Analysis
-
max time kernel
145s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
01-06-2024 05:45
Static task
static1
Behavioral task
behavioral1
Sample
8984aebe4d7bf186e7a32c11731a7d24_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8984aebe4d7bf186e7a32c11731a7d24_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
8984aebe4d7bf186e7a32c11731a7d24_JaffaCakes118.html
-
Size
131KB
-
MD5
8984aebe4d7bf186e7a32c11731a7d24
-
SHA1
90208ab4fa0f662217e636cfdb9b903487544028
-
SHA256
3e616acf27411ec591b7742b8df4cb3feafd26d2e827cc8705e788c5c11342ec
-
SHA512
7542fa914e4bb28a4b4af956cd078b05d843ea0493dd8ad2de447937d162ac2c6bb85ffd290181209604d414f99e3c30dced840cedde8536926ae145bda55018
-
SSDEEP
3072:SHLJj2xzDJ/zqvs7YeXZIP2Y1MXoDaubBIDfAbduQxU7b758:SH4J/zqvs7YeXZIP2Y1MXoDaubBIDfAV
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3392 msedge.exe 3392 msedge.exe 3452 msedge.exe 3452 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3452 wrote to memory of 4468 3452 msedge.exe 80 PID 3452 wrote to memory of 4468 3452 msedge.exe 80 PID 3452 wrote to memory of 4436 3452 msedge.exe 81 PID 3452 wrote to memory of 4436 3452 msedge.exe 81 PID 3452 wrote to memory of 4436 3452 msedge.exe 81 PID 3452 wrote to memory of 4436 3452 msedge.exe 81 PID 3452 wrote to memory of 4436 3452 msedge.exe 81 PID 3452 wrote to memory of 4436 3452 msedge.exe 81 PID 3452 wrote to memory of 4436 3452 msedge.exe 81 PID 3452 wrote to memory of 4436 3452 msedge.exe 81 PID 3452 wrote to memory of 4436 3452 msedge.exe 81 PID 3452 wrote to memory of 4436 3452 msedge.exe 81 PID 3452 wrote to memory of 4436 3452 msedge.exe 81 PID 3452 wrote to memory of 4436 3452 msedge.exe 81 PID 3452 wrote to memory of 4436 3452 msedge.exe 81 PID 3452 wrote to memory of 4436 3452 msedge.exe 81 PID 3452 wrote to memory of 4436 3452 msedge.exe 81 PID 3452 wrote to memory of 4436 3452 msedge.exe 81 PID 3452 wrote to memory of 4436 3452 msedge.exe 81 PID 3452 wrote to memory of 4436 3452 msedge.exe 81 PID 3452 wrote to memory of 4436 3452 msedge.exe 81 PID 3452 wrote to memory of 4436 3452 msedge.exe 81 PID 3452 wrote to memory of 4436 3452 msedge.exe 81 PID 3452 wrote to memory of 4436 3452 msedge.exe 81 PID 3452 wrote to memory of 4436 3452 msedge.exe 81 PID 3452 wrote to memory of 4436 3452 msedge.exe 81 PID 3452 wrote to memory of 4436 3452 msedge.exe 81 PID 3452 wrote to memory of 4436 3452 msedge.exe 81 PID 3452 wrote to memory of 4436 3452 msedge.exe 81 PID 3452 wrote to memory of 4436 3452 msedge.exe 81 PID 3452 wrote to memory of 4436 3452 msedge.exe 81 PID 3452 wrote to memory of 4436 3452 msedge.exe 81 PID 3452 wrote to memory of 4436 3452 msedge.exe 81 PID 3452 wrote to memory of 4436 3452 msedge.exe 81 PID 3452 wrote to memory of 4436 3452 msedge.exe 81 PID 3452 wrote to memory of 4436 3452 msedge.exe 81 PID 3452 wrote to memory of 4436 3452 msedge.exe 81 PID 3452 wrote to memory of 4436 3452 msedge.exe 81 PID 3452 wrote to memory of 4436 3452 msedge.exe 81 PID 3452 wrote to memory of 4436 3452 msedge.exe 81 PID 3452 wrote to memory of 4436 3452 msedge.exe 81 PID 3452 wrote to memory of 4436 3452 msedge.exe 81 PID 3452 wrote to memory of 3392 3452 msedge.exe 82 PID 3452 wrote to memory of 3392 3452 msedge.exe 82 PID 3452 wrote to memory of 636 3452 msedge.exe 83 PID 3452 wrote to memory of 636 3452 msedge.exe 83 PID 3452 wrote to memory of 636 3452 msedge.exe 83 PID 3452 wrote to memory of 636 3452 msedge.exe 83 PID 3452 wrote to memory of 636 3452 msedge.exe 83 PID 3452 wrote to memory of 636 3452 msedge.exe 83 PID 3452 wrote to memory of 636 3452 msedge.exe 83 PID 3452 wrote to memory of 636 3452 msedge.exe 83 PID 3452 wrote to memory of 636 3452 msedge.exe 83 PID 3452 wrote to memory of 636 3452 msedge.exe 83 PID 3452 wrote to memory of 636 3452 msedge.exe 83 PID 3452 wrote to memory of 636 3452 msedge.exe 83 PID 3452 wrote to memory of 636 3452 msedge.exe 83 PID 3452 wrote to memory of 636 3452 msedge.exe 83 PID 3452 wrote to memory of 636 3452 msedge.exe 83 PID 3452 wrote to memory of 636 3452 msedge.exe 83 PID 3452 wrote to memory of 636 3452 msedge.exe 83 PID 3452 wrote to memory of 636 3452 msedge.exe 83 PID 3452 wrote to memory of 636 3452 msedge.exe 83 PID 3452 wrote to memory of 636 3452 msedge.exe 83
