Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
01/06/2024, 00:06
Static task
static1
Behavioral task
behavioral1
Sample
88cfeb99e2c8621a1842da5001169e2c_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
88cfeb99e2c8621a1842da5001169e2c_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
88cfeb99e2c8621a1842da5001169e2c_JaffaCakes118.html
-
Size
175KB
-
MD5
88cfeb99e2c8621a1842da5001169e2c
-
SHA1
e91588013f114b1531c10762ccd7b02061aee458
-
SHA256
3b858e8e491e6a6fbe5808dd1df42b5151f4ef467eb589cfe3530402c66fd7b3
-
SHA512
a2d82e7f21df140f4c01d525d581f7c5e3957ae9c8b7d5e661da2b2bf7864fb67464e3c966584443bb8d7d298360a950cf8f146e4e308346ec313851eceacdb5
-
SSDEEP
1536:Sqtz8hd8Wu8pI8Cd8hd8dQg0H//3oS3fGNkFpIYfBCJisd+aeTH+WK/Lf1/hmnV+:SOoT3f/FjBCJiVm
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3964 msedge.exe 3964 msedge.exe 3240 msedge.exe 3240 msedge.exe 2760 identity_helper.exe 2760 identity_helper.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe 3240 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3240 wrote to memory of 4828 3240 msedge.exe 81 PID 3240 wrote to memory of 4828 3240 msedge.exe 81 PID 3240 wrote to memory of 452 3240 msedge.exe 82 PID 3240 wrote to memory of 452 3240 msedge.exe 82 PID 3240 wrote to memory of 452 3240 msedge.exe 82 PID 3240 wrote to memory of 452 3240 msedge.exe 82 PID 3240 wrote to memory of 452 3240 msedge.exe 82 PID 3240 wrote to memory of 452 3240 msedge.exe 82 PID 3240 wrote to memory of 452 3240 msedge.exe 82 PID 3240 wrote to memory of 452 3240 msedge.exe 82 PID 3240 wrote to memory of 452 3240 msedge.exe 82 PID 3240 wrote to memory of 452 3240 msedge.exe 82 PID 3240 wrote to memory of 452 3240 msedge.exe 82 PID 3240 wrote to memory of 452 3240 msedge.exe 82 PID 3240 wrote to memory of 452 3240 msedge.exe 82 PID 3240 wrote to memory of 452 3240 msedge.exe 82 PID 3240 wrote to memory of 452 3240 msedge.exe 82 PID 3240 wrote to memory of 452 3240 msedge.exe 82 PID 3240 wrote to memory of 452 3240 msedge.exe 82 PID 3240 wrote to memory of 452 3240 msedge.exe 82 PID 3240 wrote to memory of 452 3240 msedge.exe 82 PID 3240 wrote to memory of 452 3240 msedge.exe 82 PID 3240 wrote to memory of 452 3240 msedge.exe 82 PID 3240 wrote to memory of 452 3240 msedge.exe 82 PID 3240 wrote to memory of 452 3240 msedge.exe 82 PID 3240 wrote to memory of 452 3240 msedge.exe 82 PID 3240 wrote to memory of 452 3240 msedge.exe 82 PID 3240 wrote to memory of 452 3240 msedge.exe 82 PID 3240 wrote to memory of 452 3240 msedge.exe 82 PID 3240 wrote to memory of 452 3240 msedge.exe 82 PID 3240 wrote to memory of 452 3240 msedge.exe 82 PID 3240 wrote to memory of 452 3240 msedge.exe 82 PID 3240 wrote to memory of 452 3240 msedge.exe 82 PID 3240 wrote to memory of 452 3240 msedge.exe 82 PID 3240 wrote to memory of 452 3240 msedge.exe 82 PID 3240 wrote to memory of 452 3240 msedge.exe 82 PID 3240 wrote to memory of 452 3240 msedge.exe 82 PID 3240 wrote to memory of 452 3240 msedge.exe 82 PID 3240 wrote to memory of 452 3240 msedge.exe 82 PID 3240 wrote to memory of 452 3240 msedge.exe 82 PID 3240 wrote to memory of 452 3240 msedge.exe 82 PID 3240 wrote to memory of 452 3240 msedge.exe 82 PID 3240 wrote to memory of 3964 3240 msedge.exe 83 PID 3240 wrote to memory of 3964 3240 msedge.exe 83 PID 3240 wrote to memory of 912 3240 msedge.exe 84 PID 3240 wrote to memory of 912 3240 msedge.exe 84 PID 3240 wrote to memory of 912 3240 msedge.exe 84 PID 3240 wrote to memory of 912 3240 msedge.exe 84 PID 3240 wrote to memory of 912 3240 msedge.exe 84 PID 3240 wrote to memory of 912 3240 msedge.exe 84 PID 3240 wrote to memory of 912 3240 msedge.exe 84 PID 3240 wrote to memory of 912 3240 msedge.exe 84 PID 3240 wrote to memory of 912 3240 msedge.exe 84 PID 3240 wrote to memory of 912 3240 msedge.exe 84 PID 3240 wrote to memory of 912 3240 msedge.exe 84 PID 3240 wrote to memory of 912 3240 msedge.exe 84 PID 3240 wrote to memory of 912 3240 msedge.exe 84 PID 3240 wrote to memory of 912 3240 msedge.exe 84 PID 3240 wrote to memory of 912 3240 msedge.exe 84 PID 3240 wrote to memory of 912 3240 msedge.exe 84 PID 3240 wrote to memory of 912 3240 msedge.exe 84 PID 3240 wrote to memory of 912 3240 msedge.exe 84 PID 3240 wrote to memory of 912 3240 msedge.exe 84 PID 3240 wrote to memory of 912 3240 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\88cfeb99e2c8621a1842da5001169e2c_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3240 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9a06c46f8,0x7ff9a06c4708,0x7ff9a06c47182⤵PID:4828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,5752299037996369564,16689021354223740167,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2072 /prefetch:22⤵PID:452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2064,5752299037996369564,16689021354223740167,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2296 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2064,5752299037996369564,16689021354223740167,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2768 /prefetch:82⤵PID:912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,5752299037996369564,16689021354223740167,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:4044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,5752299037996369564,16689021354223740167,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:4136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,5752299037996369564,16689021354223740167,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4736 /prefetch:12⤵PID:3820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,5752299037996369564,16689021354223740167,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4772 /prefetch:12⤵PID:2180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,5752299037996369564,16689021354223740167,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5280 /prefetch:12⤵PID:5024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,5752299037996369564,16689021354223740167,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4856 /prefetch:12⤵PID:5616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,5752299037996369564,16689021354223740167,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3364 /prefetch:12⤵PID:4000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,5752299037996369564,16689021354223740167,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3944 /prefetch:12⤵PID:3660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,5752299037996369564,16689021354223740167,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5900 /prefetch:82⤵PID:3620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,5752299037996369564,16689021354223740167,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5900 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,5752299037996369564,16689021354223740167,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6120 /prefetch:12⤵PID:1912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,5752299037996369564,16689021354223740167,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6048 /prefetch:12⤵PID:4752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,5752299037996369564,16689021354223740167,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1992 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5020
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5192
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2772
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1048
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ae54e9db2e89f2c54da8cc0bfcbd26bd
SHA1a88af6c673609ecbc51a1a60dfbc8577830d2b5d
SHA2565009d3c953de63cfd14a7d911156c514e179ff07d2b94382d9caac6040cb72af
SHA512e3b70e5eb7321b9deca6f6a17424a15b9fd5c4008bd3789bd01099fd13cb2f4a2f37fe4b920fb51c50517745b576c1f94df83efd1a7e75949551163985599998
-
Filesize
152B
MD5f53207a5ca2ef5c7e976cbb3cb26d870
SHA149a8cc44f53da77bb3dfb36fc7676ed54675db43
SHA25619ab4e3c9da6d9cedda7461efdba9a2085e743513ab89f1dd0fd5a8f9486ad23
SHA512be734c7e8afda19f445912aef0d78f9941add29baebd4a812bff27f10a1d78b52aeb11c551468c8644443c86e1a2a6b2e4aead3d7f81d39925e3c20406ac1499
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize336B
MD5bd207bf4ac6e6e63880f4836c879eaf9
SHA14c585628dc7a22d7a0ffa15d9adff0addbb91e36
SHA2563377871b6c11355684e1641a80c7f605fffc46e758a529c498aab519b680d288
SHA512d55fe0bfcfc78d9d040a7ece58f0045f947c7d39577c67384a7e341192da7a1c66d8aba7a7c3d79e1cd3b41a1489b3db1c1909d7c5f8c20031d896ffb8bf5e56
-
Filesize
2KB
MD59edfd363f462b62f8d08a6d949dd2081
SHA1c2c58ea013c69171ee50e50549ea6d90a3446087
SHA256e016dfdc3e1b2cf4d355e694583c4f67f20c3a6cb4e9b1f665188b9120fe4a25
SHA5128dd6fde7b7fe2b0a6bb1aa963a766090b421c087c47f81b4d82bb5372f0578be6149321ffadf605703e4a6bd29f82e82ddbeb86cd02c7ffa774f040124d97d29
-
Filesize
2KB
MD57e384ad5bbbb5c78efcda7591680a531
SHA17d5af7c18406cefc4104f99b3f074dc35350723d
SHA256b10dbdb8043ca497899d6f062ca43b7d6155f4b4f9aac14c60eef1616a164d80
SHA512bc9640ffbea80b61207e88c470ad359c535498ee797db0dade40615b57932fc7583724c5892b627a82cf65c6d3139156438b8e38aa75a64916900543a40a459f
-
Filesize
5KB
MD577afeb2a5ed80de023c55a21110b7312
SHA1ef0c975707503ce1f7697233e0462a36d15ee138
SHA256ea5907ed897b4d90a87f41ee489511d29962ad6ef7f310746f60bfe61393f5a8
SHA512a1b0e0de5cab2791f35e176c3bf00c965401bd905180b4fd3ea68ef6594e1a9479f3a83dac5da5140e5a304a017d302f320bd7d78b58f2d0ec0a23c254f16ec3
-
Filesize
7KB
MD5bb725b5932c59d4f55e14b520f0566ec
SHA12da33bca14775dd610f8be209659897bb2bcf402
SHA25604873272c90799614113180b7c930a1d5ee24321d70981ae8bfad8cda647add8
SHA512124c6a54818ab6a8b86ef3e42f8a69ed6ea6c6c5e1d7f150aec5b37526298ae2c10081ae1069669d095006e72a631babf7a944181c0daa01eb720eff68dae0ff
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5704695e7468c4ed44277fd02a558bba9
SHA1a9daf4631e74d81ee7a0f81b300970389b2d664c
SHA25612d56bad571b44e69e02c4a4d521231749499f369776e191a6a6445947395091
SHA51249927296c615d314b5563111ab70972384348ac8db51dd57e9ae0cce93d851e0f22561161d2f581f6a08770c9116fa665951a2d17978ddb9e9b770663a030569