Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
01-06-2024 18:09
Static task
static1
Behavioral task
behavioral1
Sample
8b4ef435e0a20e3e069b71b8273a6a5e_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
8b4ef435e0a20e3e069b71b8273a6a5e_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
8b4ef435e0a20e3e069b71b8273a6a5e_JaffaCakes118.html
-
Size
175KB
-
MD5
8b4ef435e0a20e3e069b71b8273a6a5e
-
SHA1
02924d28608d8573475e90b57cb58797f0f2e6b4
-
SHA256
5612ec89c79a66f54a0805cdc1464c6777bfb58afd586edbe7b05346214a8bb0
-
SHA512
851b7969e95214a508884a950d5009d27f3c93e375cd57d9ca1535e173447d3707d8c6d931d63f85f454289c9798e7b732531f0f256c1f9829f06db7b04097f8
-
SSDEEP
1536:SqtH8gd8Wu8pI8Cd8hd8dQgbH//WoS3FGNkFmYfBCJiZu+aeTH+WK/Lf1/hpnVSV:S9CT3F/FvBCJiRB
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2248 msedge.exe 2248 msedge.exe 552 msedge.exe 552 msedge.exe 4032 identity_helper.exe 4032 identity_helper.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe 1148 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 552 wrote to memory of 2240 552 msedge.exe 82 PID 552 wrote to memory of 2240 552 msedge.exe 82 PID 552 wrote to memory of 532 552 msedge.exe 83 PID 552 wrote to memory of 532 552 msedge.exe 83 PID 552 wrote to memory of 532 552 msedge.exe 83 PID 552 wrote to memory of 532 552 msedge.exe 83 PID 552 wrote to memory of 532 552 msedge.exe 83 PID 552 wrote to memory of 532 552 msedge.exe 83 PID 552 wrote to memory of 532 552 msedge.exe 83 PID 552 wrote to memory of 532 552 msedge.exe 83 PID 552 wrote to memory of 532 552 msedge.exe 83 PID 552 wrote to memory of 532 552 msedge.exe 83 PID 552 wrote to memory of 532 552 msedge.exe 83 PID 552 wrote to memory of 532 552 msedge.exe 83 PID 552 wrote to memory of 532 552 msedge.exe 83 PID 552 wrote to memory of 532 552 msedge.exe 83 PID 552 wrote to memory of 532 552 msedge.exe 83 PID 552 wrote to memory of 532 552 msedge.exe 83 PID 552 wrote to memory of 532 552 msedge.exe 83 PID 552 wrote to memory of 532 552 msedge.exe 83 PID 552 wrote to memory of 532 552 msedge.exe 83 PID 552 wrote to memory of 532 552 msedge.exe 83 PID 552 wrote to memory of 532 552 msedge.exe 83 PID 552 wrote to memory of 532 552 msedge.exe 83 PID 552 wrote to memory of 532 552 msedge.exe 83 PID 552 wrote to memory of 532 552 msedge.exe 83 PID 552 wrote to memory of 532 552 msedge.exe 83 PID 552 wrote to memory of 532 552 msedge.exe 83 PID 552 wrote to memory of 532 552 msedge.exe 83 PID 552 wrote to memory of 532 552 msedge.exe 83 PID 552 wrote to memory of 532 552 msedge.exe 83 PID 552 wrote to memory of 532 552 msedge.exe 83 PID 552 wrote to memory of 532 552 msedge.exe 83 PID 552 wrote to memory of 532 552 msedge.exe 83 PID 552 wrote to memory of 532 552 msedge.exe 83 PID 552 wrote to memory of 532 552 msedge.exe 83 PID 552 wrote to memory of 532 552 msedge.exe 83 PID 552 wrote to memory of 532 552 msedge.exe 83 PID 552 wrote to memory of 532 552 msedge.exe 83 PID 552 wrote to memory of 532 552 msedge.exe 83 PID 552 wrote to memory of 532 552 msedge.exe 83 PID 552 wrote to memory of 532 552 msedge.exe 83 PID 552 wrote to memory of 2248 552 msedge.exe 84 PID 552 wrote to memory of 2248 552 msedge.exe 84 PID 552 wrote to memory of 1396 552 msedge.exe 85 PID 552 wrote to memory of 1396 552 msedge.exe 85 PID 552 wrote to memory of 1396 552 msedge.exe 85 PID 552 wrote to memory of 1396 552 msedge.exe 85 PID 552 wrote to memory of 1396 552 msedge.exe 85 PID 552 wrote to memory of 1396 552 msedge.exe 85 PID 552 wrote to memory of 1396 552 msedge.exe 85 PID 552 wrote to memory of 1396 552 msedge.exe 85 PID 552 wrote to memory of 1396 552 msedge.exe 85 PID 552 wrote to memory of 1396 552 msedge.exe 85 PID 552 wrote to memory of 1396 552 msedge.exe 85 PID 552 wrote to memory of 1396 552 msedge.exe 85 PID 552 wrote to memory of 1396 552 msedge.exe 85 PID 552 wrote to memory of 1396 552 msedge.exe 85 PID 552 wrote to memory of 1396 552 msedge.exe 85 PID 552 wrote to memory of 1396 552 msedge.exe 85 PID 552 wrote to memory of 1396 552 msedge.exe 85 PID 552 wrote to memory of 1396 552 msedge.exe 85 PID 552 wrote to memory of 1396 552 msedge.exe 85 PID 552 wrote to memory of 1396 552 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\8b4ef435e0a20e3e069b71b8273a6a5e_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:552 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffff2ca46f8,0x7ffff2ca4708,0x7ffff2ca47182⤵PID:2240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,252870621604026907,17410291305235200892,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2088 /prefetch:22⤵PID:532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2076,252870621604026907,17410291305235200892,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2140 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2076,252870621604026907,17410291305235200892,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2692 /prefetch:82⤵PID:1396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,252870621604026907,17410291305235200892,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:2104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,252870621604026907,17410291305235200892,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:4312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,252870621604026907,17410291305235200892,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4716 /prefetch:12⤵PID:1688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,252870621604026907,17410291305235200892,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4864 /prefetch:12⤵PID:3056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,252870621604026907,17410291305235200892,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5012 /prefetch:12⤵PID:1384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,252870621604026907,17410291305235200892,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3724 /prefetch:12⤵PID:1732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,252870621604026907,17410291305235200892,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5344 /prefetch:82⤵PID:4892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,252870621604026907,17410291305235200892,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5344 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,252870621604026907,17410291305235200892,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5752 /prefetch:12⤵PID:3656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,252870621604026907,17410291305235200892,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5772 /prefetch:12⤵PID:5016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,252870621604026907,17410291305235200892,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5796 /prefetch:12⤵PID:1292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,252870621604026907,17410291305235200892,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:4028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,252870621604026907,17410291305235200892,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3168 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1148
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4084
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5084
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1760
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c9c4c494f8fba32d95ba2125f00586a3
SHA18a600205528aef7953144f1cf6f7a5115e3611de
SHA256a0ca609205813c307df9122c0c5b0967c5472755700f615b0033129cf7d6b35b
SHA5129d30cea6cfc259e97b0305f8b5cd19774044fb78feedfcef2014b2947f2e6a101273bc4ad30db9cc1724e62eb441266d7df376e28ac58693f128b9cce2c7d20d
-
Filesize
152B
MD54dc6fc5e708279a3310fe55d9c44743d
SHA1a42e8bdf9d1c25ef3e223d59f6b1d16b095f46d2
SHA256a1c5f48659d4b3af960971b3a0f433a95fee5bfafe5680a34110c68b342377d8
SHA5125874b2310187f242b852fa6dcded244cc860abb2be4f6f5a6a1db8322e12e1fef8f825edc0aae75adbb7284a2cd64730650d0643b1e2bb7ead9350e50e1d8c13
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize336B
MD54b07aefd0c82bc481f16de76d0e67903
SHA18b2cb9ec7a1b5aacc2e360ef1eb5458b8899d099
SHA25699fc6e0dbf5651ef6f8afaeaee8d89400f13b54c940d1460e14adb1a2c0fc305
SHA5126ad83c48a4fe0b232f828f85d38cd003a8ab3e9e08da3d23536efb86dde531da6357c1d39e7279df0624d954912c832dd0595539e85d33996e6402a925597820
-
Filesize
2KB
MD574dd0749dcf03e279e3a74899c97b023
SHA1b4171b7825e53d1c4e92fe7887ed6cf0bafd9367
SHA2561792c94f1001c883c31b827b95dcf581f56a3aeb073cab4429136d1738a5b817
SHA51282ecf02425d8f11bc241b3f5212351331bd45fa28cc526973cd971f0b9de0714472ea516fcf83469fd81a3524a0f641673ef76564e9263ef5106a964543e6aa8
-
Filesize
2KB
MD5e07f937d5f8b9f560a3290e1a90ef379
SHA10d6b418dea5f4d3e411a33e1364995a6fc22277c
SHA25640a0f2b36c0f05a2180eedc1d72740b56c5f9484d474543acff16308924417e8
SHA5127abd9061f2421e0c99abec5c97f08d94831983d30013171bd2bd9c6a8d50afafab060ebd5a06880ff1a0351f98e9484eac25f7eaba2762cdeee237836c585d66
-
Filesize
5KB
MD51212a6850d473deac53db050277035a8
SHA1b52655d4df77b0e695f592ba07b5e4100c4a0c39
SHA2565ab34dc5604aef066899c5be788cadd906f4d4b7b4f4c514e40e11da26c621fd
SHA5124a259893c5380a768576706d2b306c8b783eabcc5f5238f57eabcef2d2b7fe20abf6e01faaf9131ff2a2788391449c0bdf99b202831636129bd8451ef35e9b95
-
Filesize
7KB
MD5b10f2ef4e76f93a03267998d186dbb2a
SHA1ba0576223bf88b0c36bf27c1e54f6efb2fcd59a2
SHA2565f85b8a475322e804dc6327e8a3e99924bf5f41e52e1212d6d9cfa14708dd016
SHA5129faf0aa1031a351df76dab88ca34d03ce13caffae029ec407f5c10a2bb821cf3e1287e57a0206fa76b0b013f3ad6ce11b4f8e3fe4dd58b312c40476477a9f27e
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD5bd8023218361eb3100a7a9353c41c3ce
SHA102c1050b2c7c25927f4ca339d7623e53b8c9111d
SHA2561950d761d8ed0971ecdf44083f30520541baef74bc396ad35d34dc68f5b9269b
SHA51246b690cde3c8864d64cb8b2299812f50a04a682245ced1a71261b7643e71f44124f913617819282ebe2d303e9fbd67fe3bdb05dd016bc1c5b773c631d3dfc1a4