Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
02/08/2024, 00:29
Static task
static1
Behavioral task
behavioral1
Sample
8255fdf15af2223de8c755d2f28a0a1a_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
8255fdf15af2223de8c755d2f28a0a1a_JaffaCakes118.html
Resource
win10v2004-20240730-en
General
-
Target
8255fdf15af2223de8c755d2f28a0a1a_JaffaCakes118.html
-
Size
10KB
-
MD5
8255fdf15af2223de8c755d2f28a0a1a
-
SHA1
8cb86b4f7afdf5c94becb2581522cbedc0058b72
-
SHA256
5b6dd63dd1140f43888bac7476c95aec441e6464f66d5e43f65a91d665e42f9c
-
SHA512
0527186639460c16ea3d19d52da579c0f694cf2bb7cec9cc335bcd999d01d9a037d7c14e3dc0326c08c6d7e74d2e8e97c01cc735db5745d895333fbc5bc41692
-
SSDEEP
192:2VrlIsr037I8k/w1whqJk1OBm9nL+CKXg01y5uBuLbdU8d:srlIcu7o/g6OBm9nL+CKXg0y5guLZ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4688 msedge.exe 4688 msedge.exe 5036 msedge.exe 5036 msedge.exe 2532 identity_helper.exe 2532 identity_helper.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe 5036 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5036 wrote to memory of 3036 5036 msedge.exe 82 PID 5036 wrote to memory of 3036 5036 msedge.exe 82 PID 5036 wrote to memory of 3496 5036 msedge.exe 83 PID 5036 wrote to memory of 3496 5036 msedge.exe 83 PID 5036 wrote to memory of 3496 5036 msedge.exe 83 PID 5036 wrote to memory of 3496 5036 msedge.exe 83 PID 5036 wrote to memory of 3496 5036 msedge.exe 83 PID 5036 wrote to memory of 3496 5036 msedge.exe 83 PID 5036 wrote to memory of 3496 5036 msedge.exe 83 PID 5036 wrote to memory of 3496 5036 msedge.exe 83 PID 5036 wrote to memory of 3496 5036 msedge.exe 83 PID 5036 wrote to memory of 3496 5036 msedge.exe 83 PID 5036 wrote to memory of 3496 5036 msedge.exe 83 PID 5036 wrote to memory of 3496 5036 msedge.exe 83 PID 5036 wrote to memory of 3496 5036 msedge.exe 83 PID 5036 wrote to memory of 3496 5036 msedge.exe 83 PID 5036 wrote to memory of 3496 5036 msedge.exe 83 PID 5036 wrote to memory of 3496 5036 msedge.exe 83 PID 5036 wrote to memory of 3496 5036 msedge.exe 83 PID 5036 wrote to memory of 3496 5036 msedge.exe 83 PID 5036 wrote to memory of 3496 5036 msedge.exe 83 PID 5036 wrote to memory of 3496 5036 msedge.exe 83 PID 5036 wrote to memory of 3496 5036 msedge.exe 83 PID 5036 wrote to memory of 3496 5036 msedge.exe 83 PID 5036 wrote to memory of 3496 5036 msedge.exe 83 PID 5036 wrote to memory of 3496 5036 msedge.exe 83 PID 5036 wrote to memory of 3496 5036 msedge.exe 83 PID 5036 wrote to memory of 3496 5036 msedge.exe 83 PID 5036 wrote to memory of 3496 5036 msedge.exe 83 PID 5036 wrote to memory of 3496 5036 msedge.exe 83 PID 5036 wrote to memory of 3496 5036 msedge.exe 83 PID 5036 wrote to memory of 3496 5036 msedge.exe 83 PID 5036 wrote to memory of 3496 5036 msedge.exe 83 PID 5036 wrote to memory of 3496 5036 msedge.exe 83 PID 5036 wrote to memory of 3496 5036 msedge.exe 83 PID 5036 wrote to memory of 3496 5036 msedge.exe 83 PID 5036 wrote to memory of 3496 5036 msedge.exe 83 PID 5036 wrote to memory of 3496 5036 msedge.exe 83 PID 5036 wrote to memory of 3496 5036 msedge.exe 83 PID 5036 wrote to memory of 3496 5036 msedge.exe 83 PID 5036 wrote to memory of 3496 5036 msedge.exe 83 PID 5036 wrote to memory of 3496 5036 msedge.exe 83 PID 5036 wrote to memory of 4688 5036 msedge.exe 84 PID 5036 wrote to memory of 4688 5036 msedge.exe 84 PID 5036 wrote to memory of 2216 5036 msedge.exe 85 PID 5036 wrote to memory of 2216 5036 msedge.exe 85 PID 5036 wrote to memory of 2216 5036 msedge.exe 85 PID 5036 wrote to memory of 2216 5036 msedge.exe 85 PID 5036 wrote to memory of 2216 5036 msedge.exe 85 PID 5036 wrote to memory of 2216 5036 msedge.exe 85 PID 5036 wrote to memory of 2216 5036 msedge.exe 85 PID 5036 wrote to memory of 2216 5036 msedge.exe 85 PID 5036 wrote to memory of 2216 5036 msedge.exe 85 PID 5036 wrote to memory of 2216 5036 msedge.exe 85 PID 5036 wrote to memory of 2216 5036 msedge.exe 85 PID 5036 wrote to memory of 2216 5036 msedge.exe 85 PID 5036 wrote to memory of 2216 5036 msedge.exe 85 PID 5036 wrote to memory of 2216 5036 msedge.exe 85 PID 5036 wrote to memory of 2216 5036 msedge.exe 85 PID 5036 wrote to memory of 2216 5036 msedge.exe 85 PID 5036 wrote to memory of 2216 5036 msedge.exe 85 PID 5036 wrote to memory of 2216 5036 msedge.exe 85 PID 5036 wrote to memory of 2216 5036 msedge.exe 85 PID 5036 wrote to memory of 2216 5036 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\8255fdf15af2223de8c755d2f28a0a1a_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5036 