Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07/09/2024, 07:11
Static task
static1
Behavioral task
behavioral1
Sample
d15c7fc4cc0f4d95d8a8881006fb3a22_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d15c7fc4cc0f4d95d8a8881006fb3a22_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d15c7fc4cc0f4d95d8a8881006fb3a22_JaffaCakes118.html
-
Size
237KB
-
MD5
d15c7fc4cc0f4d95d8a8881006fb3a22
-
SHA1
388e9eeaf2ca1ee45e979a76c79b67fbc259b165
-
SHA256
24328803463a7b3e76421d35e63a417cf210c429feaffb9448d3de848b7d340d
-
SHA512
3af7ba9720ef5ceb8e9c9f27714a2ea73894370656c5a8317dde8295cbe1ef682efe0ff6ed04e7e91d390d9d9d508e009845144830c6dbf5d12c4b2e5d5e2400
-
SSDEEP
3072:t4yfkMY+BES09JXAnyrZalI+YT+zryfkMY+BES09JXAnyrZalI+YW:HsMYod+X3oI+YwOsMYod+X3oI+YW
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3456 msedge.exe 3456 msedge.exe 1616 msedge.exe 1616 msedge.exe 3324 identity_helper.exe 3324 identity_helper.exe 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1616 wrote to memory of 4488 1616 msedge.exe 85 PID 1616 wrote to memory of 4488 1616 msedge.exe 85 PID 1616 wrote to memory of 1240 1616 msedge.exe 86 PID 1616 wrote to memory of 1240 1616 msedge.exe 86 PID 1616 wrote to memory of 1240 1616 msedge.exe 86 PID 1616 wrote to memory of 1240 1616 msedge.exe 86 PID 1616 wrote to memory of 1240 1616 msedge.exe 86 PID 1616 wrote to memory of 1240 1616 msedge.exe 86 PID 1616 wrote to memory of 1240 1616 msedge.exe 86 PID 1616 wrote to memory of 1240 1616 msedge.exe 86 PID 1616 wrote to memory of 1240 1616 msedge.exe 86 PID 1616 wrote to memory of 1240 1616 msedge.exe 86 PID 1616 wrote to memory of 1240 1616 msedge.exe 86 PID 1616 wrote to memory of 1240 1616 msedge.exe 86 PID 1616 wrote to memory of 1240 1616 msedge.exe 86 PID 1616 wrote to memory of 1240 1616 msedge.exe 86 PID 1616 wrote to memory of 1240 1616 msedge.exe 86 PID 1616 wrote to memory of 1240 1616 msedge.exe 86 PID 1616 wrote to memory of 1240 1616 msedge.exe 86 PID 1616 wrote to memory of 1240 1616 msedge.exe 86 PID 1616 wrote to memory of 1240 1616 msedge.exe 86 PID 1616 wrote to memory of 1240 1616 msedge.exe 86 PID 1616 wrote to memory of 1240 1616 msedge.exe 86 PID 1616 wrote to memory of 1240 1616 msedge.exe 86 PID 1616 wrote to memory of 1240 1616 msedge.exe 86 PID 1616 wrote to memory of 1240 1616 msedge.exe 86 PID 1616 wrote to memory of 1240 1616 msedge.exe 86 PID 1616 wrote to memory of 1240 1616 msedge.exe 86 PID 1616 wrote to memory of 1240 1616 msedge.exe 86 PID 1616 wrote to memory of 1240 1616 msedge.exe 86 PID 1616 wrote to memory of 1240 1616 msedge.exe 86 PID 1616 wrote to memory of 1240 1616 msedge.exe 86 PID 1616 wrote to memory of 1240 1616 msedge.exe 86 PID 1616 wrote to memory of 1240 1616 msedge.exe 86 PID 1616 wrote to memory of 1240 1616 msedge.exe 86 PID 1616 wrote to memory of 1240 1616 msedge.exe 86 PID 1616 wrote to memory of 1240 1616 msedge.exe 86 PID 1616 wrote to memory of 1240 1616 msedge.exe 86 PID 1616 wrote to memory of 1240 1616 msedge.exe 86 PID 1616 wrote to memory of 1240 1616 msedge.exe 86 PID 1616 wrote to memory of 1240 1616 msedge.exe 86 PID 1616 wrote to memory of 1240 1616 msedge.exe 86 PID 1616 wrote to memory of 3456 1616 msedge.exe 87 PID 1616 wrote to memory of 3456 1616 msedge.exe 87 PID 1616 wrote to memory of 4940 1616 msedge.exe 88 PID 1616 wrote to memory of 4940 1616 msedge.exe 88 PID 1616 wrote to memory