Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12/09/2024, 05:37
Static task
static1
Behavioral task
behavioral1
Sample
dbe802d436a7138955f7934bcf102eeb_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dbe802d436a7138955f7934bcf102eeb_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dbe802d436a7138955f7934bcf102eeb_JaffaCakes118.html
-
Size
74KB
-
MD5
dbe802d436a7138955f7934bcf102eeb
-
SHA1
410dbc27d3f86eed9160e9d6e9cd677560176584
-
SHA256
9a05864cb597c433a2d0dc27d37874fa7e4726f1ec869ec0a8414c7548832121
-
SHA512
35c5debb8d495261fe983fbca5c7f0bb179056bf60562b6c4ccd4252ffba2efffa09fe6b7692e426a4adaf1d05c1cf583c2a3faacf9b4116c4fb6e4bce2839c6
-
SSDEEP
768:ZKPfPgCJ0sQQ1a3OJKgHD0esFAYEC49cYllLe1ceZdQ29es:EnPgCJ0m1a3OJKC0DyplLe+eZdt
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2484 msedge.exe 2484 msedge.exe 2908 msedge.exe 2908 msedge.exe 5088 identity_helper.exe 5088 identity_helper.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe 4972 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2908 wrote to memory of 1516 2908 msedge.exe 83 PID 2908 wrote to memory of 1516 2908 msedge.exe 83 PID 2908 wrote to memory of 3948 2908 msedge.exe 84 PID 2908 wrote to memory of 3948 2908 msedge.exe 84 PID 2908 wrote to memory of 3948 2908 msedge.exe 84 PID 2908 wrote to memory of 3948 2908 msedge.exe 84 PID 2908 wrote to memory of 3948 2908 msedge.exe 84 PID 2908 wrote to memory of 3948 2908 msedge.exe 84 PID 2908 wrote to memory of 3948 2908 msedge.exe 84 PID 2908 wrote to memory of 3948 2908 msedge.exe 84 PID 2908 wrote to memory of 3948 2908 msedge.exe 84 PID 2908 wrote to memory of 3948 2908 msedge.exe 84 PID 2908 wrote to memory of 3948 2908 msedge.exe 84 PID 2908 wrote to memory of 3948 2908 msedge.exe 84 PID 2908 wrote to memory of 3948 2908 msedge.exe 84 PID 2908 wrote to memory of 3948 2908 msedge.exe 84 PID 2908 wrote to memory of 3948 2908 msedge.exe 84 PID 2908 wrote to memory of 3948 2908 msedge.exe 84 PID 2908 wrote to memory of 3948 2908 msedge.exe 84 PID 2908 wrote to memory of 3948 2908 msedge.exe 84 PID 2908 wrote to memory of 3948 2908 msedge.exe 84 PID 2908 wrote to memory of 3948 2908 msedge.exe 84 PID 2908 wrote to memory of 3948 2908 msedge.exe 84 PID 2908 wrote to memory of 3948 2908 msedge.exe 84 PID 2908 wrote to memory of 3948 2908 msedge.exe 84 PID 2908 wrote to memory of 3948 2908 msedge.exe 84 PID 2908 wrote to memory of 3948 2908 msedge.exe 84 PID 2908 wrote to memory of 3948 2908 msedge.exe 84 PID 2908 wrote to memory of 3948 2908 msedge.exe 84 PID 2908 wrote to memory of 3948 2908 msedge.exe 84 PID 2908 wrote to memory of 3948 2908 msedge.exe 84 PID 2908 wrote to memory of 3948 2908 msedge.exe 84 PID 2908 wrote to memory of 3948 2908 msedge.exe 84 PID 2908 wrote to memory of 3948 2908 msedge.exe 84 PID 2908 wrote to memory of 3948 2908 msedge.exe 84 PID 2908 wrote to memory of 3948 2908 msedge.exe 84 PID 2908 wrote to memory of 3948 2908 msedge.exe 84 PID 2908 wrote to memory of 3948 2908 msedge.exe 84 PID 2908 wrote to memory of 3948 2908 msedge.exe 84 PID 2908 wrote to memory of 3948 2908 msedge.exe 84 PID 2908 wrote to memory of 3948 2908 msedge.exe 84 PID 2908 wrote to memory of 3948 2908 msedge.exe 84 PID 2908 wrote to memory of 2484 2908 msedge.exe 85 PID 2908 wrote to memory of 2484 2908 msedge.exe 85 PID 2908 wrote to memory of 4140 2908 msedge.exe 86 PID 2908 wrote to memory of 4140 2908 msedge.exe 86 PID 2908 wrote to memory of 4140 2908 msedge.exe 86 PID 2908 wrote to memory of 4140 2908 msedge.exe 86 PID 2908 wrote to memory of 4140 2908 msedge.exe 86 PID 2908 wrote to memory of 4140 2908 msedge.exe 86 PID 2908 wrote to memory of 4140 2908 msedge.exe 86 PID 2908 wrote to memory of 4140 2908 msedge.exe 86 PID 2908 wrote to memory of 4140 2908 msedge.exe 86 PID 2908 wrote to memory of 4140 2908 msedge.exe 86 PID 2908 wrote to memory of 4140 2908 msedge.exe 86 PID 2908 wrote to memory of 4140 2908 msedge.exe 86 PID 2908 wrote to memory of 4140 2908 msedge.exe 86 PID 2908 wrote to memory of 4140 2908 msedge.exe 86 PID 2908 wrote to memory of 4140 2908 msedge.exe 86 PID 2908 wrote to memory of 4140 2908 msedge.exe 86 PID 2908 wrote to memory of 4140 2908 msedge.exe 86 PID 2908 wrote to memory of 4140 2908 msedge.exe 86 PID 2908 wrote to memory of 4140 2908 msedge.exe 86 PID 2908 wrote to memory of 4140 2908 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\dbe802d436a7138955f7934bcf102eeb_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff925146f8,0x7fff92514708,0x7fff925147182⤵PID:1516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,9294526513630632529,6697185654269251044,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵PID:3948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,9294526513630632529,6697185654269251044,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2440 