Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21-09-2024 06:20
Static task
static1
Behavioral task
behavioral1
Sample
ef38ce6272e8a318aaf5424ea03ae136_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ef38ce6272e8a318aaf5424ea03ae136_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ef38ce6272e8a318aaf5424ea03ae136_JaffaCakes118.html
-
Size
49KB
-
MD5
ef38ce6272e8a318aaf5424ea03ae136
-
SHA1
56bf84126936b46253df34aa527526693ee99504
-
SHA256
57ff22a8c41c94cea2e37d6b73c320a2e76766d95e04d4504871cfd5c584fa0e
-
SHA512
44051f5c2bbdc0ef3eed905884ff1ceb86fcdfcdd846687be6b00db8efcaee4b713096044265d9f56477925dc437e0bcefeabeb86a43b366328a5d26f8f658c7
-
SSDEEP
1536:oy2QzXmCZ8SMhYdtk5jkl1CcAY+VmsXqivwLBpVBXMorWCXF/9AmXjVpAdUXFTWZ:oHhSMhYdy5jkl1CcAY+VmsXdYM
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1808 msedge.exe 1808 msedge.exe 1168 msedge.exe 1168 msedge.exe 2960 identity_helper.exe 2960 identity_helper.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1168 wrote to memory of 2024 1168 msedge.exe 82 PID 1168 wrote to memory of 2024 1168 msedge.exe 82 PID 1168 wrote to memory of 2088 1168 msedge.exe 83 PID 1168 wrote to memory of 2088 1168 msedge.exe 83 PID 1168 wrote to memory of 2088 1168 msedge.exe 83 PID 1168 wrote to memory of 2088 1168 msedge.exe 83 PID 1168 wrote to memory of 2088 1168 msedge.exe 83 PID 1168 wrote to memory of 2088 1168 msedge.exe 83 PID 1168 wrote to memory of 2088 1168 msedge.exe 83 PID 1168 wrote to memory of 2088 1168 msedge.exe 83 PID 1168 wrote to memory of 2088 1168 msedge.exe 83 PID 1168 wrote to memory of 2088 1168 msedge.exe 83 PID 1168 wrote to memory of 2088 1168 msedge.exe 83 PID 1168 wrote to memory of 2088 1168 msedge.exe 83 PID 1168 wrote to memory of 2088 1168 msedge.exe 83 PID 1168 wrote to memory of 2088 1168 msedge.exe 83 PID 1168 wrote to memory of 2088 1168 msedge.exe 83 PID 1168 wrote to memory of 2088 1168 msedge.exe 83 PID 1168 wrote to memory of 2088 1168 msedge.exe 83 PID 1168 wrote to memory of 2088 1168 msedge.exe 83 PID 1168 wrote to memory of 2088 1168 msedge.exe 83 PID 1168 wrote to memory of 2088 1168 msedge.exe 83 PID 1168 wrote to memory of 2088 1168 msedge.exe 83 PID 1168 wrote to memory of 2088 1168 msedge.exe 83 PID 1168 wrote to memory of 2088 1168 msedge.exe 83 PID 1168 wrote to memory of 2088 1168 msedge.exe 83 PID 1168 wrote to memory of 2088 1168 msedge.exe 83 PID 1168 wrote to memory of 2088 1168 msedge.exe 83 PID 1168 wrote to memory of 2088 1168 msedge.exe 83 PID 1168 wrote to memory of 2088 1168 msedge.exe 83 PID 1168 wrote to memory of 2088 1168 msedge.exe 83 PID 1168 wrote to memory of 2088 1168 msedge.exe 83 PID 1168 wrote to memory of 2088 1168 msedge.exe 83 PID 1168 wrote to memory of 2088 1168 msedge.exe 83 PID 1168 wrote to memory of 2088 1168 msedge.exe 83 PID 1168 wrote to memory of 2088 1168 msedge.exe 83 PID 1168 wrote to memory of 2088 1168 msedge.exe 83 PID 1168 wrote to memory of 2088 1168 msedge.exe 83 PID 1168 wrote to memory of 2088 1168 msedge.exe 83 PID 1168 wrote to memory of 2088 1168 msedge.exe 83 PID 1168 wrote to memory of 2088 1168 msedge.exe 83 PID 1168 wrote to memory of 2088 1168 msedge.exe 83 PID 1168 wrote to memory of 1808 1168 msedge.exe 84 PID 1168 wrote to memory of 1808 1168 msedge.exe 84 PID 1168 wrote to memory of 4028 1168 msedge.exe 85 PID 1168 wrote to memory of 4028 1168 msedge.exe 85 PID 1168 wrote to memory of 4028 1168 msedge.exe 85 PID 1168 wrote to memory of 4028 1168 msedge.exe 85 PID 1168 wrote to memory of 4028 1168 msedge.exe 85 PID 1168 wrote to memory of 4028 1168 msedge.exe 85 PID 1168 wrote to memory of 4028 1168 msedge.exe 85 PID 1168 wrote to memory of 4028 1168 msedge.exe 85 PID 1168 wrote to memory of 4028 1168 msedge.exe 85 PID 1168 wrote to memory of 4028 1168 msedge.exe 85 PID 1168 wrote to memory of 4028 1168 msedge.exe 85 PID 1168 wrote to memory of 4028 1168 msedge.exe 85 PID 1168 wrote to memory of 4028 1168 msedge.exe 85 PID 1168 wrote to memory of 4028 1168 msedge.exe 85 PID 1168 wrote to memory of 4028 1168 msedge.exe 85 PID 1168 wrote to memory of 4028 1168 msedge.exe 85 PID 1168 wrote to memory of 4028 1168 msedge.exe 85 PID 1168 wrote to memory of 4028 1168 msedge.exe 85 PID 1168 wrote to memory of 4028 1168 msedge.exe 85 PID 1168 wrote to memory of 4028 1168 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\ef38ce6272e8a318aaf5424ea03ae136_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1168 