Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
10/06/2024, 20:53
Static task
static1
Behavioral task
behavioral1
Sample
9be84577abb8a80a88c1ea76ab31db6b_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
9be84577abb8a80a88c1ea76ab31db6b_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
9be84577abb8a80a88c1ea76ab31db6b_JaffaCakes118.html
-
Size
131KB
-
MD5
9be84577abb8a80a88c1ea76ab31db6b
-
SHA1
fa6d37746a618a5b18550138eade04aeda9ce62a
-
SHA256
7b6914c638bed75487483d76d9fe2200e2f65e4929617bf487dca1fe38ae5bb4
-
SHA512
817caa4239029fba6ea490246a17807d0f00d21e299171de7006d764e07b21140a9c66e89871a25c7222875bff09a990c84a36d3f216ff0b0c981ca2559fd7b0
-
SSDEEP
3072:SLJ1jTbHxy8Pm/QKNWb5cL6EVkzw3iKPxcrLMnhuY1QnDLxm:SLJy8Pm/QKNWb5cL6EVkzw3iKPxcrLMz
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2372 msedge.exe 2372 msedge.exe 3712 msedge.exe 3712 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3712 wrote to memory of 4872 3712 msedge.exe 82 PID 3712 wrote to memory of 4872 3712 msedge.exe 82 PID 3712 wrote to memory of 4304 3712 msedge.exe 83 PID 3712 wrote to memory of 4304 3712 msedge.exe 83 PID 3712 wrote to memory of 4304 3712 msedge.exe 83 PID 3712 wrote to memory of 4304 3712 msedge.exe 83 PID 3712 wrote to memory of 4304 3712 msedge.exe 83 PID 3712 wrote to memory of 4304 3712 msedge.exe 83 PID 3712 wrote to memory of 4304 3712 msedge.exe 83 PID 3712 wrote to memory of 4304 3712 msedge.exe 83 PID 3712 wrote to memory of 4304 3712 msedge.exe 83 PID 3712 wrote to memory of 4304 3712 msedge.exe 83 PID 3712 wrote to memory of 4304 3712 msedge.exe 83 PID 3712 wrote to memory of 4304 3712 msedge.exe 83 PID 3712 wrote to memory of 4304 3712 msedge.exe 83 PID 3712 wrote to memory of 4304 3712 msedge.exe 83 PID 3712 wrote to memory of 4304 3712 msedge.exe 83 PID 3712 wrote to memory of 4304 3712 msedge.exe 83 PID 3712 wrote to memory of 4304 3712 msedge.exe 83 PID 3712 wrote to memory of 4304 3712 msedge.exe 83 PID 3712 wrote to memory of 4304 3712 msedge.exe 83 PID 3712 wrote to memory of 4304 3712 msedge.exe 83 PID 3712 wrote to memory of 4304 3712 msedge.exe 83 PID 3712 wrote to memory of 4304 3712 msedge.exe 83 PID 3712 wrote to memory of 4304 3712 msedge.exe 83 PID 3712 wrote to memory of 4304 3712 msedge.exe 83 PID 3712 wrote to memory of 4304 3712 msedge.exe 83 PID 3712 wrote to memory of 4304 3712 msedge.exe 83 PID 3712 wrote to memory of 4304 3712 msedge.exe 83 PID 3712 wrote to memory of 4304 3712 msedge.exe 83 PID 3712 wrote to memory of 4304 3712 msedge.exe 83 PID 3712 wrote to memory of 4304 3712 msedge.exe 83 PID 3712 wrote to memory of 4304 3712 msedge.exe 83 PID 3712 wrote to memory of 4304 3712 msedge.exe 83 PID 3712 wrote to memory of 4304 3712 msedge.exe 83 PID 3712 wrote to memory of 4304 3712 msedge.exe 83 PID 3712 wrote to memory of 4304 3712 msedge.exe 83 PID 3712 wrote to memory of 4304 3712 msedge.exe 83 PID 3712 wrote to memory of 4304 3712 msedge.exe 83 PID 3712 wrote to memory of 4304 3712 msedge.exe 83 PID 3712 wrote to memory of 4304 3712 msedge.exe 83 PID 3712 wrote to memory of 4304 3712 msedge.exe 83 PID 3712 wrote to memory of 2372 3712 msedge.exe 84 PID 3712 wrote to memory of 2372 3712 msedge.exe 84 PID 3712 wrote to memory of 4376 3712 msedge.exe 85 PID 3712 wrote to memory of 4376 3712 msedge.exe 85 PID 3712 wrote to memory of 4376 3712 msedge.exe 85 PID 3712 wrote to memory of 4376 3712 msedge.exe 85 PID 3712 wrote to memory of 4376 3712 msedge.exe 85 PID 3712 wrote to memory of 4376 3712 msedge.exe 85 PID 3712 wrote to memory of 4376 3712 msedge.exe 85 PID 3712 wrote to memory of 4376 3712 msedge.exe 85 PID 3712 wrote to memory of 4376 3712 msedge.exe 85 PID 3712 wrote to memory of 4376 3712 msedge.exe 85 PID 3712 wrote to memory of 4376 3712 msedge.exe 85 PID 3712 wrote to memory of 4376 3712 msedge.exe 85 PID 3712 wrote to memory of 4376 3712 msedge.exe 85 PID 3712 wrote to memory of 4376 3712 msedge.exe 85 PID 3712 wrote to memory of 4376 3712 msedge.exe 85 PID 3712 wrote to memory of 4376 3712 msedge.exe 85 PID 3712 wrote to memory of 4376 3712 msedge.exe 85 PID 3712 wrote to memory