Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
10-08-2024 05:09
Static task
static1
Behavioral task
behavioral1
Sample
84e87c9d2b02aec090a1a84711d53f2f_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
84e87c9d2b02aec090a1a84711d53f2f_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
84e87c9d2b02aec090a1a84711d53f2f_JaffaCakes118.html
-
Size
57KB
-
MD5
84e87c9d2b02aec090a1a84711d53f2f
-
SHA1
2a86ab66a1a3664127020f06dfdf84f399f1931a
-
SHA256
925bce8dd646f6ad44d2f210d105357eabbadffb4a0b99490faccd2898091852
-
SHA512
23399b51072801e08adc7bceb0bceeec93f695a01645d0135313dc741eca4a7313fe12a1bda5ea7f2c0c2b77bd9905613027429fb900eda961635599ba7d864e
-
SSDEEP
1536:gQZBCCOdh0IxCDr3hFt1PofBNHmJJlDScVFyuPJya9s18iRgcRD3metiGUWa04UU:gk2z0IxohFzPofBNHmJJlDScVFyuPJyc
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1988 msedge.exe 1988 msedge.exe 3088 msedge.exe 3088 msedge.exe 1068 identity_helper.exe 1068 identity_helper.exe 5992 msedge.exe 5992 msedge.exe 5992 msedge.exe 5992 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe 3088 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3088 wrote to memory of 5100 3088 msedge.exe 84 PID 3088 wrote to memory of 5100 3088 msedge.exe 84 PID 3088 wrote to memory of 3500 3088 msedge.exe 85 PID 3088 wrote to memory of 3500 3088 msedge.exe 85 PID 3088 wrote to memory of 3500 3088 msedge.exe 85 PID 3088 wrote to memory of 3500 3088 msedge.exe 85 PID 3088 wrote to memory of 3500 3088 msedge.exe 85 PID 3088 wrote to memory of 3500 3088 msedge.exe 85 PID 3088 wrote to memory of 3500 3088 msedge.exe 85 PID 3088 wrote to memory of 3500 3088 msedge.exe 85 PID 3088 wrote to memory of 3500 3088 msedge.exe 85 PID 3088 wrote to memory of 3500 3088 msedge.exe 85 PID 3088 wrote to memory of 3500 3088 msedge.exe 85 PID 3088 wrote to memory of 3500 3088 msedge.exe 85 PID 3088 wrote to memory of 3500 3088 msedge.exe 85 PID 3088 wrote to memory of 3500 3088 msedge.exe 85 PID 3088 wrote to memory of 3500 3088 msedge.exe 85 PID 3088 wrote to memory of 3500 3088 msedge.exe 85 PID 3088 wrote to memory of 3500 3088 msedge.exe 85 PID 3088 wrote to memory of 3500 3088 msedge.exe 85 PID 3088 wrote to memory of 3500 3088 msedge.exe 85 PID 3088 wrote to memory of 3500 3088 msedge.exe 85 PID 3088 wrote to memory of 3500 3088 msedge.exe 85 PID 3088 wrote to memory of 3500 3088 msedge.exe 85 PID 3088 wrote to memory of 3500 3088 msedge.exe 85 PID 3088 wrote to memory of 3500 3088 msedge.exe 85 PID 3088 wrote to memory of 3500 3088 msedge.exe 85 PID 3088 wrote to memory of 3500 3088 msedge.exe 85 PID 3088 wrote to memory of 3500 3088 msedge.exe 85 PID 3088 wrote to memory of 3500 3088 msedge.exe 85 PID 3088 wrote to memory of 3500 3088 msedge.exe 85 PID 3088 wrote to memory of 3500 3088 msedge.exe 85 PID 3088 wrote to memory of 3500 3088 msedge.exe 85 PID 3088 wrote to memory of 3500 3088 msedge.exe 85 PID 3088 wrote to memory of 3500 3088 msedge.exe 85 PID 3088 wrote to memory of 3500 3088 msedge.exe 85 PID 3088 wrote to memory of 3500 3088 msedge.exe 85 PID 3088 wrote to memory of 3500 3088 msedge.exe 85 PID 3088 wrote to memory of 3500 3088 msedge.exe 85 PID 3088 wrote to memory of 3500 3088 msedge.exe 85 PID 3088 wrote to memory of 3500 3088 msedge.exe 85 PID 3088 wrote to memory of 3500 3088 msedge.exe 85 PID 3088 wrote to memory of 1988 3088 msedge.exe 86 PID 3088 wrote to memory of 1988 3088 msedge.exe 86 PID 3088 wrote to memory of 400 3088 msedge.exe 87 PID 3088 wrote to memory of 400 3088 msedge.exe 87 PID 3088 wrote to memory of 400 3088 msedge.exe 87 PID 3088 wrote to memory of 400 3088 msedge.exe 87 PID 3088 wrote to memory of 400 3088 msedge.exe 87 PID 3088 wrote to memory of 400 3088 msedge.exe 87 PID 3088 wrote to memory of 400 3088 msedge.exe 87 PID 3088 wrote to memory of 400 3088 msedge.exe 87 PID 3088 wrote to memory of 400 3088 msedge.exe 87 PID 3088 wrote to memory of 400 3088 msedge.exe 87 PID 3088 wrote to memory of 400 3088 msedge.exe 87 PID 3088 wrote to memory of 400 3088 msedge.exe 87 PID 3088 wrote to memory of 400 3088 msedge.exe 87 PID 3088 wrote to memory of 400 3088 msedge.exe 87 PID 3088 wrote to memory of 400 3088 msedge.exe 87 PID 3088 wrote to memory of 400 3088 msedge.exe 87 PID 3088 wrote to memory of 400 3088 msedge.exe 87 PID 3088 wrote to memory of 400 3088 msedge.exe 87 PID 3088 wrote to memory of 