Analysis
-
max time kernel
148s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02/10/2024, 13:45
Static task
static1
Behavioral task
behavioral1
Sample
0af4e424ad7f6491e20084fcd489c709_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
0af4e424ad7f6491e20084fcd489c709_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
0af4e424ad7f6491e20084fcd489c709_JaffaCakes118.html
-
Size
51KB
-
MD5
0af4e424ad7f6491e20084fcd489c709
-
SHA1
d31f5cab4adf8ffd4db7df2a81f2cc03b0fbb95a
-
SHA256
c35fd1c9751eb39c44b82f0afeda701ffc27a585646595f6f96e980fea6196c5
-
SHA512
c90ff51a2f55d5d13a9b1bf800270a4848268e735bff314a114b6ffa0a45e1c47b51d38f2be288be68da24db355eb143b2a3109ddafc329acac56dfe88091611
-
SSDEEP
1536:DIkFC1dCHWG+tPUcEiLAm+LEFLQejKEimvKm1PQMFRdvsJV6KcwCfEyF:lC1dCHWG+tPLEikm+LOq6v1iCfEyF
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3948 msedge.exe 3948 msedge.exe 2016 msedge.exe 2016 msedge.exe 1312 identity_helper.exe 1312 identity_helper.exe 1912 msedge.exe 1912 msedge.exe 1912 msedge.exe 1912 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe 2016 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2016 wrote to memory of 1012 2016 msedge.exe 82 PID 2016 wrote to memory of 1012 2016 msedge.exe 82 PID 2016 wrote to memory of 3336 2016 msedge.exe 83 PID 2016 wrote to memory of 3336 2016 msedge.exe 83 PID 2016 wrote to memory of 3336 2016 msedge.exe 83 PID 2016 wrote to memory of 3336 2016 msedge.exe 83 PID 2016 wrote to memory of 3336 2016 msedge.exe 83 PID 2016 wrote to memory of 3336 2016 msedge.exe 83 PID 2016 wrote to memory of 3336 2016 msedge.exe 83 PID 2016 wrote to memory of 3336 2016 msedge.exe 83 PID 2016 wrote to memory of 3336 2016 msedge.exe 83 PID 2016 wrote to memory of 3336 2016 msedge.exe 83 PID 2016 wrote to memory of 3336 2016 msedge.exe 83 PID 2016 wrote to memory of 3336 2016 msedge.exe 83 PID 2016 wrote to memory of 3336 2016 msedge.exe 83 PID 2016 wrote to memory of 3336 2016 msedge.exe 83 PID 2016 wrote to memory of 3336 2016 msedge.exe 83 PID 2016 wrote to memory of 3336 2016 msedge.exe 83 PID 2016 wrote to memory of 3336 2016 msedge.exe 83 PID 2016 wrote to memory of 3336 2016 msedge.exe 83 PID 2016 wrote to memory of 3336 2016 msedge.exe 83 PID 2016 wrote to memory of 3336 2016 msedge.exe 83 PID 2016 wrote to memory of 3336 2016 msedge.exe 83 PID 2016 wrote to memory of 3336 2016 msedge.exe 83 PID 2016 wrote to memory of 3336 2016 msedge.exe 83 PID 2016 wrote to memory of 3336 2016 msedge.exe 83 PID 2016 wrote to memory of 3336 2016 msedge.exe 83 PID 2016 wrote to memory of 3336 2016 msedge.exe 83 PID 2016 wrote to memory of 3336 2016 msedge.exe 83 PID 2016 wrote to memory of 3336 2016 msedge.exe 83 PID 2016 wrote to memory of 3336 2016 msedge.exe 83 PID 2016 wrote to memory of 3336 2016 msedge.exe 83 PID 2016 wrote to memory of 3336 2016 msedge.exe 83 PID 2016 wrote to memory of 3336 2016 msedge.exe 83 PID 2016 wrote to memory of 3336 2016 msedge.exe 83 PID 2016 wrote to memory of 3336 2016 msedge.exe 83 PID 2016 wrote to memory of 3336 2016 msedge.exe 83 PID 2016 wrote to memory of 3336 2016 msedge.exe 83 PID 2016 wrote to memory of 3336 2016 msedge.exe 83 PID 2016 wrote to memory of 3336 2016 msedge.exe 83 PID 2016 wrote to memory of 3336 2016 msedge.exe 83 PID 2016 wrote to memory of 3336 2016 msedge.exe 83 PID 2016 wrote to memory of 3948 2016 msedge.exe 84 PID 2016 wrote to memory of 3948 2016 msedge.exe 84 PID 2016 wrote to memory of 4284 2016 msedge.exe 85 PID 2016 wrote to