Analysis
-
max time kernel
145s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09-09-2024 02:05
Static task
static1
Behavioral task
behavioral1
Sample
d57cd00fb4b1dfb01f9fd54d685192d2_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d57cd00fb4b1dfb01f9fd54d685192d2_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d57cd00fb4b1dfb01f9fd54d685192d2_JaffaCakes118.html
-
Size
123KB
-
MD5
d57cd00fb4b1dfb01f9fd54d685192d2
-
SHA1
bd395798f8f83249b079ca4870f6d75cda02ef1e
-
SHA256
f0b05e50fe46da340175b94c15f8b3c0a72779654b0193b2afbf1771f2267de6
-
SHA512
fb6e1dcdfe35bca7f81c81c706151f9d2bcfc315d3f0fcb0f3d1b5085022ffdd87661da7eeb11cb9f903bfc96ea041ef5d6680c799b285f4dea7ec689765aa37
-
SSDEEP
384:SCP8RU8s8g/858HR48V8O8l8Ex8x8h81338/8QK858l8SCT2868q8Z8b8ixwZc8S:SC19vSHIuZVg/ZkOoCQd2LZn1Ja08+
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 220 msedge.exe 220 msedge.exe 1824 msedge.exe 1824 msedge.exe 448 identity_helper.exe 448 identity_helper.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe 2920 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe 1824 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1824 wrote to memory of 4988 1824 msedge.exe 83 PID 1824 wrote to memory of 4988 1824 msedge.exe 83 PID 1824 wrote to memory of 2316 1824 msedge.exe 84 PID 1824 wrote to memory of 2316 1824 msedge.exe 84 PID 1824 wrote to memory of 2316 1824 msedge.exe 84 PID 1824 wrote to memory of 2316 1824 msedge.exe 84 PID 1824 wrote to memory of 2316 1824 msedge.exe 84 PID 1824 wrote to memory of 2316 1824 msedge.exe 84 PID 1824 wrote to memory of 2316 1824 msedge.exe 84 PID 1824 wrote to memory of 2316 1824 msedge.exe 84 PID 1824 wrote to memory of 2316 1824 msedge.exe 84 PID 1824 wrote to memory of 2316 1824 msedge.exe 84 PID 1824 wrote to memory of 2316 1824 msedge.exe 84 PID 1824 wrote to memory of 2316 1824 msedge.exe 84 PID 1824 wrote to memory of 2316 1824 msedge.exe 84 PID 1824 wrote to memory of 2316 1824 msedge.exe 84 PID 1824 wrote to memory of 2316 1824 msedge.exe 84 PID 1824 wrote to memory of 2316 1824 msedge.exe 84 PID 1824 wrote to memory of 2316 1824 msedge.exe 84 PID 1824 wrote to memory of 2316 1824 msedge.exe 84 PID 1824 wrote to memory of 2316 1824 msedge.exe 84 PID 1824 wrote to memory of 2316 1824 msedge.exe 84 PID 1824 wrote to memory of 2316 1824 msedge.exe 84 PID 1824 wrote to memory of 2316 1824 msedge.exe 84 PID 1824 wrote to memory of 2316 1824 msedge.exe 84 PID 1824 wrote to memory of 2316 1824 msedge.exe 84 PID 1824 wrote to memory of 2316 1824 msedge.exe 84 PID 1824 wrote to memory of 2316 1824 msedge.exe 84 PID 1824 wrote to memory of 2316 1824 msedge.exe 84 PID 1824 wrote to memory of 2316 1824 msedge.exe 84 PID 1824 wrote to memory of 2316 1824 msedge.exe 84 PID 1824 wrote to memory of 2316 1824 msedge.exe 84 PID 1824 wrote to memory of 2316 1824 msedge.exe 84 PID 1824 wrote to memory of 2316 1824 msedge.exe 84 PID 1824 wrote to memory of 2316 1824 msedge.exe 84 PID 1824 wrote to memory of 2316 1824 msedge.exe 84 PID 1824 wrote to memory of 2316 1824 msedge.exe 84 PID 1824 wrote to memory of 2316 1824 msedge.exe 84 PID 1824 wrote to memory of 2316 1824 msedge.exe 84 PID 1824 wrote to memory of 2316 1824 msedge.exe 84 PID 1824 wrote to memory of 2316 1824 msedge.exe 84 PID 1824 wrote to memory of 2316 1824 msedge.exe 84 PID 1824 wrote to memory of 220 1824 msedge.exe 85 PID 1824 wrote to memory of 220 1824 msedge.exe 85 PID 1824 wrote to memory of 3548 1824 msedge.exe 86 PID 1824 wrote to memory of 3548 1824 msedge.exe 86 PID 1824 wrote to memory of 3548 1824 msedge.exe 86 PID 1824 wrote to memory of 3548 1824 msedge.exe 86 PID 1824 wrote to memory of 3548 1824 msedge.exe 86 PID 1824 wrote to memory of 3548 1824 msedge.exe 86 PID 1824 wrote to memory of 3548 1824 msedge.exe 86 PID 1824 wrote to memory of 3548 1824 msedge.exe 86 PID 1824 wrote to memory of 3548 1824 msedge.exe 86 PID 1824 wrote to memory of 3548 1824 msedge.exe 86 PID 1824 wrote to memory of 3548 1824 msedge.exe 86 PID 1824 wrote to memory of 3548 1824 msedge.exe 86 PID 1824 wrote to memory of 3548 1824 msedge.exe 86 PID 1824 wrote to memory of 3548 1824 msedge.exe 86 PID 1824 wrote to memory of 3548 1824 msedge.exe 86 PID 1824 wrote to memory of 3548 1824 msedge.exe 86 PID 1824 wrote to memory of 3548 1824 msedge.exe 86 PID 1824 wrote to memory of 3548 1824 msedge.exe 86 PID 1824 wrote to memory of 3548 1824 msedge.exe 86 PID 1824 wrote to memory of 3548 1824 