Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
01/10/2024, 01:25
Static task
static1
Behavioral task
behavioral1
Sample
03e2792fc9c16c629bc8e57c716f4ffa_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
03e2792fc9c16c629bc8e57c716f4ffa_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
03e2792fc9c16c629bc8e57c716f4ffa_JaffaCakes118.html
-
Size
57KB
-
MD5
03e2792fc9c16c629bc8e57c716f4ffa
-
SHA1
9701b7359e228170961e6adaa65f5e73227f4695
-
SHA256
aa99fc5ced08a31d05b75cef1f858340d67552efc03d9a63492ffe90678c7ef4
-
SHA512
0c1f6abf17b3437b9b8e3e328f38435d8b0576f2db95c16ed91d25d4d111181f1d4b3c8151869c189680599f6fdb9e996336c595d51c0218528bf3ce1a0822e5
-
SSDEEP
1536:ijEQvK8OPHdyAio2vgyHJv0owbd6zKD6CDK2RVroxywpDK2RVy:ijnOPHdyY2vgyHJutDK2RVroxywpDK2m
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1840 msedge.exe 1840 msedge.exe 2780 msedge.exe 2780 msedge.exe 3804 identity_helper.exe 3804 identity_helper.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe 2780 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2780 wrote to memory of 2980 2780 msedge.exe 82 PID 2780 wrote to memory of 2980 2780 msedge.exe 82 PID 2780 wrote to memory of 5100 2780 msedge.exe 83 PID 2780 wrote to memory of 5100 2780 msedge.exe 83 PID 2780 wrote to memory of 5100 2780 msedge.exe 83 PID 2780 wrote to memory of 5100 2780 msedge.exe 83 PID 2780 wrote to memory of 5100 2780 msedge.exe 83 PID 2780 wrote to memory of 5100 2780 msedge.exe 83 PID 2780 wrote to memory of 5100 2780 msedge.exe 83 PID 2780 wrote to memory of 5100 2780 msedge.exe 83 PID 2780 wrote to memory of 5100 2780 msedge.exe 83 PID 2780 wrote to memory of 5100 2780 msedge.exe 83 PID 2780 wrote to memory of 5100 2780 msedge.exe 83 PID 2780 wrote to memory of 5100 2780 msedge.exe 83 PID 2780 wrote to memory of 5100 2780 msedge.exe 83 PID 2780 wrote to memory of 5100 2780 msedge.exe 83 PID 2780 wrote to memory of 5100 2780 msedge.exe 83 PID 2780 wrote to memory of 5100 2780 msedge.exe 83 PID 2780 wrote to memory of 5100 2780 msedge.exe 83 PID 2780 wrote to memory of 5100 2780 msedge.exe 83 PID 2780 wrote to memory of 5100 2780 msedge.exe 83 PID 2780 wrote to memory of 5100 2780 msedge.exe 83 PID 2780 wrote to memory of 5100 2780 msedge.exe 83 PID 2780 wrote to memory of 5100 2780 msedge.exe 83 PID 2780 wrote to memory of 5100 2780 msedge.exe 83 PID 2780 wrote to memory of 5100 2780 msedge.exe 83 PID 2780 wrote to memory of 5100 2780 msedge.exe 83 PID 2780 wrote to memory of 5100 2780 msedge.exe 83 PID 2780 wrote to memory of 5100 2780 msedge.exe 83 PID 2780 wrote to memory of 5100 2780 msedge.exe 83 PID 2780 wrote to memory of 5100 2780 msedge.exe 83 PID 2780 wrote to memory of 5100 2780 msedge.exe 83 PID 2780 wrote to memory of 5100 2780 msedge.exe 83 PID 2780 wrote to memory of 5100 2780 msedge.exe 83 PID 2780 wrote to memory of 5100 2780 msedge.exe 83 PID 2780 wrote to memory of 5100 2780 msedge.exe 83 PID 2780 wrote to memory of 5100 2780 msedge.exe 83 PID 2780 wrote to memory of 5100 2780 msedge.exe 83 PID 2780 wrote to memory of 5100 2780 msedge.exe 83 PID 2780 wrote to memory of 5100 2780 msedge.exe 83 PID 2780 wrote to memory of 5100 2780 msedge.exe 83 PID 2780 wrote to memory of 5100 2780 msedge.exe 83 PID 2780 wrote to memory of 1840 2780 msedge.exe 84 PID 2780 wrote to memory of 1840 2780 msedge.exe 84 PID 2780 wrote to memory of 1448 2780 msedge.exe 85 PID 2780 wrote to memory of 1448 2780 msedge.exe 85 PID 2780 wrote to memory of 1448 2780 msedge.exe 85 PID 2780 wrote to memory of 1448 2780 msedge.exe 85 PID 2780 wrote to memory of 1448 2780 msedge.exe 85 PID 2780 wrote to memory of 1448 2780 msedge.exe 85 PID 2780 wrote to memory of 1448 2780 msedge.exe 85 PID 2780 wrote to memory of 1448 2780 msedge.exe 85 PID 2780 wrote to memory of 1448 2780 msedge.exe 85 PID 2780 wrote to memory of 1448 2780 msedge.exe 85 PID 2780 wrote to memory of 1448 2780 msedge.exe 85 PID 2780 wrote to memory of 1448 2780 msedge.exe 85 PID 2780 wrote to memory of 1448 2780 msedge.exe 85 PID 2780 wrote to memory of 1448 2780 msedge.exe 85 PID 2780 wrote to memory of 1448 2780 msedge.exe 85 PID 2780 wrote to memory of 1448 2780 msedge.exe 85 PID 2780 wrote to memory of 1448 2780 msedge.exe 85 PID 2780 wrote to memory of 1448 2780 msedge.exe 85 PID 2780 wrote to memory of 1448 2780 msedge.exe 85 PID 2780 wrote to memory of 1448 2780 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\03e2792fc9c16c629bc8e57c716f4ffa_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffaba0546f8,0x7ffaba054708,0x7ffaba0547182⤵PID:2980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2040,13599607608144332440,9757533862516544737,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵PID:5100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2040,13599607608144332440,9757533862516544737,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2268 