Analysis
-
max time kernel
148s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
09-06-2024 22:01
Static task
static1
Behavioral task
behavioral1
Sample
9a3d8fdbc52f12ab6df36ee0e3320a80_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
9a3d8fdbc52f12ab6df36ee0e3320a80_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
9a3d8fdbc52f12ab6df36ee0e3320a80_JaffaCakes118.html
-
Size
68KB
-
MD5
9a3d8fdbc52f12ab6df36ee0e3320a80
-
SHA1
e3388c107c22701026f06c90badc618b7558bc31
-
SHA256
a71871c052c4077e8b86f784d6021041a2057d0e9632b5b7a14fd5d09f6f994f
-
SHA512
8d4f51e22703dc276ceee3d5ae5be0447e34250c8f315eddf2464e37dd63c5ecf4f800373b8ce109d424c9b51237dc06be754f6abeca2578b872210b7a309813
-
SSDEEP
768:JiqgcMiR3sI2PDDnX0g6NgOYV4Y5oTyv1wCZkoTyMdtbBnfBgN8/lboi2hcpQFVh:JO4ftTcNen0tbrga94hcuNnQC
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4300 msedge.exe 4300 msedge.exe 4608 msedge.exe 4608 msedge.exe 3616 identity_helper.exe 3616 identity_helper.exe 616 msedge.exe 616 msedge.exe 616 msedge.exe 616 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4608 wrote to memory of 4456 4608 msedge.exe 82 PID 4608 wrote to memory of 4456 4608 msedge.exe 82 PID 4608 wrote to memory of 1320 4608 msedge.exe 83 PID 4608 wrote to memory of 1320 4608 msedge.exe 83 PID 4608 wrote to memory of 1320 4608 msedge.exe 83 PID 4608 wrote to memory of 1320 4608 msedge.exe 83 PID 4608 wrote to memory of 1320 4608 msedge.exe 83 PID 4608 wrote to memory of 1320 4608 msedge.exe 83 PID 4608 wrote to memory of 1320 4608 msedge.exe 83 PID 4608 wrote to memory of 1320 4608 msedge.exe 83 PID 4608 wrote to memory of 1320 4608 msedge.exe 83 PID 4608 wrote to memory of 1320 4608 msedge.exe 83 PID 4608 wrote to memory of 1320 4608 msedge.exe 83 PID 4608 wrote to memory of 1320 4608 msedge.exe 83 PID 4608 wrote to memory of 1320 4608 msedge.exe 83 PID 4608 wrote to memory of 1320 4608 msedge.exe 83 PID 4608 wrote to memory of 1320 4608 msedge.exe 83 PID 4608 wrote to memory of 1320 4608 msedge.exe 83 PID 4608 wrote to memory of 1320 4608 msedge.exe 83 PID 4608 wrote to memory of 1320 4608 msedge.exe 83 PID 4608 wrote to memory of 1320 4608 msedge.exe 83 PID 4608 wrote to memory of 1320 4608 msedge.exe 83 PID 4608 wrote to memory of 1320 4608 msedge.exe 83 PID 4608 wrote to memory of 1320 4608 msedge.exe 83 PID 4608 wrote to memory of 1320 4608 msedge.exe 83 PID 4608 wrote to memory of 1320 4608 msedge.exe 83 PID 4608 wrote to memory of 1320 4608 msedge.exe 83 PID 4608 wrote to memory of 1320 4608 msedge.exe 83 PID 4608 wrote to memory of 1320 4608 msedge.exe 83 PID 4608 wrote to memory of 1320 4608 msedge.exe 83 PID 4608 wrote to memory of 1320 4608 msedge.exe 83 PID 4608 wrote to memory of 1320 4608 msedge.exe 83 PID 4608 wrote to memory of 1320 4608 msedge.exe 83 PID 4608 wrote to memory of 1320 4608 msedge.exe 83 PID 4608 wrote to memory of 1320 4608 msedge.exe 83 PID 4608 wrote to memory of 1320 4608 msedge.exe 83 PID 4608 wrote to memory of 1320 4608 msedge.exe 83 PID 4608 wrote to memory of 1320 4608 msedge.exe 83 PID 4608 wrote to memory of 1320 4608 msedge.exe 83 PID 4608 wrote to memory of 1320 4608 msedge.exe 83 PID 4608 wrote to memory of 1320 4608 msedge.exe 83 PID 4608 wrote to memory of 1320 4608 msedge.exe 83 PID 4608 wrote to memory of 4300 4608 msedge.exe 84 PID 4608 wrote to memory of 4300 4608 msedge.exe 84 PID 4608 wrote to memory of 4004 4608 msedge.exe 85 PID 4608 wrote to memory of 4004 4608 msedge.exe 85 PID 4608 wrote to memory of 4004 4608 msedge.exe 85 PID 4608 wrote to memory of 4004 4608 msedge.exe 85 PID 4608 wrote to memory of 4004 4608 msedge.exe 85 PID 4608 wrote to memory of 4004 4608 msedge.exe 85 PID 4608 wrote to memory of 4004 4608 msedge.exe 85 PID 4608 wrote to memory of 4004 4608 msedge.exe 85 PID 4608 wrote to memory of 4004 4608 msedge.exe 85 PID 4608 wrote to memory of 4004 4608 msedge.exe 85 PID 4608 wrote to memory of 4004 4608 msedge.exe 85 PID 4608 wrote to memory of 4004 4608 msedge.exe 85 PID 4608 wrote to memory of 4004 4608 msedge.exe 85 PID 4608 wrote to memory of 4004 4608 msedge.exe 85 PID 4608 wrote to memory of 4004 4608 msedge.exe 85 PID 4608 wrote to memory of 4004 4608 msedge.exe 85 PID 4608 wrote to memory of 4004 4608 msedge.exe 85 PID 4608 wrote to memory of 4004 4608 msedge.exe 85 PID 4608 wrote to memory of 4004 4608 msedge.exe 85 PID 4608 wrote to memory of 4004 4608 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\9a3d8fdbc52f12ab6df36ee0e3320a80_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4608 