Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
01-06-2024 06:57
Static task
static1
Behavioral task
behavioral1
Sample
89ad5a46722b7b17a585f6e07cfea4b7_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
89ad5a46722b7b17a585f6e07cfea4b7_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
89ad5a46722b7b17a585f6e07cfea4b7_JaffaCakes118.html
-
Size
504KB
-
MD5
89ad5a46722b7b17a585f6e07cfea4b7
-
SHA1
18ab6d708a64040ac72554f34492e669af91301f
-
SHA256
b7957f13ed2149beee4bddba5646c537d14fc4ce81acbf19eea040c4324e5b38
-
SHA512
7a6a18341a86d1ee9313645b182d47e66177c8243322e12940328a3e07513251965eab536f49cb9374d9df1eb46ae395a3ffcc078af4ba3fe516420d139f8860
-
SSDEEP
3072:wl+IpBxYUV69zfs49PwVeL5AmPTmBcM2wqL1F8g:wl+IpBxn4tLT5
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4816 msedge.exe 4816 msedge.exe 1512 msedge.exe 1512 msedge.exe 208 identity_helper.exe 208 identity_helper.exe 2604 msedge.exe 2604 msedge.exe 2604 msedge.exe 2604 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1512 wrote to memory of 3844 1512 msedge.exe 83 PID 1512 wrote to memory of 3844 1512 msedge.exe 83 PID 1512 wrote to memory of 3996 1512 msedge.exe 84 PID 1512 wrote to memory of 3996 1512 msedge.exe 84 PID 1512 wrote to memory of 3996 1512 msedge.exe 84 PID 1512 wrote to memory of 3996 1512 msedge.exe 84 PID 1512 wrote to memory of 3996 1512 msedge.exe 84 PID 1512 wrote to memory of 3996 1512 msedge.exe 84 PID 1512 wrote to memory of 3996 1512 msedge.exe 84 PID 1512 wrote to memory of 3996 1512 msedge.exe 84 PID 1512 wrote to memory of 3996 1512 msedge.exe 84 PID 1512 wrote to memory of 3996 1512 msedge.exe 84 PID 1512 wrote to memory of 3996 1512 msedge.exe 84 PID 1512 wrote to memory of 3996 1512 msedge.exe 84 PID 1512 wrote to memory of 3996 1512 msedge.exe 84 PID 1512 wrote to memory of 3996 1512 msedge.exe 84 PID 1512 wrote to memory of 3996 1512 msedge.exe 84 PID 1512 wrote to memory of 3996 1512 msedge.exe 84 PID 1512 wrote to memory of 3996 1512 msedge.exe 84 PID 1512 wrote to memory of 3996 1512 msedge.exe 84 PID 1512 wrote to memory of 3996 1512 msedge.exe 84 PID 1512 wrote to memory of 3996 1512 msedge.exe 84 PID 1512 wrote to memory of 3996 1512 msedge.exe 84 PID 1512 wrote to memory of 3996 1512 msedge.exe 84 PID 1512 wrote to memory of 3996 1512 msedge.exe 84 PID 1512 wrote to memory of 3996 1512 msedge.exe 84 PID 1512 wrote to memory of 3996 1512 msedge.exe 84 PID 1512 wrote to memory of 3996 1512 msedge.exe 84 PID 1512 wrote to memory of 3996 1512 msedge.exe 84 PID 1512 wrote to memory of 3996 1512 msedge.exe 84 PID 1512 wrote to memory of 3996 1512 msedge.exe 84 PID 1512 wrote to memory of 3996 1512 msedge.exe 84 PID 1512 wrote to memory of 3996 1512 msedge.exe 84 PID 1512 wrote to memory of 3996 1512 msedge.exe 84 PID 1512 wrote to memory of 3996 1512 msedge.exe 84 PID 1512 wrote to memory of 3996 1512 msedge.exe 84 PID 1512 wrote to memory of 3996 1512 msedge.exe 84 PID 1512 wrote to memory of 3996 1512 msedge.exe 84 PID 1512 wrote to memory of 3996 1512 msedge.exe 84 PID 1512 wrote to memory of 3996 1512 msedge.exe 84 PID 1512 wrote to memory of 3996 1512 msedge.exe 84 PID 1512 wrote to memory of 3996 1512 msedge.exe 84 PID 1512 wrote to memory of 4816 1512 msedge.exe 85 PID 1512 wrote to memory of 4816 1512 msedge.exe 85 PID 1512 wrote to memory of 4088 1512 msedge.exe 86 PID 1512 wrote to memory of 4088 1512 msedge.exe 86 PID 1512 wrote to memory of 4088 1512 msedge.exe 86 PID 1512 wrote to memory of 4088 1512 msedge.exe 86 PID 1512 wrote to memory of 4088 1512 msedge.exe 86 PID 1512 wrote to memory of 4088 1512 msedge.exe 86 PID 1512 wrote to memory of 4088 1512 msedge.exe 86 PID 1512 wrote to memory of 4088 1512 msedge.exe 86 PID 1512 wrote to memory of 4088 1512 msedge.exe 86 PID 1512 wrote to memory of 4088 1512 msedge.exe 86 PID 1512 wrote to memory of 4088 1512 msedge.exe 86 PID 1512 wrote to memory of 4088 1512 msedge.exe 86 PID 1512 wrote to memory of 4088 1512 msedge.exe 86 PID 1512 wrote to memory of 4088 1512 msedge.exe 86 PID 1512 wrote to memory of 4088 1512 msedge.exe 86 PID 1512 wrote to memory of 4088 1512 msedge.exe 86 PID 1512 wrote to memory of 4088 1512 msedge.exe 86 PID 1512 wrote to memory of 4088 1512 msedge.exe 86 PID 1512 wrote to memory of 4088 1512 msedge.exe 86 PID 1512 wrote to memory of 4088 1512 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\89ad5a46722b7b17a585f6e07cfea4b7_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffd7e046f8,0x7fffd7e04708,0x7fffd7e047182⤵PID:3844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,4722922057233381420,17542224721914087391,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:22⤵PID:3996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,4722922057233381420,17542224721914087391,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2252 