Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25/09/2024, 20:48
Static task
static1
Behavioral task
behavioral1
Sample
f6d4e7204f0da3fe91500fb86dedd922_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f6d4e7204f0da3fe91500fb86dedd922_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f6d4e7204f0da3fe91500fb86dedd922_JaffaCakes118.html
-
Size
147KB
-
MD5
f6d4e7204f0da3fe91500fb86dedd922
-
SHA1
b265294eeaa783bbe7cd2155f5f5d9469f03c06f
-
SHA256
ddc6b0a816c95efbf7ffc18acb8054427c710a66aa6df9f1e6934d66719904af
-
SHA512
3ede1b3dc5b9e35012386ac4198bab67880527ca2c7c44502d6aed7c386ce8123d07629ea6b66792c3baa191785808d6853975fabecbdc12016cd963b281022a
-
SSDEEP
3072:Yegklcyklckklc7uG/bI+3akcGklcPEijZeqhwEijZeqLxgdz5fY2dj3iFZtM7em:iklcyklckklc7uG/bI+3akcGklcPEijh
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 39 sites.google.com 44 sites.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1544 msedge.exe 1544 msedge.exe 3472 msedge.exe 3472 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3472 wrote to memory of 3240 3472 msedge.exe 82 PID 3472 wrote to memory of 3240 3472 msedge.exe 82 PID 3472 wrote to memory of 1752 3472 msedge.exe 83 PID 3472 wrote to memory of 1752 3472 msedge.exe 83 PID 3472 wrote to memory of 1752 3472 msedge.exe 83 PID 3472 wrote to memory of 1752 3472 msedge.exe 83 PID 3472 wrote to memory of 1752 3472 msedge.exe 83 PID 3472 wrote to memory of 1752 3472 msedge.exe 83 PID 3472 wrote to memory of 1752 3472 msedge.exe 83 PID 3472 wrote to memory of 1752 3472 msedge.exe 83 PID 3472 wrote to memory of 1752 3472 msedge.exe 83 PID 3472 wrote to memory of 1752 3472 msedge.exe 83 PID 3472 wrote to memory of 1752 3472 msedge.exe 83 PID 3472 wrote to memory of 1752 3472 msedge.exe 83 PID 3472 wrote to memory of 1752 3472 msedge.exe 83 PID 3472 wrote to memory of 1752 3472 msedge.exe 83 PID 3472 wrote to memory of 1752 3472 msedge.exe 83 PID 3472 wrote to memory of 1752 3472 msedge.exe 83 PID 3472 wrote to memory of 1752 3472 msedge.exe 83 PID 3472 wrote to memory of 1752 3472 msedge.exe 83 PID 3472 wrote to memory of 1752 3472 msedge.exe 83 PID 3472 wrote to memory of 1752 3472 msedge.exe 83 PID 3472 wrote to memory of 1752 3472 msedge.exe 83 PID 3472 wrote to memory of 1752 3472 msedge.exe 83 PID 3472 wrote to memory of 1752 3472 msedge.exe 83 PID 3472 wrote to memory of 1752 3472 msedge.exe 83 PID 3472 wrote to memory of 1752 3472 msedge.exe 83 PID 3472 wrote to memory of 1752 3472 msedge.exe 83 PID 3472 wrote to memory of 1752 3472 msedge.exe 83 PID 3472 wrote to memory of 1752 3472 msedge.exe 83 PID 3472 wrote to memory of 1752 3472 msedge.exe 83 PID 3472 wrote to memory of 1752 3472 msedge.exe 83 PID 3472 wrote to memory of 1752 3472 msedge.exe 83 PID 3472 wrote to memory of 1752 3472 msedge.exe 83 PID 3472 wrote to memory of 1752 3472 msedge.exe 83 PID 3472 wrote to memory of 1752 3472 msedge.exe 83 PID 3472 wrote to memory of 1752 3472 msedge.exe 83 PID 3472 wrote to memory of 1752 3472 msedge.exe 83 PID 3472 wrote to memory of 1752 3472 msedge.exe 83 PID 3472 wrote to memory of 1752 3472 msedge.exe 83 PID 3472 wrote to memory of 1752 3472 msedge.exe 83 PID 3472 wrote to memory of 1752 3472 msedge.exe 83 PID 3472 wrote to memory of 1544 3472 msedge.exe 84 PID 3472 wrote to memory of 1544 3472 msedge.exe 84 PID 3472 wrote to memory of 3180 3472 msedge.exe 85 PID 3472 wrote to memory of 3180 3472 msedge.exe 85 PID 3472 wrote to memory of 3180 3472 