Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
31-05-2024 17:12
Static task
static1
Behavioral task
behavioral1
Sample
87be8ad2a9e7c591097c9e7caa53f07d_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
87be8ad2a9e7c591097c9e7caa53f07d_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
87be8ad2a9e7c591097c9e7caa53f07d_JaffaCakes118.html
-
Size
84KB
-
MD5
87be8ad2a9e7c591097c9e7caa53f07d
-
SHA1
bb23d5ecac4d592c2d359c60f86320eb1d64fcb7
-
SHA256
dd3d85ac970f4207a2e114350dc097e290893d374b65586fb6efb4c55c3bf03b
-
SHA512
f218f2672740f43a6ff9d3ed62dc34edf0bc7c896de1ff88ea06147fb465d980597962789867f4e47d13f76fbf7433a897885b74b84faf07e554932382dbb7df
-
SSDEEP
1536:OpvQjI61TLq5QbExENE1FIzEV8EBj6AjeEPEPPVgqUEih4E8EME9J5My2mT/EOP/:evQZgBxUWE1csdVFE1J
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1576 msedge.exe 1576 msedge.exe 3176 msedge.exe 3176 msedge.exe 3388 identity_helper.exe 3388 identity_helper.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe 4748 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3176 wrote to memory of 3516 3176 msedge.exe 82 PID 3176 wrote to memory of 3516 3176 msedge.exe 82 PID 3176 wrote to memory of 4700 3176 msedge.exe 83 PID 3176 wrote to memory of 4700 3176 msedge.exe 83 PID 3176 wrote to memory of 4700 3176 msedge.exe 83 PID 3176 wrote to memory of 4700 3176 msedge.exe 83 PID 3176 wrote to memory of 4700 3176 msedge.exe 83 PID 3176 wrote to memory of 4700 3176 msedge.exe 83 PID 3176 wrote to memory of 4700 3176 msedge.exe 83 PID 3176 wrote to memory of 4700 3176 msedge.exe 83 PID 3176 wrote to memory of 4700 3176 msedge.exe 83 PID 3176 wrote to memory of 4700 3176 msedge.exe 83 PID 3176 wrote to memory of 4700 3176 msedge.exe 83 PID 3176 wrote to memory of 4700 3176 msedge.exe 83 PID 3176 wrote to memory of 4700 3176 msedge.exe 83 PID 3176 wrote to memory of 4700 3176 msedge.exe 83 PID 3176 wrote to memory of 4700 3176 msedge.exe 83 PID 3176 wrote to memory of 4700 3176 msedge.exe 83 PID 3176 wrote to memory of 4700 3176 msedge.exe 83 PID 3176 wrote to memory of 4700 3176 msedge.exe 83 PID 3176 wrote to memory of 4700 3176 msedge.exe 83 PID 3176 wrote to memory of 4700 3176 msedge.exe 83 PID 3176 wrote to memory of 4700 3176 msedge.exe 83 PID 3176 wrote to memory of 4700 3176 msedge.exe 83 PID 3176 wrote to memory of 4700 3176 msedge.exe 83 PID 3176 wrote to memory of 4700 3176 msedge.exe 83 PID 3176 wrote to memory of 4700 3176 msedge.exe 83 PID 3176 wrote to memory of 4700 3176 msedge.exe 83 PID 3176 wrote to memory of 4700 3176 msedge.exe 83 PID 3176 wrote to memory of 4700 3176 msedge.exe 83 PID 3176 wrote to memory of 4700 3176 msedge.exe 83 PID 3176 wrote to memory of 4700 3176 msedge.exe 83 PID 3176 wrote to memory of 4700 3176 msedge.exe 83 PID 3176 wrote to memory of 4700 3176 msedge.exe 83 PID 3176 wrote to memory of 4700 3176 msedge.exe 83 PID 3176 wrote to memory of 4700 3176 msedge.exe 83 PID 3176 wrote to memory of 4700 3176 msedge.exe 83 PID 3176 wrote to memory of 4700 3176 msedge.exe 83 PID 3176 wrote to memory of 4700 3176 msedge.exe 83 PID 3176 wrote to memory of 4700 3176 msedge.exe 83 PID 3176 wrote to memory of 4700 3176 msedge.exe 83 PID 3176 wrote to memory of 4700 3176 msedge.exe 83 PID 3176 wrote to memory of 1576 3176 msedge.exe 84 PID 3176 wrote to memory of 1576 3176 msedge.exe 84 PID 3176 wrote to memory of 2664 3176 msedge.exe 85 PID 3176 wrote to memory of 2664 3176 msedge.exe 85 PID 3176 wrote to memory of 2664 3176 msedge.exe 85 PID 3176 wrote to memory of 2664 3176 msedge.exe 85 PID 3176 wrote to memory of 2664 3176 msedge.exe 85 PID 3176 wrote to memory of 2664 3176 msedge.exe 85 PID 3176 wrote to memory of 2664 3176 msedge.exe 85 PID 3176 wrote to memory of 2664 3176 msedge.exe 85 PID 3176 wrote to memory of 2664 3176 msedge.exe 85 PID 3176 wrote to memory of 2664 3176 msedge.exe 85 PID 3176 wrote to memory of 2664 3176 msedge.exe 85 PID 3176 wrote to memory of 2664 3176 msedge.exe 85 PID 3176 wrote to memory of 2664 3176 msedge.exe 85 PID 3176 wrote to memory of 2664 3176 msedge.exe 85 PID 3176 wrote to memory of 2664 3176 msedge.exe 85 PID 3176 wrote to memory of 2664 3176 msedge.exe 85 PID 3176 wrote to memory of 2664 3176 msedge.exe 85 PID 3176 wrote to memory of 2664 3176 msedge.exe 85 PID 3176 wrote to memory of 2664 3176 msedge.exe 85 PID 3176 wrote to memory of 2664 3176 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\87be8ad2a9e7c591097c9e7caa53f07d_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3176 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd90b646f8,0x7ffd90b64708,0x7ffd90b647182⤵PID:3516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2244,5689081927970540586,3444974338783392105,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2256 /prefetch:22⤵PID:4700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2244,5689081927970540586,3444974338783392105,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2308 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2244,5689081927970540586,3444974338783392105,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2768 /prefetch:82⤵PID:2664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,5689081927970540586,3444974338783392105,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:3524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,5689081927970540586,3444974338783392105,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:1604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,5689081927970540586,3444974338783392105,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5148 /prefetch:12⤵PID:4920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,5689081927970540586,3444974338783392105,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5312 /prefetch:12⤵PID:3704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2244,5689081927970540586,3444974338783392105,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5508 /prefetch:82⤵PID:4904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2244,5689081927970540586,3444974338783392105,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5508 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,5689081927970540586,3444974338783392105,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5128 /prefetch:12⤵PID:3648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,5689081927970540586,3444974338783392105,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5108 /prefetch:12⤵PID:4852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,5689081927970540586,3444974338783392105,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5992 /prefetch:12⤵PID:3840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2244,5689081927970540586,3444974338783392105,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5880 /prefetch:12⤵PID:3152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2244,5689081927970540586,3444974338783392105,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1292 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4748
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4168
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4980
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c9c4c494f8fba32d95ba2125f00586a3
SHA18a600205528aef7953144f1cf6f7a5115e3611de
SHA256a0ca609205813c307df9122c0c5b0967c5472755700f615b0033129cf7d6b35b
SHA5129d30cea6cfc259e97b0305f8b5cd19774044fb78feedfcef2014b2947f2e6a101273bc4ad30db9cc1724e62eb441266d7df376e28ac58693f128b9cce2c7d20d
-
Filesize
152B
MD54dc6fc5e708279a3310fe55d9c44743d
SHA1a42e8bdf9d1c25ef3e223d59f6b1d16b095f46d2
SHA256a1c5f48659d4b3af960971b3a0f433a95fee5bfafe5680a34110c68b342377d8
SHA5125874b2310187f242b852fa6dcded244cc860abb2be4f6f5a6a1db8322e12e1fef8f825edc0aae75adbb7284a2cd64730650d0643b1e2bb7ead9350e50e1d8c13
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize360B
MD52d3e0d56d76b2ac36e1be6fd2bcc6d10
SHA1936162877c43a0a6498512b999317954004d75d3
SHA25679e8a89b45417605d602a559916e9e3f3b66586fe6c227366cfeaab09ff6f180
SHA51277d5f58224a7c6a61133cafae2bff19b0560c2d884cd41fa030ac0c7dd00f5d6ae88cded9c5a3c3e7aa1cf08e3338e8b1a0ecf9ff50ff8e9a853b1fafcc7060a
-
Filesize
1KB
MD58d5f323ae9ab5d23c4513f61eb77870c
SHA17217b1748799026b43b606555311291d1f33ed29
SHA2563ffc60bb2f0de13324785f5adff9b07dcffaeb8101ad6ab57e321aa38fa3f359
SHA51209fc3fbd59b9fb9d8b6781ae1b6237d5b9fecd007641c4566095ea2741edcc814832cdd2dc81747b40ca0bb7dcadb18a7d1c2842b573cf4483de7c05908e734d
-
Filesize
5KB
MD5b075b250934f897a6d87cfa23083dba7
SHA17c62e8d2ce3222c0db6fac7fff65202c91e51254
SHA256782e4b4c34f5c5d21dadc074c20f47de9bb7f488d1dab627848fa1ea85d4e947
SHA5127788393a832bebf6e54f68939c18da643d993e3823a1fe42a4275eae22ce04d5b8f038a7fb4aaaab017a92acd71bf4cac75090585f1418b7d475af24b37cffe6
-
Filesize
6KB
MD5f777007378a2e62e50f52276a384748a
SHA101e62a5b12e9ba594ef269a75280d12b96d6b5f5
SHA256f187bcdfb12ec51a4aaf3bd8d2df2037291d385ca7814153402e299ac7f591ab
SHA51283443cab25342109ce3cd2e02da3e39a93bbad22a82871b113d0168e1e602bada2245b6f6ae191addd13d64bfd279bcd288506fd1c023971dc50e0b09c40a1a2
-
Filesize
6KB
MD564c7538fc8b038dca90905e2857ea37b
SHA12cb765462c97fcd63420502b0b0e3cb99b57af91
SHA256f85bd54dc8d376f55e416e8cbd0d39631e9ffdf4035bfdd221c74666c4ba8366
SHA512109ee58453af77a5034fb792dc90a144463e0431a43cf965e300c82783b02a6846457a23920707977e5c6a7cefa47156a79934f297c24c65521456cac1b4efd0
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
10KB
MD57d552c9036036462434f0b4261b90792
SHA1f3ff1c7e9384188e8b489e6c4cc94ad26909e4c9
SHA2563a19e17a7e96a4708f12df6919bb9b306abace28a5f11d7e6ca1c8a887d39bb0
SHA512ae4b06c2650cb92e294c822a4ff62a9db647c2b5cf766be8183308d187419aca3a551d227af0a5f4ed8532636f215893a0565643211861f19a45ba5f5d3e9a7c