Analysis
-
max time kernel
145s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
11-05-2024 10:05
Static task
static1
Behavioral task
behavioral1
Sample
3408c5960fd150bb93f5973d124b632b_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
3408c5960fd150bb93f5973d124b632b_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
3408c5960fd150bb93f5973d124b632b_JaffaCakes118.html
-
Size
60KB
-
MD5
3408c5960fd150bb93f5973d124b632b
-
SHA1
4e75fd5337aae1e02ffa4db61d1248109589fe9b
-
SHA256
1610376aaafbc24e85e6154b9c463b4263080d61f56c6b821c07128899fe1221
-
SHA512
a532587fc671e054487367bf42afc730d1111a77d77f73ada77335b192dbf88d8d8b3c754d3f938907bd3f0045ce9323a1295546497260a0f570cebb9768c76b
-
SSDEEP
768:bR1hYGAcTt7G4SH2/6KNq4E+eAVdpnFmcj9bSB:bR17AcZ7G4O4E+eOdpnFmcj9bSB
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1540 msedge.exe 1540 msedge.exe 5088 msedge.exe 5088 msedge.exe 1508 identity_helper.exe 1508 identity_helper.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5088 wrote to memory of 5092 5088 msedge.exe 83 PID 5088 wrote to memory of 5092 5088 msedge.exe 83 PID 5088 wrote to memory of 2892 5088 msedge.exe 84 PID 5088 wrote to memory of 2892 5088 msedge.exe 84 PID 5088 wrote to memory of 2892 5088 msedge.exe 84 PID 5088 wrote to memory of 2892 5088 msedge.exe 84 PID 5088 wrote to memory of 2892 5088 msedge.exe 84 PID 5088 wrote to memory of 2892 5088 msedge.exe 84 PID 5088 wrote to memory of 2892 5088 msedge.exe 84 PID 5088 wrote to memory of 2892 5088 msedge.exe 84 PID 5088 wrote to memory of 2892 5088 msedge.exe 84 PID 5088 wrote to memory of 2892 5088 msedge.exe 84 PID 5088 wrote to memory of 2892 5088 msedge.exe 84 PID 5088 wrote to memory of 2892 5088 msedge.exe 84 PID 5088 wrote to memory of 2892 5088 msedge.exe 84 PID 5088 wrote to memory of 2892 5088 msedge.exe 84 PID 5088 wrote to memory of 2892 5088 msedge.exe 84 PID 5088 wrote to memory of 2892 5088 msedge.exe 84 PID 5088 wrote to memory of 2892 5088 msedge.exe 84 PID 5088 wrote to memory of 2892 5088 msedge.exe 84 PID 5088 wrote to memory of 2892 5088 msedge.exe 84 PID 5088 wrote to memory of 2892 5088 msedge.exe 84 PID 5088 wrote to memory of 2892 5088 msedge.exe 84 PID 5088 wrote to memory of 2892 5088 msedge.exe 84 PID 5088 wrote to memory of 2892 5088 msedge.exe 84 PID 5088 wrote to memory of 2892 5088 msedge.exe 84 PID 5088 wrote to memory of 2892 5088 msedge.exe 84 PID 5088 wrote to memory of 2892 5088 msedge.exe 84 PID 5088 wrote to memory of 2892 5088 msedge.exe 84 PID 5088 wrote to memory of 2892 5088 msedge.exe 84 PID 5088 wrote to memory of 2892 5088 msedge.exe 84 PID 5088 wrote to memory of 2892 5088 msedge.exe 84 PID 5088 wrote to memory of 2892 5088 msedge.exe 84 PID 5088 wrote to memory of 2892 5088 msedge.exe 84 PID 5088 wrote to memory of 2892 5088 msedge.exe 84 PID 5088 wrote to memory of 2892 5088 msedge.exe 84 PID 5088 wrote to memory of 2892 5088 msedge.exe 84 PID 5088 wrote to memory of 2892 5088 msedge.exe 84 PID 5088 wrote to memory of 2892 5088 msedge.exe 84 PID 5088 wrote to memory of 2892 5088 msedge.exe 84 PID 5088 wrote to memory of 2892 5088 msedge.exe 84 PID 5088 wrote to memory of 2892 5088 msedge.exe 84 PID 5088 wrote to memory of 1540 5088 msedge.exe 85 PID 5088 wrote to memory of 1540 5088 msedge.exe 85 PID 5088 wrote to memory of 1572 5088 msedge.exe 86 PID 5088 wrote to memory of 1572 