Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2024, 18:53
Static task
static1
Behavioral task
behavioral1
Sample
ebfbe599748907119e6ad5442c91ee4f_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ebfbe599748907119e6ad5442c91ee4f_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ebfbe599748907119e6ad5442c91ee4f_JaffaCakes118.html
-
Size
57KB
-
MD5
ebfbe599748907119e6ad5442c91ee4f
-
SHA1
d8918e11f35b8097195e9184e28b8507ad273053
-
SHA256
d38f0fb0236cbbe1ddf6eedc637512f58bc02730509604b83913f71bcb42bc98
-
SHA512
2e62e2849eeb886ae7ae0c9ef919d57ca7d9a4cfdb0525d999534f0f0965df6795d32f46873f3804c6ae618c576b62c843b4bcffa3b0e1d65c5f9bc8f30ac145
-
SSDEEP
1536:ijEQvK8OPHdsAuo2vgyHJv0owbd6zKD6CDK2RVroZwwpDK2RVy:ijnOPHds22vgyHJutDK2RVroZwwpDK2m
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 368 msedge.exe 368 msedge.exe 5044 msedge.exe 5044 msedge.exe 4972 identity_helper.exe 4972 identity_helper.exe 1972 msedge.exe 1972 msedge.exe 1972 msedge.exe 1972 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5044 wrote to memory of 2472 5044 msedge.exe 82 PID 5044 wrote to memory of 2472 5044 msedge.exe 82 PID 5044 wrote to memory of 4556 5044 msedge.exe 83 PID 5044 wrote to memory of 4556 5044 msedge.exe 83 PID 5044 wrote to memory of 4556 5044 msedge.exe 83 PID 5044 wrote to memory of 4556 5044 msedge.exe 83 PID 5044 wrote to memory of 4556 5044 msedge.exe 83 PID 5044 wrote to memory of 4556 5044 msedge.exe 83 PID 5044 wrote to memory of 4556 5044 msedge.exe 83 PID 5044 wrote to memory of 4556 5044 msedge.exe 83 PID 5044 wrote to memory of 4556 5044 msedge.exe 83 PID 5044 wrote to memory of 4556 5044 msedge.exe 83 PID 5044 wrote to memory of 4556 5044 msedge.exe 83 PID 5044 wrote to memory of 4556 5044 msedge.exe 83 PID 5044 wrote to memory of 4556 5044 msedge.exe 83 PID 5044 wrote to memory of 4556 5044 msedge.exe 83 PID 5044 wrote to memory of 4556 5044 msedge.exe 83 PID 5044 wrote to memory of 4556 5044 msedge.exe 83 PID 5044 wrote to memory of 4556 5044 msedge.exe 83 PID 5044 wrote to memory of 4556 5044 msedge.exe 83 PID 5044 wrote to memory of 4556 5044 msedge.exe 83 PID 5044 wrote to memory of 4556 5044 msedge.exe 83 PID 5044 wrote to memory of 4556 5044 msedge.exe 83 PID 5044 wrote to memory of 4556 5044 msedge.exe 83 PID 5044 wrote to memory of 4556 5044 msedge.exe 83 PID 5044 wrote to memory of 4556 5044 msedge.exe 83 PID 5044 wrote to memory of 4556 5044 msedge.exe 83 PID 5044 wrote to memory of 4556 5044 msedge.exe 83 PID 5044 wrote to memory of 4556 5044 msedge.exe 83 PID 5044 wrote to memory of 4556 5044 msedge.exe 83 PID 5044 wrote to memory of 4556 5044 msedge.exe 83 PID 5044 wrote to memory of 4556 5044 msedge.exe 83 PID 5044 wrote to memory of 4556 5044 msedge.exe 83 PID 5044 wrote to memory of 4556 5044 msedge.exe 83 PID 5044 wrote to memory of 4556 5044 msedge.exe 83 PID 5044 wrote to memory of 4556 5044 msedge.exe 83 PID 5044 wrote to memory of 4556 5044 msedge.exe 83 PID 5044 wrote to memory of 4556 5044 msedge.exe 83 PID 5044 wrote to memory of 4556 5044 msedge.exe 83 PID 5044 wrote to memory of 4556 5044 msedge.exe 83 PID 5044 wrote to memory of 4556 5044 msedge.exe 83 PID 5044 wrote to memory of 4556 5044 msedge.exe 83 PID 5044 wrote to memory of 368 5044 msedge.exe 84 PID 5044 wrote to memory of 368 5044 msedge.exe 84 PID 5044 wrote to memory of 32 5044 msedge.exe 85 PID 5044 wrote to memory of 32 5044 msedge.exe 85 PID 5044 wrote to memory of 32 5044 msedge.exe 85 PID 5044 wrote to memory of 32 5044 msedge.exe 85 PID 5044 wrote to memory of 32 5044 msedge.exe 85 PID 5044 wrote to memory of 32 5044 msedge.exe 85 PID 5044 wrote to memory of 32 5044 msedge.exe 85 PID 5044 wrote to memory of 32 5044 msedge.exe 85 PID 5044 wrote to memory of 32 5044 msedge.exe 85 PID 5044 wrote to memory of 32 5044 msedge.exe 85 PID 5044 wrote to memory of 32 5044 msedge.exe 85 PID 5044 wrote to memory of 32 5044 msedge.exe 85 PID 5044 wrote to memory of 32 5044 msedge.exe 85 PID 5044 wrote to memory of 32 5044 msedge.exe 85 PID 5044 wrote to memory of 32 5044 msedge.exe 85 PID 5044 wrote to memory of 32 5044 msedge.exe 85 PID 5044 wrote to memory of 32 5044 msedge.exe 85 PID 5044 wrote to memory of 32 5044 msedge.exe 85 PID 5044 wrote to memory of 32 5044 msedge.exe 85 PID 5044 wrote to memory of 32 5044 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\ebfbe599748907119e6ad5442c91ee4f_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5044 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff904ef46f8,0x7ff904ef4708,0x7ff904ef47182⤵PID:2472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,14406753783295042822,1322061197638304315,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2096 /prefetch:22⤵PID:4556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2068,14406753783295042822,1322061197638304315,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2564 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2068,14406753783295042822,1322061197638304315,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2824 /prefetch:82⤵PID:32
