Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
06/07/2024, 14:44
Static task
static1
Behavioral task
behavioral1
Sample
2887b3a91ef8ec7736d1efb09c73f2a8_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2887b3a91ef8ec7736d1efb09c73f2a8_JaffaCakes118.html
Resource
win10v2004-20240704-en
General
-
Target
2887b3a91ef8ec7736d1efb09c73f2a8_JaffaCakes118.html
-
Size
28KB
-
MD5
2887b3a91ef8ec7736d1efb09c73f2a8
-
SHA1
b61c545c4fd726f553da9615a97aabf7165ea676
-
SHA256
cf3efd1b168d2dd9d570434650f38e09bc19643a33847fe8e83226c2b5323927
-
SHA512
4156f9802b2de43ebf32c02ce70bae4e5b5de28b01ceabf507087a6dc8ae77cbae54d4f969a29bec02af03330d844530b5a5a1588a6f73526b96413e0ca07efc
-
SSDEEP
768:Zcd9QZBC7mOdMANpC5I9nC4iwPwKwrRPd:gQZBCCOdd0IxCLwPwKwrRPd
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2072 msedge.exe 2072 msedge.exe 2596 msedge.exe 2596 msedge.exe 4140 identity_helper.exe 4140 identity_helper.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe 4912 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe 2596 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2596 wrote to memory of 512 2596 msedge.exe 82 PID 2596 wrote to memory of 512 2596 msedge.exe 82 PID 2596 wrote to memory of 3552 2596 msedge.exe 83 PID 2596 wrote to memory of 3552 2596 msedge.exe 83 PID 2596 wrote to memory of 3552 2596 msedge.exe 83 PID 2596 wrote to memory of 3552 2596 msedge.exe 83 PID 2596 wrote to memory of 3552 2596 msedge.exe 83 PID 2596 wrote to memory of 3552 2596 msedge.exe 83 PID 2596 wrote to memory of 3552 2596 msedge.exe 83 PID 2596 wrote to memory of 3552 2596 msedge.exe 83 PID 2596 wrote to memory of 3552 2596 msedge.exe 83 PID 2596 wrote to memory of 3552 2596 msedge.exe 83 PID 2596 wrote to memory of 3552 2596 msedge.exe 83 PID 2596 wrote to memory of 3552 2596 msedge.exe 83 PID 2596 wrote to memory of 3552 2596 msedge.exe 83 PID 2596 wrote to memory of 3552 2596 msedge.exe 83 PID 2596 wrote to memory of 3552 2596 msedge.exe 83 PID 2596 wrote to memory of 3552 2596 msedge.exe 83 PID 2596 wrote to memory of 3552 2596 msedge.exe 83 PID 2596 wrote to memory of 3552 2596 msedge.exe 83 PID 2596 wrote to memory of 3552 2596 msedge.exe 83 PID 2596 wrote to memory of 3552 2596 msedge.exe 83 PID 2596 wrote to memory of 3552 2596 msedge.exe 83 PID 2596 wrote to memory of 3552 2596 msedge.exe 83 PID 2596 wrote to memory of 3552 2596 msedge.exe 83 PID 2596 wrote to memory of 3552 2596 msedge.exe 83 PID 2596 wrote to memory of 3552 2596 msedge.exe 83 PID 2596 wrote to memory of 3552 2596 msedge.exe 83 PID 2596 wrote to memory of 3552 2596 msedge.exe 83 PID 2596 wrote to memory of 3552 2596 msedge.exe 83 PID 2596 wrote to memory of 3552 2596 msedge.exe 83 PID 2596 wrote to memory of 3552 2596 msedge.exe 83 PID 2596 wrote to memory of 3552 2596 msedge.exe 83 PID 2596 wrote to memory of 3552 2596 msedge.exe 83 PID 2596 wrote to memory of 3552 2596 msedge.exe 83 PID 2596 wrote to memory of 3552 2596 msedge.exe 83 PID 2596 wrote to memory of 3552 2596 msedge.exe 83 PID 2596 wrote to memory of 3552 2596 msedge.exe 83 PID 2596 wrote to memory of 3552 2596 msedge.exe 83 PID 2596 wrote to memory of 3552 2596 msedge.exe 83 PID 2596 wrote to memory of 3552 2596 msedge.exe 83 PID 2596 wrote to memory of 3552 2596 msedge.exe 83 PID 2596 wrote to memory of 2072 2596 msedge.exe 84 PID 2596 wrote to memory of 2072 2596 msedge.exe 84 PID 2596 wrote to memory of 4924 2596 msedge.exe 85 PID 2596 wrote to memory of 4924 2596 msedge.exe 85 PID 2596 wrote to memory of 4924 2596 msedge.exe 85 PID 2596 wrote to memory of 4924 2596 msedge.exe 85 PID 2596 wrote to memory of 4924 2596 msedge.exe 85 PID 2596 wrote to memory of 4924 2596 msedge.exe 85 PID 2596 wrote to memory of 4924 2596 msedge.exe 85 PID 2596 wrote to memory of 4924 2596 msedge.exe 85 PID 2596 wrote to memory of 4924 2596 msedge.exe 85 PID 2596 wrote to memory of 4924 2596 msedge.exe 85 PID 2596 wrote to memory of 4924 2596 msedge.exe 85 PID 2596 wrote to memory of 4924 2596 msedge.exe 85 PID 2596 wrote to memory of 4924 2596 msedge.exe 85 PID 2596 wrote to memory of 4924 2596 msedge.exe 85 PID 2596 wrote to memory of 4924 2596 msedge.exe 85 PID 2596 wrote to memory of 4924 2596 msedge.exe 85 PID 2596 wrote to memory of 4924 2596 msedge.exe 85 PID 2596 wrote to memory of 4924 2596 msedge.exe 85 PID 2596 wrote to memory of 4924 2596 msedge.exe 85 PID 2596 wrote to memory of 4924 2596 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2887b3a91ef8ec7736d1efb09c73f2a8_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9f52046f8,0x7ff9f5204708,0x7ff9f52047182⤵PID:512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2024,1323906085981625358,15400779791570487353,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2032 /prefetch:22⤵PID:3552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2024,1323906085981625358,15400779791570487353,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2136 