Analysis
-
max time kernel
145s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
03-10-2024 23:55
Static task
static1
Behavioral task
behavioral1
Sample
10fcb5990e0168fd0ee1fb4c42e54c68_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
10fcb5990e0168fd0ee1fb4c42e54c68_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
10fcb5990e0168fd0ee1fb4c42e54c68_JaffaCakes118.html
-
Size
36KB
-
MD5
10fcb5990e0168fd0ee1fb4c42e54c68
-
SHA1
1df008bd6b90e3e8da735584d9759a16aa6d0fbd
-
SHA256
97f02b32763f1a65e67a481f0aac8b0e2c461033ac73e3259a8f7f85277388cd
-
SHA512
ef89c20e995a7aeaf8edb36aca8cdbca3a80d5c0afa9a9761c7f909c8dc3822618e2ba3b874607c16c841a86a1084dd6e5adaf5163cdfee007d21a9fa4604a50
-
SSDEEP
768:SWmijOfsgyJyEu+I0/XGzg7tifXa2dg4M7ZWlugmWx8DOQczw7eCDf:SWmijOfsgyJyEu+I0/RiP7uRA8D3czwt
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1584 msedge.exe 1584 msedge.exe 3976 msedge.exe 3976 msedge.exe 1912 identity_helper.exe 1912 identity_helper.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 3976 msedge.exe 3976 msedge.exe 3976 msedge.exe 3976 msedge.exe 3976 msedge.exe 3976 msedge.exe 3976 msedge.exe 3976 msedge.exe 3976 msedge.exe 3976 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3976 msedge.exe 3976 msedge.exe 3976 msedge.exe 3976 msedge.exe 3976 msedge.exe 3976 msedge.exe 3976 msedge.exe 3976 msedge.exe 3976 msedge.exe 3976 msedge.exe 3976 msedge.exe 3976 msedge.exe 3976 msedge.exe 3976 msedge.exe 3976 msedge.exe 3976 msedge.exe 3976 msedge.exe 3976 msedge.exe 3976 msedge.exe 3976 msedge.exe 3976 msedge.exe 3976 msedge.exe 3976 msedge.exe 3976 msedge.exe 3976 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3976 msedge.exe 3976 msedge.exe 3976 msedge.exe 3976 msedge.exe 3976 msedge.exe 3976 msedge.exe 3976 msedge.exe 3976 msedge.exe 3976 msedge.exe 3976 msedge.exe 3976 msedge.exe 3976 msedge.exe 3976 msedge.exe 3976 msedge.exe 3976 msedge.exe 3976 msedge.exe 3976 msedge.exe 3976 msedge.exe 3976 msedge.exe 3976 msedge.exe 3976 msedge.exe 3976 msedge.exe 3976 msedge.exe 3976 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3976 wrote to memory of 3448 3976 msedge.exe 82 PID 3976 wrote to memory of 3448 3976 msedge.exe 82 PID 3976 wrote to memory of 3584 3976 msedge.exe 83 PID 3976 wrote to memory of 3584 3976 msedge.exe 83 PID 3976 wrote to memory of 3584 3976 msedge.exe 83 PID 3976 wrote to memory of 3584 3976 msedge.exe 83 PID 3976 wrote to memory of 3584 3976 msedge.exe 83 PID 3976 wrote to memory of 3584 3976 msedge.exe 83 PID 3976 wrote to memory of 3584 3976 msedge.exe 83 PID 3976 wrote to memory of 3584 3976 msedge.exe 83 PID 3976 wrote to memory of 3584 3976 msedge.exe 83 PID 3976 wrote to memory of 3584 3976 msedge.exe 83 PID 3976 wrote to memory of 3584 3976 msedge.exe 83 PID 3976 wrote to memory of 3584 3976 msedge.exe 83 PID 3976 wrote to memory of 3584 3976 msedge.exe 83 PID 3976 wrote to memory of 3584 3976 msedge.exe 83 PID 3976 wrote to memory of 3584 3976 msedge.exe 83 PID 3976 wrote to memory of 3584 3976 msedge.exe 83 PID 3976 wrote to memory of 3584 3976 msedge.exe 83 PID 3976 wrote to memory of 3584 3976 msedge.exe 83 PID 3976 wrote to memory of 3584 3976 msedge.exe 83 PID 3976 wrote to memory of 3584 3976 msedge.exe 83 PID 3976 wrote to memory of 3584 3976 msedge.exe 83 PID 3976 wrote to memory of 3584 3976 msedge.exe 83 PID 3976 wrote to memory of 3584 3976 msedge.exe 83 PID 3976 wrote to memory of 3584 3976 msedge.exe 83 PID 3976 wrote to memory of 3584 3976 msedge.exe 83 PID 3976 wrote to memory of 3584 3976 msedge.exe 83 PID 3976 wrote to memory of 3584 3976 