Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09-09-2024 00:33
Static task
static1
Behavioral task
behavioral1
Sample
d55fb3d1d67f63514528c45820cb2cf1_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d55fb3d1d67f63514528c45820cb2cf1_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d55fb3d1d67f63514528c45820cb2cf1_JaffaCakes118.html
-
Size
49KB
-
MD5
d55fb3d1d67f63514528c45820cb2cf1
-
SHA1
7c8520eb16c4fe65b640962a0273ae4b28dce7ed
-
SHA256
ab54f2614f3e3a7f23c51778a84942dd46df987b71e4ae7a430b15622d97b217
-
SHA512
968c4bbbf5be8e7f77d757c0f4b516f434c49c23ebeb10ce864b81aeaf9570710cead0a2d7a60fba79d61db4d155cc49d3afebd89e633ed90457296ce6d9c67a
-
SSDEEP
768:oKFi1S5y5vqMMffZfZOZr9mrZov9d8Xp8RLqO5VI/EJ/SS8VfJmDMf:oKUg81qMMg/9h3LI/EJaS8VfJnf
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2460 msedge.exe 2460 msedge.exe 1864 msedge.exe 1864 msedge.exe 3588 identity_helper.exe 3588 identity_helper.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe 2276 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1864 wrote to memory of 2948 1864 msedge.exe 83 PID 1864 wrote to memory of 2948 1864 msedge.exe 83 PID 1864 wrote to memory of 5096 1864 msedge.exe 84 PID 1864 wrote to memory of 5096 1864 msedge.exe 84 PID 1864 wrote to memory of 5096 1864 msedge.exe 84 PID 1864 wrote to memory of 5096 1864 msedge.exe 84 PID 1864 wrote to memory of 5096 1864 msedge.exe 84 PID 1864 wrote to memory of 5096 1864 msedge.exe 84 PID 1864 wrote to memory of 5096 1864 msedge.exe 84 PID 1864 wrote to memory of 5096 1864 msedge.exe 84 PID 1864 wrote to memory of 5096 1864 msedge.exe 84 PID 1864 wrote to memory of 5096 1864 msedge.exe 84 PID 1864 wrote to memory of 5096 1864 msedge.exe 84 PID 1864 wrote to memory of 5096 1864 msedge.exe 84 PID 1864 wrote to memory of 5096 1864 msedge.exe 84 PID 1864 wrote to memory of 5096 1864 msedge.exe 84 PID 1864 wrote to memory of 5096 1864 msedge.exe 84 PID 1864 wrote to memory of 5096 1864 msedge.exe 84 PID 1864 wrote to memory of 5096 1864 msedge.exe 84 PID 1864 wrote to memory of 5096 1864 msedge.exe 84 PID 1864 wrote to memory of 5096 1864 msedge.exe 84 PID 1864 wrote to memory of 5096 1864 msedge.exe 84 PID 1864 wrote to memory of 5096 1864 msedge.exe 84 PID 1864 wrote to memory of 5096 1864 msedge.exe 84 PID 1864 wrote to memory of 5096 1864 msedge.exe 84 PID 1864 wrote to memory of 5096 1864 msedge.exe 84 PID 1864 wrote to memory of 5096 1864 msedge.exe 84 PID 1864 wrote to memory of 5096 1864 msedge.exe 84 PID 1864 wrote to memory of 5096 1864 msedge.exe 84 PID 1864 wrote to memory of 5096 1864 msedge.exe 84 PID 1864 wrote to memory of 5096 1864 msedge.exe 84 PID 1864 wrote to memory of 5096 1864 msedge.exe 84 PID 1864 wrote to memory of 5096 1864 msedge.exe 84 PID 1864 wrote to memory of 5096 1864 msedge.exe 84 PID 1864 wrote to memory of 5096 1864 msedge.exe 84 PID 1864 wrote to memory of 5096 1864 msedge.exe 84 PID 1864 wrote to memory of 5096 1864 msedge.exe 84 PID 1864 wrote to memory of 5096 1864 msedge.exe 84 PID 1864 wrote to memory of 5096 1864 msedge.exe 84 PID 1864 wrote to memory of 5096 1864 msedge.exe 84 PID 1864 wrote to memory of 5096 1864 msedge.exe 84 PID 1864 wrote to memory of 5096 1864 msedge.exe 84 PID 1864 wrote to memory of 2460 1864 msedge.exe 85 PID 1864 wrote to memory of 2460 1864 msedge.exe 85 PID 1864 wrote to memory of 5032 1864 msedge.exe 86 