Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
28/09/2024, 09:39
Static task
static1
Behavioral task
behavioral1
Sample
fc03f462dc4db1ae2dcd9716197833dd_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fc03f462dc4db1ae2dcd9716197833dd_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fc03f462dc4db1ae2dcd9716197833dd_JaffaCakes118.html
-
Size
55KB
-
MD5
fc03f462dc4db1ae2dcd9716197833dd
-
SHA1
b3bfa0cdc248b1ecd64d45d1100360defb363967
-
SHA256
90251f50aa623d0e70958f3bec9f7bbe28ff170d241c01f3543ae16172bfe6f7
-
SHA512
e5b41197323638f3a398916103ff0a5f7e89ab7e270e7bdba25a5fb63657c9dbd6b2b70ef8e941780eb8f48084584003545d2007095909573af83a6236e4e416
-
SSDEEP
1536:gQZBCCOdO0IxC8Xxxbh3hZZ5VHFpjhtDdsi8Uln6LshX1OSsJs11XIsAuYa81kaQ:gk2Q0Ixlxbh3hZZ5VHFpjhtDdsi8Uln9
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4320 msedge.exe 4320 msedge.exe 4952 msedge.exe 4952 msedge.exe 4452 identity_helper.exe 4452 identity_helper.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4952 wrote to memory of 1144 4952 msedge.exe 85 PID 4952 wrote to memory of 1144 4952 msedge.exe 85 PID 4952 wrote to memory of 396 4952 msedge.exe 86 PID 4952 wrote to memory of 396 4952 msedge.exe 86 PID 4952 wrote to memory of 396 4952 msedge.exe 86 PID 4952 wrote to memory of 396 4952 msedge.exe 86 PID 4952 wrote to memory of 396 4952 msedge.exe 86 PID 4952 wrote to memory of 396 4952 msedge.exe 86 PID 4952 wrote to memory of 396 4952 msedge.exe 86 PID 4952 wrote to memory of 396 4952 msedge.exe 86 PID 4952 wrote to memory of 396 4952 msedge.exe 86 PID 4952 wrote to memory of 396 4952 msedge.exe 86 PID 4952 wrote to memory of 396 4952 msedge.exe 86 PID 4952 wrote to memory of 396 4952 msedge.exe 86 PID 4952 wrote to memory of 396 4952 msedge.exe 86 PID 4952 wrote to memory of 396 4952 msedge.exe 86 PID 4952 wrote to memory of 396 4952 msedge.exe 86 PID 4952 wrote to memory of 396 4952 msedge.exe 86 PID 4952 wrote to memory of 396 4952 msedge.exe 86 PID 4952 wrote to memory of 396 4952 msedge.exe 86 PID 4952 wrote to memory of 396 4952 msedge.exe 86 PID 4952 wrote to memory of 396 4952 msedge.exe 86 PID 4952 wrote to memory of 396 4952 msedge.exe 86 PID 4952 wrote to memory of 396 4952 msedge.exe 86 PID 4952 wrote to memory of 396 4952 msedge.exe 86 PID 4952 wrote to memory of 396 4952 msedge.exe 86 PID 4952 wrote to memory of 396 4952 msedge.exe 86 PID 4952 wrote to memory of 396 4952 msedge.exe 86 PID 4952 wrote to memory of 396 4952 msedge.exe 86 PID 4952 wrote to memory of 396 4952 msedge.exe 86 PID 4952 wrote to memory of 396 4952 msedge.exe 86 PID 4952 wrote to memory of 396 4952 msedge.exe 86 PID 4952 wrote to memory of 396 4952 msedge.exe 86 PID 4952 wrote to memory of 396 4952 msedge.exe 86 PID 4952 wrote to memory of 396 4952 msedge.exe 86 PID 4952 wrote to memory of 396 4952 msedge.exe 86 PID 4952 wrote to memory of 396 4952 msedge.exe 86 PID 4952 wrote to memory of 396 4952 msedge.exe 86 PID 4952 wrote to memory of 396 4952 msedge.exe 86 PID 4952 wrote to memory of 396 4952 msedge.exe 86 PID 4952 wrote to memory of 396 4952 msedge.exe 86 PID 4952 wrote to memory of 396 4952 msedge.exe 86 PID 4952 wrote to memory of 4320 4952 msedge.exe 87 PID 4952 wrote to memory of 4320 4952 msedge.exe 87 PID 4952 wrote to memory of 1704 4952 msedge.exe 88 PID 4952 wrote to memory of 1704 4952 msedge.exe 88 PID 4952 wrote to memory of 1704 4952 msedge.exe 88 PID 4952 wrote to memory of 1704 4952 msedge.exe 88 PID 4952 wrote to memory of 1704 4952 msedge.exe 88 PID 4952 wrote to memory of 1704 4952 msedge.exe 88 PID 4952 wrote to memory of 1704 4952 msedge.exe 88 PID 4952 wrote to memory of 1704 4952 msedge.exe 88 PID 4952 wrote to memory of 1704 4952 msedge.exe 88 PID 4952 wrote to memory of 1704 4952 msedge.exe 88 PID 4952 wrote to memory of 1704 4952 msedge.exe 88 PID 4952 wrote to memory of 1704 4952 msedge.exe 88 PID 4952 wrote to memory of 1704 4952 msedge.exe 88 PID 4952 wrote to memory of 1704 4952 msedge.exe 88 PID 4952 wrote to memory of 1704 4952 msedge.exe 88 PID 4952 wrote to memory of 1704 4952 msedge.exe 88 PID 4952 wrote to memory of 1704 4952 msedge.exe 88 PID 4952 wrote to memory of 1704 4952 msedge.exe 88 PID 4952 wrote to memory of 1704 4952 msedge.exe 88 PID 4952 wrote to memory of 1704 4952 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\fc03f462dc4db1ae2dcd9716197833dd_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4952 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff5a8746f8,0x7fff5a874708,0x7fff5a8747182⤵PID:1144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2228,14791257655498687721,8254653431643902600,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2292 /prefetch:22⤵PID:396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2228,14791257655498687721,8254653431643902600,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2344 