Analysis
-
max time kernel
145s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05-10-2024 01:48
Static task
static1
Behavioral task
behavioral1
Sample
15b11a0b3169d189701f78b0b9751659_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
15b11a0b3169d189701f78b0b9751659_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
15b11a0b3169d189701f78b0b9751659_JaffaCakes118.html
-
Size
23KB
-
MD5
15b11a0b3169d189701f78b0b9751659
-
SHA1
85ad8d5077705b2a78680222c01b05a04901a405
-
SHA256
aeaaef7bade58fa24876531880ad9ddbca4615ae36a5918650c0eb878fe871be
-
SHA512
8396aeba39dbfca89c652b9496f17fd2576938db6295523b256deb54eccdee9ef79a877d706fd2c099a3ad43786a91fe69d46ee1ae55d3998e199e27097b4881
-
SSDEEP
384:ganlIcGtC4BvGTHFuCJBGGMWuCpTN6Z8D/gb1AguLZ:gZ8uCVuCQ8DghAxLZ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2788 msedge.exe 2788 msedge.exe 2896 msedge.exe 2896 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2896 wrote to memory of 4104 2896 msedge.exe 82 PID 2896 wrote to memory of 4104 2896 msedge.exe 82 PID 2896 wrote to memory of 1924 2896 msedge.exe 83 PID 2896 wrote to memory of 1924 2896 msedge.exe 83 PID 2896 wrote to memory of 1924 2896 msedge.exe 83 PID 2896 wrote to memory of 1924 2896 msedge.exe 83 PID 2896 wrote to memory of 1924 2896 msedge.exe 83 PID 2896 wrote to memory of 1924 2896 msedge.exe 83 PID 2896 wrote to memory of 1924 2896 msedge.exe 83 PID 2896 wrote to memory of 1924 2896 msedge.exe 83 PID 2896 wrote to memory of 1924 2896 msedge.exe 83 PID 2896 wrote to memory of 1924 2896 msedge.exe 83 PID 2896 wrote to memory of 1924 2896 msedge.exe 83 PID 2896 wrote to memory of 1924 2896 msedge.exe 83 PID 2896 wrote to memory of 1924 2896 msedge.exe 83 PID 2896 wrote to memory of 1924 2896 msedge.exe 83 PID 2896 wrote to memory of 1924 2896 msedge.exe 83 PID 2896 wrote to memory of 1924 2896 msedge.exe 83 PID 2896 wrote to memory of 1924 2896 msedge.exe 83 PID 2896 wrote to memory of 1924 2896 msedge.exe 83 PID 2896 wrote to memory of 1924 2896 msedge.exe 83 PID 2896 wrote to memory of 1924 2896 msedge.exe 83 PID 2896 wrote to memory of 1924 2896 msedge.exe 83 PID 2896 wrote to memory of 1924 2896 msedge.exe 83 PID 2896 wrote to memory of 1924 2896 msedge.exe 83 PID 2896 wrote to memory of 1924 2896 msedge.exe 83 PID 2896 wrote to memory of 1924 2896 msedge.exe 83 PID 2896 wrote to memory of 1924 2896 msedge.exe 83 PID 2896 wrote to memory of 1924 2896 msedge.exe 83 PID 2896 wrote to memory of 1924 2896 msedge.exe 83 PID 2896 wrote to memory of 1924 2896 msedge.exe 83 PID 2896 wrote to memory of 1924 2896 msedge.exe 83 PID 2896 wrote to memory of 1924 2896 msedge.exe 83 PID 2896 wrote to memory of 1924 2896 msedge.exe 83 PID 2896 wrote to memory of 1924 2896 msedge.exe 83 PID 2896 wrote to memory of 1924 2896 msedge.exe 83 PID 2896 wrote to memory of 1924 2896 msedge.exe 83 PID 2896 wrote to memory of 1924 2896 msedge.exe 83 PID 2896 wrote to memory of 1924 2896 msedge.exe 83 PID 2896 wrote to memory of 1924 2896 msedge.exe 83 PID 2896 wrote to memory of 1924 2896 msedge.exe 83 PID 2896 wrote to memory of 1924 2896 msedge.exe 83 PID 2896 wrote to memory of 2788 2896 msedge.exe 84 PID 2896 wrote to memory of 2788 2896 msedge.exe 84 PID 2896 wrote to memory of 4824 2896 msedge.exe 85 PID 2896 wrote to memory of 4824 2896 msedge.exe 85 PID 2896 wrote to memory of 4824 2896 msedge.exe 85 PID 2896 wrote to memory of 4824 2896 msedge.exe 85 PID 2896 wrote to memory of 4824 2896 msedge.exe 85 PID 2896 wrote to memory of 4824 2896 msedge.exe 85 PID 2896 wrote to memory of 4824 2896 msedge.exe 85 PID 2896 wrote to memory of 4824 2896 msedge.exe 85 PID 2896 wrote to memory of 4824 2896 msedge.exe 85 PID 2896 wrote to memory of 4824 2896 msedge.exe 85 PID 2896 wrote to memory of 4824 2896 msedge.exe 85 PID 2896 wrote to memory of 4824 2896 msedge.exe 85 PID 2896 wrote to