Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29/08/2024, 19:30
Static task
static1
Behavioral task
behavioral1
Sample
c97bc6023a68903659417f2d488e33d7_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c97bc6023a68903659417f2d488e33d7_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c97bc6023a68903659417f2d488e33d7_JaffaCakes118.html
-
Size
19KB
-
MD5
c97bc6023a68903659417f2d488e33d7
-
SHA1
4b022e4827825888a69ebe2428dea28bf54b04d8
-
SHA256
04246f646fe12d6fc2a05bf5e4a00b9681de19eb725c158873882b1e40cdb366
-
SHA512
b013e104e53dfe059333dae7f82d61b9a948f613dd40a2074ff7d5c0a178fcc361ea3a6030d9c53691e64aa90d7fb7425665a9b637192039476917c815037cb9
-
SSDEEP
384:zijZKhgES2BVBD8cOQ3RFRmGqTemLxXucfIk99heVrzVc9H3Y:zij6S2BgcB34GjmQOIk9SVnqH3Y
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2376 msedge.exe 2376 msedge.exe 2840 msedge.exe 2840 msedge.exe 864 identity_helper.exe 864 identity_helper.exe 1304 msedge.exe 1304 msedge.exe 1304 msedge.exe 1304 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2840 wrote to memory of 4944 2840 msedge.exe 84 PID 2840 wrote to memory of 4944 2840 msedge.exe 84 PID 2840 wrote to memory of 4860 2840 msedge.exe 85 PID 2840 wrote to memory of 4860 2840 msedge.exe 85 PID 2840 wrote to memory of 4860 2840 msedge.exe 85 PID 2840 wrote to memory of 4860 2840 msedge.exe 85 PID 2840 wrote to memory of 4860 2840 msedge.exe 85 PID 2840 wrote to memory of 4860 2840 msedge.exe 85 PID 2840 wrote to memory of 4860 2840 msedge.exe 85 PID 2840 wrote to memory of 4860 2840 msedge.exe 85 PID 2840 wrote to memory of 4860 2840 msedge.exe 85 PID 2840 wrote to memory of 4860 2840 msedge.exe 85 PID 2840 wrote to memory of 4860 2840 msedge.exe 85 PID 2840 wrote to memory of 4860 2840 msedge.exe 85 PID 2840 wrote to memory of 4860 2840 msedge.exe 85 PID 2840 wrote to memory of 4860 2840 msedge.exe 85 PID 2840 wrote to memory of 4860 2840 msedge.exe 85 PID 2840 wrote to memory of 4860 2840 msedge.exe 85 PID 2840 wrote to memory of 4860 2840 msedge.exe 85 PID 2840 wrote to memory of 4860 2840 msedge.exe 85 PID 2840 wrote to memory of 4860 2840 msedge.exe 85 PID 2840 wrote to memory of 4860 2840 msedge.exe 85 PID 2840 wrote to memory of 4860 2840 msedge.exe 85 PID 2840 wrote to memory of 4860 2840 msedge.exe 85 PID 2840 wrote to memory of 4860 2840 msedge.exe 85 PID 2840 wrote to memory of 4860 2840 msedge.exe 85 PID 2840 wrote to memory of 4860 2840 msedge.exe 85 PID 2840 wrote to memory of 4860 2840 msedge.exe 85 PID 2840 wrote to memory of 4860 2840 msedge.exe 85 PID 2840 wrote to memory of 4860 2840 msedge.exe 85 PID 2840 wrote to memory of 4860 2840 msedge.exe 85 PID 2840 wrote to memory of 4860 2840 msedge.exe 85 PID 2840 wrote to memory of 4860 2840 msedge.exe 85 PID 2840 wrote to memory of 4860 2840 msedge.exe 85 PID 2840 wrote to memory of 4860 2840 msedge.exe 85 PID 2840 wrote to memory of 4860 2840 msedge.exe 85 PID 2840 wrote to memory of 4860 2840 msedge.exe 85 PID 2840 wrote to memory of 4860 2840 msedge.exe 85 PID 2840 wrote to memory of 4860 2840 msedge.exe 85 PID 2840 wrote to memory of 4860 2840 msedge.exe 85 PID 2840 wrote to memory of 4860 2840 msedge.exe 85 PID 2840 wrote to memory of 4860 2840 msedge.exe 85 PID 2840 wrote to memory of 2376 2840 msedge.exe 86 PID 2840 wrote to memory of 2376 2840 msedge.exe 86 PID 2840 wrote to memory of 4416 2840 msedge.exe 87 PID 2840 wrote to memory of 4416 2840 msedge.exe 87 PID 2840 wrote to memory of 4416 2840 msedge.exe 87 PID 2840 wrote to memory of 4416 2840 msedge.exe 87 PID 2840 wrote to memory of 4416 2840 msedge.exe 87 PID 2840 wrote to memory of 4416 2840 msedge.exe 87 PID 2840 wrote to memory of 4416 2840 msedge.exe 87 PID 2840 wrote to memory of 4416 2840 msedge.exe 87 PID 2840 wrote to memory of 4416 2840 msedge.exe 87 PID 2840 wrote to memory of 4416 2840 msedge.exe 87 PID 2840 wrote to memory of 4416 2840 msedge.exe 87 PID 2840 wrote to memory of 4416 2840 msedge.exe 87 PID 2840 wrote to memory of 4416 2840 msedge.exe 87 PID 2840 wrote to memory of 4416 2840 msedge.exe 87 PID 2840 wrote to memory of 4416 2840 msedge.exe 87 PID 2840 wrote to memory of 4416 2840 msedge.exe 87 PID 2840 wrote to memory of 4416 2840 msedge.exe 87 PID 2840 wrote to memory of 4416 2840 msedge.exe 87 PID 2840 wrote to memory of 4416 2840 msedge.exe 87 PID 2840 wrote to memory of 4416 2840 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\c97bc6023a68903659417f2d488e33d7_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8ef2a46f8,0x7ff8ef2a4708,0x7ff8ef2a47182⤵PID:4944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2208,18241190119143840707,3583239520812036080,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2224 /prefetch:22⤵PID:4860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2208,18241190119143840707,3583239520812036080,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2280 