Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21/09/2024, 04:37
Static task
static1
Behavioral task
behavioral1
Sample
ef145f91cf49d79d2b220582e3ae3fdd_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ef145f91cf49d79d2b220582e3ae3fdd_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ef145f91cf49d79d2b220582e3ae3fdd_JaffaCakes118.html
-
Size
476KB
-
MD5
ef145f91cf49d79d2b220582e3ae3fdd
-
SHA1
05d1a79662eabee574b9eef89dba32315d176371
-
SHA256
bafd1c83455eb92d142797eeab3054560a3ad882967fbd881edc8f2a2eabc388
-
SHA512
a0393f41ea8c2b7b710166a9a9c17d0a8d9ed298c9b166791d180a4f6159a9bda398feb4f9a766f651ec4a13309b3295f27a1157e2357191bb7889b2336bf209
-
SSDEEP
12288:j/7Q0pFDV4szZ6wm1KA9kGDj3Cyg5lrceb0qTwGmPe+2qFj1nM:jTQ0pFDV4szZ6wm1KA9kGDj3Cyg5lrcA
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1132 msedge.exe 1132 msedge.exe 4280 msedge.exe 4280 msedge.exe 3252 identity_helper.exe 3252 identity_helper.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe 3892 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe 4280 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4280 wrote to memory of 3904 4280 msedge.exe 82 PID 4280 wrote to memory of 3904 4280 msedge.exe 82 PID 4280 wrote to memory of 1868 4280 msedge.exe 83 PID 4280 wrote to memory of 1868 4280 msedge.exe 83 PID 4280 wrote to memory of 1868 4280 msedge.exe 83 PID 4280 wrote to memory of 1868 4280 msedge.exe 83 PID 4280 wrote to memory of 1868 4280 msedge.exe 83 PID 4280 wrote to memory of 1868 4280 msedge.exe 83 PID 4280 wrote to memory of 1868 4280 msedge.exe 83 PID 4280 wrote to memory of 1868 4280 msedge.exe 83 PID 4280 wrote to memory of 1868 4280 msedge.exe 83 PID 4280 wrote to memory of 1868 4280 msedge.exe 83 PID 4280 wrote to memory of 1868 4280 msedge.exe 83 PID 4280 wrote to memory of 1868 4280 msedge.exe 83 PID 4280 wrote to memory of 1868 4280 msedge.exe 83 PID 4280 wrote to memory of 1868 4280 msedge.exe 83 PID 4280 wrote to memory of 1868 4280 msedge.exe 83 PID 4280 wrote to memory of 1868 4280 msedge.exe 83 PID 4280 wrote to memory of 1868 4280 msedge.exe 83 PID 4280 wrote to memory of 1868 4280 msedge.exe 83 PID 4280 wrote to memory of 1868 4280 msedge.exe 83 PID 4280 wrote to memory of 1868 4280 msedge.exe 83 PID 4280 wrote to memory of 1868 4280 msedge.exe 83 PID 4280 wrote to memory of 1868 4280 msedge.exe 83 PID 4280 wrote to memory of 1868 4280 msedge.exe 83 PID 4280 wrote to memory of 1868 4280 msedge.exe 83 PID 4280 wrote to memory of 1868 4280 msedge.exe 83 PID 4280 wrote to memory of 1868 4280 msedge.exe 83 PID 4280 wrote to memory of 1868 4280 msedge.exe 83 PID 4280 wrote to memory of 1868 4280 msedge.exe 83 PID 4280 wrote to memory of 1868 4280 msedge.exe 83 PID 4280 wrote to memory of 1868 4280 msedge.exe 83 PID 4280 wrote to memory of 1868 4280 msedge.exe 83 PID 4280 wrote to memory of 1868 4280 msedge.exe 83 PID 4280 wrote to memory of 1868 4280 msedge.exe 83 PID 4280 wrote to memory of 1868 4280 msedge.exe 83 PID 4280 wrote to memory of 1868 4280 msedge.exe 83 PID 4280 wrote to memory of 1868 4280 msedge.exe 83 PID 4280 wrote to memory of 1868 4280 msedge.exe 83 PID 4280 wrote to memory of 1868 4280 msedge.exe 83 PID 4280 wrote to memory of 1868 4280 msedge.exe 83 PID 4280 wrote to memory of 1868 4280 msedge.exe 83 PID 4280 wrote to memory of 1132 4280 msedge.exe 