Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11/09/2024, 16:37
Static task
static1
Behavioral task
behavioral1
Sample
dac62add735e3b42562f6b03d94e96d6_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dac62add735e3b42562f6b03d94e96d6_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dac62add735e3b42562f6b03d94e96d6_JaffaCakes118.html
-
Size
34KB
-
MD5
dac62add735e3b42562f6b03d94e96d6
-
SHA1
d7068eb9922740eec79e2730e69776feea3b8bff
-
SHA256
82c5629fd3d32b5e636402ffba49408cfd819c17932f2c817d4208a704096823
-
SHA512
401fdc205c1c7ede95481c40dec689ca11a54ec0c979305ab57a23d3435c07998401b2534b3ff8d88800d0431e12d4a9699cdea8b81fcf8be30d4d7038fefa58
-
SSDEEP
768:gufeYBO7HTVMY+RxouoRoorv6cpcpJMcyTh9EeXNXFQtdzOqp5NJBp+LvjeYpr9w:gufeYBO7HTVMY+Rxo3rvnRThCenQtdzL
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1308 msedge.exe 1308 msedge.exe 2260 msedge.exe 2260 msedge.exe 4324 identity_helper.exe 4324 identity_helper.exe 3292 msedge.exe 3292 msedge.exe 3292 msedge.exe 3292 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2260 wrote to memory of 2228 2260 msedge.exe 83 PID 2260 wrote to memory of 2228 2260 msedge.exe 83 PID 2260 wrote to memory of 1420 2260 msedge.exe 84 PID 2260 wrote to memory of 1420 2260 msedge.exe 84 PID 2260 wrote to memory of 1420 2260 msedge.exe 84 PID 2260 wrote to memory of 1420 2260 msedge.exe 84 PID 2260 wrote to memory of 1420 2260 msedge.exe 84 PID 2260 wrote to memory of 1420 2260 msedge.exe 84 PID 2260 wrote to memory of 1420 2260 msedge.exe 84 PID 2260 wrote to memory of 1420 2260 msedge.exe 84 PID 2260 wrote to memory of 1420 2260 msedge.exe 84 PID 2260 wrote to memory of 1420 2260 msedge.exe 84 PID 2260 wrote to memory of 1420 2260 msedge.exe 84 PID 2260 wrote to memory of 1420 2260 msedge.exe 84 PID 2260 wrote to memory of 1420 2260 msedge.exe 84 PID 2260 wrote to memory of 1420 2260 msedge.exe 84 PID 2260 wrote to memory of 1420 2260 msedge.exe 84 PID 2260 wrote to memory of 1420 2260 msedge.exe 84 PID 2260 wrote to memory of 1420 2260 msedge.exe 84 PID 2260 wrote to memory of 1420 2260 msedge.exe 84 PID 2260 wrote to memory of 1420 2260 msedge.exe 84 PID 2260 wrote to memory of 1420 2260 msedge.exe 84 PID 2260 wrote to memory of 1420 2260 msedge.exe 84 PID 2260 wrote to memory of 1420 2260 msedge.exe 84 PID 2260 wrote to memory of 1420 2260 msedge.exe 84 PID 2260 wrote to memory of 1420 2260 msedge.exe 84 PID 2260 wrote to memory of 1420 2260 msedge.exe 84 PID 2260 wrote to memory of 1420 2260 msedge.exe 84 PID 2260 wrote to memory of 1420 2260 msedge.exe 84 PID 2260 wrote to memory of 1420 2260 msedge.exe 84 PID 2260 wrote to memory of 1420 2260 msedge.exe 84 PID 2260 wrote to memory of 1420 2260 msedge.exe 84 PID 2260 wrote to memory of 1420 2260 msedge.exe 84 PID 2260 wrote to memory of 1420 2260 msedge.exe 84 PID 2260 wrote to memory of 1420 2260 msedge.exe 84 PID 2260 wrote to memory of 1420 2260 msedge.exe 84 PID 2260 wrote to memory of 1420 2260 msedge.exe 84 PID 2260 wrote to memory of 1420 2260 msedge.exe 84 PID 2260 wrote to memory of 1420 2260 msedge.exe 84 PID 2260 wrote to memory of 1420 2260 msedge.exe 84 PID 2260 wrote to memory of 1420 2260 msedge.exe 84 PID 2260 wrote to memory of 1420 2260 msedge.exe 84 PID 2260 wrote to memory of 1308 2260 msedge.exe 85 PID 2260 wrote to memory of 1308 2260 msedge.exe 85 PID 2260 wrote to memory of 3080 2260 msedge.exe 86 PID 2260 wrote to memory of 3080 2260 msedge.exe 86 PID 2260 wrote to memory of 3080 2260 msedge.exe 86 PID 2260 wrote to memory of 3080 2260 msedge.exe 86 PID 2260 wrote to memory of 3080 2260 msedge.exe 86 PID 2260 wrote to memory of 3080 2260 msedge.exe 86 PID 2260 wrote to memory of 3080 2260 msedge.exe 86 PID 2260 wrote to memory of 3080 2260 msedge.exe 86 PID 2260 wrote to memory of 3080 2260 msedge.exe 86 PID 2260 wrote to memory of 3080 2260 msedge.exe 86 PID 2260 wrote to memory of 3080 2260 msedge.exe 86 PID 2260 wrote to memory of 3080 2260 msedge.exe 86 PID 2260 wrote to memory of 3080 2260 msedge.exe 86 PID 2260 wrote to memory of 3080 2260 msedge.exe 86 PID 2260 wrote to memory of 3080 2260 msedge.exe 86 PID 2260 wrote to memory of 3080 2260 msedge.exe 86 PID 2260 wrote to memory of 3080 2260 msedge.exe 86 PID 2260 wrote to memory of 3080 2260 msedge.exe 86 PID 2260 wrote to memory of 3080 2260 msedge.exe 86 PID 2260 wrote to memory of 3080 2260 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\dac62add735e3b42562f6b03d94e96d6_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9c68146f8,0x7ff9c6814708,0x7ff9c68147182⤵PID:2228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2292,1519464479723733188,12830929848155902392,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2304 /prefetch:22⤵PID:1420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2292,1519464479723733188,12830929848155902392,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2356 