Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11/09/2024, 16:21
Static task
static1
Behavioral task
behavioral1
Sample
dabedac0b21661f05b128f451d70fd9a_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
dabedac0b21661f05b128f451d70fd9a_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dabedac0b21661f05b128f451d70fd9a_JaffaCakes118.html
-
Size
16KB
-
MD5
dabedac0b21661f05b128f451d70fd9a
-
SHA1
5401cc584e47756c796d779c90a938454e83cd4b
-
SHA256
40df8702f0a55277691b1ff4b686f99d1aa078c28a2194d0405859df1db43597
-
SHA512
54c2b1abba1be6ff8b1ef9660632c2e01b019068d36792a0d90967b374fc936c7d0cad5061a8a4df904e7e390eed50b6b75906bdc2daeaab75d8d9f78cd3fed2
-
SSDEEP
384:4NFy2hcvqsGTD4ifkVK77wd5PL54xg1R93WOgPpFkkg6Jmcu2wBgCK2Gy2V:qcZiNw1P1kxRyf8
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1364 msedge.exe 1364 msedge.exe 3556 msedge.exe 3556 msedge.exe 864 identity_helper.exe 864 identity_helper.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe 3556 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3556 wrote to memory of 2200 3556 msedge.exe 83 PID 3556 wrote to memory of 2200 3556 msedge.exe 83 PID 3556 wrote to memory of 1276 3556 msedge.exe 84 PID 3556 wrote to memory of 1276 3556 msedge.exe 84 PID 3556 wrote to memory of 1276 3556 msedge.exe 84 PID 3556 wrote to memory of 1276 3556 msedge.exe 84 PID 3556 wrote to memory of 1276 3556 msedge.exe 84 PID 3556 wrote to memory of 1276 3556 msedge.exe 84 PID 3556 wrote to memory of 1276 3556 msedge.exe 84 PID 3556 wrote to memory of 1276 3556 msedge.exe 84 PID 3556 wrote to memory of 1276 3556 msedge.exe 84 PID 3556 wrote to memory of 1276 3556 msedge.exe 84 PID 3556 wrote to memory of 1276 3556 msedge.exe 84 PID 3556 wrote to memory of 1276 3556 msedge.exe 84 PID 3556 wrote to memory of 1276 3556 msedge.exe 84 PID 3556 wrote to memory of 1276 3556 msedge.exe 84 PID 3556 wrote to memory of 1276 3556 msedge.exe 84 PID 3556 wrote to memory of 1276 3556 msedge.exe 84 PID 3556 wrote to memory of 1276 3556 msedge.exe 84 PID 3556 wrote to memory of 1276 3556 msedge.exe 84 PID 3556 wrote to memory of 1276 3556 msedge.exe 84 PID 3556 wrote to memory of 1276 3556 msedge.exe 84 PID 3556 wrote to memory of 1276 3556 msedge.exe 84 PID 3556 wrote to memory of 1276 3556 msedge.exe 84 PID 3556 wrote to memory of 1276 3556 msedge.exe 84 PID 3556 wrote to memory of 1276 3556 msedge.exe 84 PID 3556 wrote to memory of 1276 3556 msedge.exe 84 PID 3556 wrote to memory of 1276 3556 msedge.exe 84 PID 3556 wrote to memory of 1276 3556 msedge.exe 84 PID 3556 wrote to memory of 1276 3556 msedge.exe 84 PID 3556 wrote to memory of 1276 3556 msedge.exe 84 PID 3556 wrote to memory of 1276 3556 msedge.exe 84 PID 3556 wrote to memory of 1276 3556 msedge.exe 84 PID 3556 wrote to memory of 1276 3556 msedge.exe 84 PID 3556 wrote to memory of 1276 3556 msedge.exe 84 PID 3556 wrote to memory of 1276 3556 msedge.exe 84 PID 3556 wrote to memory of 1276 3556 msedge.exe 84 PID 3556 wrote to memory of 1276 3556 msedge.exe 84 PID 3556 wrote to memory of 1276 3556 msedge.exe 84 PID 3556 wrote to memory of 1276 3556 msedge.exe 84 PID 3556 wrote to memory of 1276 3556 msedge.exe 84 PID 3556 wrote to memory of 1276 3556 msedge.exe 84 PID 3556 wrote to memory of 1364 3556 msedge.exe 85 PID 3556 wrote to memory of 1364 3556 msedge.exe 85 PID 3556 wrote to memory of 4248 3556 msedge.exe 86 PID 3556 wrote to memory of 4248 3556 msedge.exe 86 PID 3556 wrote to memory of 4248 3556 msedge.exe 86 PID 3556 wrote to memory of 4248 3556 msedge.exe 86 PID 3556 wrote to memory of 4248 3556 msedge.exe 86 PID 3556 wrote to memory of 4248 3556 msedge.exe 86 PID 3556 wrote to memory of 4248 3556 msedge.exe 86 PID 3556 wrote to memory of 4248 3556 msedge.exe 86 PID 3556 wrote to memory of 4248 3556 msedge.exe 86 PID 3556 wrote to memory of 4248 3556 msedge.exe 86 PID 3556 wrote to memory of 4248 3556 msedge.exe 86 PID 3556 wrote to memory of 4248 3556 msedge.exe 86 PID 3556 wrote to memory of 4248 3556 msedge.exe 86 PID 3556 wrote to memory of 4248 3556 msedge.exe 86 PID 3556 wrote to memory of 4248 3556 msedge.exe 86 PID 3556 wrote to memory of 4248 3556 msedge.exe 86 PID 3556 wrote to memory of 4248 3556 msedge.exe 86 PID 3556 wrote to memory of 4248 3556 msedge.exe 86 PID 3556 wrote to memory of 4248 3556 msedge.exe 86 PID 3556 wrote to memory of 4248 3556 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\dabedac0b21661f05b128f451d70fd9a_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3556 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8cd7946f8,0x7ff8cd794708,0x7ff8cd7947182⤵PID:2200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,15894155131357756974,2004233773955447062,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:22⤵PID:1276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,15894155131357756974,2004233773955447062,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2240 