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdef0446f8,0x7ffdef044708,0x7ffdef0447182⤵PID:2024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2176,1135764488114494482,9249549981652551285,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2164 /prefetch:22⤵PID:2088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2176,1135764488114494482,9249549981652551285,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2268 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2176,1135764488114494482,9249549981652551285,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2732 /prefetch:82⤵PID:4028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,1135764488114494482,9249549981652551285,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3200 /prefetch:12⤵PID:2640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,1135764488114494482,9249549981652551285,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:1948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,1135764488114494482,9249549981652551285,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4992 /prefetch:12⤵PID:3444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2176,1135764488114494482,9249549981652551285,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5520 /prefetch:82⤵PID:2756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2176,1135764488114494482,9249549981652551285,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5520 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,1135764488114494482,9249549981652551285,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4744 /prefetch:12⤵PID:2748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,1135764488114494482,9249549981652551285,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4728 /prefetch:12⤵PID:2824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,1135764488114494482,9249549981652551285,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6024 /prefetch:12⤵PID:2636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,1135764488114494482,9249549981652551285,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4004 /prefetch:12⤵PID:5108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2176,1135764488114494482,9249549981652551285,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3624 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4904
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2572
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2708
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ecf7ca53c80b5245e35839009d12f866
SHA1a7af77cf31d410708ebd35a232a80bddfb0615bb
SHA256882a513b71b26210ff251769b82b2c5d59a932f96d9ce606ca2fab6530a13687
SHA512706722bd22ce27d854036b1b16e6a3cdb36284b66edc76238a79c2e11cee7d1307b121c898ad832eb1af73e4f08d991d64dc0bff529896ffb4ebe9b3dc381696
-
Filesize
152B
MD54dd2754d1bea40445984d65abee82b21
SHA14b6a5658bae9a784a370a115fbb4a12e92bd3390
SHA256183b8e82a0deaa83d04736553671cedb738adc909f483b3c5f822a0e6be7477d
SHA51292d44ee372ad33f892b921efa6cabc78e91025e89f05a22830763217826fa98d51d55711f85c8970ac58abf9adc6c85cc40878032cd6d2589ab226cd099f99e1
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD553d3b25797d6c1924063526b59dfda6c
SHA1759e70899d3bd04e6641070a3aa1f4aaa4e9c876
SHA256c7c32898e08723bce4272863ef11f09ce59aa4c87a45807d986b54175ada64cc
SHA512cc789f84150546ecef58721959144863ebf6b8f7f0033dff4c8e3c8179d60ab8007f368932e1c62d494ad0ff563fd00af329a9b8301d9c293e446603543f0495
-
Filesize
965B
MD5a95cf782f7d32d99a53d595aa4cc0dc3
SHA1dc851d55777a262d0d6537956fff326a17a1ab47
SHA2566c0a7f1dd637c64454cef47e72491be652f3991754d16904ee00b9ff98966ed8
SHA512a349323ad880a3c11246209498b0f071f216af579fa4caeae353ce9f2a4a2fd833d8b2f3b6b795f275a5ca69f1b91a4c9fb5720b8f265cadf25b515d6250375b
-
Filesize
5KB
MD55805595fb7f97c55dfae7ea352c938eb
SHA1df39fc20178e2c08a1db594f62cfd434f01ee59b
SHA256141dc418495a4c8e9d549ab9b56aa33f2f9e04c4b88dc2bb9d299d7f029d8ac8
SHA5124349fb4547c080b4bd019b23d6d44bf30e53414f573a3173c0166a761f2ab3d6d25f6a9b5983c992fd71cf06b51c5999c40550114fe94b23ac30d60002291257
-
Filesize
6KB
MD5ca1576b6846220b527a35ce822342536
SHA13cb1c9267228ce569c4a0953c798c81f81b708dc
SHA256947fb0a85f80a2686420c5d644d832181fb722bb04486fedc4d86f14b3f7a089
SHA51299840a8117990ade70ebc9219213b4d8dcaafd82ffde8be547cd5e58266da364a5562f801d3cfa0147690022e3745e9b6c5b5983e026af4f33bc08618379120f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD521cc4535377d595fe6d56def59f05f84
SHA10533c0f081be9a4be9feadc8b2c1a90e8f5a4eb7
SHA256464be3a9c7a855111b4e443bcb249c435d2b3d7830b23b2c80994fed0575ae33
SHA51200df93b9e726b4699dfd50464f307933ddd03e3a5a4ee29b6eda34dd02e4015f7665855070a046234085c1dba2861e1ba88cf52c5abeb13e84c3b777071f9aa5