Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
02-06-2024 07:05
Static task
static1
Behavioral task
behavioral1
Sample
8d413867c95f7a474718b7447385e8c4_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8d413867c95f7a474718b7447385e8c4_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
8d413867c95f7a474718b7447385e8c4_JaffaCakes118.html
-
Size
39KB
-
MD5
8d413867c95f7a474718b7447385e8c4
-
SHA1
5bea640b775435d782931e4ab9d401420726073a
-
SHA256
6e6e38604b3bf848559132f2b8cf130b09c344bb95eb567d0c76c49874eb8a7c
-
SHA512
99e5ce5f7ae9cf3fa88f8acda1918a306759261911abc9a1b4d57868d11e0215cb3f7e7ebe39b4a139eb54a6f26b03a68d20aa698b511e5e09803725f2b617f3
-
SSDEEP
768:WFCbB1bTsxb2vb0NQlG/v9b2BO5eyZoGeU01J64JnYAX2V438P:WFC/nsxSINQlGtSBO5eyZ2q8ZGqMP
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4960 msedge.exe 4960 msedge.exe 3728 msedge.exe 3728 msedge.exe 4504 identity_helper.exe 4504 identity_helper.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe 3968 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe 3728 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3728 wrote to memory of 3588 3728 msedge.exe 82 PID 3728 wrote to memory of 3588 3728 msedge.exe 82 PID 3728 wrote to memory of 3644 3728 msedge.exe 83 PID 3728 wrote to memory of 3644 3728 msedge.exe 83 PID 3728 wrote to memory of 3644 3728 msedge.exe 83 PID 3728 wrote to memory of 3644 3728 msedge.exe 83 PID 3728 wrote to memory of 3644 3728 msedge.exe 83 PID 3728 wrote to memory of 3644 3728 msedge.exe 83 PID 3728 wrote to memory of 3644 3728 msedge.exe 83 PID 3728 wrote to memory of 3644 3728 msedge.exe 83 PID 3728 wrote to memory of 3644 3728 msedge.exe 83 PID 3728 wrote to memory of 3644 3728 msedge.exe 83 PID 3728 wrote to memory of 3644 3728 msedge.exe 83 PID 3728 wrote to memory of 3644 3728 msedge.exe 83 PID 3728 wrote to memory of 3644 3728 msedge.exe 83 PID 3728 wrote to memory of 3644 3728 msedge.exe 83 PID 3728 wrote to memory of 3644 3728 msedge.exe 83 PID 3728 wrote to memory of 3644 3728 msedge.exe 83 PID 3728 wrote to memory of 3644 3728 msedge.exe 83 PID 3728 wrote to memory of 3644 3728 msedge.exe 83 PID 3728 wrote to memory of 3644 3728 msedge.exe 83 PID 3728 wrote to memory of 3644 3728 msedge.exe 83 PID 3728 wrote to memory of 3644 3728 msedge.exe 83 PID 3728 wrote to memory of 3644 3728 msedge.exe 83 PID 3728 wrote to memory of 3644 3728 msedge.exe 83 PID 3728 wrote to memory of 3644 3728 msedge.exe 83 PID 3728 wrote to memory of 3644 3728 msedge.exe 83 PID 3728 wrote to memory of 3644 3728 msedge.exe 83 PID 3728 wrote to memory of 3644 3728 msedge.exe 83 PID 3728 wrote to memory of 3644 3728 msedge.exe 83 PID 3728 wrote to memory of 3644 3728 msedge.exe 83 PID 3728 wrote to memory of 3644 3728 msedge.exe 83 PID 3728 wrote to memory of 3644 3728 msedge.exe 83 PID 3728 wrote to memory of 3644 3728 msedge.exe 83 PID 3728 wrote to memory of 3644 3728 msedge.exe 83 PID 3728 wrote to memory of 3644 3728 msedge.exe 83 PID 3728 wrote to memory of 3644 3728 msedge.exe 83 PID 3728 wrote to memory of 3644 3728 msedge.exe 83 PID 3728 wrote to memory of 3644 3728 msedge.exe 83 PID 3728 wrote to memory of 3644 3728 msedge.exe 83 PID 3728 wrote to memory of 3644 3728 msedge.exe 83 PID 3728 wrote to memory of 3644 3728 msedge.exe 83 PID 3728 wrote to memory of 4960 3728 msedge.exe 84 PID 3728 wrote to memory of 4960 3728 msedge.exe 84 PID 3728 wrote to memory of 2888 3728 msedge.exe 85 PID 3728 wrote to memory of 2888 3728 msedge.exe 85 PID 3728 wrote to memory of 2888 3728 msedge.exe 85 PID 3728 wrote to memory of 2888 3728 msedge.exe 85 PID 3728 wrote to memory of 2888 3728 msedge.exe 85 PID 3728 wrote to memory of 2888 3728 msedge.exe 85 PID 3728 wrote to memory of 2888 3728 msedge.exe 85 PID 3728 wrote to memory of 2888 3728 msedge.exe 85 PID 3728 wrote to memory of 2888 3728 msedge.exe 85 PID 3728 wrote to memory of 2888 3728 msedge.exe 85 PID 3728 wrote to memory of 2888 3728 msedge.exe 85 PID 3728 wrote to memory of 2888 3728 msedge.exe 85 PID 3728 wrote to memory of 2888 3728 msedge.exe 85 PID 3728 wrote to memory of 2888 3728 msedge.exe 85 PID 3728 wrote to memory of 2888 3728 msedge.exe 85 PID 3728 wrote to memory of 2888 3728 msedge.exe 85 PID 3728 wrote to memory of 2888 3728 msedge.exe 85 PID 3728 wrote to memory of 2888 3728 msedge.exe 85 PID 3728 wrote to memory of 2888 3728 msedge.exe 85 PID 3728 wrote to memory of 2888 3728 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\8d413867c95f7a474718b7447385e8c4_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3728 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff84d4346f8,0x7ff84d434708,0x7ff84d4347182⤵PID:3588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,1397512386141014891,1940250962243336663,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2184 /prefetch:22⤵PID:3644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,1397512386141014891,1940250962243336663,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2264 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,1397512386141014891,1940250962243336663,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2732 /prefetch:82⤵PID:2888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,1397512386141014891,1940250962243336663,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:3952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,1397512386141014891,1940250962243336663,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3472 /prefetch:12⤵PID:4388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,1397512386141014891,1940250962243336663,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1940 /prefetch:12⤵PID:468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,1397512386141014891,1940250962243336663,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5756 /prefetch:82⤵PID:2336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,1397512386141014891,1940250962243336663,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5756 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,1397512386141014891,1940250962243336663,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5744 /prefetch:12⤵PID:4812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,1397512386141014891,1940250962243336663,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4980 /prefetch:12⤵PID:264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,1397512386141014891,1940250962243336663,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4136 /prefetch:12⤵PID:4060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,1397512386141014891,1940250962243336663,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3968 /prefetch:12⤵PID:1684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,1397512386141014891,1940250962243336663,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4888 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3968
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2112
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:388
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54f7152bc5a1a715ef481e37d1c791959
SHA1c8a1ed674c62ae4f45519f90a8cc5a81eff3a6d7
SHA256704dd4f98d8ca34ec421f23ba1891b178c23c14b3301e4655efc5c02d356c2bc
SHA5122e6b02ca35d76a655a17a5f3e9dbd8d7517c7dae24f0095c7350eb9e7bdf9e1256a7009aa8878f96c89d1ea4fe5323a41f72b8c551806dda62880d7ff231ff5c
-
Filesize
152B
MD5ea98e583ad99df195d29aa066204ab56
SHA1f89398664af0179641aa0138b337097b617cb2db
SHA256a7abb51435909fa2d75c6f2ff5c69a93d4a0ab276ed579e7d8733b2a63ffbee6
SHA512e109be3466e653e5d310b3e402e1626298b09205d223722a82344dd78504f3c33e1e24e8402a02f38cd2c9c50d96a303ce4846bea5a583423937ab018cd5782f
-
Filesize
23KB
MD5e1c71f7c04be834f5587230db2ad24b3
SHA1f3bab9cb99d9f343bf7ed3981aaa7450515d2424
SHA2569fb6c768068467b58cc773a3907f3f5ec170bfe02ca8f301f6a232a9daf5a899
SHA512205366b4a3ca0dae58722a19ba24088dd8db483db9d14b376434024b064715ade720347ff5de87db014e32d2ef8192e71bbbdd3c885d5a8581b4aafc6e88ce51
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD55b2e1fdd9c04fce3e1d2913835f07132
SHA1504cb93da6b4ebe1a3d6b7de9aa08bda42845314
SHA2568a985409e5f885f97cb5d8926db0c39e0785bf2f41ef91d06d8ac3ab39c29241
SHA512ce118ff59a120672a3e468f5a18b7e92b4930bfd99d36ac97be84f93144311c32745914e7a02544fa7d9552f146c11d4f262222da4f927ec99ab93cee5ec9d80
-
Filesize
5KB
MD5ab4ee5d913df12cfbd1a0c126b5337b3
SHA15089718acda74637bd0825c94a7e5a90140a1ae9
SHA2561c27f409d07a4a0773e986b00b33241d9e807e8ff12cd54166871543d45ac9ff
SHA51265f618ae079fec100358d562b80c7c84f9cd39effec0973f3b6c75039e1f1861ed9703e04aad4bf3b127c1dac7fa9c14c58b5e8055ed02c379eccc5a976781e5
-
Filesize
6KB
MD57c11ce9e1826ad993ca6053c9c6c98cd
SHA1514252f152c427fcf4ae646d5137f13bcc2513d6
SHA25620c16e2d05295fd2056ddc4d12715e8b72dfe27c9b04ecadcd4e070b84ea684e
SHA512abe38994130a7af982f1d323df1630abfccf480b32b58cd132b3bac7667a8f8fb102dfdbe1bcdbb62944cfe50811251fa8d12e2747b47d5adda429ccb61c666b
-
Filesize
6KB
MD503e6990ebd5486b56a2d0e281082ff6d
SHA1de0ce5b0d4b66a09754787b1b3cd6260226ba109
SHA256743c93530572f1ffcc3dfab0ba91c59de072c4c094b60d67d82aee1311c67db4
SHA5122de5f7678da1ecff56cfa479c0eedf04f9334ba9f426e04bfe89cda39fa7e34eac18cfda1f1cefec1131f72091eaed74f0deeb84e5f6ad0d72703d8058c306b9
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5f81ea3198e9dcb9548da4fbd4fcbfe78
SHA1cde2d7ddea7d17460573ec7e50e9f50ad283426d
SHA256b242ea8aefe141e821450f66d554c3332d791c0987ddcd5f2b932f0cc76d1f27
SHA512d72d8d2c87933bb6aeb3a80d1ea57244c23998ceaa26cceb207c3d455a84ea9a7c87ea65826ec032ea07d7c3353b892cc87dd76885eecc9888370416ad8cda3b