Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18/10/2024, 11:36
Static task
static1
Behavioral task
behavioral1
Sample
573a6ea4f49bdd0e9c172861638a0bf4_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
573a6ea4f49bdd0e9c172861638a0bf4_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
573a6ea4f49bdd0e9c172861638a0bf4_JaffaCakes118.html
-
Size
13KB
-
MD5
573a6ea4f49bdd0e9c172861638a0bf4
-
SHA1
e544c502aeb01ec0e1cbd8c412299879398fb10e
-
SHA256
b6fb6a54b325f56a7cd0003783d19af0c383dedfa6b792aad165c12cc9b00b95
-
SHA512
a24b21c520dce06de6a2a5f350406ad0e23d7d97a4ea36d57954aa1cafb8c64cda5f19e405f686782d10c2fa549c4a629a134f657b04df13499824bddc660f72
-
SSDEEP
192:2wh65jcTfdD1XTR9K/LAh0NzhdvIXzHhvr/SJ630cl7qMNTsA/FSeBPG404lmP3P:zmc5hDRM/LAhCNGLhTqs3Ll7A0S4P2V
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2644 msedge.exe 2644 msedge.exe 3324 msedge.exe 3324 msedge.exe 392 identity_helper.exe 392 identity_helper.exe 5760 msedge.exe 5760 msedge.exe 5760 msedge.exe 5760 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3324 wrote to memory of 1864 3324 msedge.exe 84 PID 3324 wrote to memory of 1864 3324 msedge.exe 84 PID 3324 wrote to memory of 808 3324 msedge.exe 85 PID 3324 wrote to memory of 808 3324 msedge.exe 85 PID 3324 wrote to memory of 808 3324 msedge.exe 85 PID 3324 wrote to memory of 808 3324 msedge.exe 85 PID 3324 wrote to memory of 808 3324 msedge.exe 85 PID 3324 wrote to memory of 808 3324 msedge.exe 85 PID 3324 wrote to memory of 808 3324 msedge.exe 85 PID 3324 wrote to memory of 808 3324 msedge.exe 85 PID 3324 wrote to memory of 808 3324 msedge.exe 85 PID 3324 wrote to memory of 808 3324 msedge.exe 85 PID 3324 wrote to memory of 808 3324 msedge.exe 85 PID 3324 wrote to memory of 808 3324 msedge.exe 85 PID 3324 wrote to memory of 808 3324 msedge.exe 85 PID 3324 wrote to memory of 808 3324 msedge.exe 85 PID 3324 wrote to memory of 808 3324 msedge.exe 85 PID 3324 wrote to memory of 808 3324 msedge.exe 85 PID 3324 wrote to memory of 808 3324 msedge.exe 85 PID 3324 wrote to memory of 808 3324 msedge.exe 85 PID 3324 wrote to memory of 808 3324 msedge.exe 85 PID 3324 wrote to memory of 808 3324 msedge.exe 85 PID 3324 wrote to memory of 808 3324 msedge.exe 85 PID 3324 wrote to memory of 808 3324 msedge.exe 85 PID 3324 wrote to memory of 808 3324 msedge.exe 85 PID 3324 wrote to memory of 808 3324 msedge.exe 85 PID 3324 wrote to memory of 808 3324 msedge.exe 85 PID 3324 wrote to memory of 808 3324 msedge.exe 85 PID 3324 wrote to memory of 808 3324 msedge.exe 85 PID 3324 wrote to memory of 808 3324 msedge.exe 85 PID 3324 wrote to memory of 808 3324 msedge.exe 85 PID 3324 wrote to memory of 808 3324 msedge.exe 85 PID 3324 wrote to memory of 808 3324 msedge.exe 85 PID 3324 wrote to memory of 808 3324 msedge.exe 85 PID 3324 wrote to memory of 808 3324 msedge.exe 85 PID 3324 wrote to memory of 808 3324 msedge.exe 85 PID 3324 wrote to memory of 808 3324 msedge.exe 85 PID 3324 wrote to memory of 808 3324 msedge.exe 85 PID 3324 wrote to memory of 808 3324 msedge.exe 85 PID 3324 wrote to memory of 808 3324 msedge.exe 85 PID 3324 wrote to memory of 808 3324 msedge.exe 85 PID 3324 wrote to memory of 808 3324 msedge.exe 85 PID 3324 wrote to memory of 2644 3324 msedge.exe 86 PID 3324 wrote to memory of 2644 3324 msedge.exe 86 PID 3324 wrote to memory of 2932 3324 msedge.exe 87 PID 3324 wrote to memory of 2932 3324 msedge.exe 87 PID 3324 wrote to memory of 2932 3324 msedge.exe 87 PID 3324 wrote to memory of 2932 3324 msedge.exe 87 PID 3324 wrote to memory of 2932 3324 msedge.exe 87 PID 3324 wrote to memory of 2932 3324 msedge.exe 87 PID 3324 wrote to memory of 2932 3324 msedge.exe 87 PID 3324 wrote to memory of 2932 3324 msedge.exe 87 PID 3324 wrote to memory of 2932 3324 msedge.exe 87 PID 3324 wrote to memory of 2932 3324 msedge.exe 87 PID 3324 wrote to memory of 2932 3324 msedge.exe 87 PID 3324 wrote to memory of 2932 3324 msedge.exe 87 PID 3324 wrote to memory of 2932 3324 msedge.exe 87 PID 3324 wrote to memory of 2932 3324 msedge.exe 87 PID 3324 wrote to memory of 2932 3324 msedge.exe 87 PID 3324 wrote to memory of 2932 3324 msedge.exe 87 PID 3324 wrote to memory of 2932 3324 msedge.exe 87 PID 3324 wrote to memory of 2932 3324 msedge.exe 87 PID 3324 wrote to memory of 2932 3324 msedge.exe 87 PID 3324 wrote to memory of 2932 3324 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\573a6ea4f49bdd0e9c172861638a0bf4_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3324 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd875a46f8,0x7ffd875a4708,0x7ffd875a47182⤵PID:1864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2024,8902154601958822764,8505652798386526674,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2056 /prefetch:22⤵PID:808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2024,8902154601958822764,8505652798386526674,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2428 