Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
02-06-2024 21:15
Static task
static1
Behavioral task
behavioral1
Sample
8f7260e23832dd404583b12778c9127e_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
8f7260e23832dd404583b12778c9127e_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
8f7260e23832dd404583b12778c9127e_JaffaCakes118.html
-
Size
175KB
-
MD5
8f7260e23832dd404583b12778c9127e
-
SHA1
4f89ccf376dbd903e15b225a31e55dd8cda057da
-
SHA256
462ec7513abdd939039361bd496e31619e4d21ad066dc2a3597b1f60154a8276
-
SHA512
97cb0208eee19c802ee9203419c59419d8c92f9fe35ad31e234eb608665953cf19a21ab73671ded6db15563524dc6b0567289507b0d53e2e682e67f25fa8a486
-
SSDEEP
1536:Sqt58gd8Wu8pI8Cd8hd8dQgbH//WoS3QGNkF0YfBCJiZo+aeTH+WK/Lf1/hpnVSV:SHCT3Q/FhBCJi/B
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1028 msedge.exe 1028 msedge.exe 3432 msedge.exe 3432 msedge.exe 2984 identity_helper.exe 2984 identity_helper.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe 3432 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3432 wrote to memory of 2852 3432 msedge.exe 81 PID 3432 wrote to memory of 2852 3432 msedge.exe 81 PID 3432 wrote to memory of 4380 3432 msedge.exe 82 PID 3432 wrote to memory of 4380 3432 msedge.exe 82 PID 3432 wrote to memory of 4380 3432 msedge.exe 82 PID 3432 wrote to memory of 4380 3432 msedge.exe 82 PID 3432 wrote to memory of 4380 3432 msedge.exe 82 PID 3432 wrote to memory of 4380 3432 msedge.exe 82 PID 3432 wrote to memory of 4380 3432 msedge.exe 82 PID 3432 wrote to memory of 4380 3432 msedge.exe 82 PID 3432 wrote to memory of 4380 3432 msedge.exe 82 PID 3432 wrote to memory of 4380 3432 msedge.exe 82 PID 3432 wrote to memory of 4380 3432 msedge.exe 82 PID 3432 wrote to memory of 4380 3432 msedge.exe 82 PID 3432 wrote to memory of 4380 3432 msedge.exe 82 PID 3432 wrote to memory of 4380 3432 msedge.exe 82 PID 3432 wrote to memory of 4380 3432 msedge.exe 82 PID 3432 wrote to memory of 4380 3432 msedge.exe 82 PID 3432 wrote to memory of 4380 3432 msedge.exe 82 PID 3432 wrote to memory of 4380 3432 msedge.exe 82 PID 3432 wrote to memory of 4380 3432 msedge.exe 82 PID 3432 wrote to memory of 4380 3432 msedge.exe 82 PID 3432 wrote to memory of 4380 3432 msedge.exe 82 PID 3432 wrote to memory of 4380 3432 msedge.exe 82 PID 3432 wrote to memory of 4380 3432 msedge.exe 82 PID 3432 wrote to memory of 4380 3432 msedge.exe 82 PID 3432 wrote to memory of 4380 3432 msedge.exe 82 PID 3432 wrote to memory of 4380 3432 msedge.exe 82 PID 3432 wrote to memory of 4380 3432 msedge.exe 82 PID 3432 wrote to memory of 4380 3432 msedge.exe 82 PID 3432 wrote to memory of 4380 3432 msedge.exe 82 PID 3432 wrote to memory of 4380 3432 msedge.exe 82 PID 3432 wrote to memory of 4380 3432 msedge.exe 82 PID 3432 wrote to memory of 4380 3432 msedge.exe 82 PID 3432 wrote to memory of 4380 3432 msedge.exe 82 PID 3432 wrote to memory of 4380 3432 msedge.exe 82 PID 3432 wrote to memory of 4380 3432 msedge.exe 82 PID 3432 wrote to memory of 4380 3432 msedge.exe 82 PID 3432 wrote to memory of 4380 3432 msedge.exe 82 PID 3432 wrote to memory of 4380 3432 msedge.exe 82 PID 3432 wrote to memory of 4380 3432 msedge.exe 82 PID 3432 wrote to memory of 4380 3432 msedge.exe 82 PID 3432 wrote to memory of 1028 3432 msedge.exe 83 PID 3432 wrote to memory of 1028 3432 msedge.exe 83 PID 3432 wrote to memory of 4144 3432 msedge.exe 84 PID 3432 wrote to memory of 4144 3432 msedge.exe 84 PID 3432 wrote to memory of 4144 3432 msedge.exe 84 PID 3432 wrote to memory of 4144 3432 msedge.exe 84 PID 3432 wrote to memory of 4144 3432 msedge.exe 84 PID 3432 wrote to memory of 4144 3432 msedge.exe 84 PID 3432 wrote to memory of 4144 3432 msedge.exe 84 PID 3432 wrote to memory of 4144 3432 msedge.exe 84 PID 3432 wrote to memory of 4144 3432 msedge.exe 84 PID 3432 wrote to memory of 4144 3432 msedge.exe 84 PID 3432 wrote to memory of 4144 3432 msedge.exe 84 PID 3432 wrote to memory of 4144 3432 msedge.exe 84 PID 3432 wrote to memory of 4144 3432 msedge.exe 84 PID 3432 wrote to memory of 4144 3432 msedge.exe 84 PID 3432 wrote to memory of 4144 3432 msedge.exe 84 PID 3432 wrote to memory of 4144 3432 msedge.exe 84 PID 3432 wrote to memory of 4144 3432 msedge.exe 84 PID 3432 wrote to memory of 4144 3432 msedge.exe 84 PID 3432 wrote to memory of 4144 3432 msedge.exe 84 PID 3432 wrote to memory of 4144 3432 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\8f7260e23832dd404583b12778c9127e_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3432 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbbb1b46f8,0x7ffbbb1b4708,0x7ffbbb1b47182⤵PID:2852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2028,2422914992882273074,9933797300873809306,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2056 /prefetch:22⤵PID:4380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2028,2422914992882273074,9933797300873809306,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2028,2422914992882273074,9933797300873809306,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2848 /prefetch:82⤵PID:4144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,2422914992882273074,9933797300873809306,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:4580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,2422914992882273074,9933797300873809306,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:3696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,2422914992882273074,9933797300873809306,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4776 /prefetch:12⤵PID:3416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,2422914992882273074,9933797300873809306,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4872 /prefetch:12⤵PID:436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,2422914992882273074,9933797300873809306,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5340 /prefetch:12⤵PID:624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,2422914992882273074,9933797300873809306,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5048 /prefetch:12⤵PID:460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2028,2422914992882273074,9933797300873809306,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5756 /prefetch:82⤵PID:1820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2028,2422914992882273074,9933797300873809306,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5756 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,2422914992882273074,9933797300873809306,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5904 /prefetch:12⤵PID:1116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,2422914992882273074,9933797300873809306,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5828 /prefetch:12⤵PID:3976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,2422914992882273074,9933797300873809306,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5968 /prefetch:12⤵PID:4548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,2422914992882273074,9933797300873809306,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4752 /prefetch:12⤵PID:2484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2028,2422914992882273074,9933797300873809306,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5212 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4404
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1820
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:668
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:552
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51ac52e2503cc26baee4322f02f5b8d9c
SHA138e0cee911f5f2a24888a64780ffdf6fa72207c8
SHA256f65058c6f1a745b37a64d4c97a8e8ee940210273130cec97a67f568088b5d4d4
SHA5127670d606bc5197ecb7db3ddaecd6f74a80e6decae92b94e0e8145a7f463fa099058e89f9dfa1c45b9197c36e5e21994698186a2ec970bbdb0937fe28ca46a834
-
Filesize
152B
MD5b2a1398f937474c51a48b347387ee36a
SHA1922a8567f09e68a04233e84e5919043034635949
SHA2562dc0bf08246ddd5a32288c895d676017578d792349ca437b1b36e7b2f0ade6d6
SHA5124a660c0549f7a850e07d8d36dab33121af02a7bd7e9b2f0137930b4c8cd89b6c5630e408f882684e6935dcb0d5cb5e01a854950eeda252a4881458cafcc7ef7c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize336B
MD58bfb8db18a73fb9682c2c7b61505980e
SHA1239dbb0362aaa1cf1090c10d39f6abaeefc1a6b0
SHA2569775232550c84e60cd790d3c96f870b2198d319976c612263361ac43f9029363
SHA5128772702446c69f677c02f5aacf220e7dc9e8b072e59f0d7d7b167f9e99d1d652cf2474474ea18ed45a0292c095512671d8f1b34125173ef61b769efb0d79a348
-
Filesize
2KB
MD5c95d8286d39e86b034c8cd8a6dbc3ac9
SHA1a7c07099f1177c089465e13bcc9cda48f864bd31
SHA256fc433ae647ec0ea82d55a67f275a7d841b1d9608e44004a3e884560d732d8115
SHA5123db24684955fdafc8da50cd70e614e78304226cf83955a20b206401d252a9553b50c004fc2a5a37d1384e61eb101956b4599712f05628432a1f017b87a8013e5
-
Filesize
2KB
MD5ac39a0b4a9f24b16755b036e1c181634
SHA17cb7f1813cea4c9783e78b9ffcc0946d964aea85
SHA256e488576b0068c71ead2fa80e3c2cdeb18ff94d9a476e36e808848c2419bf0bd5
SHA5126c59da8f2183fb01db6fcb854937d4aca8a51820e5801db881e6bd22e41b78484c12695daac2dd73d19e413b14070bd41f84193f11827b461f5e6360d12ac8ee
-
Filesize
5KB
MD57f5f07ae5029792e80ecd83cd41b0532
SHA14a34dee356edced9e68b16257ac59c3939bb6339
SHA256c9d386bb261423ff810cc79029725aa3bc749bac60dacb51cc258a636f1c7aa6
SHA512eb2ea4a372610a69fae73b8b88d0e8e1934e8cff61d3d310e6d0a0832f2b8661353e774dfa0a89751f785b999508c7813dc4865f4449d362330946c5e8f11f24
-
Filesize
7KB
MD5c50db8fc4accd2719843284e2761c492
SHA1843c2a384f49d6d3053191be611714e1eca9ffd5
SHA256e9db20e51292d5524e57dd64d78697588b36fad138a80a94f7f292198499cd6e
SHA512b6c64107432e3c859b8b6721fb9f57ddcad808042f607f9d08bce05cbbeacd7ef082f055885108200e58bfea932ca958bae0530f066d3055012e0cdf1e09427d
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD506ae3abbe72f1802765cc361e6999c8f
SHA16f9b6c44e7df5c1ce11990bd4221dc3410de75af
SHA256b934dee5ceb1f95128238a4cea72c103c34ee791fb829d6dd3ba3f1ce2db9f3b
SHA51260bade1bf906841a12c0cddf3abb1ce84c3efcff184a9a0ac8d4f9effd78b47b96258775924055c0fdc2f4122b47dcca44e05c032b5f6898ad54b98ba6002039