Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
01-10-2024 07:40
Static task
static1
Behavioral task
behavioral1
Sample
04e4f040629e0c48340751575448ddfb_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
04e4f040629e0c48340751575448ddfb_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
04e4f040629e0c48340751575448ddfb_JaffaCakes118.html
-
Size
23KB
-
MD5
04e4f040629e0c48340751575448ddfb
-
SHA1
f9d0e9e3d33ebfb1ccc1b24e98862a2a147ce1a9
-
SHA256
55c21080cd384e5080182cddc137712e8817bd61068e545b6988c85013e1e444
-
SHA512
1c4192864e9d79a4c853343a127ea9a2b2b2f3bd264e0c91cf32d9c1c286d7aae7b9ca983e8e436443dd211fd2420a2d572635909cc7dd2017d5493cfe639ea5
-
SSDEEP
384:XQfuxj7RoX6TOICM7M1w7oWP3XRnYeITvVLpKZYeAF9aMY17RoX6TiE:gfEqqTO+x7vvfqqT7
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3256 msedge.exe 3256 msedge.exe 3988 msedge.exe 3988 msedge.exe 4684 identity_helper.exe 4684 identity_helper.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe 3988 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3988 wrote to memory of 3364 3988 msedge.exe 85 PID 3988 wrote to memory of 3364 3988 msedge.exe 85 PID 3988 wrote to memory of 688 3988 msedge.exe 86 PID 3988 wrote to memory of 688 3988 msedge.exe 86 PID 3988 wrote to memory of 688 3988 msedge.exe 86 PID 3988 wrote to memory of 688 3988 msedge.exe 86 PID 3988 wrote to memory of 688 3988 msedge.exe 86 PID 3988 wrote to memory of 688 3988 msedge.exe 86 PID 3988 wrote to memory of 688 3988 msedge.exe 86 PID 3988 wrote to memory of 688 3988 msedge.exe 86 PID 3988 wrote to memory of 688 3988 msedge.exe 86 PID 3988 wrote to memory of 688 3988 msedge.exe 86 PID 3988 wrote to memory of 688 3988 msedge.exe 86 PID 3988 wrote to memory of 688 3988 msedge.exe 86 PID 3988 wrote to memory of 688 3988 msedge.exe 86 PID 3988 wrote to memory of 688 3988 msedge.exe 86 PID 3988 wrote to memory of 688 3988 msedge.exe 86 PID 3988 wrote to memory of 688 3988 msedge.exe 86 PID 3988 wrote to memory of 688 3988 msedge.exe 86 PID 3988 wrote to memory of 688 3988 msedge.exe 86 PID 3988 wrote to memory of 688 3988 msedge.exe 86 PID 3988 wrote to memory of 688 3988 msedge.exe 86 PID 3988 wrote to memory of 688 3988 msedge.exe 86 PID 3988 wrote to memory of 688 3988 msedge.exe 86 PID 3988 wrote to memory of 688 3988 msedge.exe 86 PID 3988 wrote to memory of 688 3988 msedge.exe 86 PID 3988 wrote to memory of 688 3988 msedge.exe 86 PID 3988 wrote to memory of 688 3988 msedge.exe 86 PID 3988 wrote to memory of 688 3988 msedge.exe 86 PID 3988 wrote to memory of 688 3988 msedge.exe 86 PID 3988 wrote to memory of 688 3988 msedge.exe 86 PID 3988 wrote to memory of 688 3988 msedge.exe 86 PID 3988 wrote to memory of 688 3988 msedge.exe 86 PID 3988 wrote to memory of 688 3988 msedge.exe 86 PID 3988 wrote to memory of 688 3988 msedge.exe 86 PID 3988 wrote to memory of 688 3988 msedge.exe 86 PID 3988 wrote to memory of 688 3988 msedge.exe 86 PID 3988 wrote to memory of 688 3988 msedge.exe 86 PID 3988 wrote to memory of 688 3988 msedge.exe 86 PID 3988 wrote to memory of 688 3988 msedge.exe 86 PID 3988 wrote to memory of 688 3988 msedge.exe 86 PID 3988 wrote to memory of 688 3988 msedge.exe 86 PID 3988 wrote to memory of 3256 3988 msedge.exe 87 PID 3988 wrote to memory of 3256 3988 msedge.exe 87 PID 3988 wrote to memory of 388 3988 msedge.exe 88 PID 3988 wrote to memory of 388 3988 msedge.exe 88 PID 3988 wrote to memory of 388 3988 msedge.exe 88 PID 3988 wrote to memory of 388 3988 msedge.exe 88 PID 3988 wrote to memory of 388 3988 msedge.exe 88 PID 3988 wrote to memory of 388 3988 msedge.exe 88 PID 3988 wrote to memory of 388 3988 msedge.exe 88 PID 3988 wrote to memory of 388 3988 msedge.exe 88 PID 3988 wrote to memory of 388 3988 msedge.exe 88 PID 3988 wrote to memory of 388 3988 msedge.exe 88 PID 3988 wrote to memory of 388 3988 msedge.exe 88 PID 3988 wrote to memory of 388 3988 msedge.exe 88 PID 3988 wrote to memory of 388 3988 msedge.exe 88 PID 3988 wrote to memory of 388 3988 msedge.exe 88 PID 3988 wrote to memory of 388 3988 msedge.exe 88 PID 3988 wrote to memory of 388 3988 msedge.exe 88 PID 3988 wrote to memory of 388 3988 msedge.exe 88 PID 3988 wrote to memory of 388 3988 msedge.exe 88 PID 3988 wrote to memory of 388 3988 msedge.exe 88 PID 3988 wrote to memory of 388 3988 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\04e4f040629e0c48340751575448ddfb_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3988 