Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
09-05-2024 18:31
Static task
static1
Behavioral task
behavioral1
Sample
2b507f890942e54a6e05e1051b3e2a47_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2b507f890942e54a6e05e1051b3e2a47_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
2b507f890942e54a6e05e1051b3e2a47_JaffaCakes118.html
-
Size
48KB
-
MD5
2b507f890942e54a6e05e1051b3e2a47
-
SHA1
948ddb208c6173acb05cc1a43b65129cab540299
-
SHA256
0b5e014f17ad934a2c715c47e565f2911ac4b5f05531d40ac91a47562c8a1421
-
SHA512
bb4fc4896e7ea1062a06fef72b9e620a155f92f8ac38383e23a020fea2807900b16b902dbfc811fcd7fcf049fb7313d9d9952b93d597bbd75fa9cdde0b6a6392
-
SSDEEP
1536:644OxRMad9Gs6KJ8W8+eV+ef+eU+eP+eG+eZu/SL88BG9yOwsGBnDCSO:xxRMad9B8vdSRsrBLdBIyzsGBnDCSO
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1196 msedge.exe 1196 msedge.exe 4524 msedge.exe 4524 msedge.exe 4460 identity_helper.exe 4460 identity_helper.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4524 wrote to memory of 464 4524 msedge.exe 83 PID 4524 wrote to memory of 464 4524 msedge.exe 83 PID 4524 wrote to memory of 1160 4524 msedge.exe 84 PID 4524 wrote to memory of 1160 4524 msedge.exe 84 PID 4524 wrote to memory of 1160 4524 msedge.exe 84 PID 4524 wrote to memory of 1160 4524 msedge.exe 84 PID 4524 wrote to memory of 1160 4524 msedge.exe 84 PID 4524 wrote to memory of 1160 4524 msedge.exe 84 PID 4524 wrote to memory of 1160 4524 msedge.exe 84 PID 4524 wrote to memory of 1160 4524 msedge.exe 84 PID 4524 wrote to memory of 1160 4524 msedge.exe 84 PID 4524 wrote to memory of 1160 4524 msedge.exe 84 PID 4524 wrote to memory of 1160 4524 msedge.exe 84 PID 4524 wrote to memory of 1160 4524 msedge.exe 84 PID 4524 wrote to memory of 1160 4524 msedge.exe 84 PID 4524 wrote to memory of 1160 4524 msedge.exe 84 PID 4524 wrote to memory of 1160 4524 msedge.exe 84 PID 4524 wrote to memory of 1160 4524 msedge.exe 84 PID 4524 wrote to memory of 1160 4524 msedge.exe 84 PID 4524 wrote to memory of 1160 4524 msedge.exe 84 PID 4524 wrote to memory of 1160 4524 msedge.exe 84 PID 4524 wrote to memory of 1160 4524 msedge.exe 84 PID 4524 wrote to memory of 1160 4524 msedge.exe 84 PID 4524 wrote to memory of 1160 4524 msedge.exe 84 PID 4524 wrote to memory of 1160 4524 msedge.exe 84 PID 4524 wrote to memory of 1160 4524 msedge.exe 84 PID 4524 wrote to memory of 1160 4524 msedge.exe 84 PID 4524 wrote to memory of 1160 4524 msedge.exe 84 PID 4524 wrote to memory of 1160 4524 msedge.exe 84 PID 4524 wrote to memory of 1160 4524 msedge.exe 84 PID 4524 wrote to memory of 1160 4524 msedge.exe 84 PID 4524 wrote to memory of 1160 4524 msedge.exe 84 PID 4524 wrote to memory of 1160 4524 msedge.exe 84 PID 4524 wrote to memory of 1160 4524 msedge.exe 84 PID 4524 wrote to memory of 1160 4524 msedge.exe 84 PID 4524 wrote to memory of 1160 4524 msedge.exe 84 PID 4524 wrote to memory of 1160 4524 msedge.exe 84 PID 4524 wrote to memory of 1160 4524 msedge.exe 84 PID 4524 wrote to memory of 1160 4524 msedge.exe 84 PID 4524 wrote to memory of 1160 4524 msedge.exe 84 PID 4524 wrote to memory of 1160 4524 msedge.exe 84 PID 4524 wrote to memory of 1160 4524 msedge.exe 84 PID 4524 wrote to memory of 1196 4524 msedge.exe 85 PID 4524 wrote to memory of 1196 4524 msedge.exe 85 PID 4524 wrote to memory of 380 4524 msedge.exe 86 PID 4524 wrote to memory of 380 4524 msedge.exe 86 PID 4524 wrote to memory of 380 4524 msedge.exe 86 PID 4524 wrote to memory of 380 4524 msedge.exe 86 PID 4524 wrote to memory of 380 4524 msedge.exe 86 PID 4524 wrote to memory of 380 4524 msedge.exe 86 PID 4524 wrote to memory of 380 4524 msedge.exe 86 PID 4524 wrote to memory of 380 4524 msedge.exe 86 PID 4524 wrote to memory of 380 4524 msedge.exe 86 PID 4524 wrote to memory of 380 4524 msedge.exe 86 PID 4524 wrote to memory of 380 4524 msedge.exe 86 PID 4524 wrote to memory of 380 4524 msedge.exe 86 PID 4524 wrote to memory of 380 4524 msedge.exe 86 PID 4524 wrote to memory of 380 4524 msedge.exe 86 PID 4524 wrote to memory of 380 4524 msedge.exe 86 PID 4524 wrote to memory of 380 4524 msedge.exe 86 PID 4524 wrote to memory of 380 4524 msedge.exe 86 PID 4524 wrote to memory of 380 4524 msedge.exe 86 PID 4524 wrote to memory of 380 4524 msedge.exe 86 PID 4524 wrote to memory of 380 4524 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2b507f890942e54a6e05e1051b3e2a47_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4524 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9a1dd46f8,0x7ff9a1dd4708,0x7ff9a1dd47182⤵PID:464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,5479000161248402251,12788025361904518713,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2064 /prefetch:22⤵PID:1160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2044,5479000161248402251,12788025361904518713,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2148 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2044,5479000161248402251,12788025361904518713,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2744 /prefetch:82⤵PID:380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,5479000161248402251,12788025361904518713,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:1200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,5479000161248402251,12788025361904518713,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3392 /prefetch:12⤵PID:2604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,5479000161248402251,12788025361904518713,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5208 /prefetch:12⤵PID:1616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,5479000161248402251,12788025361904518713,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3424 /prefetch:12⤵PID:2852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2044,5479000161248402251,12788025361904518713,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5780 /prefetch:82⤵PID:2292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2044,5479000161248402251,12788025361904518713,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5780 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,5479000161248402251,12788025361904518713,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2728 /prefetch:12⤵PID:2248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,5479000161248402251,12788025361904518713,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5408 /prefetch:12⤵PID:2012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,5479000161248402251,12788025361904518713,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5152 /prefetch:12⤵PID:4312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,5479000161248402251,12788025361904518713,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4764 /prefetch:12⤵PID:3348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,5479000161248402251,12788025361904518713,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1380 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1768
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2100
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1892
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5537815e7cc5c694912ac0308147852e4
SHA12ccdd9d9dc637db5462fe8119c0df261146c363c
SHA256b4b69d099507d88abdeff4835e06cc6711e1c47464c963d013cef0a278e52d4f
SHA51263969a69af057235dbdecddc483ef5ce0058673179a3580c5aa12938c9501513cdb72dd703a06fa7d4fc08d074f17528283338c795334398497c771ecbd1350a
-
Filesize
152B
MD58b167567021ccb1a9fdf073fa9112ef0
SHA13baf293fbfaa7c1e7cdacb5f2975737f4ef69898
SHA25626764cedf35f118b55f30b3a36e0693f9f38290a5b2b6b8b83a00e990ae18513
SHA512726098001ef1acf1dd154a658752fa27dea32bca8fbb66395c142cb666102e71632adbad1b7e2f717071cd3e3af3867471932a71707f2ae97b989f4be468ab54
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD5f93b46b445eb91b162f1936c00ab0c2b
SHA15d8be2bc21352288d7aa52ca39a0d7af8cc8e048
SHA25626a9181da29a5e15eef0fefede9a09b91b3188e8fedcc0ce89830b0182cca54b
SHA5128e0124faca355f68abd5f98f2df8c554699a185bcfc6e858b5ddd198a04b90673ec76e7c601d0c57dc72165ff3369c74d4c2e358facd00092c52a177ba7c6743
-
Filesize
1KB
MD5d3a6efe2b0e5bd223c65119e9b1cfff7
SHA1af546e035de0227654f8992b0d3fda73960c3db3
SHA256067f3b1f3d9d3196d093038750b6a06b146459d9d436e11d1a845b3d85f08a72
SHA5128dcf77981e0c4335197ef986e19f0325be8de5acf4afd023f6fd17a5518200724d976bcd2aa6840f843d50c11db9bcba2cd6c8830a8ab7478d4c3272edf5c8bb
-
Filesize
5KB
MD506071d8c27da483fef95f73334f2043e
SHA179dffcf479c007853399b7acf2044b1b8d1a9769
SHA2565f49a2125163c01a70c40e41add71d842b512e007a848baedf6c5f1f6e085f33
SHA51233eaf8fa274dd665836ca05dc936ae08108cd2aa04b1a4e068766d07e8d6fcbe8a0901eba6f867916c0fd0f606d8b72c9fa2a374763368534be1a6278428ad2d
-
Filesize
6KB
MD536119b47cac93516b72cdc14805f3b7d
SHA1012f6bf6e97b3abfe1637d104b259e1e4d9d9ecb
SHA256c80c4443202b145b8e3caa7875398395d4abd5ffbc9ee97049ef473ae6f037a4
SHA5129514d590aa43ce8f5611c6b67a1bc0fe37d75d32aaa89c9e750cd2c1ded305f3acc16926a015b1b2d3dbba1454fe2691cdf553cb1d9707294e949f030e98bacf
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5858c011da1a4e394c2c5e16c0a860b0a
SHA19f87615d308abcf3a72431de60057f4f90b3cbe5
SHA256b9eee75824d4c61afe0589593e9e8593ecc8ef7a9c855fb2a7b4c00a4fe3bddd
SHA512dfd7a8b7ef7a8799603d03a8842c620529c0507f3f6b4fc19688c0946bbdf7109b48f46102037740306d4c7e6aa5ebd0b741939f313afa41107f221cc6899b8f