Analysis
-
max time kernel
149s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
08-04-2024 18:42
Static task
static1
Behavioral task
behavioral1
Sample
e826698ad7499c5df6d4997152f8f0ef_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e826698ad7499c5df6d4997152f8f0ef_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
e826698ad7499c5df6d4997152f8f0ef_JaffaCakes118.html
-
Size
97KB
-
MD5
e826698ad7499c5df6d4997152f8f0ef
-
SHA1
2cad88571c2abe467f998bf6f423efd675e8ea83
-
SHA256
7377508e8ef5991a97febfdbad4de1064c0abcc390d847689be6c963eae1e427
-
SHA512
053ec1c3db15ea5aec678bea920effcae8b79da8bcafca51280a30cb2160c73e7b0b2eea5df8033cca860a9bf68e8c10f451312d77725e571e0140a4befbb942
-
SSDEEP
1536:ER7pIgPGjH5hZumNts+j5QdmV+1K7TbDAcRqlL0Kbjgszfq:8pIKGjH/N++j5QdmEvjjzfq
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2140 msedge.exe 2140 msedge.exe 4308 msedge.exe 4308 msedge.exe 4280 identity_helper.exe 4280 identity_helper.exe 2384 msedge.exe 2384 msedge.exe 2384 msedge.exe 2384 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4308 wrote to memory of 3212 4308 msedge.exe 85 PID 4308 wrote to memory of 3212 4308 msedge.exe 85 PID 4308 wrote to memory of 2704 4308 msedge.exe 86 PID 4308 wrote to memory of 2704 4308 msedge.exe 86 PID 4308 wrote to memory of 2704 4308 msedge.exe 86 PID 4308 wrote to memory of 2704 4308 msedge.exe 86 PID 4308 wrote to memory of 2704 4308 msedge.exe 86 PID 4308 wrote to memory of 2704 4308 msedge.exe 86 PID 4308 wrote to memory of 2704 4308 msedge.exe 86 PID 4308 wrote to memory of 2704 4308 msedge.exe 86 PID 4308 wrote to memory of 2704 4308 msedge.exe 86 PID 4308 wrote to memory of 2704 4308 msedge.exe 86 PID 4308 wrote to memory of 2704 4308 msedge.exe 86 PID 4308 wrote to memory of 2704 4308 msedge.exe 86 PID 4308 wrote to memory of 2704 4308 msedge.exe 86 PID 4308 wrote to memory of 2704 4308 msedge.exe 86 PID 4308 wrote to memory of 2704 4308 msedge.exe 86 PID 4308 wrote to memory of 2704 4308 msedge.exe 86 PID 4308 wrote to memory of 2704 4308 msedge.exe 86 PID 4308 wrote to memory of 2704 4308 msedge.exe 86 PID 4308 wrote to memory of 2704 4308 msedge.exe 86 PID 4308 wrote to memory of 2704 4308 msedge.exe 86 PID 4308 wrote to memory of 2704 4308 msedge.exe 86 PID 4308 wrote to memory of 2704 4308 msedge.exe 86 PID 4308 wrote to memory of 2704 4308 msedge.exe 86 PID 4308 wrote to memory of 2704 4308 msedge.exe 86 PID 4308 wrote to memory of 2704 4308 msedge.exe 86 PID 4308 wrote to memory of 2704 4308 msedge.exe 86 PID 4308 wrote to memory of 2704 4308 msedge.exe 86 PID 4308 wrote to memory of 2704 4308 msedge.exe 86 PID 4308 wrote to memory of 2704 4308 msedge.exe 86 PID 4308 wrote to memory of 2704 4308 msedge.exe 86 PID 4308 wrote to memory of 2704 4308 msedge.exe 86 PID 4308 wrote to memory of 2704 4308 msedge.exe 86 PID 4308 wrote to memory of 2704 4308 msedge.exe 86 PID 4308 wrote to memory of 2704 4308 msedge.exe 86 PID 4308 wrote to memory of 2704 4308 msedge.exe 86 PID 4308 wrote to memory of 2704 4308 msedge.exe 86 PID 4308 wrote to memory of 2704 4308 msedge.exe 86 PID 4308 wrote to memory of 2704 4308 msedge.exe 86 PID 4308 wrote to memory of 2704 4308 msedge.exe 86 PID 4308 wrote to memory of 2704 4308 msedge.exe 86 PID 4308 wrote to memory of 2140 4308 msedge.exe 87 PID 4308 wrote to memory of 2140 4308 msedge.exe 87 PID 4308 wrote to memory of 3620 4308 msedge.exe 88 PID 4308 wrote to memory of 3620 4308 msedge.exe 88 PID 4308 wrote to memory of 3620 4308 msedge.exe 88 PID 4308 wrote to memory of 3620 4308 msedge.exe 88 PID 4308 wrote to memory of 3620 4308 msedge.exe 88 PID 4308 wrote to memory of 3620 4308 msedge.exe 88 PID 4308 wrote to memory of 3620 4308 msedge.exe 88 PID 4308 wrote to memory of 3620 4308 msedge.exe 88 PID 4308 wrote to memory of 3620 4308 msedge.exe 88 PID 4308 wrote to memory of 3620 4308 msedge.exe 88 PID 4308 wrote to memory of 3620 4308 msedge.exe 88 PID 4308 wrote to memory of 3620 4308 msedge.exe 88 PID 4308 wrote to memory of 3620 4308 msedge.exe 88 PID 4308 wrote to memory of 3620 4308 msedge.exe 88 PID 4308 wrote to memory of 3620 4308 msedge.exe 88 PID 4308 wrote to memory of 3620 4308 msedge.exe 88 PID 4308 wrote to memory of 3620 4308 msedge.exe 88 PID 4308 wrote to memory of 3620 4308 msedge.exe 88 PID 4308 wrote to memory of 3620 4308 msedge.exe 88 PID 4308 wrote to memory of 3620 4308 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\e826698ad7499c5df6d4997152f8f0ef_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4308 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe3c5546f8,0x7ffe3c554708,0x7ffe3c5547182⤵PID:3212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2236,753361938504555052,10192797646911532904,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2240 /prefetch:22⤵PID:2704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2236,753361938504555052,10192797646911532904,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2292 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2236,753361938504555052,10192797646911532904,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2764 /prefetch:82⤵PID:3620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,753361938504555052,10192797646911532904,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:2644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,753361938504555052,10192797646911532904,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:4152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,753361938504555052,10192797646911532904,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4708 /prefetch:12⤵PID:752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2236,753361938504555052,10192797646911532904,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5768 /prefetch:82⤵PID:1008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2236,753361938504555052,10192797646911532904,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5768 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,753361938504555052,10192797646911532904,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5440 /prefetch:12⤵PID:4756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,753361938504555052,10192797646911532904,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5396 /prefetch:12⤵PID:3228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,753361938504555052,10192797646911532904,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5496 /prefetch:12⤵PID:3280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,753361938504555052,10192797646911532904,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5372 /prefetch:12⤵PID:2456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2236,753361938504555052,10192797646911532904,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5440 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2384
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4840
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3068
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f35bb0615bb9816f562b83304e456294
SHA11049e2bd3e1bbb4cea572467d7c4a96648659cb4
SHA25605e80abd624454e5b860a08f40ddf33d672c3fed319aac180b7de5754bc07b71
SHA512db9100f3e324e74a9c58c7d9f50c25eaa4c6c4553c93bab9b80c6f7bef777db04111ebcd679f94015203b240fe9f4f371cae0d4290ec891a4173c746ff4b11c1
-
Filesize
152B
MD51eb86108cb8f5a956fdf48efbd5d06fe
SHA17b2b299f753798e4891df2d9cbf30f94b39ef924
SHA2561b53367e0041d54af89e7dd59733231f5da1393c551ed2b943c89166c0baca40
SHA512e2a661437688a4a01a6eb3b2bd7979ecf96b806f5a487d39354a7f0d44cb693a3b1c2cf6b1247b04e4106cc816105e982569572042bdddb3cd5bec23b4fce29d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD5e61ee6d4c628c872b412e02714bedae5
SHA1d3fa0f03070e289a8b0ed8394ae357b1fd99417d
SHA256e4584e43166117eb46e0e0503a7f795dfcbbee8db4cb747d1c5b3c50158b7968
SHA512317173f26080b976fa5b41147712d1abc4379fee242d401282f7ba617afdb7684ca660c84ae0af1877780b16af138331f1f7928928d4801b41ef1faf5a5bb6b8
-
Filesize
792B
MD5d94d2b98089f96f723560424ad2bafa6
SHA1d7fee7e78867b8ba75849f0d44ee8367ee494392
SHA256194aaad7ef50588c9c018a0e905c6c02a426fbdd86d55e8a99afb300f28d9099
SHA5125c67e33f76638f83b0b41723752bc08fe0538b73eeabd17acfe8d50c4b703f800853df522eaf62f18bbeff21f162e9cacccaa093c5e70478254561daa90ad7ed
-
Filesize
6KB
MD5baf12d8280917ea60000896e0c12a8d2
SHA11270bdad1fb330db4f7c9f45a4c11d0d37acead2
SHA256961f54b4abb16eefd1405fb652c52369bee18a4bd629fc4cf1a3a9b1ed019911
SHA512ea80e6c0637a60496ee48bd5c7ca350fc9ec927fa4495752a44e22439289cf9177b84f5a7f0b304ae12f9aae0e91218591b59550e18cfcfe355da852d320745f
-
Filesize
6KB
MD5b6027c0269f45428b1b9dc4f0de2e128
SHA12919fa3c1faa0fee312e753440dbcf39901f0603
SHA2560c031bc479a8cecc47c1a527a83605e49f18078697e6381c977328bd4a663aae
SHA5120dbc69e9bf2406025b543a3d5b90a30489002080bc9a382a52cca638b6728f2e974ab2093882a84b4ed571ad899d2d4bb7bc3db22d51fb593dfff9324001787a
-
Filesize
6KB
MD51f35c6f02c7c28eb352ce01744ab4a0d
SHA1fdc41eb325cbe3814fec902d3be1c83ce6b3cee5
SHA2563bbbe3673d84d9d107d8d38e07e67a105b814927ebe1902a539d9f11069ec8da
SHA51220a9b3368cbf269cdf9b8ba9530fe34f59d98afb067d2b98342491db37531ee9fba30173126859d9e67b559d9d47caf1ba215346a218aea3aaae6fdb1143cc42
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD58a09dedfb2f039dceef728c62a3997ad
SHA1be09bb2c6f99805b90d3d9ab5f458adf37a98778
SHA256200d0edfee5c54477e6f4504b9f0b1c8e8446a3b4d9565e4cd43ffbf4ccb3e90
SHA512603aaf7a9e140da32480d03ba6f4eaa5055519a79014fc1885cd9a7169ab094eb3860a68ec5828e34b3f76069e3dd90da8d3a6567127f50dc3278f8518e50b9d