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2292,1519464479723733188,12830929848155902392,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2660 /prefetch:82⤵PID:3080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2292,1519464479723733188,12830929848155902392,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2292,1519464479723733188,12830929848155902392,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:4560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2292,1519464479723733188,12830929848155902392,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6116 /prefetch:12⤵PID:3232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2292,1519464479723733188,12830929848155902392,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4124 /prefetch:12⤵PID:3744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2292,1519464479723733188,12830929848155902392,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5564 /prefetch:82⤵PID:1236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2292,1519464479723733188,12830929848155902392,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5564 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2292,1519464479723733188,12830929848155902392,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5568 /prefetch:12⤵PID:1868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2292,1519464479723733188,12830929848155902392,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5100 /prefetch:12⤵PID:1504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2292,1519464479723733188,12830929848155902392,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4272 /prefetch:12⤵PID:3772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2292,1519464479723733188,12830929848155902392,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5708 /prefetch:12⤵PID:3124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2292,1519464479723733188,12830929848155902392,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2284 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3292
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3748
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2768
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ecf7ca53c80b5245e35839009d12f866
SHA1a7af77cf31d410708ebd35a232a80bddfb0615bb
SHA256882a513b71b26210ff251769b82b2c5d59a932f96d9ce606ca2fab6530a13687
SHA512706722bd22ce27d854036b1b16e6a3cdb36284b66edc76238a79c2e11cee7d1307b121c898ad832eb1af73e4f08d991d64dc0bff529896ffb4ebe9b3dc381696
-
Filesize
152B
MD54dd2754d1bea40445984d65abee82b21
SHA14b6a5658bae9a784a370a115fbb4a12e92bd3390
SHA256183b8e82a0deaa83d04736553671cedb738adc909f483b3c5f822a0e6be7477d
SHA51292d44ee372ad33f892b921efa6cabc78e91025e89f05a22830763217826fa98d51d55711f85c8970ac58abf9adc6c85cc40878032cd6d2589ab226cd099f99e1
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize336B
MD56ec12100cf14a847702c979c1cf2b251
SHA1e80cc023cb6cd3976ef23602a915cf649b304c2a
SHA256d0cc0d8f2aa618a255205291196e4e151e3b7ecaa9a6264f5805ea105b8ea96c
SHA512efa6f363598e303f28aa4a602caa728280ff60961e11cbdd75afaa00ac5cd03e3dc2f00b26d6862876a3660b942f1733baabe0afdee4d639b7219bf60e8c7e3f
-
Filesize
455B
MD5b25758c440d87b9f2cf6440ba470f79c
SHA11571a794291d8677e3386b8f68c3aec8d6e38edd
SHA256a8ff36387673ebaa43f13ec0f6a8bac50ce976c1ddbef7b9ece13026ab1c2651
SHA512f8f7aff6840de11f5625a847163ee026f037daca83d817e3f462e6f105117db219189cbd96e60d084dedf5741efaa71773fc4a70432a1148a4361bf6518e6053
-
Filesize
5KB
MD5a3c34aec86c1d77c0cbcb41fe96c2d43
SHA15ce9e06d7ccc2dd7a36305eabcd1cbcfcf6103a1
SHA2560ce3061517f095ff5a5fe4c106baad67f8db490c5b5e7628e1aaea61d4a89108
SHA5125081419172e5d247bd008797bf4d521af0b039298fe0201d6b26b7cbf5ab7e6d6bff7b9ef4896a6cef0103a1ad7816d53e9e8346fee8a1174550a38a07d1aed6
-
Filesize
6KB
MD53a7d53da3fbe163b1a56c08ca15cc829
SHA1a75df5befa59a77a8b4fd166d637f4faf76268e0
SHA2568db96720a45712eefb76e082d7f2d6c8ea03ed766bee17ccf6be38a613d949ce
SHA512eca5f4b367bebcb04c74b77e4b92adef306411c95389517eb3314df4f442e0bb8cf1b31e75217547046948fc57bff9f0cc43d0f3bae25173019cfbfdb972c892
-
Filesize
6KB
MD549772a7e39cb9f199530328c1b9069fb
SHA158d531c41be61b6c7715a3ca9fb1b33eac1cd478
SHA2569402d6ca745e434c066a4323d07fafa67af6636284d189c9f341c7fdb5b5cefa
SHA512e3bcefbbfc2a524753ce5ab846ad735dcc867506b6d9823c742062121ef9845cf2e8bd3c7964bb3879a8f523abde5214cc941a4e599e28fe5f57425634000a34
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5a8ad93ff053dd5c64ca43b5b96df72d4
SHA19b6bac0e563e692e4cf2fbf5fd07981d82087c16
SHA25634dc717cc66794b856d516fdee642300f77a073ec4f560d8c5fc4ec1c1bba85c
SHA512f0be1c8b8c71c2138d03dc5d84c974f6ba302f93a17f868105de88ae8877f48741f07673264774e1745f13f596eb87acceb134f9bacd04a671c7a38324be1215