Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11-09-2024 04:19
Static task
static1
Behavioral task
behavioral1
Sample
d9997714794b5cc85bfc680ac22a69fd_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d9997714794b5cc85bfc680ac22a69fd_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d9997714794b5cc85bfc680ac22a69fd_JaffaCakes118.html
-
Size
57KB
-
MD5
d9997714794b5cc85bfc680ac22a69fd
-
SHA1
9e21c3e6770016a8f2a5232810b88b5ae6cbf0d7
-
SHA256
90e818f62fe0f87338d14f5bf67225b6adec017faf34d206048422de9754e178
-
SHA512
0facff27e554339bc75c5360dec2f66bbd618ff0c7c65d1a3e92173343e79082915e7805a6a96af709613927482e6ec539d4183fb96a18bc219645116e58beb5
-
SSDEEP
1536:ijEQvK8OPHdFAbo2vgyHJv0owbd6zKD6CDK2RVro9zwpDK2RVy:ijnOPHdFx2vgyHJutDK2RVro9zwpDK2m
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1320 msedge.exe 1320 msedge.exe 5020 msedge.exe 5020 msedge.exe 2740 identity_helper.exe 2740 identity_helper.exe 5236 msedge.exe 5236 msedge.exe 5236 msedge.exe 5236 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5020 wrote to memory of 2520 5020 msedge.exe 83 PID 5020 wrote to memory of 2520 5020 msedge.exe 83 PID 5020 wrote to memory of 4312 5020 msedge.exe 84 PID 5020 wrote to memory of 4312 5020 msedge.exe 84 PID 5020 wrote to memory of 4312 5020 msedge.exe 84 PID 5020 wrote to memory of 4312 5020 msedge.exe 84 PID 5020 wrote to memory of 4312 5020 msedge.exe 84 PID 5020 wrote to memory of 4312 5020 msedge.exe 84 PID 5020 wrote to memory of 4312 5020 msedge.exe 84 PID 5020 wrote to memory of 4312 5020 msedge.exe 84 PID 5020 wrote to memory of 4312 5020 msedge.exe 84 PID 5020 wrote to memory of 4312 5020 msedge.exe 84 PID 5020 wrote to memory of 4312 5020 msedge.exe 84 PID 5020 wrote to memory of 4312 5020 msedge.exe 84 PID 5020 wrote to memory of 4312 5020 msedge.exe 84 PID 5020 wrote to memory of 4312 5020 msedge.exe 84 PID 5020 wrote to memory of 4312 5020 msedge.exe 84 PID 5020 wrote to memory of 4312 5020 msedge.exe 84 PID 5020 wrote to memory of 4312 5020 msedge.exe 84 PID 5020 wrote to memory of 4312 5020 msedge.exe 84 PID 5020 wrote to memory of 4312 5020 msedge.exe 84 PID 5020 wrote to memory of 4312 5020 msedge.exe 84 PID 5020 wrote to memory of 4312 5020 msedge.exe 84 PID 5020 wrote to memory of 4312 5020 msedge.exe 84 PID 5020 wrote to memory of 4312 5020 msedge.exe 84 PID 5020 wrote to memory of 4312 5020 msedge.exe 84 PID 5020 wrote to memory of 4312 5020 msedge.exe 84 PID 5020 wrote to memory of 4312 5020 msedge.exe 84 PID 5020 wrote to memory of 4312 5020 msedge.exe 84 PID 5020 wrote to memory of 4312 5020 msedge.exe 84 PID 5020 wrote to memory of 4312 5020 msedge.exe 84 PID 5020 wrote to memory of 4312 5020 msedge.exe 84 PID 5020 wrote to memory of 4312 5020 msedge.exe 84 PID 5020 wrote to memory of 4312 5020 msedge.exe 84 PID 5020 wrote to memory of 4312 5020 msedge.exe 84 PID 5020 wrote to memory of 4312 5020 msedge.exe 84 PID 5020 wrote to memory of 4312 5020 msedge.exe 84 PID 5020 wrote to memory of 4312 5020 msedge.exe 84 PID 5020 wrote to memory of 4312 5020 msedge.exe 84 PID 5020 wrote to memory of 4312 5020 msedge.exe 84 PID 5020 wrote to memory of 4312 5020 msedge.exe 84 PID 5020 wrote to memory of 4312 5020 msedge.exe 84 PID 5020 wrote to memory of 1320 5020 msedge.exe 85 PID 5020 wrote to memory of 1320 5020 msedge.exe 85 PID 5020 wrote to memory of 896 5020 msedge.exe 86 PID 5020 wrote to memory of 896 5020 msedge.exe 86 PID 5020 wrote to memory of 896 5020 msedge.exe 86 PID 5020 wrote to memory of 896 5020 msedge.exe 86 PID 5020 wrote to memory of 896 5020 msedge.exe 86 PID 5020 wrote to memory of 896 5020 msedge.exe 86 PID 5020 wrote to memory of 896 5020 msedge.exe 86 PID 5020 wrote to memory of 896 5020 msedge.exe 86 PID 5020 wrote to memory of 896 5020 msedge.exe 86 PID 5020 wrote to memory of 896 5020 msedge.exe 86 PID 5020 wrote to memory of 896 5020 msedge.exe 86 PID 5020 wrote to memory of 896 5020 msedge.exe 86 PID 5020 wrote to memory of 896 5020 msedge.exe 86 PID 5020 wrote to memory of 896 5020 msedge.exe 86 PID 5020 wrote to memory of 896 5020 msedge.exe 86 PID 5020 wrote to memory of 896 5020 msedge.exe 86 PID 5020 wrote to memory of 896 5020 msedge.exe 86 PID 5020 wrote to memory of 896 5020 msedge.exe 86 PID 5020 wrote to memory of 896 5020 msedge.exe 86 PID 5020 wrote to memory of 896 5020 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\d9997714794b5cc85bfc680ac22a69fd_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5020 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff200b46f8,0x7fff200b4708,0x7fff200b47182⤵PID:2520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2220,9301663237259439546,9027292262122092763,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2240 /prefetch:22⤵PID:4312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2220,9301663237259439546,9027292262122092763,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2300 