Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
09/05/2024, 20:22
Static task
static1
Behavioral task
behavioral1
Sample
2b8aafad0deaf0b30878fe4a250dc95c_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2b8aafad0deaf0b30878fe4a250dc95c_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
2b8aafad0deaf0b30878fe4a250dc95c_JaffaCakes118.html
-
Size
175KB
-
MD5
2b8aafad0deaf0b30878fe4a250dc95c
-
SHA1
a47fb7bb1251db52ac9bf7d372bc23367490590e
-
SHA256
f2153c18dd98744a4fd69aa6258ba4a464377293d1a9d8778a929a0d76ebad9c
-
SHA512
ab2f8fd447a64a95b48f3984bf85c9e602cafc7609261b4d425cb779f3c74df02c2cd8ab3e3920456a13318f96395be7ca362bbfccc134dffee7cd14d8d82e3e
-
SSDEEP
1536:SqtY8hd8Wu8pI8Cd8hd8dQg0H//3oS3rGNkFtYfBCJisW+aeTH+WK/Lf1/hmnVSV:SBoT3r/FoBCJiwm
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4692 msedge.exe 4692 msedge.exe 432 msedge.exe 432 msedge.exe 4420 identity_helper.exe 4420 identity_helper.exe 6052 msedge.exe 6052 msedge.exe 6052 msedge.exe 6052 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe 432 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 432 wrote to memory of 3288 432 msedge.exe 83 PID 432 wrote to memory of 3288 432 msedge.exe 83 PID 432 wrote to memory of 1264 432 msedge.exe 84 PID 432 wrote to memory of 1264 432 msedge.exe 84 PID 432 wrote to memory of 1264 432 msedge.exe 84 PID 432 wrote to memory of 1264 432 msedge.exe 84 PID 432 wrote to memory of 1264 432 msedge.exe 84 PID 432 wrote to memory of 1264 432 msedge.exe 84 PID 432 wrote to memory of 1264 432 msedge.exe 84 PID 432 wrote to memory of 1264 432 msedge.exe 84 PID 432 wrote to memory of 1264 432 msedge.exe 84 PID 432 wrote to memory of 1264 432 msedge.exe 84 PID 432 wrote to memory of 1264 432 msedge.exe 84 PID 432 wrote to memory of 1264 432 msedge.exe 84 PID 432 wrote to memory of 1264 432 msedge.exe 84 PID 432 wrote to memory of 1264 432 msedge.exe 84 PID 432 wrote to memory of 1264 432 msedge.exe 84 PID 432 wrote to memory of 1264 432 msedge.exe 84 PID 432 wrote to memory of 1264 432 msedge.exe 84 PID 432 wrote to memory of 1264 432 msedge.exe 84 PID 432 wrote to memory of 1264 432 msedge.exe 84 PID 432 wrote to memory of 1264 432 msedge.exe 84 PID 432 wrote to memory of 1264 432 msedge.exe 84 PID 432 wrote to memory of 1264 432 msedge.exe 84 PID 432 wrote to memory of 1264 432 msedge.exe 84 PID 432 wrote to memory of 1264 432 msedge.exe 84 PID 432 wrote to memory of 1264 432 msedge.exe 84 PID 432 wrote to memory of 1264 432 msedge.exe 84 PID 432 wrote to memory of 1264 432 msedge.exe 84 PID 432 wrote to memory of 1264 432 msedge.exe 84 PID 432 wrote to memory of 1264 432 msedge.exe 84 PID 432 wrote to memory of 1264 432 msedge.exe 84 PID 432 wrote to memory of 1264 432 msedge.exe 84 PID 432 wrote to memory of 1264 432 msedge.exe 84 PID 432 wrote to memory of 1264 432 msedge.exe 84 PID 432 wrote to memory of 1264 432 msedge.exe 84 PID 432 wrote to memory of 1264 432 msedge.exe 84 PID 432 wrote to memory of 1264 432 msedge.exe 84 PID 432 wrote to memory of 1264 432 msedge.exe 84 PID 432 wrote to memory of 1264 432 msedge.exe 84 PID 432 wrote to memory of 1264 432 msedge.exe 84 PID 432 wrote to memory of 1264 432 msedge.exe 84 PID 432 wrote to memory of 4692 432 msedge.exe 85 PID 432 wrote to memory of 4692 432 msedge.exe 85 PID 432 wrote to memory of 4948 432 msedge.exe 86 PID 432 wrote to memory of 4948 432 msedge.exe 86 PID 432 wrote to memory of 4948 432 msedge.exe 86 PID 432 wrote to memory of 4948 432 msedge.exe 86 PID 432 wrote to memory of 4948 432 msedge.exe 86 PID 432 wrote to memory of 4948 432 msedge.exe 86 PID 432 wrote to memory of 4948 432 msedge.exe 86 PID 432 wrote to memory of 4948 432 msedge.exe 86 PID 432 wrote to memory of 4948 432 msedge.exe 86 PID 432 wrote to memory of 4948 432 msedge.exe 86 PID 432 wrote to memory of 4948 432 msedge.exe 86 PID 432 wrote to memory of 4948 432 msedge.exe 86 PID 432 wrote to memory of 4948 432 msedge.exe 86 PID 432 wrote to memory of 4948 432 msedge.exe 86 PID 432 wrote to memory of 4948 432 msedge.exe 86 PID 432 wrote to memory of 4948 432 msedge.exe 86 PID 432 wrote to memory of 4948 432 msedge.exe 86 PID 432 wrote to memory of 4948 432 msedge.exe 86 PID 432 wrote to memory of 4948 432 msedge.exe 86 PID 432 wrote to memory of 4948 432 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2b8aafad0deaf0b30878fe4a250dc95c_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:432 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff84d3746f8,0x7ff84d374708,0x7ff84d3747182⤵PID:3288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,4502723651989696783,11142991725642307241,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2088 /prefetch:22⤵PID:1264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2076,4502723651989696783,11142991725642307241,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2156 