Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08-09-2024 12:33
Static task
static1
Behavioral task
behavioral1
Sample
d45ee26c36161502be56af1b17bdb9c2_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d45ee26c36161502be56af1b17bdb9c2_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d45ee26c36161502be56af1b17bdb9c2_JaffaCakes118.html
-
Size
12KB
-
MD5
d45ee26c36161502be56af1b17bdb9c2
-
SHA1
0a3ee70a2bbdbfc95c58e744f46f503d77f464f2
-
SHA256
91d32736ad213db89fa26702bc47f6aaf81e31d16f398fcc03df267d56d8c7c5
-
SHA512
c01cf391903fdff16a39bce84431f4f5bc114dbc1b1bd4df5bad6fc6defcda735fb04d31c88e8d5d9c206e2fba02236b6986607f5c6b18c59eb7f6342d9dc9f4
-
SSDEEP
192:SHShD5jcGkzF0Q9jG+ViZCt6a2SwdgtPBF4Fw26NZpwIDcmPul57lmP3KTAL3vV:/jcbF0Q9jGkoBRm5BF4g7wHmm92V
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2716 msedge.exe 2716 msedge.exe 2652 msedge.exe 2652 msedge.exe 2756 identity_helper.exe 2756 identity_helper.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe 3356 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2652 wrote to memory of 5020 2652 msedge.exe 83 PID 2652 wrote to memory of 5020 2652 msedge.exe 83 PID 2652 wrote to memory of 1416 2652 msedge.exe 84 PID 2652 wrote to memory of 1416 2652 msedge.exe 84 PID 2652 wrote to memory of 1416 2652 msedge.exe 84 PID 2652 wrote to memory of 1416 2652 msedge.exe 84 PID 2652 wrote to memory of 1416 2652 msedge.exe 84 PID 2652 wrote to memory of 1416 2652 msedge.exe 84 PID 2652 wrote to memory of 1416 2652 msedge.exe 84 PID 2652 wrote to memory of 1416 2652 msedge.exe 84 PID 2652 wrote to memory of 1416 2652 msedge.exe 84 PID 2652 wrote to memory of 1416 2652 msedge.exe 84 PID 2652 wrote to memory of 1416 2652 msedge.exe 84 PID 2652 wrote to memory of 1416 2652 msedge.exe 84 PID 2652 wrote to memory of 1416 2652 msedge.exe 84 PID 2652 wrote to memory of 1416 2652 msedge.exe 84 PID 2652 wrote to memory of 1416 2652 msedge.exe 84 PID 2652 wrote to memory of 1416 2652 msedge.exe 84 PID 2652 wrote to memory of 1416 2652 msedge.exe 84 PID 2652 wrote to memory of 1416 2652 msedge.exe 84 PID 2652 wrote to memory of 1416 2652 msedge.exe 84 PID 2652 wrote to memory of 1416 2652 msedge.exe 84 PID 2652 wrote to memory of 1416 2652 msedge.exe 84 PID 2652 wrote to memory of 1416 2652 msedge.exe 84 PID 2652 wrote to memory of 1416 2652 msedge.exe 84 PID 2652 wrote to memory of 1416 2652 msedge.exe 84 PID 2652 wrote to memory of 1416 2652 msedge.exe 84 PID 2652 wrote to memory of 1416 2652 msedge.exe 84 PID 2652 wrote to memory of 1416 2652 msedge.exe 84 PID 2652 wrote to memory of 1416 2652 msedge.exe 84 PID 2652 wrote to memory of 1416 2652 msedge.exe 84 PID 2652 wrote to memory of 1416 2652 msedge.exe 84 PID 2652 wrote to memory of 1416 2652 msedge.exe 84 PID 2652 wrote to memory of 1416 2652 msedge.exe 84 PID 2652 wrote to memory of 1416 2652 msedge.exe 84 PID 2652 wrote to memory of 1416 2652 msedge.exe 84 PID 2652 wrote to memory of 1416 2652 msedge.exe 84 PID 2652 wrote to memory of 1416 2652 msedge.exe 84 PID 2652 wrote to memory of 1416 2652 msedge.exe 84 PID 2652 wrote to memory of 1416 2652 msedge.exe 84 PID 2652 wrote to memory of 1416 2652 msedge.exe 84 PID 2652 wrote to memory of 1416 2652 msedge.exe 84 PID 2652 wrote to memory of 2716 2652 msedge.exe 85 PID 2652 wrote to memory of 2716 2652 msedge.exe 85 PID 2652 wrote to memory of 2544 2652 msedge.exe 86 PID 2652 wrote to memory of 2544 2652 msedge.exe 86 PID 2652 wrote to memory of 2544 2652 msedge.exe 86 PID 2652 wrote to memory of 2544 2652 msedge.exe 86 PID 2652 wrote to memory of 2544 2652 msedge.exe 86 PID 2652 wrote to memory of 2544 2652 msedge.exe 86 PID 2652 wrote to memory of 2544 2652 msedge.exe 86 PID 2652 wrote to memory of 2544 2652 msedge.exe 86 PID 2652 wrote to memory of 2544 2652 msedge.exe 86 PID 2652 wrote to memory of 2544 2652 msedge.exe 86 PID 2652 wrote to memory of 2544 2652 msedge.exe 86 PID 2652 wrote to memory of 2544 2652 msedge.exe 86 PID 2652 wrote to memory of 2544 2652 msedge.exe 86 PID 2652 wrote to memory of 2544 2652 msedge.exe 86 PID 2652 wrote to memory of 2544 2652 msedge.exe 86 PID 2652 wrote to memory of 2544 2652 msedge.exe 86 PID 2652 wrote to memory of 2544 2652 msedge.exe 86 PID 2652 wrote to memory of 2544 2652 msedge.exe 86 PID 2652 wrote to memory of 2544 2652 msedge.exe 86 PID 2652 wrote to memory of 2544 2652 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\d45ee26c36161502be56af1b17bdb9c2_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa0a3d46f8,0x7ffa0a3d4708,0x7ffa0a3d47182⤵PID:5020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2228,7429230735951599094,17335383295308669970,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2240 /prefetch:22⤵PID:1416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2228,7429230735951599094,17335383295308669970,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2296 