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,9294526513630632529,6697185654269251044,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2884 /prefetch:82⤵PID:4140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,9294526513630632529,6697185654269251044,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:12⤵PID:4964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,9294526513630632529,6697185654269251044,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3352 /prefetch:12⤵PID:2948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,9294526513630632529,6697185654269251044,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4976 /prefetch:12⤵PID:4040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,9294526513630632529,6697185654269251044,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6072 /prefetch:82⤵PID:3092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,9294526513630632529,6697185654269251044,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6072 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,9294526513630632529,6697185654269251044,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6080 /prefetch:12⤵PID:4816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,9294526513630632529,6697185654269251044,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5796 /prefetch:12⤵PID:4516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,9294526513630632529,6697185654269251044,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4116 /prefetch:12⤵PID:768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,9294526513630632529,6697185654269251044,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5256 /prefetch:12⤵PID:3420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,9294526513630632529,6697185654269251044,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3148 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4972
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2352
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2480
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5111c361619c017b5d09a13a56938bd54
SHA1e02b363a8ceb95751623f25025a9299a2c931e07
SHA256d7be4042a1e3511b0dbf0ab5c493245e4ac314440a4ae0732813db01a21ef8bc
SHA512fc16a4ad0b56899b82d05114d7b0ca8ee610cdba6ff0b6a67dea44faf17b3105109335359b78c0a59c9011a13152744a7f5d4f6a5b66ea519df750ef03f622b2
-
Filesize
152B
MD5983cbc1f706a155d63496ebc4d66515e
SHA1223d0071718b80cad9239e58c5e8e64df6e2a2fe
SHA256cc34b8f8e3f4bfe4c9a227d88f56ea2dd276ca3ac81df622ff5e9a8ec46b951c
SHA512d9cf2ca46d9379902730c81e615a3eb694873ffd535c6bb3ded2dc97cdbbfb71051ab11a07754ed6f610f04285605b702b5a48a6cfda3ee3287230c41c9c45cd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD54aec36b6e11f248e173086ae6fbc1e54
SHA13586155043f55f86592c6098abaebb053658a40f
SHA2562abac4e96b0ae4f9966b31e1c07161dd03a9a1bffa1482dfc7ba5938c42ec341
SHA512b3199506ee74ec71c80407d8a1419174642d03c126db2acd0afc5a1e76e9da4720c9733eda57ee6a9028aad14a21c14ec1ba4eab023e8ff6aa542d1f9df86cd2
-
Filesize
1KB
MD58847e63891f050568432a6658a625751
SHA14577a0c2f9b268e9299d3b85a7bcaec5b50eb66a
SHA2560a706d0decd1ca1d1b0341ce9634dba33fcb3813ba6c1615c4d02d1399acc535
SHA5129b912383aeebc43352e9557d740412eb51af645d776d859b69a522f67bcde78ab0077adb34f80deebc00355109f37c943435c5e88d51075df2f3b684a95711a6
-
Filesize
5KB
MD53ee214ee10e5ff0e7afb99d1f9de2247
SHA1a2b3e4b1766593cf75094ff83df3b1294a930eba
SHA256c4c3d2bb697b718e9f36563b27d0145b61d004c099dfa87cf7b795f6417b10fd
SHA512ef7941a701052ac79bea3c2fbd7e6b23574d67a69df5ecbdabab5c8eab972cd5b2097be39321ca58902f9aa319480d47f69b802d7b54e9c0f110cec785e72cf5
-
Filesize
6KB
MD541d5a48f189fdaf8c9f926049b699fc2
SHA1966271fdf00a99b2e50ab873792fae31b30874bd
SHA256bd005f9ddfe5c0d5e0c34f283373b1f3367eab00c0b1c53df1e037c70089994e
SHA512929f0532961dd58a6e33877784871ce68bacc4d391573af4149be9de2c4252e482fbf56c9f292434be40551e6828d62321e18acabda87795dd21a66a2e1126e1
-
Filesize
6KB
MD5e911f33ec9a35f7df1fc1bacb117426d
SHA1d03441d9c85887e300db88f2a39e30b47fecb1e1
SHA2564643b942be1517d89fdf919a05ac9a5759bf5704c3986ed002506c4d9066d6bb
SHA51235d75cb0cce7b9e3b59eb4b9a33b42779085fbc1888354f615f97e4b8b938eb967379e291033cf49cc604d097e1356cbf45fb9f34396fdba6efa8a52aa7a47cd
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5680949f907cc2093610b4a4ca8840f94
SHA11b47c681d90253b07666924f0ea397bbaaf05f8f
SHA256be006e05e05f69d921d4b6dfe8f9cba1205e514789ccbd3f70f449e60fed8cda
SHA5123b8a4b76e3405cfbfde21d64209c1e2b007b0e7735cdd7a1297ff1843a05fb7ee084e308eb8a414a471356921517d3fe82c120df176b366fc784be28b1755745