Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
27-09-2024 02:25
Static task
static1
Behavioral task
behavioral1
Sample
f9886e3a5965f3679c98683a03098d92_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f9886e3a5965f3679c98683a03098d92_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f9886e3a5965f3679c98683a03098d92_JaffaCakes118.html
-
Size
16KB
-
MD5
f9886e3a5965f3679c98683a03098d92
-
SHA1
91c6e0c6d6bb8822d50f1615ce7a9d3b87388664
-
SHA256
4420c415a7719506b39f266de3a31838bc0cfa144bc0cc45fe9e2ca7fbfe9cd5
-
SHA512
59e800f3f0995a60373f656d0d26cadcf33a49a3a49c62643e7eb71c3e700f260e2bce38ae916e453b71b34c12990977831cd1c356d4e66d480bf888c8ea86f5
-
SSDEEP
384:LYHcGY4Uc6743afuVmNn4GXiCJgEMQ6YfoTEJ2:ocGY49UR14IN6ll
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3352 msedge.exe 3352 msedge.exe 3096 msedge.exe 3096 msedge.exe 1900 identity_helper.exe 1900 identity_helper.exe 4624 msedge.exe 4624 msedge.exe 4624 msedge.exe 4624 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe 3096 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3096 wrote to memory of 4152 3096 msedge.exe 81 PID 3096 wrote to memory of 4152 3096 msedge.exe 81 PID 3096 wrote to memory of 2784 3096 msedge.exe 82 PID 3096 wrote to memory of 2784 3096 msedge.exe 82 PID 3096 wrote to memory of 2784 3096 msedge.exe 82 PID 3096 wrote to memory of 2784 3096 msedge.exe 82 PID 3096 wrote to memory of 2784 3096 msedge.exe 82 PID 3096 wrote to memory of 2784 3096 msedge.exe 82 PID 3096 wrote to memory of 2784 3096 msedge.exe 82 PID 3096 wrote to memory of 2784 3096 msedge.exe 82 PID 3096 wrote to memory of 2784 3096 msedge.exe 82 PID 3096 wrote to memory of 2784 3096 msedge.exe 82 PID 3096 wrote to memory of 2784 3096 msedge.exe 82 PID 3096 wrote to memory of 2784 3096 msedge.exe 82 PID 3096 wrote to memory of 2784 3096 msedge.exe 82 PID 3096 wrote to memory of 2784 3096 msedge.exe 82 PID 3096 wrote to memory of 2784 3096 msedge.exe 82 PID 3096 wrote to memory of 2784 3096 msedge.exe 82 PID 3096 wrote to memory of 2784 3096 msedge.exe 82 PID 3096 wrote to memory of 2784 3096 msedge.exe 82 PID 3096 wrote to memory of 2784 3096 msedge.exe 82 PID 3096 wrote to memory of 2784 3096 msedge.exe 82 PID 3096 wrote to memory of 2784 3096 msedge.exe 82 PID 3096 wrote to memory of 2784 3096 msedge.exe 82 PID 3096 wrote to memory of 2784 3096 msedge.exe 82 PID 3096 wrote to memory of 2784 3096 msedge.exe 82 PID 3096 wrote to memory of 2784 3096 msedge.exe 82 PID 3096 wrote to memory of 2784 3096 msedge.exe 82 PID 3096 wrote to memory of 2784 3096 msedge.exe 82 PID 3096 wrote to memory of 2784 3096 msedge.exe 82 PID 3096 wrote to memory of 2784 3096 msedge.exe 82 PID 3096 wrote to memory of 2784 3096 msedge.exe 82 PID 3096 wrote to memory of 2784 3096 msedge.exe 82 PID 3096 wrote to memory of 2784 3096 msedge.exe 82 PID 3096 wrote to memory of 2784 3096 msedge.exe 82 PID 3096 wrote to memory of 2784 3096 msedge.exe 82 PID 3096 wrote to memory of 2784 3096 msedge.exe 82 PID 3096 wrote to memory of 2784 3096 msedge.exe 82 PID 3096 wrote to memory of 2784 3096 msedge.exe 82 PID 3096 wrote to memory of 2784 3096 msedge.exe 82 PID 3096 wrote to memory of 2784 3096 msedge.exe 82 PID 3096 wrote to memory of 2784 3096 msedge.exe 82 PID 3096 wrote to memory of 3352 3096 msedge.exe 83 PID 3096 wrote to memory of 3352 3096 msedge.exe 83 PID 3096 wrote to memory of 4664 3096 msedge.exe 84 PID 3096 wrote to memory of 4664 3096 msedge.exe 84 PID 3096 wrote to memory of 4664 3096 msedge.exe 84 PID 3096 wrote to memory of 4664 3096 msedge.exe 84 PID 3096 wrote to memory of 4664 3096 msedge.exe 84 PID 3096 wrote to memory of 4664 3096 msedge.exe 84 PID 3096 wrote to memory of 4664 3096 msedge.exe 84 PID 3096 wrote to memory of 4664 3096 msedge.exe 84 PID 3096 wrote to memory of 4664 3096 msedge.exe 84 PID 3096 wrote to memory of 4664 3096 msedge.exe 84 PID 3096 wrote to memory of 4664 3096 msedge.exe 84 PID 3096 wrote to memory of 4664 3096 msedge.exe 84 PID 3096 wrote to memory of 4664 3096 msedge.exe 84 PID 3096 wrote to memory of 4664 3096 msedge.exe 84 PID 3096 wrote to memory of 4664 3096 msedge.exe 84 PID 3096 wrote to memory of 4664 3096 msedge.exe 84 PID 3096 wrote to memory of 4664 3096 msedge.exe 84 PID 3096 wrote to memory of 4664 3096 msedge.exe 84 PID 3096 wrote to memory of 4664 3096 msedge.exe 84 PID 3096 wrote to memory of 4664 3096 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\f9886e3a5965f3679c98683a03098d92_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3096 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb579346f8,0x7ffb57934708,0x7ffb579347182⤵PID:4152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,4067914812803990566,7891733512973402900,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2076 /prefetch:22⤵PID:2784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2064,4067914812803990566,7891733512973402900,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2064,4067914812803990566,7891733512973402900,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2896 /prefetch:82⤵PID:4664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,4067914812803990566,7891733512973402900,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3200 /prefetch:12⤵PID:1168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,4067914812803990566,7891733512973402900,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:1120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,4067914812803990566,7891733512973402900,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4556 /prefetch:12⤵PID:3124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,4067914812803990566,7891733512973402900,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4888 /prefetch:12⤵PID:1872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,4067914812803990566,7891733512973402900,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5112 /prefetch:12⤵PID:2868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,4067914812803990566,7891733512973402900,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5380 /prefetch:12⤵PID:3704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,4067914812803990566,7891733512973402900,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5844 /prefetch:82⤵PID:2908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,4067914812803990566,7891733512973402900,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5844 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,4067914812803990566,7891733512973402900,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5932 /prefetch:12⤵PID:4072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,4067914812803990566,7891733512973402900,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5948 /prefetch:12⤵PID:4960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,4067914812803990566,7891733512973402900,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6320 /prefetch:12⤵PID:1532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,4067914812803990566,7891733512973402900,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6356 /prefetch:12⤵PID:680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,4067914812803990566,7891733512973402900,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6176 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4624
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:876
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4912
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f9664c896e19205022c094d725f820b6
SHA1f8f1baf648df755ba64b412d512446baf88c0184
SHA2567121d84202a850791c2320385eb59eda4d697310dc51b1fcd4d51264aba2434e
SHA5123fa5d2c68a9e70e4a25eaac2095171d87c741eec2624c314c6a56f4fa390d6319633bf4c48b1a4af7e9a0451f346beced9693da88cfc7bcba8dfe209cbd1b3ae
-
Filesize
152B
MD5847d47008dbea51cb1732d54861ba9c9
SHA1f2099242027dccb88d6f05760b57f7c89d926c0d
SHA25610292fa05d896a2952c1d602a72d761d34bc776b44d6a7df87e49b5b613a8ac1
SHA512bd1526aa1cc1c016d95dfcc53a78b45b09dde4ce67357fc275ab835dbe1bb5b053ca386239f50cde95ad243a9c1bbb12f7505818577589beecc6084f7b94e83f
-
Filesize
213KB
MD5f942900ff0a10f251d338c612c456948
SHA14a283d3c8f3dc491e43c430d97c3489ee7a3d320
SHA25638b76a54655aff71271a9ad376ac17f20187abd581bf5aced69ccde0fe6e2fd6
SHA5129b393ce73598ed1997d28ceeddb23491a4d986c337984878ebb0ae06019e30ea77448d375d3d6563c774856d6bc98ee3ca0e0ba88ea5769a451a5e814f6ddb41
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize312B
MD52a6c79ee088ac9b8ab7803997e03177c
SHA1993dead83a1bfd54e178173ba06dd7e07071b587
SHA2567b782d9a75606d1d26581bef3cd6e1ce0496eb726065b8650e8fa39b22e14fed
SHA51258bfd03a589614f6091282ff39dfd0262b72214f11e5eef05545208cb062927784e0f4e350825e1524efc9deb6c5e8dd3f12f9cea9a09995e645eae407ff1268
-
Filesize
1KB
MD51a8c6e9c3b895b3ec4fd5df3c61afa2f
SHA122ed62217722e855c1bb733b92169a868e83abe1
SHA256810f7e7ffad9931981e10da709c8aa1a131c8916a568d50996cab9a400ae505d
SHA51280499e94dad42578007bb1506ea0607c9078976fed87789c596b7f8732e4820a546af8523dbca6024924fde6387a9e8408b9d305edbf07aae65c5ec2d8d6f248
-
Filesize
5KB
MD5e820bc440ffa1676ea2c9cca2302aa83
SHA1b539b3085fef50edc57fb059d255169d1b6a9337
SHA2566659867cd7423be7f039cb8543b532ce5c5e2a4bc82aa2d6dd53d2a4b2ed9c0a
SHA5128c1c7011d70e784307167f59fa81aaef22ecf24c7f8deebddbe48c41f69cddf7d1e9436b3a3f0d089edac56edb8a769ac10ed3e8b063d77aa8f9b1c636b5da92
-
Filesize
6KB
MD5b28adf083c61e82bd3af79bfb5338b4f
SHA10ed776ad51780cc919ff921c07e558c0e7f30f47
SHA256b736e18818972b6996167cbbba3e9e1e67474c48fec03265a5838d152ad5c223
SHA512ca7a316fd466569af1490e3961f9d10c844e4286c70d0fad306160cfee09725a0cbc7ef90c05657508d0854c41e85248939ca5c0536fce56ec67a7858bd92b60
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5d0575f4e0773952b28172a1f444479d3
SHA1c23856aef8204054fd61e0c987bff4fa124c797f
SHA2560e409426fbb89ac6bbeeb7091b06b10b2b1cc188a24446b8ccee8fc90a0a8cd0
SHA512dd8a9370300c7782ea1e330374dea50f723619e51bd50773d5e4a14d0157f2bdd81b65ff1e5c0a8b8ebc7eeaad46846e581595e8316c780925edb627b68b4b7a