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffddedd46f8,0x7ffddedd4708,0x7ffddedd47182⤵PID:3036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,4799727891117942221,7447673082150857629,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2100 /prefetch:22⤵PID:3496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2068,4799727891117942221,7447673082150857629,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2420 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2068,4799727891117942221,7447673082150857629,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2812 /prefetch:82⤵PID:2216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,4799727891117942221,7447673082150857629,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:3320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,4799727891117942221,7447673082150857629,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:3180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,4799727891117942221,7447673082150857629,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4696 /prefetch:12⤵PID:2596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,4799727891117942221,7447673082150857629,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5564 /prefetch:82⤵PID:3640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,4799727891117942221,7447673082150857629,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5564 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,4799727891117942221,7447673082150857629,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5436 /prefetch:12⤵PID:4404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,4799727891117942221,7447673082150857629,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5424 /prefetch:12⤵PID:4088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,4799727891117942221,7447673082150857629,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4148 /prefetch:12⤵PID:2728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,4799727891117942221,7447673082150857629,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5384 /prefetch:12⤵PID:4328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,4799727891117942221,7447673082150857629,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5020 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4928
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2708
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1544
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5336e632142966bb5b1555731fdae58b9
SHA1df21896206cb41e55caef4082b8d402435de5389
SHA256bf03fb88aee2f97c7757c4d05b84f3873ba82c16de2a537679f521bb42d2a3d8
SHA512f7cc58005811b16b1842307d473d379a0444269936ab2c0bbd58d827ad5383e0400e2a7e863f59215412a2f84924b1f8758b155b1b7eb83d045d1b6883c92173
-
Filesize
152B
MD5dd3fc896ff3b0d6ebf2ed72827fd3aa3
SHA18c8a9bcb355d3fddca81c5a0b7c85a094fbe9b5f
SHA2567d083e4431e3faf959c6c5f74d0319e5c7b199407b6a36c7adc980376e6da72e
SHA5125950639d09cd39676d2277efd11e4e21fcb6431cd67f7f2ba900def9d25fc4d56015ae2a0e32fa9f599e71f1ffd0f1b3981c57a30d73095915f975e783633619
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize168B
MD51106ece12c4f021fe0ee05d372fcc3d1
SHA129ff7a79b630e1709c567509fb59dc6c935f0459
SHA25618871d783963a2e81e32ca925c1844441ccd112322238a7b3c95baca94910b0e
SHA51215a745d9af9d210fe95e682e749f555fe0b9a17b8ff82706091bad93aac11e64f95e711d0ba784c4af71e079a85857bc83bebb9eff14b2316dc25791d643fa74
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
6KB
MD5d624622f6071f89fbd885a91014e9cea
SHA1065b7a3000fea0a612714c778716295b4749ac6e
SHA25636279e468bede44cc96a4cc6d1ce64f66c455b12e6b831d01d228a24c1c2c672
SHA5128f48b2b98bad9eb7dde2eed0da7f069f3fa61b9f348be70e8669eb765cdb2f8ca8e83f8d4b2470a1ecdb3f0c3c9223ca88caa8a78f5645126afb75be658da4c2
-
Filesize
6KB
MD5794008afe1633f5b45fedf883a40348b
SHA1f86d4e3e99e3f7236b345b7b08fb2d9870b92eb6
SHA256e38357f0f3c97432eca38803badfbb57384fc5349afb9116a95ae243da988151
SHA512b674fc0e3953862b96e8f626aa03460241e1a3828e00f0abdf1e13050a88f08dc70e292cf4c1c6277a7ebbbce8bf900ca7b4efb5f5272fd518138d130ad48c06
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD55eba1e9ea143e3cff80956dbdf2b4d80
SHA1d326e74e40eb734857461414a0412526ed905b95
SHA256be5b6beb958e7dd9e317fcbb799e3a5d307841394a408ee2577850bd25ff3fce
SHA512a7e63125db7198aa9ab5470fa017c52bda102a1ee1197c68a09f7402e11e4f462d2ad6589d3dea42b67f3929766d6156edb323f6d18a5d8736f355a91d33e1be