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2228,14791257655498687721,8254653431643902600,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2776 /prefetch:82⤵PID:1704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,14791257655498687721,8254653431643902600,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:5040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,14791257655498687721,8254653431643902600,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:2084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,14791257655498687721,8254653431643902600,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4260 /prefetch:12⤵PID:1624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,14791257655498687721,8254653431643902600,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4920 /prefetch:12⤵PID:4892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,14791257655498687721,8254653431643902600,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5144 /prefetch:12⤵PID:1652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2228,14791257655498687721,8254653431643902600,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5928 /prefetch:82⤵PID:2556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2228,14791257655498687721,8254653431643902600,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5928 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,14791257655498687721,8254653431643902600,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5964 /prefetch:12⤵PID:3680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,14791257655498687721,8254653431643902600,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5980 /prefetch:12⤵PID:3700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,14791257655498687721,8254653431643902600,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5508 /prefetch:12⤵PID:2652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,14791257655498687721,8254653431643902600,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6448 /prefetch:12⤵PID:2332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2228,14791257655498687721,8254653431643902600,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5540 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1352
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3736
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4416
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59e3fc58a8fb86c93d19e1500b873ef6f
SHA1c6aae5f4e26f5570db5e14bba8d5061867a33b56
SHA256828f4eacac1c40b790fd70dbb6fa6ba03dcc681171d9b2a6579626d27837b1c4
SHA512e5e245b56fa82075e060f468a3224cf2ef43f1b6d87f0351a2102d85c7c897e559be4caeaecfdc4059af29fdc674681b61229319dda95cb2ee649b2eb98d313e
-
Filesize
152B
MD527304926d60324abe74d7a4b571c35ea
SHA178b8f92fcaf4a09eaa786bbe33fd1b0222ef29c1
SHA2567039ad5c2b40f4d97c8c2269f4942be13436d739b2e1f8feb7a0c9f9fdb931de
SHA512f5b6181d3f432238c7365f64fc8a373299e23ba8178bcc419471916ef8b23e909787c7c0617ab22e4eb90909c02bd7b84f1386fbc61e2bdb5a0eb474175da4bd
-
Filesize
213KB
MD5f942900ff0a10f251d338c612c456948
SHA14a283d3c8f3dc491e43c430d97c3489ee7a3d320
SHA25638b76a54655aff71271a9ad376ac17f20187abd581bf5aced69ccde0fe6e2fd6
SHA5129b393ce73598ed1997d28ceeddb23491a4d986c337984878ebb0ae06019e30ea77448d375d3d6563c774856d6bc98ee3ca0e0ba88ea5769a451a5e814f6ddb41
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize504B
MD5fd476f42a0e8e102a7d3db3a37b2e7c8
SHA1248b6717328c46a07cf258c62dd7e0b84489ca41
SHA2560546b6273aa9aaed017cce790d9c0f0a5b26e923ca62106176fe37be65ade3d3
SHA5121f09f1197dff0ada4985b5099b4bdaaa8e379cf3c7e1f74c035d31d0081fb8286043085d289f3201a8f943f576baa2a4b4f5e9779ff22d1f83180e35f90da8cd
-
Filesize
1KB
MD5b1b6cb5a26907d8dad2a92d8f57537fc
SHA1da62771bfa289978e406af70e3245cdd572f6825
SHA256efdb3261db5813a7d0064bc03cd0fa22b25c80cdfd65ab47d76af90fbe057af6
SHA51252cce75d71a0d91efedfa747582f5e0f9a8508fa5f833e0e0e856ce15774c6f002e8c0edd2bcf538060b87558c7869f7f51716229be801f1a9a1db68c53a15cf
-
Filesize
6KB
MD58224232cf7feb12ca9e38ffde7770c00
SHA17a248c8f3aaffa8e6148cf9f2557f7ee38311358
SHA2566be0ecb52dad986a33da8cb5e6cf186be807572b0dc70450aabd3bf552bc3c5c
SHA512f4046f60dd0df24ec08212009161ad21fe7600a778b47935c6d87db5857f16ecc2e12ee29dad6b1b3586b9beb07d4edea41081d95c9953163a6a8ceee842314b
-
Filesize
6KB
MD5aa13a24486e5f13a7ab3f9a7bd5e2e9b
SHA18f9a8787c4968da10e403ba302c00df0b3ec0d9a
SHA256daf1af6e8383b0d8d1539e80e8f7e7d2cdeced9d74cbd6b32595cfa6cb1f785c
SHA512ed837b907c129ffaa59f9dd8e4246bade0765b129d8cf039ebfc20aa535586575087921063d7b009d8958f231abee666086f170c647f321cdd3ed91fb7c77d4e
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD588384a9f756c90f9d444c3630f6ea4d3
SHA183d5639281cfda0db5b3ae48877ea45dd878424a
SHA2565778819bfdd8693809c48ed02c23d4353f9692ff6baa7d2ce1009c8a44cfcfd1
SHA5124b5bb4f2e9b6d8d14b294dee70155082c4e478997e94572a1e37f63164ffe2ad4a75cd3d0affee90264be1b5aefa775a3f99fe6611f7b638bb5d0ace9eadb460