Analysis
-
max time kernel
145s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
01-10-2024 06:11
Static task
static1
Behavioral task
behavioral1
Sample
04a52c7d65dd03b7b1c913311cffa893_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
04a52c7d65dd03b7b1c913311cffa893_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
04a52c7d65dd03b7b1c913311cffa893_JaffaCakes118.html
-
Size
46KB
-
MD5
04a52c7d65dd03b7b1c913311cffa893
-
SHA1
f70eefc451979d6ef4b1ce6c545966b59a702c9e
-
SHA256
3a47aaa97d74c2a06369d80948a29313f79c420f2e1d5cd9b580ec293dd7ed3c
-
SHA512
4a9180c527b3ba462796dff156125b8ff6512edce9a6faafbd98bcb6eb8be58770d85b06b235226a70de9c36d23f974beacbfd88df954aab959e9eaea7c952aa
-
SSDEEP
768:GZCxA6zB/lopRnTuoAKCc4lRYjKyqKjIBpfFbEv2Dzw92bjUuMuF/ToKB/i43TJ0:GSVzB/lopRnTuoAKCc4lRYj+KjIBpfFe
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4360 msedge.exe 4360 msedge.exe 2156 msedge.exe 2156 msedge.exe 4884 identity_helper.exe 4884 identity_helper.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe 2156 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2156 wrote to memory of 3396 2156 msedge.exe 82 PID 2156 wrote to memory of 3396 2156 msedge.exe 82 PID 2156 wrote to memory of 2952 2156 msedge.exe 83 PID 2156 wrote to memory of 2952 2156 msedge.exe 83 PID 2156 wrote to memory of 2952 2156 msedge.exe 83 PID 2156 wrote to memory of 2952 2156 msedge.exe 83 PID 2156 wrote to memory of 2952 2156 msedge.exe 83 PID 2156 wrote to memory of 2952 2156 msedge.exe 83 PID 2156 wrote to memory of 2952 2156 msedge.exe 83 PID 2156 wrote to memory of 2952 2156 msedge.exe 83 PID 2156 wrote to memory of 2952 2156 msedge.exe 83 PID 2156 wrote to memory of 2952 2156 msedge.exe 83 PID 2156 wrote to memory of 2952 2156 msedge.exe 83 PID 2156 wrote to memory of 2952 2156 msedge.exe 83 PID 2156 wrote to memory of 2952 2156 msedge.exe 83 PID 2156 wrote to memory of 2952 2156 msedge.exe 83 PID 2156 wrote to memory of 2952 2156 msedge.exe 83 PID 2156 wrote to memory of 2952 2156 msedge.exe 83 PID 2156 wrote to memory of 2952 2156 msedge.exe 83 PID 2156 wrote to memory of 2952 2156 msedge.exe 83 PID 2156 wrote to memory of 2952 2156 msedge.exe 83 PID 2156 wrote to memory of 2952 2156 msedge.exe 83 PID 2156 wrote to memory of 2952 2156 msedge.exe 83 PID 2156 wrote to memory of 2952 2156 msedge.exe 83 PID 2156 wrote to memory of 2952 2156 msedge.exe 83 PID 2156 wrote to memory of 2952 2156 msedge.exe 83 PID 2156 wrote to memory of 2952 2156 msedge.exe 83 PID 2156 wrote to memory of 2952 2156 msedge.exe 83 PID 2156 wrote to memory of 2952 2156 msedge.exe 83 PID 2156 wrote to memory of 2952 2156 msedge.exe 83 PID 2156 wrote to memory of 2952 2156 msedge.exe 83 PID 2156 wrote to memory of 2952 2156 msedge.exe 83 PID 2156 wrote to memory of 2952 2156 msedge.exe 83 PID 2156 wrote to memory of 2952 2156 msedge.exe 83 PID 2156 wrote to memory of 2952 2156 msedge.exe 83 PID 2156 wrote to memory of 2952 2156 msedge.exe 83 PID 2156 wrote to memory of 2952 2156 msedge.exe 83 PID 2156 wrote to memory of 2952 2156 msedge.exe 83 PID 2156 wrote to memory of 2952 2156 msedge.exe 83 PID 2156 wrote to memory of 2952 2156 msedge.exe 83 PID 2156 wrote to memory of 2952 2156 msedge.exe 83 PID 2156 wrote to memory of 2952 2156 msedge.exe 83 PID 2156 wrote to memory of 4360 2156 msedge.exe 84 PID 2156 wrote to memory of 4360 2156 msedge.exe 84 PID 2156 wrote to memory of 3016 2156 msedge.exe 85 PID 2156 wrote to memory of 3016 2156 msedge.exe 85 PID 2156 wrote to memory of 3016 2156 msedge.exe 85 PID 2156 wrote to memory of 3016 2156 msedge.exe 85 PID 2156 wrote to memory of 3016 2156 msedge.exe 85 PID 2156 wrote to memory of 3016 2156 msedge.exe 85 PID 2156 wrote to memory of 3016 2156 msedge.exe 85 PID 2156 wrote to memory of 3016 2156 msedge.exe 85 PID 2156 wrote to memory of 3016 2156 msedge.exe 85 PID 2156 wrote to memory of 3016 2156 msedge.exe 85 PID 2156 wrote to memory of 3016 2156 msedge.exe 85 PID 2156 wrote to memory of 3016 2156 msedge.exe 85 PID 2156 wrote to memory of 3016 2156 msedge.exe 85 PID 2156 wrote to memory of 3016 2156 msedge.exe 85 PID 2156 wrote to memory of 3016 2156 msedge.exe 85 PID 2156 wrote to memory of 3016 2156 msedge.exe 85 PID 2156 wrote to memory of 3016 2156 msedge.exe 85 PID 2156 wrote to memory of 3016 2156 msedge.exe 85 PID 2156 wrote to memory of 3016 2156 msedge.exe 85 PID 2156 wrote to memory of 3016 2156 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\04a52c7d65dd03b7b1c913311cffa893_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe72da46f8,0x7ffe72da4708,0x7ffe72da47182⤵PID:3396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,14497916184866947552,4874973600451578633,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2152 /prefetch:22⤵PID:2952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,14497916184866947552,4874973600451578633,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2304 