Analysis
-
max time kernel
148s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
31-05-2024 18:14
Static task
static1
Behavioral task
behavioral1
Sample
87e301bc5c30683ca895aef92427d67a_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
87e301bc5c30683ca895aef92427d67a_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
87e301bc5c30683ca895aef92427d67a_JaffaCakes118.html
-
Size
35KB
-
MD5
87e301bc5c30683ca895aef92427d67a
-
SHA1
bc8a14e8a0e932e81b285c698cf0a6488e53bd38
-
SHA256
505d694e416601afd38f0097a3be810d314bd57a349ddf4124942d6909a91465
-
SHA512
5873796f0fff29e2625749a0cd61216485d86bd77c5a9d68d9a1b70ac3275f6828d617a7bac7f74c86d52a9f6b1fe2171f474c3671683632a9c18cd48cefd9c8
-
SSDEEP
768:ndYp9nOEqQBmiziQfiuOwu7ey8Pq1JPBhlXKgiO:ndutlnmizi6bA93PBhlB
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4288 msedge.exe 4288 msedge.exe 2300 msedge.exe 2300 msedge.exe 6136 identity_helper.exe 6136 identity_helper.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2300 wrote to memory of 4732 2300 msedge.exe 82 PID 2300 wrote to memory of 4732 2300 msedge.exe 82 PID 2300 wrote to memory of 4324 2300 msedge.exe 83 PID 2300 wrote to memory of 4324 2300 msedge.exe 83 PID 2300 wrote to memory of 4324 2300 msedge.exe 83 PID 2300 wrote to memory of 4324 2300 msedge.exe 83 PID 2300 wrote to memory of 4324 2300 msedge.exe 83 PID 2300 wrote to memory of 4324 2300 msedge.exe 83 PID 2300 wrote to memory of 4324 2300 msedge.exe 83 PID 2300 wrote to memory of 4324 2300 msedge.exe 83 PID 2300 wrote to memory of 4324 2300 msedge.exe 83 PID 2300 wrote to memory of 4324 2300 msedge.exe 83 PID 2300 wrote to memory of 4324 2300 msedge.exe 83 PID 2300 wrote to memory of 4324 2300 msedge.exe 83 PID 2300 wrote to memory of 4324 2300 msedge.exe 83 PID 2300 wrote to memory of 4324 2300 msedge.exe 83 PID 2300 wrote to memory of 4324 2300 msedge.exe 83 PID 2300 wrote to memory of 4324 2300 msedge.exe 83 PID 2300 wrote to memory of 4324 2300 msedge.exe 83 PID 2300 wrote to memory of 4324 2300 msedge.exe 83 PID 2300 wrote to memory of 4324 2300 msedge.exe 83 PID 2300 wrote to memory of 4324 2300 msedge.exe 83 PID 2300 wrote to memory of 4324 2300 msedge.exe 83 PID 2300 wrote to memory of 4324 2300 msedge.exe 83 PID 2300 wrote to memory of 4324 2300 msedge.exe 83 PID 2300 wrote to memory of 4324 2300 msedge.exe 83 PID 2300 wrote to memory of 4324 2300 msedge.exe 83 PID 2300 wrote to memory of 4324 2300 msedge.exe 83 PID 2300 wrote to memory of 4324 2300 msedge.exe 83 PID 2300 wrote to memory of 4324 2300 msedge.exe 83 PID 2300 wrote to memory of 4324 2300 msedge.exe 83 PID 2300 wrote to memory of 4324 2300 msedge.exe 83 PID 2300 wrote to memory of 4324 2300 msedge.exe 83 PID 2300 wrote to memory of 4324 2300 msedge.exe 83 PID 2300 wrote to memory of 4324 2300 msedge.exe 83 PID 2300 wrote to memory of 4324 2300 msedge.exe 83 PID 2300 wrote to memory of 4324 2300 msedge.exe 83 PID 2300 wrote to memory of 4324 2300 msedge.exe 83 PID 2300 wrote to memory of 4324 2300 msedge.exe 83 PID 2300 wrote to memory of 4324 2300 msedge.exe 83 PID 2300 wrote to memory of 4324 2300 msedge.exe 83 PID 2300 wrote to memory of 4324 2300 msedge.exe 83 PID 2300 wrote to memory of 4288 2300 msedge.exe 84 PID 2300 wrote to memory of 4288 2300 msedge.exe 84 PID 2300 wrote to memory of 3084 2300 msedge.exe 85 PID 2300 wrote to memory of 3084 2300 msedge.exe 85 PID 2300 wrote to memory of 3084 2300 msedge.exe 85 PID 2300 wrote to memory of 3084 2300 msedge.exe 85 PID 2300 wrote to memory of 3084 2300 msedge.exe 85 PID 2300 wrote to memory of 3084 2300 msedge.exe 85 PID 2300 wrote to memory of 3084 2300 msedge.exe 85 PID 2300 wrote to memory of 3084 2300 msedge.exe 85 PID 2300 wrote to memory of 3084 2300 msedge.exe 85 PID 2300 wrote to memory of 3084 2300 msedge.exe 85 PID 2300 wrote to memory of 3084 2300 msedge.exe 85 PID 2300 wrote to memory of 3084 2300 msedge.exe 85 PID 2300 wrote to memory of 3084 2300 msedge.exe 85 PID 2300 wrote to memory of 3084 2300 msedge.exe 85 PID 2300 wrote to memory of 3084 2300 msedge.exe 85 PID 2300 wrote to memory of 3084 2300 msedge.exe 85 PID 2300 wrote to memory of 3084 2300 msedge.exe 85 PID 2300 wrote to memory of 3084 2300 msedge.exe 85 PID 2300 wrote to memory of 3084 2300 msedge.exe 85 PID 2300 wrote to memory of 3084 2300 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\87e301bc5c30683ca895aef92427d67a_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa819846f8,0x7ffa81984708,0x7ffa819847182⤵PID:4732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,91980342726718301,2713071788764639921,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2060 /prefetch:22⤵PID:4324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2052,91980342726718301,2713071788764639921,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2140 