Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12-09-2024 05:54
Static task
static1
Behavioral task
behavioral1
Sample
dbeeaff44663b14595386a2ccefb7aa7_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
dbeeaff44663b14595386a2ccefb7aa7_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dbeeaff44663b14595386a2ccefb7aa7_JaffaCakes118.html
-
Size
20KB
-
MD5
dbeeaff44663b14595386a2ccefb7aa7
-
SHA1
264a99368e223cc6335ded42d450b18d1f9846c6
-
SHA256
e97de24912fb7dfce0c7b65c7fad996eabc9c85a4f87f56297658f44f0c4a910
-
SHA512
88285a9d14fa95d600524c1c0d4ffe8f7455de9466c2f2f85d6084f1d5df2315b9d325bebe5a6bd2c61c9020f0112c5c7d1be69c032f20c17b878c97787773e1
-
SSDEEP
384:z06OlVo1l5zvdIlk7jNfQDAWMZA2FvWWW2:z0j/mlxlfSn2F+a
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4364 msedge.exe 4364 msedge.exe 712 msedge.exe 712 msedge.exe 3560 identity_helper.exe 3560 identity_helper.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 712 msedge.exe 712 msedge.exe 712 msedge.exe 712 msedge.exe 712 msedge.exe 712 msedge.exe 712 msedge.exe 712 msedge.exe 712 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 712 msedge.exe 712 msedge.exe 712 msedge.exe 712 msedge.exe 712 msedge.exe 712 msedge.exe 712 msedge.exe 712 msedge.exe 712 msedge.exe 712 msedge.exe 712 msedge.exe 712 msedge.exe 712 msedge.exe 712 msedge.exe 712 msedge.exe 712 msedge.exe 712 msedge.exe 712 msedge.exe 712 msedge.exe 712 msedge.exe 712 msedge.exe 712 msedge.exe 712 msedge.exe 712 msedge.exe 712 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 712 msedge.exe 712 msedge.exe 712 msedge.exe 712 msedge.exe 712 msedge.exe 712 msedge.exe 712 msedge.exe 712 msedge.exe 712 msedge.exe 712 msedge.exe 712 msedge.exe 712 msedge.exe 712 msedge.exe 712 msedge.exe 712 msedge.exe 712 msedge.exe 712 msedge.exe 712 msedge.exe 712 msedge.exe 712 msedge.exe 712 msedge.exe 712 msedge.exe 712 msedge.exe 712 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 712 wrote to memory of 3528 712 msedge.exe 82 PID 712 wrote to memory of 3528 712 msedge.exe 82 PID 712 wrote to memory of 3680 712 msedge.exe 83 PID 712 wrote to memory of 3680 712 msedge.exe 83 PID 712 wrote to memory of 3680 712 msedge.exe 83 PID 712 wrote to memory of 3680 712 msedge.exe 83 PID 712 wrote to memory of 3680 712 msedge.exe 83 PID 712 wrote to memory of 3680 712 msedge.exe 83 PID 712 wrote to memory of 3680 712 msedge.exe 83 PID 712 wrote to memory of 3680 712 msedge.exe 83 PID 712 wrote to memory of 3680 712 msedge.exe 83 PID 712 wrote to memory of 3680 712 msedge.exe 83 PID 712 wrote to memory of 3680 712 msedge.exe 83 PID 712 wrote to memory of 3680 712 msedge.exe 83 PID 712 wrote to memory of 3680 712 msedge.exe 83 PID 712 wrote to memory of 3680 712 msedge.exe 83 PID 712 wrote to memory of 3680 712 msedge.exe 83 PID 712 wrote to memory of 3680 712 msedge.exe 83 PID 712 wrote to memory of 3680 712 msedge.exe 83 PID 712 wrote to memory of 3680 712 msedge.exe 83 PID 712 wrote to memory of 3680 712 msedge.exe 83 PID 712 wrote to memory of 3680 712 msedge.exe 83 PID 712 wrote to memory of 3680 712 msedge.exe 83 PID 712 wrote to memory of 3680 712 msedge.exe 83 PID 712 wrote to memory of 3680 712 msedge.exe 83 PID 712 wrote to memory of 3680 712 msedge.exe 83 PID 712 wrote to memory of 3680 712 msedge.exe 83 PID 712 wrote to memory of 3680 712 msedge.exe 83 PID 712 wrote to memory of 3680 712 msedge.exe 83 PID 712 wrote to memory of 3680 712 msedge.exe 83 PID 712 wrote to memory of 3680 712 msedge.exe 83 PID 712 wrote to memory of 3680 712 msedge.exe 83 PID 712 wrote to memory of 3680 712 msedge.exe 83 PID 712 wrote to memory