Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
02/06/2024, 04:02
Static task
static1
Behavioral task
behavioral1
Sample
8cd665068abb32374f76ce7b7c54aa2b_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
8cd665068abb32374f76ce7b7c54aa2b_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
8cd665068abb32374f76ce7b7c54aa2b_JaffaCakes118.html
-
Size
452KB
-
MD5
8cd665068abb32374f76ce7b7c54aa2b
-
SHA1
a1405b3745da759046dead243bb941a90225d045
-
SHA256
b5e94527bf41b434def886e8a1d4c44fcd44acf161086dd2d7e16fb5f87a292a
-
SHA512
b6f28e33153752454462aa4fa897704a80a293a74f21cf7ab17e7d7587ba710b1167ae7116d76fcf3713aa68f89dcaa81fc466aa72566f02651a807ce998fff3
-
SSDEEP
3072:dwPQ3wS7anbrOkN10zm7mgmuEg7ivDX+Uqn4StUplFKXlejSHp4peqFTQ:810zm7mgmR7KQuJWm
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4900 msedge.exe 4900 msedge.exe 2776 msedge.exe 2776 msedge.exe 1020 identity_helper.exe 1020 identity_helper.exe 1540 msedge.exe 1540 msedge.exe 1540 msedge.exe 1540 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe 2776 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2776 wrote to memory of 224 2776 msedge.exe 83 PID 2776 wrote to memory of 224 2776 msedge.exe 83 PID 2776 wrote to memory of 4204 2776 msedge.exe 84 PID 2776 wrote to memory of 4204 2776 msedge.exe 84 PID 2776 wrote to memory of 4204 2776 msedge.exe 84 PID 2776 wrote to memory of 4204 2776 msedge.exe 84 PID 2776 wrote to memory of 4204 2776 msedge.exe 84 PID 2776 wrote to memory of 4204 2776 msedge.exe 84 PID 2776 wrote to memory of 4204 2776 msedge.exe 84 PID 2776 wrote to memory of 4204 2776 msedge.exe 84 PID 2776 wrote to memory of 4204 2776 msedge.exe 84 PID 2776 wrote to memory of 4204 2776 msedge.exe 84 PID 2776 wrote to memory of 4204 2776 msedge.exe 84 PID 2776 wrote to memory of 4204 2776 msedge.exe 84 PID 2776 wrote to memory of 4204 2776 msedge.exe 84 PID 2776 wrote to memory of 4204 2776 msedge.exe 84 PID 2776 wrote to memory of 4204 2776 msedge.exe 84 PID 2776 wrote to memory of 4204 2776 msedge.exe 84 PID 2776 wrote to memory of 4204 2776 msedge.exe 84 PID 2776 wrote to memory of 4204 2776 msedge.exe 84 PID 2776 wrote to memory of 4204 2776 msedge.exe 84 PID 2776 wrote to memory of 4204 2776 msedge.exe 84 PID 2776 wrote to memory of 4204 2776 msedge.exe 84 PID 2776 wrote to memory of 4204 2776 msedge.exe 84 PID 2776 wrote to memory of 4204 2776 msedge.exe 84 PID 2776 wrote to memory of 4204 2776 msedge.exe 84 PID 2776 wrote to memory of 4204 2776 msedge.exe 84 PID 2776 wrote to memory of 4204 2776 msedge.exe 84 PID 2776 wrote to memory of 4204 2776 msedge.exe 84 PID 2776 wrote to memory of 4204 2776 msedge.exe 84 PID 2776 wrote to memory of 4204 2776 msedge.exe 84 PID 2776 wrote to memory of 4204 2776 msedge.exe 84 PID 2776 wrote to memory of 4204 2776 msedge.exe 84 PID 2776 wrote to memory of 4204 2776 msedge.exe 84 PID 2776 wrote to memory of 4204 2776 msedge.exe 84 PID 2776 wrote to memory of 4204 2776 msedge.exe 84 PID 2776 wrote to memory of 4204 2776 msedge.exe 84 PID 2776 wrote to memory of 4204 2776 msedge.exe 84 PID 2776 wrote to memory of 4204 2776 msedge.exe 84 PID 2776 wrote to memory of 4204 2776 msedge.exe 84 PID 2776 wrote to memory of 4204 2776 msedge.exe 84 PID 2776 wrote to memory of 4204 2776 msedge.exe 84 PID 2776 wrote to memory of 4900 2776 msedge.exe 85 PID 2776 wrote to memory of 4900 2776 msedge.exe 85 PID 2776 wrote to memory of 1408 2776 msedge.exe 86 PID 2776 wrote to memory of 1408 2776 msedge.exe 86 PID 2776 wrote to memory of 1408 2776 msedge.exe 86 PID 2776 wrote to memory of 1408 2776 msedge.exe 86 PID 2776 wrote to memory of 1408 2776 msedge.exe 86 PID 2776 wrote to memory of 1408 2776 msedge.exe 86 PID 2776 wrote to memory of 1408 2776 msedge.exe 86 PID 2776 wrote to memory of 1408 2776 msedge.exe 86 PID 2776 wrote to memory of 1408 2776 msedge.exe 86 PID 2776 wrote to memory of 1408 2776 msedge.exe 86 PID 2776 wrote to memory of 1408 2776 msedge.exe 86 PID 2776 wrote to memory of 1408 2776 msedge.exe 86 PID 2776 wrote to memory of 1408 2776 msedge.exe 86 PID 2776 wrote to memory of 1408 2776 msedge.exe 86 PID 2776 wrote to memory of 1408 2776 msedge.exe 86 PID 2776 wrote to memory of 1408 2776 msedge.exe 86 PID 2776 wrote