Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02-10-2024 15:40
Static task
static1
Behavioral task
behavioral1
Sample
0b659cfb8ecd8d59ca19bf31deace2b7_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
0b659cfb8ecd8d59ca19bf31deace2b7_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
0b659cfb8ecd8d59ca19bf31deace2b7_JaffaCakes118.html
-
Size
48KB
-
MD5
0b659cfb8ecd8d59ca19bf31deace2b7
-
SHA1
2c5a60ed6d64f3102b74a69a63aad6f873fde595
-
SHA256
f5852e5cbcd093955ff0f81b016a099247f58c9debba6931f63fa5f81b5800a0
-
SHA512
fec3a6d4b09355ea5f73b90ad4a1c3ef7d01865a18bd7125eb3af653ac238835d4224e54c3755f19a12fd9f104eafc138d2bbeeb07aa0bcb94926d9c40ca1da2
-
SSDEEP
768:6D/ZlFN8thtohjzvIwY0unxg3LZHfS3jEInmk/jhRNSqe6LYjSRS27/cnr/Q7bFk:6D1ZHfS3jEInmk/jhRNSqeaYjSRS27UX
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4380 msedge.exe 4380 msedge.exe 4448 msedge.exe 4448 msedge.exe 1532 identity_helper.exe 1532 identity_helper.exe 2152 msedge.exe 2152 msedge.exe 2152 msedge.exe 2152 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe 4448 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4448 wrote to memory of 3720 4448 msedge.exe 82 PID 4448 wrote to memory of 3720 4448 msedge.exe 82 PID 4448 wrote to memory of 3832 4448 msedge.exe 83 PID 4448 wrote to memory of 3832 4448 msedge.exe 83 PID 4448 wrote to memory of 3832 4448 msedge.exe 83 PID 4448 wrote to memory of 3832 4448 msedge.exe 83 PID 4448 wrote to memory of 3832 4448 msedge.exe 83 PID 4448 wrote to memory of 3832 4448 msedge.exe 83 PID 4448 wrote to memory of 3832 4448 msedge.exe 83 PID 4448 wrote to memory of 3832 4448 msedge.exe 83 PID 4448 wrote to memory of 3832 4448 msedge.exe 83 PID 4448 wrote to memory of 3832 4448 msedge.exe 83 PID 4448 wrote to memory of 3832 4448 msedge.exe 83 PID 4448 wrote to memory of 3832 4448 msedge.exe 83 PID 4448 wrote to memory of 3832 4448 msedge.exe 83 PID 4448 wrote to memory of 3832 4448 msedge.exe 83 PID 4448 wrote to memory of 3832 4448 msedge.exe 83 PID 4448 wrote to memory of 3832 4448 msedge.exe 83 PID 4448 wrote to memory of 3832 4448 msedge.exe 83 PID 4448 wrote to memory of 3832 4448 msedge.exe 83 PID 4448 wrote to memory of 3832 4448 msedge.exe 83 PID 4448 wrote to memory of 3832 4448 msedge.exe 83 PID 4448 wrote to memory of 3832 4448 msedge.exe 83 PID 4448 wrote to memory of 3832 4448 msedge.exe 83 PID 4448 wrote to memory of 3832 4448 msedge.exe 83 PID 4448 wrote to memory of 3832 4448 msedge.exe 83 PID 4448 wrote to memory of 3832 4448 msedge.exe 83 PID 4448 wrote to memory of 3832 4448 msedge.exe 83 PID 4448 wrote to memory of 3832 4448 msedge.exe 83 PID 4448 wrote to memory of 3832 4448 msedge.exe 83 PID 4448 wrote to memory of 3832 4448 msedge.exe 83 PID 4448 wrote to memory of 3832 4448 msedge.exe 83 PID 4448 wrote to memory of 3832 4448 msedge.exe 83 PID 4448 wrote to memory of 3832 4448 msedge.exe 83 PID 4448 wrote to memory of 3832 4448 msedge.exe 83 PID 4448 wrote to memory of 3832 4448 msedge.exe 83 PID 4448 wrote to memory of 3832 4448 msedge.exe 83 PID 4448 wrote to memory of 3832 4448 msedge.exe 83 PID 4448 wrote to memory of 3832 4448 msedge.exe 83 PID 4448 wrote to memory of 3832 4448 msedge.exe 83 PID 4448 wrote to memory of 3832 4448 msedge.exe 83 PID 4448 wrote to memory of 3832 4448 msedge.exe 83 PID 4448 wrote to memory of 4380 4448 msedge.exe 84 PID 4448 wrote to memory of 4380 4448 msedge.exe 84 PID 4448 wrote to memory of 1796 4448 msedge.exe 85 PID 4448 wrote to memory of 1796 4448 msedge.exe 85 PID 4448 wrote to memory of 1796 4448 msedge.exe 85 PID 4448 wrote to memory of 1796 4448 msedge.exe 85 PID 4448 wrote to memory of 1796 4448 msedge.exe 85 PID 4448 wrote to memory of 1796 4448 msedge.exe 85 PID 4448 wrote to memory of 1796 4448 msedge.exe 85 PID 4448 wrote to memory of 1796 4448 msedge.exe 85 PID 4448 wrote to memory of 1796 4448 msedge.exe 85 PID 4448 wrote to memory of 1796 4448 msedge.exe 85 PID 4448 wrote to memory of 1796 4448 msedge.exe 85 PID 4448 wrote to memory of 1796 4448 msedge.exe 85 PID 4448 wrote to memory of 1796 4448 msedge.exe 85 PID 4448 wrote to memory of 1796 4448 msedge.exe 85 PID 4448 wrote to memory of 1796 4448 msedge.exe 85 PID 4448 wrote to memory of 1796 4448 msedge.exe 85 PID 4448 wrote to memory of 1796 4448 msedge.exe 85 PID 4448 wrote to memory of 1796 4448 msedge.exe 85 PID 4448 wrote to memory of 1796 4448 msedge.exe 85 PID 4448 wrote to memory of 1796 4448 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\0b659cfb8ecd8d59ca19bf31deace2b7_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4448 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffaa33e46f8,0x7ffaa33e4708,0x7ffaa33e47182⤵PID:3720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2004,16643849252723880928,13793599183271358419,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2016 /prefetch:22⤵PID:3832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2004,16643849252723880928,13793599183271358419,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2280 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2004,16643849252723880928,13793599183271358419,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2904 /prefetch:82⤵PID:1796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,16643849252723880928,13793599183271358419,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:3432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,16643849252723880928,13793599183271358419,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:2772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,16643849252723880928,13793599183271358419,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4196 /prefetch:12⤵PID:112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,16643849252723880928,13793599183271358419,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4800 /prefetch:12⤵PID:2928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2004,16643849252723880928,13793599183271358419,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5148 /prefetch:82⤵PID:2752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2004,16643849252723880928,13793599183271358419,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5148 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,16643849252723880928,13793599183271358419,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5220 /prefetch:12⤵PID:1472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,16643849252723880928,13793599183271358419,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5236 /prefetch:12⤵PID:1936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,16643849252723880928,13793599183271358419,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5912 /prefetch:12⤵PID:5112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,16643849252723880928,13793599183271358419,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5932 /prefetch:12⤵PID:1696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2004,16643849252723880928,13793599183271358419,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5584 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2152
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2820
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2908
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD553bc70ecb115bdbabe67620c416fe9b3
SHA1af66ec51a13a59639eaf54d62ff3b4f092bb2fc1
SHA256b36cad5c1f7bc7d07c7eaa2f3cad2959ddb5447d4d3adcb46eb6a99808e22771
SHA512cad44933b94e17908c0eb8ac5feeb53d03a7720d97e7ccc8724a1ed3021a5bece09e1f9f3cec56ce0739176ebbbeb20729e650f8bca04e5060c986b75d8e4921
-
Filesize
152B
MD5e765f3d75e6b0e4a7119c8b14d47d8da
SHA1cc9f7c7826c2e1a129e7d98884926076c3714fc0
SHA256986443556d3878258b710d9d9efbf4f25f0d764c3f83dc54217f2b12a6eccd89
SHA512a1872a849f27da78ebe9adb9beb260cb49ed5f4ca2d403f23379112bdfcd2482446a6708188100496e45db1517cdb43aba8bb93a75e605713c3f97cd716b1079
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD513123c910908c45f7a9715c67f39d594
SHA11a770e046129a29b447791770bae018080cfb3ab
SHA25684fcad7e580286d7c2a33f92ef44cdb3dec912ced86eb217640428db8ca5c4df
SHA512caba04baf7ab84ea8c3ffd38d1d06e6c272ec544b8d8cf7c62fe79e116e35bf0018064caf686329010228012f77b8aa487973e571e14449187cb1829b9e7fca7
-
Filesize
1KB
MD5080414af4103b52fd1b109079630a803
SHA1425f5a46b4d2647b54758758f5e51ea854a9b962
SHA2565ea3e97c909a91eef23584abf1e80b7e4026002da095a7b2f313737fcea47334
SHA5129f2e889257f4d34a5a7f3bfe94572b4e9b16b54a055f24ad692c3f638579d6a95254d5c6a09ca98ed33ab38896801839d5c6b18520a25d0ffba8d296865d92d9
-
Filesize
5KB
MD5692af864699f2409fbf87e55583ee1f1
SHA1d77a62f2731d9c07d7db2671db28084ecec94f94
SHA256b6ad7d0188dc4f4eaa945435c23718a2393279e7ad0e773d0346352816ba4fa4
SHA512ab1ad005c0c42ae0cce6481ebc02e66c02cffc14a8d24026062cf6a9ce7b1192572a8bd3015d8fb803450bb36f34f83f76f877496e86bb37c09df2c0f0be2800
-
Filesize
6KB
MD5698636a97c4e3dd9535faab788993431
SHA15fc38073157f35824acae6da93e8b487cbff715d
SHA2566d0e3de8d7c838ed5246f6c39cd0616cb0663e4c07560986a8cdffa077ae1061
SHA512be0472b0ec481ec9e8648260c2aeeefc6179e521f9c2471f4f911840e35c520db4706d7b9f20f508003a2a984ccb65091407036a70a8f8df486ec92b1bd9bdb9
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5e39fb9dd5f9c1bc63181bf0384b528b4
SHA143977e880f5caf66eb8542f47fe9bc81a0d8edb8
SHA256ea4a3d48101e9a9c2d6ec692df30ae8b35603e86a57a20a0d76a080c9b5510ee
SHA5125c9a5d4dcc80a55907ba474d899c60ae0663eb74ae4f66fb2d7ab91e4982291824e796161f87aa6f005123778068516bab13175ba89a866d4d598657c19624ff