Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
02/06/2024, 12:39
Static task
static1
Behavioral task
behavioral1
Sample
8e1b595c52d0fd22ef39a77a585173b1_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
8e1b595c52d0fd22ef39a77a585173b1_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
8e1b595c52d0fd22ef39a77a585173b1_JaffaCakes118.html
-
Size
43KB
-
MD5
8e1b595c52d0fd22ef39a77a585173b1
-
SHA1
fa1b0368a54d137e1c422ee681878863e2fe4621
-
SHA256
7a236596e7270ff94b4d1aa927bdc698b9aae8e373e0e7bf326d2514f0094245
-
SHA512
dfc05749598f719bc18ad01082aad57ca5b15963679c6591a00315006b904c964657020a9133f0af7fb48951a7266c7a1bb9d13fecd4b3fef11054ff1fc785a8
-
SSDEEP
384:3CifbxdriJP6LiToLfUpfXQICUtdVeNNi5D15tfw+Hl8yw+GlYVmw+yJHJkWg7Vk:31uzBVYNSDtQ5VyLDfo96krNm0S
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 392 msedge.exe 392 msedge.exe 1704 msedge.exe 1704 msedge.exe 556 identity_helper.exe 556 identity_helper.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe 1704 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1704 wrote to memory of 184 1704 msedge.exe 84 PID 1704 wrote to memory of 184 1704 msedge.exe 84 PID 1704 wrote to memory of 4440 1704 msedge.exe 85 PID 1704 wrote to memory of 4440 1704 msedge.exe 85 PID 1704 wrote to memory of 4440 1704 msedge.exe 85 PID 1704 wrote to memory of 4440 1704 msedge.exe 85 PID 1704 wrote to memory of 4440 1704 msedge.exe 85 PID 1704 wrote to memory of 4440 1704 msedge.exe 85 PID 1704 wrote to memory of 4440 1704 msedge.exe 85 PID 1704 wrote to memory of 4440 1704 msedge.exe 85 PID 1704 wrote to memory of 4440 1704 msedge.exe 85 PID 1704 wrote to memory of 4440 1704 msedge.exe 85 PID 1704 wrote to memory of 4440 1704 msedge.exe 85 PID 1704 wrote to memory of 4440 1704 msedge.exe 85 PID 1704 wrote to memory of 4440 1704 msedge.exe 85 PID 1704 wrote to memory of 4440 1704 msedge.exe 85 PID 1704 wrote to memory of 4440 1704 msedge.exe 85 PID 1704 wrote to memory of 4440 1704 msedge.exe 85 PID 1704 wrote to memory of 4440 1704 msedge.exe 85 PID 1704 wrote to memory of 4440 1704 msedge.exe 85 PID 1704 wrote to memory of 4440 1704 msedge.exe 85 PID 1704 wrote to memory of 4440 1704 msedge.exe 85 PID 1704 wrote to memory of 4440 1704 msedge.exe 85 PID 1704 wrote to memory of 4440 1704 msedge.exe 85 PID 1704 wrote to memory of 4440 1704 msedge.exe 85 PID 1704 wrote to memory of 4440 1704 msedge.exe 85 PID 1704 wrote to memory of 4440 1704 msedge.exe 85 PID 1704 wrote to memory of 4440 1704 msedge.exe 85 PID 1704 wrote to memory of 4440 1704 msedge.exe 85 PID 1704 wrote to memory of 4440 1704 msedge.exe 85 PID 1704 wrote to memory of 4440 1704 msedge.exe 85 PID 1704 wrote to memory of 4440 1704 msedge.exe 85 PID 1704 wrote to memory of 4440 1704 msedge.exe 85 PID 1704 wrote to memory of 4440 1704 msedge.exe 85 PID 1704 wrote to memory of 4440 1704 msedge.exe 85 PID 1704 wrote to memory of 4440 1704 msedge.exe 85 PID 1704 wrote to memory of 4440 1704 msedge.exe 85 PID 1704 wrote to memory of 4440 1704 msedge.exe 85 PID 1704 wrote to memory of 4440 1704 msedge.exe 85 PID 1704 wrote to memory of 4440 1704 msedge.exe 85 PID 1704 wrote to memory of 4440 1704 msedge.exe 85 PID 1704 wrote to memory of 4440 1704 msedge.exe 85 PID 1704 wrote to memory of 392 1704 msedge.exe 86 PID 1704 wrote to memory of 392 1704 msedge.exe 86 PID 1704 wrote to memory of 1820 1704 msedge.exe 87 PID 1704 wrote to memory of 1820 1704 msedge.exe 87 PID 1704 wrote to memory of 1820 1704 msedge.exe 87 PID 1704 wrote to memory of 1820 1704 msedge.exe 87 PID 1704 wrote to memory of 1820 1704 msedge.exe 87 PID 1704 wrote to memory of 1820 1704 msedge.exe 87 PID 1704 wrote to memory of 1820 1704 msedge.exe 87 PID 1704 wrote to memory of 1820 1704 msedge.exe 87 PID 1704 wrote to memory of 1820 1704 msedge.exe 87 PID 1704 wrote to memory of 1820 1704 msedge.exe 87 PID 1704 wrote to memory of 1820 1704 msedge.exe 87 PID 1704 wrote to memory of 1820 1704 msedge.exe 87 PID 1704 wrote to memory of 1820 1704 msedge.exe 87 PID 1704 wrote to memory of 1820 1704 msedge.exe 87 PID 1704 wrote to memory of 1820 1704 msedge.exe 87 PID 1704 wrote to memory of 1820 1704 msedge.exe 87 PID 1704 wrote to memory of 1820 1704 msedge.exe 87 PID 1704 wrote