Analysis
-
max time kernel
145s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29/08/2024, 16:32
Static task
static1
Behavioral task
behavioral1
Sample
c9329d52ec21bb9c67f9c7287c76675c_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
c9329d52ec21bb9c67f9c7287c76675c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c9329d52ec21bb9c67f9c7287c76675c_JaffaCakes118.html
-
Size
19KB
-
MD5
c9329d52ec21bb9c67f9c7287c76675c
-
SHA1
2b2939d80976c60ee715c3530bda95dfea91185f
-
SHA256
dc8c5d408f04e1cca16f072a74e0c194e80d3a6ddc8b886078e345a4c38b2818
-
SHA512
ad1656e83304354cfa0c229aa9a5ab1a5103db1abe51c6d8b039028b116136764264804640a4e358b12bcd19abdcf342e437e0ba45522d3e110eaea57fc818c7
-
SSDEEP
384:ziyJKhgESRVBD8cEQ3ROmuf7emLEXucfIk9xhefzVc9QZ:zixSRgcX3omnmFOIk9erqQZ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4356 msedge.exe 4356 msedge.exe 4280 msedge.exe 4280 msedge.exe 5044 identity_helper.exe 5044 identity_helper.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe 3164 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4280 wrote to memory of 3220 4280 msedge.exe 86 PID 4280 wrote to memory of 3220 4280 msedge.exe 86 PID 4280 wrote to memory of 3872 4280 msedge.exe 87 PID 4280 wrote to memory of 3872 4280 msedge.exe 87 PID 4280 wrote to memory of 3872 4280 msedge.exe 87 PID 4280 wrote to memory of 3872 4280 msedge.exe 87 PID 4280 wrote to memory of 3872 4280 msedge.exe 87 PID 4280 wrote to memory of 3872 4280 msedge.exe 87 PID 4280 wrote to memory of 3872 4280 msedge.exe 87 PID 4280 wrote to memory of 3872 4280 msedge.exe 87 PID 4280 wrote to memory of 3872 4280 msedge.exe 87 PID 4280 wrote to memory of 3872 4280 msedge.exe 87 PID 4280 wrote to memory of 3872 4280 msedge.exe 87 PID 4280 wrote to memory of 3872 4280 msedge.exe 87 PID 4280 wrote to memory of 3872 4280 msedge.exe 87 PID 4280 wrote to memory of 3872 4280 msedge.exe 87 PID 4280 wrote to memory of 3872 4280 msedge.exe 87 PID 4280 wrote to memory of 3872 4280 msedge.exe 87 PID 4280 wrote to memory of 3872 4280 msedge.exe 87 PID 4280 wrote to memory of 3872 4280 msedge.exe 87 PID 4280 wrote to memory of 3872 4280 msedge.exe 87 PID 4280 wrote to memory of 3872 4280 msedge.exe 87 PID 4280 wrote to memory of 3872 4280 msedge.exe 87 PID 4280 wrote to memory of 3872 4280 msedge.exe 87 PID 4280 wrote to memory of 3872 4280 msedge.exe 87 PID 4280 wrote to memory of 3872 4280 msedge.exe 87 PID 4280 wrote to memory of 3872 4280 msedge.exe 87 PID 4280 wrote to memory of 3872 4280 msedge.exe 87 PID 4280 wrote to memory of 3872 4280 msedge.exe 87 PID 4280 wrote to memory of 3872 4280 msedge.exe 87 PID 4280 wrote to memory of 3872 4280 msedge.exe 87 PID 4280 wrote to memory of 3872 4280 msedge.exe 87 PID 4280 wrote to memory of 3872 4280 msedge.exe 87 PID 4280 wrote to memory of 3872 4280 msedge.exe 87 PID 4280 wrote to memory of 3872 4280 msedge.exe 87 PID 4280 wrote to memory of 3872 4280 msedge.exe 87 PID 4280 wrote to memory of 3872 4280 msedge.exe 87 PID 4280 wrote to memory of 3872 4280 msedge.exe 87 PID 4280 wrote to memory of 3872 4280 msedge.exe 87 PID 4280 wrote to memory of 3872 4280 msedge.exe 87 PID 4280 wrote to memory of 3872 4280 msedge.exe 87 PID 4280 wrote to memory of 3872 4280 msedge.exe 87 PID 4280 wrote to memory of 4356 4280 msedge.exe 88 PID 4280 wrote to memory of 4356 4280 msedge.exe 88 PID 4280 wrote to memory of 1404 4280 msedge.exe 89 PID 4280 wrote to memory of 1404 4280 msedge.exe 89 PID 4280 wrote to memory of 1404 4280 msedge.exe 89 PID 4280 wrote to memory of 1404 4280 msedge.exe 89 PID 4280 wrote to memory of 1404 4280 msedge.exe 89 PID 4280 wrote to memory of 1404 4280 msedge.exe 89 PID 4280 wrote to memory of 1404 4280 msedge.exe 89 PID 4280 wrote to memory of 1404 4280 msedge.exe 89 PID 4280 wrote to memory of 1404 4280 msedge.exe 89 PID 4280 wrote to memory of 1404 4280 msedge.exe 89 PID 4280 wrote to memory of 1404 4280 msedge.exe 89 PID 4280 wrote to memory of 1404 4280 msedge.exe 89 PID 4280 wrote to memory of 1404 4280 msedge.exe 89 PID 4280 wrote to memory of 1404 4280 msedge.exe 89 PID 4280 wrote to memory of 1404 4280 msedge.exe 89 PID 4280 wrote to memory of 1404 4280 msedge.exe 89 PID 4280 wrote to memory of 1404 4280 msedge.exe 89 PID 4280 wrote to memory of 1404 4280 msedge.exe 89 PID 4280 wrote to memory of 1404 4280 msedge.exe 89 PID 4280 wrote to memory of 1404 4280 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\c9329d52ec21bb9c67f9c7287c76675c_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4280 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd582646f8,0x7ffd58264708,0x7ffd582647182⤵PID:3220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,7524627355477737635,12799227860858126023,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 /prefetch:22⤵PID:3872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2144,7524627355477737635,12799227860858126023,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2212 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2144,7524627355477737635,12799227860858126023,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2764 /prefetch:82⤵PID:1404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,7524627355477737635,12799227860858126023,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:4160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,7524627355477737635,12799227860858126023,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:1312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,7524627355477737635,12799227860858126023,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4732 /prefetch:12⤵PID:4552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,7524627355477737635,12799227860858126023,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4912 /prefetch:12⤵PID:2464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,7524627355477737635,12799227860858126023,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5836 /prefetch:82⤵PID:1516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,7524627355477737635,12799227860858126023,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5836 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,7524627355477737635,12799227860858126023,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5560 /prefetch:12⤵PID:2232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,7524627355477737635,12799227860858126023,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5476 /prefetch:12⤵PID:3116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,7524627355477737635,12799227860858126023,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4088 /prefetch:12⤵PID:4408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,7524627355477737635,12799227860858126023,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5600 /prefetch:12⤵PID:4312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,7524627355477737635,12799227860858126023,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1852 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3164
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1848
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2488
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59e3fc58a8fb86c93d19e1500b873ef6f
SHA1c6aae5f4e26f5570db5e14bba8d5061867a33b56
SHA256828f4eacac1c40b790fd70dbb6fa6ba03dcc681171d9b2a6579626d27837b1c4
SHA512e5e245b56fa82075e060f468a3224cf2ef43f1b6d87f0351a2102d85c7c897e559be4caeaecfdc4059af29fdc674681b61229319dda95cb2ee649b2eb98d313e
-
Filesize
152B
MD527304926d60324abe74d7a4b571c35ea
SHA178b8f92fcaf4a09eaa786bbe33fd1b0222ef29c1
SHA2567039ad5c2b40f4d97c8c2269f4942be13436d739b2e1f8feb7a0c9f9fdb931de
SHA512f5b6181d3f432238c7365f64fc8a373299e23ba8178bcc419471916ef8b23e909787c7c0617ab22e4eb90909c02bd7b84f1386fbc61e2bdb5a0eb474175da4bd
-
Filesize
211KB
MD5e7226392c938e4e604d2175eb9f43ca1
SHA12098293f39aa0bcdd62e718f9212d9062fa283ab
SHA256d46ec08b6c29c4ca56cecbf73149cc66ebd902197590fe28cd65dad52a08c4e1
SHA51263a4b99101c790d40a813db9e0d5fde21a64ccaf60a6009ead027920dbbdb52cc262af829e5c4140f3702a559c7ac46efa89622d76d45b4b49a9ce01625ef145
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD5725f4d7d2758f098891d468db97e0fe6
SHA135da042cfcc3568ed020ec4290a2cb9282a4e742
SHA256bf3f8caa0595f9d767f5706d8755b103acc1dc731d942a43dd94312637ff5e8b
SHA512fb86bdf35c09d47fbdcda0666a11533f8334099d6439f0ae1353a41ab75ae4308a578bc1adbbb5e1cda518d9d8d3dfcc0bc9c5f0b8f73a77a47b3f618120d5c3
-
Filesize
1KB
MD5ef4f0a3a4e8e0a2412d33132eb26fbee
SHA113a5a4a36dbd3836d195b6b78cc05b29a4619eea
SHA256a19ff4bf494323aa8fdbe66a4ca05862e646244c653df378cae99b4a8ecd09bf
SHA512ae1cab47ab83523ab4e4c379c29a8aa834a6b9fb75e4b57dfbdab246f94e364a470e9657f34eb3cd247a67502c13a546838c5c596d997aa0eb0f7714113d8f6d
-
Filesize
5KB
MD59c1fbe1864e77a430ebad4dcbe369fc9
SHA139113034807475a789d2c5c187c8d68c974aa7b8
SHA25649650f8f649626f611d68e4fee5b6b4ea3b58f80cff9439c67839af54dc5fa83
SHA512d060e0ca1e4b7f2cc4a48206496817f6b8af0435622790daf583eb535a7ee33878d823b5a6db5cf41fc63ac2a643e7fa0b910138d469bfd080c819250a310eda
-
Filesize
6KB
MD5d630c4c67f98e6fb6de7140815ee6a8e
SHA125ab1fedc3a12348f731582e584657b963965eef
SHA256d41130d893afe6c83ecdcc3d0656bdf2f0279602a6f4f6c9dd5648f01b1af519
SHA512ea55f6bb800c3c9aa41b6eabf013d280d2f951796f6881290b628863c40ec44a8509325c00d4587d5d5f5e31441b007409861a43f2e36c417655771987153667
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD52cd5a1d56c7a68cc961f3c902baebf3a
SHA1b662cc797d9de34573cc740da2b34a7cbf19ab13
SHA256d7c144063f3bea9e83fe5dcdcc0f077a3dce8ebb87bdd294edd54f6680d82602
SHA5121bc9f466677b037b08c23ffce0f8d9a6e9e977f99d88eee86842d1a30ae361452bfaf0046623d3bd5c09dc0025232da12b9142c9ce760ec0e53599d200c86c42