Analysis
-
max time kernel
146s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
30/09/2024, 03:49
Static task
static1
Behavioral task
behavioral1
Sample
ffe6e744375c9a5fce1fab3a683a2836_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ffe6e744375c9a5fce1fab3a683a2836_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ffe6e744375c9a5fce1fab3a683a2836_JaffaCakes118.html
-
Size
48KB
-
MD5
ffe6e744375c9a5fce1fab3a683a2836
-
SHA1
4b7164755afa888d2d7d7a270d4aaee6aad05731
-
SHA256
be1e8d5d7c7047379ab0152e5f09416f7fd3a8fdca0dd0a4067df08ba3bc2c9a
-
SHA512
aa28aa51a1885cce7563a32bc7461544e305d4cf38e84f4ad2dfd47bc480c5ccb070832c71617fbaa4273fd944dc425be53da964ea3dbf80095ce69f897b9b02
-
SSDEEP
1536:s4H2jIWqmhAWpuJhs/iZcwhQHh0qT+12LO4irKFH0WZcRKn:so2McAWkJWC40qTKKFr
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3384 msedge.exe 3384 msedge.exe 4952 msedge.exe 4952 msedge.exe 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 3452 identity_helper.exe 3452 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4952 wrote to memory of 2992 4952 msedge.exe 82 PID 4952 wrote to memory of 2992 4952 msedge.exe 82 PID 4952 wrote to memory of 2628 4952 msedge.exe 83 PID 4952 wrote to memory of 2628 4952 msedge.exe 83 PID 4952 wrote to memory of 2628 4952 msedge.exe 83 PID 4952 wrote to memory of 2628 4952 msedge.exe 83 PID 4952 wrote to memory of 2628 4952 msedge.exe 83 PID 4952 wrote to memory of 2628 4952 msedge.exe 83 PID 4952 wrote to memory of 2628 4952 msedge.exe 83 PID 4952 wrote to memory of 2628 4952 msedge.exe 83 PID 4952 wrote to memory of 2628 4952 msedge.exe 83 PID 4952 wrote to memory of 2628 4952 msedge.exe 83 PID 4952 wrote to memory of 2628 4952 msedge.exe 83 PID 4952 wrote to memory of 2628 4952 msedge.exe 83 PID 4952 wrote to memory of 2628 4952 msedge.exe 83 PID 4952 wrote to memory of 2628 4952 msedge.exe 83 PID 4952 wrote to memory of 2628 4952 msedge.exe 83 PID 4952 wrote to memory of 2628 4952 msedge.exe 83 PID 4952 wrote to memory of 2628 4952 msedge.exe 83 PID 4952 wrote to memory of 2628 4952 msedge.exe 83 PID 4952 wrote to memory of 2628 4952 msedge.exe 83 PID 4952 wrote to memory of 2628 4952 msedge.exe 83 PID 4952 wrote to memory of 2628 4952 msedge.exe 83 PID 4952 wrote to memory of 2628 4952 msedge.exe 83 PID 4952 wrote to memory of 2628 4952 msedge.exe 83 PID 4952 wrote to memory of 2628 4952 msedge.exe 83 PID 4952 wrote to memory of 2628 4952 msedge.exe 83 PID 4952 wrote to memory of 2628 4952 msedge.exe 83 PID 4952 wrote to memory of 2628 4952 msedge.exe 83 PID 4952 wrote to memory of 2628 4952 msedge.exe 83 PID 4952 wrote to memory of 2628 4952 msedge.exe 83 PID 4952 wrote to memory of 2628 4952 msedge.exe 83 PID 4952 wrote to memory of 2628 4952 msedge.exe 83 PID 4952 wrote to memory of 2628 4952 msedge.exe 83 PID 4952 wrote to memory of 2628 4952 msedge.exe 83 PID 4952 wrote to memory of 2628 4952 msedge.exe 83 PID 4952 wrote to memory of 2628 4952 msedge.exe 83 PID 4952 wrote to memory of 2628 4952 msedge.exe 83 PID 4952 wrote to memory of 2628 4952 msedge.exe 83 PID 4952 wrote to memory of 2628 4952 msedge.exe 83 PID 4952 wrote to memory of 2628 4952 msedge.exe 83 PID 4952 wrote to memory of 2628 4952 msedge.exe 83 PID 4952 wrote to memory of 3384 4952 msedge.exe 84 PID 4952 wrote to memory of 3384 4952 msedge.exe 84 PID 4952 wrote to memory of 3656 4952 msedge.exe 85 PID 4952 wrote to memory of 3656 4952 msedge.exe 85 PID 4952 wrote to memory of 3656 4952 msedge.exe 85 PID 4952 wrote to memory of 3656 4952 msedge.exe 85 PID 4952 wrote to memory of 3656 4952 msedge.exe 85 PID 4952 wrote to memory of 3656 4952 msedge.exe 85 PID 4952 wrote to memory of 3656 4952 msedge.exe 85 PID 4952 wrote to memory of 3656 4952 msedge.exe 85 PID 4952 wrote to memory of 3656 4952 msedge.exe 85 PID 4952 wrote to memory of 3656 4952 msedge.exe 85 PID 4952 wrote to memory of 3656 4952 msedge.exe 85 PID 4952 wrote to memory of 3656 4952 msedge.exe 85 PID 4952 wrote to memory of 3656 4952 msedge.exe 85 PID 4952 wrote to memory of 3656 4952 msedge.exe 85 PID 4952 wrote to memory of 3656 4952 msedge.exe 85 PID 4952 wrote to memory of 3656 4952 msedge.exe 85 PID 4952 wrote to memory of 3656 4952 msedge.exe 85 PID 4952 wrote to memory of 3656 4952 msedge.exe 85 PID 4952 wrote to memory of 3656 4952 msedge.exe 85 PID 4952 wrote to memory of 3656 4952 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\ffe6e744375c9a5fce1fab3a683a2836_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4952 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff227e46f8,0x7fff227e4708,0x7fff227e47182⤵PID:2992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,9295375984969470414,554758140497250475,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:22⤵PID:2628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,9295375984969470414,554758140497250475,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2300 