Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
30/09/2024, 18:01
Static task
static1
Behavioral task
behavioral1
Sample
029ce08a94f8e797f04d7c96b9a8cc7e_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
029ce08a94f8e797f04d7c96b9a8cc7e_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
029ce08a94f8e797f04d7c96b9a8cc7e_JaffaCakes118.html
-
Size
101KB
-
MD5
029ce08a94f8e797f04d7c96b9a8cc7e
-
SHA1
ab00c764445267b4b933d2c53c35e04343e59de6
-
SHA256
b4f50d840431b095f41a087aeb0518770896c5b6a66a28c1ac7104543943c8e6
-
SHA512
a947fd15f2efd7e9ea6d6929d3a97b8dc8af102ef7c96818a3410bdd1fc5b422c49c5a79de2e91dc34adf4062580047f076f6f2d7c1f3526f6bba9cf6cc1d3b9
-
SSDEEP
1536:+l/NII2aUCqBVbm5pq6awMIjDJp1ntZcC7ip:+FNn2asCq1x0/dD/k
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 852 msedge.exe 852 msedge.exe 220 msedge.exe 220 msedge.exe 1944 identity_helper.exe 1944 identity_helper.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 220 wrote to memory of 3724 220 msedge.exe 82 PID 220 wrote to memory of 3724 220 msedge.exe 82 PID 220 wrote to memory of 3260 220 msedge.exe 83 PID 220 wrote to memory of 3260 220 msedge.exe 83 PID 220 wrote to memory of 3260 220 msedge.exe 83 PID 220 wrote to memory of 3260 220 msedge.exe 83 PID 220 wrote to memory of 3260 220 msedge.exe 83 PID 220 wrote to memory of 3260 220 msedge.exe 83 PID 220 wrote to memory of 3260 220 msedge.exe 83 PID 220 wrote to memory of 3260 220 msedge.exe 83 PID 220 wrote to memory of 3260 220 msedge.exe 83 PID 220 wrote to memory of 3260 220 msedge.exe 83 PID 220 wrote to memory of 3260 220 msedge.exe 83 PID 220 wrote to memory of 3260 220 msedge.exe 83 PID 220 wrote to memory of 3260 220 msedge.exe 83 PID 220 wrote to memory of 3260 220 msedge.exe 83 PID 220 wrote to memory of 3260 220 msedge.exe 83 PID 220 wrote to memory of 3260 220 msedge.exe 83 PID 220 wrote to memory of 3260 220 msedge.exe 83 PID 220 wrote to memory of 3260 220 msedge.exe 83 PID 220 wrote to memory of 3260 220 msedge.exe 83 PID 220 wrote to memory of 3260 220 msedge.exe 83 PID 220 wrote to memory of 3260 220 msedge.exe 83 PID 220 wrote to memory of 3260 220 msedge.exe 83 PID 220 wrote to memory of 3260 220 msedge.exe 83 PID 220 wrote to memory of 3260 220 msedge.exe 83 PID 220 wrote to memory of 3260 220 msedge.exe 83 PID 220 wrote to memory of 3260 220 msedge.exe 83 PID 220 wrote to memory of 3260 220 msedge.exe 83 PID 220 wrote to memory of 3260 220 msedge.exe 83 PID 220 wrote to memory of 3260 220 msedge.exe 83 PID 220 wrote to memory of 3260 220 msedge.exe 83 PID 220 wrote to memory of 3260 220 msedge.exe 83 PID 220 wrote to memory of 3260 220 msedge.exe 83 PID 220 wrote to memory of 3260 220 msedge.exe 83 PID 220 wrote to memory of 3260 220 msedge.exe 83 PID 220 wrote to memory of 3260 220 msedge.exe 83 PID 220 wrote to memory of 3260 220 msedge.exe 83 PID 220 wrote to memory of 3260 220 msedge.exe 83 PID 220 wrote to memory of 3260 220 msedge.exe 83 PID 220 wrote to memory of 3260 220 msedge.exe 83 PID 220 wrote to memory of 3260 220 msedge.exe 83 PID 220 wrote to memory of 852 220 msedge.exe 84 PID 220 wrote to memory of 852 220 msedge.exe 84 PID 220 wrote to memory of 3276 220 msedge.exe 85 PID 220 wrote to memory of 3276 220 msedge.exe 85 PID 220 wrote to memory of 3276 220 msedge.exe 85 PID 220 wrote to memory of 3276 220 msedge.exe 85 PID 220 wrote to memory of 3276 220 msedge.exe 85 PID 220 wrote to memory of 3276 220 msedge.exe 85 PID 220 wrote to memory of 3276 220 msedge.exe 85 PID 220 wrote to memory of 3276 220 msedge.exe 85 PID 220 wrote to memory of 3276 220 msedge.exe 85 PID 220 wrote to memory of 3276 220 msedge.exe 85 PID 220 wrote to memory of 3276 220 msedge.exe 85 PID 220 wrote to memory of 3276 220 msedge.exe 85 PID 220 wrote to memory of 3276 220 msedge.exe 85 PID 220 wrote to memory of 3276 220 msedge.exe 85 PID 220 wrote to memory of 3276 220 msedge.exe 85 PID 220 wrote to memory of 3276 220 msedge.exe 85 PID 220 wrote to memory of 3276 220 msedge.exe 85 PID 220 wrote to memory of 3276 220 msedge.exe 85 PID 220 wrote to memory of 3276 220 msedge.exe 85 PID 220 wrote to memory of 3276 220 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\029ce08a94f8e797f04d7c96b9a8cc7e_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:220 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff969e246f8,0x7ff969e24708,0x7ff969e247182⤵PID:3724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2176,3496844038883790412,18270222693634572411,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2188 /prefetch:22⤵PID:3260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2176,3496844038883790412,18270222693634572411,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2256 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2176,3496844038883790412,18270222693634572411,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2904 /prefetch:82⤵PID:3276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,3496844038883790412,18270222693634572411,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:4004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,3496844038883790412,18270222693634572411,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:4848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,3496844038883790412,18270222693634572411,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4208 /prefetch:12⤵PID:1232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,3496844038883790412,18270222693634572411,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4864 /prefetch:12⤵PID:3608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2176,3496844038883790412,18270222693634572411,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6156 /prefetch:82⤵PID:1580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2176,3496844038883790412,18270222693634572411,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6156 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,3496844038883790412,18270222693634572411,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6000 /prefetch:12⤵PID:4728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,3496844038883790412,18270222693634572411,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5952 /prefetch:12⤵PID:640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,3496844038883790412,18270222693634572411,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4092 /prefetch:12⤵PID:3728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,3496844038883790412,18270222693634572411,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5808 /prefetch:12⤵PID:2532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2176,3496844038883790412,18270222693634572411,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2008 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1236
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1416
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4720
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ab8ce148cb7d44f709fb1c460d03e1b0
SHA144d15744015155f3e74580c93317e12d2cc0f859
SHA256014006a90e43ea9a1903b08b843a5aab8ad3823d22e26e5b113fad5f9fa620ff
SHA512f685423b1eaee18a2a06030b4b2977335f62499c0041c142a92f6e6f846c2b9ce54324b6ae94efbbb303282dcda70e2b1597c748fddc251c0b3122a412c2d7c4
-
Filesize
152B
MD538f59a47b777f2fc52088e96ffb2baaf
SHA1267224482588b41a96d813f6d9e9d924867062db
SHA25613569c5681c71dc42ab57d34879f5a567d7b94afe0e8f6d7c6f6c1314fb0087b
SHA5124657d13e1bb7cdd7e83f5f2562f5598cca12edf839626ae96da43e943b5550fab46a14b9018f1bec90de88cc714f637605531ccda99deb9e537908ddb826113b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize192B
MD5a119e14c2fa3941244a7b7dc2f561b50
SHA1e68d71c23155012ec6547ba0246027927be022f2
SHA25672c442433bb6c4e8147633e76177008982ae77695c7ede4b607d50a8af800e05
SHA512c50041109048dc943817988a1963e59aa2a4b553b59cf92c055cd302da4e37bf8ce353d1d23e1f11e2277fdff4db97827cbaa966b523bedbbb2e00baea6fc75a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize168B
MD59023e8d1a4e5d5a8db0cfc14bee5d77d
SHA150e61b88bac2e13c1e8f4181fb1705ecefdcafd1
SHA2560ab3c61e373e50def606983823cb94aa28b48fb0097aa36df14c2611d12e08f9
SHA512407fc7bf58c8f279bf60f00ef05683b4f09538ff83ceefd170e6e020a3c93c7a703aecb395807bf0ffb992bb5621281ee610fc10f0944aea7e3d1565449bbe20
-
Filesize
643B
MD5b8ea2bc088d6423f351f5fd292fb0836
SHA17ee752100a9b2c372dca292ca962f96c39709c9c
SHA256355113a44b61c0084bf4981595e3ab0760b1103a6c62d5e9693b8c0c5245a379
SHA512f465de69a33e87f7ec50e551fe2c62d066fd4b31be2c26a2dcc8a55aaa04c378793d1675cb688de53e6ed561341f1dcfd23b158b8170688bb7be2d4b61072797
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
612B
MD5396260aa2789970b7fd5a2dd2dfb22d8
SHA156b38ba9b5c40deafb58e2b36130c1a3f46fed9a
SHA25608921823e19bd7f0b7bfb7130c93c3ae55014659ce6db81afccb761ef6f877ae
SHA512445929a743dc6783c36d270ae0f177b3d38d4ff5ac76bb0896c1a0804f6025f7bba106227c35d1ed0ebd57bea481764b5976387c43375242d39f798ce87bcaae
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
5KB
MD595a3cd3e3e3859c55556f13c05a5e7c3
SHA182d1cdb0fd5a7e5cc14647aa2294634e4bad1d06
SHA2560c2d0cc49eda7eff85e35fb27065507eaf328538b1f1e428e42acd0035fb81c1
SHA5128b446dc7106891717104c0688e66aeb208cb38b357e28fd5ca147ab18774ffa05d83bcae8fd5522a42c373b58b9f6d428662f1dfa5a484645ebbc3bfc4d90345
-
Filesize
6KB
MD58af6dea487aeaab32234690fff14698d
SHA1357c50cdcf27962c487666e5b31a6e3fd2ab92c9
SHA25621175eb93ad5e19d6ad97b57ecc2fe5541657b0926c2aa1ebe24edbdf9290428
SHA5123e1ff4c664b981b11df698332a5173936eca87e68b71ffb2de985912210b19bfe62a3ebe2ce9e06b039949e64c17b5270627525ce2cbb769fda7c6479b78eb61
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5a093b87115a1dbc54a751e1e2026a38f
SHA1a15d895ab65f73937099f31bd5ffc7da5badee6b
SHA2569c75a131c2f67ba079c1f1ac80fc6f02997c3fbb3002bb8a07c792a94cd683c9
SHA51226dc128ec8556c8e7d1875dc7740914882bad03946f55fad00c130136d4d1c0118d8e6d82ad1368f091ddc5de23c501ed8f78ca170bfd05d55a3f48cea430af3