Analysis
-
max time kernel
146s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07-09-2024 07:27
Static task
static1
Behavioral task
behavioral1
Sample
d163e78e89569cc4164bf0ae17d49feb_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d163e78e89569cc4164bf0ae17d49feb_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d163e78e89569cc4164bf0ae17d49feb_JaffaCakes118.html
-
Size
110KB
-
MD5
d163e78e89569cc4164bf0ae17d49feb
-
SHA1
33a580856d662b2a3529c50cd13a6b8ab5476c67
-
SHA256
68e751adc084bd1f01863efae71273dbef20296bf861be49bb97cfd19d89dc9c
-
SHA512
a6db7dee7c7e34ff6c4c91d346982fb2399673180c2746fe8388cc058fc3764bd3f97db245f301be61b2f0378f4d707cbf5889e4bef43c63b2ed5f55c32dc14e
-
SSDEEP
1536:nn1ICXR/HOUBMPM7SheInewr5tpI8exUv01a2FttKZjOxwfC3eNHBnJH/2Nhox39:nn1ICB7O5eLdep
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2092 msedge.exe 2092 msedge.exe 5008 msedge.exe 5008 msedge.exe 4500 identity_helper.exe 4500 identity_helper.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5008 wrote to memory of 3536 5008 msedge.exe 83 PID 5008 wrote to memory of 3536 5008 msedge.exe 83 PID 5008 wrote to memory of 4836 5008 msedge.exe 84 PID 5008 wrote to memory of 4836 5008 msedge.exe 84 PID 5008 wrote to memory of 4836 5008 msedge.exe 84 PID 5008 wrote to memory of 4836 5008 msedge.exe 84 PID 5008 wrote to memory of 4836 5008 msedge.exe 84 PID 5008 wrote to memory of 4836 5008 msedge.exe 84 PID 5008 wrote to memory of 4836 5008 msedge.exe 84 PID 5008 wrote to memory of 4836 5008 msedge.exe 84 PID 5008 wrote to memory of 4836 5008 msedge.exe 84 PID 5008 wrote to memory of 4836 5008 msedge.exe 84 PID 5008 wrote to memory of 4836 5008 msedge.exe 84 PID 5008 wrote to memory of 4836 5008 msedge.exe 84 PID 5008 wrote to memory of 4836 5008 msedge.exe 84 PID 5008 wrote to memory of 4836 5008 msedge.exe 84 PID 5008 wrote to memory of 4836 5008 msedge.exe 84 PID 5008 wrote to memory of 4836 5008 msedge.exe 84 PID 5008 wrote to memory of 4836 5008 msedge.exe 84 PID 5008 wrote to memory of 4836 5008 msedge.exe 84 PID 5008 wrote to memory of 4836 5008 msedge.exe 84 PID 5008 wrote to memory of 4836 5008 msedge.exe 84 PID 5008 wrote to memory of 4836 5008 msedge.exe 84 PID 5008 wrote to memory of 4836 5008 msedge.exe 84 PID 5008 wrote to memory of 4836 5008 msedge.exe 84 PID 5008 wrote to memory of 4836 5008 msedge.exe 84 PID 5008 wrote to memory of 4836 5008 msedge.exe 84 PID 5008 wrote to memory of 4836 5008 msedge.exe 84 PID 5008 wrote to memory of 4836 5008 msedge.exe 84 PID 5008 wrote to memory of 4836 5008 msedge.exe 84 PID 5008 wrote to memory of 4836 5008 msedge.exe 84 PID 5008 wrote to memory of 4836 5008 msedge.exe 84 PID 5008 wrote to memory of 4836 5008 msedge.exe 84 PID 5008 wrote to memory of 4836 5008 msedge.exe 84 PID 5008 wrote to memory of 4836 5008 msedge.exe 84 PID 5008 wrote to memory of 4836 5008 msedge.exe 84 PID 5008 wrote to memory of 4836 5008 msedge.exe 84 PID 5008 wrote to memory of 4836 5008 msedge.exe 84 PID 5008 wrote to memory of 4836 5008 msedge.exe 84 PID 5008 wrote to memory of 4836 5008 msedge.exe 84 PID 5008 wrote to memory of 4836 5008 msedge.exe 84 PID 5008 wrote to memory of 4836 5008 msedge.exe 84 PID 5008 wrote to memory of 2092 5008 msedge.exe 85 PID 5008 wrote to memory of 2092 5008 msedge.exe 85 PID 5008 wrote to memory of 1816 5008 msedge.exe 86 PID 5008 wrote