Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07/09/2024, 13:42
Static task
static1
Behavioral task
behavioral1
Sample
d210543743e53660461de1290e34fb01_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d210543743e53660461de1290e34fb01_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d210543743e53660461de1290e34fb01_JaffaCakes118.html
-
Size
124KB
-
MD5
d210543743e53660461de1290e34fb01
-
SHA1
d1fb8f0afd4197352d53d7e21cc5b6ba089edd85
-
SHA256
ea16529262ad797d760e167c1ccb62b5afc7c9c1c58053ecdc0b7aba27d75c3a
-
SHA512
e9fb7d0885b9f7e06af16aa2e2513615d40159d0153b5662b9c64c773a00ea62194d7279550175bbbd528c4a777d1384f2a1b268613e9c64ff0913f9a255bd3b
-
SSDEEP
3072:TZVHZkahOMNxGnkLXdgw7qYmhiGHUvwwA0i3X10OS5s:ikLtgw7qYuiG0vRo
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3640 msedge.exe 3640 msedge.exe 4492 msedge.exe 4492 msedge.exe 808 identity_helper.exe 808 identity_helper.exe 1828 msedge.exe 1828 msedge.exe 1828 msedge.exe 1828 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4492 wrote to memory of 5088 4492 msedge.exe 83 PID 4492 wrote to memory of 5088 4492 msedge.exe 83 PID 4492 wrote to memory of 3632 4492 msedge.exe 84 PID 4492 wrote to memory of 3632 4492 msedge.exe 84 PID 4492 wrote to memory of 3632 4492 msedge.exe 84 PID 4492 wrote to memory of 3632 4492 msedge.exe 84 PID 4492 wrote to memory of 3632 4492 msedge.exe 84 PID 4492 wrote to memory of 3632 4492 msedge.exe 84 PID 4492 wrote to memory of 3632 4492 msedge.exe 84 PID 4492 wrote to memory of 3632 4492 msedge.exe 84 PID 4492 wrote to memory of 3632 4492 msedge.exe 84 PID 4492 wrote to memory of 3632 4492 msedge.exe 84 PID 4492 wrote to memory of 3632 4492 msedge.exe 84 PID 4492 wrote to memory of 3632 4492 msedge.exe 84 PID 4492 wrote to memory of 3632 4492 msedge.exe 84 PID 4492 wrote to memory of 3632 4492 msedge.exe 84 PID 4492 wrote to memory of 3632 4492 msedge.exe 84 PID 4492 wrote to memory of 3632 4492 msedge.exe 84 PID 4492 wrote to memory of 3632 4492 msedge.exe 84 PID 4492 wrote to memory of 3632 4492 msedge.exe 84 PID 4492 wrote to memory of 3632 4492 msedge.exe 84 PID 4492 wrote to memory of 3632 4492 msedge.exe 84 PID 4492 wrote to memory of 3632 4492 msedge.exe 84 PID 4492 wrote to memory of 3632 4492 msedge.exe 84 PID 4492 wrote to memory of 3632 4492 msedge.exe 84 PID 4492 wrote to memory of 3632 4492 msedge.exe 84 PID 4492 wrote to memory of 3632 4492 msedge.exe 84 PID 4492 wrote to memory of 3632 4492 msedge.exe 84 PID 4492 wrote to memory of 3632 4492 msedge.exe 84 PID 4492 wrote to memory of 3632 4492 msedge.exe 84 PID 4492 wrote to memory of 3632 4492 msedge.exe 84 PID 4492 wrote to memory of 3632 4492 msedge.exe 84 PID 4492 wrote to memory of 3632 4492 msedge.exe 84 PID 4492 wrote to memory of 3632 4492 msedge.exe 84 PID 4492 wrote to memory of 3632 4492 msedge.exe 84 PID 4492 wrote to memory of 3632 4492 msedge.exe 84 PID 4492 wrote to memory of 3632 4492 msedge.exe 84 PID 4492 wrote to memory of 3632 4492 msedge.exe 84 PID 4492 wrote to memory of 3632 4492 msedge.exe 84 PID 4492 wrote to memory of 3632 4492 msedge.exe 84 PID 4492 wrote to memory of 3632 4492 msedge.exe 84 PID 4492 wrote to memory of 3632 4492 msedge.exe 84 PID 4492 wrote to memory of 3640 4492 msedge.exe 85 PID 4492 wrote to memory of 3640 4492 msedge.exe 85 PID 4492 wrote to memory of 1400 4492 msedge.exe 86 PID 4492 wrote to memory of 1400 4492 msedge.exe 86 PID 4492 wrote to memory of 1400 4492 msedge.exe 86 PID 4492 wrote to memory of 1400 4492 msedge.exe 86 PID 4492 wrote to memory of 1400 4492 msedge.exe 86 PID 4492 wrote to memory of 1400 4492 msedge.exe 86 PID 4492 wrote to memory of 1400 4492 msedge.exe 86 PID 4492 wrote to memory of 1400 4492 msedge.exe 86 PID 4492 wrote to memory of 1400 4492 msedge.exe 86 PID 4492 wrote to memory of 1400 4492 msedge.exe 86 PID 4492 wrote to memory of 1400 4492 msedge.exe 86 PID 4492 wrote to memory of 1400 4492 msedge.exe 86 PID 4492 wrote to memory of 1400 4492 msedge.exe 86 PID 4492 wrote to memory of 1400 4492 msedge.exe 86 PID 4492 wrote to memory of 1400 4492 msedge.exe 86 PID 4492 wrote to memory of 1400 4492 msedge.exe 86 PID 4492 wrote to memory of 1400 4492 msedge.exe 86 PID 4492 wrote to memory of 1400 4492 msedge.exe 86 PID 4492 wrote to memory of 1400 4492 msedge.exe 86 PID 4492 wrote to memory of 1400 4492 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\d210543743e53660461de1290e34fb01_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4492 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8af5e46f8,0x7ff8af5e4708,0x7ff8af5e47182⤵PID:5088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,70043383153702571,501995452059684424,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 /prefetch:22⤵PID:3632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2140,70043383153702571,501995452059684424,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2440 