Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
17-06-2024 10:28
Static task
static1
Behavioral task
behavioral1
Sample
b82355fbdf4ed74c24a42627c61d22e9_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
b82355fbdf4ed74c24a42627c61d22e9_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
b82355fbdf4ed74c24a42627c61d22e9_JaffaCakes118.html
-
Size
128KB
-
MD5
b82355fbdf4ed74c24a42627c61d22e9
-
SHA1
0e0c3c970873bc1968d80c1025701e2ad8b2689a
-
SHA256
64800599a028b2cd5b7e8232483a4420919123d79a3bea2203126fb77aeb26ff
-
SHA512
9492bebd5f42b317346007b5854b1692240253fb5686b32aeb1955f54e318f1dff350b70343002843225569992330bd6523f37d6610cc27fccd12dec8f79bf4e
-
SSDEEP
1536:8BxxPM4Ny0yPNjdmGvPrd8AdCcD33pu4ufKdSCV26ARURSTkMVXT6Gjeo34e4Ye6:8XNy0XLYpi/cE8CKhVk
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3936 msedge.exe 3936 msedge.exe 1952 msedge.exe 1952 msedge.exe 404 identity_helper.exe 404 identity_helper.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe 536 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1952 wrote to memory of 552 1952 msedge.exe 81 PID 1952 wrote to memory of 552 1952 msedge.exe 81 PID 1952 wrote to memory of 612 1952 msedge.exe 82 PID 1952 wrote to memory of 612 1952 msedge.exe 82 PID 1952 wrote to memory of 612 1952 msedge.exe 82 PID 1952 wrote to memory of 612 1952 msedge.exe 82 PID 1952 wrote to memory of 612 1952 msedge.exe 82 PID 1952 wrote to memory of 612 1952 msedge.exe 82 PID 1952 wrote to memory of 612 1952 msedge.exe 82 PID 1952 wrote to memory of 612 1952 msedge.exe 82 PID 1952 wrote to memory of 612 1952 msedge.exe 82 PID 1952 wrote to memory of 612 1952 msedge.exe 82 PID 1952 wrote to memory of 612 1952 msedge.exe 82 PID 1952 wrote to memory of 612 1952 msedge.exe 82 PID 1952 wrote to memory of 612 1952 msedge.exe 82 PID 1952 wrote to memory of 612 1952 msedge.exe 82 PID 1952 wrote to memory of 612 1952 msedge.exe 82 PID 1952 wrote to memory of 612 1952 msedge.exe 82 PID 1952 wrote to memory of 612 1952 msedge.exe 82 PID 1952 wrote to memory of 612 1952 msedge.exe 82 PID 1952 wrote to memory of 612 1952 msedge.exe 82 PID 1952 wrote to memory of 612 1952 msedge.exe 82 PID 1952 wrote to memory of 612 1952 msedge.exe 82 PID 1952 wrote to memory of 612 1952 msedge.exe 82 PID 1952 wrote to memory of 612 1952 msedge.exe 82 PID 1952 wrote to memory of 612 1952 msedge.exe 82 PID 1952 wrote to memory of 612 1952 msedge.exe 82 PID 1952 wrote to memory of 612 1952 msedge.exe 82 PID 1952 wrote to memory of 612 1952 msedge.exe 82 PID 1952 wrote to memory of 612 1952 msedge.exe 82 PID 1952 wrote to memory of 612 1952 msedge.exe 82 PID 1952 wrote to memory of 612 1952 msedge.exe 82 PID 1952 wrote to memory of 612 1952 msedge.exe 82 PID 1952 wrote to memory of 612 1952 msedge.exe 82 PID 1952 wrote to memory of 612 1952 msedge.exe 82 PID 1952 wrote to memory of 612 1952 msedge.exe 82 PID 1952 wrote to memory of 612 1952 msedge.exe 82 PID 1952 wrote to memory of 612 1952 msedge.exe 82 PID 1952 wrote to memory of 612 1952 msedge.exe 82 PID 1952 wrote to memory of 612 1952 msedge.exe 82 PID 1952 wrote to memory of 612 1952 msedge.exe 82 PID 1952 wrote to memory of 612 1952 msedge.exe 82 PID 1952 wrote to memory of 3936 1952 msedge.exe 83 PID 1952 wrote to memory of 3936 1952 msedge.exe 83 PID 1952 wrote to memory of 932 1952 msedge.exe 84 PID 1952 wrote to memory of 932 1952 msedge.exe 84 PID 1952 wrote to memory of 932 1952 msedge.exe 84 PID 1952 wrote to memory of 932 1952 msedge.exe 84 PID 1952 wrote to memory of 932 1952 msedge.exe 84 PID 1952 wrote to memory of 932 1952 msedge.exe 84 PID 1952 wrote to memory of 932 1952 msedge.exe 84 PID 1952 wrote to memory of 932 1952 msedge.exe 84 PID 1952 wrote to memory of 932 1952 msedge.exe 84 PID 1952 wrote to memory of 932 1952 msedge.exe 84 PID 1952 wrote to memory of 932 1952 msedge.exe 84 PID 1952 wrote to memory of 932 1952 msedge.exe 84 PID 1952 wrote to memory of 932 1952 msedge.exe 84 PID 1952 wrote to memory of 932 1952 msedge.exe 84 PID 1952 wrote to memory of 932 1952 msedge.exe 84 PID 1952 wrote to memory of 932 1952 msedge.exe 84 PID 1952 wrote to memory of 932 1952 msedge.exe 84 PID 1952 wrote to memory of 932 1952 msedge.exe 84 PID 1952 wrote to memory of 932 1952 msedge.exe 84 PID 1952 wrote to memory of 932 1952 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\b82355fbdf4ed74c24a42627c61d22e9_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff959b246f8,0x7ff959b24708,0x7ff959b247182⤵PID:552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,7597662225251294725,8998035144029979527,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2100 /prefetch:22⤵PID:612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2060,7597662225251294725,8998035144029979527,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2060,7597662225251294725,8998035144029979527,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2940 /prefetch:82⤵PID:932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,7597662225251294725,8998035144029979527,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:2784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,7597662225251294725,8998035144029979527,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:1480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,7597662225251294725,8998035144029979527,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4856 /prefetch:12⤵PID:2400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,7597662225251294725,8998035144029979527,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5776 /prefetch:82⤵PID:1076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,7597662225251294725,8998035144029979527,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5776 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,7597662225251294725,8998035144029979527,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5372 /prefetch:12⤵PID:4228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,7597662225251294725,8998035144029979527,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5452 /prefetch:12⤵PID:1368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,7597662225251294725,8998035144029979527,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4188 /prefetch:12⤵PID:4704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,7597662225251294725,8998035144029979527,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5316 /prefetch:12⤵PID:3604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,7597662225251294725,8998035144029979527,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3088 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:536
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4048
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1540
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3044
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD581e892ca5c5683efdf9135fe0f2adb15
SHA139159b30226d98a465ece1da28dc87088b20ecad
SHA256830f394548cff6eed3608476190a7ee7d65fe651adc638c5b27ce58639a91e17
SHA512c943f4cfe8615ac159cfac13c10b67e6c0c9093851dd3ac6dda3b82e195d3554e3c37962010a2d0ae5074828d376402624f0dda5499c9997e962e4cfd26444c0
-
Filesize
152B
MD556067634f68231081c4bd5bdbfcc202f
SHA15582776da6ffc75bb0973840fc3d15598bc09eb1
SHA2568c08b0cbceb301c8f960aa674c6e7f6dbf40b4a1c2684e6fb0456ec5ff0e56b4
SHA512c4657393e0b9ec682570d7e251644a858d33e056ccd0f3eebffd0fde25244b3a699b8d9244bcdac00d6f74b49833629b270e099c2b557f729a9066922583f784
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize216B
MD567369250e235251281180e18e988e40d
SHA1e877c10ea8e3a7ca002b0b60776acb1bdf3f65ac
SHA2568714fe8398917e5d120fb699220be6fc36cfd5b7fc0271f61978de4a72c32c30
SHA51254e4bc025b72fe5824c09db1ec3eee85579806910f8a720e9c9e544c36b0b80ccc1f1c1061a2a6560f39bd683b4087c036a94324f92df01564932b5b364d5434
-
Filesize
2KB
MD54548de959febcd5abde2b037a072f752
SHA12f4a633941fba9535925f2634b52bbc441a991b0
SHA25686d89c3d467923f40d4a15e75124fe7ddc6614476130eb2cd9f63c16d34b675e
SHA512552cf13898eeab82e3969518520062b92181e1ff14a64fa48ad41f708b18cda08bb29f80e51f419ad4906ea05663ed86988f700c080600c7b6c8e21d69e1aad5
-
Filesize
2KB
MD5886fb53ddcf4a3b99097ffd63aecbd9c
SHA169a7921b9da71a0d286789b730087d8eaf1984c4
SHA25670f8192e239ba4aedadf7c95d61bdfaf9d433925858040f96476d56243526647
SHA512c2a913ff293d3a0b3a75424d77cd7ac4918c4f74f919ed3600fcb3ba9ab69dc14c8fd9ee8ff1331aa9cfa55fb50c09fdb94b398b64d5e15da54de25a76f1042a
-
Filesize
7KB
MD548a38d9266ab792fc4e624e9b2d67149
SHA1a7790d80b687b96afcd85df6c6c8be06a50f1f19
SHA256bfc98f17002afed42e9c6bce6da3788cf6ba443f8c56362d9223f4e456f18bc1
SHA5124560fff5a9c6f715e8e6de12c81a188b741009e7acd4f620b3d5f4c1d0942d9e1f29ab98b16ca9efc6ce1140c4d126a0b5cda65791bb1ad176d8f5f7b37bcbdb
-
Filesize
6KB
MD5fe4307dabc8dd88d96ebcd8bc37a9105
SHA1dbeed1f87fde86bc77d90efb9d2a723fcd5e9827
SHA256931970bde1504274354686ee21df08cc75398064e9f05d61980be394bf0e6247
SHA51287f5deddf25f7b5ff1c40d728bc39f1108a170a1e6e1f23499e9ea70f2890c327f70ff452cacef46b5a8200de7271a5f2d5370aeac181f777b03cdabab289b22
-
Filesize
7KB
MD553ea93ed70b765d82dbd700b98cc9fef
SHA1d62a67a61d2e7e35c84f980eaaee3380a7ac163d
SHA2566a4330a5297836caff680e2d88d2ec6931b5c8fc3a77199700d6df5132c64cd8
SHA512e41687dfa5f0c58c2cd7f88168127baf800700f76d24a101377326e761e7ccdebd6b74bee39279129618feae9329ff795df8bb8d140cc9f25e7063699f9b4906
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD586fa7c1799aa93b644e32b717229a984
SHA19b4f691296e09bf9db308df4bb539cbbb96887d9
SHA256a7ad29e6bcf83ab488c97639e13885cad9931d0327b8f9909b3c0a0800fda123
SHA512439149daac5b5ad1e9e47ba2523a4c0dba0f613068c1c0172a622127de03f173ba99ad6d79d4e26284694d3bd25bff617d0d35ab61f02c76922e4cb65c87d855