PID 1864 wrote to memory of 5032 1864 msedge.exe 86 PID 1864 wrote to memory of 5032 1864 msedge.exe 86 PID 1864 wrote to memory of 5032 1864 msedge.exe 86 PID 1864 wrote to memory of 5032 1864 msedge.exe 86 PID 1864 wrote to memory of 5032 1864 msedge.exe 86 PID 1864 wrote to memory of 5032 1864 msedge.exe 86 PID 1864 wrote to memory of 5032 1864 msedge.exe 86 PID 1864 wrote to memory of 5032 1864 msedge.exe 86 PID 1864 wrote to memory of 5032 1864 msedge.exe 86 PID 1864 wrote to memory of 5032 1864 msedge.exe 86 PID 1864 wrote to memory of 5032 1864 msedge.exe 86 PID 1864 wrote to memory of 5032 1864 msedge.exe 86 PID 1864 wrote to memory of 5032 1864 msedge.exe 86 PID 1864 wrote to memory of 5032 1864 msedge.exe 86 PID 1864 wrote to memory of 5032 1864 msedge.exe 86 PID 1864 wrote to memory of 5032 1864 msedge.exe 86 PID 1864 wrote to memory of 5032 1864 msedge.exe 86 PID 1864 wrote to memory of 5032 1864 msedge.exe 86 PID 1864 wrote to memory of 5032 1864 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\d55fb3d1d67f63514528c45820cb2cf1_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1864 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffba3b746f8,0x7ffba3b74708,0x7ffba3b747182⤵PID:2948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1992,7515633679263970077,14748664312103206565,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2024 /prefetch:22⤵PID:5096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1992,7515633679263970077,14748664312103206565,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2452 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1992,7515633679263970077,14748664312103206565,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2676 /prefetch:82⤵PID:5032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1992,7515633679263970077,14748664312103206565,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:1544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1992,7515633679263970077,14748664312103206565,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:3840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1992,7515633679263970077,14748664312103206565,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4764 /prefetch:12⤵PID:3712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1992,7515633679263970077,14748664312103206565,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5872 /prefetch:82⤵PID:1040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1992,7515633679263970077,14748664312103206565,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5872 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1992,7515633679263970077,14748664312103206565,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5692 /prefetch:12⤵PID:3624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1992,7515633679263970077,14748664312103206565,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5644 /prefetch:12⤵PID:4760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1992,7515633679263970077,14748664312103206565,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4976 /prefetch:12⤵PID:4724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1992,7515633679263970077,14748664312103206565,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1292 /prefetch:12⤵PID:1032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1992,7515633679263970077,14748664312103206565,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2168 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2276
