Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08-09-2024 15:03
Static task
static1
Behavioral task
behavioral1
Sample
d4a0490bfd7161621e00c1c913237f46_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d4a0490bfd7161621e00c1c913237f46_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d4a0490bfd7161621e00c1c913237f46_JaffaCakes118.html
-
Size
231KB
-
MD5
d4a0490bfd7161621e00c1c913237f46
-
SHA1
09816220ac822b9cfa37fc21d2fa74503672826a
-
SHA256
67939d82f4f3500e92a41746a13d358d38cb3d9b6b2f26f73ee4eeda43d30538
-
SHA512
81ed8e704057aea75d1aa6f5aacd2ab60137564a4ef51f0f225804997842ba6d992763122f174ee6076273ab2721048f6b522828ac07ab8ef1f05feb535c74de
-
SSDEEP
3072:QyfkMY+BES09JXAnyrZalI+YzMIyfkMY+BES09JXAnyrZalI+YW:NsMYod+X3oI+Yz8sMYod+X3oI+YW
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2960 msedge.exe 2960 msedge.exe 2728 msedge.exe 2728 msedge.exe 3352 identity_helper.exe 3352 identity_helper.exe 1520 msedge.exe 1520 msedge.exe 1520 msedge.exe 1520 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe 2728 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2728 wrote to memory of 1816 2728 msedge.exe 83 PID 2728 wrote to memory of 1816 2728 msedge.exe 83 PID 2728 wrote to memory of 1456 2728 msedge.exe 84 PID 2728 wrote to memory of 1456 2728 msedge.exe 84 PID 2728 wrote to memory of 1456 2728 msedge.exe 84 PID 2728 wrote to memory of 1456 2728 msedge.exe 84 PID 2728 wrote to memory of 1456 2728 msedge.exe 84 PID 2728 wrote to memory of 1456 2728 msedge.exe 84 PID 2728 wrote to memory of 1456 2728 msedge.exe 84 PID 2728 wrote to memory of 1456 2728 msedge.exe 84 PID 2728 wrote to memory of 1456 2728 msedge.exe 84 PID 2728 wrote to memory of 1456 2728 msedge.exe 84 PID 2728 wrote to memory of 1456 2728 msedge.exe 84 PID 2728 wrote to memory of 1456 2728 msedge.exe 84 PID 2728 wrote to memory of 1456 2728 msedge.exe 84 PID 2728 wrote to memory of 1456 2728 msedge.exe 84 PID 2728 wrote to memory of 1456 2728 msedge.exe 84 PID 2728 wrote to memory of 1456 2728 msedge.exe 84 PID 2728 wrote to memory of 1456 2728 msedge.exe 84 PID 2728 wrote to memory of 1456 2728 msedge.exe 84 PID 2728 wrote to memory of 1456 2728 msedge.exe 84 PID 2728 wrote to memory of 1456 2728 msedge.exe 84 PID 2728 wrote to memory of 1456 2728 msedge.exe 84 PID 2728 wrote to memory of 1456 2728 msedge.exe 84 PID 2728 wrote to memory of 1456 2728 msedge.exe 84 PID 2728 wrote to memory of 1456 2728 msedge.exe 84 PID 2728 wrote to memory of 1456 2728 msedge.exe 84 PID 2728 wrote to memory of 1456 2728 msedge.exe 84 PID 2728 wrote to memory of 1456 2728 msedge.exe 84 PID 2728 wrote to memory of 1456 2728 msedge.exe 84 PID 2728 wrote to memory of 1456 2728 msedge.exe 84 PID 2728 wrote to memory of 1456 2728 msedge.exe 84 PID 2728 wrote to memory of 1456 2728 msedge.exe 84 PID 2728 wrote to memory of 1456 2728 msedge.exe 84 PID 2728 wrote to memory of 1456 2728 msedge.exe 84 PID 2728 wrote to memory of 1456 2728 msedge.exe 84 PID 2728 wrote to memory of 1456 2728 msedge.exe 84 PID 2728 wrote to memory of 1456 2728 msedge.exe 84 PID 2728 wrote to memory of 1456 2728 msedge.exe 84 PID 2728 wrote to memory of 1456 2728 msedge.exe 84 PID 2728 wrote to memory of 1456 2728 msedge.exe 84 PID 2728 wrote to memory of 1456 2728 msedge.exe 84 PID 2728 wrote to memory of 2960 2728 msedge.exe 85 PID 