188 3304 msedge.exe 85 PID 3304 wrote to memory of 1188 3304 msedge.exe 85 PID 3304 wrote to memory of 1188 3304 msedge.exe 85 PID 3304 wrote to memory of 1188 3304 msedge.exe 85 PID 3304 wrote to memory of 1188 3304 msedge.exe 85 PID 3304 wrote to memory of 1188 3304 msedge.exe 85 PID 3304 wrote to memory of 1188 3304 msedge.exe 85 PID 3304 wrote to memory of 1188 3304 msedge.exe 85 PID 3304 wrote to memory of 1188 3304 msedge.exe 85 PID 3304 wrote to memory of 1188 3304 msedge.exe 85 PID 3304 wrote to memory of 1188 3304 msedge.exe 85 PID 3304 wrote to memory of 1188 3304 msedge.exe 85 PID 3304 wrote to memory of 1188 3304 msedge.exe 85 PID 3304 wrote to memory of 1188 3304 msedge.exe 85 PID 3304 wrote to memory of 1188 3304 msedge.exe 85 PID 3304 wrote to memory of 1188 3304 msedge.exe 85 PID 3304 wrote to memory of 1188 3304 msedge.exe 85 PID 3304 wrote to memory of 4800 3304 msedge.exe 86 PID 3304 wrote to memory of 4800 3304 msedge.exe 86 PID 3304 wrote to memory of 4868 3304 msedge.exe 87 PID 3304 wrote to memory of 4868 3304 msedge.exe 87 PID 3304 wrote to memory of 4868 3304 msedge.exe 87 PID 3304 wrote to memory of 4868 3304 msedge.exe 87 PID 3304 wrote to memory of 4868 3304 msedge.exe 87 PID 3304 wrote to memory of 4868 3304 msedge.exe 87 PID 3304 wrote to memory of 4868 3304 msedge.exe 87 PID 3304 wrote to memory of 4868 3304 msedge.exe 87 PID 3304 wrote to memory of 4868 3304 msedge.exe 87 PID 3304 wrote to memory of 4868 3304 msedge.exe 87 PID 3304 wrote to memory of 4868 3304 msedge.exe 87 PID 3304 wrote to memory of 4868 3304 msedge.exe 87 PID 3304 wrote to memory of 4868 3304 msedge.exe 87 PID 3304 wrote to memory of 4868 3304 msedge.exe 87 PID 3304 wrote to memory of 4868 3304 msedge.exe 87 PID 3304 wrote to memory of 4868 3304 msedge.exe 87 PID 3304 wrote to memory of 4868 3304 msedge.exe 87 PID 3304 wrote to memory of 4868 3304 msedge.exe 87 PID 3304 wrote to memory of 4868 3304 msedge.exe 87 PID 3304 wrote to memory of 4868 3304 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\c89fecdf14cbe02aa0f8c7f708c06afe_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3304 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe746446f8,0x7ffe74644708,0x7ffe746447182⤵PID:4288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,2067688588685035374,2157733468195058631,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2168 /prefetch:22⤵PID:1188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2164,2067688588685035374,2157733468195058631,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2252 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2164,2067688588685035374,2157733468195058631,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2788 /prefetch:82⤵PID:4868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,2067688588685035374,2157733468195058631,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3208 /prefetch:12⤵PID:1556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,2067688588685035374,2157733468195058631,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:4892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,2067688588685035374,2157733468195058631,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1836 /prefetch:12⤵PID:4992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,2067688588685035374,2157733468195058631,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3088 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2164,2067688588685035374,2157733468195058631,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5632 /prefetch:82⤵PID:4772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2164,2067688588685035374,2157733468195058631,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5632 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,2067688588685035374,2157733468195058631,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5324 /prefetch:12⤵PID:1204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,2067688588685035374,2157733468195058631,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5276 /prefetch:12⤵PID:2856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,2067688588685035374,2157733468195058631,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2728 /prefetch:12⤵PID:4856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,2067688588685035374,2157733468195058631,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1688 /prefetch:12⤵PID:540