memory of 4284 2016 msedge.exe 85 PID 2016 wrote to memory of 4284 2016 msedge.exe 85 PID 2016 wrote to memory of 4284 2016 msedge.exe 85 PID 2016 wrote to memory of 4284 2016 msedge.exe 85 PID 2016 wrote to memory of 4284 2016 msedge.exe 85 PID 2016 wrote to memory of 4284 2016 msedge.exe 85 PID 2016 wrote to memory of 4284 2016 msedge.exe 85 PID 2016 wrote to memory of 4284 2016 msedge.exe 85 PID 2016 wrote to memory of 4284 2016 msedge.exe 85 PID 2016 wrote to memory of 4284 2016 msedge.exe 85 PID 2016 wrote to memory of 4284 2016 msedge.exe 85 PID 2016 wrote to memory of 4284 2016 msedge.exe 85 PID 2016 wrote to memory of 4284 2016 msedge.exe 85 PID 2016 wrote to memory of 4284 2016 msedge.exe 85 PID 2016 wrote to memory of 4284 2016 msedge.exe 85 PID 2016 wrote to memory of 4284 2016 msedge.exe 85 PID 2016 wrote to memory of 4284 2016 msedge.exe 85 PID 2016 wrote to memory of 4284 2016 msedge.exe 85 PID 2016 wrote to memory of 4284 2016 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\0af4e424ad7f6491e20084fcd489c709_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffaa33e46f8,0x7ffaa33e4708,0x7ffaa33e47182⤵PID:1012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,9991515724235310979,1397002275258123272,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:22⤵PID:3336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,9991515724235310979,1397002275258123272,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2192 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,9991515724235310979,1397002275258123272,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2712 /prefetch:82⤵PID:4284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,9991515724235310979,1397002275258123272,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3192 /prefetch:12⤵PID:3876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,9991515724235310979,1397002275258123272,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3184 /prefetch:12⤵PID:2228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,9991515724235310979,1397002275258123272,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2128 /prefetch:12⤵PID:2492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,9991515724235310979,1397002275258123272,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5516 /prefetch:82⤵PID:404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,9991515724235310979,1397002275258123272,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5516 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,9991515724235310979,1397002275258123272,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2348 /prefetch:12⤵PID:1140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,9991515724235310979,1397002275258123272,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5528 /prefetch:12⤵PID:4200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,9991515724235310979,1397002275258123272,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4084 /prefetch:12⤵PID:552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,9991515724235310979,1397002275258123272,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5520 /prefetch:12⤵PID:1008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,9991515724235310979,1397002275258123272,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4932 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1912
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4080
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4064
