Analysis
-
max time kernel
145s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09/09/2024, 21:20
Static task
static1
Behavioral task
behavioral1
Sample
d71c4b7fb31830e6bf915434641c1ba5_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
d71c4b7fb31830e6bf915434641c1ba5_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d71c4b7fb31830e6bf915434641c1ba5_JaffaCakes118.html
-
Size
1KB
-
MD5
d71c4b7fb31830e6bf915434641c1ba5
-
SHA1
71fe791c0ac7f8abb4a58cfa5d0c8969e619ebc0
-
SHA256
2d085e65943c3fc56f2613d1bac70c6d4429eda7e2ce97c15f22d383f709b4e4
-
SHA512
26cda06126ec91c80237ae994f6f4ef6d5958239d2153a3e2743467165037fdb3c1247032060df231d8c1252bfcd508664fe1c51f7e6c94e235cdb55d6349724
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 664 msedge.exe 664 msedge.exe 4276 msedge.exe 4276 msedge.exe 2364 identity_helper.exe 2364 identity_helper.exe 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe 4276 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4276 wrote to memory of 1216 4276 msedge.exe 83 PID 4276 wrote to memory of 1216 4276 msedge.exe 83 PID 4276 wrote to memory of 2288 4276 msedge.exe 84 PID 4276 wrote to memory of 2288 4276 msedge.exe 84 PID 4276 wrote to memory of 2288 4276 msedge.exe 84 PID 4276 wrote to memory of 2288 4276 msedge.exe 84 PID 4276 wrote to memory of 2288 4276 msedge.exe 84 PID 4276 wrote to memory of 2288 4276 msedge.exe 84 PID 4276 wrote to memory of 2288 4276 msedge.exe 84 PID 4276 wrote to memory of 2288 4276 msedge.exe 84 PID 4276 wrote to memory of 2288 4276 msedge.exe 84 PID 4276 wrote to memory of 2288 4276 msedge.exe 84 PID 4276 wrote to memory of 2288 4276 msedge.exe 84 PID 4276 wrote to memory of 2288 4276 msedge.exe 84 PID 4276 wrote to memory of 2288 4276 msedge.exe 84 PID 4276 wrote to memory of 2288 4276 msedge.exe 84 PID 4276 wrote to memory of 2288 4276 msedge.exe 84 PID 4276 wrote to memory of 2288 4276 msedge.exe 84 PID 4276 wrote to memory of 2288 4276 msedge.exe 84 PID 4276 wrote to memory of 2288 4276 msedge.exe 84 PID 4276 wrote to memory of 2288 4276 msedge.exe 84 PID 4276 wrote to memory of 2288 4276 msedge.exe 84 PID 4276 wrote to memory of 2288 4276 msedge.exe 84 PID 4276 wrote to memory of 2288 4276 msedge.exe 84 PID 4276 wrote to memory of 2288 4276 msedge.exe 84 PID 4276 wrote to memory of 2288 4276 msedge.exe 84 PID 4276 wrote to memory of 2288 4276 msedge.exe 84 PID 4276 wrote to memory of 2288 4276 msedge.exe 84 PID 4276 wrote to memory of 2288 4276 msedge.exe 84 PID 4276 wrote to memory of 2288 4276 msedge.exe 84 PID 4276 wrote to memory of 2288 4276 msedge.exe 84 PID 4276 wrote to memory of 2288 4276 msedge.exe 84 PID 4276 wrote to memory of 2288 4276 msedge.exe 84 PID 4276 wrote to memory of 2288 4276 msedge.exe 84 PID 4276 wrote to memory of 2288 4276 msedge.exe 84 PID 4276 wrote to memory of 2288 4276 msedge.exe 84 PID 4276 wrote to memory of 2288 4276 msedge.exe 84 PID 4276 wrote to memory of 2288 4276 msedge.exe 84 PID 4276 wrote to memory of 2288 4276 msedge.exe 84 PID 4276 wrote to memory of 2288 4276 msedge.exe 84 PID 4276 wrote to memory of 2288 4276 msedge.exe 84 PID 4276 wrote to memory of 2288 4276 msedge.exe 84 PID 4276 wrote to memory of 664 4276 msedge.exe 85 PID 4276 wrote to memory of 664 4276 msedge.exe 85 PID 4276 wrote to memory of 4192 4276 msedge.exe 86 PID 4276 wrote to memory of 4192 4276 msedge.exe 86 PID 4276 wrote to memory of 4192 4276 msedge.exe 86 PID 4276 wrote to memory of 4192 4276 msedge.exe 86 PID 4276 wrote to memory of 4192 4276 msedge.exe 86 PID 4276 wrote to memory of 4192 4276 msedge.exe 86 PID 4276 wrote to memory of 4192 4276 msedge.exe 86 PID 4276 wrote to memory of 4192 4276 msedge.exe 86 PID 4276 wrote to memory of 4192 4276 msedge.exe 86 PID 4276 wrote to memory of 4192 4276 msedge.exe 86 PID 4276 wrote to memory of 4192 4276 msedge.exe 86 PID 4276 wrote to memory of 4192 4276 msedge.exe 86 PID 4276 wrote to memory of 4192 4276 msedge.exe 86 PID 4276 wrote to memory of 4192 4276 msedge.exe 86 PID 4276 wrote to memory of 4192 4276 msedge.exe 86 PID 4276 wrote to memory of 4192 4276 msedge.exe 86 PID 4276 wrote to memory of 4192 4276 msedge.exe 86 PID 4276 wrote to memory of 4192 4276 msedge.exe 86 PID 4276 wrote to memory of 4192 4276 msedge.exe 86 PID 4276 wrote to memory of 4192 4276 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\d71c4b7fb31830e6bf915434641c1ba5_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4276 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcb34c46f8,0x7ffcb34c4708,0x7ffcb34c47182⤵PID:1216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2172,16690793744655619824,5489844446507306435,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2188 /prefetch:22⤵PID:2288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2172,16690793744655619824,5489844446507306435,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2332 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2172,16690793744655619824,5489844446507306435,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2836 /prefetch:82⤵PID:4192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,16690793744655619824,5489844446507306435,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3200 /prefetch:12⤵PID:3432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,16690793744655619824,5489844446507306435,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:2604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,16690793744655619824,5489844446507306435,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4716 /prefetch:12⤵PID:3680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2172,16690793744655619824,5489844446507306435,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4988 /prefetch:82⤵PID:3964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2172,16690793744655619824,5489844446507306435,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4988 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,16690793744655619824,5489844446507306435,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5624 /prefetch:12⤵PID:1544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,16690793744655619824,5489844446507306435,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5640 /prefetch:12⤵PID:3920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,16690793744655619824,5489844446507306435,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5664 /prefetch:12⤵PID:3640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,16690793744655619824,5489844446507306435,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4812 /prefetch:12⤵PID:3660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2172,16690793744655619824,5489844446507306435,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5172 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2596
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:448
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1960
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59e3fc58a8fb86c93d19e1500b873ef6f
SHA1c6aae5f4e26f5570db5e14bba8d5061867a33b56
SHA256828f4eacac1c40b790fd70dbb6fa6ba03dcc681171d9b2a6579626d27837b1c4
SHA512e5e245b56fa82075e060f468a3224cf2ef43f1b6d87f0351a2102d85c7c897e559be4caeaecfdc4059af29fdc674681b61229319dda95cb2ee649b2eb98d313e
-
Filesize
152B
MD527304926d60324abe74d7a4b571c35ea
SHA178b8f92fcaf4a09eaa786bbe33fd1b0222ef29c1
SHA2567039ad5c2b40f4d97c8c2269f4942be13436d739b2e1f8feb7a0c9f9fdb931de
SHA512f5b6181d3f432238c7365f64fc8a373299e23ba8178bcc419471916ef8b23e909787c7c0617ab22e4eb90909c02bd7b84f1386fbc61e2bdb5a0eb474175da4bd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD5ce3773888cf471155ca877c64f6900bc
SHA1d812d926e4fbab3473177f9c0bfc839ec7a44952
SHA2561c83a2c234b3ec419e89d7592795baa9c9040568322a6acc8b74780d0c6073a2
SHA5121613281b83eba9d0c7de4e459032ad1c9f718e622f9ac3423c699d8301f5afcb3bdfbf75b02ab949bd7a4fe376ee7d5cfc8bd9ed5d92d42d8912e1f9283c650f
-
Filesize
337B
MD5ab9c76556e4fcb97824071775c7b4544
SHA19c7900d331bdcb3c3d3c256e63201adcb46fea91
SHA256d2f10193dc37e413b50ec27662442b317e334b7f990566b9f80bcb3d21893330
SHA512116cb10665418a0f6debef9637331d5ed3c4662574d6b4bc7864de53472c25077c048e2e0a9dc1db9ff1e18da2369c20dd74f8a4d6d888b2656e9bb74c8b7472
-
Filesize
5KB
MD53b0f26c3475905b8fd7e42a4b4d40c0d
SHA156263136f8f48d303fcd07b5d7d7a4dafc0c08f4
SHA25668e91abe55c3649a3ddc45fa93db0ea7e33215511d56c0621c209eb67f885934
SHA512927512d731826f9ab43dfa1965e266fe71f1dbe5b99470329ad09f3299c48a2be1f9e6526cfcdce19193fe024636674969cf933fa2a1b2a3d966980401c342e7
-
Filesize
6KB
MD586ae1d3ed839b9a478cf718a836d1ce2
SHA13db3a992f3cd34a9c39979279ca106620449eec5
SHA2565f74af984b4f1e5d60da76829885203cb11c4e036da674c175009ef981452cd6
SHA51289d5c0312ebc7b2b6d0f745eb1e6ece22e23fc6129bc6df5b3d3e90b05c4cf5df581e52fb06cb6287793d7991d9b1690ec189f57fb1f08d42341693f3155c3c9
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD550ddef2f2f1acb497c6aedcc40565487
SHA1ebfef38b4cff2a5d2140e48183deecafba2f4d65
SHA2561210fe11dd5fe46e3f202aa82c49b1d71672a58289ae37d1a5c643d1eb21f3b7
SHA5120f854ba73e89c6e749a0e1754cea08c8b4899c9c250dd2be2f45a013a2f55a10f86ed5d51706bd1edf19a7e220ea59ac73d7d5d2782ef7fabc0e7ecdb3a37f2a
-
Filesize
10KB
MD57bbc80f74d370e8fbdda28c85e377d93
SHA12b24fdbc9ecf764bb6264cc2b845bc21f849577c
SHA2563ad827d4a3f957a9d7147e008722a185f82ef015cba13cf951b3912edd133643
SHA51221ed6eca42bdba5d874966055d882f5e3c3e01f57f510f6f5595985e6e358831af7b71e96c0656cf43154240e69dac99c50048bf098ab25363faaf675fbcf1ab