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2208,18241190119143840707,3583239520812036080,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2740 /prefetch:82⤵PID:4416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,18241190119143840707,3583239520812036080,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:4888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,18241190119143840707,3583239520812036080,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:4232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,18241190119143840707,3583239520812036080,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4844 /prefetch:12⤵PID:3152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,18241190119143840707,3583239520812036080,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4116 /prefetch:12⤵PID:748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2208,18241190119143840707,3583239520812036080,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5436 /prefetch:82⤵PID:3844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2208,18241190119143840707,3583239520812036080,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5436 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,18241190119143840707,3583239520812036080,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5496 /prefetch:12⤵PID:3648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,18241190119143840707,3583239520812036080,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5512 /prefetch:12⤵PID:1680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,18241190119143840707,3583239520812036080,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5832 /prefetch:12⤵PID:1528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,18241190119143840707,3583239520812036080,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5828 /prefetch:12⤵PID:2224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2208,18241190119143840707,3583239520812036080,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1296 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1304
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4464
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4116
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ecf7ca53c80b5245e35839009d12f866
SHA1a7af77cf31d410708ebd35a232a80bddfb0615bb
SHA256882a513b71b26210ff251769b82b2c5d59a932f96d9ce606ca2fab6530a13687
SHA512706722bd22ce27d854036b1b16e6a3cdb36284b66edc76238a79c2e11cee7d1307b121c898ad832eb1af73e4f08d991d64dc0bff529896ffb4ebe9b3dc381696
-
Filesize
152B
MD54dd2754d1bea40445984d65abee82b21
SHA14b6a5658bae9a784a370a115fbb4a12e92bd3390
SHA256183b8e82a0deaa83d04736553671cedb738adc909f483b3c5f822a0e6be7477d
SHA51292d44ee372ad33f892b921efa6cabc78e91025e89f05a22830763217826fa98d51d55711f85c8970ac58abf9adc6c85cc40878032cd6d2589ab226cd099f99e1
-
Filesize
211KB
MD5e7226392c938e4e604d2175eb9f43ca1
SHA12098293f39aa0bcdd62e718f9212d9062fa283ab
SHA256d46ec08b6c29c4ca56cecbf73149cc66ebd902197590fe28cd65dad52a08c4e1
SHA51263a4b99101c790d40a813db9e0d5fde21a64ccaf60a6009ead027920dbbdb52cc262af829e5c4140f3702a559c7ac46efa89622d76d45b4b49a9ce01625ef145
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD5efca6b3ba1906eef2f675390d1f029af
SHA167f93ccaf726a9081f5d13dd439744a67a0ec095
SHA256332cb79119fade2f15fe25d9736fb77caaf9239954fc0cc3a03134bb5d567205
SHA51226ac91db8822ce100c1e4e759e260ad99b4806e5e9c236ff0f9d5804810ea636d6894c15a549c2413c90d171ac05885724c841d9360fa68652c197b21f043da8
-
Filesize
1015B
MD527b0f2484a49fbfd23f1c394552b2ff5
SHA1b609ceea20eb50f94cab6feb07171cbf0d0271f3
SHA25621ac5373ff16225b5f6f19e2949c4ad6b2c103273ffeee3ac16c296bb5fe4c56
SHA512134c1f4df31e5bd74efc20ff869bc9143b0e88742b044c5fc4deb233584605f0f12c32755b2dfd8adc7526c312eddef7ab6cd345d5397c1f0c719911f7e22cc8
-
Filesize
5KB
MD54a9aca8b17be73ee91ca54b512f017b6
SHA1681c31d37e2cc04a25e17c798c528486d85a6490
SHA256ae39029f807d1a50dcea2891dcdbcd255eee00f3b6dfb793a85201289693bf59
SHA51243919e49b1775a04232575861c88b7f1a0dfedeae6901394ed9a12aea3c33a8d4df1a9a1454b9d6e7235b2301f7618d1a8a864b055aeb07c243e2686b532a851
-
Filesize
6KB
MD5eef79f2987dfd159c736f36bc4ccdbf6
SHA1c5e1ccf07fe8438fd5749ac85ce0de66d7a34d79
SHA2562091a6f36f7e0fb02e30b47bfd0905492dca7702bb8db74fca796b267a4ff065
SHA512e05c514159c3c0008d348b33a03643780e88909fd33f8089c7c5ba0389b341da29ff8d5832306e7729c8d430a06166cc68fe60a1ffa37468e2dc1267707171cc
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD559c6ef3f411b9aa33c7b2df12f526e52
SHA1df0f4440287dd880f6e5b47c4d10be34170fb7f2
SHA2566271b4b8b7a849c85d79d38521b8898611b49948f9564a486c0059076dd5edf5
SHA512907447b3dae55170c126e883989442766b40771bcabf997349923cf8684e0d2cb5abe12ad861d9f9cd661e1dc793a7c9e97bcdcd4d73a839cabf8aabb07a4c4d