Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
01/06/2024, 14:54
Static task
static1
Behavioral task
behavioral1
Sample
8acf56aa62e84bb66d9b82bb7e4722ad_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
8acf56aa62e84bb66d9b82bb7e4722ad_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
8acf56aa62e84bb66d9b82bb7e4722ad_JaffaCakes118.html
-
Size
61KB
-
MD5
8acf56aa62e84bb66d9b82bb7e4722ad
-
SHA1
42795ba854ea6d1da8f498439f920a93c0933007
-
SHA256
bdb16a10f07e0df1ef2bf92b6dffc0a3fc45adabafc2e2780310e6df608d66eb
-
SHA512
409717847beacb96987afa515778670111e5ec8ca6f26d18903a63b0b2c90bef9b7ea4e5ec297319267b8421f6c576fc3ec71b774ab52544694d77dc1068a2ac
-
SSDEEP
768:CR1hYFAcTt7GLJ+2/FjE+LAt17FmdB9Z/:CR12AcZ7GLJjE+LC1IdB9x
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1100 msedge.exe 1100 msedge.exe 4472 msedge.exe 4472 msedge.exe 4864 identity_helper.exe 4864 identity_helper.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe 4472 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4472 wrote to memory of 216 4472 msedge.exe 83 PID 4472 wrote to memory of 216 4472 msedge.exe 83 PID 4472 wrote to memory of 3412 4472 msedge.exe 84 PID 4472 wrote to memory of 3412 4472 msedge.exe 84 PID 4472 wrote to memory of 3412 4472 msedge.exe 84 PID 4472 wrote to memory of 3412 4472 msedge.exe 84 PID 4472 wrote to memory of 3412 4472 msedge.exe 84 PID 4472 wrote to memory of 3412 4472 msedge.exe 84 PID 4472 wrote to memory of 3412 4472 msedge.exe 84 PID 4472 wrote to memory of 3412 4472 msedge.exe 84 PID 4472 wrote to memory of 3412 4472 msedge.exe 84 PID 4472 wrote to memory of 3412 4472 msedge.exe 84 PID 4472 wrote to memory of 3412 4472 msedge.exe 84 PID 4472 wrote to memory of 3412 4472 msedge.exe 84 PID 4472 wrote to memory of 3412 4472 msedge.exe 84 PID 4472 wrote to memory of 3412 4472 msedge.exe 84 PID 4472 wrote to memory of 3412 4472 msedge.exe 84 PID 4472 wrote to memory of 3412 4472 msedge.exe 84 PID 4472 wrote to memory of 3412 4472 msedge.exe 84 PID 4472 wrote to memory of 3412 4472 msedge.exe 84 PID 4472 wrote to memory of 3412 4472 msedge.exe 84 PID 4472 wrote to memory of 3412 4472 msedge.exe 84 PID 4472 wrote to memory of 3412 4472 msedge.exe 84 PID 4472 wrote to memory of 3412 4472 msedge.exe 84 PID 4472 wrote to memory of 3412 4472 msedge.exe 84 PID 4472 wrote to memory of 3412 4472 msedge.exe 84 PID 4472 wrote to memory of 3412 4472 msedge.exe 84 PID 4472 wrote to memory of 3412 4472 msedge.exe 84 PID 4472 wrote to memory of 3412 4472 msedge.exe 84 PID 4472 wrote to memory of 3412 4472 msedge.exe 84 PID 4472 wrote to memory of 3412 4472 msedge.exe 84 PID 4472 wrote to memory of 3412 4472 msedge.exe 84 PID 4472 wrote to memory of 3412 4472 msedge.exe 84 PID 4472 wrote to memory of 3412 4472 msedge.exe 84 PID 4472 wrote to memory of 3412 4472 msedge.exe 84 PID 4472 wrote to memory of 3412 4472 msedge.exe 84 PID 4472 wrote to memory of 3412 4472 msedge.exe 84 PID 4472 wrote to memory of 3412 4472 msedge.exe 84 PID 4472 wrote to memory of 3412 4472 msedge.exe 84 PID 4472 wrote to memory of 3412 4472 msedge.exe 84 PID 4472 wrote to memory of 3412 4472 msedge.exe 84 PID 4472 wrote to memory of 3412 4472 msedge.exe 84 PID 4472 wrote to memory of 1100 4472 msedge.exe 85 PID 4472 wrote to memory of 1100 4472 msedge.exe 85 PID 4472 wrote to memory of 2044 4472 msedge.exe 86 PID 4472 wrote to memory of 2044 4472 msedge.exe 86 PID 4472 wrote to memory of 2044 4472 msedge.exe 86 PID 4472 wrote to memory of 2044 4472 msedge.exe 86 PID 4472 wrote to memory of 2044 4472 msedge.exe 86 PID 4472 wrote to memory of 2044 4472 msedge.exe 86 PID 4472 wrote to memory of 2044 4472 msedge.exe 86 PID 4472 wrote to memory of 2044 4472 msedge.exe 86 PID 4472 wrote to memory of 2044 4472 msedge.exe 86 PID 4472 wrote to memory of 2044 4472 msedge.exe 86 PID 4472 wrote to memory of 2044 4472 msedge.exe 86 PID 4472 wrote to memory of 2044 4472 msedge.exe 86 PID 4472 wrote to memory of 2044 4472 msedge.exe 86 PID 4472 wrote to memory of 2044 4472 msedge.exe 86 PID 4472 wrote to memory of 2044 4472 msedge.exe 86 PID 4472 wrote to memory of 2044 4472 msedge.exe 86 PID 4472 wrote to memory of 2044 4472 msedge.exe 86 PID 4472 wrote to memory of 2044 4472 msedge.exe 86 PID 4472 wrote to memory of 2044 4472 msedge.exe 86 PID 4472 wrote to memory of 2044 4472 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\8acf56aa62e84bb66d9b82bb7e4722ad_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4472 