Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07-09-2024 19:43
Static task
static1
Behavioral task
behavioral1
Sample
d2b2dafd85c60f7f370fac398cebe6ea_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d2b2dafd85c60f7f370fac398cebe6ea_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d2b2dafd85c60f7f370fac398cebe6ea_JaffaCakes118.html
-
Size
426KB
-
MD5
d2b2dafd85c60f7f370fac398cebe6ea
-
SHA1
f45756c94e92414a0e0941a3500c2373d248485d
-
SHA256
46dd56c9d10d73e9c9ca054a7903155358c84f86410c156f51688d4fd0689427
-
SHA512
18c96db146d63edded36251c2389f10b87e9cd15ec0889661946790518a604b803915dab3d19ec77e97eac307df218a7e33f6ecfaf17bbac7903cf008d6c8b8c
-
SSDEEP
3072:V5mzOkGqALX2Zpj2S4y0IAUMu/HpSp7V4GME4:II4pDMu/Qg
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 22 drive.google.com 43 drive.google.com 45 drive.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3620 msedge.exe 3620 msedge.exe 4160 msedge.exe 4160 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe 4160 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4160 wrote to memory of 3096 4160 msedge.exe 83 PID 4160 wrote to memory of 3096 4160 msedge.exe 83 PID 4160 wrote to memory of 2940 4160 msedge.exe 84 PID 4160 wrote to memory of 2940 4160 msedge.exe 84 PID 4160 wrote to memory of 2940 4160 msedge.exe 84 PID 4160 wrote to memory of 2940 4160 msedge.exe 84 PID 4160 wrote to memory of 2940 4160 msedge.exe 84 PID 4160 wrote to memory of 2940 4160 msedge.exe 84 PID 4160 wrote to memory of 2940 4160 msedge.exe 84 PID 4160 wrote to memory of 2940 4160 msedge.exe 84 PID 4160 wrote to memory of 2940 4160 msedge.exe 84 PID 4160 wrote to memory of 2940 4160 msedge.exe 84 PID 4160 wrote to memory of 2940 4160 msedge.exe 84 PID 4160 wrote to memory of 2940 4160 msedge.exe 84 PID 4160 wrote to memory of 2940 4160 msedge.exe 84 PID 4160 wrote to memory of 2940 4160 msedge.exe 84 PID 4160 wrote to memory of 2940 4160 msedge.exe 84 PID 4160 wrote to memory of 2940 4160 msedge.exe 84 PID 4160 wrote to memory of 2940 4160 msedge.exe 84 PID 4160 wrote to memory of 2940 4160 msedge.exe 84 PID 4160 wrote to memory of 2940 4160 msedge.exe 84 PID 4160 wrote to memory of 2940 4160 msedge.exe 84 PID 4160 wrote to memory of 2940 4160 msedge.exe 84 PID 4160 wrote to memory of 2940 4160 msedge.exe 84 PID 4160 wrote to memory of 2940 4160 msedge.exe 84 PID 4160 wrote to memory of 2940 4160 msedge.exe 84 PID 4160 wrote to memory of 2940 4160 msedge.exe 84 PID 4160 wrote to memory of 2940 4160 msedge.exe 84 PID 4160 wrote to memory of 2940 4160 msedge.exe 84 PID 4160 wrote to memory of 2940 4160 msedge.exe 84 PID 4160 wrote to memory of 2940 4160 msedge.exe 84 PID 4160 wrote to memory of 2940 4160 msedge.exe 84 PID 4160 wrote to memory of 2940 4160 msedge.exe 84 PID 4160 wrote to memory of 2940 4160 msedge.exe 84 PID 4160 wrote to memory of 2940 4160 msedge.exe 84 PID 4160 wrote to memory of 2940 4160 msedge.exe 84 PID 4160 wrote to memory of 2940 4160 msedge.exe 84 PID 4160 wrote to memory of 2940 4160 msedge.exe 84 PID 4160 wrote to memory of 2940 4160 msedge.exe 84 PID 4160 wrote to memory of 2940 4160 msedge.exe 84 PID 4160 wrote to memory of 2940 4160 msedge.exe 84 PID 4160 wrote to memory of 2940 4160 msedge.exe 84 PID 4160 wrote to memory of 3620 4160 msedge.exe 85 PID 4160 wrote to memory of 3620 4160 msedge.exe 85 PID 4160 wrote to memory of 3932 4160 msedge.exe 86 PID 4160 wrote to memory of 3932 4160 msedge.exe 86 PID 4160 wrote to memory of 3932 4160 msedge.exe 86 PID 4160 wrote to memory of 3932 4160 msedge.exe 86 PID 4160 wrote to memory of 3932 4160 msedge.exe 86 PID 4160 wrote to memory of 3932 4160 msedge.exe 86 PID 4160 wrote to memory of 3932 4160 msedge.exe 86 PID 4160 wrote to memory of 3932 4160 msedge.exe 86 PID 4160 wrote to memory of 3932 4160 msedge.exe 86 PID 4160 wrote to memory of 3932 4160 msedge.exe 86 PID 4160 wrote to memory of 3932 4160 msedge.exe 86 PID 4160 wrote to memory of 3932 4160 msedge.exe 86 PID 4160 wrote to memory of 3932 4160 msedge.exe 86 PID 4160 wrote to memory of 3932 4160 msedge.exe 86 PID 4160 wrote to memory of 3932 4160 msedge.exe 86 PID 4160 wrote to memory of 3932 4160 msedge.exe 86 PID 4160 wrote to memory of 3932 4160 msedge.exe 86 PID 4160 wrote to memory of 3932 4160 msedge.exe 86 PID 4160 wrote to memory of 3932 4160 msedge.exe 86 PID 4160 wrote to memory of 3932 4160 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\d2b2dafd85c60f7f370fac398cebe6ea_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4160 