5088 msedge.exe 86 PID 5088 wrote to memory of 1572 5088 msedge.exe 86 PID 5088 wrote to memory of 1572 5088 msedge.exe 86 PID 5088 wrote to memory of 1572 5088 msedge.exe 86 PID 5088 wrote to memory of 1572 5088 msedge.exe 86 PID 5088 wrote to memory of 1572 5088 msedge.exe 86 PID 5088 wrote to memory of 1572 5088 msedge.exe 86 PID 5088 wrote to memory of 1572 5088 msedge.exe 86 PID 5088 wrote to memory of 1572 5088 msedge.exe 86 PID 5088 wrote to memory of 1572 5088 msedge.exe 86 PID 5088 wrote to memory of 1572 5088 msedge.exe 86 PID 5088 wrote to memory of 1572 5088 msedge.exe 86 PID 5088 wrote to memory of 1572 5088 msedge.exe 86 PID 5088 wrote to memory of 1572 5088 msedge.exe 86 PID 5088 wrote to memory of 1572 5088 msedge.exe 86 PID 5088 wrote to memory of 1572 5088 msedge.exe 86 PID 5088 wrote to memory of 1572 5088 msedge.exe 86 PID 5088 wrote to memory of 1572 5088 msedge.exe 86 PID 5088 wrote to memory of 1572 5088 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\3408c5960fd150bb93f5973d124b632b_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5088 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd421f46f8,0x7ffd421f4708,0x7ffd421f47182⤵PID:5092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,11113337624708818324,5023192151065000864,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2176 /prefetch:22⤵PID:2892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2160,11113337624708818324,5023192151065000864,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2204 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2160,11113337624708818324,5023192151065000864,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2680 /prefetch:82⤵PID:1572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,11113337624708818324,5023192151065000864,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:2984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,11113337624708818324,5023192151065000864,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:1556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,11113337624708818324,5023192151065000864,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5976 /prefetch:12⤵PID:2368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,11113337624708818324,5023192151065000864,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3084 /prefetch:12⤵PID:4696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,11113337624708818324,5023192151065000864,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1848 /prefetch:12⤵PID:1884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,11113337624708818324,5023192151065000864,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5312 /prefetch:82⤵PID:2256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,11113337624708818324,5023192151065000864,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5312 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,11113337624708818324,5023192151065000864,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6128 /prefetch:12⤵PID:2296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,11113337624708818324,5023192151065000864,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4264 /prefetch:12⤵PID:3104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,11113337624708818324,5023192151065000864,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2036 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3232