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2024,8902154601958822764,8505652798386526674,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2840 /prefetch:82⤵PID:2932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,8902154601958822764,8505652798386526674,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:1428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,8902154601958822764,8505652798386526674,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:4312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,8902154601958822764,8505652798386526674,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4600 /prefetch:12⤵PID:792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,8902154601958822764,8505652798386526674,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3836 /prefetch:12⤵PID:4772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,8902154601958822764,8505652798386526674,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5540 /prefetch:12⤵PID:4420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2024,8902154601958822764,8505652798386526674,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5656 /prefetch:82⤵PID:4300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2024,8902154601958822764,8505652798386526674,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5656 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,8902154601958822764,8505652798386526674,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5568 /prefetch:12⤵PID:3996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,8902154601958822764,8505652798386526674,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5624 /prefetch:12⤵PID:4616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,8902154601958822764,8505652798386526674,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6156 /prefetch:12⤵PID:3320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,8902154601958822764,8505652798386526674,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5728 /prefetch:12⤵PID:3944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2024,8902154601958822764,8505652798386526674,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5760
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1692
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4496
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556a4f78e21616a6e19da57228569489b
SHA121bfabbfc294d5f2aa1da825c5590d760483bc76
SHA256d036661e765ee8fd18978a2b5501e8df6b220e4bca531d9860407555294c96fb
SHA512c2c3cd1152bb486028fe75ab3ce0d0bc9d64c4ca7eb8860ddd934b2f6e0140d2c913af4fa082b88e92a6a6d20fd483a1cb9813209f371a0f56374bc97d7f863b
-
Filesize
152B
MD5e443ee4336fcf13c698b8ab5f3c173d0
SHA19bf70b16f03820cbe3158e1f1396b07b8ac9d75a
SHA25679e277da2074f9467e0518f0f26ca2ba74914bee82553f935a0ccf64a0119e8b
SHA512cbf6f6aa0ea69b47f51592296da2b7be1180e7b483c61b4d17ba9ee1a2d3345cbe0987b96f4e25de1438b553db358f330aad8a26e8522601f055c3d5a8313cdd
-
Filesize
215KB
MD50e3d96124ecfd1e2818dfd4d5f21352a
SHA1098b1aa4b26d3c77d24dc2ffd335d2f3a7aeb5d7
SHA256eef545efdb498b725fbabeedd5b80cec3c60357df9bc2943cfd7c8d5ae061dcc
SHA512c02d65d901e26d0ed28600fa739f1aa42184e00b4e9919f1e4e9623fe9d07a2e2c35b0215d4f101afc1e32fc101a200ca4244eb1d9ca846065d387144451331c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize312B
MD5abe927994eee8a2dd2706530808df92c
SHA1b1d52e0dc4a82577484d4b02d2ca4d0fcd32f091
SHA2568902cc80a6da4131aebaaf503f1851c220b77e3af5cce41ea1ae5b1171123476
SHA51256ce47ac01ab8b37d548681b4a36675ce7fb68522067d8519c357416fc82c02647c05e7d2e97d0f6b3c063ea39d9a5003e58e6f0abf0026f9751810cbc070bae
-
Filesize
1KB
MD5fa2246effd10924f1aef310022a6bc73
SHA180314fac528a7e2a571146c2c3e86f9c2446190f
SHA256cb5f57ab2493142e4a26384d76a8a742110c923ea8837833f850e4689326db54
SHA512592905efeb59eb481891ce18fdaa042b3f59ccd04e772f60384fe6ed7648f5a495c3a02e52f3fc8ba608f0eedffdc38405023ff6232f963162e076830f7352b4
-
Filesize
6KB
MD5685da4c081e64d8ab910c9c05ab22325
SHA14c0e9ec2501d59c320c4d702a2a8590d468a8f9b
SHA25637be66fc4e6e0abc4554cad4504fc72a396928cbc9f6466837900a4f1fd59fc1
SHA51294d7366b37c559a44f2e516a522895e4a8698f457a9f8d2afccd8287b5ee93a1954b706be702cbbf10b5623399164a3bbf6f44ae4a0e2dc365e2f00a0e77d53d
-
Filesize
5KB
MD5d00c2c3c6287b0b94f2533c9fa69ace8
SHA12ac19f261e2c2158918a62b74bd0964f04c770f9
SHA256f267640c1ee3039fe267a198f1db4e4bbc878857c57ad1b7f002c0a3c469afe8
SHA512112d7f084effa635fd6e39a82f9cb0fdc66e489f1f7482bad8a01ff72d74216f23528876f8ec61f2a4701b4379aefe243025710e7f66bac5dc57b5a84badf47b
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5ec0e4d2bc0ff18654445a2da94b3a193
SHA1374b2f627dbf7864793f13c5f739ebd681781c18
SHA256233295577e310096406c33f3cc683e4f7697ecd4e6850487a37a6dceb78ab5f8
SHA5122b0eb95b389ad15dc541304c8b8f3da7dcc1442f78973566dfbb9f74deb4bcd66978d15e5c7b3199a2711a60629265c3b6b59af3ba919aa6680ec8097953c04d