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2076,4502723651989696783,11142991725642307241,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2904 /prefetch:82⤵PID:4948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,4502723651989696783,11142991725642307241,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:1588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,4502723651989696783,11142991725642307241,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:1444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,4502723651989696783,11142991725642307241,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4784 /prefetch:12⤵PID:3112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,4502723651989696783,11142991725642307241,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4908 /prefetch:12⤵PID:1348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,4502723651989696783,11142991725642307241,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5308 /prefetch:12⤵PID:2700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,4502723651989696783,11142991725642307241,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3948 /prefetch:12⤵PID:1624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,4502723651989696783,11142991725642307241,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4256 /prefetch:82⤵PID:1116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,4502723651989696783,11142991725642307241,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4256 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,4502723651989696783,11142991725642307241,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4808 /prefetch:12⤵PID:3044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,4502723651989696783,11142991725642307241,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4224 /prefetch:12⤵PID:4652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,4502723651989696783,11142991725642307241,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4128 /prefetch:12⤵PID:5216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,4502723651989696783,11142991725642307241,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6076 /prefetch:12⤵PID:5224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,4502723651989696783,11142991725642307241,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5216 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:6052
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3584
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2400
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5012
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54f7152bc5a1a715ef481e37d1c791959
SHA1c8a1ed674c62ae4f45519f90a8cc5a81eff3a6d7
SHA256704dd4f98d8ca34ec421f23ba1891b178c23c14b3301e4655efc5c02d356c2bc
SHA5122e6b02ca35d76a655a17a5f3e9dbd8d7517c7dae24f0095c7350eb9e7bdf9e1256a7009aa8878f96c89d1ea4fe5323a41f72b8c551806dda62880d7ff231ff5c
-
Filesize
152B
MD5ea98e583ad99df195d29aa066204ab56
SHA1f89398664af0179641aa0138b337097b617cb2db
SHA256a7abb51435909fa2d75c6f2ff5c69a93d4a0ab276ed579e7d8733b2a63ffbee6
SHA512e109be3466e653e5d310b3e402e1626298b09205d223722a82344dd78504f3c33e1e24e8402a02f38cd2c9c50d96a303ce4846bea5a583423937ab018cd5782f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize360B
MD52527615284999a5545f44bc791ce7a06
SHA1aa7b19bff49ba7a7416bae4cf9c6a2faf3c5fc52
SHA256710122a6ee26e66d9b657ec85698a7b479af132fd8fdebe3d92e3ae52f4117e0
SHA512f73237ffa2b3c61765fc49493dea4dcd244135ea1ecd88dbe283d1a966c7d7531146567fc7dcd6ea1f8ee849a51cc53482c67a78c59f069253a4660207b4d23e
-
Filesize
2KB
MD546e3b8ee279b7a01078b40f561c17d6e
SHA1beed6bbef6fae36634485118b134677bded13e16
SHA256645118adb06241692c4e4c69a761fcee3588e4e4bd1188146e466abec1986cd0
SHA51239460238cf32ce6a9a63c7ab796aae4795ca05ab13203659cbd79994e658d46afba835d3cc16a3bfcb620acf9840a01947f01c8b94a3045e332df4b39f786d45
-
Filesize
5KB
MD5fba8ecd17905f62cb434e8231741ed6c
SHA1dcd21a00a4255af5e1a6a054aca85a3bdd3214a1
SHA25684d73a00a95ff2866f286fdc8be9f982d4627d72617a50357dfde8760c8f7187
SHA51229b9a1bd9e594793931db27cb2272e3dc25d1ab0dafebc072dcd4061983eb985a887d7ee1b18f33e6abcf5b28c048ba9da06affd4ca3dca409187da81c271867
-
Filesize
7KB
MD5452f4e5295eeb8546dfd68d67b180e88
SHA1fecc9f8f09cfa79631d6ae876ac9f2a5fe55d8f1
SHA256a3e967227768aa2cf77512a99e5a5734e861c9bd732b6a32d1715c04e00d3475
SHA5120a695e9b7bede3c74501d77255275777d2329e64c680f9f12828799362dcfdc2ec584059023b8a26c30974bbfdbba87f509807a2d2ba6b41022c727be326468f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD525816ceda05448df2dafbecd51ba986d
SHA16ca1581a7618deb66b4029104b3c70547d1816a7
SHA256c969e2e9970c7ee09400f7276eb218f57297ba0e689e20b7ac4e66861c7dca2b
SHA5125a453187443f16ccd330a74c622edb2adc252ecda27121f3ecd5239c26b481050a87ce7b3f90edb1acd0fa84a0077e7a93aaa3ff7f4ab4be7dcb3eaff30df3f2