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2140,70043383153702571,501995452059684424,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2920 /prefetch:82⤵PID:1400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,70043383153702571,501995452059684424,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:12⤵PID:4024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,70043383153702571,501995452059684424,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:12⤵PID:3280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,70043383153702571,501995452059684424,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5212 /prefetch:12⤵PID:2140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,70043383153702571,501995452059684424,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5348 /prefetch:12⤵PID:4668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,70043383153702571,501995452059684424,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5488 /prefetch:12⤵PID:4996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,70043383153702571,501995452059684424,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5820 /prefetch:12⤵PID:4424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,70043383153702571,501995452059684424,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3112 /prefetch:82⤵PID:436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,70043383153702571,501995452059684424,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3112 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,70043383153702571,501995452059684424,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5408 /prefetch:12⤵PID:4296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,70043383153702571,501995452059684424,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5852 /prefetch:12⤵PID:4624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,70043383153702571,501995452059684424,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4168 /prefetch:12⤵PID:632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,70043383153702571,501995452059684424,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4764 /prefetch:12⤵PID:2244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,70043383153702571,501995452059684424,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5848 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1828
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2396
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4956
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ab8ce148cb7d44f709fb1c460d03e1b0
SHA144d15744015155f3e74580c93317e12d2cc0f859
SHA256014006a90e43ea9a1903b08b843a5aab8ad3823d22e26e5b113fad5f9fa620ff
SHA512f685423b1eaee18a2a06030b4b2977335f62499c0041c142a92f6e6f846c2b9ce54324b6ae94efbbb303282dcda70e2b1597c748fddc251c0b3122a412c2d7c4
-
Filesize
152B
MD538f59a47b777f2fc52088e96ffb2baaf
SHA1267224482588b41a96d813f6d9e9d924867062db
SHA25613569c5681c71dc42ab57d34879f5a567d7b94afe0e8f6d7c6f6c1314fb0087b
SHA5124657d13e1bb7cdd7e83f5f2562f5598cca12edf839626ae96da43e943b5550fab46a14b9018f1bec90de88cc714f637605531ccda99deb9e537908ddb826113b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD501cad555d04b980fec0260bd94c598ab
SHA17c724d6ac409f1e35d69b565862391b9e8d87369
SHA2561c25df8e2dc04fa5256fb527e47a0d7aeb9ab2e4d8bb223c58ccb78090dfd0b5
SHA5122f3ccb8921e24823abf43becdfacd2831b91df2913bd7237d77d4f1a43942016e93a0a86bba6f9a9c79598d8e7fdda536db5e637220a8a8d6155d4271e7d865b
-
Filesize
1KB
MD575152b69667b28293b632e940d0dc994
SHA1da9a3983f26c5b9a2ccd238f36adb7f18e5e12c0
SHA256e81ed708d8fd504342e2b987d1f4a340c373ab5be0aeef7ebcb329e803832696
SHA512766be4606fa539fda061a8175263191c3ad8caa1ec98655a0755e7db00c7819aa2c0ac5d873c73ce9dd14546137061bb10a55c495677fcf8e3adaf86168a4ed9
-
Filesize
6KB
MD5ff5dc85f1af86f528958fca018b6a79a
SHA1c76a2b0f012324284db88af3e14ecc8791954dd2
SHA256b4db9cb4c53e1e49245fd9aa9d2b2d0ffa52f69ae8a31ca5694f84fb0478eb38
SHA51260813469eb6d636f21af3f9a194339d00ed4a85f651d9ef26d3da7c2d225ee660ab6bb0a09ad36ac80721675ae944851ef11307e9ea3d03ee0abb6209edccd3f
-
Filesize
5KB
MD5a9774e8d16f31ff011b9b2f06aa3f971
SHA1d1c1953f4df6cf1c8d7fb87ec8c0f01ff737f265
SHA256c17cf988fb40bcca0114296e9b089761c8defd7c1b711c9beac24165e3a55ca3
SHA51209852ac69e63cb9f6225f0786b04fab8e207610c43570c85bd8c6453f3a5c5082e6f1383ddfb5ae41604eaad51873dbc781caefea80d5bff4afca8e7a323a7d6
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
8KB
MD588e2404c332283dfb4f592f9035a5442
SHA1e3986b41c2e2618ae42666a0a312443a786b57fc
SHA25678f3dea3e9fa859555e54c54fa83aa37e688e4b8ff028daf62f1dac9aff21bfd
SHA51222697f60772d8d65bdb6576dbb795157bc42c9ff8c6ac5195945e93eb90a6a4908db8e924beb543d3686e2f225fac2bc4bcce23c55338a5b4c1d55483dc6319d