Analysis
-
max time kernel
145s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09/09/2024, 09:59
Static task
static1
Behavioral task
behavioral1
Sample
d6163f09a12fbbbd1e44181c734cf6bd_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d6163f09a12fbbbd1e44181c734cf6bd_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d6163f09a12fbbbd1e44181c734cf6bd_JaffaCakes118.html
-
Size
70KB
-
MD5
d6163f09a12fbbbd1e44181c734cf6bd
-
SHA1
2e6b4d4c4d327dbf496d8c432efa0d27b3939a3d
-
SHA256
1e2ec2d624432cda866e18b3904f5e29b5cfb20139c91fe3e71e5fd97c127fa0
-
SHA512
f0ebeea8fb1760c939b9606f6ef49bd522f4423d0dfc214cbc58175ef63e202d360ef389b37f45392ae61ac4e3706d4e92414bef25553ac8ee73e18c9acc2563
-
SSDEEP
768:JingcMWR3sI2PDDnd0g6x9kiw/LEoT2e1wCZkoTyMdtbBnfBgN8/lboiGhcRfQFt:JLskdjZTTNen0tbrga90hc+NnhVJ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2752 msedge.exe 2752 msedge.exe 1652 msedge.exe 1652 msedge.exe 4564 identity_helper.exe 4564 identity_helper.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe 1652 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1652 wrote to memory of 1308 1652 msedge.exe 83 PID 1652 wrote to memory of 1308 1652 msedge.exe 83 PID 1652 wrote to memory of 4936 1652 msedge.exe 84 PID 1652 wrote to memory of 4936 1652 msedge.exe 84 PID 1652 wrote to memory of 4936 1652 msedge.exe 84 PID 1652 wrote to memory of 4936 1652 msedge.exe 84 PID 1652 wrote to memory of 4936 1652 msedge.exe 84 PID 1652 wrote to memory of 4936 1652 msedge.exe 84 PID 1652 wrote to memory of 4936 1652 msedge.exe 84 PID 1652 wrote to memory of 4936 1652 msedge.exe 84 PID 1652 wrote to memory of 4936 1652 msedge.exe 84 PID 1652 wrote to memory of 4936 1652 msedge.exe 84 PID 1652 wrote to memory of 4936 1652 msedge.exe 84 PID 1652 wrote to memory of 4936 1652 msedge.exe 84 PID 1652 wrote to memory of 4936 1652 msedge.exe 84 PID 1652 wrote to memory of 4936 1652 msedge.exe 84 PID 1652 wrote to memory of 4936 1652 msedge.exe 84 PID 1652 wrote to memory of 4936 1652 msedge.exe 84 PID 1652 wrote to memory of 4936 1652 msedge.exe 84 PID 1652 wrote to memory of 4936 1652 msedge.exe 84 PID 1652 wrote to memory of 4936 1652 msedge.exe 84 PID 1652 wrote to memory of 4936 1652 msedge.exe 84 PID 1652 wrote to memory of 4936 1652 msedge.exe 84 PID 1652 wrote to memory of 4936 1652 msedge.exe 84 PID 1652 wrote to memory of 4936 1652 msedge.exe 84 PID 1652 wrote to memory of 4936 1652 msedge.exe 84 PID 1652 wrote to memory of 4936 1652 msedge.exe 84 PID 1652 wrote to memory of 4936 1652 msedge.exe 84 PID 1652 wrote to memory of 4936 1652 msedge.exe 84 PID 1652 wrote to memory of 4936 1652 msedge.exe 84 PID 1652 wrote to memory of 4936 1652 msedge.exe 84 PID 1652 wrote to memory of 4936 1652 msedge.exe 84 PID 1652 wrote to memory of 4936 1652 msedge.exe 84 PID 1652 wrote to memory of 4936 1652 msedge.exe 84 PID 1652 wrote to memory of 4936 1652 msedge.exe 84 PID 1652 wrote to memory of 4936 1652 msedge.exe 84 PID 1652 wrote to memory of 4936 1652 msedge.exe 84 PID 1652 wrote to memory of 4936 1652 msedge.exe 84 PID 1652 wrote to memory of 4936 1652 msedge.exe 84 PID 1652 wrote to memory of 4936 1652 msedge.exe 84 PID 1652 wrote to memory of 4936 1652 msedge.exe 84 PID 1652 wrote to memory of 4936 1652 msedge.exe 84 PID 1652 wrote to memory of 2752 1652 msedge.exe 85 PID 1652 wrote to memory of 2752 1652 msedge.exe 85 PID 1652 wrote to memory of 3716 1652 msedge.exe 86 PID 1652 wrote to memory of 3716 1652 msedge.exe 86 PID 1652 wrote to memory of 3716 1652 msedge.exe 86 PID 1652 wrote to memory of 3716 1652 msedge.exe 86 PID 1652 wrote to memory of 3716 1652 msedge.exe 86 PID 1652 wrote to memory of 3716 1652 msedge.exe 86 PID 1652 wrote to memory of 3716 1652 msedge.exe 86 PID 1652 wrote to memory of 3716 1652 msedge.exe 86 PID 1652 wrote to memory of 3716 1652 msedge.exe 86 PID 1652 wrote to memory of 3716 1652 msedge.exe 86 PID 1652 wrote to memory of 3716 1652 msedge.exe 86 PID 1652 wrote to memory of 3716 1652 msedge.exe 86 PID 1652 wrote to memory of 3716 1652 msedge.exe 86 PID 1652 wrote to memory of 3716 1652 msedge.exe 86 PID 1652 wrote to memory of 3716 1652 msedge.exe 86 PID 1652 wrote to memory of 3716 1652 msedge.exe 86 PID 1652 wrote to memory of 3716 1652 msedge.exe 86 PID 1652 wrote to memory of 3716 1652 msedge.exe 86 PID 1652 wrote to memory of 3716 1652 msedge.exe 86 PID 1652 wrote to memory of 3716 1652 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\d6163f09a12fbbbd1e44181c734cf6bd_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9a90f46f8,0x7ff9a90f4708,0x7ff9a90f47182⤵PID:1308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2040,9397660472557926041,14707488499114291500,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:22⤵PID:4936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2040,9397660472557926041,14707488499114291500,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2192 