Analysis
-
max time kernel
145s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
10/06/2024, 19:15
Static task
static1
Behavioral task
behavioral1
Sample
9bb71003274f831cc855461da460a30f_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
9bb71003274f831cc855461da460a30f_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
9bb71003274f831cc855461da460a30f_JaffaCakes118.html
-
Size
227KB
-
MD5
9bb71003274f831cc855461da460a30f
-
SHA1
0c4b8b501f3ff6cfab063841f699e17637d93e25
-
SHA256
1118e96828b9b41aa902d79f0ba5af1870c02e84d38089137ecf1fcdd70ccd9f
-
SHA512
d835a1527e93ff8f75785eca1849b2ba90949a06ba6d78698540a004653820be9abb394d851c7e47320f73bfe5a1fb04cf6fd9300530073fb23fb1e9b5d9f6c0
-
SSDEEP
3072:8nVURzEPz1t8aN4ADnoWF/Q2bH9JpEWuZEUl:wCEht8aN4ADnoWF/v9JpEWA
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2532 msedge.exe 2532 msedge.exe 1504 msedge.exe 1504 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 1304 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1304 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1504 wrote to memory of 4424 1504 msedge.exe 81 PID 1504 wrote to memory of 4424 1504 msedge.exe 81 PID 1504 wrote to memory of 3676 1504 msedge.exe 82 PID 1504 wrote to memory of 3676 1504 msedge.exe 82 PID 1504 wrote to memory of 3676 1504 msedge.exe 82 PID 1504 wrote to memory of 3676 1504 msedge.exe 82 PID 1504 wrote to memory of 3676 1504 msedge.exe 82 PID 1504 wrote to memory of 3676 1504 msedge.exe 82 PID 1504 wrote to memory of 3676 1504 msedge.exe 82 PID 1504 wrote to memory of 3676 1504 msedge.exe 82 PID 1504 wrote to memory of 3676 1504 msedge.exe 82 PID 1504 wrote to memory of 3676 1504 msedge.exe 82 PID 1504 wrote to memory of 3676 1504 msedge.exe 82 PID 1504 wrote to memory of 3676 1504 msedge.exe 82 PID 1504 wrote to memory of 3676 1504 msedge.exe 82 PID 1504 wrote to memory of 3676 1504 msedge.exe 82 PID 1504 wrote to memory of 3676 1504 msedge.exe 82 PID 1504 wrote to memory of 3676 1504 msedge.exe 82 PID 1504 wrote to memory of 3676 1504 msedge.exe 82 PID 1504 wrote to memory of 3676 1504 msedge.exe 82 PID 1504 wrote to memory of 3676 1504 msedge.exe 82 PID 1504 wrote to memory of 3676 1504 msedge.exe 82 PID 1504 wrote to memory of 3676 1504 msedge.exe 82 PID 1504 wrote to memory of 3676 1504 msedge.exe 82 PID 1504 wrote to memory of 3676 1504 msedge.exe 82 PID 1504 wrote to memory of 3676 1504 msedge.exe 82 PID 1504 wrote to memory of 3676 1504 msedge.exe 82 PID 1504 wrote to memory of 3676 1504 msedge.exe 82 PID 1504 wrote to memory of 3676 1504 msedge.exe 82 PID 1504 wrote to memory of 3676 1504 msedge.exe 82 PID 1504 wrote to memory of 3676 1504 msedge.exe 82 PID 1504 wrote to memory of 3676 1504 msedge.exe 82 PID 1504 wrote to memory of 3676 1504 msedge.exe 82 PID 1504 wrote to memory of 3676 1504 msedge.exe 82 PID 1504 wrote to memory of 3676 1504 msedge.exe 82 PID 1504 wrote to memory of 3676 1504 msedge.exe 82 PID 1504 wrote to memory of 3676 1504 msedge.exe 82 PID 1504 wrote to memory of 3676 1504 msedge.exe 82 PID 1504 wrote to memory of 3676 1504 msedge.exe 82 PID 1504 wrote to memory of 3676 1504 msedge.exe 82 PID 1504 wrote to memory of 3676 1504 msedge.exe 82 PID 1504 wrote to memory of 3676 1504 msedge.exe 82 PID 1504 wrote to memory of 2532 1504 msedge.exe 83 PID 1504 wrote to memory of 2532 1504 msedge.exe 83 PID 1504 wrote to memory of 4364 1504 msedge.exe 84 PID 1504 wrote to memory of 4364 1504 msedge.exe 84 PID 1504 wrote to memory of 4364 1504 msedge.exe 84 PID 1504 wrote to memory of 4364 1504 msedge.exe 84 PID 1504 wrote to memory of 4364 1504 msedge.exe 84 PID 1504 wrote to memory of 4364 1504 msedge.exe 84 PID 1504 wrote to memory of 4364 1504 msedge.exe 84 PID 1504 wrote to memory of 4364 1504 msedge.exe 84 PID 1504 wrote to memory of 4364 1504 msedge.exe 84 PID 1504 wrote to memory of 4364 1504 msedge.exe 84 PID 1504 wrote to memory of 4364 1504 msedge.exe 84 PID 1504 wrote to memory of 4364 1504 msedge.exe 84 PID 1504 wrote to memory of 4364 1504 msedge.exe 84 PID 1504 wrote to memory of 4364 1504 msedge.exe 84 PID 1504 wrote to memory of 4364 1504 msedge.exe 84 PID 1504 wrote to memory of 4364 1504 msedge.exe 84 PID 1504 wrote to memory of 4364 1504 msedge.exe 84 PID 1504 wrote to memory of 4364 1504 msedge.exe 84 PID 1504 wrote to memory of 4364 1504 msedge.exe 84 PID 1504 wrote to memory of 4364 1504 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\9bb71003274f831cc855461da460a30f_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffce95446f8,0x7ffce9544708,0x7ffce95447182⤵PID:4424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2224,5320999426357248813,15079603666263845593,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2232 /prefetch:22⤵PID:3676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2224,5320999426357248813,15079603666263845593,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2320 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2224,5320999426357248813,15079603666263845593,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2716 /prefetch:82⤵PID:4364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,5320999426357248813,15079603666263845593,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:3828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,5320999426357248813,15079603666263845593,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:2536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,5320999426357248813,15079603666263845593,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4840 /prefetch:12⤵PID:4084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,5320999426357248813,15079603666263845593,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3752 /prefetch:12⤵PID:2680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,5320999426357248813,15079603666263845593,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1340 /prefetch:12⤵PID:3552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,5320999426357248813,15079603666263845593,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5936 /prefetch:12⤵PID:4400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2224,5320999426357248813,15079603666263845593,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5268 /prefetch:82⤵PID:888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2224,5320999426357248813,15079603666263845593,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2172 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4852
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4704
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4912
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4f0 0x2981⤵
- Suspicious use of AdjustPrivilegeToken
PID:1304
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5537815e7cc5c694912ac0308147852e4
SHA12ccdd9d9dc637db5462fe8119c0df261146c363c
SHA256b4b69d099507d88abdeff4835e06cc6711e1c47464c963d013cef0a278e52d4f
SHA51263969a69af057235dbdecddc483ef5ce0058673179a3580c5aa12938c9501513cdb72dd703a06fa7d4fc08d074f17528283338c795334398497c771ecbd1350a
-
Filesize
152B
MD58b167567021ccb1a9fdf073fa9112ef0
SHA13baf293fbfaa7c1e7cdacb5f2975737f4ef69898
SHA25626764cedf35f118b55f30b3a36e0693f9f38290a5b2b6b8b83a00e990ae18513
SHA512726098001ef1acf1dd154a658752fa27dea32bca8fbb66395c142cb666102e71632adbad1b7e2f717071cd3e3af3867471932a71707f2ae97b989f4be468ab54
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize480B
MD54f592265db5b0058190605df9503652b
SHA173a56439582e87e68a447f119667997850f3736a
SHA256f6cee3f5ae615d592a3f9ff85ec3c66dc6322689353cf86cea7baa1409fa37a5
SHA5123123c526e6e7c24ebb287d5c123c5b5f2e708d887c4e9cf157f32d3993b0da9531d308c63cb58ee4cb51402d689d60c071684c7def7f17624de3f2965e20de74
-
Filesize
1KB
MD5340cb9dfe1fb963f4290611bc9440259
SHA18a680a5215e69055339a2d091b8306706cd706e8
SHA2569ca6cf52d2d1ee0434bb0cfa0d153a2be04863fddd844a6e716976bd6980bb1e
SHA512301f0f55935b08abf148bc95c9133c968abab3677f6b9375dc084c8d69226d8445bca5453cf63c6e2955994c4e7ba67236042c37261f73e0aa32954f8b9bf8fa
-
Filesize
2KB
MD5059561227fe1349dfff9121fd709949e
SHA16aba58d5a0f8ed87d4e4e015e07b12e2ffc1df90
SHA2563a72e4de0643c7e6692f8fccf33362a3002afd42034aff4b2c0cda8054d43908
SHA512e1e63024a1ada16c50ad5fdb961560d3f75d50c2d12364a35da6790a2f5ac6043f959e3f248596a0277ce6cab729af37d280012026ea44faee33b869cc515638
-
Filesize
5KB
MD5409aa72cb868a6c129fb5ffc3cadac75
SHA1567faca4194b6c981e57f1620941acb5b009d26d
SHA256c94a440efc8a71145f65c56abc287eea56ba54bafbfc007c6f676a2d875436de
SHA512f87721125c7e61246f9bf336c1c0fca785938699341ada3ecab81b934a2125fe12c3f9ac13308c73bb62ba312dc29eb86a23d2cd802c8ef54ae8ebdc919cd2ff
-
Filesize
7KB
MD5c84ffa62ba7a9bbb5b228f27a145e1a3
SHA1747037162298a312234de788a34ee682d106d51a
SHA256ac1a4988631778166ead18d4a0f5e69dfa74f603a375a8d78f713c5f734fd0cc
SHA512fb0581bb8a1c3d932ae050cfbc8a7a756cb2a56cea0e8caaca8fac29946f8f0262b7c0946e11df2363277d95b36d708345382778ce4f3e1985fd46bbca2f1fa0
-
Filesize
6KB
MD519fb2976a01c386c05327370f351f3c5
SHA1a4d74f3fa14e2646a9b6f1af3550a08f7a55c59e
SHA2569ff8c2f1bb5900b9e66c806073a4efa59ec4880aab42c39bdb60545083480512
SHA5122a300139605cd2348956d8f6b7ef6e288ab19964f978111f730fb5546300526f9431a55982b04de63fbae48603276cf1cb2fb9ab2039f1af32e394b6d63cf8ec
-
Filesize
10KB
MD5f28b2196bb56b28da8272bae78c625d4
SHA1fe17da1569808288a591c92c939d231c9f6deccf
SHA2560f4902dfcd6f6752d57e214da6d151a7cf9e39a08aa04fa5c72f9e6d64103d85
SHA5122eeb9fda8a3c40d77d0cd492f47f341d4c0bc122d8222d015722aedbeb5bcbcba41571f57b40dd16e6d2094e6fc750b968a0984da323e8045f7dbb9f0df0eebe