to memory of 1816 5008 msedge.exe 86 PID 5008 wrote to memory of 1816 5008 msedge.exe 86 PID 5008 wrote to memory of 1816 5008 msedge.exe 86 PID 5008 wrote to memory of 1816 5008 msedge.exe 86 PID 5008 wrote to memory of 1816 5008 msedge.exe 86 PID 5008 wrote to memory of 1816 5008 msedge.exe 86 PID 5008 wrote to memory of 1816 5008 msedge.exe 86 PID 5008 wrote to memory of 1816 5008 msedge.exe 86 PID 5008 wrote to memory of 1816 5008 msedge.exe 86 PID 5008 wrote to memory of 1816 5008 msedge.exe 86 PID 5008 wrote to memory of 1816 5008 msedge.exe 86 PID 5008 wrote to memory of 1816 5008 msedge.exe 86 PID 5008 wrote to memory of 1816 5008 msedge.exe 86 PID 5008 wrote to memory of 1816 5008 msedge.exe 86 PID 5008 wrote to memory of 1816 5008 msedge.exe 86 PID 5008 wrote to memory of 1816 5008 msedge.exe 86 PID 5008 wrote to memory of 1816 5008 msedge.exe 86 PID 5008 wrote to memory of 1816 5008 msedge.exe 86 PID 5008 wrote to memory of 1816 5008 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\d163e78e89569cc4164bf0ae17d49feb_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5008 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8964d46f8,0x7ff8964d4708,0x7ff8964d47182⤵PID:3536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1980,10290971351638065039,14759524757670667382,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2000 /prefetch:22⤵PID:4836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1980,10290971351638065039,14759524757670667382,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2368 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1980,10290971351638065039,14759524757670667382,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2952 /prefetch:82⤵PID:1816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,10290971351638065039,14759524757670667382,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:3648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,10290971351638065039,14759524757670667382,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:2088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,10290971351638065039,14759524757670667382,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1320 /prefetch:12⤵PID:1416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1980,10290971351638065039,14759524757670667382,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5576 /prefetch:82⤵PID:3020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1980,10290971351638065039,14759524757670667382,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5576 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,10290971351638065039,14759524757670667382,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5288 /prefetch:12⤵PID:3252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,10290971351638065039,14759524757670667382,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5088 /prefetch:12⤵PID:4080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,10290971351638065039,14759524757670667382,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4124 /prefetch:12⤵PID:3964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,10290971351638065039,14759524757670667382,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5236 /prefetch:12⤵PID:2028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1980,10290971351638065039,14759524757670667382,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5792 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2840