msedge.exe 85 PID 3472 wrote to memory of 3180 3472 msedge.exe 85 PID 3472 wrote to memory of 3180 3472 msedge.exe 85 PID 3472 wrote to memory of 3180 3472 msedge.exe 85 PID 3472 wrote to memory of 3180 3472 msedge.exe 85 PID 3472 wrote to memory of 3180 3472 msedge.exe 85 PID 3472 wrote to memory of 3180 3472 msedge.exe 85 PID 3472 wrote to memory of 3180 3472 msedge.exe 85 PID 3472 wrote to memory of 3180 3472 msedge.exe 85 PID 3472 wrote to memory of 3180 3472 msedge.exe 85 PID 3472 wrote to memory of 3180 3472 msedge.exe 85 PID 3472 wrote to memory of 3180 3472 msedge.exe 85 PID 3472 wrote to memory of 3180 3472 msedge.exe 85 PID 3472 wrote to memory of 3180 3472 msedge.exe 85 PID 3472 wrote to memory of 3180 3472 msedge.exe 85 PID 3472 wrote to memory of 3180 3472 msedge.exe 85 PID 3472 wrote to memory of 3180 3472 msedge.exe 85 PID 3472 wrote to memory of 3180 3472 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\f6d4e7204f0da3fe91500fb86dedd922_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3472 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffffb5b46f8,0x7ffffb5b4708,0x7ffffb5b47182⤵PID:3240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,4554917550885925434,13502785402542282432,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:22⤵PID:1752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,4554917550885925434,13502785402542282432,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2184 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,4554917550885925434,13502785402542282432,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2924 /prefetch:82⤵PID:3180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,4554917550885925434,13502785402542282432,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:3888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,4554917550885925434,13502785402542282432,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3416 /prefetch:12⤵PID:2268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,4554917550885925434,13502785402542282432,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6140 /prefetch:12⤵PID:1540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,4554917550885925434,13502785402542282432,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5960 /prefetch:12⤵PID:3208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,4554917550885925434,13502785402542282432,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5612 /prefetch:12⤵PID:1840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,4554917550885925434,13502785402542282432,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4792 /prefetch:12⤵PID:3132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,4554917550885925434,13502785402542282432,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2364 /prefetch:12⤵PID:4588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,4554917550885925434,13502785402542282432,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4852 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4764
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1800
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2068
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e4f80e7950cbd3bb11257d2000cb885e
SHA110ac643904d539042d8f7aa4a312b13ec2106035
SHA2561184ee8d32d0edecddd93403fb888fad6b3e2a710d37335c3989cc529bc08124
SHA5122b92c9807fdcd937e514d4e7e1cc7c2d3e3aa162099b7289ceac2feea72d1a4afbadf1c09b3075d470efadf9a9edd63e07ea7e7a98d22243e45b3d53473fa4f0