of 4376 3712 msedge.exe 85 PID 3712 wrote to memory of 4376 3712 msedge.exe 85 PID 3712 wrote to memory of 4376 3712 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\9be84577abb8a80a88c1ea76ab31db6b_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3712 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcc53246f8,0x7ffcc5324708,0x7ffcc53247182⤵PID:4872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2040,6650319519647733150,4971479706490877024,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2152 /prefetch:22⤵PID:4304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2040,6650319519647733150,4971479706490877024,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2144 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2040,6650319519647733150,4971479706490877024,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2724 /prefetch:82⤵PID:4376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,6650319519647733150,4971479706490877024,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3184 /prefetch:12⤵PID:3832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,6650319519647733150,4971479706490877024,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,6650319519647733150,4971479706490877024,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4952 /prefetch:12⤵PID:4416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,6650319519647733150,4971479706490877024,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5096 /prefetch:12⤵PID:3904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2040,6650319519647733150,4971479706490877024,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1916 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2900
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5012
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2900
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3116
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ae54e9db2e89f2c54da8cc0bfcbd26bd
SHA1a88af6c673609ecbc51a1a60dfbc8577830d2b5d
SHA2565009d3c953de63cfd14a7d911156c514e179ff07d2b94382d9caac6040cb72af
SHA512e3b70e5eb7321b9deca6f6a17424a15b9fd5c4008bd3789bd01099fd13cb2f4a2f37fe4b920fb51c50517745b576c1f94df83efd1a7e75949551163985599998
-
Filesize
152B
MD5f53207a5ca2ef5c7e976cbb3cb26d870
SHA149a8cc44f53da77bb3dfb36fc7676ed54675db43
SHA25619ab4e3c9da6d9cedda7461efdba9a2085e743513ab89f1dd0fd5a8f9486ad23
SHA512be734c7e8afda19f445912aef0d78f9941add29baebd4a812bff27f10a1d78b52aeb11c551468c8644443c86e1a2a6b2e4aead3d7f81d39925e3c20406ac1499
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize216B
MD5c89d1ad5a22b00b0f094cdbc06e598b6
SHA18149aa305f3a3f27627f5ee37783126ef092bc57
SHA256f9006bb632cfb3a5dd4e327d022891bf1acc009fb119ca6b5747ce07dae18c21
SHA512ec391c8672c15e1e1d410eee8385744ba7b699b5103324f6c21edd5ccfa60401f7210183c9dac0c7b1fa96d921b177d2abe0fc78362ec628f209b018760e9416
-
Filesize
2KB
MD538a2257d25c17306aa15823cd5b8e106
SHA1494d65fb6c6de6fa14f81d80e45dd279b8617508
SHA256578977ec932300f8a554f28360721ad7063cb644d1c551f7291bf12a42995e0e
SHA51273783e9f921ce020254f1b763e49b648e74e0d293d8a48b33e3518c550ec58fd47b78afb0b526a3175e3224b5016b3c2a73dd1faf2c2d4555772833445c107c0
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD50a9f44ed2b2eab82194df8f259c5f372
SHA1757efb98d19b7721df0c3cffbedc571f377419bf
SHA256c42f01d847a77a8b23bc370ebdb072982142e2faf27a499f93571db490550d3c
SHA512073b4fe5afe2eb164b26f78870df47331e0d3ffcf55e902be0948d52620fc00c9830912e22ee77af09ad5ecb614b85579a93050c10577f0fd3166b6de8f68c07
-
Filesize
6KB
MD5c195fc5f6cd98b273327762a95edf5df
SHA123d1221b47c16e2ca0c109b08c452a19acca6183
SHA256a83683fd328a44b5b431b9e0ebd33ed349a4c859737cd7b8252be115bc54cc8d
SHA512b984e3048b60593ea9c402e17afc9247ba098cad83cb094c1e21b3b4c2c8a47a68424dbd14f0274b9c0771fbc18d9362e33baf07f97e58463b074c838aca3942
-
Filesize
10KB
MD5b5a5ac06cbd280fa42b3f5e1130d982f
SHA19f49aa86682bbab2881979a1d8e133ad9e09dd67
SHA2565889df006b2ffe2d08dfc84eb483dddfddb999023762aa2c0de34665eb34c81a
SHA51223db5f9cc1536f3a23601e6438710072124034cbd3000da5302bddb8f7f2ba555e47c64273b2b725c682bbd57159c63f7e6385ddec938a51b9a6c03d906d8532