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2116,4722922057233381420,17542224721914087391,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2728 /prefetch:82⤵PID:4088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,4722922057233381420,17542224721914087391,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3196 /prefetch:12⤵PID:4996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,4722922057233381420,17542224721914087391,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3208 /prefetch:12⤵PID:5060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,4722922057233381420,17542224721914087391,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3928 /prefetch:12⤵PID:3544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,4722922057233381420,17542224721914087391,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4856 /prefetch:12⤵PID:2864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,4722922057233381420,17542224721914087391,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2640 /prefetch:82⤵PID:2236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,4722922057233381420,17542224721914087391,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2640 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,4722922057233381420,17542224721914087391,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5792 /prefetch:12⤵PID:2564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,4722922057233381420,17542224721914087391,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5116 /prefetch:12⤵PID:2456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,4722922057233381420,17542224721914087391,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6016 /prefetch:12⤵PID:1184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,4722922057233381420,17542224721914087391,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6036 /prefetch:12⤵PID:4136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,4722922057233381420,17542224721914087391,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5776 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2604
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5092
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2956
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f61fa5143fe872d1d8f1e9f8dc6544f9
SHA1df44bab94d7388fb38c63085ec4db80cfc5eb009
SHA256284a24b5b40860240db00ef3ae6a33c9fa8349ab5490a634e27b2c6e9a191c64
SHA512971000784a6518bb39c5cf043292c7ab659162275470f5f6b632ea91a6bcae83bc80517ceb983dd5abfe8fb4e157344cb65c27e609a879eec00b33c5fad563a6
-
Filesize
152B
MD587f7abeb82600e1e640b843ad50fe0a1
SHA1045bbada3f23fc59941bf7d0210fb160cb78ae87
SHA256b35d6906050d90a81d23646f86c20a8f5d42f058ffc6436fb0a2b8bd71ee1262
SHA512ea8e7f24ab823ad710ce079c86c40aa957353a00d2775732c23e31be88a10d212e974c4691279aa86016c4660f5795febf739a15207833df6ed964a9ed99d618
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\8c104982-6c22-4d48-9feb-5beaa440abc3.tmp
Filesize5KB
MD589245f7e4bc028d7c14cd6bef4e646e3
SHA13fe716aa740f1a9aaf4fe3a03451e0590880a714
SHA25621dff85a0bad314a47c3a1c879851f4310ce58113f99a9dfeb27aa3178f0fd24
SHA51296031cdce10a5ab0e8fd78bbfc22b9e153e813388e70645d7c367b1341cfe15cca4a990ac9c92c6584aa029212181f14b3a096ff996f03f3d9e30e4c4aee40ec
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD5e9b3fa7eaa718e2f508466766df748c3
SHA1fd5fafad922251fc09360266a57169afc05f452f
SHA256891496c49cab94afc29298614ef08b41b59a01ea78809f4c771aa6126c01e0d1
SHA512b78d83360c9f389ff6cae62c47954cebf0a4547c175a3caacb4cf55a1bb68a5a33acf952871a7104e6d571a9f123aadcfe34c1b6234b546b8c885050d559ca91
-
Filesize
970B
MD5f7c12e48b3e5665697042d16e35e525d
SHA1dd2e03caf9514e65bcbbb9142ac3a22c31cf36fe
SHA256efb37f8a0ac68868fd71786e6d2c824ddecaf4ca73313d788ac7d0cc0f31c361
SHA5126aefde45b259e66396671a94c7a76dddf75a26034565204386728296bd9ce4b5fbeadb4fba236d384a6ea9ac4afc8f2f55f2b85b5169eb18dbd28f198bd4cb89
-
Filesize
6KB
MD5d084c66b4a1d82a7a408431a8955e7c1
SHA1064f92776215390d5f40551225f2898392518499
SHA256128aa5eabe5626372f1039090c0e2c10a06682cc17c99ef83bc679c3518a6d91
SHA51295d287333bfc52201a5f316ea0e19c6dcf821c69cb586599f9bb900d61befa53a4d96e118d585c0419522eff8c2d912417d3c35fa320827c5d4100132b8c7eac
-
Filesize
6KB
MD515c4dfab45e75557100d73fc48b82c9d
SHA1c73c9775bb5b62c25370022786c7ae5dcb976af8
SHA2565f0340a06a91e4988cc31574801ec506840654ea1732538afb57c16f688cc799
SHA512696ebf13d40e3ba18b844258c8cf43cf01cff5858dd1434b921007569430f204c4a02295ffc1d2ee8f55b9f99a23cde866c676d7ab67be493b234b64479719b1
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD52f536107dea979d426a25e892e263505
SHA1696616d65010188c976750c8a1957599b88d5b99
SHA2564ccbf93764583ac89a22b8759258f4807c8c37d72836c424899eea7c9c43592c
SHA5124d578b7286c981fad477d574f0e270239c8447a1b2dd7c3db33ee07deca67f951d34c9c9665c0d2a3cf20f7f32b71e61abe73c8302f8fbc92998994b8f7fc4af