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,15894155131357756974,2004233773955447062,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2676 /prefetch:82⤵PID:4248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,15894155131357756974,2004233773955447062,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:1324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,15894155131357756974,2004233773955447062,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:3172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,15894155131357756974,2004233773955447062,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4208 /prefetch:12⤵PID:828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,15894155131357756974,2004233773955447062,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3852 /prefetch:12⤵PID:720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,15894155131357756974,2004233773955447062,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5624 /prefetch:12⤵PID:3828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,15894155131357756974,2004233773955447062,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6132 /prefetch:82⤵PID:928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,15894155131357756974,2004233773955447062,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6132 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,15894155131357756974,2004233773955447062,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6128 /prefetch:12⤵PID:3564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,15894155131357756974,2004233773955447062,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5808 /prefetch:12⤵PID:448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,15894155131357756974,2004233773955447062,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4172 /prefetch:12⤵PID:4124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,15894155131357756974,2004233773955447062,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6208 /prefetch:12⤵PID:4972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,15894155131357756974,2004233773955447062,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5180 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4368
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2840
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:992
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5eeaa8087eba2f63f31e599f6a7b46ef4
SHA1f639519deee0766a39cfe258d2ac48e3a9d5ac03
SHA25650fe80c9435f601c30517d10f6a8a0ca6ff8ca2add7584df377371b5a5dbe2d9
SHA512eaabfad92c84f422267615c55a863af12823c5e791bdcb30cabe17f72025e07df7383cf6cf0f08e28aa18a31c2aac5985cf5281a403e22fbcc1fb5e61c49fc3c
-
Filesize
152B
MD5b9569e123772ae290f9bac07e0d31748
SHA15806ed9b301d4178a959b26d7b7ccf2c0abc6741
SHA25620ab88e23fb88186b82047cd0d6dc3cfa23422e4fd2b8f3c8437546a2a842c2b
SHA512cfad8ce716ac815b37e8cc0e30141bfb3ca7f0d4ef101289bddcf6ed3c579bc34d369f2ec2f2dab98707843015633988eb97f1e911728031dd897750b8587795
-
Filesize
212KB
MD508ec57068db9971e917b9046f90d0e49
SHA128b80d73a861f88735d89e301fa98f2ae502e94b
SHA2567a68efe41e5d8408eed6e9d91a7b7b965a3062e4e28eeffeefb8cdba6391f4d1
SHA512b154142173145122bc49ddd7f9530149100f6f3c5fd2f2e7503b13f7b160147b8b876344f6faae5e8616208c51311633df4c578802ac5d34c005bb154e9057cf
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize312B
MD5c7e4434a2965e1ca5089df094b15e369
SHA1d2a38fac0dc0b1701bd0d2a6ca285899d74ffd64
SHA2561655fa2616718996b1ba011368901d14b8bd40fd768f0147b29e3c54d86c00da
SHA512b9da9cf0a2dc6b6b079a1264218b7288eecc0c282cf2b3cbdb6ddd8795aac65153e39ad63a664ecec651b6d54203dd86eb3e61e058cfe9d852d1834624bbebff
-
Filesize
1KB
MD518479ac4ea9fb57fa3e05de9ac82f1c8
SHA110a8d72ea3fcbb23c68ec399ee98eb703a67f18c
SHA2567f30c9bcae5bcc3083045822b3517379ddedcfc63892686e24c13f43cc9a9d6a
SHA512b8252f0ccca9bc01b9f1831c397731c41d92634a5291a8a5b0d31b5bb15352a113e5269e8eb0f5ace99ad96e9790c068935131133d6d6dd8ab069f17d84f2f25
-
Filesize
5KB
MD5628708d219e146ae00d887646a262e68
SHA1f3b52627c006746038a8cc504dd503ebd7bbb551
SHA25631a297029faf21167902db99472050f0dcbe7dc1faa4de94ae161820d477f2f8
SHA512c8681ea4acc3ca0c7df55ceb94e85b4585ba4abed9232d3e595c900b697e52e1a8647d64e92ff23d8432fee0dfabefc8a64579872f0c9d18e164a77839a9e05b
-
Filesize
6KB
MD57795d41b258423709775f75225717a8d
SHA18744d178862cf3ca1d25a9230838a2b3efc63767
SHA256fa5e3145adddac59501144f8cf48cad88cd8f8681bb04173f3c97ffa038ac0da
SHA51225269273ce1b3c4fc83e7220ab9304399b413e1f0e0f7b923e0f60c28be518e6aced5be04b572eaa0a189e1a2fe3c7b7d20efc381fdef1311a3770ea2dd0d3a5
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5aee283e4bccd2d63577066635ddb31db
SHA1414df1623ad016bd5fd5e5540fe2bebcb2d2b8d5
SHA256b820578396abd2c0e7dfc1d9a05b9b514d8df7f267097ec23cd1a8de8fa40677
SHA51235c1557e3f7203971685196c643df29d6865c96c2abb1162345bb0f95c0204c4a645d54da8e9fa2b7665b325fe5b55f20d80caa3781c45fd7ef941cb8151dcab