Analysis
-
max time kernel
145s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
14/06/2024, 08:35
Static task
static1
Behavioral task
behavioral1
Sample
a8c2f96685eee29114f798e7fa246e8f_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a8c2f96685eee29114f798e7fa246e8f_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
a8c2f96685eee29114f798e7fa246e8f_JaffaCakes118.html
-
Size
144KB
-
MD5
a8c2f96685eee29114f798e7fa246e8f
-
SHA1
81054379fc52dfa87b853a6dcaf92c23e354aea3
-
SHA256
d97ee7b913a61241f5a7d785b1fe8f19e60529aa1e0fb477bd4a525c79184e6e
-
SHA512
5ce308f1fa9c58afee68b531c236ebe6ad600f318833fbf4622912eff54627aede91c1c140eaf6e7b20d804d2812fb893d91e4bc42b92ccd5834fd453759c20a
-
SSDEEP
3072:/HBck47oRf02z4tRb/zkFBehwHFfKsBURHj17ZTzZVt8aN8T9v0WIyaNAekFByWV:/HBsoRfjz4tRb/zkFBehwlfKsBURHj1k
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3220 msedge.exe 3220 msedge.exe 2440 msedge.exe 2440 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2440 wrote to memory of 3760 2440 msedge.exe 81 PID 2440 wrote to memory of 3760 2440 msedge.exe 81 PID 2440 wrote to memory of 812 2440 msedge.exe 82 PID 2440 wrote to memory of 812 2440 msedge.exe 82 PID 2440 wrote to memory of 812 2440 msedge.exe 82 PID 2440 wrote to memory of 812 2440 msedge.exe 82 PID 2440 wrote to memory of 812 2440 msedge.exe 82 PID 2440 wrote to memory of 812 2440 msedge.exe 82 PID 2440 wrote to memory of 812 2440 msedge.exe 82 PID 2440 wrote to memory of 812 2440 msedge.exe 82 PID 2440 wrote to memory of 812 2440 msedge.exe 82 PID 2440 wrote to memory of 812 2440 msedge.exe 82 PID 2440 wrote to memory of 812 2440 msedge.exe 82 PID 2440 wrote to memory of 812 2440 msedge.exe 82 PID 2440 wrote to memory of 812 2440 msedge.exe 82 PID 2440 wrote to memory of 812 2440 msedge.exe 82 PID 2440 wrote to memory of 812 2440 msedge.exe 82 PID 2440 wrote to memory of 812 2440 msedge.exe 82 PID 2440 wrote to memory of 812 2440 msedge.exe 82 PID 2440 wrote to memory of 812 2440 msedge.exe 82 PID 2440 wrote to memory of 812 2440 msedge.exe 82 PID 2440 wrote to memory of 812 2440 msedge.exe 82 PID 2440 wrote to memory of 812 2440 msedge.exe 82 PID 2440 wrote to memory of 812 2440 msedge.exe 82 PID 2440 wrote to memory of 812 2440 msedge.exe 82 PID 2440 wrote to memory of 812 2440 msedge.exe 82 PID 2440 wrote to memory of 812 2440 msedge.exe 82 PID 2440 wrote to memory of 812 2440 msedge.exe 82 PID 2440 wrote to memory of 812 2440 msedge.exe 82 PID 2440 wrote to memory of 812 2440 msedge.exe 82 PID 2440 wrote to memory of 812 2440 msedge.exe 82 PID 2440 wrote to memory of 812 2440 msedge.exe 82 PID 2440 wrote to memory of 812 2440 msedge.exe 82 PID 2440 wrote to memory of 812 2440 msedge.exe 82 PID 2440 wrote to memory of 812 2440 msedge.exe 82 PID 2440 wrote to memory of 812 2440 msedge.exe 82 PID 2440 wrote to memory of 812 2440 msedge.exe 82 PID 2440 wrote to memory of 812 2440 msedge.exe 82 PID 2440 wrote to memory of 812 2440 msedge.exe 82 PID 2440 wrote to memory of 812 2440 msedge.exe 82 PID 2440 wrote to memory of 812 2440 msedge.exe 82 PID 2440 wrote to memory of 812 2440 msedge.exe 82 PID 2440 wrote to memory of 3220 2440 msedge.exe 83 PID 2440 wrote to memory of 3220 2440 msedge.exe 83 PID 2440 wrote to memory of 2544 2440 msedge.exe 84 PID 2440 wrote to memory of 2544 2440 msedge.exe 84 PID 2440 wrote to memory of 2544 2440 msedge.exe 84 PID 2440 wrote to memory of 2544 2440 msedge.exe 84 PID 2440 wrote to memory of 2544 2440 msedge.exe 84 PID 2440 wrote to memory of 2544 2440 msedge.exe 84 PID 2440 wrote to memory of 2544 2440 msedge.exe 84 PID 2440 wrote to memory of 2544 2440 msedge.exe 84 PID 2440 wrote to memory of 2544 2440 msedge.exe 84 PID 2440 wrote to memory of 2544 2440 msedge.exe 84 PID 2440 wrote to memory of 2544 2440 msedge.exe 84 PID 2440 wrote to memory of 2544 2440 msedge.exe 84 PID 2440 wrote to memory of 2544 2440 msedge.exe 84 PID 2440 wrote to memory of 2544 2440 msedge.exe 84 PID 2440 wrote to memory of 2544 2440 msedge.exe 84 PID 2440 wrote to memory of 2544 2440 msedge.exe 84 PID 2440 wrote to memory of 2544 2440 msedge.exe 84 PID 2440 wrote to memory of 2544 2440 msedge.exe 84 PID 2440 wrote to memory of 2544 2440 msedge.exe 84 PID 2440 wrote to memory of 2544 2440 