memory of 4824 2896 msedge.exe 85 PID 2896 wrote to memory of 4824 2896 msedge.exe 85 PID 2896 wrote to memory of 4824 2896 msedge.exe 85 PID 2896 wrote to memory of 4824 2896 msedge.exe 85 PID 2896 wrote to memory of 4824 2896 msedge.exe 85 PID 2896 wrote to memory of 4824 2896 msedge.exe 85 PID 2896 wrote to memory of 4824 2896 msedge.exe 85 PID 2896 wrote to memory of 4824 2896 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\15b11a0b3169d189701f78b0b9751659_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc6c5646f8,0x7ffc6c564708,0x7ffc6c5647182⤵PID:4104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,17970241999774506105,5489697534720800448,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2200 /prefetch:22⤵PID:1924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,17970241999774506105,5489697534720800448,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2304 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,17970241999774506105,5489697534720800448,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2820 /prefetch:82⤵PID:4824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,17970241999774506105,5489697534720800448,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3180 /prefetch:12⤵PID:4716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,17970241999774506105,5489697534720800448,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3188 /prefetch:12⤵PID:60
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,17970241999774506105,5489697534720800448,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4724 /prefetch:12⤵PID:320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,17970241999774506105,5489697534720800448,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3576 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4308
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3184
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:224
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD553bc70ecb115bdbabe67620c416fe9b3
SHA1af66ec51a13a59639eaf54d62ff3b4f092bb2fc1
SHA256b36cad5c1f7bc7d07c7eaa2f3cad2959ddb5447d4d3adcb46eb6a99808e22771
SHA512cad44933b94e17908c0eb8ac5feeb53d03a7720d97e7ccc8724a1ed3021a5bece09e1f9f3cec56ce0739176ebbbeb20729e650f8bca04e5060c986b75d8e4921
-
Filesize
152B
MD5e765f3d75e6b0e4a7119c8b14d47d8da
SHA1cc9f7c7826c2e1a129e7d98884926076c3714fc0
SHA256986443556d3878258b710d9d9efbf4f25f0d764c3f83dc54217f2b12a6eccd89
SHA512a1872a849f27da78ebe9adb9beb260cb49ed5f4ca2d403f23379112bdfcd2482446a6708188100496e45db1517cdb43aba8bb93a75e605713c3f97cd716b1079
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD5b6f67c908d1ad13a1be6b3ed8329c6f7
SHA19e4519e666660f7acdd76a883d2b0819a9e36167
SHA2565f4644e57fbcfc5ffc5df5644349e7d389365c11a0a5819d053c30c848b58410
SHA51214a707c935149abedb3d5762f783f4e097a051a87d7cc63ddf122e8265b21b7580ba1738144510577f32c502e08b7fbd926e002093cbf04d8a43262f8d4c32df
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
5KB
MD555d9634c5622888976e2b41998b866fa
SHA17fc072165f61013bdb903fb0e804a3b30e18854b
SHA2566f648baaee5fffeadc1ee79834c230ba7b5bdf48f097a0cacb65685e7e90f8cd
SHA5129c46370627dc29e67c625a21de8cc0f3cbf01719ed76fc79f92484438964409ee86e12c4220e4d351406cf9ae065067b57cefa20c3cbb7f0f17645f15ffe73da
-
Filesize
6KB
MD546100a2f6e32bd1e6555e6b433e45692
SHA1316bfc959ede50573890e8f18b3904b48f11d670
SHA2561db6629ef51c9d93d3c468b92f011fbe6a8314efa09dd77a96c7e06509436ada
SHA51218620cfd47e64fe0182185d1c959411a00c4ced1ed61afb063dac87462225c6c7a337c154af02b9f0d8cf7009c2e7f0040ccba3c7b38f28d7e00839e951af0dd
-
Filesize
10KB
MD555eac1eafcda32511286167af01d9a9d
SHA135d7adf5ab61da3b6cded7b436cdbb6440dcf0a3
SHA256aabcc7bc12e2e70fc8b4948f824759c225b9db9489986d5dd1588c7b29aa78e5
SHA5125d27bb1d080d75035165a39726c827bd546844146f9666b5c89f31726f112b5deaf2d2cd69767f24ce8c6b62eff215389c0ce4a9a401e4ec14589dbee471d6a8