84 PID 4280 wrote to memory of 1132 4280 msedge.exe 84 PID 4280 wrote to memory of 1512 4280 msedge.exe 85 PID 4280 wrote to memory of 1512 4280 msedge.exe 85 PID 4280 wrote to memory of 1512 4280 msedge.exe 85 PID 4280 wrote to memory of 1512 4280 msedge.exe 85 PID 4280 wrote to memory of 1512 4280 msedge.exe 85 PID 4280 wrote to memory of 1512 4280 msedge.exe 85 PID 4280 wrote to memory of 1512 4280 msedge.exe 85 PID 4280 wrote to memory of 1512 4280 msedge.exe 85 PID 4280 wrote to memory of 1512 4280 msedge.exe 85 PID 4280 wrote to memory of 1512 4280 msedge.exe 85 PID 4280 wrote to memory of 1512 4280 msedge.exe 85 PID 4280 wrote to memory of 1512 4280 msedge.exe 85 PID 4280 wrote to memory of 1512 4280 msedge.exe 85 PID 4280 wrote to memory of 1512 4280 msedge.exe 85 PID 4280 wrote to memory of 1512 4280 msedge.exe 85 PID 4280 wrote to memory of 1512 4280 msedge.exe 85 PID 4280 wrote to memory of 1512 4280 msedge.exe 85 PID 4280 wrote to memory of 1512 4280 msedge.exe 85 PID 4280 wrote to memory of 1512 4280 msedge.exe 85 PID 4280 wrote to memory of 1512 4280 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\ef145f91cf49d79d2b220582e3ae3fdd_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4280 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbdffd46f8,0x7ffbdffd4708,0x7ffbdffd47182⤵PID:3904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,16514994834172167034,7738654949631818282,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:22⤵PID:1868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2056,16514994834172167034,7738654949631818282,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2176 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2056,16514994834172167034,7738654949631818282,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2644 /prefetch:82⤵PID:1512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,16514994834172167034,7738654949631818282,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3152 /prefetch:12⤵PID:5108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,16514994834172167034,7738654949631818282,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:2072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,16514994834172167034,7738654949631818282,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4908 /prefetch:12⤵PID:968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,16514994834172167034,7738654949631818282,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6000 /prefetch:12⤵PID:4728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,16514994834172167034,7738654949631818282,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4156 /prefetch:82⤵PID:2720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,16514994834172167034,7738654949631818282,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4156 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,16514994834172167034,7738654949631818282,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:12⤵PID:872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,16514994834172167034,7738654949631818282,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4152 /prefetch:12⤵PID:4528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,16514994834172167034,7738654949631818282,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:12⤵PID:2876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,16514994834172167034,7738654949631818282,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6072 /prefetch:12⤵PID:2124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,16514994834172167034,7738654949631818282,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4804 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3892
