Analysis
-
max time kernel
148s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13/09/2024, 09:54
Static task
static1
Behavioral task
behavioral1
Sample
de2b2836c54c5f605b690478fa3e148d_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
de2b2836c54c5f605b690478fa3e148d_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
de2b2836c54c5f605b690478fa3e148d_JaffaCakes118.html
-
Size
44KB
-
MD5
de2b2836c54c5f605b690478fa3e148d
-
SHA1
f9c4ebd1fde5c1278df5075d3b2ad2e640d62557
-
SHA256
962c7adee13adcab7e459c18fe2e7b862901fd83225173b8ddf690aeafb16a2e
-
SHA512
36843f4bd99e49763d00f7ee4bf18ae56ec9925c2f0fb4d29c85070c6c4b3de161167ac2e9c5f16e1448ece9c3297d9ece05bae814fbe9ef0c425dc6f50487db
-
SSDEEP
384:2ODp6ra/lpm09d7IoD7tjk2rqGU3o5fByLgWdsYrSymJA:Pp6ra9pP9d7I2hrueJyLJdWA
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3544 msedge.exe 3544 msedge.exe 1076 msedge.exe 1076 msedge.exe 3184 identity_helper.exe 3184 identity_helper.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe 1076 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1076 wrote to memory of 3672 1076 msedge.exe 83 PID 1076 wrote to memory of 3672 1076 msedge.exe 83 PID 1076 wrote to memory of 4068 1076 msedge.exe 84 PID 1076 wrote to memory of 4068 1076 msedge.exe 84 PID 1076 wrote to memory of 4068 1076 msedge.exe 84 PID 1076 wrote to memory of 4068 1076 msedge.exe 84 PID 1076 wrote to memory of 4068 1076 msedge.exe 84 PID 1076 wrote to memory of 4068 1076 msedge.exe 84 PID 1076 wrote to memory of 4068 1076 msedge.exe 84 PID 1076 wrote to memory of 4068 1076 msedge.exe 84 PID 1076 wrote to memory of 4068 1076 msedge.exe 84 PID 1076 wrote to memory of 4068 1076 msedge.exe 84 PID 1076 wrote to memory of 4068 1076 msedge.exe 84 PID 1076 wrote to memory of 4068 1076 msedge.exe 84 PID 1076 wrote to memory of 4068 1076 msedge.exe 84 PID 1076 wrote to memory of 4068 1076 msedge.exe 84 PID 1076 wrote to memory of 4068 1076 msedge.exe 84 PID 1076 wrote to memory of 4068 1076 msedge.exe 84 PID 1076 wrote to memory of 4068 1076 msedge.exe 84 PID 1076 wrote to memory of 4068 1076 msedge.exe 84 PID 1076 wrote to memory of 4068 1076 msedge.exe 84 PID 1076 wrote to memory of 4068 1076 msedge.exe 84 PID 1076 wrote to memory of 4068 1076 msedge.exe 84 PID 1076 wrote to memory of 4068 1076 msedge.exe 84 PID 1076 wrote to memory of 4068 1076 msedge.exe 84 PID 1076 wrote to memory of 4068 1076 msedge.exe 84 PID 1076 wrote to memory of 4068 1076 msedge.exe 84 PID 1076 wrote to memory of 4068 1076 msedge.exe 84 PID 1076 wrote to memory of 4068 1076 msedge.exe 84 PID 1076 wrote to memory of 4068 1076 msedge.exe 84 PID 1076 wrote to memory of 4068 1076 msedge.exe 84 PID 1076 wrote to memory of 4068 1076 msedge.exe 84 PID 1076 wrote to memory of 4068 1076 msedge.exe 84 PID 1076 wrote to memory of 4068 1076 msedge.exe 84 PID 1076 wrote to memory of 4068 1076 msedge.exe 84 PID 1076 wrote to memory of 4068 1076 msedge.exe 84 PID 1076 wrote to memory of 4068 1076 msedge.exe 84 PID 1076 wrote to memory of 4068 1076 msedge.exe 84 PID 1076 wrote to memory of 4068 1076 msedge.exe 84 PID 1076 wrote to memory of 4068 1076 msedge.exe 84 PID 1076 wrote to memory of 4068 1076 msedge.exe 84 PID 1076 wrote to memory of 4068 1076 msedge.exe 84 PID 1076 wrote to memory of 3544 1076 msedge.exe 85 PID 1076 wrote to memory of 3544 1076 msedge.exe 85 PID 1076 wrote to memory of 1432 1076 msedge.exe 86 PID 1076 wrote to memory of 1432 1076 msedge.exe 86 