Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13-10-2024 15:07
Static task
static1
Behavioral task
behavioral1
Sample
408b9a994b18159fc8fe8483c48fa33b_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
408b9a994b18159fc8fe8483c48fa33b_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
408b9a994b18159fc8fe8483c48fa33b_JaffaCakes118.html
-
Size
245KB
-
MD5
408b9a994b18159fc8fe8483c48fa33b
-
SHA1
29650afd68adc585866b8dce007f5e9ca53b5fdf
-
SHA256
7823420aa1b9dd5ff9e41aa1a204353b64e30904eb9f915758ef92b65546d5db
-
SHA512
8a011c659e43db23eed3fa2255800cead4b6ae931ce0708dc4d18a9d06125593b43611c0f3c7a0ef79b51472963642b6a5f8131cfae8411db3f739e80a243440
-
SSDEEP
3072:osHoddhSRlw3urMRyA1DaLAZr+5/xTd5Wbb45RAU4cG5GRbmI6eMXJA/PGcxsZYO:hnrMDDaL1vz/lP2V+iusn9
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 19 sites.google.com 18 sites.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2568 msedge.exe 2568 msedge.exe 4460 msedge.exe 4460 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 3168 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 3168 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe 4460 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4460 wrote to memory of 1192 4460 msedge.exe 83 PID 4460 wrote to memory of 1192 4460 msedge.exe 83 PID 4460 wrote to memory of 1160 4460 msedge.exe 84 PID 4460 wrote to memory of 1160 4460 msedge.exe 84 PID 4460 wrote to memory of 1160 4460 msedge.exe 84 PID 4460 wrote to memory of 1160 4460 msedge.exe 84 PID 4460 wrote to memory of 1160 4460 msedge.exe 84 PID 4460 wrote to memory of 1160 4460 msedge.exe 84 PID 4460 wrote to memory of 1160 4460 msedge.exe 84 PID 4460 wrote to memory of 1160 4460 msedge.exe 84 PID 4460 wrote to memory of 1160 4460 msedge.exe 84 PID 4460 wrote to memory of 1160 4460 msedge.exe 84 PID 4460 wrote to memory of 1160 4460 msedge.exe 84 PID 4460 wrote to memory of 1160 4460 msedge.exe 84 PID 4460 wrote to memory of 1160 4460 msedge.exe 84 PID 4460 wrote to memory of 1160 4460 msedge.exe 84 PID 4460 wrote to memory of 1160 4460 msedge.exe 84 PID 4460 wrote to memory of 1160 4460 msedge.exe 84 PID 4460 wrote to memory of 1160 4460 msedge.exe 84 PID 4460 wrote to memory of 1160 4460 msedge.exe 84 PID 4460 wrote to memory of 1160 4460 msedge.exe 84 PID 4460 wrote to memory of 1160 4460 msedge.exe 84 PID 4460 wrote to memory of 1160 4460 msedge.exe 84 PID 4460 wrote to memory of 1160 4460 msedge.exe 84 PID 4460 wrote to memory of 1160 4460 msedge.exe 84 PID 4460 wrote to memory of 1160 4460 msedge.exe 84 PID 4460 wrote to memory of 1160 4460 msedge.exe 84 PID 4460 wrote to memory of 1160 4460 msedge.exe 84 PID 4460 wrote to memory of 1160 4460 msedge.exe 84 PID 4460 wrote to memory of 1160 4460 msedge.exe 84 PID 4460 wrote to memory of 1160 4460 msedge.exe 84 PID 4460 wrote to memory of 1160 4460 msedge.exe 84 PID 4460 wrote to memory of 1160 4460 msedge.exe 84 PID 4460 wrote to memory of 1160 4460 msedge.exe 84 PID 4460 wrote to memory of 1160 4460 msedge.exe 84 PID 4460 wrote to memory of 1160 4460 msedge.exe 84 PID 4460 wrote to memory of 1160 4460 msedge.exe 84 PID 4460 wrote to memory of 1160 4460 msedge.exe 84 PID 4460 wrote to memory of 1160 4460 msedge.exe 84 PID 4460 wrote to memory of 1160 