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc538f46f8,0x7ffc538f4708,0x7ffc538f47182⤵PID:3364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2020,9550253653782835338,1803813814767360065,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵PID:688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2020,9550253653782835338,1803813814767360065,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2020,9550253653782835338,1803813814767360065,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2904 /prefetch:82⤵PID:388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,9550253653782835338,1803813814767360065,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,9550253653782835338,1803813814767360065,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:4504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,9550253653782835338,1803813814767360065,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4228 /prefetch:12⤵PID:628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,9550253653782835338,1803813814767360065,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4904 /prefetch:12⤵PID:1856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,9550253653782835338,1803813814767360065,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4372 /prefetch:12⤵PID:4328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2020,9550253653782835338,1803813814767360065,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5640 /prefetch:82⤵PID:3100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2020,9550253653782835338,1803813814767360065,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5640 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,9550253653782835338,1803813814767360065,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5332 /prefetch:12⤵PID:8
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,9550253653782835338,1803813814767360065,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5744 /prefetch:12⤵PID:4768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,9550253653782835338,1803813814767360065,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6248 /prefetch:12⤵PID:4904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,9550253653782835338,1803813814767360065,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6120 /prefetch:12⤵PID:5092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2020,9550253653782835338,1803813814767360065,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2204 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2484
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2632
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4056
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5eeaa8087eba2f63f31e599f6a7b46ef4
SHA1f639519deee0766a39cfe258d2ac48e3a9d5ac03
SHA25650fe80c9435f601c30517d10f6a8a0ca6ff8ca2add7584df377371b5a5dbe2d9
SHA512eaabfad92c84f422267615c55a863af12823c5e791bdcb30cabe17f72025e07df7383cf6cf0f08e28aa18a31c2aac5985cf5281a403e22fbcc1fb5e61c49fc3c
-
Filesize
152B
MD5b9569e123772ae290f9bac07e0d31748
SHA15806ed9b301d4178a959b26d7b7ccf2c0abc6741
SHA25620ab88e23fb88186b82047cd0d6dc3cfa23422e4fd2b8f3c8437546a2a842c2b
SHA512cfad8ce716ac815b37e8cc0e30141bfb3ca7f0d4ef101289bddcf6ed3c579bc34d369f2ec2f2dab98707843015633988eb97f1e911728031dd897750b8587795
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize216B
MD5d6c57c0426ea765906aa1fdb934e116c
SHA18ddefc5fe145bbd3c6cd8d397663d3def982652c
SHA25659e565cd3c3576aec5864b05800bf8a0864017ee0a36acaccba96ca1d095ead6
SHA5123413822730fada76cb708d76e1ea373871dd56e9b3fa1fd2da318b2b35b6db52a666f5f8d9fb714d170ac7353af0f5ca9526e35dbaa0f9245392613fc97aaef0
-
Filesize
1KB
MD5dd5bbed0f104083ce0315dffadb1f8ab
SHA169dc6667403c7fb5506b3363678b220e925c6c62
SHA25623cbdc067e89378f9e5e4be8dc2f950a59c13c6ae472f0b912e6d381ded28873
SHA5124893d236adf11aba73bf6ab9af562838603ca64391ba01db4bcd1a9a4665cbaddf0be1c9f20161dab701ddf1b20b1f98fef17e49306d3997f9077207a0393625
-
Filesize
6KB
MD5bc91b211e7f13388fdb43b8ae0a5b752
SHA1bcb633267b7f2cb5d23db644483a619963d222b9
SHA25617838f5934e673bac8ad74cc8a31e04c902cea3132b6e006e9b344c85fd15d16
SHA512dd78907d4ad2f81d7ae6b45c9972dddd67e0c26bf56caf2d5185ef212e972307331497e1cedaff94136e780efc25a1f99e2aa111bcf82d115a515a36c3af2d06
-
Filesize
6KB
MD520a810d49985c6d9b8a8e94a003ac30e
SHA10c68163022656278aff6f153f825ecdbaf3a68e6
SHA256077640bdbd4f12c5ec32d715c6f88889f56ce1951716db17b3617999afbecba6
SHA512cd995e23c53fbcd0fa294edf9023608387cb1c0085342acc8b11df6e34d01b2a24779eb65515d9b196743ca6245f57d9227cf4f501bc2059d521cd9452a87a78
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5fd4486fe909402facaec86de90e40392
SHA1cb181d4eee4760fe12d39138e7e63284cd06e002
SHA256dc95d91ac9641464c7ccdcbaf5fa5b9b6ad88f055d1e986991d907918660b3a1
SHA512eed289c620d66d72cb9e3c415fdbbedf66f972eb91008bc5ea84e994c639204d34bee23395c046eeba7aa2197695c67d5429b722b0b02294cb8cf5acb7112746