Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07-09-2024 10:37
Static task
static1
Behavioral task
behavioral1
Sample
d1bcda9d9bb085a6981b8470ec73deb4_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d1bcda9d9bb085a6981b8470ec73deb4_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d1bcda9d9bb085a6981b8470ec73deb4_JaffaCakes118.html
-
Size
25KB
-
MD5
d1bcda9d9bb085a6981b8470ec73deb4
-
SHA1
64c1fdadb139b6f1fcd9c0c82404db2e477792d7
-
SHA256
001872c74700338760c02ec8b2c630473535dc69a8ab34107f770478bae0351e
-
SHA512
65081591fa002d486d79112b20588b207e1ca635b656e327364a113ee310ec5737c02d32d40eec821414ae06ccca3b132f0305e6b137c808a62e202e3ee3be3b
-
SSDEEP
384:3ek6UilIrvu30/exUsFCi3xYZzy1OIrSeljdGRtkGNl8:JE2rvg02usFbTOIrSehMRtkGNl8
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 5068 msedge.exe 5068 msedge.exe 3964 msedge.exe 3964 msedge.exe 3532 identity_helper.exe 3532 identity_helper.exe 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe 3964 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3964 wrote to memory of 456 3964 msedge.exe 83 PID 3964 wrote to memory of 456 3964 msedge.exe 83 PID 3964 wrote to memory of 5080 3964 msedge.exe 84 PID 3964 wrote to memory of 5080 3964 msedge.exe 84 PID 3964 wrote to memory of 5080 3964 msedge.exe 84 PID 3964 wrote to memory of 5080 3964 msedge.exe 84 PID 3964 wrote to memory of 5080 3964 msedge.exe 84 PID 3964 wrote to memory of 5080 3964 msedge.exe 84 PID 3964 wrote to memory of 5080 3964 msedge.exe 84 PID 3964 wrote to memory of 5080 3964 msedge.exe 84 PID 3964 wrote to memory of 5080 3964 msedge.exe 84 PID 3964 wrote to memory of 5080 3964 msedge.exe 84 PID 3964 wrote to memory of 5080 3964 msedge.exe 84 PID 3964 wrote to memory of 5080 3964 msedge.exe 84 PID 3964 wrote to memory of 5080 3964 msedge.exe 84 PID 3964 wrote to memory of 5080 3964 msedge.exe 84 PID 3964 wrote to memory of 5080 3964 msedge.exe 84 PID 3964 wrote to memory of 5080 3964 msedge.exe 84 PID 3964 wrote to memory of 5080 3964 msedge.exe 84 PID 3964 wrote to memory of 5080 3964 msedge.exe 84 PID 3964 wrote to memory of 5080 3964 msedge.exe 84 PID 3964 wrote to memory of 5080 3964 msedge.exe 84 PID 3964 wrote to memory of 5080 3964 msedge.exe 84 PID 3964 wrote to memory of 5080 3964 msedge.exe 84 PID 3964 wrote to memory of 5080 3964 msedge.exe 84 PID 3964 wrote to memory of 5080 3964 msedge.exe 84 PID 3964 wrote to memory of 5080 3964 msedge.exe 84 PID 3964 wrote to memory of 5080 3964 msedge.exe 84 PID 3964 wrote to memory of 5080 3964 msedge.exe 84 PID 3964 wrote to memory of 5080 3964 msedge.exe 84 PID 3964 wrote to memory of 5080 3964 msedge.exe 84 PID 3964 wrote to memory of 5080 3964 msedge.exe 84 PID 3964 wrote to memory of 5080 3964 msedge.exe 84 PID 3964 wrote to memory of 5080 3964 msedge.exe 84 PID 3964 wrote to memory of 5080 3964 msedge.exe 84 PID 3964 wrote to memory of 5080 3964 msedge.exe 84 PID 3964 wrote to memory of 5080 3964 msedge.exe 84 PID 3964 wrote to memory of 5080 3964 msedge.exe 84 PID 3964 wrote to memory of 5080 3964 msedge.exe 84 PID 3964 wrote to memory of 5080 3964 msedge.exe 84 PID 3964 wrote to memory of 5080 3964 msedge.exe 84 PID 3964 wrote to memory of 5080 3964 msedge.exe 84 PID 3964 wrote to memory of 5068 3964 msedge.exe 85 PID 3964 wrote to memory of 5068 3964 msedge.exe 85 PID 3964 wrote to memory of 2768 3964 msedge.exe 86 PID 3964 wrote to memory of 2768 3964 msedge.exe 86 PID 3964 wrote to memory of 2768 3964 msedge.exe 86 PID 3964 wrote to memory of 2768 3964 msedge.exe 86 PID 3964 wrote to memory of 2768 3964 msedge.exe 86 PID 3964 wrote to memory of 2768 3964 msedge.exe 86 PID 3964 wrote to memory of 2768 3964 msedge.exe 86 PID 3964 wrote to memory of 2768 3964 msedge.exe 86 PID 3964 wrote to memory of 2768 3964 msedge.exe 86 PID 3964 wrote to memory of 2768 3964 msedge.exe 86 PID 3964 wrote to memory of 2768 3964 msedge.exe 86 PID 3964 wrote to memory of 2768 3964 msedge.exe 86 PID 3964 wrote to memory of 2768 3964 msedge.exe 86 PID 3964 wrote to memory of 2768 3964 msedge.exe 86 PID 3964 wrote to memory of 2768 3964 msedge.exe 86 PID 3964 wrote to memory of 2768 3964 msedge.exe 86 PID 3964 wrote to memory of 2768 3964 msedge.exe 86 PID 3964 wrote to memory of 2768 3964 msedge.exe 86 PID 3964 wrote to memory of 2768 3964 msedge.exe 86 PID 3964 wrote to memory of 2768 3964 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\d1bcda9d9bb085a6981b8470ec73deb4_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3964 