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD553bc70ecb115bdbabe67620c416fe9b3
SHA1af66ec51a13a59639eaf54d62ff3b4f092bb2fc1
SHA256b36cad5c1f7bc7d07c7eaa2f3cad2959ddb5447d4d3adcb46eb6a99808e22771
SHA512cad44933b94e17908c0eb8ac5feeb53d03a7720d97e7ccc8724a1ed3021a5bece09e1f9f3cec56ce0739176ebbbeb20729e650f8bca04e5060c986b75d8e4921
-
Filesize
152B
MD5e765f3d75e6b0e4a7119c8b14d47d8da
SHA1cc9f7c7826c2e1a129e7d98884926076c3714fc0
SHA256986443556d3878258b710d9d9efbf4f25f0d764c3f83dc54217f2b12a6eccd89
SHA512a1872a849f27da78ebe9adb9beb260cb49ed5f4ca2d403f23379112bdfcd2482446a6708188100496e45db1517cdb43aba8bb93a75e605713c3f97cd716b1079
-
Filesize
23KB
MD52f24e0f5d2c2997a89fb4a8d943c141f
SHA199515bde1a5bf72105116ac902ccf3db1dd3df29
SHA25660c9ecaf27ba56d7c35aa78c329aa7dfa586e6c71ed3cdd0019ba7e767b18aaf
SHA5120f4c5508dfdcf0ef63141df8d29c76e219d2ec433d59d37d7f17e110b455f24235fd0bc4f539ad5adc368285536d73f57dc4e21e3201dfd5753e76789208989d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD587bc34778a2da7430020b18cb0760bf5
SHA1b97fee49e2d192eda04a86d6a76cd35a46253009
SHA25653fec212db65a52629bebc62f9224a267db824f5c0f3348c937ca2d98b6e0ca0
SHA512643b0bb9f81079c59a51679a99612afc8dc9c3a8606472670a42ad71e905326a579734b23c1ddde201d21f4241da13f0aafa695f823755bd7b4c45341a20029a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD59274b0088a45b1fd02f064cb6cea9f8f
SHA18fd9af7869a33c7122068b99084554d047e31a7d
SHA256ad2108cd1168852cdef5fc0b6eb1d4384d3b11eab089db45765246e23ef04813
SHA512ca00cfb858ce71ef658cb6546b73d83e10c461257bb37785160123172882b67aa55e0a9effbb1a070da5d373c50be2ed63844f9d9ebee33b9bca770c01e5956e
-
Filesize
1KB
MD5c75564cc3b387c27e16325e7e6ed3ed0
SHA188a73c508ae66e0235258c85d7461f02b3351a2b
SHA2565e177d6a4d31bb97a6f3d67a1f5a2063837ac9802a4f6f6e7b0d18e041b4e253
SHA512c5d577dfae3dfa0ce8b3994c97da2c88ca07f05090abc4730e79869e49b067b33e076089d1db2b66f8110019468b26f78cdb18e3bc179570bedea8e2e6dc62e9
-
Filesize
1KB
MD5e6b70bacc5bc63d5b6dbdfc40621e624
SHA1751d5dae03a1f0db81fde7ed70cda8424f0e7375
SHA256c6422dff1c7efafbf9c4211167c14b0093fe40ff4cf00245970f361ebfff2284
SHA5128fba031f782eeda9f58aa0b0c8d8ce63effde4b7d80a133ff2a5f2aae2057c029128790e05304bdf76bb763ded7ae731039dd6dd7b8e5a58469eecbe5fc37160
-
Filesize
5KB
MD56a031c04f2f1b2813a4f3d07b383b8b8
SHA179ccf19a3745212ae70923406fa90e8ce4d0d8a0
SHA2568fbce843f5aac444677e0ab27397ee064bc547b8dddc2d67cb187b87cf239d65
SHA512c626dcd49c80e41d04e026b5e20783430aa0e0e2ffe8c50a78786149cc837ea692f6f511cd29cce9abe67613700c6a310bf7f7438b33398e954b67809a7765b4
-
Filesize
7KB
MD5d8e39032bfc8b399abc65c31e37228fc
SHA109bb4cbc8179f4ca432a17f932ffab5c812b70fd
SHA256b0f37f7dff3bf92df969f7df4a969cc2f1b8803154e6fe87fdb00956a8287758
SHA512573375a96e686390c00f6dd04080375fdeb52e2aa3b03758b3e695789f049f419adf7d5c35f32417be46c4fc52df5923ef902545eb2fe9a8f4e638e387c42a2b
-
Filesize
6KB
MD53d45415cbf632bea8f75cadeed01353f
SHA17053bd107969f45c23e285b2c953d1a4ed526af3
SHA256514ce2e19cf1a0f2a7817b50e44d04eed66bf26f93c79a81b6cf4086489b9b19
SHA512af29e5f68db691c84a443d9cd6d895a4f3f2549e28f8480871de57f681ca53e84f4e8a08704462e7a86484ec270add129e78ebb666513e59032f6c11bc8e31f0
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD57d48e7922e3bbea72f0d66d1933522fe
SHA10ed42d3f5ee336d89214ce53da84107358ff7cfd
SHA2567b402e4deaaed6dc29e82736ccfae216d8fb35eda9d9553916189aea2360f248
SHA51289cc40c1676b376ba4fe15e7f5c62d3bdb2872e29d01463c1e81377bed17b9ab61e2a3784187748d1a741841962143dd6b13e152fded0bd2f0ce100972b3e75d