Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08/09/2024, 02:23
Static task
static1
Behavioral task
behavioral1
Sample
d3510aa308a7e70b91f287de2204a4b2_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
d3510aa308a7e70b91f287de2204a4b2_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d3510aa308a7e70b91f287de2204a4b2_JaffaCakes118.html
-
Size
643B
-
MD5
d3510aa308a7e70b91f287de2204a4b2
-
SHA1
6fc6b0ff745515bfaf950e9c8661c568e99e08a0
-
SHA256
5e7d08b61ddff52221f23848a060320e685e434c2af26a243a29972409b97abf
-
SHA512
41d2488afaa471d96e0dbb169f75cbd27be912bc991fc3b1a1c3f2e5100d3ed5cd70ab9899fca35d4d0e9968f77d7f52f23b5f7f8c8358fac26b5f565c893635
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2088 msedge.exe 2088 msedge.exe 5020 msedge.exe 5020 msedge.exe 4780 identity_helper.exe 4780 identity_helper.exe 2504 msedge.exe 2504 msedge.exe 2504 msedge.exe 2504 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5020 wrote to memory of 2488 5020 msedge.exe 85 PID 5020 wrote to memory of 2488 5020 msedge.exe 85 PID 5020 wrote to memory of 2092 5020 msedge.exe 86 PID 5020 wrote to memory of 2092 5020 msedge.exe 86 PID 5020 wrote to memory of 2092 5020 msedge.exe 86 PID 5020 wrote to memory of 2092 5020 msedge.exe 86 PID 5020 wrote to memory of 2092 5020 msedge.exe 86 PID 5020 wrote to memory of 2092 5020 msedge.exe 86 PID 5020 wrote to memory of 2092 5020 msedge.exe 86 PID 5020 wrote to memory of 2092 5020 msedge.exe 86 PID 5020 wrote to memory of 2092 5020 msedge.exe 86 PID 5020 wrote to memory of 2092 5020 msedge.exe 86 PID 5020 wrote to memory of 2092 5020 msedge.exe 86 PID 5020 wrote to memory of 2092 5020 msedge.exe 86 PID 5020 wrote to memory of 2092 5020 msedge.exe 86 PID 5020 wrote to memory of 2092 5020 msedge.exe 86 PID 5020 wrote to memory of 2092 5020 msedge.exe 86 PID 5020 wrote to memory of 2092 5020 msedge.exe 86 PID 5020 wrote to memory of 2092 5020 msedge.exe 86 PID 5020 wrote to memory of 2092 5020 msedge.exe 86 PID 5020 wrote to memory of 2092 5020 msedge.exe 86 PID 5020 wrote to memory of 2092 5020 msedge.exe 86 PID 5020 wrote to memory of 2092 5020 msedge.exe 86 PID 5020 wrote to memory of 2092 5020 msedge.exe 86 PID 5020 wrote to memory of 2092 5020 msedge.exe 86 PID 5020 wrote to memory of 2092 5020 msedge.exe 86 PID 5020 wrote to memory of 2092 5020 msedge.exe 86 PID 5020 wrote to memory of 2092 5020 msedge.exe 86 PID 5020 wrote to memory of 2092 5020 msedge.exe 86 PID 5020 wrote to memory of 2092 5020 msedge.exe 86 PID 5020 wrote to memory of 2092 5020 msedge.exe 86 PID 5020 wrote to memory of 2092 5020 msedge.exe 86 PID 5020 wrote to memory of 2092 5020 msedge.exe 86 PID 5020 wrote to memory of 2092 5020 msedge.exe 86 PID 5020 wrote to memory of 2092 5020 msedge.exe 86 PID 5020 wrote to memory of 2092 5020 msedge.exe 86 PID 5020 wrote to memory of 2092 5020 msedge.exe 86 PID 5020 wrote to memory of 2092 5020 msedge.exe 86 PID 5020 wrote to memory of 2092 5020 msedge.exe 86 PID 5020 wrote to memory of 2092 5020 msedge.exe 86 PID 5020 wrote to memory of 2092 5020 msedge.exe 86 PID 5020 wrote to memory of 2092 5020 msedge.exe 86 PID 5020 wrote to memory of 2088 5020 msedge.exe 87 PID 5020 wrote to memory of 2088 5020 msedge.exe 87 PID 5020 wrote to memory of 4820 5020 msedge.exe 88 PID 5020 wrote to memory of 4820 5020 msedge.exe 88 PID 5020 wrote to memory of 4820 5020 msedge.exe 88 PID 5020 wrote to memory of 4820 5020 msedge.exe 88 PID 5020 wrote to memory of 4820 5020 msedge.exe 88 PID 5020 wrote to memory of 4820 5020 msedge.exe 88 PID 5020 wrote to memory of 4820 5020 msedge.exe 88 PID 5020 wrote to memory of 4820 5020 msedge.exe 88 PID 5020 wrote to memory of 4820 5020 msedge.exe 88 PID 5020 wrote to memory of 4820 5020 msedge.exe 88 PID 5020 wrote to memory of 4820 5020 msedge.exe 88 PID 5020 wrote to memory of 4820 5020 msedge.exe 88 PID 5020 wrote to memory of 4820 5020 msedge.exe 88 PID 5020 wrote to memory of 4820 5020 msedge.exe 88 PID 5020 wrote to memory of 4820 5020 msedge.exe 88 PID 5020 wrote to memory of 4820 5020 msedge.exe 88 PID 5020 wrote to memory of 4820 5020 msedge.exe 88 PID 5020 wrote to memory of 4820 5020 msedge.exe 88 PID 5020 wrote to memory of 4820 5020 msedge.exe 88 PID 5020 wrote to memory of 4820 5020 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\d3510aa308a7e70b91f287de2204a4b2_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5020 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd101246f8,0x7ffd10124708,0x7ffd101247182⤵PID:2488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2012,9498930822865078949,6442342335179794272,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1920 /prefetch:22⤵PID:2092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2012,9498930822865078949,6442342335179794272,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2388 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2012,9498930822865078949,6442342335179794272,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2900 /prefetch:82⤵PID:4820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,9498930822865078949,6442342335179794272,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:2440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,9498930822865078949,6442342335179794272,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,9498930822865078949,6442342335179794272,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4236 /prefetch:12⤵PID:3160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,9498930822865078949,6442342335179794272,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3864 /prefetch:12⤵PID:2968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2012,9498930822865078949,6442342335179794272,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3348 /prefetch:82⤵PID:4448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2012,9498930822865078949,6442342335179794272,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3348 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,9498930822865078949,6442342335179794272,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5316 /prefetch:12⤵PID:4912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,9498930822865078949,6442342335179794272,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4904 /prefetch:12⤵PID:3312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,9498930822865078949,6442342335179794272,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4172 /prefetch:12⤵PID:1004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,9498930822865078949,6442342335179794272,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5764 /prefetch:12⤵PID:2076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2012,9498930822865078949,6442342335179794272,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1048 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2504
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:840
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1360
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e4f80e7950cbd3bb11257d2000cb885e
SHA110ac643904d539042d8f7aa4a312b13ec2106035
SHA2561184ee8d32d0edecddd93403fb888fad6b3e2a710d37335c3989cc529bc08124
SHA5122b92c9807fdcd937e514d4e7e1cc7c2d3e3aa162099b7289ceac2feea72d1a4afbadf1c09b3075d470efadf9a9edd63e07ea7e7a98d22243e45b3d53473fa4f0
-
Filesize
152B
MD52dc1a9f2f3f8c3cfe51bb29b078166c5
SHA1eaf3c3dad3c8dc6f18dc3e055b415da78b704402
SHA256dcb76fa365c2d9ee213b224a91cdd806d30b1e8652d72a22f2371124fa4479fa
SHA512682061d9cc86a6e5d99d022da776fb554350fc95efbf29cd84c1db4e2b7161b76cd1de48335bcc3a25633079fb0bd412e4f4795ed6291c65e9bc28d95330bb25
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD5007ac5d07b3db28120473363295c8a3e
SHA1cffb1828dfa4166de129c7e185ac0d1d3df99484
SHA2568da591410ae130736216afa881be5df01555e722e3dbeffebb764f7162175875
SHA51290db8ae62cfdfddde870440934d98a16499e8631b8b779dd9978252c5b5f973078b48093d31858b1d63024460e402c807bdddb6f26165d5a4fbce7512e86e2a2
-
Filesize
1KB
MD5a6963fa75ce36fbc7be9026633d38ab4
SHA1ee5ce32efb5864d2a8aa5f7036bf1bbdb37394d4
SHA256250e1aadea5440ff433ba175c73b4a78ba36baad32180331b5e0424c2fabf7a5
SHA512c471d2f2bc8a84c4cf40b077fcab51e88ea124c61867611e5a5cd7296ecfb2141fb35c95c4087376eee62f09e5d9687e415c33c5732f112240ccfe8088dd3345
-
Filesize
5KB
MD5435c003836935f078519eb5826c9cce3
SHA1e62c58419f9a4886822dc0c0d5a68768d2d0b215
SHA256396c6550b02981c1d2b0be61f2321d7c11623744acf6db5970cbf126b942c23a
SHA5128006b87f1904278d7d6e6a51db34c4b2bc2a3d3dd46eee42cba99026bd20f306fb73b4f8b39185c37c20a3d78ee1fb32bf8fcf25b71f5082e61b9435c2e4fed8
-
Filesize
6KB
MD58172a359e6459599ff39973e80ac8d7e
SHA1c3f6d77c164578f174264b418393bef639e62c28
SHA25646aef075d55bcccb7dfe0a8fe5b8a8541034da289c971093513d63e98d3a5589
SHA512dc0c649980e37b97e04925836e581d457d269c0a018ace81a8155d56b4d3fa101ab31a8ae27df682f2051934765558f4c8dcd214e2a217bf042029f0b2ddc07e
-
Filesize
6KB
MD546aa1c5d98ec849ee94e2dd869091ee9
SHA14d37262c7d170ef34f88aaf4c5d0417835769fe1
SHA2569579e580beafb2f149cf8ad22618ee9974585bb314cd310fb766525b0eb90bc1
SHA51222b76958af8ab74dbe5c84b8054afceba8b9ae9c593af548cfafead0f465e638c29f4fc5d1b059f6d4a9bdef164d7ac794438883f159d82441b5e76d74701774
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5cbde754212490ed030a55e3d136cb5db
SHA176666e533d040bac53c553fbe23a501fe0472c61
SHA25660acf42b049bd6e943e685ba53c7e2c1c2ab47567787fa662ce067aea5073232
SHA5129ae062c8c69d876ba3808d275d437103d6fd9a2629d8dbbf31c578e365b21f76eccb53dbb3b6dfd0767bf1295562cd8c7c7feb8562f68a0c46499ab2deac5b24