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\a8c2f96685eee29114f798e7fa246e8f_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb4be046f8,0x7ffb4be04708,0x7ffb4be047182⤵PID:3760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,16248066295938253938,9567828928090547618,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2156 /prefetch:22⤵PID:812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2144,16248066295938253938,9567828928090547618,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2244 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2144,16248066295938253938,9567828928090547618,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2796 /prefetch:82⤵PID:2544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,16248066295938253938,9567828928090547618,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3204 /prefetch:12⤵PID:2004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,16248066295938253938,9567828928090547618,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:4888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,16248066295938253938,9567828928090547618,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4896 /prefetch:12⤵PID:1600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,16248066295938253938,9567828928090547618,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5048 /prefetch:12⤵PID:4060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,16248066295938253938,9567828928090547618,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3040 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4040
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4364
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4448
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5dabfafd78687947a9de64dd5b776d25f
SHA116084c74980dbad713f9d332091985808b436dea
SHA256c7658f407cbe799282ef202e78319e489ed4e48e23f6d056b505bc0d73e34201
SHA512dae1de5245cd9b72117c430250aa2029eb8df1b85dc414ac50152d8eba4d100bcf0320ac18446f865dc96949f8b06a5b9e7a0c84f9c1b0eada318e80f99f9d2b
-
Filesize
152B
MD5c39b3aa574c0c938c80eb263bb450311
SHA1f4d11275b63f4f906be7a55ec6ca050c62c18c88
SHA25666f8d413a30451055d4b6fa40e007197a4bb93a66a28ca4112967ec417ffab6c
SHA512eeca2e21cd4d66835beb9812e26344c8695584253af397b06f378536ca797c3906a670ed239631729c96ebb93acfb16327cf58d517e83fb8923881c5fdb6d232
-
Filesize
44KB
MD523536ccfe05b737ae639fe63ee4cc435
SHA16d2e9822835dc3e6117a4d2addfc8f241fbdbc82
SHA2566ae9edfc411ede03661a3d910fafddab3d6b313d1f4668dc8c5a84c5ab23a3ce
SHA512f416e36b2322bbebd211fd1ea69c88883f00c7b00f14474a5fcce4a408840c0d1b0304eb8941509a38157d0583485f638959eb7d5b9ae668aa88c1d3eee8dd0d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize288B
MD5399bca1fca2ab84f1e80220a1b71dc10
SHA179c6f7c126bbf2a23d8cc2af0f1da10c0b438666
SHA256be2dea9525e499697d6a3a62e7ca773f7ffb159f1b20e4cec2a8df1984270ead
SHA51282a31069ba91f96634fb332b3f242f2b013329b896685b5c79644961465560b3d34599ff91596061b3dee3adc2c54eb5a4821dde37fcc34d6559ee94eea7811d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize264B
MD51ca6dff3868a485f0b3be3faabb44a9d
SHA106e4635041072a7643913f1ef0fd38ceedaa3586
SHA2569989fca215046c7708102e0c953ece92117c44a96abf758e190e825a5f6203b1
SHA512b49608f8e77221c78b47427d373f68c27fbf16a7c8e1bca5e830e6195cfb91599314678e3be5ce98d4fc530278d40af9c9d365881a0ce5a2978aa59ee7afe2fe
-
Filesize
2KB
MD57650a371f419bb99228593281fca6bea
SHA152a68fe347ce14354eea883008f3d5098d71fb45
SHA25633b56823f465d7aaa1fa14aae0614590295ab89e2a497cda24bb9b6013ad9a24
SHA5129c05ea26b3d34714a70627a7aa95e1fe337487ca37a29eb35245af599ef52321541beefc428f15a8b52eadf4f64df8323c602643cf29613ed4a2fcc870e0c518
-
Filesize
6KB
MD5bf4e51622da0660775a4a985704d78ff
SHA1d3fb580d0461ed8fe0390d1b7f4dd78729911921
SHA2565ed4128d176b31fe95fa34522638b34bbeb1506c8f61eb56cbb6d20147a30862
SHA512bacfedb4a5162f47bcab2f8a25366f1aa0c621c75543ecbe726c11fdaa4518e5fb832fa96458b42a5e804234c156fab5ddd5ab74d4200711a34c921a5488f396
-
Filesize
7KB
MD550288823c390609a3ae38fafadca50b6
SHA1bca72006b023ed920975195506bbe409ae00d170
SHA256fcabe1ff6c71f074b334e5e69bf102544e8a4aeb4dcc1b42bf9877677b94e7a0
SHA512af7680cab42758351027456c0efb4d40f5f9b54903023a8026a9ac3dce695756260b774681c42d92ac1fc977c67399473e63f7d352e3392031b2d80605a8bb33
-
Filesize
11KB
MD52d9f6e00f2de22639dac905cda66e4d4
SHA1adb6cb659834bc3aa671f5125581d7179deab1ff
SHA256983b29776686ff6259c583599a2914c258430a52bcc85f1fb14e98e52fa2acad
SHA51219ad4337bae9f51deca46a21f41651d3f06e776761a637284f410889f22cbf4f05a402e6a3bf1724e35a02aed1cf25a210666d8c50eea217ec8f7a66163e2654