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4992
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4388
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ff63763eedb406987ced076e36ec9acf
SHA116365aa97cd1a115412f8ae436d5d4e9be5f7b5d
SHA2568f460e8b7a67f0c65b7248961a7c71146c9e7a19772b193972b486dbf05b8e4c
SHA512ce90336169c8b2de249d4faea2519bf7c3df48ae9d77cdf471dd5dbd8e8542d47d9348080a098074aa63c255890850ee3b80ddb8eef8384919fdca3bb9371d9f
-
Filesize
152B
MD52783c40400a8912a79cfd383da731086
SHA1001a131fe399c30973089e18358818090ca81789
SHA256331fa67da5f67bbb42794c3aeab8f7819f35347460ffb352ccc914e0373a22c5
SHA512b7c7d3aa966ad39a86aae02479649d74dcbf29d9cb3a7ff8b9b2354ea60704da55f5c0df803fd0a7191170a8e72fdd5eacfa1a739d7a74e390a7b74bdced1685
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD58040bedb797cde57e2a5107a84ce78f3
SHA142733bfc2a51d64cfbba56897d6debe11c317767
SHA256f75c2263fe3b50436f3ee89c55c58d0652f0ecaf6ce77af82eabc78892c2ecb8
SHA5120b9424284c3689a9c6da3fcce6c4098e035409eb65504f0dd8e219ebd2c7533b0fde529c0f50bd7260ce834f92ace0209b2c4d7754c1752579eba112f269c24e
-
Filesize
1KB
MD5f2f3c11044d9b705b37b2473425a85d9
SHA1ff9626042c1cbdaed5013427350f612c355849c8
SHA2567df1eeff2a56b832a759e7f3d57c761d6a2353659b7750c655442cdb28ee5952
SHA512be959d64f39351caca259ea3d8915741f8ade7cdb6fca7e5e12f1037903d461bd52828ee3b0a465d1df778ed497cc336b7105774261104b589906da48b0d3610
-
Filesize
1KB
MD58162bcb30050dd81d1eda6c4bc7a3708
SHA1b1d83b59d755bfdfecf6e69c583ff8b7bd2cd7db
SHA2563b7cebdca6027dfd5ca6d733f7e8dffaaf6b394ee8004ceaee9a271a921d1794
SHA5123899711ec9326c6c623ccbed0b44396b48a971744a3fa99191636d73904ba98f957c8f67f477294f1870a411556d1df958cda8efb5cb181538874661189630cf
-
Filesize
5KB
MD5c00fc85724a640f2edd332f05dc807a6
SHA1ba42fc2cc5c10850d0cdd7bf5810d3ffab34f7a0
SHA2566e2f6b27b5d3955b9c57aaf1050ba0a03dae450173697962a9b939c8b6c83a45
SHA5126c731ca7a42039595405069db8990d7a83e6c372e00a988274996bafb2fdcdfcbaf8681bf5c2ee060c369c25b1b9d4c0a5204e2a52fd9476dbfe2ecd935c9c94
-
Filesize
6KB
MD516f6d922683b994a8415b87f6fde2891
SHA1dac2fa1585053212320f9f744a271ee61e4b4d25
SHA256a0c3a8d488f110181fde018a5dd30ba34886c0f0ae372f02fa3b549eb5bdd636
SHA512272f05172935d3fce30049d01be7aa5535be5c53cdbd5f7f18a15fa4e8ff6739c154f8c01d4990f3d9726de27964b78a5902eb631f91e75e430a7f0e227ce969
-
Filesize
6KB
MD5338c7068b43105d15c520b39e1a468fe
SHA1e254eefffbef9e90204c3557bebe72493a6c524a
SHA2561544fc3f83c25bbf1895bfe1f1291f6a45feea10a937c606b41b6d3d7dce7dac
SHA512f9e31b47a5486f8cdecf8b8df4a9ac0926b9f4b73b793a73a50c66c6c76c4adba33d4bd1d04dcfde13c95f6ba6ffa3bae4ac98e1eeb5933fa7b53bddac8fa94c
-
Filesize
6KB
MD5059923c659690f3be4795dace43faff1
SHA181ee840b6fc87175d07eaa1c70a827dbe9e9e10c
SHA25613492a69a1a3d5a7dc7bfe52ec96e1878f3abc19543aeadcbddfae149764d3be
SHA5123e982592bbdcb1de003562fd587f719bf6a707de27f393fe921fd2b937b09d8543410995d152b4828e0fd95bcc8ccad9df34227358b15fee6f52370a552a0767
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD59f5164371263b3aff1e39e3f3672e89a
SHA1b1129f35d57aec95301b2337f1a5226abdbb6315
SHA256bdf3da4e86d1fd6c00bb4d1d038722a06fc2ea3498905868ebcebedfc259de55
SHA512647b3f4cc6a0bd9c0eb9c1894f70d774c727deb58e0869cb446aebe68d848d7b6e1bf9419f825e0c95c3984231a8a973d180160f5d7340cca3d760ca3b3a9596