-
Filesize
152B
MD52dc1a9f2f3f8c3cfe51bb29b078166c5
SHA1eaf3c3dad3c8dc6f18dc3e055b415da78b704402
SHA256dcb76fa365c2d9ee213b224a91cdd806d30b1e8652d72a22f2371124fa4479fa
SHA512682061d9cc86a6e5d99d022da776fb554350fc95efbf29cd84c1db4e2b7161b76cd1de48335bcc3a25633079fb0bd412e4f4795ed6291c65e9bc28d95330bb25
-
Filesize
23KB
MD52f24e0f5d2c2997a89fb4a8d943c141f
SHA199515bde1a5bf72105116ac902ccf3db1dd3df29
SHA25660c9ecaf27ba56d7c35aa78c329aa7dfa586e6c71ed3cdd0019ba7e767b18aaf
SHA5120f4c5508dfdcf0ef63141df8d29c76e219d2ec433d59d37d7f17e110b455f24235fd0bc4f539ad5adc368285536d73f57dc4e21e3201dfd5753e76789208989d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize192B
MD548534f801cb53d6a81c8753c8c82962c
SHA1027f04baab8c7ae9566540be0f6786dd0cf85453
SHA256a19983e91a7d2bc360639518fd11837b3aa41113ea9ec900fbd573af136855f0
SHA5123920a452911e40bbfbc9192168c8788939d3473a568fc58a85ae04ad828a770b10862dacf7b3a58873e8640706f13f1c4a3b9fad9f4fe3f0df9b1fa3a5eb5ed5
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize168B
MD5f54624048ebdf8dc9df25c9f261cd2a5
SHA1bd727b8b5a45550fe2c9d95d9a62842ab9faa606
SHA256f747f174e738147d69451854f5eac2415c585fb39724c1a56902aefa82d2f215
SHA512e2abdf627f28c41cdb9437392b31ef27560b1e3784d43e1bb7a0f3c7d40fa8ae93ce2d05f95d76b548372b06d62674c46dae0a77da1a219e934a815ea065e7c0
-
Filesize
2KB
MD53a3d1b0172895863f49de6d1a879d4c9
SHA104edb727091dda148839053cf0658550dba2dd75
SHA25672864282bab883e8a8dd82f05f779cdec0a6a2db44b181b9de7eafd88f856bf8
SHA5128edb7773e9154444a484a0f3f43173f6aada33243b5b4f19036f97a2a477117aab4d565de6641c534801a7644d34caa3ded2658d6c46fde0544b1ac3422d8c26
-
Filesize
5KB
MD533e8eeda3bab40b4390a24ba166cafaf
SHA15030b0b2c1b64e3c10be84fc3c38cc14454465ad
SHA256fa6a7e6a4275bb58c6e55bbf9c5caeb67610e3d2da3316676a1fce1967067f4a
SHA512275e860be98c335624eeece0f67001567e262779e1035997c3f27897813b2902434314da08f802c76f3ecd3ab5f51177dfc5941c66c9c72cfdcb1c573bda928f
-
Filesize
7KB
MD55d52eee4b74ff39ecfab799ed300a8d8
SHA1f6cedf67bf5a7565054a58027ef36102897e6873
SHA256a7b8e9eed554245ed025218bc9b8cff45e13f9cda27e162eea63dc94243f9e8b
SHA5129a1d5c88e86da0e65d86012ca22a59b89fce5bb6f7ccf4ed841dca5e390fb6908252907ae9082cefd588c84dea2afa8084e8402b5789e5feea44bf8e90e15ae1
-
Filesize
8KB
MD53d18fe1bf0a3e57d5b31bd48ba3c7edf
SHA1a7e4fb71ce289fa75bd14a15f28886f1b0be4852
SHA256f9d3e6593ee2b90aa74552f6520fcba34f251e2968bf6b7569a2914dc6b8a19b
SHA5124831d518c4aeafabdaa02ec7ccecca820716c3aad2ac84f8631d07b44ac47dfcd73247ac0451cda5a57e6f67b048dfea4b44f78cc248bec10beaaa7dcebeea29
-
Filesize
707B
MD5050d3b9659d98eb9023da96cf96d4551
SHA1e0220e9bbbe609c102a8d85f92af624486576f18
SHA2569323de9ca9459421404d260bef8c715d1de62dfe74f93fb7493c3df63ff067ad
SHA512cf83bbe1dc5f9a851a51c2687d7a20a6f05532d552319434521d8948f912d903caba1c263f2fdc89edab650ce8a060526e43dad794edcf868029195fbfba27c9
-
Filesize
539B
MD594e647b6283e957238b4bf7f024118f1
SHA128764b053d0b29d7b011d0708659f0a8138c1216
SHA256aa02043e1987a548d405f3ac8a6fae108befa3ac90c7bede43859ee30da39e12
SHA512b0ebca6bf732b63acf931f3c43fc9b24f8016f74273de1a1e855dbc910376d8a03ac330798782ee8dc3f151bbf44d5923a84036417915a903c846ca652b6e6c7
-
Filesize
10KB
MD5439e30bc7500d18e2ccb9669182527b0
SHA10e4f0046cc9712b1b5777ce9f808a15da5ac8e14
SHA2568145f2ea9021d5791ba670047eb1dcfdb4dbc00b1b1c360c6e51264f57c2be8e
SHA51254d32c45868f721bc85c6aed3231ba11ce3d06f2b90de761c50db452f741732343f1460de4ddb0707de2701171d0a48453b991fa4bcec6c4996c1fb42c145c54