Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
28/09/2024, 20:21
Static task
static1
Behavioral task
behavioral1
Sample
fd132a53676dbb61155a03efdce9a3ac_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fd132a53676dbb61155a03efdce9a3ac_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fd132a53676dbb61155a03efdce9a3ac_JaffaCakes118.html
-
Size
16KB
-
MD5
fd132a53676dbb61155a03efdce9a3ac
-
SHA1
7bfb1bf77254ac98edac7b7431d940fe8cef2214
-
SHA256
43df9cae87f861fe5a7928a0a5415107e7b45e7797590ff16c32b633ce3b4727
-
SHA512
783a95e251f3c3c49b5f23abfa5cfa5e68e25b72365be4b0e35da98063684935422a694a850f6f930461410b722f56cccd2570548d833abb97247eca47723e11
-
SSDEEP
384:KKGt32cBnpn0+OfPKeUhVL/NlvKDMb6UATq+SIZ/kL12LHexLWn4hxYDK4XIZY2V:VcHlZVBlu21rsn+K43
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2864 msedge.exe 2864 msedge.exe 392 msedge.exe 392 msedge.exe 4992 identity_helper.exe 4992 identity_helper.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe 3116 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe 392 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 392 wrote to memory of 4124 392 msedge.exe 82 PID 392 wrote to memory of 4124 392 msedge.exe 82 PID 392 wrote to memory of 1900 392 msedge.exe 83 PID 392 wrote to memory of 1900 392 msedge.exe 83 PID 392 wrote to memory of 1900 392 msedge.exe 83 PID 392 wrote to memory of 1900 392 msedge.exe 83 PID 392 wrote to memory of 1900 392 msedge.exe 83 PID 392 wrote to memory of 1900 392 msedge.exe 83 PID 392 wrote to memory of 1900 392 msedge.exe 83 PID 392 wrote to memory of 1900 392 msedge.exe 83 PID 392 wrote to memory of 1900 392 msedge.exe 83 PID 392 wrote to memory of 1900 392 msedge.exe 83 PID 392 wrote to memory of 1900 392 msedge.exe 83 PID 392 wrote to memory of 1900 392 msedge.exe 83 PID 392 wrote to memory of 1900 392 msedge.exe 83 PID 392 wrote to memory of 1900 392 msedge.exe 83 PID 392 wrote to memory of 1900 392 msedge.exe 83 PID 392 wrote to memory of 1900 392 msedge.exe 83 PID 392 wrote to memory of 1900 392 msedge.exe 83 PID 392 wrote to memory of 1900 392 msedge.exe 83 PID 392 wrote to memory of 1900 392 msedge.exe 83 PID 392 wrote to memory of 1900 392 msedge.exe 83 PID 392 wrote to memory of 1900 392 msedge.exe 83 PID 392 wrote to memory of 1900 392 msedge.exe 83 PID 392 wrote to memory of 1900 392 msedge.exe 83 PID 392 wrote to memory of 1900 392 msedge.exe 83 PID 392 wrote to memory of 1900 392 msedge.exe 83 PID 392 wrote to memory of 1900 392 msedge.exe 83 PID 392 wrote to memory of 1900 392 msedge.exe 83 PID 392 wrote to memory of 1900 392 msedge.exe 83 PID 392 wrote to memory of 1900 392 msedge.exe 83 PID 392 wrote to memory of 1900 392 msedge.exe 83 PID 392 wrote to memory of 1900 392 msedge.exe 83 PID 392 wrote to memory of 1900 392 msedge.exe 83 PID 392 wrote to memory of 1900 392 msedge.exe 83 PID 392 wrote to memory of 1900 392 msedge.exe 83 PID 392 wrote to memory of 1900 392 msedge.exe 83 PID 392 wrote to memory of 1900 392 msedge.exe 83 PID 392 wrote to memory of 1900 392 msedge.exe 83 PID 392 wrote to memory of 1900 392 msedge.exe 83 PID 392 wrote to memory of 1900 392 msedge.exe 83 PID 392 wrote to memory of 1900 392 msedge.exe 83 PID 392 wrote to memory of 2864 392 msedge.exe 84 PID 392 wrote to memory of 2864 392 msedge.exe 84 PID 392 wrote to memory of 4836 392 msedge.exe 85 PID 392 wrote to memory of 4836 392 msedge.exe 85 PID 392 wrote to memory of 4836 392 msedge.exe 85 PID 392 wrote to memory of 4836 392 msedge.exe 85 PID 392 wrote to memory of 4836 392 msedge.exe 85 PID 392 wrote to memory of 4836 392 msedge.exe 85 PID 392 wrote to memory of 4836 392 msedge.exe 85 PID 392 wrote to memory of 4836 392 msedge.exe 85 PID 392 wrote to memory of 4836 392 msedge.exe 85 PID 392 wrote to memory of 4836 392 msedge.exe 85 PID 392 wrote to memory of 4836 392 msedge.exe 85 PID 392 wrote to memory of 4836 392 msedge.exe 85 PID 392 wrote to memory of 4836 392 msedge.exe 85 PID 392 wrote to memory of 4836 392 msedge.exe 85 PID 392 wrote to memory of 4836 392 msedge.exe 85 PID 392 wrote to memory of 4836 392 msedge.exe 85 PID 392 wrote to memory of 4836 392 msedge.exe 85 PID 392 wrote to memory of 4836 392 msedge.exe 85 PID 392 wrote to memory of 4836 392 msedge.exe 85 PID 392 wrote to memory of 4836 392 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\fd132a53676dbb61155a03efdce9a3ac_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:392 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff815d46f8,0x7fff815d4708,0x7fff815d47182⤵PID:4124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,9466088800489612286,6614599949790065077,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:22⤵PID:1900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,9466088800489612286,6614599949790065077,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2300 