Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29/08/2024, 17:53
Static task
static1
Behavioral task
behavioral1
Sample
c952520ba3592182639da502e72376a6_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c952520ba3592182639da502e72376a6_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c952520ba3592182639da502e72376a6_JaffaCakes118.html
-
Size
72KB
-
MD5
c952520ba3592182639da502e72376a6
-
SHA1
86c0752ae50d261c3636316f6277789c408bc778
-
SHA256
cafcb944ff9a90a923d672aaebb83b6d54606ac69eb0e9626f397cd31f30a127
-
SHA512
fc49a9df4063e1b53bee0e3e859b8a5393b250754de78a15ffc2c0209c3c687c3def831691f6ea33d89b173db6f0368b418d345a7ce32ce04c8447ee4228c205
-
SSDEEP
1536:MTupBBireEliB9AMgZaT1L65T8b/5sI1tk50:dpBBi3sB9l8Q1LR5sIzk50
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1648 msedge.exe 1648 msedge.exe 2784 msedge.exe 2784 msedge.exe 2824 identity_helper.exe 2824 identity_helper.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2784 wrote to memory of 4656 2784 msedge.exe 87 PID 2784 wrote to memory of 4656 2784 msedge.exe 87 PID 2784 wrote to memory of 444 2784 msedge.exe 88 PID 2784 wrote to memory of 444 2784 msedge.exe 88 PID 2784 wrote to memory of 444 2784 msedge.exe 88 PID 2784 wrote to memory of 444 2784 msedge.exe 88 PID 2784 wrote to memory of 444 2784 msedge.exe 88 PID 2784 wrote to memory of 444 2784 msedge.exe 88 PID 2784 wrote to memory of 444 2784 msedge.exe 88 PID 2784 wrote to memory of 444 2784 msedge.exe 88 PID 2784 wrote to memory of 444 2784 msedge.exe 88 PID 2784 wrote to memory of 444 2784 msedge.exe 88 PID 2784 wrote to memory of 444 2784 msedge.exe 88 PID 2784 wrote to memory of 444 2784 msedge.exe 88 PID 2784 wrote to memory of 444 2784 msedge.exe 88 PID 2784 wrote to memory of 444 2784 msedge.exe 88 PID 2784 wrote to memory of 444 2784 msedge.exe 88 PID 2784 wrote to memory of 444 2784 msedge.exe 88 PID 2784 wrote to memory of 444 2784 msedge.exe 88 PID 2784 wrote to memory of 444 2784 msedge.exe 88 PID 2784 wrote to memory of 444 2784 msedge.exe 88 PID 2784 wrote to memory of 444 2784 msedge.exe 88 PID 2784 wrote to memory of 444 2784 msedge.exe 88 PID 2784 wrote to memory of 444 2784 msedge.exe 88 PID 2784 wrote to memory of 444 2784 msedge.exe 88 PID 2784 wrote to memory of 444 2784 msedge.exe 88 PID 2784 wrote to memory of 444 2784 msedge.exe 88 PID 2784 wrote to memory of 444 2784 msedge.exe 88 PID 2784 wrote to memory of 444 2784 msedge.exe 88 PID 2784 wrote to memory of 444 2784 msedge.exe 88 PID 2784 wrote to memory of 444 2784 msedge.exe 88 PID 2784 wrote to memory of 444 2784 msedge.exe 88 PID 2784 wrote to memory of 444 2784 msedge.exe 88 PID 2784 wrote to memory of 444 2784 msedge.exe 88 PID 2784 wrote to memory of 444 2784 msedge.exe 88 PID 2784 wrote to memory of 444 2784 msedge.exe 88 PID 2784 wrote to memory of 444 2784 msedge.exe 88 PID 2784 wrote to memory of 444 2784 msedge.exe 88 PID 2784 wrote to memory of 444 2784 msedge.exe 88 PID 2784 wrote to memory of 444 2784 msedge.exe 88 PID 2784 wrote to memory of 444 2784 msedge.exe 88 PID 2784 wrote to memory of 444 2784 msedge.exe 88 PID 2784 wrote to memory of 1648 2784 msedge.exe 89 PID 2784 wrote to memory of 1648 2784 msedge.exe 89 PID 2784 wrote to memory of 4148 2784 msedge.exe 90 PID 2784 wrote to memory of 4148 2784 msedge.exe 90 PID 2784 wrote to memory of 4148 2784 msedge.exe 90 PID 2784 wrote to memory of 4148 2784 msedge.exe 90 PID 2784 wrote to memory of 4148 2784 msedge.exe 90 PID 2784 wrote to memory of 4148 2784 msedge.exe 90 PID 2784 wrote to memory of 4148 2784 msedge.exe 90 PID 2784 wrote to memory of 4148 2784 msedge.exe 90 PID 2784 wrote to memory of 4148 2784 msedge.exe 90 PID 2784 wrote to memory of 4148 2784 msedge.exe 90 PID 2784 wrote to memory of 4148 2784 msedge.exe 90 PID 2784 wrote to memory of 4148 2784 msedge.exe 90 PID 2784 wrote to memory of 4148 2784 msedge.exe 90 PID 2784 wrote to memory of 4148 2784 msedge.exe 90 PID 2784 wrote to memory of 4148 2784 msedge.exe 90 PID 2784 wrote to memory of 4148 2784 msedge.exe 90 PID 2784 wrote to memory of 4148 2784 msedge.exe 90 PID 2784 wrote to memory of 4148 2784 msedge.exe 90 PID 2784 wrote to memory of 4148 2784 msedge.exe 90 PID 2784 wrote to memory of 4148 2784 msedge.exe 90