PID 1076 wrote to memory of 1432 1076 msedge.exe 86 PID 1076 wrote to memory of 1432 1076 msedge.exe 86 PID 1076 wrote to memory of 1432 1076 msedge.exe 86 PID 1076 wrote to memory of 1432 1076 msedge.exe 86 PID 1076 wrote to memory of 1432 1076 msedge.exe 86 PID 1076 wrote to memory of 1432 1076 msedge.exe 86 PID 1076 wrote to memory of 1432 1076 msedge.exe 86 PID 1076 wrote to memory of 1432 1076 msedge.exe 86 PID 1076 wrote to memory of 1432 1076 msedge.exe 86 PID 1076 wrote to memory of 1432 1076 msedge.exe 86 PID 1076 wrote to memory of 1432 1076 msedge.exe 86 PID 1076 wrote to memory of 1432 1076 msedge.exe 86 PID 1076 wrote to memory of 1432 1076 msedge.exe 86 PID 1076 wrote to memory of 1432 1076 msedge.exe 86 PID 1076 wrote to memory of 1432 1076 msedge.exe 86 PID 1076 wrote to memory of 1432 1076 msedge.exe 86 PID 1076 wrote to memory of 1432 1076 msedge.exe 86 PID 1076 wrote to memory of 1432 1076 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\de2b2836c54c5f605b690478fa3e148d_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1076 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff83db846f8,0x7ff83db84708,0x7ff83db847182⤵PID:3672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,10013611815597235673,8172848546205328090,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2176 /prefetch:22⤵PID:4068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2164,10013611815597235673,8172848546205328090,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2224 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2164,10013611815597235673,8172848546205328090,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2900 /prefetch:82⤵PID:1432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,10013611815597235673,8172848546205328090,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:4700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,10013611815597235673,8172848546205328090,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:3568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,10013611815597235673,8172848546205328090,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6132 /prefetch:12⤵PID:4480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2164,10013611815597235673,8172848546205328090,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5668 /prefetch:82⤵PID:2700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2164,10013611815597235673,8172848546205328090,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5668 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,10013611815597235673,8172848546205328090,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5092 /prefetch:12⤵PID:2024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,10013611815597235673,8172848546205328090,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3436 /prefetch:12⤵PID:1516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,10013611815597235673,8172848546205328090,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3540 /prefetch:12⤵PID:3164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,10013611815597235673,8172848546205328090,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4108 /prefetch:12⤵PID:1408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,10013611815597235673,8172848546205328090,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5020 /prefetch:12⤵PID:1624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,10013611815597235673,8172848546205328090,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5824 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:468
