Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11-09-2024 13:19
Static task
static1
Behavioral task
behavioral1
Sample
da6e0ca2a02d54bdf0d04dacacef78f8_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
da6e0ca2a02d54bdf0d04dacacef78f8_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
da6e0ca2a02d54bdf0d04dacacef78f8_JaffaCakes118.html
-
Size
47KB
-
MD5
da6e0ca2a02d54bdf0d04dacacef78f8
-
SHA1
ebaa5a55fb4993a7dbd852d0cf932a5f0e05017d
-
SHA256
f9c1b90c4fe5ccef73ee9efae88ba934282a732d889e131fd9bcf92014016cbc
-
SHA512
b06184785ae6462adac3abf826161c6036ab3383898f8744f504e1d9f61e08a29ea44e4b6562c3a7d51541ef0d4c03ea1ac4b44c6a20b32614f1f203f058a30b
-
SSDEEP
768:eayHHvPWlokKwtQVfG1hizAUFEW2OiCoooZJNeB6Jt:e3HH2lJvtEfLzAEZiCeNeBk
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2580 msedge.exe 2580 msedge.exe 4828 msedge.exe 4828 msedge.exe 1940 identity_helper.exe 1940 identity_helper.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe 3512 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4828 wrote to memory of 3548 4828 msedge.exe 83 PID 4828 wrote to memory of 3548 4828 msedge.exe 83 PID 4828 wrote to memory of 2028 4828 msedge.exe 84 PID 4828 wrote to memory of 2028 4828 msedge.exe 84 PID 4828 wrote to memory of 2028 4828 msedge.exe 84 PID 4828 wrote to memory of 2028 4828 msedge.exe 84 PID 4828 wrote to memory of 2028 4828 msedge.exe 84 PID 4828 wrote to memory of 2028 4828 msedge.exe 84 PID 4828 wrote to memory of 2028 4828 msedge.exe 84 PID 4828 wrote to memory of 2028 4828 msedge.exe 84 PID 4828 wrote to memory of 2028 4828 msedge.exe 84 PID 4828 wrote to memory of 2028 4828 msedge.exe 84 PID 4828 wrote to memory of 2028 4828 msedge.exe 84 PID 4828 wrote to memory of 2028 4828 msedge.exe 84 PID 4828 wrote to memory of 2028 4828 msedge.exe 84 PID 4828 wrote to memory of 2028 4828 msedge.exe 84 PID 4828 wrote to memory of 2028 4828 msedge.exe 84 PID 4828 wrote to memory of 2028 4828 msedge.exe 84 PID 4828 wrote to memory of 2028 4828 msedge.exe 84 PID 4828 wrote to memory of 2028 4828 msedge.exe 84 PID 4828 wrote to memory of 2028 4828 msedge.exe 84 PID 4828 wrote to memory of 2028 4828 msedge.exe 84 PID 4828 wrote to memory of 2028 4828 msedge.exe 84 PID 4828 wrote to memory of 2028 4828 msedge.exe 84 PID 4828 wrote to memory of 2028 4828 msedge.exe 84 PID 4828 wrote to memory of 2028 4828 msedge.exe 84 PID 4828 wrote to memory of 2028 4828 msedge.exe 84 PID 4828 wrote to memory of 2028 4828 msedge.exe 84 PID 4828 wrote to memory of 2028 4828 msedge.exe 84 PID 4828 wrote to memory of 2028 4828 msedge.exe 84 PID 4828 wrote to memory of 2028 4828 msedge.exe 84 PID 4828 wrote to memory of 2028 4828 msedge.exe 84 PID 4828 wrote to memory of 2028 4828 msedge.exe 84 PID 4828 wrote to memory of 2028 4828 msedge.exe 84 PID 4828 wrote to memory of 2028 4828 msedge.exe 84 PID 4828 wrote to memory of 2028 4828 msedge.exe 84 PID 4828 wrote to memory of 2028 4828 msedge.exe 84 PID 4828 wrote to memory of 2028 4828 msedge.exe 84 PID 4828 wrote to memory of 2028 4828 msedge.exe 84 PID 4828 wrote to memory of 2028 4828 msedge.exe 84 PID 4828 wrote to memory of 2028 4828 msedge.exe 84 PID 4828 wrote to memory of 2028 4828 msedge.exe 84 PID 4828 wrote to memory of 2580 4828 msedge.exe 85 PID 4828 wrote to memory of 2580 4828 msedge.exe 85 PID 4828 wrote to memory of 1352 4828 msedge.exe 86 PID 4828 wrote to memory of 1352 4828 msedge.exe 86 PID 4828 wrote to memory of 1352 4828 msedge.exe 86 PID 4828 wrote to memory of 1352 4828 msedge.exe 86 PID 4828 wrote to memory of 1352 4828 msedge.exe 86 PID 4828 wrote to memory of 1352 4828 msedge.exe 86 PID 4828 wrote to memory of 1352 4828 msedge.exe 86 PID 4828 wrote to memory of 1352 4828 msedge.exe 86 PID 4828 wrote to memory of 1352 4828 msedge.exe 86 PID 4828 wrote to memory of 1352 4828 msedge.exe 86 PID 4828 wrote to memory of 1352 4828 msedge.exe 86 PID 4828 wrote to memory of 1352 4828 msedge.exe 86 PID 4828 wrote to memory of 1352 4828 msedge.exe 86 PID 4828 wrote to memory of 1352 4828 msedge.exe 86 PID 4828 wrote to memory of 1352 4828 msedge.exe 86 PID 4828 wrote to memory of 1352 4828 msedge.exe 86 PID 4828 wrote to memory of 1352 4828 msedge.exe 86 PID 4828 wrote to memory of 1352 4828 msedge.exe 86 PID 4828 wrote to memory of 1352 4828 msedge.exe 86 PID 4828 wrote to memory of 1352 4828 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\da6e0ca2a02d54bdf0d04dacacef78f8_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4828 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffd50e46f8,0x7fffd50e4708,0x7fffd50e47182⤵PID:3548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,1656632846385256961,12109647340504099348,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2176 /prefetch:22⤵PID:2028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,1656632846385256961,12109647340504099348,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2232 