Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21/09/2024, 16:40
Static task
static1
Behavioral task
behavioral1
Sample
f0360913e198b5042508480d518c11bd_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f0360913e198b5042508480d518c11bd_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f0360913e198b5042508480d518c11bd_JaffaCakes118.html
-
Size
27KB
-
MD5
f0360913e198b5042508480d518c11bd
-
SHA1
9ed07637bbc20bc07dea5baea9d2077ec9cbd8b5
-
SHA256
0ccfba086080881efed3c2cbc755998fa2e02ab756b6cef48a76b370107b89d6
-
SHA512
61e71654bf4da35d5fcfa738f610ced66a9a01038b3459a36c9b14748cc56b19cd7da087fa9bdc2e8781cc742d31832b917b675b98c49b29c98687e37b7ba5af
-
SSDEEP
384:SSq84naviKyRF0KCgjpF+Trph2LaUbW29WUW8DOvZLhkCLhrCLVn1agNGnvDaRUS:S5HC8qpdocnkQrVrzqyCYC/bLR9ug
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2916 msedge.exe 2916 msedge.exe 4400 msedge.exe 4400 msedge.exe 4460 identity_helper.exe 4460 identity_helper.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe 4400 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4400 wrote to memory of 3516 4400 msedge.exe 82 PID 4400 wrote to memory of 3516 4400 msedge.exe 82 PID 4400 wrote to memory of 3100 4400 msedge.exe 83 PID 4400 wrote to memory of 3100 4400 msedge.exe 83 PID 4400 wrote to memory of 3100 4400 msedge.exe 83 PID 4400 wrote to memory of 3100 4400 msedge.exe 83 PID 4400 wrote to memory of 3100 4400 msedge.exe 83 PID 4400 wrote to memory of 3100 4400 msedge.exe 83 PID 4400 wrote to memory of 3100 4400 msedge.exe 83 PID 4400 wrote to memory of 3100 4400 msedge.exe 83 PID 4400 wrote to memory of 3100 4400 msedge.exe 83 PID 4400 wrote to memory of 3100 4400 msedge.exe 83 PID 4400 wrote to memory of 3100 4400 msedge.exe 83 PID 4400 wrote to memory of 3100 4400 msedge.exe 83 PID 4400 wrote to memory of 3100 4400 msedge.exe 83 PID 4400 wrote to memory of 3100 4400 msedge.exe 83 PID 4400 wrote to memory of 3100 4400 msedge.exe 83 PID 4400 wrote to memory of 3100 4400 msedge.exe 83 PID 4400 wrote to memory of 3100 4400 msedge.exe 83 PID 4400 wrote to memory of 3100 4400 msedge.exe 83 PID 4400 wrote to memory of 3100 4400 msedge.exe 83 PID 4400 wrote to memory of 3100 4400 msedge.exe 83 PID 4400 wrote to memory of 3100 4400 msedge.exe 83 PID 4400 wrote to memory of 3100 4400 msedge.exe 83 PID 4400 wrote to memory of 3100 4400 msedge.exe 83 PID 4400 wrote to memory of 3100 4400 msedge.exe 83 PID 4400 wrote to memory of 3100 4400 msedge.exe 83 PID 4400 wrote to memory of 3100 4400 msedge.exe 83 PID 4400 wrote to memory of 3100 4400 msedge.exe 83 PID 4400 wrote to memory of 3100 4400 msedge.exe 83 PID 4400 wrote to memory of 3100 4400 msedge.exe 83 PID 4400 wrote to memory of 3100 4400 msedge.exe 83 PID 4400 wrote to memory of 3100 4400 msedge.exe 83 PID 4400 wrote to memory of 3100 4400 msedge.exe 83 PID 4400 wrote to memory of 3100 4400 msedge.exe 83 PID 4400 wrote to memory of 3100 4400 msedge.exe 83 PID 4400 wrote to memory of 3100 4400 msedge.exe 83 PID 4400 wrote to memory of 3100 4400 msedge.exe 83 PID 4400 wrote to memory of 3100 4400 msedge.exe 83 PID 4400 wrote to memory of 3100 4400 msedge.exe 83 PID 4400 wrote to memory of 3100 4400 msedge.exe 83 PID 4400 wrote to memory of 3100 4400 msedge.exe 83 PID 4400 wrote to memory of 2916 4400 msedge.exe 84 PID 4400 wrote to memory of 2916 4400 msedge.exe 84 PID 4400 wrote to memory of 4508 4400 msedge.exe 85 PID 4400 wrote to memory of 4508 4400 msedge.exe 85 PID 4400 wrote to memory of 4508 4400 msedge.exe 85 PID 4400 wrote to memory of 4508 4400 msedge.exe 85 PID 4400 wrote to memory of 4508 4400 msedge.exe 85 PID 4400 wrote to memory of 4508 4400 msedge.exe 85 PID 4400 wrote to memory of 4508 4400 msedge.exe 85 PID 4400 wrote to memory of 4508 4400 msedge.exe 85 PID 4400 wrote to memory of 4508 4400 msedge.exe 85 PID 4400 wrote to memory of 4508 4400 msedge.exe 85 PID 4400 wrote to memory of 4508 4400 msedge.exe 85 PID 4400 wrote to memory of 4508 4400 msedge.exe 85 PID 4400 wrote to memory of 4508 4400 msedge.exe 85 PID 4400 wrote to memory of 4508 4400 msedge.exe 85 PID 4400 wrote to memory of 4508 4400 msedge.exe 85 PID 4400 wrote to memory of 4508 4400 msedge.exe 85 PID 4400 wrote to memory of 4508 4400 msedge.exe 85 PID 4400 wrote to memory of 4508 4400 msedge.exe 85 PID 4400 wrote to memory of 4508 4400 msedge.exe 85 PID 4400 wrote to memory of 4508 4400 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\f0360913e198b5042508480d518c11bd_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4400 