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1740
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1600
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD553bc70ecb115bdbabe67620c416fe9b3
SHA1af66ec51a13a59639eaf54d62ff3b4f092bb2fc1
SHA256b36cad5c1f7bc7d07c7eaa2f3cad2959ddb5447d4d3adcb46eb6a99808e22771
SHA512cad44933b94e17908c0eb8ac5feeb53d03a7720d97e7ccc8724a1ed3021a5bece09e1f9f3cec56ce0739176ebbbeb20729e650f8bca04e5060c986b75d8e4921
-
Filesize
152B
MD5e765f3d75e6b0e4a7119c8b14d47d8da
SHA1cc9f7c7826c2e1a129e7d98884926076c3714fc0
SHA256986443556d3878258b710d9d9efbf4f25f0d764c3f83dc54217f2b12a6eccd89
SHA512a1872a849f27da78ebe9adb9beb260cb49ed5f4ca2d403f23379112bdfcd2482446a6708188100496e45db1517cdb43aba8bb93a75e605713c3f97cd716b1079
-
Filesize
24KB
MD5d1c8fc93e329cfdb4cef6b1363e40db2
SHA12d034d8d0056a8c1596714c7129fc31c74a2565c
SHA256facc5d448f6e3267100a4c236f09aa98bea1cc3b19e2b2a0985501ca499c4ca2
SHA51207434e4af30064d5f67158d10b704afccaa31f974ccaca5e76dc9f1b05d76106b44f124c3a94af93eb1b44a5aeaa70ebc33e0f9f904d1cd4c8386b281735d008
-
Filesize
45KB
MD5aa6a698d1c7fc6d35265b10af5570e9c
SHA100da372ad4964a5d5b8afff7fe1b207ff284f232
SHA25602f6ae7bda59fb1a20d3386021fb972ced348bf724fea42157225d416f9f049a
SHA512f5b2f732e899cc0fed577e1ef1c51c154ede5d206543e8ac7c1fabb182901f8e93e137b63f12cbb87b3f570a283a368bfb1b9d637cc5b1c4f1669ff5cfbf306b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD5f8fb5e42dfeeb9b885a63c44297f96b0
SHA154e5719875e3047499cd4fdcc0532c6e4cbdfa70
SHA2560ad1f0f914119e2e70fe68257d58b78b24d82d3bef4eb69372f9194c2452d388
SHA512fd9c8d84e828bbd07bd22d75ee879c89dce1c69554f403d9e9d73bf5613b0e75162997c85210b62d2b0665e04619236b435a05665d89d40f99f4e4db33072920
-
Filesize
1KB
MD515e39079b2821d7f27a8f45738895665
SHA1567e296841d1bdf68f257a2ae8d35c903372f2be
SHA256163d2f2df42094fead748816d80254396622a605981826a27ff2c1220434f30d
SHA5121d78b3eaf0ac4a098faca492cee64f41bc3fd5431a2d4db82c090b5cf9814d2ec6a09f8e1107c88fceeba5462748214260122ea0b6d041454bb853dfaabf5cb1
-
Filesize
5KB
MD5a69a16b2a2165d480b4ac144c5da8863
SHA1938008181499f32a67ecf65e20d31dffc38ee9a3
SHA256490ac93b4be5c2dca43acd53e003465eef7eba7596671e5eeb6d93232b9a09f8
SHA51283101b983a0693f763542aabe4b5348b7eb3057e1e0defd1a2d139d178d461c06ef451ea56463257cf21a4797bbc31968ced2a391d2a4600adbaf879efc1e07e
-
Filesize
6KB
MD5481c7d070b1bbee76a053f0091661c49
SHA18a69da112968281f43668746a622259540f312d3
SHA2567651595f439d9ae551f0b8682fb609fc3d1ce83266108e0ee69509af3801f9fc
SHA512382b294ea729688fc46bd3a2ebb974d39fa93154d5168c5b5c44b2176997b060064959eee0764d4af38c7b5407e31d08c9f3ed64faefdbdec73afced337c138b
-
Filesize
6KB
MD5141e585bb7df6483ac3428c7ef300aa7
SHA19da63cb90df5c87c0ba9ffc56ecd904c67336b76
SHA256c2564a6ead72e8efff86664cd4affbc49b85d53fbda113cf81295871eb9cfc1d
SHA512e74eb507f53f9aba8d9ffd484ed6d133dd056aa69c5a49bdcdd58b413f047822947088784abc69f37b9a6e75b28e617ee2bc530c6e0d0c1d4f7fa839a18440ba
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5af3573be2f1b9bfe98bc95a8f0c394ba
SHA19079440540ae07dbbab0fb92e68ee5734907f7d1
SHA256583e5c7ee82e59bbb7f654446010a3dcfec34adec27ca5e6da6c2e8a1148c728
SHA5122f317db684b8246a25101851f901dffb5b8fa7f36c9b132f08e4ece1cf3377c53a0e3614da4a668e65156735243406c541262ec8f68c7535f60abfcd79ef10d6