Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
02/06/2024, 13:09
Static task
static1
Behavioral task
behavioral1
Sample
8e2f721730a168c85c57907d83e06ba7_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8e2f721730a168c85c57907d83e06ba7_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
8e2f721730a168c85c57907d83e06ba7_JaffaCakes118.html
-
Size
237KB
-
MD5
8e2f721730a168c85c57907d83e06ba7
-
SHA1
b4cfe4d5ee7aacc739e010042b72c1f163da4be0
-
SHA256
9db7a17364e1f328d75c34fecf2497a48e6042d6d049dd8d7f1f291f715791c7
-
SHA512
76c5a404b0aa74098979afd0047f8f9f57e931521bb98ac8da36042e716ba46710dd3392ebd3b0dbe63b401ae9412a75b9ee76f28ad2438d265556bce81ae857
-
SSDEEP
3072:3N/vr5lyVzky4ykm7rchga7J58vshR5W8RCYxo0:3N/szCHqifd
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4612 msedge.exe 4612 msedge.exe 3588 msedge.exe 3588 msedge.exe 732 identity_helper.exe 732 identity_helper.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe 3588 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3588 wrote to memory of 3080 3588 msedge.exe 81 PID 3588 wrote to memory of 3080 3588 msedge.exe 81 PID 3588 wrote to memory of 4504 3588 msedge.exe 82 PID 3588 wrote to memory of 4504 3588 msedge.exe 82 PID 3588 wrote to memory of 4504 3588 msedge.exe 82 PID 3588 wrote to memory of 4504 3588 msedge.exe 82 PID 3588 wrote to memory of 4504 3588 msedge.exe 82 PID 3588 wrote to memory of 4504 3588 msedge.exe 82 PID 3588 wrote to memory of 4504 3588 msedge.exe 82 PID 3588 wrote to memory of 4504 3588 msedge.exe 82 PID 3588 wrote to memory of 4504 3588 msedge.exe 82 PID 3588 wrote to memory of 4504 3588 msedge.exe 82 PID 3588 wrote to memory of 4504 3588 msedge.exe 82 PID 3588 wrote to memory of 4504 3588 msedge.exe 82 PID 3588 wrote to memory of 4504 3588 msedge.exe 82 PID 3588 wrote to memory of 4504 3588 msedge.exe 82 PID 3588 wrote to memory of 4504 3588 msedge.exe 82 PID 3588 wrote to memory of 4504 3588 msedge.exe 82 PID 3588 wrote to memory of 4504 3588 msedge.exe 82 PID 3588 wrote to memory of 4504 3588 msedge.exe 82 PID 3588 wrote to memory of 4504 3588 msedge.exe 82 PID 3588 wrote to memory of 4504 3588 msedge.exe 82 PID 3588 wrote to memory of 4504 3588 msedge.exe 82 PID 3588 wrote to memory of 4504 3588 msedge.exe 82 PID 3588 wrote to memory of 4504 3588 msedge.exe 82 PID 3588 wrote to memory of 4504 3588 msedge.exe 82 PID 3588 wrote to memory of 4504 3588 msedge.exe 82 PID 3588 wrote to memory of 4504 3588 msedge.exe 82 PID 3588 wrote to memory of 4504 3588 msedge.exe 82 PID 3588 wrote to memory of 4504 3588 msedge.exe 82 PID 3588 wrote to memory of 4504 3588 msedge.exe 82 PID 3588 wrote to memory of 4504 3588 msedge.exe 82 PID 3588 wrote to memory of 4504 3588 msedge.exe 82 PID 3588 wrote to memory of 4504 3588 msedge.exe 82 PID 3588 wrote to memory of 4504 3588 msedge.exe 82 PID 3588 wrote to memory of 4504 3588 msedge.exe 82 PID 3588 wrote to memory of 4504 3588 msedge.exe 82 PID 3588 wrote to memory of 4504 3588 msedge.exe 82 PID 3588 wrote to memory of 4504 3588 msedge.exe 82 PID 3588 wrote to memory of 4504 3588 msedge.exe 82 PID 3588 wrote to memory of 4504 3588 msedge.exe 82 PID 3588 wrote to memory of 4504 3588 msedge.exe 82 PID 3588 wrote to memory of 4612 3588 msedge.exe 83 PID 3588 wrote to memory of 4612 3588 msedge.exe 83 PID 3588 wrote to memory of 4268 3588 msedge.exe 84 PID 3588 wrote to memory of 4268 3588 msedge.exe 84 PID 3588 wrote to memory of 4268 3588 msedge.exe 84 PID 3588 wrote to memory of 4268 3588 msedge.exe 84 PID 3588 wrote to memory of 4268 3588 msedge.exe 84 PID 3588 wrote to memory of 4268 3588 msedge.exe 84 PID 3588 wrote to memory of 4268 3588 msedge.exe 84 PID 3588 wrote to memory of 4268 3588 msedge.exe 84 PID 3588 wrote to memory of 4268 3588 msedge.exe 84 PID 3588 wrote to memory of 4268 3588 msedge.exe 84 PID 3588 wrote to memory of 4268 3588 msedge.exe 84 PID 3588 wrote to memory of 4268 3588 msedge.exe 84 PID 3588 wrote to memory of 4268 3588 msedge.exe 84 PID 3588 wrote to memory of 4268 3588 msedge.exe 84 PID 3588 wrote to memory of 4268 3588 msedge.exe 84 PID 3588 wrote to memory of 4268 3588 msedge.exe 84 PID 3588 wrote to memory of 4268 3588 msedge.exe 84 PID 3588 wrote to memory of 4268 3588 msedge.exe 84 PID 3588 wrote to memory of 4268 3588 msedge.exe 84 PID 3588 wrote to memory of 4268 3588 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\8e2f721730a168c85c57907d83e06ba7_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3588 