Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08/09/2024, 09:18
Static task
static1
Behavioral task
behavioral1
Sample
d405a35e3e73ffee924811e36b0ca01a_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
d405a35e3e73ffee924811e36b0ca01a_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d405a35e3e73ffee924811e36b0ca01a_JaffaCakes118.html
-
Size
175KB
-
MD5
d405a35e3e73ffee924811e36b0ca01a
-
SHA1
6b5d10a7f79667953a7acdbf655f23d62f890200
-
SHA256
174f025f98ee4e50c3f25a4c395c6e4b4ac19fab07a28b5a0e16844061c9fb8a
-
SHA512
11ca7b7f426c62637f1e3426b8475b71e57c9a74ca41c8aadd7b7b04b8e84e8ca64b4c3e8fc111f0e041344260d9daa10bf3e2515e8a0d62a80366e47d617fc5
-
SSDEEP
1536:Sqtz8hd8Wu8pI8Cd8hd8dQg0H//3oS3iGNkF6YfBCJisL+aeTH+WK/Lf1/hmnVSV:SOoT3i/F7BCJifm
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2028 msedge.exe 2028 msedge.exe 532 msedge.exe 532 msedge.exe 984 identity_helper.exe 984 identity_helper.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 532 wrote to memory of 4696 532 msedge.exe 83 PID 532 wrote to memory of 4696 532 msedge.exe 83 PID 532 wrote to memory of 1928 532 msedge.exe 84 PID 532 wrote to memory of 1928 532 msedge.exe 84 PID 532 wrote to memory of 1928 532 msedge.exe 84 PID 532 wrote to memory of 1928 532 msedge.exe 84 PID 532 wrote to memory of 1928 532 msedge.exe 84 PID 532 wrote to memory of 1928 532 msedge.exe 84 PID 532 wrote to memory of 1928 532 msedge.exe 84 PID 532 wrote to memory of 1928 532 msedge.exe 84 PID 532 wrote to memory of 1928 532 msedge.exe 84 PID 532 wrote to memory of 1928 532 msedge.exe 84 PID 532 wrote to memory of 1928 532 msedge.exe 84 PID 532 wrote to memory of 1928 532 msedge.exe 84 PID 532 wrote to memory of 1928 532 msedge.exe 84 PID 532 wrote to memory of 1928 532 msedge.exe 84 PID 532 wrote to memory of 1928 532 msedge.exe 84 PID 532 wrote to memory of 1928 532 msedge.exe 84 PID 532 wrote to memory of 1928 532 msedge.exe 84 PID 532 wrote to memory of 1928 532 msedge.exe 84 PID 532 wrote to memory of 1928 532 msedge.exe 84 PID 532 wrote to memory of 1928 532 msedge.exe 84 PID 532 wrote to memory of 1928 532 msedge.exe 84 PID 532 wrote to memory of 1928 532 msedge.exe 84 PID 532 wrote to memory of 1928 532 msedge.exe 84 PID 532 wrote to memory of 1928 532 msedge.exe 84 PID 532 wrote to memory of 1928 532 msedge.exe 84 PID 532 wrote to memory of 1928 532 msedge.exe 84 PID 532 wrote to memory of 1928 532 msedge.exe 84 PID 532 wrote to memory of 1928 532 msedge.exe 84 PID 532 wrote to memory of 1928 532 msedge.exe 84 PID 532 wrote to memory of 1928 532 msedge.exe 84 PID 532 wrote to memory of 1928 532 msedge.exe 84 PID 532 wrote to memory of 1928 532 msedge.exe 84 PID 532 wrote to memory of 1928 532 msedge.exe 84 PID 532 wrote to memory of 1928 532 msedge.exe 84 PID 532 wrote to memory of 1928 532 msedge.exe 84 PID 532 wrote to memory of 1928 532 msedge.exe 84 PID 532 wrote to memory of 1928 532 msedge.exe 84 PID 532 wrote to memory of 1928 532 msedge.exe 84 PID 532 wrote to memory of 1928 532 msedge.exe 84 PID 532 wrote to memory of 1928 532 msedge.exe 84 PID 532 wrote to memory of 2028 532 msedge.exe 85 PID 532 wrote to memory of 2028 532 msedge.exe 85 PID 532 wrote to memory of 2268 532 msedge.exe 86 PID 532 wrote to memory of 2268 532 msedge.exe 86 PID 532 wrote to memory of 2268 532 msedge.exe 86 PID 532 wrote to memory of 2268 532 msedge.exe 86 PID 532 wrote to memory of 2268 532 msedge.exe 86 PID 532 wrote to memory of 2268 532 msedge.exe 86 PID 532 wrote to memory of 2268 532 msedge.exe 86 PID 532 wrote to memory of 2268 532 msedge.exe 86 PID 532 wrote to memory of 2268 532 msedge.exe 86 PID 532 wrote to memory of 2268 532 msedge.exe 86 PID 532 wrote to memory of 2268 532 msedge.exe 86 PID 532 wrote to memory of 2268 532 msedge.exe 86 PID 532 wrote to memory of 2268 532 msedge.exe 86 PID 532 wrote to memory of 2268 532 msedge.exe 86 PID 532 wrote to memory of 2268 532 msedge.exe 86 PID 532 wrote to memory of 2268 532 msedge.exe 86 PID 532 wrote to memory of 2268 532 msedge.exe 86 PID 532 wrote to memory of 2268 532 msedge.exe 86 PID 532 wrote to memory of 2268 532 msedge.exe 86 PID 532 wrote to memory of 2268 532 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\d405a35e3e73ffee924811e36b0ca01a_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:532 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff6d0846f8,0x7fff6d084708,0x7fff6d0847182⤵PID:4696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1992,13088132104293684219,794892111121017906,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:22⤵PID:1928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1992,13088132104293684219,794892111121017906,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2212 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1992,13088132104293684219,794892111121017906,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2752 /prefetch:82⤵PID:2268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1992,13088132104293684219,794892111121017906,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1992,13088132104293684219,794892111121017906,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1992,13088132104293684219,794892111121017906,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4660 /prefetch:12⤵PID:440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1992,13088132104293684219,794892111121017906,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4824 /prefetch:12⤵PID:1404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1992,13088132104293684219,794892111121017906,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5292 /prefetch:12⤵PID:4252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1992,13088132104293684219,794892111121017906,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5480 /prefetch:12⤵PID:932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1992,13088132104293684219,794892111121017906,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5708 /prefetch:82⤵PID:4572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1992,13088132104293684219,794892111121017906,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5708 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1992,13088132104293684219,794892111121017906,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5756 /prefetch:12⤵PID:4048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1992,13088132104293684219,794892111121017906,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5772 /prefetch:12⤵PID:1000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1992,13088132104293684219,794892111121017906,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5472 /prefetch:12⤵PID:1972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1992,13088132104293684219,794892111121017906,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6012 /prefetch:12⤵PID:2620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1992,13088132104293684219,794892111121017906,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2292 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4500
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:312
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3448
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2968
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5111c361619c017b5d09a13a56938bd54
SHA1e02b363a8ceb95751623f25025a9299a2c931e07
SHA256d7be4042a1e3511b0dbf0ab5c493245e4ac314440a4ae0732813db01a21ef8bc
SHA512fc16a4ad0b56899b82d05114d7b0ca8ee610cdba6ff0b6a67dea44faf17b3105109335359b78c0a59c9011a13152744a7f5d4f6a5b66ea519df750ef03f622b2
-
Filesize
152B
MD5983cbc1f706a155d63496ebc4d66515e
SHA1223d0071718b80cad9239e58c5e8e64df6e2a2fe
SHA256cc34b8f8e3f4bfe4c9a227d88f56ea2dd276ca3ac81df622ff5e9a8ec46b951c
SHA512d9cf2ca46d9379902730c81e615a3eb694873ffd535c6bb3ded2dc97cdbbfb71051ab11a07754ed6f610f04285605b702b5a48a6cfda3ee3287230c41c9c45cd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize384B
MD5399bfc994ec9ecf375eee83ff764e956
SHA149ed4a9d70c7ceeab858f7a80b07318e28443590
SHA256ac75730672f48bd78ef9fe7ced1044b52db562f7a394fbc137288a73e23ac083
SHA512b741f985e5cfe068e4eed3d3fe076fc4ad75f44bdab5d877550c3ac9fc8fddd7d8d7648ca4ab0336c327bb5490524d7b3d063d8fa5a066a9cf994f5be60f864d
-
Filesize
2KB
MD547880b3cdeb5d9ce04acf4348abfe37a
SHA18c77c768f0adb0bde5651dfb8d05ebb8da1a97bb
SHA256594b2a1ef79af0879cd8370713cd05c3665e901c3a21f36c4d5dea32ab301b77
SHA512c2facb1f49b135ba1bb3c84b121bf827f61bebcc3b65e812ab965b8a8b7937bc3aedae257fee47d4262d71297ff6dc14e6f5dccbfab9e420d812afdef2858ae3
-
Filesize
2KB
MD5506a5338a40c39b2238a55e41b4bd2a2
SHA10d44bd8bc91d31e2baebb1d28fa8a0eaf8f36142
SHA25601fccfd9c614e929ee3d59c1b4f4d4851528376771b34d66dda198d4ca9785d8
SHA512602e4c338d640c0710aeb71905b099ea808e29611cec71f29dd96e710a693c29f3ffd11cc6e03f42c1e52381cf995e6b0d860017f1939e5fd60f5f137aba3559
-
Filesize
5KB
MD54a6026dd78f93689601aae3ea828c80a
SHA1880fa05c0c6e810c5dd8e9e7622860812b06012f
SHA2563a52a3ad46b6684e164ccc8748a668941694c16e36dfea622fdf77f4a854b415
SHA512df5356f97546f7bc22903ca2035c1e2cd3bc7aa4fcbb9192a9bae9dc24bdfb1df55db712b40228d3ac42eee7659096e9d8a92e3b68d594e820c391cd1a297c2b
-
Filesize
7KB
MD5f521924fa7ce5e55f5c1079906d18860
SHA124df22bed378eecac6fe4d44828065b4a4eae71e
SHA256217b29da43b27a40838ff3c982a341f46444e82a8f73864640bab75216584a6b
SHA512632e2dcfefe8b04d62c2c9ed910a2c77de3ed529f2c06203898941704c251e584d7e69424cd6863cb58fa618c7c7f7c864f268366a093bd2e16659599e60cdac
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5c5a1c177087de667d187208c3cb3fdea
SHA1d887aa0ce3cdf68b735141e4c9a6baf98f68eae4
SHA256aa142434a89b1a0462ea15879d6958929c1041a2824e61759982d80ed4cf43da
SHA512e344f1c0993df7ef922119d509c29054ae89f63a11fd09afd0bdcb373de780c8fbb2bbaf71c7a9f385d3e2040b840ca58be7f715fbe1d69b8b23f974e53dc474