4460 msedge.exe 84 PID 4460 wrote to memory of 1160 4460 msedge.exe 84 PID 4460 wrote to memory of 1160 4460 msedge.exe 84 PID 4460 wrote to memory of 2568 4460 msedge.exe 85 PID 4460 wrote to memory of 2568 4460 msedge.exe 85 PID 4460 wrote to memory of 4088 4460 msedge.exe 86 PID 4460 wrote to memory of 4088 4460 msedge.exe 86 PID 4460 wrote to memory of 4088 4460 msedge.exe 86 PID 4460 wrote to memory of 4088 4460 msedge.exe 86 PID 4460 wrote to memory of 4088 4460 msedge.exe 86 PID 4460 wrote to memory of 4088 4460 msedge.exe 86 PID 4460 wrote to memory of 4088 4460 msedge.exe 86 PID 4460 wrote to memory of 4088 4460 msedge.exe 86 PID 4460 wrote to memory of 4088 4460 msedge.exe 86 PID 4460 wrote to memory of 4088 4460 msedge.exe 86 PID 4460 wrote to memory of 4088 4460 msedge.exe 86 PID 4460 wrote to memory of 4088 4460 msedge.exe 86 PID 4460 wrote to memory of 4088 4460 msedge.exe 86 PID 4460 wrote to memory of 4088 4460 msedge.exe 86 PID 4460 wrote to memory of 4088 4460 msedge.exe 86 PID 4460 wrote to memory of 4088 4460 msedge.exe 86 PID 4460 wrote to memory of 4088 4460 msedge.exe 86 PID 4460 wrote to memory of 4088 4460 msedge.exe 86 PID 4460 wrote to memory of 4088 4460 msedge.exe 86 PID 4460 wrote to memory of 4088 4460 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\408b9a994b18159fc8fe8483c48fa33b_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4460 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcc0e546f8,0x7ffcc0e54708,0x7ffcc0e547182⤵PID:1192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,6662588251645729022,8626448713341756988,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2156 /prefetch:22⤵PID:1160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2148,6662588251645729022,8626448713341756988,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2232 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2148,6662588251645729022,8626448713341756988,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2900 /prefetch:82⤵PID:4088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,6662588251645729022,8626448713341756988,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,6662588251645729022,8626448713341756988,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:3876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,6662588251645729022,8626448713341756988,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2044 /prefetch:12⤵PID:4612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,6662588251645729022,8626448713341756988,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4856 /prefetch:12⤵PID:3004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,6662588251645729022,8626448713341756988,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5824 /prefetch:12⤵PID:5076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2148,6662588251645729022,8626448713341756988,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5372 /prefetch:82⤵PID:3628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,6662588251645729022,8626448713341756988,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5480 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4032
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3384