to memory of 1820 1704 msedge.exe 87 PID 1704 wrote to memory of 1820 1704 msedge.exe 87 PID 1704 wrote to memory of 1820 1704 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\8e1b595c52d0fd22ef39a77a585173b1_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8c04046f8,0x7ff8c0404708,0x7ff8c04047182⤵PID:184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2008,16121504562911750229,17518940643396655433,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2028 /prefetch:22⤵PID:4440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2008,16121504562911750229,17518940643396655433,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2300 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2008,16121504562911750229,17518940643396655433,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2684 /prefetch:82⤵PID:1820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,16121504562911750229,17518940643396655433,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,16121504562911750229,17518940643396655433,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:3164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,16121504562911750229,17518940643396655433,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4728 /prefetch:12⤵PID:5016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2008,16121504562911750229,17518940643396655433,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5720 /prefetch:82⤵PID:5040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2008,16121504562911750229,17518940643396655433,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5720 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,16121504562911750229,17518940643396655433,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5564 /prefetch:12⤵PID:1768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,16121504562911750229,17518940643396655433,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5352 /prefetch:12⤵PID:4340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,16121504562911750229,17518940643396655433,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4012 /prefetch:12⤵PID:1384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,16121504562911750229,17518940643396655433,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5740 /prefetch:12⤵PID:4616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2008,16121504562911750229,17518940643396655433,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1048 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4552
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1664
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2724
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize264B
MD5e6c0fdcb5d3a638ac6da8a2aeaee86a5
SHA1da7c5e0f319d70881ed5f1685bf87972660cd8b9
SHA256a9dde2e2cec448ecf7b041cba2d878944963817ce83852329c2c49b2ac037887
SHA512ac2b6953025f515999e117fb22a266050128abf19dfa4f9e96154ce73cc668eeae915162dd1a0ec6d3cbbf7da396ef1228ba7b7a94021d9d968368944a4d3db1
-
Filesize
308B
MD57b47586f8cf215649176d48f5d40de19
SHA1184c94d54029a24ac37cfefa95bd506870f95863
SHA2564181d270d863e964a291191f22e8e95375a45a69266e394daf435ebccf190b00
SHA512b77a59a5ce2a359a9df0ea3a05329403a05eae05bef364f3485b353b25ecb3b608fa0b295c0120ea95075ece0cb027be87dee63c02ec6aa00ac575f494aa6c67
-
Filesize
5KB
MD5de0e6ba70184c17beadf75d387e53534
SHA1b1ebbfe70d0f91b095713e7c51dd501f213c55ed
SHA256261d15109d4846eaf6915582d28d03a001e76844462d63f8d356014bb3f9522d
SHA512d3f55a71c3ee37092374513bbfa2c6f0b9fb18f846a1b8b723aaaccd074ae2c413d8c5e6167b0c9e55d73132246371eaa0e311a64e35b3ba1dbcbac8f79085a1
-
Filesize
6KB
MD59d19bc9c2e16649cc7be0c301ab9159a
SHA18305b830f6c4ee6e6996638c04da102edd78bfe9
SHA256d67eb4d30db8aecc773bb9c03b235765121a953a8bf7e4a6c14a64574775b695
SHA5121eb2593a3592d10b38da240d6a5a7da135b572fbbd02d9f68a90429faeeff132a7ebc58883800c7afb4b58a68eed087c984ae26eada2bd349828ee7bb68c8512
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5ed5365d9c53a264b7e33530b13f2e5eb
SHA1f0105f302fcbe2f93f44d9e885abfc2457467fa3
SHA256bca148c0d83ed888f8b2efccf1769a6042a894183a99891903cd716be4732609
SHA512dbda13e81b3056469ca9a1df1a2bb3f6df68ff3a6df4ab61e82853f551441ba4d86135250e1ff2432df7d67143842023f75a152d02da766045e4cc37c1ca9d57