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2228,7429230735951599094,17335383295308669970,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2764 /prefetch:82⤵PID:2544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,7429230735951599094,17335383295308669970,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:3136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,7429230735951599094,17335383295308669970,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:2948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,7429230735951599094,17335383295308669970,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4212 /prefetch:12⤵PID:4956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,7429230735951599094,17335383295308669970,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5188 /prefetch:12⤵PID:1432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,7429230735951599094,17335383295308669970,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5544 /prefetch:12⤵PID:2004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2228,7429230735951599094,17335383295308669970,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5816 /prefetch:82⤵PID:4888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2228,7429230735951599094,17335383295308669970,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5816 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,7429230735951599094,17335383295308669970,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:12⤵PID:716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,7429230735951599094,17335383295308669970,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5872 /prefetch:12⤵PID:4556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,7429230735951599094,17335383295308669970,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5932 /prefetch:12⤵PID:3668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,7429230735951599094,17335383295308669970,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5664 /prefetch:12⤵PID:912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2228,7429230735951599094,17335383295308669970,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2208 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3356
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3748
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1196
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f9664c896e19205022c094d725f820b6
SHA1f8f1baf648df755ba64b412d512446baf88c0184
SHA2567121d84202a850791c2320385eb59eda4d697310dc51b1fcd4d51264aba2434e
SHA5123fa5d2c68a9e70e4a25eaac2095171d87c741eec2624c314c6a56f4fa390d6319633bf4c48b1a4af7e9a0451f346beced9693da88cfc7bcba8dfe209cbd1b3ae
-
Filesize
152B
MD5847d47008dbea51cb1732d54861ba9c9
SHA1f2099242027dccb88d6f05760b57f7c89d926c0d
SHA25610292fa05d896a2952c1d602a72d761d34bc776b44d6a7df87e49b5b613a8ac1
SHA512bd1526aa1cc1c016d95dfcc53a78b45b09dde4ce67357fc275ab835dbe1bb5b053ca386239f50cde95ad243a9c1bbb12f7505818577589beecc6084f7b94e83f
-
Filesize
212KB
MD508ec57068db9971e917b9046f90d0e49
SHA128b80d73a861f88735d89e301fa98f2ae502e94b
SHA2567a68efe41e5d8408eed6e9d91a7b7b965a3062e4e28eeffeefb8cdba6391f4d1
SHA512b154142173145122bc49ddd7f9530149100f6f3c5fd2f2e7503b13f7b160147b8b876344f6faae5e8616208c51311633df4c578802ac5d34c005bb154e9057cf
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize312B
MD5c73db0c2f7edcf96caf0691f6e4ef27c
SHA11e9fea6f435454be946c3f9e643af05ffd50b357
SHA256e4363163fc721361a017c0f3a6f1dc55ee5860fd11f5cadfdfc57089bd75a11d
SHA5122c6e36114bf7107a2044392c80b7d905653f5ce09508e43444a0315fe4151654559d665b60cd8ad87c317a7361ab07790181db31ee62e95f1b10ccf1df789c9a
-
Filesize
1KB
MD59a24bece965fd262c3ec495809f90259
SHA10daca50d6b4579cacd841b0d35953e1bda7d45e1
SHA256914e7ad3e386d3973a180e165d7110e381bf41dd4e057dee224f9f15c31adb20
SHA51212bcb224504de7c1fc69f78085612c7810a154faa0f8c39b2d91de7dceb5e736d6276e02b1c3c4cc58077109238a71900ffbff541b64631b7399992c4970cedd
-
Filesize
5KB
MD50194b9703ebea227070bbe6a3da5f5d8
SHA1435c8b6e6595cdbc3c71d007c34e797ff9776f93
SHA2567a98183e62a5b7f502f67d067c73f5b85fcf061f5b9423e5c2ec1c546d0e57c5
SHA512ffc94a2954dc71014debd28a7a1c1816f1a679f236c37d901d15faeb08f03942ba8fb614144bbf996bd08727396ecd913f0a47179dd5c1b70a1d6a2b087cf2d5
-
Filesize
6KB
MD5b50f6be0dedb0c1be24edbe141920699
SHA1c731bee62eb4846c1cc9592bc86faf90f1088019
SHA256be6d421749be6584704d691044dcdafde027ea2aa5ab4e5ec9b18a283cd6be80
SHA512611661d8da4fb644fe8936ac61a992ad5a212916fbd819c61eb6e121232d537e79389bd71cef43be2fb02fd7c530f71d1b3cdfd876338c3d05e21610fc590f34
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5f2608b6a6eb946a7f3d5d7d0e3ddc83d
SHA1d9254cb57c1b76a137f318f2ba9bef99dcb561eb
SHA256b0b1bf554ad9e76b31c9188dc1868fb0afd060235d3c99d5c84bd4925a6fbc96
SHA5124768322c955765a913e0f485c041b896e7338ea02235b440bbbeadbf692783dd2aa65ea50721902b4bed4efd009985327c21b36c898baa9a81c45d894b3723de