Analysis
-
max time kernel
145s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21/09/2024, 21:48
Static task
static1
Behavioral task
behavioral1
Sample
f0ad665c047690a9455659f4ed5e3658_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
f0ad665c047690a9455659f4ed5e3658_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f0ad665c047690a9455659f4ed5e3658_JaffaCakes118.html
-
Size
232KB
-
MD5
f0ad665c047690a9455659f4ed5e3658
-
SHA1
6b094d6e9389d347c37736d46957390098021815
-
SHA256
1e82ee5992819c49194cb21d4650ab996fdce61684f9e89d77198f8a9ac7a0e4
-
SHA512
55e215307945c1212d7c0e97abf0aad062516736a96ff0b6666a23caabcd49bb60454ad8ab746cc6cbb2c346724a1837b1d9934973bfac8d17517a912b1fe0da
-
SSDEEP
6144:6OYtu8nNWOPhi6xe+kqdoskGA/8cFK8HJjoKV4dgqgG7+Xl69WeRGgEFyAPG9CbB:6OYA8nNWOPhi6xe+kqdoskGA/8cFK8Hl
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2844 msedge.exe 2844 msedge.exe 2904 msedge.exe 2904 msedge.exe 1676 identity_helper.exe 1676 identity_helper.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe 3508 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe 2904 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2904 wrote to memory of 1424 2904 msedge.exe 82 PID 2904 wrote to memory of 1424 2904 msedge.exe 82 PID 2904 wrote to memory of 2064 2904 msedge.exe 83 PID 2904 wrote to memory of 2064 2904 msedge.exe 83 PID 2904 wrote to memory of 2064 2904 msedge.exe 83 PID 2904 wrote to memory of 2064 2904 msedge.exe 83 PID 2904 wrote to memory of 2064 2904 msedge.exe 83 PID 2904 wrote to memory of 2064 2904 msedge.exe 83 PID 2904 wrote to memory of 2064 2904 msedge.exe 83 PID 2904 wrote to memory of 2064 2904 msedge.exe 83 PID 2904 wrote to memory of 2064 2904 msedge.exe 83 PID 2904 wrote to memory of 2064 2904 msedge.exe 83 PID 2904 wrote to memory of 2064 2904 msedge.exe 83 PID 2904 wrote to memory of 2064 2904 msedge.exe 83 PID 2904 wrote to memory of 2064 2904 msedge.exe 83 PID 2904 wrote to memory of 2064 2904 msedge.exe 83 PID 2904 wrote to memory of 2064 2904 msedge.exe 83 PID 2904 wrote to memory of 2064 2904 msedge.exe 83 PID 2904 wrote to memory of 2064 2904 msedge.exe 83 PID 2904 wrote to memory of 2064 2904 msedge.exe 83 PID 2904 wrote to memory of 2064 2904 msedge.exe 83 PID 2904 wrote to memory of 2064 2904 msedge.exe 83 PID 2904 wrote to memory of 2064 2904 msedge.exe 83 PID 2904 wrote to memory of 2064 2904 msedge.exe 83 PID 2904 wrote to memory of 2064 2904 msedge.exe 83 PID 2904 wrote to memory of 2064 2904 msedge.exe 83 PID 2904 wrote to memory of 2064 2904 msedge.exe 83 PID 2904 wrote to memory of 2064 2904 msedge.exe 83 PID 2904 wrote to memory of 2064 2904 msedge.exe 83 PID 2904 wrote to memory of 2064 2904 msedge.exe 83 PID 2904 wrote to memory of 2064 2904 msedge.exe 83 PID 2904 wrote to memory of 2064 2904 msedge.exe 83 PID 2904 wrote to memory of 2064 2904 msedge.exe 83 PID 2904 wrote to memory of 2064 2904 msedge.exe 83 PID 2904 wrote to memory of 2064 2904 msedge.exe 83 PID 2904 wrote to memory of 2064 2904 msedge.exe 83 PID 2904 wrote to memory of 2064 2904 msedge.exe 83 PID 2904 wrote to memory of 2064 2904 msedge.exe 83 PID 2904 wrote to memory of 2064 2904 msedge.exe 83 PID 2904 wrote to memory of 2064 2904 msedge.exe 83 PID 2904 wrote to memory of 2064 2904 msedge.exe 83 PID 2904 wrote to memory of 2064 2904 msedge.exe 83 PID 2904 wrote to memory of 2844 2904 msedge.exe 84 PID 2904 wrote to memory of 2844 2904 msedge.exe 84 PID 2904 wrote to memory of 4944 2904 msedge.exe 85 PID 2904 wrote to memory of 4944 2904 msedge.exe 85 PID 2904 wrote to memory of 4944 2904 msedge.exe 85 PID 2904 wrote to memory of 4944 2904 msedge.exe 85 PID 2904 wrote to memory of 4944 2904 msedge.exe 85 PID 2904 wrote to memory of 4944 2904 msedge.exe 85 PID 2904 wrote to memory of 4944 2904 msedge.exe 85 PID 2904 wrote to memory of 4944 2904 msedge.exe 85 PID 2904 wrote to memory of 4944 2904 msedge.exe 85 PID 2904 wrote to memory of 4944 2904 msedge.exe 85 PID 2904 wrote to memory of 4944 2904 msedge.exe 85 PID 2904 wrote to memory of 4944 2904 msedge.exe 85 PID 2904 wrote to memory of 4944 2904 msedge.exe 85 PID 2904 wrote to memory of 4944 2904 msedge.exe 85 PID 2904 wrote to memory of 4944 2904 msedge.exe 85 PID 2904 wrote to memory of 4944 2904 msedge.exe 85 PID 2904 wrote to memory of 4944 2904 msedge.exe 85 PID 2904 wrote to memory of 4944 2904 msedge.exe 85 PID 2904 wrote to memory of 4944 2904 msedge.exe 85 PID 2904 wrote to memory of 4944 2904 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\f0ad665c047690a9455659f4ed5e3658_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc457746f8,0x7ffc45774708,0x7ffc457747182⤵PID:1424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2228,16890952699184399464,15305514387664423203,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2236 /prefetch:22⤵PID:2064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2228,16890952699184399464,15305514387664423203,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2288 