Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06/09/2024, 20:05
Static task
static1
Behavioral task
behavioral1
Sample
d05c17b645cad9811072cf50331de4b5_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d05c17b645cad9811072cf50331de4b5_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d05c17b645cad9811072cf50331de4b5_JaffaCakes118.html
-
Size
55KB
-
MD5
d05c17b645cad9811072cf50331de4b5
-
SHA1
8943eb093490ee1c95dc79b4119a9f7cc4a280d5
-
SHA256
47592285028e0307e31326347d72d3370a1345437664eab5319bb2421b932c6a
-
SHA512
a8c17335b359f2e621674a24155d3ca22f82a42b2471382bcfb04a01ec69bdb33775c8018f7f2436910c566fcd84aaed600a91ed2c553997c1087874338b86ff
-
SSDEEP
768:wLYvpHvvCIooxtSbuKGxDpzVA5iUtHIuxAyXhWBwCQvwWA9MEq+/DllLN4tgVZy:wOHv7oeUbeZatxTXhWBwCQvwWCxDll8
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3276 msedge.exe 3276 msedge.exe 212 msedge.exe 212 msedge.exe 3912 identity_helper.exe 3912 identity_helper.exe 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe 2968 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 212 wrote to memory of 4668 212 msedge.exe 84 PID 212 wrote to memory of 4668 212 msedge.exe 84 PID 212 wrote to memory of 2260 212 msedge.exe 85 PID 212 wrote to memory of 2260 212 msedge.exe 85 PID 212 wrote to memory of 2260 212 msedge.exe 85 PID 212 wrote to memory of 2260 212 msedge.exe 85 PID 212 wrote to memory of 2260 212 msedge.exe 85 PID 212 wrote to memory of 2260 212 msedge.exe 85 PID 212 wrote to memory of 2260 212 msedge.exe 85 PID 212 wrote to memory of 2260 212 msedge.exe 85 PID 212 wrote to memory of 2260 212 msedge.exe 85 PID 212 wrote to memory of 2260 212 msedge.exe 85 PID 212 wrote to memory of 2260 212 msedge.exe 85 PID 212 wrote to memory of 2260 212 msedge.exe 85 PID 212 wrote to memory of 2260 212 msedge.exe 85 PID 212 wrote to memory of 2260 212 msedge.exe 85 PID 212 wrote to memory of 2260 212 msedge.exe 85 PID 212 wrote to memory of 2260 212 msedge.exe 85 PID 212 wrote to memory of 2260 212 msedge.exe 85 PID 212 wrote to memory of 2260 212 msedge.exe 85 PID 212 wrote to memory of 2260 212 msedge.exe 85 PID 212 wrote to memory of 2260 212 msedge.exe 85 PID 212 wrote to memory of 2260 212 msedge.exe 85 PID 212 wrote to memory of 2260 212 msedge.exe 85 PID 212 wrote to memory of 2260 212 msedge.exe 85 PID 212 wrote to memory of 2260 212 msedge.exe 85 PID 212 wrote to memory of 2260 212 msedge.exe 85 PID 212 wrote to memory of 2260 212 msedge.exe 85 PID 212 wrote to memory of 2260 212 msedge.exe 85 PID 212 wrote to memory of 2260 212 msedge.exe 85 PID 212 wrote to memory of 2260 212 msedge.exe 85 PID 212 wrote to memory of 2260 212 msedge.exe 85 PID 212 wrote to memory of 2260 212 msedge.exe 85 PID 212 wrote to memory of 2260 212 msedge.exe 85 PID 212 wrote to memory of 2260 212 msedge.exe 85 PID 212 wrote to memory of 2260 212 msedge.exe 85 PID 212 wrote to memory of 2260 212 msedge.exe 85 PID 212 wrote to memory of 2260 212 msedge.exe 85 PID 212 wrote to memory of 2260 212 msedge.exe 85 PID 212 wrote to memory of 2260 212 msedge.exe 85 PID 212 wrote to memory of 2260 212 msedge.exe 85 PID 212 wrote to memory of 2260 212 msedge.exe 85 PID 212 wrote to memory of 3276 212 msedge.exe 86 PID 212 wrote to memory of 3276 212 msedge.exe 86 PID 212 wrote to memory of 832 212 msedge.exe 87 PID 212 wrote to memory of 832 212 msedge.exe 87 PID 212 wrote to memory of 832 212 msedge.exe 87 PID 212 wrote to memory of 832 212 msedge.exe 87 PID 212 wrote to memory of 832 212 msedge.exe 87 PID 212 wrote to memory of 832 212 msedge.exe 87 PID 212 wrote to memory of 832 212 msedge.exe 87 PID 212 wrote to memory of 832 212 msedge.exe 87 PID 212 wrote to memory of 832 212 msedge.exe 87 PID 212 wrote to memory of 832 212 msedge.exe 87 PID 212 wrote to memory of 832 212 msedge.exe 87 PID 212 wrote to memory of 832 212 msedge.exe 87 PID 212 wrote to memory of 832 212 msedge.exe 87 PID 212 wrote to memory of 832 212 msedge.exe 87 PID 212 wrote to memory of 832 212 msedge.exe 87 PID 212 wrote to memory of 832 212 msedge.exe 87 PID 212 wrote to memory of 832 212 msedge.exe 87 PID 212 wrote to memory of 832 212 msedge.exe 87 PID 212 wrote to memory of 832 212 msedge.exe 87 PID 212 wrote to memory of 832 212 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\d05c17b645cad9811072cf50331de4b5_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:212 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9b75546f8,0x7ff9b7554708,0x7ff9b75547182⤵PID:4668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1952,8583290184549281818,8679485003705798437,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1956 /prefetch:22⤵PID:2260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1952,8583290184549281818,8679485003705798437,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2184 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1952,8583290184549281818,8679485003705798437,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2776 /prefetch:82⤵PID:832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1952,8583290184549281818,8679485003705798437,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:4956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1952,8583290184549281818,8679485003705798437,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:1996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1952,8583290184549281818,8679485003705798437,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4180 /prefetch:12⤵PID:1476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1952,8583290184549281818,8679485003705798437,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1364 /prefetch:82⤵PID:3900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1952,8583290184549281818,8679485003705798437,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1364 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1952,8583290184549281818,8679485003705798437,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5788 /prefetch:12⤵PID:2884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1952,8583290184549281818,8679485003705798437,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5760 /prefetch:12⤵PID:4300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1952,8583290184549281818,8679485003705798437,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4788 /prefetch:12⤵PID:2440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1952,8583290184549281818,8679485003705798437,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6028 /prefetch:12⤵PID:432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1952,8583290184549281818,8679485003705798437,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5416 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2968
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1412
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2992
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59e3fc58a8fb86c93d19e1500b873ef6f
SHA1c6aae5f4e26f5570db5e14bba8d5061867a33b56
SHA256828f4eacac1c40b790fd70dbb6fa6ba03dcc681171d9b2a6579626d27837b1c4
SHA512e5e245b56fa82075e060f468a3224cf2ef43f1b6d87f0351a2102d85c7c897e559be4caeaecfdc4059af29fdc674681b61229319dda95cb2ee649b2eb98d313e
-
Filesize
152B
MD527304926d60324abe74d7a4b571c35ea
SHA178b8f92fcaf4a09eaa786bbe33fd1b0222ef29c1
SHA2567039ad5c2b40f4d97c8c2269f4942be13436d739b2e1f8feb7a0c9f9fdb931de
SHA512f5b6181d3f432238c7365f64fc8a373299e23ba8178bcc419471916ef8b23e909787c7c0617ab22e4eb90909c02bd7b84f1386fbc61e2bdb5a0eb474175da4bd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD5f5fea41f631926c7ba7fbf644dc69569
SHA1153d257140d6c1e33cc8202bd9c932ac34052de5
SHA256106cc6eda821862daedc771165864dcb43a8973b241513177951fc8b488c7ad0
SHA5124e0650c3392b37be5957e365fb4ade33209e3aee4c11dba25964f9ca8b96dd2a546cd0bd2780bf3401c6906a0ca0906e7415799ae9e50a34dc121f0fa364d693
-
Filesize
1KB
MD50432b6c70b4cf844bb1a2183cbb68773
SHA13c5064ee2a24a0a08ccd1ce699ef73865a4076b3
SHA256b081e6f0f0b7b247706037f1d014fe485194f5726567181f70ed707176309298
SHA51214cc3e5c9db6eafacd0c8d15cff7c174f7895a3065f09cdb49072921920853c5aa52b2cf565961f00a77eeb45edc6489ba91dc78a1f8e07b98685d1d945a4a02
-
Filesize
5KB
MD58be363816669af6bf0ca718fc6d7ca2c
SHA1315e5df57462e20b1119c8d22d4a9ce8ee93a2fe
SHA25643040e0ceb590ff9d5f34e6bb34c07439baab440e123989aefc4b24965b0e277
SHA512ea062ec1e5dad633319d57d23c1630803455873ec40ddd4939eb4d2e98126303ef31e43a9d8826878242b969069577bd7aadf62a06c2af4f8abea1966d7429ec
-
Filesize
6KB
MD51d653143c08a3a7f3096fd13a8ac16ff
SHA1e6f0aab02aa005b954ce7a14cbd1ef833251b66e
SHA2560d6f044066c8f367600f4b29177f6c6fd92745710bd0168a59020e82b5c3893e
SHA512b018979f3abe818e79670b2c461cd8335008fcb9173efdaf96e90324b2a0d1e71e3d9efbedb32f19b0b87391d5396b25cbd1d8770ff9ba275ab330ffc9e50791
-
Filesize
6KB
MD5583372a94d92b8ff06cc1e15c9f94d95
SHA198e0daba01a7271fddc2a69dbc58759cfe11d597
SHA256170417bfb1f42ad82f471dfbe90335ef38fe3b491d8a8b50120349c7dd0ee296
SHA5123a959a1519580bdb2fa41540d7dfe38dec8dca54e6e370424350312de65e2e59794e41b247c0314f11f30adba73dcdd533046fdf5a26bf6d77ed1ebd49ed58b6
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5cba0837d83750d014487e7983cb3fb49
SHA13b07ec79242b50d69ebf5c10f1424c7b3467bdff
SHA2563e463eec32b867a725d7cf0785aeea8b76fff60c8df82e60a806ecf83b09b1be
SHA5127ff14a004d304f35fa2294227934162ae417e4818fb9cb87b9b54d8ad3b81026dc2e0b2cc30d98d8bc2b24804043bbe9404716a30d055553f70739c861c12893