Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25/09/2024, 08:15
Static task
static1
Behavioral task
behavioral1
Sample
f5937610b6c6063b2e6fb9351c128884_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f5937610b6c6063b2e6fb9351c128884_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f5937610b6c6063b2e6fb9351c128884_JaffaCakes118.html
-
Size
53KB
-
MD5
f5937610b6c6063b2e6fb9351c128884
-
SHA1
624a21ef23bcdc9d72c6253211dbcef123c8bc44
-
SHA256
45348db4372c9b2bf31c6e6a7796fbed6b502ec6cfd46bd0dce7533235191b2a
-
SHA512
5f0fc32917344a8b3b8c6d5a05f79f684523be0a165808310f0f87aad5f36ee2ba5a66c43f3901f721bc095490fc2edfa38c0c0d60cd018ae94dcfbc1b0715e5
-
SSDEEP
768:KAayHHvPWloFtPd5/PH+ZSb3bV3bvuyk/pQbPHXNaKDXEkZ5DpsJ:73HH2latPdZH+ZSrXbPHXFEC5O
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1840 msedge.exe 1840 msedge.exe 2588 msedge.exe 2588 msedge.exe 844 identity_helper.exe 844 identity_helper.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe 2588 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2588 wrote to memory of 2316 2588 msedge.exe 82 PID 2588 wrote to memory of 2316 2588 msedge.exe 82 PID 2588 wrote to memory of 3824 2588 msedge.exe 83 PID 2588 wrote to memory of 3824 2588 msedge.exe 83 PID 2588 wrote to memory of 3824 2588 msedge.exe 83 PID 2588 wrote to memory of 3824 2588 msedge.exe 83 PID 2588 wrote to memory of 3824 2588 msedge.exe 83 PID 2588 wrote to memory of 3824 2588 msedge.exe 83 PID 2588 wrote to memory of 3824 2588 msedge.exe 83 PID 2588 wrote to memory of 3824 2588 msedge.exe 83 PID 2588 wrote to memory of 3824 2588 msedge.exe 83 PID 2588 wrote to memory of 3824 2588 msedge.exe 83 PID 2588 wrote to memory of 3824 2588 msedge.exe 83 PID 2588 wrote to memory of 3824 2588 msedge.exe 83 PID 2588 wrote to memory of 3824 2588 msedge.exe 83 PID 2588 wrote to memory of 3824 2588 msedge.exe 83 PID 2588 wrote to memory of 3824 2588 msedge.exe 83 PID 2588 wrote to memory of 3824 2588 msedge.exe 83 PID 2588 wrote to memory of 3824 2588 msedge.exe 83 PID 2588 wrote to memory of 3824 2588 msedge.exe 83 PID 2588 wrote to memory of 3824 2588 msedge.exe 83 PID 2588 wrote to memory of 3824 2588 msedge.exe 83 PID 2588 wrote to memory of 3824 2588 msedge.exe 83 PID 2588 wrote to memory of 3824 2588 msedge.exe 83 PID 2588 wrote to memory of 3824 2588 msedge.exe 83 PID 2588 wrote to memory of 3824 2588 msedge.exe 83 PID 2588 wrote to memory of 3824 2588 msedge.exe 83 PID 2588 wrote to memory of 3824 2588 msedge.exe 83 PID 2588 wrote to memory of 3824 2588 msedge.exe 83 PID 2588 wrote to memory of 3824 2588 msedge.exe 83 PID 2588 wrote to memory of 3824 2588 msedge.exe 83 PID 2588 wrote to memory of 3824 2588 msedge.exe 83 PID 2588 wrote to memory of 3824 2588 msedge.exe 83 PID 2588 wrote to memory of 3824 2588 msedge.exe 83 PID 2588 wrote to memory of 3824 2588 msedge.exe 83 PID 2588 wrote to memory of 3824 2588 msedge.exe 83 PID 2588 wrote to memory of 3824 2588 msedge.exe 83 PID 2588 wrote to memory of 3824 2588 msedge.exe 83 PID 2588 wrote to memory of 3824 2588 msedge.exe 83 PID 2588 wrote to memory of 3824 2588 msedge.exe 83 PID 2588 wrote to memory of 3824 2588 msedge.exe 83 PID 2588 wrote to memory of 3824 2588 msedge.exe 83 PID 2588 wrote to memory of 1840 2588 msedge.exe 84 PID 2588 wrote to memory of 1840 2588 msedge.exe 84 PID 2588 wrote to memory of 1768 2588 msedge.exe 85 PID 2588 wrote to memory of 1768 2588 msedge.exe 85 PID 2588 wrote to memory of 1768 2588 msedge.exe 85 PID 2588 wrote to memory of 1768 2588 msedge.exe 85 PID 2588 wrote to memory of 1768 2588 msedge.exe 85 PID 2588 wrote to memory of 1768 2588 msedge.exe 85 PID 2588 wrote to memory of 1768 2588 msedge.exe 85 PID 2588 wrote to memory of 1768 2588 msedge.exe 85 PID 2588 wrote to memory of 1768 2588 msedge.exe 85 PID 2588 wrote to memory of 1768 2588 msedge.exe 85 PID 2588 wrote to memory of 1768 2588 msedge.exe 85 PID 2588 wrote to memory of 1768 2588 msedge.exe 85 PID 2588 wrote to memory of 1768 2588 msedge.exe 85 PID 2588 wrote to memory of 1768 2588 msedge.exe 85 PID 2588 wrote to memory of 1768 2588 msedge.exe 85 PID 2588 wrote to memory of 1768 2588 msedge.exe 85 PID 2588 wrote to memory of 1768 2588 msedge.exe 85 PID 2588 wrote to memory of 1768 2588 msedge.exe 85 PID 2588 wrote to memory of 1768 2588 msedge.exe 85 PID 2588 wrote to memory of 1768 2588 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\f5937610b6c6063b2e6fb9351c128884_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x104,0x108,0x10c,0xe0,0x110,0x7ffaba0546f8,0x7ffaba054708,0x7ffaba0547182⤵PID:2316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,17310735604276607878,13905287831493633808,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:22⤵PID:3824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,17310735604276607878,13905287831493633808,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2196 