Analysis
-
max time kernel
145s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07-09-2024 21:30
Static task
static1
Behavioral task
behavioral1
Sample
d2e0be3dc3da84c78be4d31da503c795_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d2e0be3dc3da84c78be4d31da503c795_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d2e0be3dc3da84c78be4d31da503c795_JaffaCakes118.html
-
Size
90KB
-
MD5
d2e0be3dc3da84c78be4d31da503c795
-
SHA1
b0e3b29921d9d1259bd0107cae0654cb40707fc9
-
SHA256
689ff6dd66fa038d19edf9d1cf50a5a850be768cfc34d20082ba6c7292384e1a
-
SHA512
b0b2473b6b0f2a2362ec7d545a0b0e1d963b269ba0e5bb8fdfc7c8aea8c040a36e1147261a33aa5f63f32a5f587b35f6b6e35b7d22d0c87ac95d391dbdb62db8
-
SSDEEP
1536:l/xwEWRuV3oQyr6cBXDE2r6E6sUZute6lUIWxAQVqpREPRTxXwJQej9pi8FQ+/KG:EbQ8Jt4iM2JjiYE6a5Qv
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3620 msedge.exe 3620 msedge.exe 4436 msedge.exe 4436 msedge.exe 2620 identity_helper.exe 2620 identity_helper.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4436 wrote to memory of 1620 4436 msedge.exe 83 PID 4436 wrote to memory of 1620 4436 msedge.exe 83 PID 4436 wrote to memory of 792 4436 msedge.exe 84 PID 4436 wrote to memory of 792 4436 msedge.exe 84 PID 4436 wrote to memory of 792 4436 msedge.exe 84 PID 4436 wrote to memory of 792 4436 msedge.exe 84 PID 4436 wrote to memory of 792 4436 msedge.exe 84 PID 4436 wrote to memory of 792 4436 msedge.exe 84 PID 4436 wrote to memory of 792 4436 msedge.exe 84 PID 4436 wrote to memory of 792 4436 msedge.exe 84 PID 4436 wrote to memory of 792 4436 msedge.exe 84 PID 4436 wrote to memory of 792 4436 msedge.exe 84 PID 4436 wrote to memory of 792 4436 msedge.exe 84 PID 4436 wrote to memory of 792 4436 msedge.exe 84 PID 4436 wrote to memory of 792 4436 msedge.exe 84 PID 4436 wrote to memory of 792 4436 msedge.exe 84 PID 4436 wrote to memory of 792 4436 msedge.exe 84 PID 4436 wrote to memory of 792 4436 msedge.exe 84 PID 4436 wrote to memory of 792 4436 msedge.exe 84 PID 4436 wrote to memory of 792 4436 msedge.exe 84 PID 4436 wrote to memory of 792 4436 msedge.exe 84 PID 4436 wrote to memory of 792 4436 msedge.exe 84 PID 4436 wrote to memory of 792 4436 msedge.exe 84 PID 4436 wrote to memory of 792 4436 msedge.exe 84 PID 4436 wrote to memory of 792 4436 msedge.exe 84 PID 4436 wrote to memory of 792 4436 msedge.exe 84 PID 4436 wrote to memory of 792 4436 msedge.exe 84 PID 4436 wrote to memory of 792 4436 msedge.exe 84 PID 4436 wrote to memory of 792 4436 msedge.exe 84 PID 4436 wrote to memory of 792 4436 msedge.exe 84 PID 4436 wrote to memory of 792 4436 msedge.exe 84 PID 4436 wrote to memory of 792 4436 msedge.exe 84 PID 4436 wrote to memory of 792 4436 msedge.exe 84 PID 4436 wrote to memory of 792 4436 msedge.exe 84 PID 4436 wrote to memory of 792 4436 msedge.exe 84 PID 4436 wrote to memory of 792 4436 msedge.exe 84 PID 4436 wrote to memory of 792 4436 msedge.exe 84 PID 4436 wrote to memory of 792 4436 msedge.exe 84 PID 4436 wrote to memory of 792 4436 msedge.exe 84 PID 4436 wrote to memory of 792 4436 msedge.exe 84 PID 4436 wrote to memory of 792 4436 msedge.exe 84 PID 4436 wrote to memory of 792 4436 msedge.exe 84 PID 4436 wrote to memory of 3620 4436 msedge.exe 85 PID 4436 wrote to memory of 3620 4436 msedge.exe 85 PID 4436 wrote to memory of 4008 4436 msedge.exe 86 PID 4436 wrote to