Analysis
-
max time kernel
145s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
01/06/2024, 19:40
Static task
static1
Behavioral task
behavioral1
Sample
8b8b5f7f456444c857a62e4e97cf63d4_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
8b8b5f7f456444c857a62e4e97cf63d4_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
8b8b5f7f456444c857a62e4e97cf63d4_JaffaCakes118.html
-
Size
68KB
-
MD5
8b8b5f7f456444c857a62e4e97cf63d4
-
SHA1
93eb7a88616e0965b574fbbd1c58cb7578652431
-
SHA256
42a194a6235dfde16971f57a91414b5df77e80a4439e4d5c2d0aa64519a235e4
-
SHA512
8c45a226d60bf3ef436daeeae5f56b62bb2d78eee2e7c3431e14fbe1c73d3b2ba2a8111c59fe220cd0da53d96d1ec87f905fd01fe6f44e676989f4b8e1d88962
-
SSDEEP
768:JingcMiR3sI2PDDnX0g6UrVy2VPXWVAoTyv1wCZkoTyMdtbBnfBgN8/lboi2hcpq:JZlVlVPXWVdTcNen0tbrga94hcuNnQC
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 960 msedge.exe 960 msedge.exe 4256 msedge.exe 4256 msedge.exe 3428 identity_helper.exe 3428 identity_helper.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe 4388 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4256 wrote to memory of 4480 4256 msedge.exe 83 PID 4256 wrote to memory of 4480 4256 msedge.exe 83 PID 4256 wrote to memory of 4016 4256 msedge.exe 84 PID 4256 wrote to memory of 4016 4256 msedge.exe 84 PID 4256 wrote to memory of 4016 4256 msedge.exe 84 PID 4256 wrote to memory of 4016 4256 msedge.exe 84 PID 4256 wrote to memory of 4016 4256 msedge.exe 84 PID 4256 wrote to memory of 4016 4256 msedge.exe 84 PID 4256 wrote to memory of 4016 4256 msedge.exe 84 PID 4256 wrote to memory of 4016 4256 msedge.exe 84 PID 4256 wrote to memory of 4016 4256 msedge.exe 84 PID 4256 wrote to memory of 4016 4256 msedge.exe 84 PID 4256 wrote to memory of 4016 4256 msedge.exe 84 PID 4256 wrote to memory of 4016 4256 msedge.exe 84 PID 4256 wrote to memory of 4016 4256 msedge.exe 84 PID 4256 wrote to memory of 4016 4256 msedge.exe 84 PID 4256 wrote to memory of 4016 4256 msedge.exe 84 PID 4256 wrote to memory of 4016 4256 msedge.exe 84 PID 4256 wrote to memory of 4016 4256 msedge.exe 84 PID 4256 wrote to memory of 4016 4256 msedge.exe 84 PID 4256 wrote to memory of 4016 4256 msedge.exe 84 PID 4256 wrote to memory of 4016 4256 msedge.exe 84 PID 4256 wrote to memory of 4016 4256 msedge.exe 84 PID 4256 wrote to memory of 4016 4256 msedge.exe 84 PID 4256 wrote to memory of 4016 4256 msedge.exe 84 PID 4256 wrote to memory of 4016 4256 msedge.exe 84 PID 4256 wrote to memory of 4016 4256 msedge.exe 84 PID 4256 wrote to memory of 4016 4256 msedge.exe 84 PID 4256 wrote to memory of 4016 4256 msedge.exe 84 PID 4256 wrote to memory of 4016 4256 msedge.exe 84 PID 4256 wrote to memory of 4016 4256 msedge.exe 84 PID 4256 wrote to memory of 4016 4256 msedge.exe 84 PID 4256 wrote to memory of 4016 4256 msedge.exe 84 PID 4256 wrote to memory of 4016 4256 msedge.exe 84 PID 4256 wrote to memory of 4016 4256 msedge.exe 84 PID 4256 wrote to memory of 4016 4256 msedge.exe 84 PID 4256 wrote to memory of 4016 4256 msedge.exe 84 PID 4256 wrote to memory of 4016 4256 msedge.exe 84 PID 4256 wrote to memory of 4016 4256 msedge.exe 84 PID 4256 wrote to memory of 4016 4256 msedge.exe 84 PID 4256 wrote to memory of 4016 4256 msedge.exe 84 PID 4256 wrote to memory of 4016 4256 msedge.exe 84 PID 4256 wrote to memory of 960 4256 msedge.exe 85 PID 4256 wrote to memory of 960 4256 msedge.exe 85 PID 4256 wrote to memory of 1944 4256 msedge.exe 86 PID 4256 wrote to memory of 1944 4256 msedge.exe 86 PID 4256 wrote to memory of 1944 4256 msedge.exe 86 PID 4256 wrote to memory of 1944 4256 msedge.exe 86 PID 4256 wrote to memory of 1944 4256 msedge.exe 86 PID 4256 wrote to memory of 1944 4256 msedge.exe 86 PID 4256 wrote to memory of 1944 4256 msedge.exe 86 PID 4256 wrote to memory of 1944 4256 msedge.exe 86 PID 4256 wrote to memory of 1944 4256 msedge.exe 86 PID 4256 wrote to memory of 1944 4256 msedge.exe 86 PID 4256 wrote to memory of 1944 4256 msedge.exe 86 PID 4256 wrote to memory of 1944 4256 msedge.exe 86 PID 4256 wrote to memory of 1944 4256 msedge.exe 86 PID 4256 wrote to memory of 1944 4256 msedge.exe 86 PID 4256 wrote to memory of 1944 4256 msedge.exe 86 PID 4256 wrote to memory of 1944 4256 msedge.exe 86 PID 4256 wrote to memory of 1944 4256 msedge.exe 86 