msedge.exe 83 PID 3976 wrote to memory of 3584 3976 msedge.exe 83 PID 3976 wrote to memory of 3584 3976 msedge.exe 83 PID 3976 wrote to memory of 3584 3976 msedge.exe 83 PID 3976 wrote to memory of 3584 3976 msedge.exe 83 PID 3976 wrote to memory of 3584 3976 msedge.exe 83 PID 3976 wrote to memory of 3584 3976 msedge.exe 83 PID 3976 wrote to memory of 3584 3976 msedge.exe 83 PID 3976 wrote to memory of 3584 3976 msedge.exe 83 PID 3976 wrote to memory of 3584 3976 msedge.exe 83 PID 3976 wrote to memory of 3584 3976 msedge.exe 83 PID 3976 wrote to memory of 3584 3976 msedge.exe 83 PID 3976 wrote to memory of 3584 3976 msedge.exe 83 PID 3976 wrote to memory of 3584 3976 msedge.exe 83 PID 3976 wrote to memory of 1584 3976 msedge.exe 84 PID 3976 wrote to memory of 1584 3976 msedge.exe 84 PID 3976 wrote to memory of 1816 3976 msedge.exe 85 PID 3976 wrote to memory of 1816 3976 msedge.exe 85 PID 3976 wrote to memory of 1816 3976 msedge.exe 85 PID 3976 wrote to memory of 1816 3976 msedge.exe 85 PID 3976 wrote to memory of 1816 3976 msedge.exe 85 PID 3976 wrote to memory of 1816 3976 msedge.exe 85 PID 3976 wrote to memory of 1816 3976 msedge.exe 85 PID 3976 wrote to memory of 1816 3976 msedge.exe 85 PID 3976 wrote to memory of 1816 3976 msedge.exe 85 PID 3976 wrote to memory of 1816 3976 msedge.exe 85 PID 3976 wrote to memory of 1816 3976 msedge.exe 85 PID 3976 wrote to memory of 1816 3976 msedge.exe 85 PID 3976 wrote to memory of 1816 3976 msedge.exe 85 PID 3976 wrote to memory of 1816 3976 msedge.exe 85 PID 3976 wrote to memory of 1816 3976 msedge.exe 85 PID 3976 wrote to memory of 1816 3976 msedge.exe 85 PID 3976 wrote to memory of 1816 3976 msedge.exe 85 PID 3976 wrote to memory of 1816 3976 msedge.exe 85 PID 3976 wrote to memory of 1816 3976 msedge.exe 85 PID 3976 wrote to memory of 1816 3976 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\10fcb5990e0168fd0ee1fb4c42e54c68_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3976 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffce26946f8,0x7ffce2694708,0x7ffce26947182⤵PID:3448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,14882726847183305400,5164921574993305711,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2096 /prefetch:22⤵PID:3584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,14882726847183305400,5164921574993305711,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2184 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,14882726847183305400,5164921574993305711,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2796 /prefetch:82⤵PID:1816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,14882726847183305400,5164921574993305711,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:4548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,14882726847183305400,5164921574993305711,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:2736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,14882726847183305400,5164921574993305711,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4708 /prefetch:12⤵PID:4308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,14882726847183305400,5164921574993305711,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4892 /prefetch:12⤵PID:2616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,14882726847183305400,5164921574993305711,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3792 /prefetch:12⤵PID:3604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,14882726847183305400,5164921574993305711,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5176 /prefetch:12⤵PID:4752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,14882726847183305400,5164921574993305711,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5728 /prefetch:82⤵PID:1756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,14882726847183305400,5164921574993305711,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5728 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,14882726847183305400,5164921574993305711,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5956 /prefetch:12⤵PID:2096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,14882726847183305400,5164921574993305711,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6076 /prefetch:12⤵PID:5096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,14882726847183305400,5164921574993305711,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5964 /prefetch:12⤵PID:1668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,14882726847183305400,5164921574993305711,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6276 /prefetch:12⤵PID:4168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,14882726847183305400,5164921574993305711,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4016 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3832
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5040
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1440
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59b008261dda31857d68792b46af6dd6d
SHA1e82dc88e2d1da2df7cb19d79a0346b9bb90d52b3
SHA2569ac598d4f8170f7e475d84103aead9e3c23d5f2d292741a7f56a17bde8b6f7da
SHA51278853091403a06beeec4998e2e3a4342111895ffd485f7f7cd367741a4883f7a25864cba00a6c86f27dc0c9ce9d04f08011ecc40c8ae9383d33274739ac39f10
-
Filesize
152B
MD50446fcdd21b016db1f468971fb82a488
SHA1726b91562bb75f80981f381e3c69d7d832c87c9d
SHA25662c5dc18b25e758f3508582a7c58bb46b734a774d97fc0e8a20614235caa8222
SHA5121df7c085042266959f1fe0aedc5f6d40ceba485b54159f51f0c38f17bb250b79ea941b735e1b6faf219f23fe8ab65ac4557f545519d52d5416b89ad0f9047a31
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD560f17dc013d849c7567176ebb7a0e40e
SHA13773331ec211e781729924bb232f8219c0f6f8fe
SHA25695bc0f46517c540467eb9a3324fd3d8df0542b32c3b477641a5ea245b0beb204
SHA512c2df9c7de20b3b4b09c18006d62f22c8a84c2c5a8882b930f5f0a1a098f2194e2dd2bcd5fd6f48698425674d617fe3dd6aa3d01e29cad8d3050455eef0d8259a
-
Filesize
1KB
MD504004a8c8d4b0c094b3cb16bd4b44a62
SHA1dc7248a9fafb5f6f29413801b69f3d7aad1ec80f
SHA256d675d7786d8012aa843eee0a810028df0641877dfa1726c952faf25406efe2eb
SHA512b1e0aea77ce385e8386580583c9501a6b1d5d1f70569f0e56fdfa4444b7bce2c7fefcec97aa08724a1b329307c3a0dca5bbe7ea81a7e20c5aec5c90432a9a814
-
Filesize
5KB
MD5faba19822fd2e5aff65f3ab159c93b70
SHA1ef197f82f8a0887c7c7b22b030a38633df12d30b
SHA25687ba6dd7dd34e717480fda9768dc599baa948232ff3ace9526e3e21db1acdc3a
SHA512f7fa47488c845bced880cc47786c6a2a0df22d9f33d50021436896127eb3f2ba8f3a63b53b93f712f524ce2842312e083a9cbde320f39721106c5364de687151
-
Filesize
7KB
MD5a0cb835e8fc5e541084ac2dab33e9b6a
SHA10fbe0ef444b1cad6ed7211bad2c105e896a8ca8e
SHA2562fb290f8be632ba5ce3d11e42b98e38224bc2dac2a78289bbc14c1c707131416
SHA5121e107d773fc2c9f97abefa8237b67e705d8802def6ea0cfb1d6e1666568c38a2b3681765a9d2101d06600e494cfca7f06321bcb0eddf1efdad4c9061cdf22d1f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5d301422437247872d6f039f27c558a8a
SHA19fda212c61bfb6a964da5fa9116cb570db978700
SHA256159416b90d422e18437f763cb71b76f0e9a7c27a74ed8fe6b3a5eb4efe666dcb
SHA51295e8eb44d23f55246d189fe9eee328e59d456c91adba1f626f9c0bd857f3d5df40a95ec3776ebff51583de7444ad1919d87331b80836567e244a26e5e6ffb342