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xe4,0x40,0xdc,0xe0,0x108,0x7ffa8fa446f8,0x7ffa8fa44708,0x7ffa8fa447182⤵PID:456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,14778120623682651458,17767635155342105946,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2168 /prefetch:22⤵PID:5080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,14778120623682651458,17767635155342105946,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2236 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2136,14778120623682651458,17767635155342105946,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2720 /prefetch:82⤵PID:2768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,14778120623682651458,17767635155342105946,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:3104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,14778120623682651458,17767635155342105946,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:2952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,14778120623682651458,17767635155342105946,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4112 /prefetch:12⤵PID:3540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,14778120623682651458,17767635155342105946,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5424 /prefetch:82⤵PID:1276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,14778120623682651458,17767635155342105946,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5424 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,14778120623682651458,17767635155342105946,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5548 /prefetch:12⤵PID:2600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,14778120623682651458,17767635155342105946,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5364 /prefetch:12⤵PID:2744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,14778120623682651458,17767635155342105946,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4108 /prefetch:12⤵PID:3252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,14778120623682651458,17767635155342105946,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4996 /prefetch:12⤵PID:3680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,14778120623682651458,17767635155342105946,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1916 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2600
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2908
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3320
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d7114a6cd851f9bf56cf771c37d664a2
SHA1769c5d04fd83e583f15ab1ef659de8f883ecab8a
SHA256d2c75c7d68c474d4b8847b4ba6cfd09fe90717f46dd398c86483d825a66e977e
SHA51233bdae2305ae98e7c0de576de5a6600bd70a425e7b891d745cba9de992036df1b3d1df9572edb0f89f320e50962d06532dae9491985b6b57fd37d5f46f7a2ff8
-
Filesize
152B
MD5719923124ee00fb57378e0ebcbe894f7
SHA1cc356a7d27b8b27dc33f21bd4990f286ee13a9f9
SHA256aa22ab845fa08c786bd3366ec39f733d5be80e9ac933ed115ff048ff30090808
SHA512a207b6646500d0d504cf70ee10f57948e58dab7f214ad2e7c4af0e7ca23ce1d37c8c745873137e6c55bdcf0f527031a66d9cc54805a0eac3678be6dd497a5bbc
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD542e6c0f985d8de866e0e4705f5d1c1e9
SHA19f865985ea005148ff1a651cc3b2b39d5a93e8e7
SHA256d11ecf7b4a29a823ecfed0d24bc734802044aec63d7c07e92f351901c5989f0c
SHA512d49f8441eca6010afb63eb534da3fe3427808a60fa21e1f0a6cd8950fb6c461ea9b61f2c17b2dafdc4b96d2f40322e37cb1775fdd6814520714a381f21cb017b
-
Filesize
644B
MD553aa1af5573f4a67ae64745fab81c4bb
SHA13edbdfbf062a4e353bf4bda480a23ed08814970a
SHA256971462fdaa327e30d54cb42c878be0084e586912387cc1512314151c028b652e
SHA512b295f7cd17cf118beb330eb6503e1f42063fbf769c586bccdc43a407454e2ce25ede573f73ea39638dc9d8762458a7418cccb7c91617fb960b8c29689a69dfa2
-
Filesize
5KB
MD541e782a3998b2acd3eafbde89a34adaf
SHA1bf1aae83b724d08126b2207ae56045e8dd98ea57
SHA2567354c564077ba1a97764028b34623cbed83f6f15d09ba0b249f67d58f00ca987
SHA5124fe44f98dcf61dc82c3e8ca40a0803c8e14da3ea88a691d744b54742e15f3a21082cef3e33c3c5c907a7cf8e3536ce918646d60023682fbcb8375bfc79600a9c
-
Filesize
6KB
MD58bc2df535530cc2867370519e7b9dc46
SHA1e782e27bf75bc62ce1390803cb626b709e82a5a9
SHA256bbc341e3a55dbce912fb1ac860f93de981dd0bd0e0021834bd675380f15a09d2
SHA5125e68803be23dbf7b8f540e2261ad5056ae6ae42ccc4935bac4cfe168a8972b235644eab875aaa75ebbf6782c0f137e11efcc816658785f19190375afd6434bab
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD526649e81ad6da7027beefc03f8999582
SHA161258ea6238dbe3c68d9c17de6df71fd6c30a347
SHA2562de60c5cb22cc337c3a8cb9ca09908e404ce8a521f865d81362b2f5a5806091d
SHA51269cc052d5bdd3fda408247149d300d334232cb0324034e498d4d6e8d37cb19e6822c76837c001c3845423dce1db654d6617b230315d1f546e8d1f4d447c15aeb