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2944
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2664
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3900
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f9664c896e19205022c094d725f820b6
SHA1f8f1baf648df755ba64b412d512446baf88c0184
SHA2567121d84202a850791c2320385eb59eda4d697310dc51b1fcd4d51264aba2434e
SHA5123fa5d2c68a9e70e4a25eaac2095171d87c741eec2624c314c6a56f4fa390d6319633bf4c48b1a4af7e9a0451f346beced9693da88cfc7bcba8dfe209cbd1b3ae
-
Filesize
152B
MD5847d47008dbea51cb1732d54861ba9c9
SHA1f2099242027dccb88d6f05760b57f7c89d926c0d
SHA25610292fa05d896a2952c1d602a72d761d34bc776b44d6a7df87e49b5b613a8ac1
SHA512bd1526aa1cc1c016d95dfcc53a78b45b09dde4ce67357fc275ab835dbe1bb5b053ca386239f50cde95ad243a9c1bbb12f7505818577589beecc6084f7b94e83f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD5821786ab26b947538ab7b1f1ae2636e6
SHA1d89c46bc963e07ad3319d0716fa7dba1c50f7993
SHA25659b27333ec2077690c36fe421ab043e35875045194e961fa56da8c01cdad4f1c
SHA51257f1abd5953fe5e959197e53a268209dac563364d20e2ba0fed0fdeb6c2674fea85d31f46487aa777f3cef838d887bde72b5d64d52571c7b747079f92b7edb77
-
Filesize
1KB
MD5523fd9f6520ddbe1fb56b9ab60c671f4
SHA17505fc28a0cb9c5302df03e1eaec00a6e75a382e
SHA2566d8de041c8ddc8d558331a9173dfa1c95d0ad516321b2b8eb644a8d236bd632b
SHA512c9cbbd1f3c9eb319cd2ec5792de18796b27a0aac05dffe5cee6c713e0f47e820e096a77031c7d7d6c15cf4047fbe49e86d4ac8e7d682e74b9738c6c68e59e139
-
Filesize
5KB
MD5c74b302df2805b738aa53f38f0d2159d
SHA1900aaa8bc2836c84933502cf90b29cdd4c0ce018
SHA256a1a6bb8ccda4aac7653740841e71695c1bdbabd48e70b5faed87fde959417be5
SHA5123c558a8e0c05bf2527de3dee5003d1e9adc83d995ba7bfa97bf97698911d80f19dcb05096a78cd0d5a5a26a62c5c25d3bfcbdb89868b85aadd0085f7444fac9e
-
Filesize
6KB
MD5ac5f689019117c9c2dffc61d2a31849a
SHA174cf1d495a9afea62b94129ddb7d6f0f92f2c158
SHA2561f0944d1f7712e67c7c498d8578f71c7e4ae031bd1d9420c75e2d6bf04bc60e2
SHA51270641758dcf25fd782bbcfeb9f995278d2e618c5bf68e580bd7ff0cf0ea886707fd0602143f6fdc60e6ac0cea0cc5c5f2fbec31f12a44be9844e831f5f971235
-
Filesize
6KB
MD5527b84da7ee894abb4ef089f1965365c
SHA1a5e332d4be2565175c8e71c35948638756f4c466
SHA2564c3a839e69e543caa478eab3d3728413bf460526dbbf62cdecf459b7727d49ca
SHA512531fe841143910c8b2a54c7747074064327e64d2acfbe2e8fd1e4089da2193d4806e14d07892195c3625849c2e465ceb60103beb7003ff11b03597339eee86c3
-
Filesize
372B
MD5e2e9ddd69b04311806932a0c5e3ab85d
SHA12160ce3f5dddbea7db2926a2bec5a16c44c4ee9a
SHA2569ebc66a08816cb1e4c7ebaf8b409378e06a1644e346e9fbe718143014328af53
SHA512ebd71c2b82103fd62580bb1714da745f871bb0fb8d3b13d1eec57e7d0614534cfbd18f6a07ef00c4220bfdd02d22e6ee87eab3a9d3b11c1c9890361c666a5e89
-
Filesize
204B
MD5759b4eb6d34f369a7dc53b2cdd6f6301
SHA1520a4c89bab6401e6ed373d51d432035ffbcb1ae
SHA25622f779892b6ed4ce3e9fddf0eac58b8d35ff2033a599a89d41a322231f5cec1a
SHA51230907d151eeeb647ea159bf7b4573f3511f9e2f6ecf431fc320be5b2a7f297956d505de13a9570069b25e44c8928f020131ae7b502657593e87b02651eed67aa
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD552cb10dc2c623fdfcd6a1c22a0f2fb8f
SHA1637fe5ab99187d8f00f028718592b1ced0be8d2a
SHA2564d99b5b15d5dfccf87330a3655899107e53a2fe7ae29751a40589ca501356126
SHA512a3404fafdc4527426f9601932cb854ee8bd8003eea4a0b28f7d0a652d150c540261900b54603706534a26b2f84001ef0dbc174a44a7c1f9488d5383b4f1ba79a