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbac2346f8,0x7ffbac234708,0x7ffbac2347182⤵PID:4456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,5150162494779724460,7732903034009798250,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:22⤵PID:1320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,5150162494779724460,7732903034009798250,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2316 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,5150162494779724460,7732903034009798250,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2812 /prefetch:82⤵PID:4004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,5150162494779724460,7732903034009798250,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:4100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,5150162494779724460,7732903034009798250,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:2412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,5150162494779724460,7732903034009798250,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4680 /prefetch:12⤵PID:4352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,5150162494779724460,7732903034009798250,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5324 /prefetch:82⤵PID:4952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,5150162494779724460,7732903034009798250,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5324 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,5150162494779724460,7732903034009798250,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5420 /prefetch:12⤵PID:2932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,5150162494779724460,7732903034009798250,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5436 /prefetch:12⤵PID:3892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,5150162494779724460,7732903034009798250,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5792 /prefetch:12⤵PID:3300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,5150162494779724460,7732903034009798250,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4752 /prefetch:12⤵PID:3296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,5150162494779724460,7732903034009798250,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3156 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:616
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2756
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2860
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ae54e9db2e89f2c54da8cc0bfcbd26bd
SHA1a88af6c673609ecbc51a1a60dfbc8577830d2b5d
SHA2565009d3c953de63cfd14a7d911156c514e179ff07d2b94382d9caac6040cb72af
SHA512e3b70e5eb7321b9deca6f6a17424a15b9fd5c4008bd3789bd01099fd13cb2f4a2f37fe4b920fb51c50517745b576c1f94df83efd1a7e75949551163985599998
-
Filesize
152B
MD5f53207a5ca2ef5c7e976cbb3cb26d870
SHA149a8cc44f53da77bb3dfb36fc7676ed54675db43
SHA25619ab4e3c9da6d9cedda7461efdba9a2085e743513ab89f1dd0fd5a8f9486ad23
SHA512be734c7e8afda19f445912aef0d78f9941add29baebd4a812bff27f10a1d78b52aeb11c551468c8644443c86e1a2a6b2e4aead3d7f81d39925e3c20406ac1499
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD5ef81966e1a2e67d16f088abe19123564
SHA1093c0292cd614b9d3199c1b66728248aac80026b
SHA2560761bb077da2f60842a5c94cac28f4eaa3e286fbb769b14c5949d784dbea2d64
SHA512b4e223ef9dc65d5374460fea4519efc897a815c250e5a775efcdbc37fe7e4e73f62637c7e0ed902d99b7ceed1b4a749155324b7b26a1133524dd986d8d1860c9
-
Filesize
409B
MD5982cde5ff57bf78dfa03cb7c50fac6d4
SHA1ef70e4e63ff557ccc58b4b5f213913ad7b4b5e9b
SHA25668bd1ca8aa50ef42f5cfaf4f4d0ece5541ad60a7e17ddd3de0e32b602471e904
SHA5121c4fc277168d665584148fd68e054668fc38be460b5138c24bae971cd05510ddf616343b88482e21bb19024e47c1f0e286ffe5c698164199504da905f0942eb2
-
Filesize
5KB
MD533c0ce6cd3ceffb35566869001fc56e8
SHA13b1c67441143519e07421579a07a4e373dc0770b
SHA256e54f412a2204c4a9c115438b65a344cbca41a874ad55b0d5bc107f89575ef569
SHA512c25896ce6247bf449bcaa552568b07671228b265dcd6f1915d4656ac44beae69528be9664bb18b07b795d4f1ddd54275229c494e9b2890da3dfbc4fdd3f8f657
-
Filesize
6KB
MD57b94101127eb245a67e2ab040737511b
SHA1b7c9fccadb3ec36d89bafd14c03817841a23f5d2
SHA2568d529ab0ce9536b3862f675384ff0ebba10c73d5b020ee0a1156496c58f7ff55
SHA512d04329ca77e49f43c8ba649957aa1f4ea7f80158bc4c951d29ad72f52d54686838f339b5ee0f18c32eca28ae5e62c5071b887300d8fd7235cee78b42d20f510f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD58fa1ff81df2bffa8594559c86f82a9a1
SHA13e3b9562500526d98a79a8f215147cd4179a449a
SHA256c6b157db071f919b93b0782cb21e19045529dd0d1f285260efe14ef0f4550a4b
SHA51248d2872a64b7c4344d2f99cd352eb464c822df6c1359bcfc49a229c5ebbdbfdc84e51ebacc84023835ed0b6b3b40f218fb8462ea885aa7415e97ef1c246d83e3