to memory of 1408 2776 msedge.exe 86 PID 2776 wrote to memory of 1408 2776 msedge.exe 86 PID 2776 wrote to memory of 1408 2776 msedge.exe 86 PID 2776 wrote to memory of 1408 2776 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\8cd665068abb32374f76ce7b7c54aa2b_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc19cc46f8,0x7ffc19cc4708,0x7ffc19cc47182⤵PID:224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,12549646585080910679,4597633755223023594,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:22⤵PID:4204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,12549646585080910679,4597633755223023594,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,12549646585080910679,4597633755223023594,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2748 /prefetch:82⤵PID:1408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,12549646585080910679,4597633755223023594,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:4956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,12549646585080910679,4597633755223023594,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:3912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,12549646585080910679,4597633755223023594,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4672 /prefetch:12⤵PID:2948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,12549646585080910679,4597633755223023594,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5332 /prefetch:82⤵PID:2248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,12549646585080910679,4597633755223023594,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5332 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,12549646585080910679,4597633755223023594,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5396 /prefetch:12⤵PID:4780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,12549646585080910679,4597633755223023594,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5408 /prefetch:12⤵PID:3196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,12549646585080910679,4597633755223023594,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4940 /prefetch:12⤵PID:1116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,12549646585080910679,4597633755223023594,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5808 /prefetch:12⤵PID:1640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,12549646585080910679,4597633755223023594,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4284 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1540
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:428
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2768
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize240B
MD59e8bfb8566fc2915c96dcdd90733d27f
SHA14f15795ee15129630aa2e5021cc9afe290dda964
SHA2562aab32ad1842c92c490278d121983ccac0aab73bb236ba4aefc1331f26dd4318
SHA51229b48f9644906c76212032bdb1eeedf4a32893a4a387cc29dd9f14a7099f5c1ea8ede3f6a83bfef041c156085e47be367ca7b7cb5c1cd305dfbcae856bdc0af0
-
Filesize
1KB
MD56de1941d6dc4199f08c9af6a10a67a99
SHA188c18c5bf070bf20e9a8a484bdca82cbc6a77158
SHA256c2e3b32a85bd3a35d089a7a083cc2f4768f53a5e67edf99249d5468b5e462d7b
SHA5129ce2a8779fe2db5721b3b760a9ccc599f4421f015161375d9e81e461fbb92f5fbf0bae48d01fde0ebedcee34d281358e6bbf315e0e1cc8ec46e0f145d89a0147
-
Filesize
5KB
MD5ce84c6e55deb9643e9e7ef70b9c954e3
SHA1d014ea777a89b908d14c76f93d0e4e57dae179fb
SHA25623c87b31700b8cf67c7b26f3b7d485c8288e57d326faf86392c78a9cfc10bf01
SHA512a82020ff3f8c68b77212fb24c33679b7e6cfe7ddd6ce7c9b4a9d6b13781e4461824e023311611cdaa1b33dc47b43cd6e93bdd43d41815e1c4198a0b32f8b44d4
-
Filesize
6KB
MD53c54d9ead902518090f2a2bb8fc24208
SHA106f26900db34996004bf83ade00ac7a402a18ad3
SHA25643a990181152c20e9c18019537dd8b0d0460aba1e65b71eacc1a5e5278a113fe
SHA5123c62da657e1a6084f1ea1c596939fe63afb1091b0ddd23f8e712e5a7a00f765c54e978a5982c062c3841922dd0a1adf3d961f00688e54847b6adc8a3a7a59a1b
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5363a4ac3e6f45a8b82782d9a7d8f4047
SHA11a8866d7702427c402a2baf9c7358dd13a211619
SHA2566cdb313a2bf2614961c69e976e65152853ab3c50ccdaf46c4277c03d676cbefc
SHA5121ea62e89eb9687ece601cad053f37ef67edc507087e159394c0997f6766d73ef13e87f7eb78413c07125c348ba2a4bc0cb3b1cd15b759115f0e9c4c23b0f2e34