Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
30/09/2024, 00:41
Static task
static1
Behavioral task
behavioral1
Sample
ff995383ad002858e7e7e15000799780_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ff995383ad002858e7e7e15000799780_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ff995383ad002858e7e7e15000799780_JaffaCakes118.html
-
Size
57KB
-
MD5
ff995383ad002858e7e7e15000799780
-
SHA1
9b99a960eeebd9a4d5fe171d2129ee92df3be7ca
-
SHA256
91b7d6c2075f32a7da2b6238a27863a5384aaf86546b38163ee73ed46be3687c
-
SHA512
8c22c29c8c431b74ec7e8fd757c738a788e2201f176ae25208941ccacf3166f186738a99c3c9fe5c73a593b1872fbbeb8cb9fc9d2c9a0c7fbc7658482433a9bf
-
SSDEEP
1536:gQZBCCOdQl0IxCwVLi3fVf8fMfdfIfHfvf1fIf8fJfhfJf5f8fcfTfWfX8f1fzf8:gk2O0Ix49EkVQ/HdwUB5hRE07OE9LP9O
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1832 msedge.exe 1832 msedge.exe 224 msedge.exe 224 msedge.exe 2828 identity_helper.exe 2828 identity_helper.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 224 wrote to memory of 408 224 msedge.exe 82 PID 224 wrote to memory of 408 224 msedge.exe 82 PID 224 wrote to memory of 4820 224 msedge.exe 83 PID 224 wrote to memory of 4820 224 msedge.exe 83 PID 224 wrote to memory of 4820 224 msedge.exe 83 PID 224 wrote to memory of 4820 224 msedge.exe 83 PID 224 wrote to memory of 4820 224 msedge.exe 83 PID 224 wrote to memory of 4820 224 msedge.exe 83 PID 224 wrote to memory of 4820 224 msedge.exe 83 PID 224 wrote to memory of 4820 224 msedge.exe 83 PID 224 wrote to memory of 4820 224 msedge.exe 83 PID 224 wrote to memory of 4820 224 msedge.exe 83 PID 224 wrote to memory of 4820 224 msedge.exe 83 PID 224 wrote to memory of 4820 224 msedge.exe 83 PID 224 wrote to memory of 4820 224 msedge.exe 83 PID 224 wrote to memory of 4820 224 msedge.exe 83 PID 224 wrote to memory of 4820 224 msedge.exe 83 PID 224 wrote to memory of 4820 224 msedge.exe 83 PID 224 wrote to memory of 4820 224 msedge.exe 83 PID 224 wrote to memory of 4820 224 msedge.exe 83 PID 224 wrote to memory of 4820 224 msedge.exe 83 PID 224 wrote to memory of 4820 224 msedge.exe 83 PID 224 wrote to memory of 4820 224 msedge.exe 83 PID 224 wrote to memory of 4820 224 msedge.exe 83 PID 224 wrote to memory of 4820 224 msedge.exe 83 PID 224 wrote to memory of 4820 224 msedge.exe 83 PID 224 wrote to memory of 4820 224 msedge.exe 83 PID 224 wrote to memory of 4820 224 msedge.exe 83 PID 224 wrote to memory of 4820 224 msedge.exe 83 PID 224 wrote to memory of 4820 224 msedge.exe 83 PID 224 wrote to memory of 4820 224 msedge.exe 83 PID 224 wrote to memory of 4820 224 msedge.exe 83 PID 224 wrote to memory of 4820 224 msedge.exe 83 PID 224 wrote to memory of 4820 224 msedge.exe 83 PID 224 wrote to memory of 4820 224 msedge.exe 83 PID 224 wrote to memory of 4820 224 msedge.exe 83 PID 224 wrote to memory of 4820 224 msedge.exe 83 PID 224 wrote to memory of 4820 224 msedge.exe 83 PID 224 wrote to memory of 4820 224 msedge.exe 83 PID 224 wrote to memory of 4820 224 msedge.exe 83 PID 224 wrote to memory of 4820 224 msedge.exe 83 PID 224 wrote to memory of 4820 224 msedge.exe 83 PID 224 wrote to memory of 1832 224 msedge.exe 84 PID 224 wrote to memory of 1832 224 msedge.exe 84 PID 224 wrote to memory of 4016 224 msedge.exe 85 PID 224 wrote to memory of 4016 224 msedge.exe 85 PID 224 wrote to memory of 4016 224 msedge.exe 85 PID 224 wrote to memory of 4016 224 msedge.exe 85 PID 224 wrote to memory of 4016 224 msedge.exe 85 PID 224 wrote to memory of 4016 224 msedge.exe 85 PID 224 wrote to memory of 4016 224 msedge.exe 85 PID 224 wrote to memory of 4016 224 msedge.exe 85 PID 224 wrote to memory of 4016 224 msedge.exe 85 PID 224 wrote to memory of 4016 224 msedge.exe 85 PID 224 wrote to memory of 4016 224 msedge.exe 85 PID 224 wrote to memory of 4016 224 msedge.exe 85 PID 224 wrote to memory of 4016 224 msedge.exe 85 PID 224 wrote to memory of 4016 224 msedge.exe 85 PID 224 wrote to memory of 4016 224 msedge.exe 85 PID 224 wrote to memory of 4016 224 msedge.exe 85 PID 224 wrote to memory of 4016 224 msedge.exe 85 PID 224 wrote to memory of 4016 224 msedge.exe 85 PID 224 wrote to memory of 4016 224 msedge.exe 85 PID 224 wrote to memory of 4016 224 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\ff995383ad002858e7e7e15000799780_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:224 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc28ee46f8,0x7ffc28ee4708,0x7ffc28ee47182⤵PID:408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,16926823562969329375,10609701122364372791,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2172 /prefetch:22⤵PID:4820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2160,16926823562969329375,10609701122364372791,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2256 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2160,16926823562969329375,10609701122364372791,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2852 /prefetch:82⤵PID:4016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,16926823562969329375,10609701122364372791,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3196 /prefetch:12⤵PID:2268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,16926823562969329375,10609701122364372791,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:1136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,16926823562969329375,10609701122364372791,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4656 /prefetch:12⤵PID:4160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,16926823562969329375,10609701122364372791,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4856 /prefetch:12⤵PID:372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,16926823562969329375,10609701122364372791,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4180 /prefetch:12⤵PID:2928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,16926823562969329375,10609701122364372791,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6220 /prefetch:82⤵PID:4020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,16926823562969329375,10609701122364372791,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6220 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,16926823562969329375,10609701122364372791,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5656 /prefetch:12⤵PID:340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,16926823562969329375,10609701122364372791,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5684 /prefetch:12⤵PID:3520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,16926823562969329375,10609701122364372791,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4068 /prefetch:12⤵PID:4560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,16926823562969329375,10609701122364372791,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5384 /prefetch:12⤵PID:4500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,16926823562969329375,10609701122364372791,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5192 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5000
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3828
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:212
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD553bc70ecb115bdbabe67620c416fe9b3
SHA1af66ec51a13a59639eaf54d62ff3b4f092bb2fc1
SHA256b36cad5c1f7bc7d07c7eaa2f3cad2959ddb5447d4d3adcb46eb6a99808e22771
SHA512cad44933b94e17908c0eb8ac5feeb53d03a7720d97e7ccc8724a1ed3021a5bece09e1f9f3cec56ce0739176ebbbeb20729e650f8bca04e5060c986b75d8e4921
-
Filesize
152B
MD5e765f3d75e6b0e4a7119c8b14d47d8da
SHA1cc9f7c7826c2e1a129e7d98884926076c3714fc0
SHA256986443556d3878258b710d9d9efbf4f25f0d764c3f83dc54217f2b12a6eccd89
SHA512a1872a849f27da78ebe9adb9beb260cb49ed5f4ca2d403f23379112bdfcd2482446a6708188100496e45db1517cdb43aba8bb93a75e605713c3f97cd716b1079
-
Filesize
213KB
MD5f942900ff0a10f251d338c612c456948
SHA14a283d3c8f3dc491e43c430d97c3489ee7a3d320
SHA25638b76a54655aff71271a9ad376ac17f20187abd581bf5aced69ccde0fe6e2fd6
SHA5129b393ce73598ed1997d28ceeddb23491a4d986c337984878ebb0ae06019e30ea77448d375d3d6563c774856d6bc98ee3ca0e0ba88ea5769a451a5e814f6ddb41
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize504B
MD57958febbd767fece105c1a643baee73c
SHA1c08793dafe1de238a77c38568a6f1b0343c1fa6d
SHA256476e75751619d22cc7bbbea73795a6e8544b836d0476113083455fdc5f05854a
SHA51287db8e8ec559b8d0a3b30ecdac93e164226ea8ddb0b0f62e0d8380f4941b9ba21ed2dc765af43fbb944110ef1204d0aab1490ce813be8854947bf5ea7f1b76bc
-
Filesize
1KB
MD51e74b7127ec4eef7d0f3f4ebda760630
SHA162da749f1e573f92abe89853acbbbcc3930a9235
SHA2567846baaef5be2dcc7b3b37af89507607daba014ca3d2aa1823f00108fdffcd97
SHA51230732e8020529e74f51f3f537070228cb942e5631a9b986030ce39c5b46d880e9a4a6aec0b7d35bf2392cc0ff94a313a8180ab4ff29d8a6dfc884ec8d9b83aae
-
Filesize
5KB
MD5a714da5d3b2024b3f4badb09cb992646
SHA18845606999e67916d007790a6b8d9ee8e6fd3b00
SHA25611cc0837381e3025422f0db6b8ea75796c545d556213e61e435ea2130e91a991
SHA51242d72a271a83e251bfa23966d145293ecd07be1d5aca3856a6aa5f8122739d11d33596cffc1f73c8f4464c13a10f693705a7770532fbeb94b7488a3cdbb7fce4
-
Filesize
6KB
MD5c59f88d6ac400b7c1d4d6b93e3b956dc
SHA1e684254e4e76f61b6c8ebeb4e04cb2675e36a696
SHA2562ba3342e7057c9b5072fc81fe7df9f60b3297af9e006727f30d8316a39d64a66
SHA512ce7411fa6fd160e22d67b66419c386e25fe6e2715bae1922eee3eabf6a32e67054a0fc9fb8f12e3bee3c995e589ab55dd1066672a498c31a3cf95d20c5a5cf2e
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD558bd4b9f788a0badc90ffab33cab049f
SHA1b37ced565bff0a4f7a3187a921743b6c3bdcf05f
SHA25668cd59eab75d1d1d58de3da555efacceaf285de0e854df186d445e97a5793105
SHA5122cee6d819aef1a95b73601c40b794579f8193ae2184c49261132bf12804487f2d6797eedb7a6a70e3209f379c0fedeaa0f257e35052b0b2d93d727b2b9e1828e