of 4940 1616 msedge.exe 88 PID 1616 wrote to memory of 4940 1616 msedge.exe 88 PID 1616 wrote to memory of 4940 1616 msedge.exe 88 PID 1616 wrote to memory of 4940 1616 msedge.exe 88 PID 1616 wrote to memory of 4940 1616 msedge.exe 88 PID 1616 wrote to memory of 4940 1616 msedge.exe 88 PID 1616 wrote to memory of 4940 1616 msedge.exe 88 PID 1616 wrote to memory of 4940 1616 msedge.exe 88 PID 1616 wrote to memory of 4940 1616 msedge.exe 88 PID 1616 wrote to memory of 4940 1616 msedge.exe 88 PID 1616 wrote to memory of 4940 1616 msedge.exe 88 PID 1616 wrote to memory of 4940 1616 msedge.exe 88 PID 1616 wrote to memory of 4940 1616 msedge.exe 88 PID 1616 wrote to memory of 4940 1616 msedge.exe 88 PID 1616 wrote to memory of 4940 1616 msedge.exe 88 PID 1616 wrote to memory of 4940 1616 msedge.exe 88 PID 1616 wrote to memory of 4940 1616 msedge.exe 88 PID 1616 wrote to memory of 4940 1616 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\d15c7fc4cc0f4d95d8a8881006fb3a22_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff92ff946f8,0x7ff92ff94708,0x7ff92ff947182⤵PID:4488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,16651666359489209254,4109505921082635373,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:22⤵PID:1240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,16651666359489209254,4109505921082635373,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2352 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2116,16651666359489209254,4109505921082635373,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2848 /prefetch:82⤵PID:4940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,16651666359489209254,4109505921082635373,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2140 /prefetch:12⤵PID:2948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,16651666359489209254,4109505921082635373,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:1624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,16651666359489209254,4109505921082635373,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6136 /prefetch:12⤵PID:2068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,16651666359489209254,4109505921082635373,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4248 /prefetch:12⤵PID:5000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,16651666359489209254,4109505921082635373,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5684 /prefetch:82⤵PID:3220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,16651666359489209254,4109505921082635373,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5684 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,16651666359489209254,4109505921082635373,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5668 /prefetch:12⤵PID:2284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,16651666359489209254,4109505921082635373,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3972 /prefetch:12⤵PID:2352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,16651666359489209254,4109505921082635373,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4136 /prefetch:12⤵PID:4764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,16651666359489209254,4109505921082635373,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5840 /prefetch:12⤵PID:3108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,16651666359489209254,4109505921082635373,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5560 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2904