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc4ec546f8,0x7ffc4ec54708,0x7ffc4ec547182⤵PID:3080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2180,955246915861036686,8354880140996713376,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2188 /prefetch:22⤵PID:4504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2180,955246915861036686,8354880140996713376,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2260 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2180,955246915861036686,8354880140996713376,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2880 /prefetch:82⤵PID:4268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,955246915861036686,8354880140996713376,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3204 /prefetch:12⤵PID:3816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,955246915861036686,8354880140996713376,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,955246915861036686,8354880140996713376,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5080 /prefetch:12⤵PID:2400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2180,955246915861036686,8354880140996713376,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2608 /prefetch:82⤵PID:4548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2180,955246915861036686,8354880140996713376,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2608 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,955246915861036686,8354880140996713376,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5340 /prefetch:12⤵PID:1644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,955246915861036686,8354880140996713376,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5300 /prefetch:12⤵PID:4068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,955246915861036686,8354880140996713376,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5132 /prefetch:12⤵PID:1648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,955246915861036686,8354880140996713376,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5184 /prefetch:12⤵PID:448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2180,955246915861036686,8354880140996713376,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5760 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2208
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2868
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4532
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556641592f6e69f5f5fb06f2319384490
SHA16a86be42e2c6d26b7830ad9f4e2627995fd91069
SHA25602d4984e590e947265474d592e64edde840fdca7eb881eebde3e220a1d883455
SHA512c75e689b2bbbe07ebf72baf75c56f19c39f45d5593cf47535eb722f95002b3ee418027047c0ee8d63800f499038db5e2c24aff9705d830c7b6eaa290d9adc868
-
Filesize
152B
MD5612a6c4247ef652299b376221c984213
SHA1d306f3b16bde39708aa862aee372345feb559750
SHA2569d8e24c91cff338e56b518a533cb2e49a2803356bbf6e04892fb168a7ce2844a
SHA51234a14d63abb1e3fe0f9927a94393043d458fe0624843e108d290266f554018e6379cba924cb5388735abdd6c5f1e2e318478a673f3f9b762815a758866d10973
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD5e8554c6e80c38cb2c5e47591abfb97c4
SHA122887375350eb5d2cbe3cbaf5eba6665efeb883e
SHA256ef5506a5346ce18516605cfdcb0b608ab47d53ba6667c3542c8fa693d3c4b86d
SHA51254386a2e424f84e7b0185699811d15ac668556412ffe55e2604c8c540cd078a0dde20eee4f07313782383547069f0d0594b50b9515dd43e6cb686ce46bd4b872
-
Filesize
2KB
MD5eba54e4373f8dc41e05074f0cf8d2beb
SHA1dd0d5185ebaed3e7e7c51e4dcbd379d33b7fbd77
SHA256605c39095d76b873859209cc718a22ad1892a89d4c3a0becee64535a566424a4
SHA512dc5b47798a0c160f960c4c17a81a80bd1204e343fed42e7d96af7a0eda8a6f4a29f46e8f61059357417ec51ec5492b5dd1809c9165479bcb41aed2d0dd48a21e
-
Filesize
6KB
MD5800026894b48f60166400fc57bf0ed95
SHA1deafee3fd550cdb8f4c72768bbe0fa4428e4ae18
SHA25653d02426823b3aeaaa7ab4abe803e1a461861a2ef02b6a9e64ec1a68f7db793c
SHA512f666968bccb4c75763679e30597719923593a6a072bc5db80ebe1f8d1e69f1431559a6a44f2365fb5994e0b9e5e1f6b99b462fdb7c7dcb0724bca30bf6a81024
-
Filesize
5KB
MD54579b48a61402388453dc9772a79cd3b
SHA121cfdff6607f290d183933bb162c935a5982bb35
SHA256b623aa1b725f07518a10a07805fc6640b6723925f1340209192fac9aeee15316
SHA512f188d9576c5c9e71440c0edaa0066934cce64a325545181646d93ac9b3a6df0f2ca7537a7e6cb3e3af73d62c6c6807d7a2a976eae2b7abd061c414b4343b9b38
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5ec0bf3cee3ad66baa96de746fa467990
SHA1b4819645baa2e5fb98db6ae83122a1323c4cf0e1
SHA256a5b8f8e76580398bd46939c6ae1b261a864fcd02486ee43e5612f019487c4732
SHA512b6ab650c86a2c05b14934633baa9ec33780fb766d01d05becbaf87526ef7a790a98fd8c9b26e04760c81e37faf3a24e11b69b21ca42b2df521f92e65d6e9b3a4