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,17310735604276607878,13905287831493633808,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2680 /prefetch:82⤵PID:1768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,17310735604276607878,13905287831493633808,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:3360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,17310735604276607878,13905287831493633808,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:3372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,17310735604276607878,13905287831493633808,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4728 /prefetch:12⤵PID:2880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,17310735604276607878,13905287831493633808,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3892 /prefetch:12⤵PID:3804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,17310735604276607878,13905287831493633808,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5068 /prefetch:12⤵PID:3704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,17310735604276607878,13905287831493633808,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5984 /prefetch:82⤵PID:1536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,17310735604276607878,13905287831493633808,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5984 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,17310735604276607878,13905287831493633808,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6296 /prefetch:12⤵PID:4136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,17310735604276607878,13905287831493633808,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6352 /prefetch:12⤵PID:1704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,17310735604276607878,13905287831493633808,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4160 /prefetch:12⤵PID:4480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,17310735604276607878,13905287831493633808,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5672 /prefetch:12⤵PID:3776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,17310735604276607878,13905287831493633808,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4020 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2932
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3172
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1536
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ecf7ca53c80b5245e35839009d12f866
SHA1a7af77cf31d410708ebd35a232a80bddfb0615bb
SHA256882a513b71b26210ff251769b82b2c5d59a932f96d9ce606ca2fab6530a13687
SHA512706722bd22ce27d854036b1b16e6a3cdb36284b66edc76238a79c2e11cee7d1307b121c898ad832eb1af73e4f08d991d64dc0bff529896ffb4ebe9b3dc381696
-
Filesize
152B
MD54dd2754d1bea40445984d65abee82b21
SHA14b6a5658bae9a784a370a115fbb4a12e92bd3390
SHA256183b8e82a0deaa83d04736553671cedb738adc909f483b3c5f822a0e6be7477d
SHA51292d44ee372ad33f892b921efa6cabc78e91025e89f05a22830763217826fa98d51d55711f85c8970ac58abf9adc6c85cc40878032cd6d2589ab226cd099f99e1
-
Filesize
41KB
MD576e960b684eb71c2a06f96b3ae5b2d0b
SHA1685a884d4ce4ef89a5a80bc2dbe234ef5844de95
SHA256a4e5e895af7992f5f111a2af5e150460cd482eb777a9181d0995a43bb4913621
SHA512ee3749f05fc78f7ef19438499e9a603300708092af026a71ad7989d72f51ba8f63889d23cde421d1e0baf482966288b714e342885248c98ce52c795cfd271cdd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize192B
MD5f9163f8a3c8b1d8cb03e9506b3db535b
SHA1054a2f8350f622a84560ada416d1295f709f55e3
SHA256af0b9558ce5c90f71b060dbd6b35b01ba6add95ef5f64000e5a7d3cab3b71936
SHA5129b45a6a9fb1554da529904cd875a488eb75a7ea85f0db74e080e0b2a9e8af1e42cbf00c98d98ba69536585beb4a1be1f6195a9ab88b5772b8d09fa455c9e1adb
-
Filesize
2KB
MD5034071b45e5b450a8e8d0c06e078f447
SHA18ab3c750523ea5cf2a8b7c3a5b72b28ee58a01fa
SHA256c33c5d397b76fa24211d0bfce33c19c7c4330135782da21787a0b118ab1e7515
SHA512a04d16cfd8b62d247a6c8ad044db01022b55f50cdffa49fea65fb33b458397b71c8ebb38d3b5edbef8933b3fd1862c2931f7c58aae7a6e5540087bd17eaba757
-
Filesize
5KB
MD56e140f418514a3847051eef9f4c66145
SHA122d06b35fa4c840ed3ab731bdebdca292e646014
SHA256092d106ecb170590680ddc63589cec99b2b845d5cfa6c7e8d836858818feb12c
SHA512b28088ffc0ffdba45680a8bb3df81e9fae55a7bafe84adee722fa9ef592287834189b78f29093c6e1878944fddcc61014add6ea00bde4d871893f2dac3dada15
-
Filesize
6KB
MD566596a9b4be7ce9467b5b0e2da3884da
SHA16051c2db4c6c23b9ea4636a6118f652af3d28d2c
SHA256390b1a2a519caae12a5722a7e120ff3fd4b13ec73891cba16783f8963905800b
SHA512336fc70b4062f8d227293ad95e815420b69bac2167004ba5cbdd5c24807663daa00726a873b79f07bd9c05cca3506371ed6959c5066bbdabb6c2c9e845e255ad
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD56ab089dc22307ef197ed1169bbb6eb24
SHA16a8a65e592626e1424d996484a0f73f80c998345
SHA2560d0d0a03a86d6747463d8f5bfe844e59770f0b76c3eac86aa7e70f93120f91b5
SHA51234287739ee5e396fcf066d283f59bb1e44689c9e330737eea13188d4201cf63f227d5d0141cf5e6ea4fd1f538a2a2e33846122c74c695a561082ef25e7f60dad