PID 4256 wrote to memory of 1944 4256 msedge.exe 86 PID 4256 wrote to memory of 1944 4256 msedge.exe 86 PID 4256 wrote to memory of 1944 4256 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\8b8b5f7f456444c857a62e4e97cf63d4_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4256 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe40aa46f8,0x7ffe40aa4708,0x7ffe40aa47182⤵PID:4480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,11637645357027806063,11205920584697115271,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵PID:4016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,11637645357027806063,11205920584697115271,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,11637645357027806063,11205920584697115271,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2896 /prefetch:82⤵PID:1944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,11637645357027806063,11205920584697115271,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:2208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,11637645357027806063,11205920584697115271,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:12⤵PID:1100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,11637645357027806063,11205920584697115271,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3152 /prefetch:12⤵PID:1272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,11637645357027806063,11205920584697115271,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5344 /prefetch:82⤵PID:4428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,11637645357027806063,11205920584697115271,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5344 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,11637645357027806063,11205920584697115271,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5420 /prefetch:12⤵PID:4000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,11637645357027806063,11205920584697115271,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5328 /prefetch:12⤵PID:2408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,11637645357027806063,11205920584697115271,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5192 /prefetch:12⤵PID:2788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,11637645357027806063,11205920584697115271,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5796 /prefetch:12⤵PID:1984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,11637645357027806063,11205920584697115271,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4912 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4388
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1232
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2572
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD5eb0a44994107744e445a7576bdc73881
SHA17b8412d028c82988f776b388980b876c4dd70fa1
SHA256f78529a0a19b80d8bd4e44f6b568fb538c3da198fa63cc5ac819d219f0d71f6b
SHA512e21372cf657de4683d614e80772526736b0febb5c4b81c92f4735d14b5e4d1b3c0e84ea1b50935298561fe6025fbadab44a36f78e9e674e22fe796aa2c938f8f
-
Filesize
410B
MD5e952aedf1320349b9bf0793362b7d40c
SHA15dfbf765dea460f5753ab6b2293db7eb8270b6c4
SHA25675a5896d121d04d64fbad60848db4a6ad6671dd07bdfbc849d675358c429456c
SHA512db303c6771c298f7348d9df492831466f5a12d2651e3dfc915f9fc9f61a21fa87693ef5b0425b5fa58101673d08bdd805163b506fa1ef4ec1cf45a5cabe56e3a
-
Filesize
5KB
MD5f92196f3010f1c0ceed269098e75eaef
SHA1c24736fefb154303fe298f8f52e4625b6a0b9735
SHA25630cf4c8411bf105772623b90fbfa6d72e563c1cc652eca1fb03540fa7e97f1da
SHA51260760563162e4710074a1057cf9bd5e73daf639991b26d2acf177bd84f36078076cd3b8471070c1c9a8ff26dc910289dfdcc2f2d3803cbc7ba6d5726f2acf2b0
-
Filesize
6KB
MD58476c779a885cf141643440e74af5a8f
SHA17db8f37bf11e58fa47b075d8fed36687682b54e0
SHA256e0b94698400786609ae2e260bc759d9acedcb1fb7d71c3ebd747d389fdee50de
SHA512eba022642224a3405b0b2557c12c2c229f4d9f9cfcf6de7b754c8e63e3a6f146388e7d4ef97c77713047664ff14eb834206a78f6c249105719d712431e6128cf
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD560656d168b9b2a0eb3896b656be9d52d
SHA170845b5a0288bd6d1f7d6692625b752a7fe7a4ae
SHA2566344b43220a8c606ed4c4e72a8a5f1c755f89af8d212269256acd3fa20bc7965
SHA512a5e3732deec3b03051cde8fe3ac2ec0896b7188955e9228690d00d6bdad461d69f21788de14a83d84892e4cb109669af95df4351facb90c3b3a7b0b21c4288f5