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2228,16890952699184399464,15305514387664423203,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2712 /prefetch:82⤵PID:4944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,16890952699184399464,15305514387664423203,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:4912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,16890952699184399464,15305514387664423203,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:4848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,16890952699184399464,15305514387664423203,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3888 /prefetch:12⤵PID:3540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,16890952699184399464,15305514387664423203,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4048 /prefetch:12⤵PID:2112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,16890952699184399464,15305514387664423203,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5052 /prefetch:12⤵PID:2096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2228,16890952699184399464,15305514387664423203,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5440 /prefetch:82⤵PID:4016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2228,16890952699184399464,15305514387664423203,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5440 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,16890952699184399464,15305514387664423203,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5124 /prefetch:12⤵PID:2700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,16890952699184399464,15305514387664423203,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5076 /prefetch:12⤵PID:5064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,16890952699184399464,15305514387664423203,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5080 /prefetch:12⤵PID:3500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,16890952699184399464,15305514387664423203,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4088 /prefetch:12⤵PID:3128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2228,16890952699184399464,15305514387664423203,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4592 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3508
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5092
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3320
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f9664c896e19205022c094d725f820b6
SHA1f8f1baf648df755ba64b412d512446baf88c0184
SHA2567121d84202a850791c2320385eb59eda4d697310dc51b1fcd4d51264aba2434e
SHA5123fa5d2c68a9e70e4a25eaac2095171d87c741eec2624c314c6a56f4fa390d6319633bf4c48b1a4af7e9a0451f346beced9693da88cfc7bcba8dfe209cbd1b3ae
-
Filesize
152B
MD5847d47008dbea51cb1732d54861ba9c9
SHA1f2099242027dccb88d6f05760b57f7c89d926c0d
SHA25610292fa05d896a2952c1d602a72d761d34bc776b44d6a7df87e49b5b613a8ac1
SHA512bd1526aa1cc1c016d95dfcc53a78b45b09dde4ce67357fc275ab835dbe1bb5b053ca386239f50cde95ad243a9c1bbb12f7505818577589beecc6084f7b94e83f
-
Filesize
212KB
MD508ec57068db9971e917b9046f90d0e49
SHA128b80d73a861f88735d89e301fa98f2ae502e94b
SHA2567a68efe41e5d8408eed6e9d91a7b7b965a3062e4e28eeffeefb8cdba6391f4d1
SHA512b154142173145122bc49ddd7f9530149100f6f3c5fd2f2e7503b13f7b160147b8b876344f6faae5e8616208c51311633df4c578802ac5d34c005bb154e9057cf
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize168B
MD5023cc33231bc0c33c270e6ea3e27f61f
SHA1e3f69fa480655a409db136279e52313b170b48bb
SHA2568de6bf49700c26fb81bada031167c09c00d84fe17eb5ee7c2cef0cd9481e6ed8
SHA512525a157880d4633a2b5919f11195ed073ece3997e3b1ba2af80febaafebbe27557a0bfc44727b2a45d4f44951e6245dfce9e88b34b4031c3c0c4d62c86031e91
-
Filesize
2KB
MD5944308d51b58138d721c255e59b7c366
SHA1be764b667815e54d579aa96b3e0f83c1e40470b9
SHA256ac9d1051ddb62265bbf9c771faffbde7b33a21c176dd3cf7bb9a26bd054f608c
SHA512e371565f36712f347f4fcb914441c752f0808a51f1fbb10b2b1bc9c920eac775ed82763a74c92e3be4645edd8638aa3e214e4964f498a758bb0cf554a386922e
-
Filesize
5KB
MD5461b8198ef3dabfb10bb093f55d069cf
SHA1788fae02e3b8db2ad826299bd72d14c1981c3f09
SHA256d9138f7de4c40dbfdc2dc99c164c3734c80b449fa2acd4ca03f715c84abbc57a
SHA512e8afa6f41e6a519e138a105b5f30572127cbad6f717db530fba2c4fe8c4654c6b7c0d5638984e8f55e8b184e2c0862129a33f4e5b4be62ec228a2c3498798afa
-
Filesize
6KB
MD50aa9351a0f1e3b9a7071dbce301fe506
SHA128b73766cc55a8a351738e7be3b8bd5d17e30ad6
SHA256838f29360ad78ddbfd5c8d6323d8a73ab6397f307387147d962cf7c5265ec854
SHA5124f0d8655e24096d83237da9a30cbb0f2ed8baafe6cb5a055440b2a057d39e7acaf3e27272c5c83b3234e71b6e8d1bf3fedf0be4bd1d908d0b098154a485d4b0c
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5d60320578caf41735e152fc950aafc28
SHA17498d55d239beff9a808758743cd2bfb6661ec53
SHA25668fd48475adcd4c286a6486fa2149d2f882b5bcedf3bdef9eea3fc6914ab32c4
SHA512c789ba10e204fedd233470a5956a7d873a1084a171c866a4f1d46ff744516d134957b21916c6c1b944039f2290c4a993ea9b07dfd795663b09e3726b516c281b