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,14497916184866947552,4874973600451578633,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2952 /prefetch:82⤵PID:3016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,14497916184866947552,4874973600451578633,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:1844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,14497916184866947552,4874973600451578633,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:1680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,14497916184866947552,4874973600451578633,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4912 /prefetch:12⤵PID:3124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,14497916184866947552,4874973600451578633,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4252 /prefetch:12⤵PID:3628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,14497916184866947552,4874973600451578633,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5764 /prefetch:82⤵PID:3472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,14497916184866947552,4874973600451578633,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5764 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,14497916184866947552,4874973600451578633,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5684 /prefetch:12⤵PID:1940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,14497916184866947552,4874973600451578633,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5688 /prefetch:12⤵PID:2296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,14497916184866947552,4874973600451578633,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5128 /prefetch:12⤵PID:2616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,14497916184866947552,4874973600451578633,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5132 /prefetch:12⤵PID:4540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,14497916184866947552,4874973600451578633,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1888 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4864
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4972
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3608
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4680
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e4f80e7950cbd3bb11257d2000cb885e
SHA110ac643904d539042d8f7aa4a312b13ec2106035
SHA2561184ee8d32d0edecddd93403fb888fad6b3e2a710d37335c3989cc529bc08124
SHA5122b92c9807fdcd937e514d4e7e1cc7c2d3e3aa162099b7289ceac2feea72d1a4afbadf1c09b3075d470efadf9a9edd63e07ea7e7a98d22243e45b3d53473fa4f0
-
Filesize
152B
MD52dc1a9f2f3f8c3cfe51bb29b078166c5
SHA1eaf3c3dad3c8dc6f18dc3e055b415da78b704402
SHA256dcb76fa365c2d9ee213b224a91cdd806d30b1e8652d72a22f2371124fa4479fa
SHA512682061d9cc86a6e5d99d022da776fb554350fc95efbf29cd84c1db4e2b7161b76cd1de48335bcc3a25633079fb0bd412e4f4795ed6291c65e9bc28d95330bb25
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize216B
MD5a431dd030ca0ea254027c67a6039f4f2
SHA1ca8c306d155a9770c9c4a51248fce3ca75f7ad43
SHA25611f74d18c2bbd207e247a6c7d8a2989840f47811842d6aa36a2b2a162f119f47
SHA512b7665584ce35b0a87d39812a304d7844294fb33cb36a4559f75da09782359b71de44df0ca992d9c57fa6bcb51737c8599ccfff517fb13013d06f18d4b118ad5d
-
Filesize
2KB
MD58471cf40639f50c45920e44e5614f98b
SHA1731fd0dc30f4b0062b519b84cb936f1729bbd428
SHA256cc0e15494198f0664408e2b05e2124d20f0cbe23515de90ce4e7151b4e362ad7
SHA51208c750468808a54739275ca88f6fd07f22be595769580057d675cbdcb0531fc1f1ed25c9dd9799ebed5609e8857ef6040d9e4b1ad0bf6d74987ba9d3fe312e2a
-
Filesize
5KB
MD5bdef07a9fe31a4c7c075c74c16db290d
SHA11d7d1111c933a141c4a0c06b61360c3ff84a977b
SHA256965d14dcd7a3282817d345eaef411b3e0805b5654107b323212ce6e66e914afa
SHA51229fa1c81dc7ef732c3608d69c7ae550ebf86f66dbfb560bd35db36940127ce185589973a11702b26bddafa4d3304a7e03956a74bb0f7e380b8c7f5ddf9358f86
-
Filesize
6KB
MD56e42347e49192a0468a1695a8b011d30
SHA184bec294d516d689e75a235f76b32ef989e10684
SHA2565f9733cbe11664506fdacaa36afc68df4e175dbc66437057abe2c4b1fa323a99
SHA512421a4128489cfb9a1685586e8e80c688c04bfc07f8e2dbc113d8d3086869102badcf1757f15f87dbff0d1b736fc08b8f9e08994e0ca2482e686b99a9992c7bdb
-
Filesize
6KB
MD5590e6b2f032dbefea7399a73911be49b
SHA180bc9e57344cb860fef9bbae0fe8b1f41ff7a9ef
SHA2560317f72505cdf7b353eed622b4d66800a3d10d812450a3dc910a7ee69318c42f
SHA512b4f3a35f1df22e98abd5ca29295c9f545136793a8639ad77e836409eb2ffc81b75623614a778a8e09883919e89cc9a7eec449a70f6bf7b271596c50bd13bd5c0
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD562ca2f73bdea8caa7a3caa9b807ebd77
SHA1e1c862625273382a3da1170029c1f1db01611365
SHA256a825a90cdedecbb11802ed98d4f4d97befb615dfc25c25ab24ff06f04c4dd92c
SHA512062f4bb00774bf770be5471ad111ec3f0f2e96f0ff16158e0330fa766041aa6b2d1e217d2d0debc7da507d984dcb6db1ffa3825b52b14c648ed5b4ba6ca92235