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe5c8c46f8,0x7ffe5c8c4708,0x7ffe5c8c47182⤵PID:3516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1992,15994645473970473124,3626313083295525881,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:22⤵PID:3100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1992,15994645473970473124,3626313083295525881,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2184 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1992,15994645473970473124,3626313083295525881,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2892 /prefetch:82⤵PID:4508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1992,15994645473970473124,3626313083295525881,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:1124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1992,15994645473970473124,3626313083295525881,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:2488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1992,15994645473970473124,3626313083295525881,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4148 /prefetch:12⤵PID:3744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1992,15994645473970473124,3626313083295525881,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4160 /prefetch:12⤵PID:1716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1992,15994645473970473124,3626313083295525881,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5708 /prefetch:82⤵PID:1076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1992,15994645473970473124,3626313083295525881,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5708 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1992,15994645473970473124,3626313083295525881,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5452 /prefetch:12⤵PID:1512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1992,15994645473970473124,3626313083295525881,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5744 /prefetch:12⤵PID:2988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1992,15994645473970473124,3626313083295525881,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5092 /prefetch:12⤵PID:3556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1992,15994645473970473124,3626313083295525881,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5376 /prefetch:12⤵PID:2820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1992,15994645473970473124,3626313083295525881,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2036 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4748
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2848
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4592
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ecf7ca53c80b5245e35839009d12f866
SHA1a7af77cf31d410708ebd35a232a80bddfb0615bb
SHA256882a513b71b26210ff251769b82b2c5d59a932f96d9ce606ca2fab6530a13687
SHA512706722bd22ce27d854036b1b16e6a3cdb36284b66edc76238a79c2e11cee7d1307b121c898ad832eb1af73e4f08d991d64dc0bff529896ffb4ebe9b3dc381696
-
Filesize
152B
MD54dd2754d1bea40445984d65abee82b21
SHA14b6a5658bae9a784a370a115fbb4a12e92bd3390
SHA256183b8e82a0deaa83d04736553671cedb738adc909f483b3c5f822a0e6be7477d
SHA51292d44ee372ad33f892b921efa6cabc78e91025e89f05a22830763217826fa98d51d55711f85c8970ac58abf9adc6c85cc40878032cd6d2589ab226cd099f99e1
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD503f6dbdbfe5b29c55d4dfc7f9ba92edf
SHA1dea612873b00c8b5c1ed6a86419abe98b33ce9b3
SHA2568dcf18ff68618f63851066ec419462bad8aeff045f0c0c61e9cd21ea1e3d0ae4
SHA51236625dd6fe8b8d6dd15ab57bbd441d8ee6a1f038d6be5a89b1e2ca6bc6f3a35c5a16686532795b2370036b4548c58ba20f7f9da2a8bdbeab0d2a686ec1efc18b
-
Filesize
727B
MD5986b484e246eb385d26ee839bc06a86b
SHA15c2826be3a12d6e1e453e3de6347fe59fa90a42c
SHA25620c06d8f777196d130827d7746a40577ae8153b211dcc102bf7fce5270c5308f
SHA512eb81a8aa453aaad4b2c147d3efcb136853a901c7addd77cba79e0e420ddb350b63d68feb448a6fa8ff962bd34baa004be7208a3b0ce20d2c04d0e64904e7ef9d
-
Filesize
5KB
MD5dec42e3c3540c5bd010b22835d86a4d5
SHA102e7ca0bbf2e1e4da7db2cf6c6997914a576369a
SHA256868b5339dbc2231cd1400e4bd6b00f1225d81274c6dd17991b820ae826505c59
SHA512f2e14f5e2c0d4df0077da593a27425d5ac0d3f50107fe43bb3518a0daeaeee7d2d2c90bbf6ef1118e535c5a59984e31b69d77bd11ccb74deacdda6f462e46507
-
Filesize
6KB
MD5434a57a916b318a71e7e5d6eb8432bc7
SHA1f51f75dd366f350a65c367776723d1fa49bba8f5
SHA256867736771b53e852829be1d6b3eecf97a3be28a07bc0b30d1e83e4f3685e70fd
SHA5124ab93fd7aac8aad7012dafc5bcbd1c318809a7dcd0d891240ae1157b62f897f7898bae3b7d8245ff08c82d328ac2c5ff80931fb9d30d8b19019c635cdea4a579
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD57e19e0c2e98865c12434ec1c1f31e094
SHA1e4fdfbe7b2112b65da4d5e0797ec51dfd5121514
SHA256fc092646b501293d7101497e5e0d93ffa2382ca3f6eca22c1bbc2e78b76cbf27
SHA512238b9b1d30bfba8d0612949d76b5cc3a72da509d68bc1784fb26049af52774ed9fb500b665e57d5f4ef7d24f2764a5ce16603e77daaf21abada955ea604a36d7