2728 wrote to memory of 2960 2728 msedge.exe 85 PID 2728 wrote to memory of 4436 2728 msedge.exe 86 PID 2728 wrote to memory of 4436 2728 msedge.exe 86 PID 2728 wrote to memory of 4436 2728 msedge.exe 86 PID 2728 wrote to memory of 4436 2728 msedge.exe 86 PID 2728 wrote to memory of 4436 2728 msedge.exe 86 PID 2728 wrote to memory of 4436 2728 msedge.exe 86 PID 2728 wrote to memory of 4436 2728 msedge.exe 86 PID 2728 wrote to memory of 4436 2728 msedge.exe 86 PID 2728 wrote to memory of 4436 2728 msedge.exe 86 PID 2728 wrote to memory of 4436 2728 msedge.exe 86 PID 2728 wrote to memory of 4436 2728 msedge.exe 86 PID 2728 wrote to memory of 4436 2728 msedge.exe 86 PID 2728 wrote to memory of 4436 2728 msedge.exe 86 PID 2728 wrote to memory of 4436 2728 msedge.exe 86 PID 2728 wrote to memory of 4436 2728 msedge.exe 86 PID 2728 wrote to memory of 4436 2728 msedge.exe 86 PID 2728 wrote to memory of 4436 2728 msedge.exe 86 PID 2728 wrote to memory of 4436 2728 msedge.exe 86 PID 2728 wrote to memory of 4436 2728 msedge.exe 86 PID 2728 wrote to memory of 4436 2728 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\d4a0490bfd7161621e00c1c913237f46_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdef2a46f8,0x7ffdef2a4708,0x7ffdef2a47182⤵PID:1816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1928,860133487543059317,8407499704400511322,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1944 /prefetch:22⤵PID:1456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1928,860133487543059317,8407499704400511322,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2136 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1928,860133487543059317,8407499704400511322,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2668 /prefetch:82⤵PID:4436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1928,860133487543059317,8407499704400511322,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3184 /prefetch:12⤵PID:5084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1928,860133487543059317,8407499704400511322,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:4512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1928,860133487543059317,8407499704400511322,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5068 /prefetch:12⤵PID:1020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1928,860133487543059317,8407499704400511322,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4876 /prefetch:12⤵PID:3340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1928,860133487543059317,8407499704400511322,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5524 /prefetch:82⤵PID:812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1928,860133487543059317,8407499704400511322,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5524 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1928,860133487543059317,8407499704400511322,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3492 /prefetch:12⤵PID:3288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1928,860133487543059317,8407499704400511322,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3428 /prefetch:12⤵PID:3260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1928,860133487543059317,8407499704400511322,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3064 /prefetch:12⤵PID:1908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1928,860133487543059317,8407499704400511322,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2760 /prefetch:12⤵PID:4920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1928,860133487543059317,8407499704400511322,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4716 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1520