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4720
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x504 0x4981⤵
- Suspicious use of AdjustPrivilegeToken
PID:3168
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD50a9dc42e4013fc47438e96d24beb8eff
SHA1806ab26d7eae031a58484188a7eb1adab06457fc
SHA25658d66151799526b3fa372552cd99b385415d9e9a119302b99aadc34dd51dd151
SHA512868d6b421ae2501a519595d0c34ddef25b2a98b082c5203da8349035f1f6764ddf183197f1054e7e86a752c71eccbc0649e515b63c55bc18cf5f0592397e258f
-
Filesize
152B
MD561cef8e38cd95bf003f5fdd1dc37dae1
SHA111f2f79ecb349344c143eea9a0fed41891a3467f
SHA256ae671613623b4477fbd5daf1fd2d148ae2a09ddcc3804b2b6d4ffcb60b317e3e
SHA5126fb9b333fe0e8fde19fdd0bd01a1990a4e60a87c0a02bc8297da1206e42f8690d06b030308e58c862e9e77714a585eed7cc1627590d99a10aeb77fc0dd3d864d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD5769e40bcf851d84dcad830e4df3068ca
SHA1a0965ef5786911bf77440c565edefb75f11c3ee1
SHA256830b7fbf4aa2fd08e10c5f30c0dcd4e0fb5509755ada13d28571c3f163650431
SHA512313783801d00374ff56e4cc718d988eb74b12c2ae8cb64f05cc1fd7d665189ea93211d5bf49189db7d60a8540a952d05c427e45ac24348aa44a8392b29a860ec
-
Filesize
1KB
MD508aaf8e2e9025d7717c089d0c41225c3
SHA1537e3699f6753bbd6fa99986229131b6f98d5051
SHA25655f41b760a10eaf3d3bb9767d975b2899a3456b10364edf583a290dc6c04bef0
SHA512fcafc665a7f5422dc8f96e50864866c6b1c166175d52a969e49c3a1e23dea5793fde47969b2a94699e4359199a4e4c7ec4c371d530031549c66d328fc883117a
-
Filesize
1KB
MD55e891afe31747fd58ad2f81774a9da5a
SHA1d4d4cbb195918ff3b6e2a9c250530c04e90a6321
SHA256d292a07e99ff25e840396fec1b1fe47b4aa062eaa3e29790a073daa64ae0aed4
SHA5124abab1d733b41bd4a7139bff19d77e015d9cbf9c448577013310eabd4dd85a4b02eab38b0770f07715a2e5f9b53685b2dacef539a6a148f2fd981fbcd79ac253
-
Filesize
6KB
MD53210f1f1e96a85cdfc63a8329780e3b5
SHA1c8a8763b71d6907273e36c4319ac7693c55ae92b
SHA256b91001c4eda0c3c9fcb0765c58855e69f267de7002b5a7902be398cee22a9d86
SHA512150ca3518ae1c67060e23b0adc17e90180f6a4c24b269120c81bf1709cdbe7036573da048aae82a4ae0aa16b08fa58e33ec2749322e89d1c5253ea3e78393563
-
Filesize
7KB
MD59221970eb1a2d1f0f2735e2226c32dfe
SHA1f9a5adf4883d2125fee03ce7f8844fc9fd6ca96b
SHA256565eeb4ce7d66c172ed274d0f64002744180908ef6bd54bc29813eda55b6c7e1
SHA5120679235b1f02da9ff690b5934c691d64285ee7f49ab7b78d79f938a3fb5472f0d31f9d23184ad02f708db852d7b248e505583132279303273a7c2cafa8bbdcb6
-
Filesize
540B
MD5af7a109665d4cbb29cad0bdcccc0a417
SHA1501fdbed1ac448a96e6b415e91766069d6cdc9cb
SHA256172554f1e8adaa527f0a6bea135840cb9de2587e8eef8d39262b2a9b83dd6ae0
SHA51252eaa4ecda745c96548db8dd81a27466927335990ddcc4f7d2255f1a3e0ad7394348376b89e4b31aea06eb61f7ef39f90b1e2083f50408af9c2367b0f2a176ff
-
Filesize
204B
MD5c607167925a8cb4d10b91b9e4074840c
SHA1308029992691177a85759404f6bcbdc59cc4720f
SHA2563efd385f8fe826bc018a5f4885de5c165f6d72f1a22378234cc28e35717c020e
SHA5129dd888842a8bad251c847966ca662512ada5393060594f3d946f4865d47ad06b0cfd9a7bee86da29b6e8534205c347a8b7b408fb62378dd12faf5a0dfce23fb7
-
Filesize
10KB
MD5ec3ce9f93903490c146644fd6def668b
SHA17b475d8f9b6dc35587ddfd84ccbdc889f5f3be1f
SHA2561ac25b9848f9df945caf6ae538ab3d108c0a271ef8bebc7b44fe3edc1d07d2d9
SHA51234c1cede4cfd6a6df5734620b238d136b58cf679dacc42fd6e23b3a2363b726e0f7e4a2bfaef65f49cfa935368600d7f60729f1d643686826cd1de897a6fd162