memory of 4008 4436 msedge.exe 86 PID 4436 wrote to memory of 4008 4436 msedge.exe 86 PID 4436 wrote to memory of 4008 4436 msedge.exe 86 PID 4436 wrote to memory of 4008 4436 msedge.exe 86 PID 4436 wrote to memory of 4008 4436 msedge.exe 86 PID 4436 wrote to memory of 4008 4436 msedge.exe 86 PID 4436 wrote to memory of 4008 4436 msedge.exe 86 PID 4436 wrote to memory of 4008 4436 msedge.exe 86 PID 4436 wrote to memory of 4008 4436 msedge.exe 86 PID 4436 wrote to memory of 4008 4436 msedge.exe 86 PID 4436 wrote to memory of 4008 4436 msedge.exe 86 PID 4436 wrote to memory of 4008 4436 msedge.exe 86 PID 4436 wrote to memory of 4008 4436 msedge.exe 86 PID 4436 wrote to memory of 4008 4436 msedge.exe 86 PID 4436 wrote to memory of 4008 4436 msedge.exe 86 PID 4436 wrote to memory of 4008 4436 msedge.exe 86 PID 4436 wrote to memory of 4008 4436 msedge.exe 86 PID 4436 wrote to memory of 4008 4436 msedge.exe 86 PID 4436 wrote to memory of 4008 4436 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\d2e0be3dc3da84c78be4d31da503c795_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4436 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff96f2046f8,0x7ff96f204708,0x7ff96f2047182⤵PID:1620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,9653675708996182311,2298002161551333278,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2164 /prefetch:22⤵PID:792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2144,9653675708996182311,2298002161551333278,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2144,9653675708996182311,2298002161551333278,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2452 /prefetch:82⤵PID:4008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,9653675708996182311,2298002161551333278,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:3572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,9653675708996182311,2298002161551333278,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:1680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,9653675708996182311,2298002161551333278,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4952 /prefetch:12⤵PID:1972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,9653675708996182311,2298002161551333278,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5116 /prefetch:82⤵PID:2316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,9653675708996182311,2298002161551333278,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5116 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,9653675708996182311,2298002161551333278,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5148 /prefetch:12⤵PID:4760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,9653675708996182311,2298002161551333278,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5204 /prefetch:12⤵PID:4932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,9653675708996182311,2298002161551333278,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5660 /prefetch:12⤵PID:4328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,9653675708996182311,2298002161551333278,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5600 /prefetch:12⤵PID:3340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,9653675708996182311,2298002161551333278,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5192 /prefetch:12⤵PID:4792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,9653675708996182311,2298002161551333278,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3476 /prefetch:12⤵PID:2976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,9653675708996182311,2298002161551333278,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4192 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4420