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5104
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4840
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f9664c896e19205022c094d725f820b6
SHA1f8f1baf648df755ba64b412d512446baf88c0184
SHA2567121d84202a850791c2320385eb59eda4d697310dc51b1fcd4d51264aba2434e
SHA5123fa5d2c68a9e70e4a25eaac2095171d87c741eec2624c314c6a56f4fa390d6319633bf4c48b1a4af7e9a0451f346beced9693da88cfc7bcba8dfe209cbd1b3ae
-
Filesize
152B
MD5847d47008dbea51cb1732d54861ba9c9
SHA1f2099242027dccb88d6f05760b57f7c89d926c0d
SHA25610292fa05d896a2952c1d602a72d761d34bc776b44d6a7df87e49b5b613a8ac1
SHA512bd1526aa1cc1c016d95dfcc53a78b45b09dde4ce67357fc275ab835dbe1bb5b053ca386239f50cde95ad243a9c1bbb12f7505818577589beecc6084f7b94e83f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize384B
MD5fbce647a678526b30b7f8bba1a6310b7
SHA1074bb489d1dc54c7553ff8f5ff89bfc195e2dd0d
SHA2562b5c49ec70cc0bdf3d1012dcda56cad95d6de068e020baffad46e4469e389bdd
SHA5121ff10c7d7775ee130e30462551677f8a77c8ce4a5445a7c8ebd02810c76b1b2ed4736c6ae4fa790b26a6d5c575399acbfb4c4a9341ed21d217e64413c9ace3b8
-
Filesize
1KB
MD5ca424a27726fa8978a97f12174aa94a8
SHA1fa520c4e6dfb2efed8da68c3fe9865173cd3e082
SHA2568dc03189fd7447430d136d6c2d25d4dc6062b383c6e4411892998f6da46e2372
SHA5124095b50e943d166d3b8ab6395d59c18ee0ec4af73942732b52c4f6a6bc4b08a6bc78ff970280e183eccfad6aa2584490bbf8c4c8da150071cd3c2414854f2061
-
Filesize
5KB
MD54085703f9c959b054d93aa47556736d5
SHA13cabeafa1905dfc5718a333a2e6e9d6ac79921b3
SHA256f20b81e8314f994d25cee708150a9b310dde682c6b9e9f1cfbd9c1a28c88255e
SHA512b09887afe1355306080b0f8bcd029e808e81b7ad92bb9fb02ec31ac95be9f879f1b27fde4732d60bca1a1d392281d9f302c46a2921fd5b2e85f2c3a032e190a5
-
Filesize
6KB
MD520087f4a6db5ae9f514ad0772cd89330
SHA1dd86959812f03750d4bef895606889269ca3395b
SHA256e30b9ec8ee7960e9a7f2e772ce2bc103860cc89349e03b5636acd1b18bbb229c
SHA51298ff3ef5b3d7b212ef849532b657453304ddaba2ffcf01620ad24796239ffcca4c81a125bfdef620ef0b3cc9f456c8b0ed52265158ecd58146b13b6f2578c2ae
-
Filesize
6KB
MD5b9246b24e6b52dca9940e8d551cb2be5
SHA14b1eb132c67b9c7377c70e896f58e5f6f2d13fe8
SHA2568d5df3f691bde903bc809d6b422f507dfb92aa4de84b8743c3e24ef5216d6799
SHA512f81ad023f442e2742ad45dac1b809a54b31d6f7e5fef2d9649bd7b0d996cffdd5db31493c57f0ca8c08b0ddcc95559e480444768c5204d20c75f379690e286a8
-
Filesize
6KB
MD58dfcde6c2e39be1d893b4f6d27b01b63
SHA1245132aec047c2110b4cde690068bbe46c462f2b
SHA256d47d16cc4244d88f29f9d9a1a0e838f4c868a4ac61787963cd2d9662889aca23
SHA5122f8d99764f90fa5b8331751899c26517dfaa33385eca4fd90d410e3236956d43d339b504c1915f723ecc4f4562353cefc22cf504a7533e891e1cc4ae837c2321
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD597ec9f88b8d4252693eac66645d7b2d9
SHA12732c9c2c07c34774b1942397fe8f7446108f2cd
SHA256e56b5628ac40fd86ba3e85d927ffe3c8b842784168e2227b672d908443e470ef
SHA5120b27a1dec9f1301dc904f63a61deaadd34d733c878aaf7e7747f69eafe8dcc6bd1611c890e4dd06236880d90573745a14684d55460b52c3e5b1935eb7fbd5b50