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2220,9301663237259439546,9027292262122092763,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2940 /prefetch:82⤵PID:896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,9301663237259439546,9027292262122092763,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:3964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,9301663237259439546,9027292262122092763,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:2332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,9301663237259439546,9027292262122092763,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4740 /prefetch:12⤵PID:4264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,9301663237259439546,9027292262122092763,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5292 /prefetch:12⤵PID:4428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,9301663237259439546,9027292262122092763,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5532 /prefetch:12⤵PID:1896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,9301663237259439546,9027292262122092763,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3492 /prefetch:12⤵PID:4272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2220,9301663237259439546,9027292262122092763,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6132 /prefetch:82⤵PID:3696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2220,9301663237259439546,9027292262122092763,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6132 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,9301663237259439546,9027292262122092763,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5436 /prefetch:12⤵PID:392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,9301663237259439546,9027292262122092763,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5404 /prefetch:12⤵PID:3632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,9301663237259439546,9027292262122092763,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3988 /prefetch:12⤵PID:4808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,9301663237259439546,9027292262122092763,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6280 /prefetch:12⤵PID:2072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2220,9301663237259439546,9027292262122092763,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5188 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5236
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3496
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:976
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e4f80e7950cbd3bb11257d2000cb885e
SHA110ac643904d539042d8f7aa4a312b13ec2106035
SHA2561184ee8d32d0edecddd93403fb888fad6b3e2a710d37335c3989cc529bc08124
SHA5122b92c9807fdcd937e514d4e7e1cc7c2d3e3aa162099b7289ceac2feea72d1a4afbadf1c09b3075d470efadf9a9edd63e07ea7e7a98d22243e45b3d53473fa4f0
-
Filesize
152B
MD52dc1a9f2f3f8c3cfe51bb29b078166c5
SHA1eaf3c3dad3c8dc6f18dc3e055b415da78b704402
SHA256dcb76fa365c2d9ee213b224a91cdd806d30b1e8652d72a22f2371124fa4479fa
SHA512682061d9cc86a6e5d99d022da776fb554350fc95efbf29cd84c1db4e2b7161b76cd1de48335bcc3a25633079fb0bd412e4f4795ed6291c65e9bc28d95330bb25
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize816B
MD509f6fa019b701bb4140cf68b968211b3
SHA16b3ef86583ae1406a1f72fdec0e9bb7ce556b2cb
SHA2563fedfa64e911a3ce6607bad39779cbd974fab75da52056611ae8097d70e255c0
SHA51293ffeee7b6843da4f6f6dde27504f94557f7590b0e0392abef292de0b9a106330fb85349b9a0466c79b7fea832a795510ae23c90a1b8f0a9d055f74209092708
-
Filesize
1KB
MD5bf9e3e2a48f425095fdba1de9aee1d29
SHA120c9924078e2d4275563ac690524c219a37b0ff9
SHA2565db1dd1be9dfa7297e625652c0aa413850dda1c6c5712be61e02762aa9bfcdd2
SHA512f107064b32671d3746bfc121680b961d3fcf5658ce066505ee785189df965620c94ed57b1c9259bb30828747945e7fe433fd528908e70b14e64da5af1b21c479
-
Filesize
5KB
MD5a18913227c749977bfc32926d8abcee2
SHA10b52f6803a68fef365b41fdd9793331609fd4d18
SHA256b9b7d487c93860349383a90ba62f1da5a5b1e809e450ebef1ae80c9635af0c11
SHA5129270519f3a2903449db0278ecbd008d38e38cbe31f9472a7d23d4bf3ab36d9777acbc6b93aba413bd754046ac50eac33737a97b00ca10beb9bb815f5740daadf
-
Filesize
6KB
MD5c33b14db51aa700743f9447414038672
SHA17e9400bfc7a14e86de3ea881fef0813415f6277e
SHA256fa2f46c5c6ed8df5f85702ac66e95996e736d29aaabf3252e3e655f85db21a8d
SHA512d5399d0d271fc3566dd5ec347c19b82f999cc2ab60660b9560acc5794a3817a043701859878602ae9a08ff6f57ba3294aff325d562819e3dcbeb5dbcdf631e62
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5fc508ccaa636dfdbf79266e7b88936a4
SHA1561b41d2cd41ddce67e509c248959ec9a810dbf6
SHA25681272215115f6c0b8133857546cb6d2f51c8f6ceb3ee2c41ab3a331be60bdba1
SHA512d3cd8a89bdb996839c8398a2af0b7bcd5a2e764a9a8a87243bb4f5efeae10517df483a9ab7b95f5bb0775682031a1e4bf7a2e91541e78ee7f80e22295422acb6