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\c952520ba3592182639da502e72376a6_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcff3546f8,0x7ffcff354708,0x7ffcff3547182⤵PID:4656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2204,5390185638667070554,14215169388606486707,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2212 /prefetch:22⤵PID:444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2204,5390185638667070554,14215169388606486707,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2264 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2204,5390185638667070554,14215169388606486707,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2792 /prefetch:82⤵PID:4148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,5390185638667070554,14215169388606486707,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:4448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,5390185638667070554,14215169388606486707,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:4552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,5390185638667070554,14215169388606486707,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4656 /prefetch:12⤵PID:3664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,5390185638667070554,14215169388606486707,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4704 /prefetch:12⤵PID:4548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2204,5390185638667070554,14215169388606486707,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5980 /prefetch:82⤵PID:2424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2204,5390185638667070554,14215169388606486707,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5980 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,5390185638667070554,14215169388606486707,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5848 /prefetch:12⤵PID:1504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,5390185638667070554,14215169388606486707,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5812 /prefetch:12⤵PID:1044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,5390185638667070554,14215169388606486707,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4120 /prefetch:12⤵PID:880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,5390185638667070554,14215169388606486707,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6108 /prefetch:12⤵PID:116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2204,5390185638667070554,14215169388606486707,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3992 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4488
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2996
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2240
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59e3fc58a8fb86c93d19e1500b873ef6f
SHA1c6aae5f4e26f5570db5e14bba8d5061867a33b56
SHA256828f4eacac1c40b790fd70dbb6fa6ba03dcc681171d9b2a6579626d27837b1c4
SHA512e5e245b56fa82075e060f468a3224cf2ef43f1b6d87f0351a2102d85c7c897e559be4caeaecfdc4059af29fdc674681b61229319dda95cb2ee649b2eb98d313e
-
Filesize
152B
MD527304926d60324abe74d7a4b571c35ea
SHA178b8f92fcaf4a09eaa786bbe33fd1b0222ef29c1
SHA2567039ad5c2b40f4d97c8c2269f4942be13436d739b2e1f8feb7a0c9f9fdb931de
SHA512f5b6181d3f432238c7365f64fc8a373299e23ba8178bcc419471916ef8b23e909787c7c0617ab22e4eb90909c02bd7b84f1386fbc61e2bdb5a0eb474175da4bd
-
Filesize
23KB
MD533a83c16527e4531fbfca2631f653674
SHA187a63514c262ba4bffc52d2ceebb3ca14353507a
SHA2561156bb50a264543f6a9dc8922dd2c65d444c8bb11b3b18be95d5adff840b33b4
SHA512f1dba28d0f81aa0894436ae7b4ba76a2e635f002f666d17d31b8b21500dc2321d7862ca8dcfd22e44aab4d1f33112c076dc95191c889546a40f9c6197cccbda3
-
Filesize
45KB
MD5aa6a698d1c7fc6d35265b10af5570e9c
SHA100da372ad4964a5d5b8afff7fe1b207ff284f232
SHA25602f6ae7bda59fb1a20d3386021fb972ced348bf724fea42157225d416f9f049a
SHA512f5b2f732e899cc0fed577e1ef1c51c154ede5d206543e8ac7c1fabb182901f8e93e137b63f12cbb87b3f570a283a368bfb1b9d637cc5b1c4f1669ff5cfbf306b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD5cb566fd6b541b4310ce08e06824677a0
SHA1812d51f22986289c720aee497f90b894865a9c45
SHA2568731d5a22efdc6698e4e7b52528b742768c140026a16caf36e6ea18df7fbf503
SHA5125f75556c9560be9d4ef7d6c735a431e4f905fb871321c0ae2958b68249d4b5d3a5ac1033781d417610d5fef20998f63f3d3fb22678164b6cc816920a1f3b447f
-
Filesize
3KB
MD50b937aa681e80e3db99b3b77c4f2be86
SHA113e799b2daadb5e696980027e904d04ef79e95c1
SHA2566c5c5fa1e0e06843acd653b999eb1f98820e2ad4b31695bc48a8d104e6de55c1
SHA512417cd6fd91a0fcc7ec627b710c579b76ee8f5b96d27b3c694afba1410af3143d7b779dcf5bfba2f8ce254c4d1bfb5899e066d726be200e289b86b7bc0f915435
-
Filesize
6KB
MD57e73ba0e31958501ca8d502fecaf7fc9
SHA188a48c1e836848288bbca40cc7001c3f4893111f
SHA256c01445a165232cdc2f3a7cbfc18f600c12920cc87fe3dbd0cedfd844848a8417
SHA5129202f7d82d08cbd34677689aa29989a563bd9fbcc020f2d66ea784e6de7bf1e7ce333fb70f0ad6d4d6a25035aa1477c5168de5142d0a708db0c54b056780b842
-
Filesize
7KB
MD5543278f6179dfff87be1ba4ff8626f05
SHA1457722889f8fb38a0471f2fb319776da582aadfe
SHA256fbb1484854adb661fc7ca833dd092bfd7f6bced0202cdff17ce21dd7360bd93b
SHA5122fe96f1b909d0c6781295301e4f897922b6aa080e3d9b6c6b5537f88f3e3e64a6dc6bf8bcef20727f8ccac46401154bf50d0f8e67426c026951d0c0bce8b1a6e
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD56fc82dfdbfece5527ece1a28c731b346
SHA1e6329916c7d90cbdc03883aefff39c2f8b045cfd
SHA2568edc3996a56db3d6f84b9eca78a68524a2a8926b9cfa08da7b6300365446ba6f
SHA512179f34430eb1af1e61228c8320263383ad6d75635eed91fc1ed173cef6ee85aa92e9131848b8ecdca19e15649a430daee07ee4910fa2d3b047c365b016d6b264