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1904
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2248
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ecf7ca53c80b5245e35839009d12f866
SHA1a7af77cf31d410708ebd35a232a80bddfb0615bb
SHA256882a513b71b26210ff251769b82b2c5d59a932f96d9ce606ca2fab6530a13687
SHA512706722bd22ce27d854036b1b16e6a3cdb36284b66edc76238a79c2e11cee7d1307b121c898ad832eb1af73e4f08d991d64dc0bff529896ffb4ebe9b3dc381696
-
Filesize
152B
MD54dd2754d1bea40445984d65abee82b21
SHA14b6a5658bae9a784a370a115fbb4a12e92bd3390
SHA256183b8e82a0deaa83d04736553671cedb738adc909f483b3c5f822a0e6be7477d
SHA51292d44ee372ad33f892b921efa6cabc78e91025e89f05a22830763217826fa98d51d55711f85c8970ac58abf9adc6c85cc40878032cd6d2589ab226cd099f99e1
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\39140a1f-ecee-4e9b-9122-5ce8250aa7e2.tmp
Filesize6KB
MD5f1f87bf43423048da921cf62086ac752
SHA11f088eb4eaf4abd9f4ddac189c42d948eeb8314d
SHA2561b128d3c03d69f4d989c935200e1a2f9e53c0b22241c8f2ef0004f245d4d41bb
SHA512ce658b63a28448ea375bb666f89f094d5a9a7ff0a12f63414b76fcd6c40dc7d28d1fa5051c6ad03132765a8eff684a23a53ac05c21e6fe49cc552b3df7589bcd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD52c8122d4c515e2b867863c0551eb2b8a
SHA1cc770219e58c45485fd32ad53ce3a33cc719296b
SHA2562ee04b29c0ea8759a4f873ef6ffcf21ea2b470d237e71fadc0e98324276fc6d5
SHA512f46459e8306521650a9314acea6cd76f37b33b61a1130c5dca8d6d0b2448c07a1bd938749dcf1c6deab783e01c6385843c5b394321dd92ae7758fb341637b7c8
-
Filesize
2KB
MD54c093a99f5285d9507505e9ef017bfe5
SHA1217347feaed17be3ed8acebe9183f391b127efcf
SHA256bcd582b937080d5c3b4012ad12fb51a8ca64e7ce9c4ec34b85f89b6d81a9dcf7
SHA5123a89a75e89870d8ed7d185aa7e6e7b61d36afb94875dcdbae40fa710464bfb26c0d828e01be61a84a074da0de1407d85112b70a82755a9df69e2e5d4ef2f0ef0
-
Filesize
2KB
MD56fe76d3ec2f7a3931397a8edae6e2d28
SHA1ee582b50693b743886d6bdd22d44d77820424f24
SHA256a13bf08147b7793378db5e59afb6c6d41f2bc161e0264a5a38b04a721e53ada1
SHA512717fb054aa8bceec28bf32d2d692d3953ab62adda109d767cf8c86eb24643131877d9bb65c474195d45a8b4297f36f05b5b3ee8747c8999b74230fdcf826f536
-
Filesize
6KB
MD5b47895af2347f16823506b19322068da
SHA1a80b06d5cf32b339cbc3972b59d4d687f7476e47
SHA256c33a9bd63ff54c3d9b02f65525cc542f8ba67af4e998fa5d74904019ba4ae3cd
SHA512283907646fa1c901371f482aa24788ebe2e629f7cb8b8f11398cffb34a6436bdc83a819176b903884fd68b2e1d38706a353c6cce8b1c476f86fa077f57ef53ef
-
Filesize
5KB
MD514288bae040e0795f45c6eb31f2ba335
SHA13229076e9520c6270ac4ba99634b36e52644f6c5
SHA2568cd6af4ee12cc9a0aeb8002c0af242d7c7e5fe5815bd388d144ac5cbefe6817c
SHA512e33fdc1a6d8661d14397e14322170d4c12732476c99d2bc3a211d28fdd18c6a92f799cd461a17139e95b5cdee6a288709ee88a36bcb7aa6941204847cbce7dce
-
Filesize
6KB
MD53e23ae6a5fcccafa41caf31f3fb7ca57
SHA17c170368b7b803bca95ed8a9e4fe8da531922e72
SHA2563dd6db88822e61c0d79db09dfebd45f5798891ef485e480ef491881267d0eb30
SHA51253e28bd3500f2f9e69db5511490699e95eb52f559d59c8c86ff5b156194bde9a6edb3dd15a18622a43e30ed17d754a1f1d7aae6b48c77de748d2f30b502a9259
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD50ee9bf48d625447f4572a9a50767a00e
SHA17ced2c8c7971981910907ddcbb311828874ada73
SHA2561d43c36fd123be42554bd0cd119a14fcd192e48367cd3352f47801d1c1c0ed80
SHA512e21b2e7cd2c6073afbac61e0771c4b3a3a5d01a60b2e824670319fd0617d5863e6ae5082d348f53e0fd5ef3968990552321dabb5fadd30269cbddd0deca98067