Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21-09-2024 15:38
Static task
static1
Behavioral task
behavioral1
Sample
f01bcb406d507385def2480a50a4ade7_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
f01bcb406d507385def2480a50a4ade7_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f01bcb406d507385def2480a50a4ade7_JaffaCakes118.html
-
Size
175KB
-
MD5
f01bcb406d507385def2480a50a4ade7
-
SHA1
4dfcdd3b81795488fee8cc528694a0821abaa229
-
SHA256
e22db229d598ee3a543a38a844753151b376cb2ffcf561af0e5156886ad94fc5
-
SHA512
79e466c64b0beebbf24fda70f0965ec9784a36911747fbc5df00410d07795ace10471b623e8d888df6b8c2428b43c895f3887579d1e08c333007da3c308229a6
-
SSDEEP
1536:Sqtd8hd8Wu8pI8Cd8hd8dQg0H//3oS3qGNkFUKYfBCJisM+aeTH+WK/Lf1/hmnV+:S4oT3q/FeBCJium
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1776 msedge.exe 1776 msedge.exe 3272 msedge.exe 3272 msedge.exe 4656 identity_helper.exe 4656 identity_helper.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3272 wrote to memory of 2012 3272 msedge.exe 82 PID 3272 wrote to memory of 2012 3272 msedge.exe 82 PID 3272 wrote to memory of 312 3272 msedge.exe 83 PID 3272 wrote to memory of 312 3272 msedge.exe 83 PID 3272 wrote to memory of 312 3272 msedge.exe 83 PID 3272 wrote to memory of 312 3272 msedge.exe 83 PID 3272 wrote to memory of 312 3272 msedge.exe 83 PID 3272 wrote to memory of 312 3272 msedge.exe 83 PID 3272 wrote to memory of 312 3272 msedge.exe 83 PID 3272 wrote to memory of 312 3272 msedge.exe 83 PID 3272 wrote to memory of 312 3272 msedge.exe 83 PID 3272 wrote to memory of 312 3272 msedge.exe 83 PID 3272 wrote to memory of 312 3272 msedge.exe 83 PID 3272 wrote to memory of 312 3272 msedge.exe 83 PID 3272 wrote to memory of 312 3272 msedge.exe 83 PID 3272 wrote to memory of 312 3272 msedge.exe 83 PID 3272 wrote to memory of 312 3272 msedge.exe 83 PID 3272 wrote to memory of 312 3272 msedge.exe 83 PID 3272 wrote to memory of 312 3272 msedge.exe 83 PID 3272 wrote to memory of 312 3272 msedge.exe 83 PID 3272 wrote to memory of 312 3272 msedge.exe 83 PID 3272 wrote to memory of 312 3272 msedge.exe 83 PID 3272 wrote to memory of 312 3272 msedge.exe 83 PID 3272 wrote to memory of 312 3272 msedge.exe 83 PID 3272 wrote to memory of 312 3272 msedge.exe 83 PID 3272 wrote to memory of 312 3272 msedge.exe 83 PID 3272 wrote to memory of 312 3272 msedge.exe 83 PID 3272 wrote to memory of 312 3272 msedge.exe 83 PID 3272 wrote to memory of 312 3272 msedge.exe 83 PID 3272 wrote to memory of 312 3272 msedge.exe 83 PID 3272 wrote to memory of 312 3272 msedge.exe 83 PID 3272 wrote to memory of 312 3272 msedge.exe 83 PID 3272 wrote to memory of 312 3272 msedge.exe 83 PID 3272 wrote to memory of 312 3272 msedge.exe 83 PID 3272 wrote to memory of 312 3272 msedge.exe 83 PID 3272 wrote to memory of 312 3272 msedge.exe 83 PID 3272 wrote to memory of 312 3272 msedge.exe 83 PID 3272 wrote to memory of 312 3272 msedge.exe 83 PID 3272 wrote to memory of 312 3272 msedge.exe 83 PID 3272 wrote to memory of 312 3272 msedge.exe 83 PID 3272 wrote to memory of 312 3272 msedge.exe 83 PID 3272 wrote to memory of 312 3272 msedge.exe 83 PID 3272 wrote to memory of 1776 3272 msedge.exe 84 PID 3272 wrote to memory of 1776 3272 msedge.exe 84 PID 3272 wrote to memory of 3944 3272 msedge.exe 85 PID 3272 wrote to memory of 3944 3272 msedge.exe 85 PID 3272 wrote to memory of 3944 3272 msedge.exe 85 PID 3272 wrote to memory of 3944 3272 msedge.exe 85 PID 3272 wrote to memory of 3944 3272 msedge.exe 85 PID 3272 wrote to memory of 3944 3272 msedge.exe 85 PID 3272 wrote to memory of 3944 3272 msedge.exe 85 PID 3272 wrote to memory of 3944 3272 msedge.exe 85 PID 3272 wrote to memory of 3944 3272 msedge.exe 85 PID 3272 wrote to memory of 3944 3272 msedge.exe 85 PID 3272 wrote to memory of 3944 3272 msedge.exe 85 PID 3272 wrote to memory of 3944 3272 msedge.exe 85 PID 3272 wrote to memory of 3944 3272 msedge.exe 85 PID 3272 wrote to memory of 3944 3272 msedge.exe 85 PID 3272 wrote to memory of 3944 3272 msedge.exe 85 PID 3272 wrote to memory of 3944 3272 msedge.exe 85 PID 3272 wrote to memory of 3944 3272 msedge.exe 85 PID 3272 wrote to memory of 3944 3272 msedge.exe 85 PID 3272 wrote to memory of 3944 3272 msedge.exe 85 PID 3272 wrote to memory of 3944 3272 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\f01bcb406d507385def2480a50a4ade7_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3272 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff526546f8,0x7fff52654708,0x7fff526547182⤵PID:2012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2168,6680753367973732407,5256429175424965471,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2176 /prefetch:22⤵PID:312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2168,6680753367973732407,5256429175424965471,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2284 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2168,6680753367973732407,5256429175424965471,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2840 /prefetch:82⤵PID:3944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,6680753367973732407,5256429175424965471,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:1772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,6680753367973732407,5256429175424965471,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:1940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,6680753367973732407,5256429175424965471,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4764 /prefetch:12⤵PID:3832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,6680753367973732407,5256429175424965471,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4856 /prefetch:12⤵PID:4492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,6680753367973732407,5256429175424965471,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5220 /prefetch:12⤵PID:2380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,6680753367973732407,5256429175424965471,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5452 /prefetch:12⤵PID:4504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,6680753367973732407,5256429175424965471,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4848 /prefetch:12⤵PID:760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,6680753367973732407,5256429175424965471,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5024 /prefetch:12⤵PID:3428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2168,6680753367973732407,5256429175424965471,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5864 /prefetch:82⤵PID:2244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2168,6680753367973732407,5256429175424965471,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5864 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,6680753367973732407,5256429175424965471,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4480 /prefetch:12⤵PID:1672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,6680753367973732407,5256429175424965471,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5492 /prefetch:12⤵PID:4812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2168,6680753367973732407,5256429175424965471,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4708 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3336
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3424
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2852
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4652
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d7114a6cd851f9bf56cf771c37d664a2
SHA1769c5d04fd83e583f15ab1ef659de8f883ecab8a
SHA256d2c75c7d68c474d4b8847b4ba6cfd09fe90717f46dd398c86483d825a66e977e
SHA51233bdae2305ae98e7c0de576de5a6600bd70a425e7b891d745cba9de992036df1b3d1df9572edb0f89f320e50962d06532dae9491985b6b57fd37d5f46f7a2ff8
-
Filesize
152B
MD5719923124ee00fb57378e0ebcbe894f7
SHA1cc356a7d27b8b27dc33f21bd4990f286ee13a9f9
SHA256aa22ab845fa08c786bd3366ec39f733d5be80e9ac933ed115ff048ff30090808
SHA512a207b6646500d0d504cf70ee10f57948e58dab7f214ad2e7c4af0e7ca23ce1d37c8c745873137e6c55bdcf0f527031a66d9cc54805a0eac3678be6dd497a5bbc
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize360B
MD5673027a46ee65833a59b322b5e3960a5
SHA19bf3ca33cc3a57ba42f70895bb1312c297d8e887
SHA2563e44982a9371a478b621eef69c7caf9dffe770e6459b65f2501721e05006150d
SHA5125c81761ef061afd64d9c67d68bfbf267ac785284245b92e5d919f36f21c787bf040bb555a3d00695f99f2bb06bfbf9f8eeb40644fd30f4fa0456687835958ca7
-
Filesize
2KB
MD5d2a56bcd1c0f8b37905e4ccf9c8424f0
SHA170158bdcd7a0c2363f6e487e67d03242388df52f
SHA256f55bd789bee2b46783d185a6495d885f49a3d7d427071633a38d28d3c258f7f0
SHA512c2b33f68f31ed6472e1788611339e3778c4b325cce5a986a34224d2ce797377c523408babd43b7846f816823f0156758759e52d33b359f131de85bad20f332b0
-
Filesize
2KB
MD54c607a9ed805d96b042bbda05a6606d3
SHA19dc6d5fb8ff48277f2f83de0e1ebdee2acd11506
SHA256b2141a7cc2c6558267ca952f682a15fe017bb4904961e011769c6314733daa06
SHA512db2157d196b1f09721ce05823d061cdff94d825805560a501d040b1cfc862221aa064674fb93068a9578a285ef6acb86458a6222ace70dbd0f2c9b151a1373ad
-
Filesize
5KB
MD5e6cb6f56286d2afe7f028339793aaf5a
SHA151b3177dbf3b1c664528fc70c3892ec81c269e17
SHA2564fabae062d33acadd2b3f9490c9d3e29154acf35b930756cb74cdeeeb3b2c187
SHA512de18c41d2cb5d25ec79c2942b3afd766c0606a4acd7b620ea0f3645d0b6a55322a346341471f1d21714057b2bc4e05fbba6d1a70eeea1342cf98b9e46e0a1e84
-
Filesize
7KB
MD58fdfbbdb708a8a7c24046c8ba0a0ad09
SHA13b07edc1a3450651a5f7df6c9c7822ca4a1e429f
SHA256f42b38533cb28936ad12b3c17eee48a4701b6898a540ef2bedfaee5221bba735
SHA512409fc08ad8d12a344b8c1212a7016351c751378f3eff27bea4e9ec92f608090f0e790138f86a8cfd91f5da9466b86cd44a2d99a3ae663359be20a3ad529892fc
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5cd92c6f08909e4d306c1e8e58f1dc41a
SHA1a554077e04b57271ab8b4403ea4182d4932903e1
SHA25623a307162212bddf424715bd43070cfa45b1994938de6ecd28d841f32dfb2864
SHA51292ad00baecc1a8e91080e5dc402c1aa58ad2cbbd937ba5c0b985f19317d018ae2f3e315c96d11edc1f9e2b823a015c503b9d2b7f61f7576688f004ab96e3290f