of 3680 712 msedge.exe 83 PID 712 wrote to memory of 3680 712 msedge.exe 83 PID 712 wrote to memory of 3680 712 msedge.exe 83 PID 712 wrote to memory of 3680 712 msedge.exe 83 PID 712 wrote to memory of 3680 712 msedge.exe 83 PID 712 wrote to memory of 3680 712 msedge.exe 83 PID 712 wrote to memory of 3680 712 msedge.exe 83 PID 712 wrote to memory of 3680 712 msedge.exe 83 PID 712 wrote to memory of 3680 712 msedge.exe 83 PID 712 wrote to memory of 4364 712 msedge.exe 84 PID 712 wrote to memory of 4364 712 msedge.exe 84 PID 712 wrote to memory of 3116 712 msedge.exe 85 PID 712 wrote to memory of 3116 712 msedge.exe 85 PID 712 wrote to memory of 3116 712 msedge.exe 85 PID 712 wrote to memory of 3116 712 msedge.exe 85 PID 712 wrote to memory of 3116 712 msedge.exe 85 PID 712 wrote to memory of 3116 712 msedge.exe 85 PID 712 wrote to memory of 3116 712 msedge.exe 85 PID 712 wrote to memory of 3116 712 msedge.exe 85 PID 712 wrote to memory of 3116 712 msedge.exe 85 PID 712 wrote to memory of 3116 712 msedge.exe 85 PID 712 wrote to memory of 3116 712 msedge.exe 85 PID 712 wrote to memory of 3116 712 msedge.exe 85 PID 712 wrote to memory of 3116 712 msedge.exe 85 PID 712 wrote to memory of 3116 712 msedge.exe 85 PID 712 wrote to memory of 3116 712 msedge.exe 85 PID 712 wrote to memory of 3116 712 msedge.exe 85 PID 712 wrote to memory of 3116 712 msedge.exe 85 PID 712 wrote to memory of 3116 712 msedge.exe 85 PID 712 wrote to memory of 3116 712 msedge.exe 85 PID 712 wrote to memory of 3116 712 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\dbeeaff44663b14595386a2ccefb7aa7_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:712 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc136f46f8,0x7ffc136f4708,0x7ffc136f47182⤵PID:3528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,16186310987809648402,12304200230597326135,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:22⤵PID:3680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,16186310987809648402,12304200230597326135,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2364 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,16186310987809648402,12304200230597326135,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2736 /prefetch:82⤵PID:3116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,16186310987809648402,12304200230597326135,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:2084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,16186310987809648402,12304200230597326135,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,16186310987809648402,12304200230597326135,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6024 /prefetch:12⤵PID:5024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,16186310987809648402,12304200230597326135,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5832 /prefetch:12⤵PID:4664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,16186310987809648402,12304200230597326135,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3428 /prefetch:12⤵PID:2484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,16186310987809648402,12304200230597326135,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5288 /prefetch:82⤵PID:3356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,16186310987809648402,12304200230597326135,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5288 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,16186310987809648402,12304200230597326135,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4720 /prefetch:12⤵PID:3424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,16186310987809648402,12304200230597326135,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4952 /prefetch:12⤵PID:4028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,16186310987809648402,12304200230597326135,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4172 /prefetch:12⤵PID:3644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,16186310987809648402,12304200230597326135,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5376 /prefetch:12⤵PID:2744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,16186310987809648402,12304200230597326135,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4816 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3456
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1836
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3648
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f9664c896e19205022c094d725f820b6
SHA1f8f1baf648df755ba64b412d512446baf88c0184
SHA2567121d84202a850791c2320385eb59eda4d697310dc51b1fcd4d51264aba2434e
SHA5123fa5d2c68a9e70e4a25eaac2095171d87c741eec2624c314c6a56f4fa390d6319633bf4c48b1a4af7e9a0451f346beced9693da88cfc7bcba8dfe209cbd1b3ae
-
Filesize
152B
MD5847d47008dbea51cb1732d54861ba9c9
SHA1f2099242027dccb88d6f05760b57f7c89d926c0d
SHA25610292fa05d896a2952c1d602a72d761d34bc776b44d6a7df87e49b5b613a8ac1
SHA512bd1526aa1cc1c016d95dfcc53a78b45b09dde4ce67357fc275ab835dbe1bb5b053ca386239f50cde95ad243a9c1bbb12f7505818577589beecc6084f7b94e83f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize168B
MD5aca31a094de2a7f7ffbac74e6dcf5194
SHA166abafa4c14ea04a1340aa95a5a26ca9101d18b1
SHA2569c23308e7c42eeb9665d1a8f0dfa0f25ac06f0945d5c6665d10f29f28f8d6b10
SHA5127d402762ca319d0134e0e32b317c3d833b1c5e5a7ee903727c6c0700e50deed872d9037d7de4d59734f150a660ed133c928d5fc86735f4fa7871236e30f54652
-
Filesize
1KB
MD5c008e0451925b360c0d6951e06e6795b
SHA14f4b60bbf009847aa3c08dc114d81362b56bbe65
SHA256cb3a1cdd173aa371dde78d6dd84fa701db40af1d1d300f4dd61f7adc81bf57d7
SHA512b2ec7f4045bbef9ee3cfcec8a57b71dc78bf9922242e9e30bedf0e8ad98914bb6ecbd8a5c99f3b5bece62ec8dfec0f69f662988f5dd49110674284dd09448dcb
-
Filesize
1KB
MD55f811c2077eb201f75782127a5695c28
SHA1ce2410e9d08908844b512c33c0412e5b6e0603e1
SHA256c18125a26f340ee69bd7bb133bbecc68603bac98d8f3d073675a97ca23bba2a4
SHA5128dc80d651724de2105df335ceea6809c1cc01570c78ef4659de797320c45de27de53f437a261c5ffc34f8d3daed3de7d67e0ae31a1a7b7cd17e6d8f7978d4571
-
Filesize
5KB
MD5b892098712ac23d84908a19db2bb72c4
SHA10f9b094fc36478d245ef6eb391c6642730e5a974
SHA256baa50ffe06625665cbf22d801e095ddb0a1a2b06914694beda0af84d068819bb
SHA51233b63814d1cd34af58973c39cf2f8b54d044285469aeb696db12f06aa6ef83bcbbb614a684f5a8316f7bc70250c56ca88cf8c18d92b59656b20ba464fe71f570
-
Filesize
6KB
MD5edfc7d6d4ea8fe6d34638457b0912b97
SHA11dd4428bd51538d44036adaf9428a561b1c6a54b
SHA25630c1526fee2648f9db4a44d6942afa99aeb347847660f44e1520094fd591eeaf
SHA512db789fe5216e35cf90face4b7ed76136777a8a95abf707a250f661ce3e1807d1be7d8c0e3abfe808ce7ed7891b1657cffdaaee08a2235e49e54d5ac4c649ae12
-
Filesize
6KB
MD50a8d042d28b14065e64761bc8b641fc7
SHA12a41fd1006e6871df534bfa6d869098c6c90b3c3
SHA25610515f4c3ef216ac6889e247ae66406325a9fa158dbc2994fc33d4f1361acbb4
SHA512fd72a60caf4232683ae8bf3d23371d59915e11cb211c1f4201170a8f28b81aa2d6fa243e860206bf0462fe409d3f5e75d967149ffa8bb73999809ea334a2ab0c
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD508eda4a39a3a05ae0d0e64ebf9a9a4b6
SHA1bd5d20edd08fae53a7b37e76bde9b937401c6f72
SHA2560603b8c2e78a07b7b4b62f772a4c6420209de162564e46a1c176a9b47ef9138a
SHA512b9e4b610aa51e750bb292607bfca5a1c193dd9203553e92f2a2f62a17b4ecb5bdd568bed828a470c47fce5ec113051652834b892d3f58d8583390e7ce1aa09da