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\8984aebe4d7bf186e7a32c11731a7d24_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3452 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff936df46f8,0x7ff936df4708,0x7ff936df47182⤵PID:4468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,9201809826182946137,14935125855111864360,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:22⤵PID:4436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,9201809826182946137,14935125855111864360,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2196 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,9201809826182946137,14935125855111864360,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2796 /prefetch:82⤵PID:636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,9201809826182946137,14935125855111864360,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:3360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,9201809826182946137,14935125855111864360,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:1040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,9201809826182946137,14935125855111864360,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5004 /prefetch:12⤵PID:3100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,9201809826182946137,14935125855111864360,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5100 /prefetch:12⤵PID:4620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,9201809826182946137,14935125855111864360,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2660 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4016
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2040
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4816
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3056
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52daa93382bba07cbc40af372d30ec576
SHA1c5e709dc3e2e4df2ff841fbde3e30170e7428a94
SHA2561826d2a57b1938c148bf212a47d947ed1bfb26cfc55868931f843ee438117f30
SHA51265635cb59c81548a9ef8fdb0942331e7f3cd0c30ce1d4dba48aed72dbb27b06511a55d2aeaadfadbbb4b7cb4b2e2772bbabba9603b3f7d9c8b9e4a7fbf3d6b6b
-
Filesize
152B
MD5ecdc2754d7d2ae862272153aa9b9ca6e
SHA1c19bed1c6e1c998b9fa93298639ad7961339147d
SHA256a13d791473f836edcab0e93451ce7b7182efbbc54261b2b5644d319e047a00a7
SHA512cd4fb81317d540f8b15f1495a381bb6f0f129b8923a7c06e4b5cf777d2625c30304aee6cc68aa20479e08d84e5030b43fbe93e479602400334dfdd7297f702f2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize216B
MD54704bff6df1709361f5fc06504b076dd
SHA185102341c6a5a8d752953b459eb7ae67d80dab7e
SHA25617e5c1747350cb4fc65b7e0042ed3e500cb8de44d5bca2c99a6ffbfd6f8b3a81
SHA512172a097ced17c311b340e8d26c1ddc774ad922b43c41110a76b4a893e6b320a6e1d31bafc23e57edff724046cb5dc83673ca3e186acd01a6c3134494632261f3
-
Filesize
2KB
MD51da7b80ee895ec25eca220fa413c0a27
SHA158b8893960dfdb8940e48a0b18c7c27de2e32679
SHA256fcb0cf0a1916af3d4a87eaaa1a932fe8ac7be24acc364c86e05a9d6e0ce73503
SHA5126fe6173b5e5fa28269db028bf0ec907c7df9b0a956d8c3a2563e8e5c41af6b000334524c6c931b39f85f5f6921ea4df4c5f3044c447642489367b28ebb4a957f
-
Filesize
2KB
MD5125fbf3a5043785e7ff43eb875a1b726
SHA19527aa814daaf43e5a7a0c17ce28ce8173799400
SHA256bc18aab1cbe9cc1f079f87cf833f1e21d03717b8b069564285f292f00452ee1e
SHA5126b52fca7bfbcdaf62708c978b5fc11f31ac2747fca3a7a9267241c5ad4e0270b781c3fbf645d991a6bc3b7e50a9d18fb095ec1dbc77dcccb5ceda8473773fb43
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD570eb4f51e4b1e708647fca01ec3771c9
SHA1a667f141c94effa1145c5b35aa7b1025a26bd111
SHA256a7c1c6e4273b2234f9be792dd43f0c487a7f67d68e2f1fdbbd499da68bc858ce
SHA512e5acde2f51e3c5bf7f2446a5213607efc15d3cdd8eede6861e2c187edec1c57adc6a480cd5af623b4fb3fb0ebe6b14695e0ea638d739678d3f1cefe23c7b041d
-
Filesize
6KB
MD5164d19d367d5d55abf766b9afd729828
SHA19bfb5470c88917f91d41c509ae1d00183ae1ca59
SHA256f2ea32f2fa274ad529b60e2b8ab2269e1bd105c3937748bc5fc3d324d58165ee
SHA512c25ec7cffbaa6bb6d7f9eab777b0646d280dad961f21273650f20d2c8bec349985cd8b4414186d2ac96b8c8646e2fd728a67d406a081e598f047f8b1729119d0
-
Filesize
10KB
MD59a9064b6c515f70e182c51a8ac1b83bf
SHA1cd55bc871ab8687a70e78db463660b37579f23e3
SHA2561f6529f88b9bbc6a059c08fae72441dde40b44019bd56b1409e7d0610554c15a
SHA5127c411d76071b805fe91966e6dce28d4787d6b80df1b7ac195ab9a332c1229e232d6c7ca6b9c13f201f3e0b93380bf6285f770ae8d5b1aa0854f9a6d201a43774