Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
01/10/2024, 08:53
Static task
static1
Behavioral task
behavioral1
Sample
052260e78d5604f5549090a0358cbc93_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
052260e78d5604f5549090a0358cbc93_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
052260e78d5604f5549090a0358cbc93_JaffaCakes118.html
-
Size
106KB
-
MD5
052260e78d5604f5549090a0358cbc93
-
SHA1
1e490417861dc3fe148c2c92b6818f750f74758b
-
SHA256
1a7ab27952baeab8a59917358ab86a8e8470725cef34fc248520fe0a1b7ac1d9
-
SHA512
3d275e28b9575146686a086efa4a973b98c9f13cfc2a5e18da6385530aae1dd486d46fa2668a0ccafc149cc37b5a7e708bbf30303537849f147e057bc0ede622
-
SSDEEP
3072:6ZE/SfIGAMeqYADxiGijZGeklDCv5C+ZMhP+xSoax:6ZoA9iBCR
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3668 msedge.exe 3668 msedge.exe 4896 msedge.exe 4896 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4896 wrote to memory of 3128 4896 msedge.exe 82 PID 4896 wrote to memory of 3128 4896 msedge.exe 82 PID 4896 wrote to memory of 4832 4896 msedge.exe 83 PID 4896 wrote to memory of 4832 4896 msedge.exe 83 PID 4896 wrote to memory of 4832 4896 msedge.exe 83 PID 4896 wrote to memory of 4832 4896 msedge.exe 83 PID 4896 wrote to memory of 4832 4896 msedge.exe 83 PID 4896 wrote to memory of 4832 4896 msedge.exe 83 PID 4896 wrote to memory of 4832 4896 msedge.exe 83 PID 4896 wrote to memory of 4832 4896 msedge.exe 83 PID 4896 wrote to memory of 4832 4896 msedge.exe 83 PID 4896 wrote to memory of 4832 4896 msedge.exe 83 PID 4896 wrote to memory of 4832 4896 msedge.exe 83 PID 4896 wrote to memory of 4832 4896 msedge.exe 83 PID 4896 wrote to memory of 4832 4896 msedge.exe 83 PID 4896 wrote to memory of 4832 4896 msedge.exe 83 PID 4896 wrote to memory of 4832 4896 msedge.exe 83 PID 4896 wrote to memory of 4832 4896 msedge.exe 83 PID 4896 wrote to memory of 4832 4896 msedge.exe 83 PID 4896 wrote to memory of 4832 4896 msedge.exe 83 PID 4896 wrote to memory of 4832 4896 msedge.exe 83 PID 4896 wrote to memory of 4832 4896 msedge.exe 83 PID 4896 wrote to memory of 4832 4896 msedge.exe 83 PID 4896 wrote to memory of 4832 4896 msedge.exe 83 PID 4896 wrote to memory of 4832 4896 msedge.exe 83 PID 4896 wrote to memory of 4832 4896 msedge.exe 83 PID 4896 wrote to memory of 4832 4896 msedge.exe 83 PID 4896 wrote to memory of 4832 4896 msedge.exe 83 PID 4896 wrote to memory of 4832 4896 msedge.exe 83 PID 4896 wrote to memory of 4832 4896 msedge.exe 83 PID 4896 wrote to memory of 4832 4896 msedge.exe 83 PID 4896 wrote to memory of 4832 4896 msedge.exe 83 PID 4896 wrote to memory of 4832 4896 msedge.exe 83 PID 4896 wrote to memory of 4832 4896 msedge.exe 83 PID 4896 wrote to memory of 4832 4896 msedge.exe 83 PID 4896 wrote to memory of 4832 4896 msedge.exe 83 PID 4896 wrote to memory of 4832 4896 msedge.exe 83 PID 4896 wrote to memory of 4832 4896 msedge.exe 83 PID 4896 wrote to memory of 4832 4896 msedge.exe 83 PID 4896 wrote to memory of 4832 4896 msedge.exe 83 PID 4896 wrote to memory of 4832 4896 msedge.exe 83 PID 4896 wrote to memory of 4832 4896 msedge.exe 83 PID 4896 wrote to memory of 3668 4896 msedge.exe 84 PID 4896 wrote to memory of 3668 4896 msedge.exe 84 PID 4896 wrote to memory of 4352 4896 msedge.exe 85 PID 4896 wrote to memory of 4352 4896 msedge.exe 85 PID 4896 wrote to memory of 4352 4896 msedge.exe 85 PID 4896 wrote to memory of 4352 4896 msedge.exe 85 PID 4896 wrote to memory of 4352 4896 msedge.exe 85 PID 4896 wrote to memory of 4352 4896 msedge.exe 85 PID 4896 wrote to memory of 4352 4896 msedge.exe 85 PID 4896 wrote to memory of 4352 4896 msedge.exe 85 PID 4896 wrote to memory of 4352 4896 msedge.exe 85 PID 4896 wrote to memory of 4352 4896 msedge.exe 85 PID 4896 wrote to memory of 4352 4896 msedge.exe 85 PID 4896 wrote to memory of 4352 4896 msedge.exe 85 PID 4896 wrote to memory of 4352 4896 msedge.exe 85 PID 4896 wrote to memory of 4352 4896 msedge.exe 85 PID 4896 wrote to memory of 4352 4896 msedge.exe 85 PID 4896 wrote to memory of 4352 4896 msedge.exe 85 PID 4896 wrote to memory of 4352 4896 msedge.exe 85 PID 4896 wrote to memory of 4352 4896 msedge.exe 85 PID 4896 wrote to memory of 4352 4896 msedge.exe 85 PID 4896 wrote to memory of 4352 4896 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\052260e78d5604f5549090a0358cbc93_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4896 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbdffd46f8,0x7ffbdffd4708,0x7ffbdffd47182⤵PID:3128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,10602288674060456540,4301474569402139552,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:22⤵PID:4832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,10602288674060456540,4301474569402139552,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2196 