Analysis
-
max time kernel
146s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18/10/2024, 07:07
Static task
static1
Behavioral task
behavioral1
Sample
5615b7616dfaac35d8b64faa59358a8f_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5615b7616dfaac35d8b64faa59358a8f_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
5615b7616dfaac35d8b64faa59358a8f_JaffaCakes118.html
-
Size
57KB
-
MD5
5615b7616dfaac35d8b64faa59358a8f
-
SHA1
1074f5114acb00ccbf992ab631118dca31eb441b
-
SHA256
a279210fcf8512a29534209157c70429ca580a327724bfb4ed25fbf3cad4ec75
-
SHA512
a9cb44ba11a7307974cb6cd6174156f1d43c733d6857b2f9ec6488b2eb49ba4ffe185861717f462a29d85cf4cbc2b02453f0411cd08718b5125f8650967b4e70
-
SSDEEP
1536:ijEQvK8OPHdyA5o2vgyHJv0owbd6zKD6CDK2RVrozswpDK2RVy:ijnOPHdyz2vgyHJutDK2RVrozswpDK2m
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3872 msedge.exe 3872 msedge.exe 1880 msedge.exe 1880 msedge.exe 4100 identity_helper.exe 4100 identity_helper.exe 760 msedge.exe 760 msedge.exe 760 msedge.exe 760 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe 1880 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1880 wrote to memory of 4572 1880 msedge.exe 84 PID 1880 wrote to memory of 4572 1880 msedge.exe 84 PID 1880 wrote to memory of 952 1880 msedge.exe 85 PID 1880 wrote to memory of 952 1880 msedge.exe 85 PID 1880 wrote to memory of 952 1880 msedge.exe 85 PID 1880 wrote to memory of 952 1880 msedge.exe 85 PID 1880 wrote to memory of 952 1880 msedge.exe 85 PID 1880 wrote to memory of 952 1880 msedge.exe 85 PID 1880 wrote to memory of 952 1880 msedge.exe 85 PID 1880 wrote to memory of 952 1880 msedge.exe 85 PID 1880 wrote to memory of 952 1880 msedge.exe 85 PID 1880 wrote to memory of 952 1880 msedge.exe 85 PID 1880 wrote to memory of 952 1880 msedge.exe 85 PID 1880 wrote to memory of 952 1880 msedge.exe 85 PID 1880 wrote to memory of 952 1880 msedge.exe 85 PID 1880 wrote to memory of 952 1880 msedge.exe 85 PID 1880 wrote to memory of 952 1880 msedge.exe 85 PID 1880 wrote to memory of 952 1880 msedge.exe 85 PID 1880 wrote to memory of 952 1880 msedge.exe 85 PID 1880 wrote to memory of 952 1880 msedge.exe 85 PID 1880 wrote to memory of 952 1880 msedge.exe 85 PID 1880 wrote to memory of 952 1880 msedge.exe 85 PID 1880 wrote to memory of 952 1880 msedge.exe 85 PID 1880 wrote to memory of 952 1880 msedge.exe 85 PID 1880 wrote to memory of 952 1880 msedge.exe 85 PID 1880 wrote to memory of 952 1880 msedge.exe 85 PID 1880 wrote to memory of 952 1880 msedge.exe 85 PID 1880 wrote to memory of 952 1880 msedge.exe 85 PID 1880 wrote to memory of 952 1880 msedge.exe 85 PID 1880 wrote to memory of 952 1880 msedge.exe 85 PID 1880 wrote to memory of 952 1880 msedge.exe 85 PID 1880 wrote to memory of 952 1880 msedge.exe 85 PID 1880 wrote to memory of 952 1880 msedge.exe 85 PID 1880 wrote to memory of 952 1880 msedge.exe 85 PID 1880 wrote to memory of 952 1880 msedge.exe 85 PID 1880 wrote to memory of 952 1880 msedge.exe 85 PID 1880 wrote to memory of 952 1880 msedge.exe 85 PID 1880 wrote to memory of 952 1880 msedge.exe 85 PID 1880 wrote to memory of 952 1880 msedge.exe 85 PID 1880 wrote to memory of 952 1880 msedge.exe 85 PID 1880 wrote to memory of 952 1880 msedge.exe 85 PID 1880 wrote to memory of 952 1880 msedge.exe 85 PID 1880 wrote to memory of 3872 1880 msedge.exe 86 PID 1880 wrote to memory of 3872 1880 msedge.exe 86 PID 1880 wrote to memory of 3044 1880 msedge.exe 87 PID 1880 wrote to memory of 3044 1880 msedge.exe 87 PID 1880 wrote to memory of 3044 1880 msedge.exe 87 PID 1880 wrote to memory of 3044 1880 msedge.exe 87 PID 1880 wrote to memory of 3044 1880 msedge.exe 87 PID 1880 wrote to memory of 3044 1880 msedge.exe 87 PID 1880 wrote to memory of 3044 1880 msedge.exe 87 PID 1880 wrote to memory of 3044 1880 msedge.exe 87 PID 1880 wrote to memory of 3044 1880 msedge.exe 87 PID 1880 wrote to memory of 3044 1880 msedge.exe 87 PID 1880 wrote to memory of 3044 1880 msedge.exe 87 PID 1880 wrote to memory of 3044 1880 msedge.exe 87 PID 1880 wrote to memory of 3044 1880 msedge.exe 87 PID 1880 wrote to memory of 3044 1880 msedge.exe 87 PID 1880 wrote to memory of 3044 1880 msedge.exe 87 PID 1880 wrote to memory of 3044 1880 msedge.exe 87 PID 1880 wrote to memory of 3044 1880 msedge.exe 87 PID 1880 wrote to memory of 3044 1880 msedge.exe 87 PID 1880 wrote to memory of 3044 1880 msedge.exe 87 PID 1880 wrote to memory of 3044 1880 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\5615b7616dfaac35d8b64faa59358a8f_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1880 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe7cae46f8,0x7ffe7cae4708,0x7ffe7cae47182⤵PID:4572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2000,225519968928578534,1059977508778382386,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:22⤵PID:952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2000,225519968928578534,1059977508778382386,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2000,225519968928578534,1059977508778382386,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2840 /prefetch:82⤵PID:3044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,225519968928578534,1059977508778382386,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3180 /prefetch:12⤵PID:1900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,225519968928578534,1059977508778382386,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3188 /prefetch:12⤵PID:1932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,225519968928578534,1059977508778382386,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4644 /prefetch:12⤵PID:4408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,225519968928578534,1059977508778382386,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5192 /prefetch:12⤵PID:4036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,225519968928578534,1059977508778382386,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5424 /prefetch:12⤵PID:4696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,225519968928578534,1059977508778382386,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:4560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,225519968928578534,1059977508778382386,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5968 /prefetch:12⤵PID:3852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,225519968928578534,1059977508778382386,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5912 /prefetch:12⤵PID:2272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2000,225519968928578534,1059977508778382386,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3512 /prefetch:82⤵PID:4816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2000,225519968928578534,1059977508778382386,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3512 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,225519968928578534,1059977508778382386,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4960 /prefetch:12⤵PID:2692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2000,225519968928578534,1059977508778382386,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4900 /prefetch:12⤵PID:1408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2000,225519968928578534,1059977508778382386,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1048 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:760
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3756
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4100
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD599afa4934d1e3c56bbce114b356e8a99
SHA13f0e7a1a28d9d9c06b6663df5d83a65c84d52581
SHA25608e098bb97fd91d815469cdfd5568607a3feca61f18b6b5b9c11b531fde206c8
SHA51276686f30ed68144cf943b80ac10b52c74eee84f197cee3c24ef7845ef44bdb5586b6e530824543deeed59417205ac0e2559808bcb46450504106ac8f4c95b9da
-
Filesize
152B
MD5443a627d539ca4eab732bad0cbe7332b
SHA186b18b906a1acd2a22f4b2c78ac3564c394a9569
SHA2561e1ad9dce141f5f17ea07c7e9c2a65e707c9943f172b9134b0daf9eef25f0dc9
SHA512923b86d75a565c91250110162ce13dd3ef3f6bdde1a83f7af235ed302d4a96b8c9ed722e2152781e699dfcb26bb98afc73f5adb298f8fd673f14c9f28b5f764d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize792B
MD5af1189d624c8d194e3f5745e649bd6e4
SHA1eb98c375a0caf74abaf1496e86fd0e3ef815b26f
SHA25629627c2c32b2eae459cfe828302b7bd34916af1994131cacd57160968992005d
SHA5121c00c0b619cc712748cd760f4f2e8a9f8b38a0be74ccadb3ecaf757b1735b20f1dd29949b0f44bba2632314c814553e35dc087ee42bb331f97085db5ee4d84b9
-
Filesize
1KB
MD55840382c03eacdea651b7d05218d9b7a
SHA1fc9b935beee26a46204ae5e7dd777e99a8f71789
SHA256ba9ea48aeeecaa013c6fab35e1f1ce685784f08f8dcc99334c386f23de101563
SHA512750a424abc1998f95ce10303dd6e0b05f22eb3dcbcf7884d16577359c397081df5b3e7723f5921e2e089b4091a4fd0f6d2cde87cb52088ff0227f6fa33300996
-
Filesize
5KB
MD58d9382adf441b783f35da8f087708ee9
SHA1717bf22f0c760e7dcb25df4cbe98912fcd11a52e
SHA2561c9f05eea266385edc020301cb4aa1e8c7d43fa415ee89cc10a2a3aab03a6523
SHA51266bba17dc34b9dc2915d3983a2b029de55526406281560cae0dc254c81dd6d68efa1315460f131c1b36e5633e38a55a56a46512ab065df9d9898459877769815
-
Filesize
6KB
MD54785eb19617c254d73869a409cec03e8
SHA17ac341bf82eae99b3b57e8c33863abcbca0e16e5
SHA2565827c65e92a0ec9775137d2fcd47ef9d709f36e474301a0b84d420e9aa2d980f
SHA5124a718b7b1cb65a9490e75cf26aa951e3d8ebbc577f45c97a0053ea87a24449aad9015014e6ea3f5e4158002a8638d577c7c75ef10f98833747a35a5241d0dcc8
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5e543e10b3f7b5f75b62f8493389b26fc
SHA14638e9185dcfd07e3ff356ab7f645d28e89eac58
SHA256961c9bc4f7e3c40b5ae24fdcdb6e6b5823efb7981991c3c50458487ec7290bf1
SHA512c5387d6c606b78a16eb94b568fe2cd5c2197dcb62ab9275162b774ab728290c64b1aa8dba5e8b15a3c2c4fb1b6df6db3846d62d1749aa4ccabc4980d815f9c3c