Analysis
-
max time kernel
145s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
08-07-2024 22:16
Static task
static1
Behavioral task
behavioral1
Sample
2e030bcc5796eab913c94f7368636dd1_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2e030bcc5796eab913c94f7368636dd1_JaffaCakes118.html
Resource
win10v2004-20240704-en
General
-
Target
2e030bcc5796eab913c94f7368636dd1_JaffaCakes118.html
-
Size
28KB
-
MD5
2e030bcc5796eab913c94f7368636dd1
-
SHA1
023b5e235fbab3cebb785d202066c00eb95456e9
-
SHA256
da21790a9afe79840c242e7f3e1cfec30d46587d548fcdf32ff9b8bdd826bb53
-
SHA512
530b387f1ecba63d90f5aba8b3f8a52808277194712e94a86f25a2b32146f1c677403d2b8822868ad95b972f27a1594f1081f30add7d7f3098aee23ed2c8c7a8
-
SSDEEP
768:Zcd9QZBC7mOdMEnpC5I9nC4ewAwXweUPd:gQZBCCOd70IxC7wAwXweUPd
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1576 msedge.exe 1576 msedge.exe 652 msedge.exe 652 msedge.exe 1548 identity_helper.exe 1548 identity_helper.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 652 msedge.exe 652 msedge.exe 652 msedge.exe 652 msedge.exe 652 msedge.exe 652 msedge.exe 652 msedge.exe 652 msedge.exe 652 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 652 msedge.exe 652 msedge.exe 652 msedge.exe 652 msedge.exe 652 msedge.exe 652 msedge.exe 652 msedge.exe 652 msedge.exe 652 msedge.exe 652 msedge.exe 652 msedge.exe 652 msedge.exe 652 msedge.exe 652 msedge.exe 652 msedge.exe 652 msedge.exe 652 msedge.exe 652 msedge.exe 652 msedge.exe 652 msedge.exe 652 msedge.exe 652 msedge.exe 652 msedge.exe 652 msedge.exe 652 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 652 msedge.exe 652 msedge.exe 652 msedge.exe 652 msedge.exe 652 msedge.exe 652 msedge.exe 652 msedge.exe 652 msedge.exe 652 msedge.exe 652 msedge.exe 652 msedge.exe 652 msedge.exe 652 msedge.exe 652 msedge.exe 652 msedge.exe 652 msedge.exe 652 msedge.exe 652 msedge.exe 652 msedge.exe 652 msedge.exe 652 msedge.exe 652 msedge.exe 652 msedge.exe 652 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 652 wrote to memory of 2440 652 msedge.exe 82 PID 652 wrote to memory of 2440 652 msedge.exe 82 PID 652 wrote to memory of 2208 652 msedge.exe 83 PID 652 wrote to memory of 2208 652 msedge.exe 83 PID 652 wrote to memory of 2208 652 msedge.exe 83 PID 652 wrote to memory of 2208 652 msedge.exe 83 PID 652 wrote to memory of 2208 652 msedge.exe 83 PID 652 wrote to memory of 2208 652 msedge.exe 83 PID 652 wrote to memory of 2208 652 msedge.exe 83 PID 652 wrote to memory of 2208 652 msedge.exe 83 PID 652 wrote to memory of 2208 652 msedge.exe 83 PID 652 wrote to memory of 2208 652 msedge.exe 83 PID 652 wrote to memory of 2208 652 msedge.exe 83 PID 652 wrote to memory of 2208 652 msedge.exe 83 PID 652 wrote to memory of 2208 652 msedge.exe 83 PID 652 wrote to memory of 2208 652 msedge.exe 83 PID 652 wrote to memory of 2208 652 msedge.exe 83 PID 652 wrote to memory of 2208 652 msedge.exe 83 PID 652 wrote to memory of 2208 652 msedge.exe 83 PID 652 wrote to memory of 2208 652 msedge.exe 83 PID 652 wrote to memory of 2208 652 msedge.exe 83 PID 652 wrote to memory of 2208 652 msedge.exe 83 PID 652 wrote to memory of 2208 652 msedge.exe 83 PID 652 wrote to memory of 2208 652 msedge.exe 83 PID 652 wrote to memory of 2208 652 msedge.exe 83 PID 652 wrote to memory of 2208 652 msedge.exe 83 PID 652 wrote to memory of 2208 652 msedge.exe 83 PID 652 wrote to memory of 2208 652 msedge.exe 83 PID 652 wrote to memory of 2208 652 msedge.exe 83 PID 652 wrote to memory of 2208 652 msedge.exe 83 PID 652 wrote to memory of 2208 652 msedge.exe 83 PID 652 wrote to