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,10602288674060456540,4301474569402139552,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2816 /prefetch:82⤵PID:4352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,10602288674060456540,4301474569402139552,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:3704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,10602288674060456540,4301474569402139552,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:4188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,10602288674060456540,4301474569402139552,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5432 /prefetch:12⤵PID:1248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,10602288674060456540,4301474569402139552,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4904 /prefetch:12⤵PID:3712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,10602288674060456540,4301474569402139552,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2640 /prefetch:12⤵PID:1160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,10602288674060456540,4301474569402139552,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4908 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3436
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3112
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1892
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5111c361619c017b5d09a13a56938bd54
SHA1e02b363a8ceb95751623f25025a9299a2c931e07
SHA256d7be4042a1e3511b0dbf0ab5c493245e4ac314440a4ae0732813db01a21ef8bc
SHA512fc16a4ad0b56899b82d05114d7b0ca8ee610cdba6ff0b6a67dea44faf17b3105109335359b78c0a59c9011a13152744a7f5d4f6a5b66ea519df750ef03f622b2
-
Filesize
152B
MD5983cbc1f706a155d63496ebc4d66515e
SHA1223d0071718b80cad9239e58c5e8e64df6e2a2fe
SHA256cc34b8f8e3f4bfe4c9a227d88f56ea2dd276ca3ac81df622ff5e9a8ec46b951c
SHA512d9cf2ca46d9379902730c81e615a3eb694873ffd535c6bb3ded2dc97cdbbfb71051ab11a07754ed6f610f04285605b702b5a48a6cfda3ee3287230c41c9c45cd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD52084da54e0cb994e736693b20fbd9b4b
SHA113aa44ebb83be0925bc4e23fc5c3828a07a25630
SHA256158b2220df5e4780e52884dcb3b2adee3c759e0d69e0166ff3d5624cb372ec87
SHA512c65f9b3df62e7b864bc895128fafb25bfc69dcaf24d1a428911d8eca8a881474b4eab6dfada5a771666d0d2283069034201cdbd05160f3f8111b969f4c0b8955
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD593a8f6fd4b4796b7b062a250e72474c4
SHA1931aa8c5efbbbe63ed8c02202ea982d5fe8eafd6
SHA25655b12a21846135c089a244d310c6552c845a537ffd3aacffc05e56ef4891c7fd
SHA512949c1dea3aeaf0ceb1e981921fe5ad373b15b6f423c943439e7626161b4a12e162fa11fd7af734ec25747a8a0cf4d2e29a4b685ba1934b5a2429e4df7e45dd56
-
Filesize
1KB
MD5924dc0e13a48572a3ab7aaf01b5fc37b
SHA1b4d4ef4911a30c22d0df19cc802b236baa9ccd7b
SHA256a3690d00ae5560d11a344d9ee169a0bc110518b457e715657d182695fac235f4
SHA5128f7d701dfa946ce4eb660523280facf02a2cfe10cc43d56bff13734d1e04694eb6f6e89261dbeb569808886f48f0b6d7a30bef24f71830728dddb11d57c80d02
-
Filesize
1KB
MD53c670d64719e06f9d1a3c153bbeed2cb
SHA13a46dc0eda5bf99b7d999252494b1befc3a77313
SHA25634fb6365e29f4da4e7d39f6a34fbee5ef93eb55ebc676d46a1c262be0623aafb
SHA5126e253155c5e35dbb7d19ed751f8b1efc63b0819757a4311d8e003a7a694e278400ddfb75624e939749b9161f5f39441f6e2ee7326a164e9f00532ce2bbf5f0b0
-
Filesize
6KB
MD5bbf23889c3bc632b35750336dee40abf
SHA17cea3812c5922518254cb8a8d85d9333ad6ddfa8
SHA256678e26bf1e5cb7966a33b6b1b4561d7926015faad39f0f622621e453328c6789
SHA5128335ef691229b3992694b851a03d08d4194d84913036f9762631f5cf9a131bd6e4d05e2937210a17d6fd138ee14d0daeb5020b5e48e2d9cc910169b9c8bddfd1
-
Filesize
5KB
MD5c6607a175274220c142f18db88de8a0d
SHA1bfb124029f536e66626dd797df532fd3f2020ec7
SHA2562fd33a84fb4181214990af0acac56e9b2da2a0a1fd96dddade22d6cf4364f1dd
SHA512ba4b961442b5e4489d4ada8234bce96611553c63e59110ba7d1752a8cdcb0907178a5b336375b8ab5a83cfcae267d488d063a344de7eb25bcdcf28022c986069
-
Filesize
6KB
MD5ee677b7880ae878135b8051c89048270
SHA1869acf3a8885372b75250f11d2cc11ba5abd46e8
SHA256e546b6bb8e4666cff5bface3f2a3264e96994f67dc0fb42b464a2a909ac6620e
SHA5123c660266a0f5178b535a97603d1879cdcf2b89a7ee8901ff8e45a7e405962f61dd1101475c6d1ba4e857aa0db959d60af21cd0f75ba3af264093792e69a37856
-
Filesize
10KB
MD5c8530941665c1092fe59f7b85015a29d
SHA13a5855edb1edf4c0f07f679203018a88a921e69d
SHA25669fbb1a600d32dd02c2477709e0b5551b57510936c9192c3af8e634bf1abf229
SHA512781f8405a388df35bccbcbebbd10bb705d03a5aa1ba36a8047fe513605b734ea0b8d8ac3a8358c5ad12c69c69fec713a1fab7b1f4a8d0304d4c1f347aaea8544