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4892
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3588
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d7114a6cd851f9bf56cf771c37d664a2
SHA1769c5d04fd83e583f15ab1ef659de8f883ecab8a
SHA256d2c75c7d68c474d4b8847b4ba6cfd09fe90717f46dd398c86483d825a66e977e
SHA51233bdae2305ae98e7c0de576de5a6600bd70a425e7b891d745cba9de992036df1b3d1df9572edb0f89f320e50962d06532dae9491985b6b57fd37d5f46f7a2ff8
-
Filesize
152B
MD5719923124ee00fb57378e0ebcbe894f7
SHA1cc356a7d27b8b27dc33f21bd4990f286ee13a9f9
SHA256aa22ab845fa08c786bd3366ec39f733d5be80e9ac933ed115ff048ff30090808
SHA512a207b6646500d0d504cf70ee10f57948e58dab7f214ad2e7c4af0e7ca23ce1d37c8c745873137e6c55bdcf0f527031a66d9cc54805a0eac3678be6dd497a5bbc
-
Filesize
212KB
MD508ec57068db9971e917b9046f90d0e49
SHA128b80d73a861f88735d89e301fa98f2ae502e94b
SHA2567a68efe41e5d8408eed6e9d91a7b7b965a3062e4e28eeffeefb8cdba6391f4d1
SHA512b154142173145122bc49ddd7f9530149100f6f3c5fd2f2e7503b13f7b160147b8b876344f6faae5e8616208c51311633df4c578802ac5d34c005bb154e9057cf
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD5a2c95d8bfda6cd65887240e9072edaac
SHA104cb7f9ef72ce3c82dfaf399ee303206505710db
SHA25655cf5a4facffbd19d0b3a6c2989df4dd9f5bbafc42e9ace38f26d12fcfa560fb
SHA512ca992906b0c9cfff396a2965f17a81a3e5328726627a8e83cd4053a4687db46809c032106430df40f65d40cf17bf0301a19c62bc5340198997b3d3bb5db3522d
-
Filesize
816B
MD51af7dd07fee7ad3f56010c32a720f19d
SHA1af922009342378725daa3e226cd0cf4c216454bf
SHA256f8208441b5c8be36d88a84ab9d1d867b58c19d7541d5605fbef6d4069eccec5b
SHA5123c3fe95762d1c4cb125fbf7f7e5f8c735888de9ce99ac03ac357186270bf6a5918133471bb089d7230d3d5696cdfecee546a35e61218a5a3094dd7a94e3f5685
-
Filesize
5KB
MD50bc6e0e64e78844124a75570f97e1f6b
SHA1ab49012360827926a1a577e291b47a27343c8c64
SHA2569dcdec83cb851f4f33bd4701f3b1cf25b1953690d73ccd6f7fef1f5d24068bfa
SHA5127eb2c914dc3eb9716018ff8581cf9e78d75635af10b43f2c604c0595a269658e9d6082abf3acfd207d3a46258e5fec46f2143a893a3e49f9c9d6159d21a2bbcc
-
Filesize
6KB
MD584fb6fb5378a0561489b16d576514688
SHA149bf5c0161ffe4c45d89f940036bd1c0f3e0faae
SHA256ca024c3911db7876c2f8e3de654f364b5dd466f351e1994c74094892d6405a38
SHA5123703c3789c7fbb90173d3d5f84f1cc83635647b06767bf2fc6703dd00dba78157dee4d9b50fd3d0dd594ddc14098904179025aac301a36a19424ea190831e27a
-
Filesize
6KB
MD5b710dc09825901dbe1d86fd7b4aab586
SHA11f984689dd9eacfa32dfcb52c8a0d32167491d1c
SHA256a08201799194d3b4bbe50f2a97c7b92754e101dd58337e9b92cbe778cf666e42
SHA5123c4febacfe47d4a47c2943d70c2845f8f9f203ddf4988c0e47d20d747389ec720ff3aab5e1627815543f9d9fde5d947aa243c7d64c442a765d176b86899f11da
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD576f7eeee01b07ca031fa7a1670dd2771
SHA16650c937dc87d8f1ad198067e2611cb0e1823af6
SHA2566dcb19c054996ee45bbd89b4bc317233799d07e75c6546c43f1357418f105a83
SHA5129683514e756072fdb00655a3509e33a34a6fef7d6e0140d71ad1f5fbf21811b58691bd074251332692cd49cc1389d6ea048b7be9a4faa251f5fe762688430e01