Analysis
-
max time kernel
147s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06-09-2024 20:59
Static task
static1
Behavioral task
behavioral1
Sample
d071867140eefb5e3e384b7cab9215d1_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d071867140eefb5e3e384b7cab9215d1_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d071867140eefb5e3e384b7cab9215d1_JaffaCakes118.html
-
Size
91KB
-
MD5
d071867140eefb5e3e384b7cab9215d1
-
SHA1
75335cf705d4d86daf243c74b37fe0f4f7021ba8
-
SHA256
f2eb94d5574df34aaa6ac3f9505b0a298bbf82f28acb5d41df27064aa8bc9053
-
SHA512
ce2f9efcf595212a0f372f1abb526dbbfddf3823b2c7be6d77ab26e188d236701892480dc6051c4ad3af9806e3879c85ed7c7d3221f2d6336ea66cb4eaa90db7
-
SSDEEP
768:OgOriWNcaSoagGXBacxqssJyadua+hSvu7AOUd/xyHX/IeT/71ODwNt1dm2Su+:Z/JBamEyGf+EmUlFkH/Dt1d6
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3156 msedge.exe 3156 msedge.exe 4080 msedge.exe 4080 msedge.exe 1216 identity_helper.exe 1216 identity_helper.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4080 wrote to memory of 1900 4080 msedge.exe 83 PID 4080 wrote to memory of 1900 4080 msedge.exe 83 PID 4080 wrote to memory of 1988 4080 msedge.exe 84 PID 4080 wrote to memory of 1988 4080 msedge.exe 84 PID 4080 wrote to memory of 1988 4080 msedge.exe 84 PID 4080 wrote to memory of 1988 4080 msedge.exe 84 PID 4080 wrote to memory of 1988 4080 msedge.exe 84 PID 4080 wrote to memory of 1988 4080 msedge.exe 84 PID 4080 wrote to memory of 1988 4080 msedge.exe 84 PID 4080 wrote to memory of 1988 4080 msedge.exe 84 PID 4080 wrote to memory of 1988 4080 msedge.exe 84 PID 4080 wrote to memory of 1988 4080 msedge.exe 84 PID 4080 wrote to memory of 1988 4080 msedge.exe 84 PID 4080 wrote to memory of 1988 4080 msedge.exe 84 PID 4080 wrote to memory of 1988 4080 msedge.exe 84 PID 4080 wrote to memory of 1988 4080 msedge.exe 84 PID 4080 wrote to memory of 1988 4080 msedge.exe 84 PID 4080 wrote to memory of 1988 4080 msedge.exe 84 PID 4080 wrote to memory of 1988 4080 msedge.exe 84 PID 4080 wrote to memory of 1988 4080 msedge.exe 84 PID 4080 wrote to memory of 1988 4080 msedge.exe 84 PID 4080 wrote to memory of 1988 4080 msedge.exe 84 PID 4080 wrote to memory of 1988 4080 msedge.exe 84 PID 4080 wrote to memory of 1988 4080 msedge.exe 84 PID 4080 wrote to memory of 1988 4080 msedge.exe 84 PID 4080 wrote to memory of 1988 4080 msedge.exe 84 PID 4080 wrote to memory of 1988 4080 msedge.exe 84 PID 4080 wrote to memory of 1988 4080 msedge.exe 84 PID 4080 wrote to memory of 1988 4080 msedge.exe 84 PID 4080 wrote to memory of 1988 4080 msedge.exe 84 PID 4080 wrote to memory of 1988 4080 msedge.exe 84 PID 4080 wrote to memory of 1988 4080 msedge.exe 84 PID 4080 wrote to memory of 1988 4080 msedge.exe 84 PID 4080 wrote to memory of 1988 4080 msedge.exe 84 PID 4080 wrote to memory of 1988 4080 msedge.exe 84 PID 4080 wrote to memory of 1988 4080 msedge.exe 84 PID 4080 wrote to memory of 1988 4080 msedge.exe 84 PID 4080 wrote to memory of 1988 4080 msedge.exe 84 PID 4080 wrote to memory of 1988 4080 msedge.exe 84 PID 4080 wrote to memory of 1988 4080 msedge.exe 84 PID 4080 wrote to memory of 1988 4080 msedge.exe 84 PID 4080 wrote to memory of 1988 4080 msedge.exe 84 PID 4080 wrote to memory of 3156 4080 msedge.exe 85 PID 4080 wrote to memory of 3156 4080 msedge.exe 85 PID 4080 wrote to memory of 4148 4080 msedge.exe 86 PID 4080 wrote to memory of 4148 4080 msedge.exe 86 PID 4080 wrote to memory of 4148 4080 msedge.exe 86 PID 4080 wrote to memory of 4148 4080 msedge.exe 86 PID 4080 wrote to memory of 4148 4080 msedge.exe 86 PID 4080 wrote to memory of 4148 4080 msedge.exe 86 PID 4080 wrote to memory of 4148 4080 msedge.exe 86 PID 4080 wrote to memory of 4148 4080 msedge.exe 86 PID 4080 wrote to memory of 4148 4080 msedge.exe 86 PID 4080 wrote to memory of 4148 4080 msedge.exe 86 PID 4080 wrote to memory of 4148 4080 msedge.exe 86 PID 4080 wrote to memory of 4148 4080 msedge.exe 86 PID 4080 wrote to memory of 4148 4080 msedge.exe 86 PID 4080 wrote to memory of 4148 4080 msedge.exe 86 PID 4080 wrote to memory of 4148 4080 msedge.exe 86 PID 4080 wrote to memory of 4148 4080 msedge.exe 86 PID 4080 wrote to memory of 4148 4080 msedge.exe 86 PID 4080 wrote to memory of 4148 4080 msedge.exe 86 PID 4080 wrote to memory of 4148 4080 msedge.exe 86 PID 4080 wrote to memory of 4148 4080 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\d071867140eefb5e3e384b7cab9215d1_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4080 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff82ec146f8,0x7ff82ec14708,0x7ff82ec147182⤵PID:1900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2276,11950373559793347404,1661605427153732385,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2356 /prefetch:22⤵PID:1988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2276,11950373559793347404,1661605427153732385,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2412 