Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29-08-2024 17:45
Static task
static1
Behavioral task
behavioral1
Sample
c94e9fa78bbeb7b9f9291bc0b032a693_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c94e9fa78bbeb7b9f9291bc0b032a693_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c94e9fa78bbeb7b9f9291bc0b032a693_JaffaCakes118.html
-
Size
35KB
-
MD5
c94e9fa78bbeb7b9f9291bc0b032a693
-
SHA1
341d43f04e5d19981d5eb35690de601d593b6841
-
SHA256
57690dff01a7852769361a576221ee6185fb63b69daf99ec2433f085ec49c6c7
-
SHA512
bf58821cc070f063146c654927ab8478215e3fa3d71b9795d17aa2f65730621d88182862a77b5f5c006eda10dfe4dfb08f71c2fd321dc2643c62b766859e45cb
-
SSDEEP
384:5q5+sox43XEXTkcluZf9o7Lq5WDpo72nbhevjBZDxX3L53jqQ2gdllDIaDzbWTwA:5kclux9o7Lq5wpK2nULB3Rp2g2ibBS
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1668 msedge.exe 1668 msedge.exe 3444 msedge.exe 3444 msedge.exe 3524 identity_helper.exe 3524 identity_helper.exe 5096 msedge.exe 5096 msedge.exe 5096 msedge.exe 5096 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3444 wrote to memory of 1984 3444 msedge.exe 84 PID 3444 wrote to memory of 1984 3444 msedge.exe 84 PID 3444 wrote to memory of 4576 3444 msedge.exe 85 PID 3444 wrote to memory of 4576 3444 msedge.exe 85 PID 3444 wrote to memory of 4576 3444 msedge.exe 85 PID 3444 wrote to memory of 4576 3444 msedge.exe 85 PID 3444 wrote to memory of 4576 3444 msedge.exe 85 PID 3444 wrote to memory of 4576 3444 msedge.exe 85 PID 3444 wrote to memory of 4576 3444 msedge.exe 85 PID 3444 wrote to memory of 4576 3444 msedge.exe 85 PID 3444 wrote to memory of 4576 3444 msedge.exe 85 PID 3444 wrote to memory of 4576 3444 msedge.exe 85 PID 3444 wrote to memory of 4576 3444 msedge.exe 85 PID 3444 wrote to memory of 4576 3444 msedge.exe 85 PID 3444 wrote to memory of 4576 3444 msedge.exe 85 PID 3444 wrote to memory of 4576 3444 msedge.exe 85 PID 3444 wrote to memory of 4576 3444 msedge.exe 85 PID 3444 wrote to memory of 4576 3444 msedge.exe 85 PID 3444 wrote to memory of 4576 3444 msedge.exe 85 PID 3444 wrote to memory of 4576 3444 msedge.exe 85 PID 3444 wrote to memory of 4576 3444 msedge.exe 85 PID 3444 wrote to memory of 4576 3444 msedge.exe 85 PID 3444 wrote to memory of 4576 3444 msedge.exe 85 PID 3444 wrote to memory of 4576 3444 msedge.exe 85 PID 3444 wrote to memory of 4576 3444 msedge.exe 85 PID 3444 wrote to memory of 4576 3444 msedge.exe 85 PID 3444 wrote to memory of 4576 3444 msedge.exe 85 PID 3444 wrote to memory of 4576 3444 msedge.exe 85 PID 3444 wrote to memory of 4576 3444 msedge.exe 85 PID 3444 wrote to memory of 4576 3444 msedge.exe 85 PID 3444 wrote to memory of 4576 3444 msedge.exe 85 PID 3444 wrote to memory of 4576 3444 msedge.exe 85 PID 3444 wrote to memory of 4576 3444 msedge.exe 85 PID 3444 wrote to memory of 4576 3444 msedge.exe 85 PID 3444 wrote to memory of 4576 3444 msedge.exe 85 PID 3444 wrote to memory of 4576 3444 msedge.exe 85 PID 3444 wrote to memory of 4576 3444 msedge.exe 85 PID 3444 wrote to memory of 4576 3444 msedge.exe 85 PID 3444 wrote to memory of 4576 3444 msedge.exe 85 PID 3444 wrote to memory of 4576 3444 msedge.exe 85 PID 3444 wrote to memory of 4576 3444 msedge.exe 85 PID 3444 wrote to memory of 4576 3444 msedge.exe 85 PID 3444 wrote to memory of 1668 3444 msedge.exe 86 PID 3444 wrote to memory of 1668 3444 msedge.exe 86 PID 3444 wrote to memory of 1672 3444 msedge.exe 87 PID 3444 wrote to memory of 1672 3444 msedge.exe 87 PID 3444 wrote to memory of 1672 3444 msedge.exe 87 PID 3444 wrote to memory of 1672 3444 msedge.exe 87 PID 3444 wrote to memory of 1672 3444 msedge.exe 87 PID 3444 wrote to memory of 1672 3444 msedge.exe 87 PID 3444 wrote to memory of 1672 3444 msedge.exe 87 PID 3444 wrote to memory of 1672 3444 msedge.exe 87 PID 3444 wrote to memory of 1672 3444 msedge.exe 87 PID 3444 wrote to memory of 1672 3444 msedge.exe 87 PID 3444 wrote to memory of 1672 3444 msedge.exe 87 PID 3444 wrote to memory of 1672 3444 msedge.exe 87 PID 3444 wrote to memory of 1672 3444 msedge.exe 87 PID 3444 wrote to memory of 1672 3444 msedge.exe 87 PID 3444 wrote to memory of 1672 3444 msedge.exe 87 PID 3444 wrote to memory of 1672 3444 msedge.exe 87 PID 3444 wrote to memory of 1672 3444 msedge.exe 87 PID 3444 wrote to memory of 1672 3444 msedge.exe 87 PID 3444 wrote to memory of 1672 3444 msedge.exe 87 PID 3444 wrote to memory of 1672 3444 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\c94e9fa78bbeb7b9f9291bc0b032a693_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3444 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe72da46f8,0x7ffe72da4708,0x7ffe72da47182⤵PID:1984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,11883877238078878205,8996169497310013798,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:22⤵PID:4576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2056,11883877238078878205,8996169497310013798,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2236 