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,1656632846385256961,12109647340504099348,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2744 /prefetch:82⤵PID:1352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,1656632846385256961,12109647340504099348,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:3192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,1656632846385256961,12109647340504099348,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:4556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,1656632846385256961,12109647340504099348,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4656 /prefetch:12⤵PID:3536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,1656632846385256961,12109647340504099348,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4880 /prefetch:12⤵PID:5116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,1656632846385256961,12109647340504099348,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5064 /prefetch:12⤵PID:3508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,1656632846385256961,12109647340504099348,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4900 /prefetch:82⤵PID:3292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,1656632846385256961,12109647340504099348,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4900 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,1656632846385256961,12109647340504099348,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5800 /prefetch:12⤵PID:1344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,1656632846385256961,12109647340504099348,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5688 /prefetch:12⤵PID:620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,1656632846385256961,12109647340504099348,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6088 /prefetch:12⤵PID:3724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,1656632846385256961,12109647340504099348,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5412 /prefetch:12⤵PID:2844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,1656632846385256961,12109647340504099348,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5184 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3512
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4540
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3452
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59e3fc58a8fb86c93d19e1500b873ef6f
SHA1c6aae5f4e26f5570db5e14bba8d5061867a33b56
SHA256828f4eacac1c40b790fd70dbb6fa6ba03dcc681171d9b2a6579626d27837b1c4
SHA512e5e245b56fa82075e060f468a3224cf2ef43f1b6d87f0351a2102d85c7c897e559be4caeaecfdc4059af29fdc674681b61229319dda95cb2ee649b2eb98d313e
-
Filesize
152B
MD527304926d60324abe74d7a4b571c35ea
SHA178b8f92fcaf4a09eaa786bbe33fd1b0222ef29c1
SHA2567039ad5c2b40f4d97c8c2269f4942be13436d739b2e1f8feb7a0c9f9fdb931de
SHA512f5b6181d3f432238c7365f64fc8a373299e23ba8178bcc419471916ef8b23e909787c7c0617ab22e4eb90909c02bd7b84f1386fbc61e2bdb5a0eb474175da4bd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD5858817645e21ce7612d34766d17c6693
SHA114afdb104ee73e20fe9fdaae9393d589ca4ee8d7
SHA2565d60fe5bb8240b6e24c6eb7461759ee53ecf360b4a65b7fbe2648988dbe177c4
SHA5124bb7aa5be03d235ef35aa3b46bcf57efa9ae41d8d4c7d17db350aea2954d0b24fba38b01587d6e354e86d937cd910444098259a1e6e06402df3a6e991bbbe8fa
-
Filesize
1KB
MD5991a9d47efd10f8aa20791ab55d8562a
SHA1b578c4698e28ff8e82fa4134e0833e0c73bc29e9
SHA256965babf917157c4559f981868a7f8651b9e85d54c8ddc8981755fc7e31b4e24a
SHA51244e0792ce66721660635de2bc0abdf6c47521bc4d40aff7a19e175a3b5942960d193cad32d568e3f0170fcc3d3d43a92639f2928bf95b05dfa57a6a891d4a7af
-
Filesize
5KB
MD50bb54a3de718e7f9bdc7f2a909a2a0cf
SHA10670b5e27e7ba5eb982ae799454464f92c7b1fa3
SHA256839121899091a23d80c6c283faefbd91ff2751e437a39f1f6685d7f6d7ba0c23
SHA512b7bc92f5865798d912413c88923d1f4d756bc04cb48304fdb9edf95962d5ab18deb6a3ff71ecd8e2c62ca1e7731583dc986af2ba5dd079646ebeac0a31ee85cf
-
Filesize
6KB
MD50acc07186cb1a79cd265ba1ec7f58fb9
SHA1fbd34e7493e4177d060a05eebd4b81ec5814c5d9
SHA2567a21335aeee4efdf30fad777c8d5a201fab16a13b16ae84f4f6a9af5c01a5771
SHA512a240cdbb7f5471c0ebc2e5e8f163e9b61beecb9bc96f1f50683ff6f23d51eb7090c86d8b224497dbbd8398ef55e4f84c652a734fc4eb325b54b226464f828a84
-
Filesize
7KB
MD56eec0f21e56d7738f1eebe0ed63a33f5
SHA17dea9c84dfb82ebf09da5a167cfd26809c6e55dd
SHA256d55ddb6f8de9a07ca46ebfec90ca2c08a20b30a5a084152192643a5399a1a68c
SHA5124f612064f55f90043dd2021aa91f25316065e75cf7d54a7d7c41fb066815a1513d687b418572e3c4e070cc5726bf24e5541da9e5ba27506015506788afc17953
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5157fb550e1c9ce147a75dff8c35a4c81
SHA1cb8d5a2db2e0ed282fb2a4bbea4fbc25cd4761a4
SHA256b9214d41aa634eeeded28bd8d1cd59d070f581d2422a34e4ad14ebae66ae3aa2
SHA512e2ad86eb2490075dd2de935a2ec2b01784fc44eeb377846adbc78cd18abb1bc6f612a9c21260fcc5b365ede3939b8ce7ff4a3e1a3aed4bb675c1246c37bdcba3