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2276,11950373559793347404,1661605427153732385,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2816 /prefetch:82⤵PID:4148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2276,11950373559793347404,1661605427153732385,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:4256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2276,11950373559793347404,1661605427153732385,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:12⤵PID:3756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2276,11950373559793347404,1661605427153732385,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4784 /prefetch:12⤵PID:4832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2276,11950373559793347404,1661605427153732385,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5164 /prefetch:12⤵PID:1804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2276,11950373559793347404,1661605427153732385,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3256 /prefetch:82⤵PID:2832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2276,11950373559793347404,1661605427153732385,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3256 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2276,11950373559793347404,1661605427153732385,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2344 /prefetch:12⤵PID:2636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2276,11950373559793347404,1661605427153732385,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6112 /prefetch:12⤵PID:3076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2276,11950373559793347404,1661605427153732385,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5924 /prefetch:12⤵PID:2440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2276,11950373559793347404,1661605427153732385,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5268 /prefetch:12⤵PID:4740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2276,11950373559793347404,1661605427153732385,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5248 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4656
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2548
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:376
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD51e4346111c66f1111df591b69f0a94ff
SHA12d5298d05cd0a84501649a72e95f0caa8bec1a4f
SHA256033ae4ffe03b78596a748f330138a9e2d6118c640c317a588a7c06b6d048668b
SHA512bb07bd5283734522e55c0e37df1a24cbaf4b1831a0a95ae6314c6c402852c52de917b011adcf5a57f31d864406e088c2f702659adc4f80140380a6679c1f3b90
-
Filesize
152B
MD5ff63763eedb406987ced076e36ec9acf
SHA116365aa97cd1a115412f8ae436d5d4e9be5f7b5d
SHA2568f460e8b7a67f0c65b7248961a7c71146c9e7a19772b193972b486dbf05b8e4c
SHA512ce90336169c8b2de249d4faea2519bf7c3df48ae9d77cdf471dd5dbd8e8542d47d9348080a098074aa63c255890850ee3b80ddb8eef8384919fdca3bb9371d9f
-
Filesize
152B
MD52783c40400a8912a79cfd383da731086
SHA1001a131fe399c30973089e18358818090ca81789
SHA256331fa67da5f67bbb42794c3aeab8f7819f35347460ffb352ccc914e0373a22c5
SHA512b7c7d3aa966ad39a86aae02479649d74dcbf29d9cb3a7ff8b9b2354ea60704da55f5c0df803fd0a7191170a8e72fdd5eacfa1a739d7a74e390a7b74bdced1685
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD5ba826efed369a191cb47a6a6910ee6ee
SHA122f79fba3ec465863bb425b053cf448d5175870a
SHA256523dc513e28e77d274147d3f72912ebbad7ff3437a6bfec2f5048429a86f56ea
SHA512f72309bf5e53eb7d81e42a293b9bf5a70a03e3b1b2d6da5b8e164c6006fb2379d00572edf7ec2f421b2cb9b0a0e84dd7e776fadd6ff4676b4c35bed85df060d1
-
Filesize
852B
MD52c22f4ddb5206e08676387c86d073b04
SHA10073a5bb0690fed29e7c4a003a283134541ca155
SHA256faf470130dd62fe2e8d6fb25588cab395c790a4520feecbcfe3c2653bfbfdf85
SHA512c56c1a60088f3ad7b49ccf463d1ad9fffc26fdd1c0391566757813676481e270deb72b67448ca56d4824fdf7ad797e285180bcba432cfe9284aaa93ccdebf12c
-
Filesize
5KB
MD5f280a60c3e010f89adacd5d2d77d21a3
SHA1ced7f8d1c29d89ede107c98c93f6f5b775a0df6d
SHA256650f32c2ad9b654e51e449c7108b941a504e156c91adfdc6d02bf3511b9073bd
SHA5125e455d99c5cf97a3527fc1609d94826e96a11c53e34018eb99bef12fc490f70e8442de7aed22b02f12f5caef4f773788a0400bca33c8fc2029872ca6a130d832
-
Filesize
6KB
MD57bae4d75fdaa8ac70fed57bf0f5adc47
SHA1657e2d80bfe5ea48f6a7efd02354d82c39867ff2
SHA256140ce7e42675e2a9b8afb80ae91417d0570bd26c00bf9430d5c294924b4f08d9
SHA512f5a4451e8db0e910e1c1d91ff533ad688df7bd9ca04b8db993f355684621ed298ed96e0d67e255998055ddce440bc598a922011c230618d1675208341daabc2d
-
Filesize
6KB
MD5a0718f9e634071536ff33fd977667859
SHA1f687ddf2cd2ef57f5366ac411acfcec69e094a6f
SHA25669b6e0164897e5363d102ee905ca2589f9a96b3f1e3a6ca6ae220bf6372513db
SHA512375518694aa5705613c338153b3e3a0792dc032b6875ee50dcd16e9335cbf09cd9c06a6b07faff1fa8d9d9698cbf324a18c820c3f275365056b5509d5545677f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389