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2056,11883877238078878205,8996169497310013798,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2920 /prefetch:82⤵PID:1672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,11883877238078878205,8996169497310013798,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:12⤵PID:3028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,11883877238078878205,8996169497310013798,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3460 /prefetch:12⤵PID:3064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,11883877238078878205,8996169497310013798,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4788 /prefetch:12⤵PID:5108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,11883877238078878205,8996169497310013798,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4948 /prefetch:12⤵PID:1296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,11883877238078878205,8996169497310013798,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5336 /prefetch:12⤵PID:3044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,11883877238078878205,8996169497310013798,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3104 /prefetch:82⤵PID:3456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,11883877238078878205,8996169497310013798,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3104 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,11883877238078878205,8996169497310013798,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5648 /prefetch:12⤵PID:3508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,11883877238078878205,8996169497310013798,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5668 /prefetch:12⤵PID:4536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,11883877238078878205,8996169497310013798,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4024 /prefetch:12⤵PID:3148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,11883877238078878205,8996169497310013798,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5400 /prefetch:12⤵PID:2816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,11883877238078878205,8996169497310013798,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5532 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5096
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3304
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4192
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e4f80e7950cbd3bb11257d2000cb885e
SHA110ac643904d539042d8f7aa4a312b13ec2106035
SHA2561184ee8d32d0edecddd93403fb888fad6b3e2a710d37335c3989cc529bc08124
SHA5122b92c9807fdcd937e514d4e7e1cc7c2d3e3aa162099b7289ceac2feea72d1a4afbadf1c09b3075d470efadf9a9edd63e07ea7e7a98d22243e45b3d53473fa4f0
-
Filesize
152B
MD52dc1a9f2f3f8c3cfe51bb29b078166c5
SHA1eaf3c3dad3c8dc6f18dc3e055b415da78b704402
SHA256dcb76fa365c2d9ee213b224a91cdd806d30b1e8652d72a22f2371124fa4479fa
SHA512682061d9cc86a6e5d99d022da776fb554350fc95efbf29cd84c1db4e2b7161b76cd1de48335bcc3a25633079fb0bd412e4f4795ed6291c65e9bc28d95330bb25
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD5809654f3ee809fbb68489b66c43a044a
SHA1b972e652ea0249285464d7c228ea734bff753c5a
SHA256514a5665431c566640213f97f71a23826008a958416f7585760e830abbd2eee5
SHA51237e409c50c2f4af986241316f7b7454098f5d92ab372100c789f502695148ea10b59c6b5951b39e2e7c82bdf786f7d8db9fad8c3e31174ac538f86daa00cb86f
-
Filesize
895B
MD52ec1852f89a1e3d932f3a95439224271
SHA15ad280a87500ddb82157c9f53a5a4c0d2d0f562e
SHA256340d3561d66ccb85c4138493cc977de5f8c2d01e8abc4eaf15f1e142ce467754
SHA512aeda0a1300b9926de8ea01df15727b88481c26fe2a827871bd2d131882bb4906e1fd2a541d2f3b805e80af07ae7c06093ac8d37d5329ae84e6a87c558c86f770
-
Filesize
5KB
MD5ede2daa4a39009d876bbb5393c598507
SHA184dd35369a0e562748ef4499d8e08b19622ae3d5
SHA25614c23dd0c5f9cb8fc2dca451ed609a59d16181a67e4dc57a4d5ef3d4ee6a701c
SHA512f1806563fb93675362118fc3e9feaef23e12d159fca5ae9ac5d227a0cdd6c00eee8eab2cc355f52889d7f28c4ba4985b95c2d638626161d0531c240a3a323d39
-
Filesize
6KB
MD5f893caf934429c61920431ca84aa5c36
SHA1b9a6f2f905fc0dde4383b554dacd4f3911eb0092
SHA25606cc2f7c834d0cdc532178c672962617aab1e19daedd0a56c8cb98d914616cdb
SHA5123506f899c07a3dcd9cb46323082149726e821a601217b7c46e5047a603255ad14c30a66f994664809d15e51b9b22537fdf69db7596ff61a1bf2be53cbbf38c39
-
Filesize
6KB
MD5745359187c84fc3aca7e9a9dd949ad57
SHA18203355dc15c301580f83d5aec13c805ed741a06
SHA2561fba0a2cdeda0f2123414ccbfc946c12fefe4721cfff279759a84986c6879e20
SHA51287cfdee812f0545e8549dbf564659405eeacb23a7e952e5d8741e3588e54e84bf4d45ba9e38bd3c04d6273ab82063c281ebd35afbda9f3830c0a49d57981b2c8
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD53868a0dd4be6542d38ede862dac2a445
SHA181517b6475de77de70f9635043a8d309dccaed88
SHA256aebc420a81d90529d1608736e18f2abbb1fb7f4981c0753056c0f8e7eaac837d
SHA5125ad4efcb8f48efbdc25df674d3d49f6ac2ef29c5bd1443d919fc0b7f87cbb1fa20a1d600f1a4f5916e319d76e0f7e5044b25a6fe6ea4501a793c1268baba532a