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2040,13599607608144332440,9757533862516544737,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2772 /prefetch:82⤵PID:1448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,13599607608144332440,9757533862516544737,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:1716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,13599607608144332440,9757533862516544737,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:4992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,13599607608144332440,9757533862516544737,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4672 /prefetch:12⤵PID:5072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,13599607608144332440,9757533862516544737,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5384 /prefetch:12⤵PID:2844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,13599607608144332440,9757533862516544737,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5316 /prefetch:12⤵PID:4552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,13599607608144332440,9757533862516544737,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3412 /prefetch:12⤵PID:4708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2040,13599607608144332440,9757533862516544737,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6012 /prefetch:82⤵PID:3160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2040,13599607608144332440,9757533862516544737,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6012 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,13599607608144332440,9757533862516544737,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6440 /prefetch:12⤵PID:1980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,13599607608144332440,9757533862516544737,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6300 /prefetch:12⤵PID:1216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,13599607608144332440,9757533862516544737,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6588 /prefetch:12⤵PID:4972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,13599607608144332440,9757533862516544737,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6084 /prefetch:12⤵PID:996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2040,13599607608144332440,9757533862516544737,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3060 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4432
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3472
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:944
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ecf7ca53c80b5245e35839009d12f866
SHA1a7af77cf31d410708ebd35a232a80bddfb0615bb
SHA256882a513b71b26210ff251769b82b2c5d59a932f96d9ce606ca2fab6530a13687
SHA512706722bd22ce27d854036b1b16e6a3cdb36284b66edc76238a79c2e11cee7d1307b121c898ad832eb1af73e4f08d991d64dc0bff529896ffb4ebe9b3dc381696
-
Filesize
152B
MD54dd2754d1bea40445984d65abee82b21
SHA14b6a5658bae9a784a370a115fbb4a12e92bd3390
SHA256183b8e82a0deaa83d04736553671cedb738adc909f483b3c5f822a0e6be7477d
SHA51292d44ee372ad33f892b921efa6cabc78e91025e89f05a22830763217826fa98d51d55711f85c8970ac58abf9adc6c85cc40878032cd6d2589ab226cd099f99e1
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize816B
MD53d72a58a0ad796142d71e0439cc341f4
SHA1b31ea7da7f2d7f2533caf99391b7cc88a4140909
SHA2569372bea668d5b77bea9b84cb3cbf9a29a7c280f9924f7353f06f2acde17fe6f0
SHA5125d6c6a3e75ef06579940bf0e9ad7c60da19be2b703bf6db4b84dd42920644bd52f93032e5ca550384ba11c66e1b4643148b9c0c28c39672e57ee5b6f6eff6ecc
-
Filesize
1KB
MD5f4402a02add619de92950ec8cec29e65
SHA17f63b5244e274ee4025d3151c9afc4256fb6eba5
SHA256f553bf44ac5634e4c98cbf3d186c0a2333ad068dc3677f91515c94dc85e1a506
SHA5124ba9b2caacc7f9e56f84afd86fd489406c401f1f9bde8e5f0831858d9d8d162326d0219361504683817e38b47356fc8e172e1634f9d7274fe514d8ae4654e83c
-
Filesize
5KB
MD544cb48c3336817ee76231672aa915ee1
SHA102058c41a6cda5dc0a77b6903c2fd24850a98298
SHA256169618a7030684545659c17431c9248b3499e80df39468e1380ce928f9d7d4a1
SHA5124c10e8e6dc9f606879042bed908bf56c9bf01a167611fbe9ca2647d81e42a4ddcf81b0fcb4fbc5689ab57f872725e27f759d1a67405f4ade27f75f89039cf1a0
-
Filesize
6KB
MD582c163071fcafe1dad90de75629a2b08
SHA141aa8e364953aa0843e56f05b17f38b66bf20aed
SHA2565faa747edbb44eaf57b6a1471e150ce00ed7c9c9774a8b023d0c7d1101172243
SHA51203fa7424e154ce59a6c2a90dd36d18a09d3c525dab646fb6c0c1b9f26956a6509211f6930bd980b68411c6bf49281d2210df963e977cae95d2d1bc76b916c909
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5388670d7f50916f4b6445221eefd9436
SHA1be8776734017baf79da2773c85dde508b63e8d2d
SHA25653d034c67aaa625a4371b4b66134d01e00112754522c67a5e2e666e8f6e971c1
SHA51269fbe5bb16aa03b3a0340104ae54391428c21b17e50b339860a44adf3e6f856740dcd233c372c3f4a4ea77423379199344a776c173f0394b48cd851c301e252e