Analysis
-
max time kernel
145s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08/09/2024, 19:49
Static task
static1
Behavioral task
behavioral1
Sample
d502acee3e35e80de49a9a78140f8045_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
d502acee3e35e80de49a9a78140f8045_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d502acee3e35e80de49a9a78140f8045_JaffaCakes118.html
-
Size
53KB
-
MD5
d502acee3e35e80de49a9a78140f8045
-
SHA1
32aab932d57547b28fea3b9fdce33140098aeaff
-
SHA256
f6b0c0d1df4e15847964559dae8baaa9fede98b2df18f0376934911ca0b7764c
-
SHA512
ea3890d0e5309c58bb79e21d47a4f098ae2c31eb4f62a883e40f9e61bc1d90fa02f2328a7eaea2d9b4d0f8f7d9fc73e934dacb036a8f4a03afee0ee6d212dfb9
-
SSDEEP
768:j+5pHvvCIoolEGqXIlSg90Cpgex3ZlJu3oqJ/6gpHJgVP:j+bHv7oiEG0IlSg90CF3ZlJuj6gpi
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3332 msedge.exe 3332 msedge.exe 4976 msedge.exe 4976 msedge.exe 4848 identity_helper.exe 4848 identity_helper.exe 2152 msedge.exe 2152 msedge.exe 2152 msedge.exe 2152 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe 4976 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4976 wrote to memory of 4932 4976 msedge.exe 86 PID 4976 wrote to memory of 4932 4976 msedge.exe 86 PID 4976 wrote to memory of 2112 4976 msedge.exe 87 PID 4976 wrote to memory of 2112 4976 msedge.exe 87 PID 4976 wrote to memory of 2112 4976 msedge.exe 87 PID 4976 wrote to memory of 2112 4976 msedge.exe 87 PID 4976 wrote to memory of 2112 4976 msedge.exe 87 PID 4976 wrote to memory of 2112 4976 msedge.exe 87 PID 4976 wrote to memory of 2112 4976 msedge.exe 87 PID 4976 wrote to memory of 2112 4976 msedge.exe 87 PID 4976 wrote to memory of 2112 4976 msedge.exe 87 PID 4976 wrote to memory of 2112 4976 msedge.exe 87 PID 4976 wrote to memory of 2112 4976 msedge.exe 87 PID 4976 wrote to memory of 2112 4976 msedge.exe 87 PID 4976 wrote to memory of 2112 4976 msedge.exe 87 PID 4976 wrote to memory of 2112 4976 msedge.exe 87 PID 4976 wrote to memory of 2112 4976 msedge.exe 87 PID 4976 wrote to memory of 2112 4976 msedge.exe 87 PID 4976 wrote to memory of 2112 4976 msedge.exe 87 PID 4976 wrote to memory of 2112 4976 msedge.exe 87 PID 4976 wrote to memory of 2112 4976 msedge.exe 87 PID 4976 wrote to memory of 2112 4976 msedge.exe 87 PID 4976 wrote to memory of 2112 4976 msedge.exe 87 PID 4976 wrote to memory of 2112 4976 msedge.exe 87 PID 4976 wrote to memory of 2112 4976 msedge.exe 87 PID 4976 wrote to memory of 2112 4976 msedge.exe 87 PID 4976 wrote to memory of 2112 4976 msedge.exe 87 PID 4976 wrote to memory of 2112 4976 msedge.exe 87 PID 4976 wrote to memory of 2112 4976 msedge.exe 87 PID 4976 wrote to memory of 2112 4976 msedge.exe 87 PID 4976 wrote to memory of 2112 4976 msedge.exe 87 PID 4976 wrote to memory of 2112 4976 msedge.exe 87 PID 4976 wrote to memory of 2112 4976 msedge.exe 87 PID 4976 wrote to memory of 2112 4976 msedge.exe 87 PID 4976 wrote to memory of 2112 4976 msedge.exe 87 PID 4976 wrote to memory of 2112 4976 msedge.exe 87 PID 4976 wrote to memory of 2112 4976 msedge.exe 87 PID 4976 wrote to memory of 2112 4976 msedge.exe 87 PID 4976 wrote to memory of 2112 4976 msedge.exe 87 PID 4976 wrote to memory of 2112 4976 msedge.exe 87 PID 4976 wrote to memory of 2112 4976 msedge.exe 87 PID 4976 wrote to memory of 2112 4976 msedge.exe 87 PID 4976 wrote to memory of 3332 4976 msedge.exe 88 PID 4976 wrote to memory of 3332 4976 msedge.exe 88 PID 4976 wrote to memory of 5040 4976 msedge.exe 89 PID 4976 wrote to memory of 5040 4976 msedge.exe 89 PID 4976 wrote to memory of 5040 4976 msedge.exe 89 PID 4976 wrote to memory of 5040 4976 msedge.exe 89 PID 4976 wrote to memory of 5040 4976 msedge.exe 89 PID 4976 wrote to memory of 5040 4976 msedge.exe 89 PID 4976 wrote to memory of 5040 4976 msedge.exe 89 PID 4976 wrote to memory of 5040 4976 msedge.exe 89 PID 4976 wrote to memory of 5040 4976 msedge.exe 89 PID 4976 wrote to memory of 5040 4976 msedge.exe 89 PID 4976 wrote to memory of 5040 4976 msedge.exe 89 PID 4976 wrote to memory of 5040 4976 msedge.exe 89 PID 4976 wrote to memory of 5040 4976 msedge.exe 89 PID 4976 wrote to memory of 5040 4976 msedge.exe 89 PID 4976 wrote to memory of 5040 4976 msedge.exe 89 PID 4976 wrote to memory of 5040 4976 msedge.exe 89 PID 4976 wrote to memory of 5040 4976 msedge.exe 89 PID 4976 wrote to memory of 5040 4976 msedge.exe 89 PID 4976 wrote to memory of 5040 4976 msedge.exe 89 PID 4976 wrote to memory of 5040 4976 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\d502acee3e35e80de49a9a78140f8045_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4976 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcff3546f8,0x7ffcff354708,0x7ffcff3547182⤵PID:4932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,17819471875180482409,6040605437396635987,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2096 /prefetch:22⤵PID:2112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2084,17819471875180482409,6040605437396635987,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2084,17819471875180482409,6040605437396635987,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2864 /prefetch:82⤵PID:5040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,17819471875180482409,6040605437396635987,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:4000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,17819471875180482409,6040605437396635987,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:1516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,17819471875180482409,6040605437396635987,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4760 /prefetch:12⤵PID:5016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,17819471875180482409,6040605437396635987,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6080 /prefetch:82⤵PID:3096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,17819471875180482409,6040605437396635987,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6080 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,17819471875180482409,6040605437396635987,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5660 /prefetch:12⤵PID:4540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,17819471875180482409,6040605437396635987,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5608 /prefetch:12⤵PID:5024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,17819471875180482409,6040605437396635987,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3996 /prefetch:12⤵PID:3136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,17819471875180482409,6040605437396635987,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5564 /prefetch:12⤵PID:4884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,17819471875180482409,6040605437396635987,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2704 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2152
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1668
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2828
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD5dad64aa1001796f819d79adf5f002aa7
SHA1ae0903784fdbeb781e3feee7bdd8b25572326ab5
SHA256acfb2a450c1b2ceefd032990fa646aacf658128f324d0a7e3c0ca1670bbddee5
SHA5121a48e518d98ff3a91b1ad2a17b0fec009eac6eb7a98844a0fad169ab550aaae5d98552df43d045240ad1d2613e54795fd6e9ba342c1b6037b2ca9fe70f08471e
-
Filesize
152B
MD59e3fc58a8fb86c93d19e1500b873ef6f
SHA1c6aae5f4e26f5570db5e14bba8d5061867a33b56
SHA256828f4eacac1c40b790fd70dbb6fa6ba03dcc681171d9b2a6579626d27837b1c4
SHA512e5e245b56fa82075e060f468a3224cf2ef43f1b6d87f0351a2102d85c7c897e559be4caeaecfdc4059af29fdc674681b61229319dda95cb2ee649b2eb98d313e
-
Filesize
152B
MD527304926d60324abe74d7a4b571c35ea
SHA178b8f92fcaf4a09eaa786bbe33fd1b0222ef29c1
SHA2567039ad5c2b40f4d97c8c2269f4942be13436d739b2e1f8feb7a0c9f9fdb931de
SHA512f5b6181d3f432238c7365f64fc8a373299e23ba8178bcc419471916ef8b23e909787c7c0617ab22e4eb90909c02bd7b84f1386fbc61e2bdb5a0eb474175da4bd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD5e4c543b900ac66adaf00f556bf614933
SHA1338afb1f6960211bbc51b6fa491c7fe55f752c25
SHA2561f48eca6e5bb180a3f5d783afac8a73c022d7ca2f7a36ceadb98a86a8b07be15
SHA512231788d5ffa307d07dc65d0072283d39622c005faa688ed207e44b218e44e55f587d4e0ff8ca8638c068847888d6266c34135689156537464bf4618aab827f47
-
Filesize
1KB
MD5770173ac862d4fbea20464a448e70d51
SHA102933f41615b17a86d5434e13595f420a7382e3e
SHA25669f7057079cc1350de588d4e24f5eda6c0a4dbf6a22eace77e071d903c6ca90c
SHA512a025059ce48412205c5714299b2149ecfb40845e10a205c2cefa5a091c987f224be69124f96bc3292a5aaf96f8a727968aee6a32af25605a73442ed8489cd01f
-
Filesize
6KB
MD58beacfa9fb9992bc9640d91b0ae70e52
SHA14124db94b2ecbbf5d0f2c68fa23436820b2b6362
SHA256af52ec13c26508b72f3ce49a1b5a4e0c9d7bec4444a6ed278bdbc2f9b8b5bc93
SHA5128b4f1f8f9b1c2b6e5c4e03b6e4098f9f668ac6aa284ce3c2d3a368fadfc902362725dd99d7dd2e1782f5a27a450749db3629a7c4bb03b0e5eed746037efa05d8
-
Filesize
6KB
MD5f32dcbec60d05c37558a08e732e5bbde
SHA186132d5acd28f559ca6acf7d24d5edddfa5472f8
SHA2568bda1b8a3a353c9389bf4c78fbff28e57504e131ea13a83bf87da8cf467cbe47
SHA5124dbde08743dd0c4aa7967ea82d03c0054231aa1ec003299395e94f14f2bd3fd92d169551b8a97014f3f3a14e1c8fc4f5fcaf09e10f9048f0b38c051b16ae041f
-
Filesize
6KB
MD508ed94bfd19ff3fc56936dbcfc8eda59
SHA13fd63070eea6e932d7d431fdebd13cfe81052180
SHA25627c99fd7e00f2baa435f5d56ba3ac94e7525f1fa377898c5ba96f6098f76517a
SHA512b671db7c8a9db69d39a7a78377907790538faa6fcb9360ba02e159ac3f4fe13412fceca6efa035eeb830838eb53752685d5b24901f45b48616055ddea8bd4c35
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389