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\d57cd00fb4b1dfb01f9fd54d685192d2_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe664d46f8,0x7ffe664d4708,0x7ffe664d47182⤵PID:4988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2000,8047410714780868218,7209742780315759714,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2084 /prefetch:22⤵PID:2316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2000,8047410714780868218,7209742780315759714,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2000,8047410714780868218,7209742780315759714,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2896 /prefetch:82⤵PID:3548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,8047410714780868218,7209742780315759714,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:4288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,8047410714780868218,7209742780315759714,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:4528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,8047410714780868218,7209742780315759714,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4788 /prefetch:12⤵PID:1504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,8047410714780868218,7209742780315759714,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5888 /prefetch:12⤵PID:4920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,8047410714780868218,7209742780315759714,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5904 /prefetch:12⤵PID:508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2000,8047410714780868218,7209742780315759714,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5264 /prefetch:82⤵PID:3388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2000,8047410714780868218,7209742780315759714,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5264 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,8047410714780868218,7209742780315759714,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4180 /prefetch:12⤵PID:3236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,8047410714780868218,7209742780315759714,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4776 /prefetch:12⤵PID:4992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2000,8047410714780868218,7209742780315759714,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4836 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2920
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4032
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3392
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5111c361619c017b5d09a13a56938bd54
SHA1e02b363a8ceb95751623f25025a9299a2c931e07
SHA256d7be4042a1e3511b0dbf0ab5c493245e4ac314440a4ae0732813db01a21ef8bc
SHA512fc16a4ad0b56899b82d05114d7b0ca8ee610cdba6ff0b6a67dea44faf17b3105109335359b78c0a59c9011a13152744a7f5d4f6a5b66ea519df750ef03f622b2
-
Filesize
152B
MD5983cbc1f706a155d63496ebc4d66515e
SHA1223d0071718b80cad9239e58c5e8e64df6e2a2fe
SHA256cc34b8f8e3f4bfe4c9a227d88f56ea2dd276ca3ac81df622ff5e9a8ec46b951c
SHA512d9cf2ca46d9379902730c81e615a3eb694873ffd535c6bb3ded2dc97cdbbfb71051ab11a07754ed6f610f04285605b702b5a48a6cfda3ee3287230c41c9c45cd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD58a36b209c3275bd4841507088a2d3a5a
SHA1016aae695dd0d78b5cb6cf954711a983e223cc61
SHA256ff87ad748818d32d76b07d91c5262809720b747be83657336b2baaf43f59ff2d
SHA512b417490ea6ee5962d3e7a7fc68ac99eed370d741b2dc737fa2f7e3c4ba127a9616b067ec144127e46a0ad05aef8c66618722c57532aca87985b4d9af5fc1ae14
-
Filesize
644B
MD588247c9b2e6948344a5bdffa6a270934
SHA1b26472b80e24b9705d70063eb0299fdeb0498f1e
SHA25684f2d2b2dd45292d23e0b4e10fa19a4b590d615ad035fa612b0d349146f638ca
SHA512b19f4e3b36e07711197f8f733cdda71da90d368ee52c91c9f4f7750c72ab4182ab08058caf5053e1760a314a6073d44dc0bc88fab83147dcede5521ef6d6e519
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD5783ee31ae3799b7180d1d54495451798
SHA1356887d9f2517802325d16728a003ee7f2269cb5
SHA256d8cb8cd647c64d2cbb0f069815e281b84f6f6cbd088afc0173a5e046606c349b
SHA512416aff1a46ca05d14fe122a18c94159150cca3383bea405b70d02ef1d5c8c9cb85ea57b3856db954be01dcf81fb7307c25f2fa92d0b30ac502d5792e47b5fbc1
-
Filesize
6KB
MD57c1d175e092b8b8bd8ffa51c14cf5138
SHA19bf72e1a562e80871bdcde6890aa29ea03c31885
SHA256dbaf2aff0edc3da0530b9dcb50f3fae716391816325099bede053f5e4c85d08d
SHA512598740721dcbd7978d136fc2d3c48d432540f1c3b9fba7f97e9f687b2c4d388452656e4e4ff872b2e6fcf42337cd10952d1023e9e1dc97fbd37757d33196e80e
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5a85bf40b4ef30d2a0e51df8be5c3a21c
SHA1120d287be4dc32c937879a4c17a576ea603100bc
SHA256879288406b50163122a8e4f02d314bbe97bd35d19b9ec8b489e1aca837d62433
SHA512dc17aee857b929e16967b62e3aa0c2e024d2335ef770ce1fdc6410dcc4ce28bf60b64ce25816e042a5c1e2f3170caa788deb3e2adc05472280402066d6c90a12