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2340
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4512
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59e3fc58a8fb86c93d19e1500b873ef6f
SHA1c6aae5f4e26f5570db5e14bba8d5061867a33b56
SHA256828f4eacac1c40b790fd70dbb6fa6ba03dcc681171d9b2a6579626d27837b1c4
SHA512e5e245b56fa82075e060f468a3224cf2ef43f1b6d87f0351a2102d85c7c897e559be4caeaecfdc4059af29fdc674681b61229319dda95cb2ee649b2eb98d313e
-
Filesize
152B
MD527304926d60324abe74d7a4b571c35ea
SHA178b8f92fcaf4a09eaa786bbe33fd1b0222ef29c1
SHA2567039ad5c2b40f4d97c8c2269f4942be13436d739b2e1f8feb7a0c9f9fdb931de
SHA512f5b6181d3f432238c7365f64fc8a373299e23ba8178bcc419471916ef8b23e909787c7c0617ab22e4eb90909c02bd7b84f1386fbc61e2bdb5a0eb474175da4bd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize360B
MD58bbf9a3146063f73dd45a4f8dabcb661
SHA183ddc21b5e1d8cd773754b80c5647bde632266b8
SHA256938c42ae0e2fdce8d521c0dc52ef87a84174573f31102c57e5c96b4e59d12ca8
SHA5129afc39b7beaf5998920c567a6590f49c06293c76d5005328e9e1d624fe30968a00fc56c39ad6e08fbebfe7bc2947a4c877b492b77e9a023e4ae9e2f4a9fe1426
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD52f3d3130cb0d4d544e972de93bc23306
SHA1a035024dae4430ff11982b785287b795ceb0d211
SHA256a487e97b43f71f33753a9fecb0e91f433cd476870641c9cf42da3de6b68e16a2
SHA5124900cb41501e228a13aa666b332214916e7ea51d5677f7cdceb971bdaa41f1ba633675fbfcae697fd1bf0a87267c3459c270dc8a695f48aebacd5e39e94c865e
-
Filesize
833B
MD55866ca516d59a830b6e5eb49786e50ea
SHA1165d774cd533a0c0e680cbd4c0034bd6b2cff2c6
SHA256ba280477a00a310567ac7edc030cd4531175833e53229384c02221ba343bbd71
SHA512b1d49401dacf844241ca0a028f669a2bce62e829194539e7b6dfa77ce52e02ee75e6ca235414fb183ed8fcec56332a8c4235fb327cedd8df6bcc2b673e9e0240
-
Filesize
6KB
MD5bd647121339e49737796145a922a18d2
SHA115191d540172ea199eae78350f6b0fdc5af52d35
SHA256b8ef973a9161029bf219c5ea4a12a5a5771b61bc2794b0cc164859d53f0174ac
SHA5122c9ee583a29afbfdd50205cb9a850fc3fc8dc9b0eaa1719246cde611458fc5403cb2655cb1a45534035d96137d6f534b2e8651eec38aafa9eb1f3726a4a824eb
-
Filesize
5KB
MD50bd0d523762b74e4a49a2f6f1184de30
SHA18238eac1fec98600b5c51b00511f24e4738500e3
SHA256085ce78cba787233bd0286d43c64b2015e66fcb536736a8a1fbae36398d2dd4f
SHA5123388e75633e24a129faf7ed442b33384d39642d7f68434658fd1cc2735121ce0d7ddabfa3322fc963e051922e36f6d52d2b05a8527917eb989178357bfdf6155
-
Filesize
6KB
MD5bf3b60d00064dfa1a01d30fba7a418ad
SHA10af62b3e18f08f14eba34ae7383dc1395d1c7c46
SHA2564c56d9b49089c024c9ccb6ed937c2ad3f5378a3ce852e00298d9db625f9db7d6
SHA5123b9b525994af425b416dce3ee0c2f9327c66fe99955e0bd63eca01839d6084a837807137b218c9391e20bf090b152aa604ec959b6753e162c84719fd7bd44249
-
Filesize
6KB
MD55b011af8427ae4f1a14ac4c40745646d
SHA17cb3913c6b6d360a10e8d8cd55cb053b7ad2064c
SHA256920a7aa1d786819f63199fe0d73194607e0ea78a4681a8cc21a4ad15e112966b
SHA512fac53bc3c572a72941b8accd97a1695db7e711b5a747f48209ec92563f105e4363eb240183adfa999e294ed093f448a387462c1ee2ace5e6f58c1810ce27ec7b
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5044da23b19263c5f5c566897261dbc8d
SHA15c337d141cbd796a76e4e81fb98be43c0cde59c4
SHA2562f266af4a06622efb97c9b91a63b7a50080b2bb331535e2c057f1c7fd4f5482a
SHA512682808bd56721424b441ca60ff17814ce6dabed7e99e9f8b5ae2a83a22bcf8d420e88893be231dc7614150e0f5c761958476d0beadd79abb03d09ae4d8a230b9