memory of 2208 652 msedge.exe 83 PID 652 wrote to memory of 2208 652 msedge.exe 83 PID 652 wrote to memory of 2208 652 msedge.exe 83 PID 652 wrote to memory of 2208 652 msedge.exe 83 PID 652 wrote to memory of 2208 652 msedge.exe 83 PID 652 wrote to memory of 2208 652 msedge.exe 83 PID 652 wrote to memory of 2208 652 msedge.exe 83 PID 652 wrote to memory of 2208 652 msedge.exe 83 PID 652 wrote to memory of 2208 652 msedge.exe 83 PID 652 wrote to memory of 2208 652 msedge.exe 83 PID 652 wrote to memory of 2208 652 msedge.exe 83 PID 652 wrote to memory of 1576 652 msedge.exe 84 PID 652 wrote to memory of 1576 652 msedge.exe 84 PID 652 wrote to memory of 2484 652 msedge.exe 85 PID 652 wrote to memory of 2484 652 msedge.exe 85 PID 652 wrote to memory of 2484 652 msedge.exe 85 PID 652 wrote to memory of 2484 652 msedge.exe 85 PID 652 wrote to memory of 2484 652 msedge.exe 85 PID 652 wrote to memory of 2484 652 msedge.exe 85 PID 652 wrote to memory of 2484 652 msedge.exe 85 PID 652 wrote to memory of 2484 652 msedge.exe 85 PID 652 wrote to memory of 2484 652 msedge.exe 85 PID 652 wrote to memory of 2484 652 msedge.exe 85 PID 652 wrote to memory of 2484 652 msedge.exe 85 PID 652 wrote to memory of 2484 652 msedge.exe 85 PID 652 wrote to memory of 2484 652 msedge.exe 85 PID 652 wrote to memory of 2484 652 msedge.exe 85 PID 652 wrote to memory of 2484 652 msedge.exe 85 PID 652 wrote to memory of 2484 652 msedge.exe 85 PID 652 wrote to memory of 2484 652 msedge.exe 85 PID 652 wrote to memory of 2484 652 msedge.exe 85 PID 652 wrote to memory of 2484 652 msedge.exe 85 PID 652 wrote to memory of 2484 652 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2e030bcc5796eab913c94f7368636dd1_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:652 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9640246f8,0x7ff964024708,0x7ff9640247182⤵PID:2440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2032,14788117126738759942,10378799191734418476,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2040 /prefetch:22⤵PID:2208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2032,14788117126738759942,10378799191734418476,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2428 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2032,14788117126738759942,10378799191734418476,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2892 /prefetch:82⤵PID:2484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,14788117126738759942,10378799191734418476,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:1028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,14788117126738759942,10378799191734418476,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:4532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,14788117126738759942,10378799191734418476,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4584 /prefetch:12⤵PID:3200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,14788117126738759942,10378799191734418476,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5084 /prefetch:12⤵PID:1656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,14788117126738759942,10378799191734418476,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5308 /prefetch:12⤵PID:3616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2032,14788117126738759942,10378799191734418476,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5664 /prefetch:82⤵PID:2512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2032,14788117126738759942,10378799191734418476,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5664 