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,9295375984969470414,554758140497250475,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2700 /prefetch:82⤵PID:3656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,9295375984969470414,554758140497250475,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:4432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,9295375984969470414,554758140497250475,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:12⤵PID:4260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,9295375984969470414,554758140497250475,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4724 /prefetch:12⤵PID:5028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,9295375984969470414,554758140497250475,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5048 /prefetch:12⤵PID:2516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,9295375984969470414,554758140497250475,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1312 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,9295375984969470414,554758140497250475,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1256 /prefetch:82⤵PID:524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,9295375984969470414,554758140497250475,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1256 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,9295375984969470414,554758140497250475,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5864 /prefetch:12⤵PID:4004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,9295375984969470414,554758140497250475,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5388 /prefetch:12⤵PID:2772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,9295375984969470414,554758140497250475,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4144 /prefetch:12⤵PID:60
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,9295375984969470414,554758140497250475,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5296 /prefetch:12⤵PID:1160
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4716
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1568
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5eeaa8087eba2f63f31e599f6a7b46ef4
SHA1f639519deee0766a39cfe258d2ac48e3a9d5ac03
SHA25650fe80c9435f601c30517d10f6a8a0ca6ff8ca2add7584df377371b5a5dbe2d9
SHA512eaabfad92c84f422267615c55a863af12823c5e791bdcb30cabe17f72025e07df7383cf6cf0f08e28aa18a31c2aac5985cf5281a403e22fbcc1fb5e61c49fc3c
-
Filesize
152B
MD5b9569e123772ae290f9bac07e0d31748
SHA15806ed9b301d4178a959b26d7b7ccf2c0abc6741
SHA25620ab88e23fb88186b82047cd0d6dc3cfa23422e4fd2b8f3c8437546a2a842c2b
SHA512cfad8ce716ac815b37e8cc0e30141bfb3ca7f0d4ef101289bddcf6ed3c579bc34d369f2ec2f2dab98707843015633988eb97f1e911728031dd897750b8587795
-
Filesize
23KB
MD52f24e0f5d2c2997a89fb4a8d943c141f
SHA199515bde1a5bf72105116ac902ccf3db1dd3df29
SHA25660c9ecaf27ba56d7c35aa78c329aa7dfa586e6c71ed3cdd0019ba7e767b18aaf
SHA5120f4c5508dfdcf0ef63141df8d29c76e219d2ec433d59d37d7f17e110b455f24235fd0bc4f539ad5adc368285536d73f57dc4e21e3201dfd5753e76789208989d
-
Filesize
144B
MD5a70624fec86456e78befc6005726b7e4
SHA15b76c0ac7937391268c8ba8a893540827bc09afc
SHA256675fd1fec7ee820601be6fbefc330af7327915054c1dada19c56107b3c063433
SHA512893e90acf3d1393eaca9075da09ffde90443a24c6a90e2075876e47d5b2fa9998b487290855fb633d6e89486b18853d2c672cd2b2b5e81734113dee0fbeabf5c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD51f97a438c52525796e0791556862c8de
SHA1d62c1f2d7351ad1b795895a49e40d6818c7a5c51
SHA2569bc68340fa5a57527e170f57c7b5ecc53ba60a6ddae04a4ccc76d2118cebcf3b
SHA5122aeebfe981d518b7948e0d3c5919b63d03c1eeece86faf176d86082fdcb3b295443a998722ddae59991fb1355931866d5e60a13b6bf5c01a3663758807b74836
-
Filesize
1KB
MD520592ee460b0c653fac2fd21ac841292
SHA1282e28a31b55096a3a5ae36f6b064ad23f5d8b5b
SHA2562c319f87185b033e2a96c9f18acd3a703ffa349c5b09f15bc42cccb94678bcc7
SHA51296c2b912865862e0a942d6cd4ea7cd9987c9ffafa24afb036b84137ffc6bc11b55665e48d551fb3e1305cbfc2798605bb73c19c9549b9bde5bcb05c9c80839ae
-
Filesize
5KB
MD547a19f93befb84ee298771f1057d6da7
SHA1ec898cc23fc574d4b84776dba232cc2712354ef4
SHA256a7a655af52f797136f42c960af52755395b8858dd8cbf731e7e8c1993d78ce04
SHA512131a2f4d0cd4239f82ece02fa8320909f17488b2afc99992eb990a023095aa75ba69711131b09ee849c7d70a60e7d91e11d9c45f283efdde917cd711d7747e07
-
Filesize
7KB
MD53a920a04df97473ce9a73cd7c499168d
SHA1e73b2a86853ebd77704716966163904b1e9c9aef
SHA2568c789dd45df5666132a01621d19e861df6254390005acfc291fbbf3cf1f35450
SHA512d54f127640d696bf445d4c19372a8c7436854cb6256b3b01745269386649f28b05ae16b6ada7a0e6bd00cac5f524d4039f3eeb61cd603706c25ee1ff7bad240d
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD55f463ac39d102f9a9b3a848c1d71759e
SHA1dcf51adf775f0f56bca5327e17361ff782866a4f
SHA256a3fc28f85b413684cd36a4be526067d00399587f69e1c4f2ec66cdc3556c8a85
SHA51293caccd497e3ed59f0791bebba2f7dd9e369c5d1a5cd50cca84b18e6817519c3c0dd802c09a1c32e71314e87cda56f7896f46cdaa29f3b2632944c3ce95cb855