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,14406753783295042822,1322061197638304315,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:5072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,14406753783295042822,1322061197638304315,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:2100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,14406753783295042822,1322061197638304315,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4740 /prefetch:12⤵PID:4928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,14406753783295042822,1322061197638304315,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4920 /prefetch:12⤵PID:1016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,14406753783295042822,1322061197638304315,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5600 /prefetch:12⤵PID:3580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,14406753783295042822,1322061197638304315,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5848 /prefetch:12⤵PID:1084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,14406753783295042822,1322061197638304315,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6088 /prefetch:12⤵PID:4044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,14406753783295042822,1322061197638304315,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6104 /prefetch:12⤵PID:2456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,14406753783295042822,1322061197638304315,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6272 /prefetch:82⤵PID:2064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,14406753783295042822,1322061197638304315,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6272 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,14406753783295042822,1322061197638304315,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5896 /prefetch:12⤵PID:5100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,14406753783295042822,1322061197638304315,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6392 /prefetch:12⤵PID:4596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,14406753783295042822,1322061197638304315,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5940 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1972
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4952
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2136
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD553bc70ecb115bdbabe67620c416fe9b3
SHA1af66ec51a13a59639eaf54d62ff3b4f092bb2fc1
SHA256b36cad5c1f7bc7d07c7eaa2f3cad2959ddb5447d4d3adcb46eb6a99808e22771
SHA512cad44933b94e17908c0eb8ac5feeb53d03a7720d97e7ccc8724a1ed3021a5bece09e1f9f3cec56ce0739176ebbbeb20729e650f8bca04e5060c986b75d8e4921
-
Filesize
152B
MD5e765f3d75e6b0e4a7119c8b14d47d8da
SHA1cc9f7c7826c2e1a129e7d98884926076c3714fc0
SHA256986443556d3878258b710d9d9efbf4f25f0d764c3f83dc54217f2b12a6eccd89
SHA512a1872a849f27da78ebe9adb9beb260cb49ed5f4ca2d403f23379112bdfcd2482446a6708188100496e45db1517cdb43aba8bb93a75e605713c3f97cd716b1079
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize816B
MD538ba7beaf32cc08cbb978ab724cda6e4
SHA1f75a6fc83c15fd9d27cb5f5a5628261eb7caa033
SHA256c753fa4ba2c8ec6bac36c203738094b4154b2088c0e79b9580cec536175ee5db
SHA5129641aaf3203f9f7e77cb655c8214c5a06aea949218fc569c83254a69a137e33f72a435d23e30b1a615ec0263b3053e35a2a27ccaa636d6b650b8cf6ffd110a6b
-
Filesize
1KB
MD593c10145239e374e6ed15406cbafe36f
SHA100fecdc41a80a5de9e6d6925eacf307a6fa558e3
SHA25696222027b4642f0a5342f4a5eca165df66f0a17459c732f880f16056be4ee10e
SHA512586f15b34276193d19b0cb02655b7086ef3caf63948b4e8a16d2dce66072bbc124fce65f289e4f4fd4a1312af2f35aae96b24223b05c615ec7c71d8226f8438c
-
Filesize
5KB
MD591a5fc5211de8ce3dd57dbdbab07dff0
SHA175fd99daf2d5aed69c570426845a462d640c8cbe
SHA25678c7e5eaf2bfee9edb16807254a195746466fcf23cbc96216e950c35736eea21
SHA51272eb60aa462611c20adee8144f62283cf550082dfee71da4aa3c3998bef7cb2e9a3ebd522e7cdec0268f63d3b8f3103a699f2a42a838d8210ac05a9fd24dd1cd
-
Filesize
6KB
MD57323516d934d3fe4cb9764c33b60d180
SHA15c9d5a4656f7f06e363ccd3157a4d9a2e73189c4
SHA256d0ceb9bcf96f559989e7f6bf1583db440f992ecc6472e1d7aa984e05d2dd5773
SHA512868639e5afc8e6cb8f4cd84302f3aac3fbca62b9ebd13b621f61fa2e3e09cc8fe0c3d660e55ee3b60f390264811b40e984792327080887dfa09976411c834ea1
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5267ad932b37a5f05ea48882b2754234b
SHA173657bd4fe38c46b8ea1ff68b445b9186cb073f4
SHA256cdd068a7dd05678afe7d56ba6293f0b3391ca491da1814238c17eac37efb76d3
SHA512a2118b56a1ae1aa2093cb578eb667fec58a166996dae42bb2209a3dc5916c19c70797f0471463dd3a4e5f95a80a9a83afbd33eed2e8da2de263ed675b7e41300