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffc77046f8,0x7fffc7704708,0x7fffc77047182⤵PID:3096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,6476391046090865034,8271562688909900540,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:22⤵PID:2940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,6476391046090865034,8271562688909900540,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,6476391046090865034,8271562688909900540,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2836 /prefetch:82⤵PID:3932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,6476391046090865034,8271562688909900540,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3192 /prefetch:12⤵PID:4440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,6476391046090865034,8271562688909900540,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3204 /prefetch:12⤵PID:2148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,6476391046090865034,8271562688909900540,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4804 /prefetch:12⤵PID:1908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,6476391046090865034,8271562688909900540,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4948 /prefetch:12⤵PID:1160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,6476391046090865034,8271562688909900540,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5340 /prefetch:12⤵PID:4892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,6476391046090865034,8271562688909900540,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5064 /prefetch:12⤵PID:3468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,6476391046090865034,8271562688909900540,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4960 /prefetch:12⤵PID:4268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,6476391046090865034,8271562688909900540,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5524 /prefetch:12⤵PID:2708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,6476391046090865034,8271562688909900540,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6028 /prefetch:12⤵PID:1884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,6476391046090865034,8271562688909900540,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3012 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1876
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4480
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2276
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d7114a6cd851f9bf56cf771c37d664a2
SHA1769c5d04fd83e583f15ab1ef659de8f883ecab8a
SHA256d2c75c7d68c474d4b8847b4ba6cfd09fe90717f46dd398c86483d825a66e977e
SHA51233bdae2305ae98e7c0de576de5a6600bd70a425e7b891d745cba9de992036df1b3d1df9572edb0f89f320e50962d06532dae9491985b6b57fd37d5f46f7a2ff8
-
Filesize
152B
MD5719923124ee00fb57378e0ebcbe894f7
SHA1cc356a7d27b8b27dc33f21bd4990f286ee13a9f9
SHA256aa22ab845fa08c786bd3366ec39f733d5be80e9ac933ed115ff048ff30090808
SHA512a207b6646500d0d504cf70ee10f57948e58dab7f214ad2e7c4af0e7ca23ce1d37c8c745873137e6c55bdcf0f527031a66d9cc54805a0eac3678be6dd497a5bbc
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize168B
MD570b14a47d8f5aea70ccfe6a5afd3df68
SHA12d540844cbf47b1ffaac5fcf3b19ff759f64fa35
SHA2568e65a56357785d03f18e3b4b66b71a0bd0964c4ac78472d3d92e948abb2b6e82
SHA51269880d7cd730a2a43c9035f5c31de38eeda22cb0852d05cbdc46695699383232f48ac4ae9ff76fbb328de7883de84c8409a76ea271d1c681932ff03a1cb98839
-
Filesize
3KB
MD5e759941cb7d8b4e9af506803b19a0c98
SHA1f6f5a647389b226c13071fb88cf53b692d7ab79a
SHA2569a54c057bbcb03fb769fd143ae922f55b6d573a57395b646f1f17a0e9d07570c
SHA512cdac0a2835d7a8cab345bf35893185c65fc1bc89b9c98aaeb4adc64f76728b8a996c411dc71410b3bef8fd0e2c38d51df57c7f1e3a2fe6ef4b30098e73d3ba13
-
Filesize
5KB
MD57f951205ae006c77fc6714e67d3c83dc
SHA1942167122c45559cea19a109bba100db00aac02b
SHA2566d47438bdc962d0718280617ec1022bb624354f6ae707da31a9b6b1a311fdb50
SHA5126072e047cd94d544972bba3d8fc3964aab0a612e4caa15b5859e7c067e2e5482d9116d537378ddcef33d4fc1c1c3c945d6c639c7d5bbbb77c1c3b0cf79f96cfc
-
Filesize
7KB
MD560e405d3b2b75f2e747d324a4f79fea3
SHA17bfdf072401cdc0ae57e755c90c14404b6be948f
SHA25631cdcc34538d196d71e00232b84eff67fe0de66cef30862b374cf6113f55f342
SHA512f39189114204fb23ba8ed830b2101b966753ea1d3949b83a72f78d58e77788cf7cf77b0c3692a1b11f808047428854d2a775ea3fff37758d276c4666a0f1bc0b
-
Filesize
10KB
MD53925c6c5a05117b12f0e313daf7d640f
SHA1d100ee91831f71cb6a8577fecf89cbb378ce86fc
SHA256b5c7f853ef52233258bdf5560a5aec16d7598a71c67d7eaa253788bc41dfe480
SHA512d8a5757b4c6e4022c3ea2134e5dbac052f9773615a04363f2ebc22836dc114781cf7d833a6638f969d1b94754c4115d6c9c90431d00eab521f2d7fd8b7966032