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2052,91980342726718301,2713071788764639921,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2804 /prefetch:82⤵PID:3084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,91980342726718301,2713071788764639921,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3196 /prefetch:12⤵PID:464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,91980342726718301,2713071788764639921,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:5128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,91980342726718301,2713071788764639921,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4688 /prefetch:12⤵PID:964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,91980342726718301,2713071788764639921,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4604 /prefetch:12⤵PID:572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,91980342726718301,2713071788764639921,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6056 /prefetch:82⤵PID:3432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,91980342726718301,2713071788764639921,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6056 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:6136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,91980342726718301,2713071788764639921,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5704 /prefetch:12⤵PID:3396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,91980342726718301,2713071788764639921,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5716 /prefetch:12⤵PID:5236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,91980342726718301,2713071788764639921,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4504 /prefetch:12⤵PID:4944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,91980342726718301,2713071788764639921,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4916 /prefetch:12⤵PID:5188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,91980342726718301,2713071788764639921,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5004 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2260
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4944
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2656
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54b4f91fa1b362ba5341ecb2836438dea
SHA19561f5aabed742404d455da735259a2c6781fa07
SHA256d824b742eace197ddc8b6ed5d918f390fde4b0fbf0e371b8e1f2ed40a3b6455c
SHA512fef22217dcdd8000bc193e25129699d4b8f7a103ca4fe1613baf73ccf67090d9fbae27eb93e4bb8747455853a0a4326f2d0c38df41c8d42351cdcd4132418dac
-
Filesize
152B
MD5eaa3db555ab5bc0cb364826204aad3f0
SHA1a4cdfaac8de49e6e6e88b335cfeaa7c9e3c563ca
SHA256ef7baeb1b2ab05ff3c5fbb76c2759db49294654548706c7c8e87f0cde855b86b
SHA512e13981da51b52c15261ecabb98af32f9b920651b46b10ce0cc823c5878b22eb1420258c80deef204070d1e0bdd3a64d875ac2522e3713a3cf11657aa55aeccd4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD5b698100f4296e388d29d3c67539a10f6
SHA1aa4436b9f06dc1bdeade3a895a9c10802f98d555
SHA256cd3ccf2fa9a1f4ae432a7b9f50d51b8ca48d89deb7cc1fdae5367cef9d017350
SHA5129e5bf273417ab46283217003450ea2eff8f5a18b8b6f869ae770aa89cccb44c826e830d8965c3bde7802df3dbfe68cb9ee592eabe9c87a332ff69296cb257c4c
-
Filesize
820B
MD5cf3712d88be02af623a7129490d81d47
SHA1c4e897940621d652a68e31549ff526502188046d
SHA25666aa2d0a103a4d0fdb4d4454ee246febc17069b6cc771a139ea2dc4bfae1849f
SHA512d09bf5f96313bc83bb5756651b0a95d27237caefd47656009b1fae211ab9a5ac63a986805f32428aeb749d1a21beb8a16c19822092732554b8fc0013302acbf4
-
Filesize
5KB
MD5bf3507bdf6e26f09606dab9389230506
SHA18df4182aaf43cffd36949983ab57a0043d3716d7
SHA2566facdc2344ddae2e93c15323f59541f1970555a7c42b700c3d6bc82cabbde4a2
SHA512506f9e41705ea9b4264ac4e8c3888306de28787d003cb92eec9b2a9e6cf2f572ea61aa9b6bdd5b8e8974b883e37d24685e63505a74480d1fa7b2e74629f15856
-
Filesize
6KB
MD535d764c7208174a597707d507ad795a5
SHA18770b45f3fdf0cece3ab0a6cf69f713722386ed7
SHA256a3a13133c2ac22e34221f33ac1f138b51f27f298eabee6f8a7ab71bcc44e5be2
SHA5120219699f8edfcd2f535dc75868e94ffe2cef387850fd35f4c12b1f11e948a946847d55410ba55223b3faeefee39afb66e36fbd191b4b1673346c6cf4d6956d71
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\cd35ad64-afae-41bf-9150-dee601e0b3d3.tmp
Filesize6KB
MD5bdacbbb42daf2335a6555180aeec489f
SHA191a637a048fc6833f75bed1bcd164c263fd1e35e
SHA2560bf3fff7f22c63f16387dcc5d68a15e84dea21c1113235091a178137e5a7f09c
SHA5129272e98a02411163f8a355bb45ead3cfc3b7d6e4326aa95943166a5101b6dcb911438461deef7c45be74f3f929e7f41eedca2bab7c7a690ec886b3e2a3c7f8e3
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD579520adc62b5084efb6fb076268c31e5
SHA1dd16d04bf889db884c748667c8a98926478c8856
SHA2562a20ec1e72585ad456e0da0afd94f0c66fdfb9f3cd06f26866624bef30446340
SHA51293c21e8da6594ec0e2d9edff7c4701f07fa08055344808f9712a764f85c5603876ef3294eef9ad6afceedef01ed0f49d118e501f4c12b48e0d90beed97bdb587