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,9466088800489612286,6614599949790065077,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2812 /prefetch:82⤵PID:4836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,9466088800489612286,6614599949790065077,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:3036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,9466088800489612286,6614599949790065077,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:1916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,9466088800489612286,6614599949790065077,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4164 /prefetch:12⤵PID:3284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,9466088800489612286,6614599949790065077,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4356 /prefetch:12⤵PID:832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,9466088800489612286,6614599949790065077,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5112 /prefetch:12⤵PID:1884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,9466088800489612286,6614599949790065077,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5676 /prefetch:12⤵PID:3124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,9466088800489612286,6614599949790065077,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5704 /prefetch:12⤵PID:3496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,9466088800489612286,6614599949790065077,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5724 /prefetch:82⤵PID:1288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,9466088800489612286,6614599949790065077,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5724 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,9466088800489612286,6614599949790065077,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6312 /prefetch:12⤵PID:1348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,9466088800489612286,6614599949790065077,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6268 /prefetch:12⤵PID:3516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,9466088800489612286,6614599949790065077,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5244 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3116
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4992
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4396
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5eeaa8087eba2f63f31e599f6a7b46ef4
SHA1f639519deee0766a39cfe258d2ac48e3a9d5ac03
SHA25650fe80c9435f601c30517d10f6a8a0ca6ff8ca2add7584df377371b5a5dbe2d9
SHA512eaabfad92c84f422267615c55a863af12823c5e791bdcb30cabe17f72025e07df7383cf6cf0f08e28aa18a31c2aac5985cf5281a403e22fbcc1fb5e61c49fc3c
-
Filesize
152B
MD5b9569e123772ae290f9bac07e0d31748
SHA15806ed9b301d4178a959b26d7b7ccf2c0abc6741
SHA25620ab88e23fb88186b82047cd0d6dc3cfa23422e4fd2b8f3c8437546a2a842c2b
SHA512cfad8ce716ac815b37e8cc0e30141bfb3ca7f0d4ef101289bddcf6ed3c579bc34d369f2ec2f2dab98707843015633988eb97f1e911728031dd897750b8587795
-
Filesize
213KB
MD5f942900ff0a10f251d338c612c456948
SHA14a283d3c8f3dc491e43c430d97c3489ee7a3d320
SHA25638b76a54655aff71271a9ad376ac17f20187abd581bf5aced69ccde0fe6e2fd6
SHA5129b393ce73598ed1997d28ceeddb23491a4d986c337984878ebb0ae06019e30ea77448d375d3d6563c774856d6bc98ee3ca0e0ba88ea5769a451a5e814f6ddb41
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize312B
MD5412fa5b8ac8c5278433e8a79a9cec6b7
SHA1de58914de6f8f93941e0091fda2ca9bc72acbddc
SHA256791254710a093a5c606f0ae11eb3586942b5002b632af1223e299014713b68c5
SHA512d4bcf7b532200e018b191a8f05f413500a41ca882df7d5016ab77cff6b3b7706c36d4a105c78318ca6efa654b923da4b02d7e1576140b8d7fedcc49497a7fc73
-
Filesize
1KB
MD599a3a9a89d0da1b6f093c93a60c17ccd
SHA18225161d1d5b1effa2feb6e5fc01c874a3d41713
SHA25605780bca732e7b1d2bf0c28d233f6b707d8b2bba5acf15939f3720cf0042f0d8
SHA51200e778d10345bfceff9c7615ec8c112684f3ac4732edc35fbdad235b9c3ff3b2a94cae3bc41b00c72a04b754af28fb072e9495822a90912bffb8fb2571e6f995
-
Filesize
5KB
MD5007d019341f9533581c50570cf9742d7
SHA17b29ce78a36d33c8d2be68470d855e9093313cf7
SHA25609371281c7bb76a055a2e63051a5cd5cdd71ae704176f0a9f9cb567d07720367
SHA512f4ac09bc60250fcbbcfccae6ce22f9aecce9347f5d08114be16749e92a58c7372c0685a9b1efeebf8c336a92cdae9c37beba6a4a310f90f439db700389734e52
-
Filesize
6KB
MD56a7273ec9ea5d4e36364beb6ffc917ff
SHA1c466e23950f8acd0569940ee2c04a29126bb37e2
SHA2563ee5574f9ce6bdc2e6b295bc350f572884ce5efb559e0a99f776aee096fe06c8
SHA512438da02fc426768225a48cea01dd8aa6e0d82ee22610f74122e49690da938783060565ea1a0f55ec6d5cee2b3ca752c7966e1fb58d421cec2bb8fc16b44bc45e
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5273d1b9e5faecb80a1fc94baccaebf30
SHA1f8af649a1436af2e2d036e23ca018dc37b4089f5
SHA256fa687fddfe6189de546d3ad0cc9a2751cff670ce4f490125b98538f6ed04364f
SHA512bd1f91bc93f34a368aac9d50b5d366aeb5a0ad56d5314f9b63e98e304f3893e621a59349d729630b82bfd1a4bea87edd641525e2c3ab6c42da27697a0b6a2442