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9b83646f8,0x7ff9b8364708,0x7ff9b83647182⤵PID:216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,11269545983352560244,17192948984564727064,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:22⤵PID:3412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,11269545983352560244,17192948984564727064,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2372 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,11269545983352560244,17192948984564727064,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2808 /prefetch:82⤵PID:2044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,11269545983352560244,17192948984564727064,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:4192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,11269545983352560244,17192948984564727064,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:2448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,11269545983352560244,17192948984564727064,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4912 /prefetch:12⤵PID:1208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,11269545983352560244,17192948984564727064,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1072 /prefetch:82⤵PID:3356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,11269545983352560244,17192948984564727064,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1072 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,11269545983352560244,17192948984564727064,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5056 /prefetch:12⤵PID:924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,11269545983352560244,17192948984564727064,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5040 /prefetch:12⤵PID:1216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,11269545983352560244,17192948984564727064,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5156 /prefetch:12⤵PID:1176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,11269545983352560244,17192948984564727064,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5944 /prefetch:12⤵PID:1892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,11269545983352560244,17192948984564727064,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6132 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1808
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4896
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5008
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4932
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD58e2b19df4297a9f6b87b916d9d248d3c
SHA1c77eab71a82deba5de636905a9aef5ce5c2398ba
SHA25618040975490c9d4c5eda003ea8918a3e43af814cee0d2677b3940f2099b439a3
SHA5122feb22c769c6c39826d7a50f8da5d23b501ca37752a401e72f29838e756e824673a740ac87b79b3c2283d05acd7aad9ecf250ae5988802d649091263c9b988b3
-
Filesize
1KB
MD55ae8a394d48b2f9aae2e25785a02f22d
SHA1a69ee2417ac464b0f02d4f08c5cc108dd31a720f
SHA2569dfbd0b23efabd976f49712b3c70a4c13ee6c850d05b379ef1cc83d24a04fdad
SHA51278bb8be1ce401fa44ffb7cbfde7443fa53641717aac727c573401c1d3f362b17b42b10745ed1cc4814528daba6d14bff93509625fecc6137712f95d28a368b0f
-
Filesize
5KB
MD5c21705a1650a4bc395628896bab166b3
SHA1d146f259cf8116232169691348091ccedbfa874e
SHA2569bd18c9e48e40043f1fa51cdc777a2d8fcc70b64760f616f4be1dd75a84a428a
SHA51201161a33b985b0a4b59f5b80d6f6d10539cfd42bfdb00fdb9a385b20de31ab3bb67f683f6f4c526fe9fe69c23a434d49854ab238459330630b489b81baf6125a
-
Filesize
6KB
MD5ea285e12666d4e591fed78c147dbe1c0
SHA19ed2950ffaa50f2f71c5f1e383a03a2d8aa4f441
SHA25697d48eefba26d9ae23e6c4c8684e73016259dd49e6a89b6036e3970429a0ec95
SHA5129f609834db5dca33874b8ff06be4ebb05dee4e8cea9ca32d6296be4752de4f525d59428509c293344877cbce8bf4258203ce79411f3cb15d3cbab8265b8df6c5
-
Filesize
6KB
MD5752c25967ba96174545a7d1781e86e17
SHA1cafc0b19f6a8adebe046cdf5056d09f71bfc760e
SHA256ed657014869b8d43e4dddf5dcab4fe29dd8260a3a67e00a0a01ecebe233a6525
SHA51256acdc7f8ec2270b9e1115f3c296789f843d2b95fe06b1ff5ff29efcbf11b86af49a42550b57ead4d52b6f4c1e668ac67d0b17758e6867d785fe01eb54330c00
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD52d09d87f9a377c453b2ff3f5f52fe2b3
SHA12060aa67d0a8ce538fb852d06821fa2b5ae56b01
SHA2561470974c274cf6dee77af7f7cedc3c7c5265c0b0c75b7e245d9344d0bb08e059
SHA51272207b168eee316e97d172161c46900cfa97ca3a69b760917f59c22b266fa68197c299178faeb7a05e920343f0068cd4bd2714e4cc71029d8feb977a4d3570d6