Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
15/09/2024, 02:52
Static task
static1
Behavioral task
behavioral1
Sample
e190fd23d5b8a2c83b3075455bb45510_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e190fd23d5b8a2c83b3075455bb45510_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e190fd23d5b8a2c83b3075455bb45510_JaffaCakes118.html
-
Size
160KB
-
MD5
e190fd23d5b8a2c83b3075455bb45510
-
SHA1
6d6175764bc6aabffa0627fd2e0c27df2668f9d1
-
SHA256
9da3e13433e2947114adfcb067d20335c72e2e67a7b58096521cf2553ffc8b4c
-
SHA512
ffde81b7fe7ac2de00292f2b72d528a5298aae75233f09187aa8c941393f96c1bf3251e0e55f1d9619ad1bdb77296fd8cf82e25a0fe7bdf0e72a07110e8be848
-
SSDEEP
3072:/YhBXRhGphilEsOiWSW4WvWVsxYWDc4fj5DyrdH2bCILv67RMvt3+lChE8gMWaUe:/Y/XRchw39AusxvDc4fj5DyrdH2bCIL1
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4012 msedge.exe 4012 msedge.exe 404 msedge.exe 404 msedge.exe 1308 identity_helper.exe 1308 identity_helper.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 404 wrote to memory of 4652 404 msedge.exe 83 PID 404 wrote to memory of 4652 404 msedge.exe 83 PID 404 wrote to memory of 2772 404 msedge.exe 84 PID 404 wrote to memory of 2772 404 msedge.exe 84 PID 404 wrote to memory of 2772 404 msedge.exe 84 PID 404 wrote to memory of 2772 404 msedge.exe 84 PID 404 wrote to memory of 2772 404 msedge.exe 84 PID 404 wrote to memory of 2772 404 msedge.exe 84 PID 404 wrote to memory of 2772 404 msedge.exe 84 PID 404 wrote to memory of 2772 404 msedge.exe 84 PID 404 wrote to memory of 2772 404 msedge.exe 84 PID 404 wrote to memory of 2772 404 msedge.exe 84 PID 404 wrote to memory of 2772 404 msedge.exe 84 PID 404 wrote to memory of 2772 404 msedge.exe 84 PID 404 wrote to memory of 2772 404 msedge.exe 84 PID 404 wrote to memory of 2772 404 msedge.exe 84 PID 404 wrote to memory of 2772 404 msedge.exe 84 PID 404 wrote to memory of 2772 404 msedge.exe 84 PID 404 wrote to memory of 2772 404 msedge.exe 84 PID 404 wrote to memory of 2772 404 msedge.exe 84 PID 404 wrote to memory of 2772 404 msedge.exe 84 PID 404 wrote to memory of 2772 404 msedge.exe 84 PID 404 wrote to memory of 2772 404 msedge.exe 84 PID 404 wrote to memory of 2772 404 msedge.exe 84 PID 404 wrote to memory of 2772 404 msedge.exe 84 PID 404 wrote to memory of 2772 404 msedge.exe 84 PID 404 wrote to memory of 2772 404 msedge.exe 84 PID 404 wrote to memory of 2772 404 msedge.exe 84 PID 404 wrote to memory of 2772 404 msedge.exe 84 PID 404 wrote to memory of 2772 404 msedge.exe 84 PID 404 wrote to memory of 2772 404 msedge.exe 84 PID 404 wrote to memory of 2772 404 msedge.exe 84 PID 404 wrote to memory of 2772 404 msedge.exe 84 PID 404 wrote to memory of 2772 404 msedge.exe 84 PID 404 wrote to memory of 2772 404 msedge.exe 84 PID 404 wrote to memory of 2772 404 msedge.exe 84 PID 404 wrote to memory of 2772 404 msedge.exe 84 PID 404 wrote to memory of 2772 404 msedge.exe 84 PID 404 wrote to memory of 2772 404 msedge.exe 84 PID 404 wrote to memory of 2772 404 msedge.exe 84 PID 404 wrote to memory of 2772 404 msedge.exe 84 PID 404 wrote to memory of 2772 404 msedge.exe 84 PID 404 wrote to memory of 4012 404 msedge.exe 85 PID 404 wrote to memory of 4012 404 msedge.exe 85 PID 404 wrote to memory of 3116 404 msedge.exe 86 PID 404 wrote to memory of 3116 404 msedge.exe 86 PID 404 wrote to memory of 3116 404 msedge.exe 86 PID 404 wrote to memory of 3116 404 msedge.exe 86 PID 404 wrote to memory of 3116 404 msedge.exe 86 PID 404 wrote to memory of 3116 404 msedge.exe 86 PID 404 wrote to memory of 3116 404 msedge.exe 86 PID 404 wrote to memory of 3116 404 msedge.exe 86 PID 404 wrote to memory of 3116 404 msedge.exe 86 PID 404 wrote to memory of 3116 404 msedge.exe 86 PID 404 wrote to memory of 3116 404 msedge.exe 86 PID 404 wrote to memory of 3116 404 msedge.exe 86 PID 404 wrote to memory of 3116 404 msedge.exe 86 PID 404 wrote to memory of 3116 404 msedge.exe 86 PID 404 wrote to memory of 3116 404 msedge.exe 86 PID 404 wrote to memory of 3116 404 msedge.exe 86 PID 404 wrote to memory of 3116 404 msedge.exe 86 PID 404 wrote to memory of 3116 404 msedge.exe 86 PID 404 wrote to memory of 3116 404 msedge.exe 86 PID 404 wrote to memory of 3116 404 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\e190fd23d5b8a2c83b3075455bb45510_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:404 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff83db846f8,0x7ff83db84708,0x7ff83db847182⤵PID:4652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,2521956290623945489,14952675656202248064,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:22⤵PID:2772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,2521956290623945489,14952675656202248064,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2176 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2116,2521956290623945489,14952675656202248064,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2808 /prefetch:82⤵PID:3116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,2521956290623945489,14952675656202248064,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:2176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,2521956290623945489,14952675656202248064,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:3496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,2521956290623945489,14952675656202248064,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4640 /prefetch:12⤵PID:3772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,2521956290623945489,14952675656202248064,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4776 /prefetch:12⤵PID:4744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,2521956290623945489,14952675656202248064,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5960 /prefetch:82⤵PID:3408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,2521956290623945489,14952675656202248064,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5960 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,2521956290623945489,14952675656202248064,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5052 /prefetch:12⤵PID:2308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,2521956290623945489,14952675656202248064,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5080 /prefetch:12⤵PID:4480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,2521956290623945489,14952675656202248064,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4048 /prefetch:12⤵PID:3736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,2521956290623945489,14952675656202248064,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5848 /prefetch:12⤵PID:3916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,2521956290623945489,14952675656202248064,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5104 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1376
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1576
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1852
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f9664c896e19205022c094d725f820b6
SHA1f8f1baf648df755ba64b412d512446baf88c0184
SHA2567121d84202a850791c2320385eb59eda4d697310dc51b1fcd4d51264aba2434e
SHA5123fa5d2c68a9e70e4a25eaac2095171d87c741eec2624c314c6a56f4fa390d6319633bf4c48b1a4af7e9a0451f346beced9693da88cfc7bcba8dfe209cbd1b3ae
-
Filesize
152B
MD5847d47008dbea51cb1732d54861ba9c9
SHA1f2099242027dccb88d6f05760b57f7c89d926c0d
SHA25610292fa05d896a2952c1d602a72d761d34bc776b44d6a7df87e49b5b613a8ac1
SHA512bd1526aa1cc1c016d95dfcc53a78b45b09dde4ce67357fc275ab835dbe1bb5b053ca386239f50cde95ad243a9c1bbb12f7505818577589beecc6084f7b94e83f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD50555f22b4706c5b280426c97e90c7d2d
SHA144f9ec993d13fd0616594ac058fce16ded6f0069
SHA256b70c9c005d7f01b11d527ed338ed42af0dd944c7b2db1e9841afc7fe4abe02d2
SHA512f69f42fc130d366ba43f407ea00e93e8d70b2bc8836676b381cb7e7a0a8413983e7374cac39a65c4d5b1e78402e1bc2077d7f854033eacd630311eb04c4a2b99
-
Filesize
1KB
MD5d296391fac53937bf0e95dd98115c0f7
SHA1be1ff7bc3f3a7acb45e837794cd505218f5ac341
SHA256b3ac441f56940a7c17c8a971c01255dd3ca3e0215bc1db110ecbdbf1ea52d046
SHA512013d6072c554db55c93679685ecdb8d482f72917316209a4fe82bcb189854e23eae74132734b5390e0b4b10239f17f6e8db4aeb47547503861a7f26b9b041821
-
Filesize
1KB
MD5a2180fb2d912f1a8becc3ed19ab3f0c4
SHA1018243fb762671c0296b30ccfd6b01166d0a322c
SHA2560ad275dca6b51f107f28a22e816e0b163c778a7aea25b3c0aa2ff25b272d2014
SHA512ee6fc35a43b6f0964a0cf7a7eca92d46c2b0d5f953b80790bb3ade401d1f22c69e0093f3386c8942b4b495312c672f3e184c6d3426270c4a8f5dd5684afd9d03
-
Filesize
5KB
MD58f6acf6ae6edb77133e2d9bfaf52728a
SHA13cc8fb201fceceb099fdc42dac11a1ae1ec5b472
SHA2561f963ccd706d44f44dddb0a5361ba15a51364ed6602436ade41be311dd172da5
SHA512bf55f38d41a8349d54052777b859775e893d650ba809c280dc6ca6ad51996d73df5a6453951ccf2b2c650af251a3d8dd314ea8bf05f04c0d86eb4b55f5c96dce
-
Filesize
6KB
MD5a38a46825439efe28dd0a217dabd687d
SHA1e4de7d21bf65a3ababf478de223cd8b61b511bc9
SHA2569e4809563697d9ceb652fdea8d2dedd94861a89947a42678a4d32ef6079474a7
SHA512f425761ebda362667f9473f9b3bb69d08111ac5708b0da08d019046cee7a5b2608e90cfc07902a56f2f83239a259a9862216db6bd2bfd5e4528ee04d4fa5ca7d
-
Filesize
7KB
MD54037ccd1123759c32511d6cecc9218e2
SHA1e69d163d01f61a113f49a23e3544160c04748d61
SHA256442fb3e715c7af0d7a92b6dfeee8b82ee17628d679ef5220e277ffa05b618920
SHA5124432178be7365d61e45d117483a5c1a5c60b423478a35038cf1735068d41a8edb61f4f9595b3e7946d4e45e2669e3e2a6e2056ec011cfc2b09fad6100a264cd0
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5fa3be87cf381c405c1bfd3b2ddfe4499
SHA1453b239a69f66d4a1804e094925e8eb54fc2d62f
SHA256973f280d368f0df1885a8c7f9a19f2585ee225c6342a0bbf9e342260758ac063
SHA512142bbdb9f10a1c0ed841fd7c5ed86994ba792e4e4141d356d9bdfac69d21cc6349425db82f22d86c149e9be4364edf1ba350335082f331499fde7930d795dda9