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2024,1323906085981625358,15400779791570487353,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2692 /prefetch:82⤵PID:4924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,1323906085981625358,15400779791570487353,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:4084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,1323906085981625358,15400779791570487353,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:4104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,1323906085981625358,15400779791570487353,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4140 /prefetch:12⤵PID:4472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,1323906085981625358,15400779791570487353,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5088 /prefetch:12⤵PID:3872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,1323906085981625358,15400779791570487353,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4888 /prefetch:12⤵PID:3004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2024,1323906085981625358,15400779791570487353,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5656 /prefetch:82⤵PID:2356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2024,1323906085981625358,15400779791570487353,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5656 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,1323906085981625358,15400779791570487353,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5800 /prefetch:12⤵PID:4628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,1323906085981625358,15400779791570487353,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5780 /prefetch:12⤵PID:1300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,1323906085981625358,15400779791570487353,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4056 /prefetch:12⤵PID:388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,1323906085981625358,15400779791570487353,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5140 /prefetch:12⤵PID:4540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2024,1323906085981625358,15400779791570487353,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6028 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4912
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1660
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:624
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e1fe3a26bd35b84102bb4203f31e74c7
SHA145fdfa8433789b575eb64e116718e62e0e0cf4a0
SHA25626e0d51529de906dd285ba48288e25eaf5213c0f0bab9bc5f119ecbc5e1b93ee
SHA512d528db2e9b917d4fbe24b1b5c6f4cb274f4f91c84f63e5119e041fa89ae0cd01a370e314f8b6aca9d6fa958e79feabc720f4b54b3d8aed69aab11fa84cad36bd
-
Filesize
152B
MD52915233ace3b11bc8898c958f245aa9a
SHA168c6aa983da303b825d656ac3284081db682f702
SHA256b2cb442f2ca27619c8df087f56fcbbb53186c53f8fd131af886ee3712220477e
SHA512e3f1b70d39b615e212f84d587ee816598236ee6ce144d919593894fcce4a0900343a9e8b837a0d1bd10921fff1c976c84c4a570eda776fe84d374a69e7a54890
-
Filesize
211KB
MD5151fb811968eaf8efb840908b89dc9d4
SHA17ec811009fd9b0e6d92d12d78b002275f2f1bee1
SHA256043fd8558e4a5a60aaccd2f0377f77a544e3e375242e9d7200dc6e51f94103ed
SHA51283aface0ab01da52fd077f747c9d5916e3c06b0ea5c551d7d316707ec3e8f3f986ce1c82e6f2136e48c6511a83cb0ac67ff6dc8f0e440ac72fc6854086a87674
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize504B
MD5bf377be98c651411a6362ff5f69c6fb9
SHA1dede9bc859dc152703f1ec786363f99d0784c116
SHA25600bc9f4e5e8abed87e106f922ec4b27afc8768ada2a7078137765e798b97b537
SHA5120940cb71b7b6752c38090e3484bd01380fcc302c23c13b89d016347382991ac754c3b7588338842e1cfcce8b499814736ff410595320a67ee3ed84ee22c15570
-
Filesize
6KB
MD53cc01957febfd8cbd194fd462932e5a4
SHA1932274bf6aa379fd0f88fff76795e2b184cb0c13
SHA2564ae8f5c159cbb1f3c8858e883cbc91d21935689952aed8abed8d476f16fcbba6
SHA51212d622ca57144fe69e28890f464d360eb98910eaa926ec0ba113c80415d90fe69356eba076b37f8334f4336897c819c1cff425bbcc431d8bf6aa8f44ffbc3ab4
-
Filesize
6KB
MD527342940f6ae50c4f70813eac6e610ae
SHA1e5d80f06edc77568ee008011bdbdb251988e28fa
SHA256da57748269b7080f90b94374389748333ba27d467c9e8748ee1a2477ededce3c
SHA512928fcd1400eceb5d980ca301b6722d90e94e07c530e23352dac207fb82ed088420b5fc2134a57a79c405e4bad9e67b94614f7c874dcbb3055acc6adc32a056d4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\be844d6e-1abb-410d-ad0f-23c55cea4822.tmp
Filesize1KB
MD53839389b43842770b0b2b16094013f45
SHA188bf09658f0de276606f1156924001af3e5f56ab
SHA256f9c8bc22323709d45e28d4df9fb377fa9c4ab7db3212f998189b7b2300819968
SHA512cf4226f5dd3c7c51f91cec3e3d2620aff52924b7e7d8f48ecb05dbc394f674815f92512e79bb55e3b60a9a4deee5cf51621f62da72300d0a3bbf09361d40e773
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD589635ac32b0efe32a0235bcfe0759dd9
SHA15726861602a4e1df598c9a2f2b5d6ce2c955ba35
SHA2564cf12f491cc11280e3633798a5578acf9555667d704405af09fa9f48031f952b
SHA51218dc21cff5e6274cbe8505db49954bdb723b160e2ab43511b959108b0039271dd63fc2a45f000ae7fbeb3901dd1f395dfc5652741931a4ce68268de69dcd175a