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,14788117126738759942,10378799191734418476,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5728 /prefetch:12⤵PID:5048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,14788117126738759942,10378799191734418476,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5748 /prefetch:12⤵PID:5012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,14788117126738759942,10378799191734418476,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5768 /prefetch:12⤵PID:3972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,14788117126738759942,10378799191734418476,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6300 /prefetch:12⤵PID:5016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2032,14788117126738759942,10378799191734418476,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3212 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4784
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2260
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3016
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e1fe3a26bd35b84102bb4203f31e74c7
SHA145fdfa8433789b575eb64e116718e62e0e0cf4a0
SHA25626e0d51529de906dd285ba48288e25eaf5213c0f0bab9bc5f119ecbc5e1b93ee
SHA512d528db2e9b917d4fbe24b1b5c6f4cb274f4f91c84f63e5119e041fa89ae0cd01a370e314f8b6aca9d6fa958e79feabc720f4b54b3d8aed69aab11fa84cad36bd
-
Filesize
152B
MD52915233ace3b11bc8898c958f245aa9a
SHA168c6aa983da303b825d656ac3284081db682f702
SHA256b2cb442f2ca27619c8df087f56fcbbb53186c53f8fd131af886ee3712220477e
SHA512e3f1b70d39b615e212f84d587ee816598236ee6ce144d919593894fcce4a0900343a9e8b837a0d1bd10921fff1c976c84c4a570eda776fe84d374a69e7a54890
-
Filesize
211KB
MD5151fb811968eaf8efb840908b89dc9d4
SHA17ec811009fd9b0e6d92d12d78b002275f2f1bee1
SHA256043fd8558e4a5a60aaccd2f0377f77a544e3e375242e9d7200dc6e51f94103ed
SHA51283aface0ab01da52fd077f747c9d5916e3c06b0ea5c551d7d316707ec3e8f3f986ce1c82e6f2136e48c6511a83cb0ac67ff6dc8f0e440ac72fc6854086a87674
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize504B
MD577c48e41417f1d0033ab9c9375ceeeb5
SHA110b98df6e3dff83c9464c20a983296eff0bfda48
SHA2565375d726268e1f56abe25323379208f2f79787f8c5b102c3fdb17b393107b966
SHA512adcb08629bcb9e5fa767d6d17333d66384ad71b5468928b1f2c61347303bda0cdc8aa46a2a834911a1611664cd795febdcbbe944dbf815fbd4b26a526cefae4b
-
Filesize
1KB
MD5e5090571e57a6da1fee23cfc6acea3d2
SHA10d37fb8e4183540a709531a6b20d32c427666e65
SHA25679677ea0299fafac523470af23f15cbf4a94b12eeb66923451703f9349841c13
SHA51212090516fa3abd87c20f201d1d8b3c14a773a9add858e316565fd3e36af8e939b6a79ce9a69c845c4cb6e17a294f96bdfdf9a7aaf3d8a8b252b10e8bdccf36ea
-
Filesize
6KB
MD50807e3b32969f182c2c487d1add05fff
SHA1d96ad63c9ec55b1ddfccbc3739dc18f9ee32831d
SHA2566b09fbbb878f58db36402d62102821924f642443af947f27e39828dded7699c2
SHA512e5500a1abb1484b7bd533f405a2cfdfb695801eba36b936b2f6d127d396156ce60dd045acccc2d5ab517c777459e3df4894a232c8c3f9910ffcd8c6b1c53944e
-
Filesize
6KB
MD51830799f6b9aa3aea20e200bc812a71c
SHA1459f450c44b95ef463881231045cedc854ea3ac3
SHA2564efc0110204ac252a1a52b1f911858b43428cd543d230a68dc4ada84e5ab599e
SHA512a8f58c085f5e23ad009421a25a9272c21a7cfbf7880ae5df006c9ee904b227e63f38ebd0852e3d09b57b855b23f238314fbbdfeb1097a81551cb849b9a5e2d1e
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5a85a098adf6bffb7a31db39ce3ba3e5d
SHA1134f9d1472eff31d5f5f3a58cb3db42fcabbdb7c
SHA2566165d7630dec7fae95f0f1a7e58f2f7debd39737c946fefc1f9e0379a1431de5
SHA5127b90c59e2922b51d2e29d2718d538102f79bc235b5782d39db8d0737f9f995247e7c9d1d702018ecc391023b3d25aa675898040c291d4a6e3d87af317e890b5f