Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
01-10-2024 23:30
Static task
static1
Behavioral task
behavioral1
Sample
07dcf6533bd209b7b0815c16b9b25d8a_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
07dcf6533bd209b7b0815c16b9b25d8a_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
07dcf6533bd209b7b0815c16b9b25d8a_JaffaCakes118.html
-
Size
16KB
-
MD5
07dcf6533bd209b7b0815c16b9b25d8a
-
SHA1
24e67a7673f0cde120f85ba71406b563d3fcb1de
-
SHA256
719d8d269e67f4b54514c95959d37393ee0e3a73f135e67e28d8745275c05552
-
SHA512
2e96af884712a8f8321f119734a1481f5937d81abfdd0a7c5a8e0f2f92c0ab6e8b76a7ff8acc62aafc102ebef79ee3f8279493fc7aff377b14e04dbeac59b83c
-
SSDEEP
384:/+5JcaYs8/Un4iWZnAaU40mtTG3U78XD1BRaX3ccok2V:ocsNYAIdGkqD1B44
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3104 msedge.exe 3104 msedge.exe 4364 msedge.exe 4364 msedge.exe 544 identity_helper.exe 544 identity_helper.exe 2060 msedge.exe 2060 msedge.exe 2060 msedge.exe 2060 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4364 wrote to memory of 4444 4364 msedge.exe 82 PID 4364 wrote to memory of 4444 4364 msedge.exe 82 PID 4364 wrote to memory of 4484 4364 msedge.exe 83 PID 4364 wrote to memory of 4484 4364 msedge.exe 83 PID 4364 wrote to memory of 4484 4364 msedge.exe 83 PID 4364 wrote to memory of 4484 4364 msedge.exe 83 PID 4364 wrote to memory of 4484 4364 msedge.exe 83 PID 4364 wrote to memory of 4484 4364 msedge.exe 83 PID 4364 wrote to memory of 4484 4364 msedge.exe 83 PID 4364 wrote to memory of 4484 4364 msedge.exe 83 PID 4364 wrote to memory of 4484 4364 msedge.exe 83 PID 4364 wrote to memory of 4484 4364 msedge.exe 83 PID 4364 wrote to memory of 4484 4364 msedge.exe 83 PID 4364 wrote to memory of 4484 4364 msedge.exe 83 PID 4364 wrote to memory of 4484 4364 msedge.exe 83 PID 4364 wrote to memory of 4484 4364 msedge.exe 83 PID 4364 wrote to memory of 4484 4364 msedge.exe 83 PID 4364 wrote to memory of 4484 4364 msedge.exe 83 PID 4364 wrote to memory of 4484 4364 msedge.exe 83 PID 4364 wrote to memory of 4484 4364 msedge.exe 83 PID 4364 wrote to memory of 4484 4364 msedge.exe 83 PID 4364 wrote to memory of 4484 4364 msedge.exe 83 PID 4364 wrote to memory of 4484 4364 msedge.exe 83 PID 4364 wrote to memory of 4484 4364 msedge.exe 83 PID 4364 wrote to memory of 4484 4364 msedge.exe 83 PID 4364 wrote to memory of 4484 4364 msedge.exe 83 PID 4364 wrote to memory of 4484 4364 msedge.exe 83 PID 4364 wrote to memory of 4484 4364 msedge.exe 83 PID 4364 wrote to memory of 4484 4364 msedge.exe 83 PID 4364 wrote to memory of 4484 4364 msedge.exe 83 PID 4364 wrote to memory of 4484 4364 msedge.exe 83 PID 4364 wrote to memory of 4484 4364 msedge.exe 83 PID 4364 wrote to memory of 4484 4364 msedge.exe 83 PID 4364 wrote to memory of 4484 4364 msedge.exe 83 PID 4364 wrote to memory of 4484 4364 msedge.exe 83 PID 4364 wrote to memory of 4484 4364 msedge.exe 83 PID 4364 wrote to memory of 4484 4364 msedge.exe 83 PID 4364 wrote to memory of 4484 4364 msedge.exe 83 PID 4364 wrote to memory of 4484 4364 msedge.exe 83 PID 4364 wrote to memory of 4484 4364 msedge.exe 83 PID 4364 wrote to memory of 4484 4364 msedge.exe 83 PID 4364 wrote to memory of 4484 4364 msedge.exe 83 PID 4364 wrote to memory of 3104 4364 msedge.exe 84 PID 4364 wrote to memory of 3104 4364 msedge.exe 84 PID 4364 wrote to memory of 4796 4364 msedge.exe 85 PID 4364 wrote to memory of 4796 4364 msedge.exe 85 PID 4364 wrote to memory of 4796 4364 msedge.exe 85 PID 4364 wrote to memory of 4796 4364 msedge.exe 85 PID 4364 wrote to memory of 4796 4364 msedge.exe 85 PID 4364 wrote to memory of 4796 4364 msedge.exe 85 PID 4364 wrote to memory of 4796 4364 msedge.exe 85 PID 4364 wrote to memory of 4796 4364 msedge.exe 85 PID 4364 wrote to memory of 4796 4364 msedge.exe 85 PID 4364 wrote to memory of 4796 4364 msedge.exe 85 PID 4364 wrote to memory of 4796 4364 msedge.exe 85 PID 4364 wrote to memory of 4796 4364 msedge.exe 85 PID 4364 wrote to memory of 4796 4364 msedge.exe 85 PID 4364 wrote to memory of 4796 4364 msedge.exe 85 PID 4364 wrote to memory of 4796 4364 msedge.exe 85 PID 4364 wrote to memory of 4796 4364 msedge.exe 85 PID 4364 wrote to memory of 4796 4364 msedge.exe 85 PID 4364 wrote to memory of 4796 4364 msedge.exe 85 PID 4364 wrote to memory of 4796 4364 msedge.exe 85 PID 4364 wrote to memory of 4796 4364 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\07dcf6533bd209b7b0815c16b9b25d8a_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4364 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff88fe46f8,0x7fff88fe4708,0x7fff88fe47182⤵PID:4444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2036,10900533179076113517,12122988936086638222,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2052 /prefetch:22⤵PID:4484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2036,10900533179076113517,12122988936086638222,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2300 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2036,10900533179076113517,12122988936086638222,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2800 /prefetch:82⤵PID:4796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,10900533179076113517,12122988936086638222,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:2980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,10900533179076113517,12122988936086638222,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:3648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,10900533179076113517,12122988936086638222,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4184 /prefetch:12⤵PID:4964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,10900533179076113517,12122988936086638222,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4888 /prefetch:12⤵PID:4812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,10900533179076113517,12122988936086638222,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5292 /prefetch:12⤵PID:4452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,10900533179076113517,12122988936086638222,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5104 /prefetch:12⤵PID:112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2036,10900533179076113517,12122988936086638222,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5924 /prefetch:82⤵PID:2356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2036,10900533179076113517,12122988936086638222,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5924 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,10900533179076113517,12122988936086638222,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6028 /prefetch:12⤵PID:416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,10900533179076113517,12122988936086638222,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6044 /prefetch:12⤵PID:2200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,10900533179076113517,12122988936086638222,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4828 /prefetch:12⤵PID:2224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,10900533179076113517,12122988936086638222,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6248 /prefetch:12⤵PID:3892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2036,10900533179076113517,12122988936086638222,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1804 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2060
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:228
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2304
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59b008261dda31857d68792b46af6dd6d
SHA1e82dc88e2d1da2df7cb19d79a0346b9bb90d52b3
SHA2569ac598d4f8170f7e475d84103aead9e3c23d5f2d292741a7f56a17bde8b6f7da
SHA51278853091403a06beeec4998e2e3a4342111895ffd485f7f7cd367741a4883f7a25864cba00a6c86f27dc0c9ce9d04f08011ecc40c8ae9383d33274739ac39f10
-
Filesize
152B
MD50446fcdd21b016db1f468971fb82a488
SHA1726b91562bb75f80981f381e3c69d7d832c87c9d
SHA25662c5dc18b25e758f3508582a7c58bb46b734a774d97fc0e8a20614235caa8222
SHA5121df7c085042266959f1fe0aedc5f6d40ceba485b54159f51f0c38f17bb250b79ea941b735e1b6faf219f23fe8ab65ac4557f545519d52d5416b89ad0f9047a31
-
Filesize
213KB
MD5f942900ff0a10f251d338c612c456948
SHA14a283d3c8f3dc491e43c430d97c3489ee7a3d320
SHA25638b76a54655aff71271a9ad376ac17f20187abd581bf5aced69ccde0fe6e2fd6
SHA5129b393ce73598ed1997d28ceeddb23491a4d986c337984878ebb0ae06019e30ea77448d375d3d6563c774856d6bc98ee3ca0e0ba88ea5769a451a5e814f6ddb41
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize312B
MD59bfda4be3182f9337f9fa168407fb17a
SHA1c67a148a6900b8f23b3f5aef2478b9ccaa81ac9f
SHA256f356033ddb5596bc2a912bc654508b3595da59a561aa8cb4433ddcdad8f4304c
SHA51219320aedfcbbd840a29a73975fdd771aad717a3dc3d2ceaa5da9e25a85b946a731c29bd56df717626449416f3ceca73a577be025effd56bb9364efad2e4e3bef
-
Filesize
1KB
MD573d318133c86d76dbd61423d88a0214e
SHA127837e367ce7aecd46bdac3cb10bc802394cf0da
SHA25666f706121a0c3ce059b6f2db5545590d9c5eb7833751b74b446303ae0883e0bd
SHA5120f5ae2490cf0bd61b23970d3a2c5bd97cbc0c4a425b41d519c5d696959c1f7474f669e37cb59b73fdd3986a5e3d00a28ad38e1b00e358cf21bb5d16527ea6a9f
-
Filesize
5KB
MD52a863a56a0c14d4a60535be29987aff2
SHA16b61fae0bbeb8dc818335d973f3f20f58c7ecd12
SHA256ba9ac42e272b4f2ca0bd3d1abbb9da13e6aebbb6b85d8cbc8d0ba975055bae31
SHA512b7129fb5dc7b8809a3569db80e6a3041ccefda865387eb7a077e210a3e0d13fb24763bac3273475bbc980e770c43476c058fcbd01bf0ab69dac4ddc624864968
-
Filesize
6KB
MD5361db5a80e6fb4b6dc7f86ae482ce945
SHA14cd21a98a4f8659b466050d646ec33698ce8806a
SHA2566481a07fce7448e7fa05e7f4c72d097ac45640db7bf916704c4053a9b9b02d04
SHA5125db12b6ee5d82051f0963dea0792641c5fc6cff66190133d04b4c3a7824748660ababe06261b39e46de9a50cca18b4c7053e3b37e0b71b79f7a27c53ae371ae2
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5102f8463886ab93ced09c40355e8a0ea
SHA1eddda0c1eeba6fdd25af943c1788ff9bc6b8e435
SHA2569b98b197224df38a9a0caadc2f604c50d3e60b8b3c1c2aa2721aa4d35bfb90f3
SHA5120a27c739e78a31eb36f6da7da1e79711c3e2ad2c960eccbd6e1e4831193054968061c3c175e3c4648e7eba32c758acc69dd7e0e8244f19ab769d615e661e5407