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4752
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:624
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5111c361619c017b5d09a13a56938bd54
SHA1e02b363a8ceb95751623f25025a9299a2c931e07
SHA256d7be4042a1e3511b0dbf0ab5c493245e4ac314440a4ae0732813db01a21ef8bc
SHA512fc16a4ad0b56899b82d05114d7b0ca8ee610cdba6ff0b6a67dea44faf17b3105109335359b78c0a59c9011a13152744a7f5d4f6a5b66ea519df750ef03f622b2
-
Filesize
152B
MD5983cbc1f706a155d63496ebc4d66515e
SHA1223d0071718b80cad9239e58c5e8e64df6e2a2fe
SHA256cc34b8f8e3f4bfe4c9a227d88f56ea2dd276ca3ac81df622ff5e9a8ec46b951c
SHA512d9cf2ca46d9379902730c81e615a3eb694873ffd535c6bb3ded2dc97cdbbfb71051ab11a07754ed6f610f04285605b702b5a48a6cfda3ee3287230c41c9c45cd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD53559ef4afd7d850875b5bedafce95d99
SHA11d9bf900f637b2b0168e5b4e59dbca3d21ad5a1b
SHA256771462d50fd45c1d6df03ae7e3eae3d46bf5d9417d3f56bb4b41a119356ad486
SHA5129c339ebddfd7d09f0349ae5a80491d2aeb32cba085dbaf83f1af89aa975a27e0cb0e0ec8546ea715b1d42b1dbeb5f88bec6cfda4a4da6eea1abea41f5de70f40
-
Filesize
1KB
MD51e1d2ff617381c0b4e87722635f7cae1
SHA1818157ff3c73ed60a7a09c1cad5b4fb282c78623
SHA25644eb2abb064a64a6957e03c079b99612c093c26c38c82be9c9c798211ad5e5ee
SHA51296069cd788e6d0e36a246214d02a6ecf73e400dfaaee996730ef92481b625ea2f072ecf961951e0cb5b9e0e29d3077325fe4de80f6d567a34ff52d56b9b8e505
-
Filesize
1KB
MD561092150d5dfaa19d8192a3df1bba4b7
SHA1d32034131f18d64498dda71732f7a97cdee729ae
SHA256ebcda45831109db14e584abf8a2e67cc547ef1b639e4fb666b6d636483513987
SHA51289a45295a586a6ad0bd394f5a2535fcff54fc04915e37cfc3cacebf2f85b646c03a63521ea2ee6f5d2ab8abf68eb3cf0a96781ba8c0f60d66e2338ce77fb4ee1
-
Filesize
5KB
MD55e43fe7604252cb2ced9f2430b931e13
SHA166ed63b5d450bc5adbbbd24ab088c8b521e5c4fc
SHA25659bb45e07ae889a94c488ae14fd9c0bd55f9dad3805af01ed7eaf563f037f725
SHA5126ab4d60e682c8e04c63d89715fc3d9cb9bdcdf03000f8fd74d5c31d113157165449a6f5f5e56104988e3262ac823b4daea1192c0110bb95cf6e1a99fc8570de5
-
Filesize
6KB
MD5f20eb0191b31127ef151ba06c43f7022
SHA192a38bd7001be53abe19e1210b46a74066e814ba
SHA2563a42331fe8be37720f998c921a1efc4d1b40acdf5e6069dc0e56971378ea1680
SHA51278e9492693deed3c2b17deec0cf443c5ba283b8790d4964c138a1b79cbc23cebd5134e6502140413ea02a611994693d243f9bf6926165c4c8de610a11e055545
-
Filesize
6KB
MD593bb6e755469181548f5e3f4a9af5e6e
SHA1e2ab9e87a9fb59e52091ca5192115ec540783376
SHA256269e97b62be872f77e166712815eccd4f9218a6390c80017b546c3707f58393e
SHA51251e3f8362e45675434128041e23612790a3eac3e149f10e8a1700d40ef06080cb16d6254cf2eda12e271298d4f85dbbc285d9bd514e727f63a0ce335837a55da
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD51e5297f448d35c9d4e8c99aea83b9cce
SHA19056a55bb9e998405cc4110a9454cdff049ba6cf
SHA256f7067979289ee0e26f404f32c8d826d4ffe64e1dc9f93d9e9c074284d1297335
SHA51260562349e64cabd73321cf7efbc54fc989685e5d5fd31a77eaeb44b2fe354675bbbf4f917cb6aea082b631328629698b0930141c81bda92a9a80bf08d189eb79