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2728
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1756
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3524
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556641592f6e69f5f5fb06f2319384490
SHA16a86be42e2c6d26b7830ad9f4e2627995fd91069
SHA25602d4984e590e947265474d592e64edde840fdca7eb881eebde3e220a1d883455
SHA512c75e689b2bbbe07ebf72baf75c56f19c39f45d5593cf47535eb722f95002b3ee418027047c0ee8d63800f499038db5e2c24aff9705d830c7b6eaa290d9adc868
-
Filesize
152B
MD5612a6c4247ef652299b376221c984213
SHA1d306f3b16bde39708aa862aee372345feb559750
SHA2569d8e24c91cff338e56b518a533cb2e49a2803356bbf6e04892fb168a7ce2844a
SHA51234a14d63abb1e3fe0f9927a94393043d458fe0624843e108d290266f554018e6379cba924cb5388735abdd6c5f1e2e318478a673f3f9b762815a758866d10973
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize216B
MD5eef203de11faa02e2193193426f3b9b4
SHA111b32fbb28d40e2be2f86cc8ea573b8bb94fc79c
SHA25670b73b36dde55ec21167376c04939d54b0a06fee4bb875b62b7020589583c932
SHA512a098812589d784ed3980b31933e4e8bc08637c2de13270b079b9ee1c4f544319a6a419ef13548e31037fbcac3648ade94e1a2e0941fa2b3b1410f59f041afa8f
-
Filesize
2KB
MD53ff19cee17c5c2a1c2f5ca6277fc39ea
SHA1f0a14de6d1b4e883af9df1e92cb1220aef57e82c
SHA256f2d68970baaadecaa65e09a4745648b3e1ba16c64f1e00520b5c6b5d22d1d9f6
SHA512a7183a715e6a5a934f207902a3aef804ddf5e4b61b13123f89e32089c304b31d540011e663e6e62e717b881e2832e6492dee033682dc1058f293c5a30498263b
-
Filesize
6KB
MD5ea4c830a8a6c415fa79beac4ed61e4a5
SHA1c5fcc7f0255974b0f7d7da9d88f498b80ee88cd1
SHA25607fc983a00370dc059a9be8b0ca88961dd420dcb74a58ee1a91d8e90c0453f31
SHA51288080908d9494cb6431224ab17d832385f6550a55286802927286641bab744e7e6b262890d100542464011206797fed2973d26692678f9affe88b91a06703af3
-
Filesize
6KB
MD5bfbc14adb30c4d92f7a406ad5285c3c8
SHA1344fa8797977f2361f050fb9f2e7184759d3727c
SHA256f29c1da4858c7febba0842c2cb3dd0f97d8e6c4ca08fd0a24b5b6ae80f0bf6cd
SHA5128a2a4d0c7caf7b15278bebb62604c4b6286242ea93831850a3fb789904c575af2c33dae66663611bfbc6e9d9bfc8cf63f3ca75ff2f26c2bef1f47b09aa2a8bea
-
Filesize
7KB
MD510759969b8ad7a7c8ab5106a4cbfc59a
SHA16d6f0e2480f4bf55c75efe425a103321bc908c04
SHA2567b7c431b03b4b8f0bd80f7e5d0bc42ffc30e01b5a0c2dc6a231f5704956c327a
SHA512071fcb750f295d772db94bee4a123163cb6f087beaa72c2bf3f178ee40283dbbc7ae914f5741bb9ce3c14950148fb021b94a868fe6ec7a70f15f209f77dd9caa
-
Filesize
372B
MD5297248d51c945ef03a7880ef90654bf8
SHA178e608d2e669c178a0552bbd4380d30dc12741de
SHA256fb3e10e4e0748c7fc345d08c5688b7d8a23c15385334a9cef4e5b0a9f3ed6d1a
SHA512a95888bba131a502728ca0956b08cd0bbecb4518a6fa268613c71444b8f1cd5f39d08af147ef36923bcee3fd8252e9f8043d1a242a8734fee3888b671b741008
-
Filesize
204B
MD53bcbf510b5425f303625e2928a8f4a01
SHA195637b1d7bdd30676a0843c6941a5c738376d588
SHA256a73f24e23ea60326ad0639e1ddcca01fba1326c9ce1fa51cf72698f9360145e4
SHA5121df5bebda6fe814134f37869f4bf37528b346674ada55799991a99c2f4fe796b48eb62b8ef55d5400c36ddf404f0feca6b0f402a2f6638050c74057ac337fb8c
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5826466e4b6792deb03ad124d9f7ad7e6
SHA1b373bb506cd834695832e7591b6669ba0a12a593
SHA2565aa4a22bde468e85189ef4e6f01f271b7f3579ee9f210effe5e451e2004ca5f0
SHA51207fc767ad46a3bcc356f82f363c7aaeaf4768f5f78f9a52130fe3a59e163b1442b2ab01883b42d9b21525b953c42e13535dee8f987b4333e3c9e06a1fe10d13b