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2040,9397660472557926041,14707488499114291500,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2704 /prefetch:82⤵PID:3716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,9397660472557926041,14707488499114291500,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3196 /prefetch:12⤵PID:2840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,9397660472557926041,14707488499114291500,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3204 /prefetch:12⤵PID:4472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,9397660472557926041,14707488499114291500,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4628 /prefetch:12⤵PID:2792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,9397660472557926041,14707488499114291500,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5236 /prefetch:12⤵PID:1532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,9397660472557926041,14707488499114291500,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5536 /prefetch:12⤵PID:2888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,9397660472557926041,14707488499114291500,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5552 /prefetch:12⤵PID:2456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2040,9397660472557926041,14707488499114291500,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5868 /prefetch:82⤵PID:3028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2040,9397660472557926041,14707488499114291500,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5868 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,9397660472557926041,14707488499114291500,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3976 /prefetch:12⤵PID:3544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,9397660472557926041,14707488499114291500,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5104 /prefetch:12⤵PID:3464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2040,9397660472557926041,14707488499114291500,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5340 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1040
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1680
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1936
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d7114a6cd851f9bf56cf771c37d664a2
SHA1769c5d04fd83e583f15ab1ef659de8f883ecab8a
SHA256d2c75c7d68c474d4b8847b4ba6cfd09fe90717f46dd398c86483d825a66e977e
SHA51233bdae2305ae98e7c0de576de5a6600bd70a425e7b891d745cba9de992036df1b3d1df9572edb0f89f320e50962d06532dae9491985b6b57fd37d5f46f7a2ff8
-
Filesize
152B
MD5719923124ee00fb57378e0ebcbe894f7
SHA1cc356a7d27b8b27dc33f21bd4990f286ee13a9f9
SHA256aa22ab845fa08c786bd3366ec39f733d5be80e9ac933ed115ff048ff30090808
SHA512a207b6646500d0d504cf70ee10f57948e58dab7f214ad2e7c4af0e7ca23ce1d37c8c745873137e6c55bdcf0f527031a66d9cc54805a0eac3678be6dd497a5bbc
-
Filesize
212KB
MD508ec57068db9971e917b9046f90d0e49
SHA128b80d73a861f88735d89e301fa98f2ae502e94b
SHA2567a68efe41e5d8408eed6e9d91a7b7b965a3062e4e28eeffeefb8cdba6391f4d1
SHA512b154142173145122bc49ddd7f9530149100f6f3c5fd2f2e7503b13f7b160147b8b876344f6faae5e8616208c51311633df4c578802ac5d34c005bb154e9057cf
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD5dffd1363c2ce79915e6bd0535bb9f54d
SHA19887bfbc7df520aae0953b43b2c1d511be56ba98
SHA256142f2147569b4cb685a2f0ab6a1136309d987ac7fc3c7807973697a40d94ce03
SHA512747b5518d3b72fd38f9f5e96b9c18ec703fbbdf4fde5b5997e06a63956d3fb38b249280ecca41ff98edfba22e030da86629cb68cc7e61458bbd6db364f3be54e
-
Filesize
1KB
MD57fb2d80be4e5759bd031f6f96eba426c
SHA10a63d2e02173603d95a4f4f5b0455776d3b4675e
SHA256c7264e9b54f10d59ac2ccfdc27823df32245d22d0f097840e66fa7b2b805a72d
SHA5122889adced8ac8a95fdfbe46b4370ab7ccc3820d155f09a8acc0ad570427655a106dab8b84bc0f601e768a874008758cc72a2d5041c3868b3a4d71b4a25ac4afd
-
Filesize
5KB
MD5594e2ff711a75b0f35830715b11eea09
SHA15477612f4bc1928b087835ca6434a72e26ade7e5
SHA256b2dadd9591760be60ff1e78737a75dfd3284ba81bf4d4ac171a9193b460c64cc
SHA512b58a81d3b4d6c9c32a77489eb0ef26bfa3d4b933f9cace481e016b6cf56ff0941071bf5d52aaf981c75dcc1a4171ab3af7b9c1bfde382dc515cba93a652e2d6d
-
Filesize
6KB
MD5c5229303341be586cfca701bc5a8f31f
SHA15cd7af2a9fe397e64db241e7fb88c82e9f46a96b
SHA256c5b13807901a672f24e9862ff0dad240e547f2ba23f853af3519fef1729c6db8
SHA5120d1d40d3f4410b6e905298ab6fe9554a31e9d4c609cc85961a1ede3a062b38e879af527877cac7878ff01822cde4fe7fa0a07b236339b2f49b95d445551f3204
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD51dd30ab294a64262aa170d98f6382a45
SHA1bdea77b891f6b5e224feaccdb56a7c112299f9ab
SHA2563bede65f21f8f309a4f626369678fccaf273cf40ddd8488c8a3319ee994ebbe0
SHA5126796b72f0f8fca8589372549e4f91f11e94b3837445ff74215126bd1aff67264b189cd92d53a102047d1e2c436d58cc57437555a4fdda5a7697e6d548ffa7b67