400 3088 msedge.exe 87 PID 3088 wrote to memory of 400 3088 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\84e87c9d2b02aec090a1a84711d53f2f_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3088 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb02cf46f8,0x7ffb02cf4708,0x7ffb02cf47182⤵PID:5100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,2376543839443157953,4415893540920133319,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:22⤵PID:3500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,2376543839443157953,4415893540920133319,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2204 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,2376543839443157953,4415893540920133319,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2956 /prefetch:82⤵PID:400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,2376543839443157953,4415893540920133319,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:1616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,2376543839443157953,4415893540920133319,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:3996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,2376543839443157953,4415893540920133319,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4704 /prefetch:12⤵PID:5084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,2376543839443157953,4415893540920133319,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5288 /prefetch:12⤵PID:3384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,2376543839443157953,4415893540920133319,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5632 /prefetch:12⤵PID:5068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,2376543839443157953,4415893540920133319,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6292 /prefetch:82⤵PID:4236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,2376543839443157953,4415893540920133319,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6292 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,2376543839443157953,4415893540920133319,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5568 /prefetch:12⤵PID:1192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,2376543839443157953,4415893540920133319,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4036 /prefetch:12⤵PID:3212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,2376543839443157953,4415893540920133319,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5532 /prefetch:12⤵PID:2024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,2376543839443157953,4415893540920133319,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5536 /prefetch:12⤵PID:5032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,2376543839443157953,4415893540920133319,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1136 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5992
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4996
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2264
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD553bc70ecb115bdbabe67620c416fe9b3
SHA1af66ec51a13a59639eaf54d62ff3b4f092bb2fc1
SHA256b36cad5c1f7bc7d07c7eaa2f3cad2959ddb5447d4d3adcb46eb6a99808e22771
SHA512cad44933b94e17908c0eb8ac5feeb53d03a7720d97e7ccc8724a1ed3021a5bece09e1f9f3cec56ce0739176ebbbeb20729e650f8bca04e5060c986b75d8e4921
-
Filesize
152B
MD5e765f3d75e6b0e4a7119c8b14d47d8da
SHA1cc9f7c7826c2e1a129e7d98884926076c3714fc0
SHA256986443556d3878258b710d9d9efbf4f25f0d764c3f83dc54217f2b12a6eccd89
SHA512a1872a849f27da78ebe9adb9beb260cb49ed5f4ca2d403f23379112bdfcd2482446a6708188100496e45db1517cdb43aba8bb93a75e605713c3f97cd716b1079
-
Filesize
210KB
MD548d2860dd3168b6f06a4f27c6791bcaa
SHA1f5f803efed91cd45a36c3d6acdffaaf0e863bf8c
SHA25604d7bf7a6586ef00516bdb3f7b96c65e0b9c6b940f4b145121ed00f6116bbb77
SHA512172da615b5b97a0c17f80ddd8d7406e278cd26afd1eb45a052cde0cb55b92febe49773b1e02cf9e9adca2f34abbaa6d7b83eaad4e08c828ef4bf26f23b95584e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize504B
MD53e8b1ed5b802c7ef6005a18b4a8e9d90
SHA1a47a44b33ec9cc845cbef9a049342e4f3ff535c4
SHA2564df919236f5bf6c9dfb7071a0ff5c58739d7e27d9e103a7846bae644729c7067
SHA512feced4b1d9071416ce890d54cf1661d105b4a3e30d9bbf86d5a91c10c58d856877357c8b34986cec4ee85a2c904cf9b73bcb4dc8fbed58c02f61bfad1ffa07a6
-
Filesize
1KB
MD5932ed7c7f9d4481a90727d99ccc48e12
SHA1f9baf48adb8acf397b7170047a26fe708ce884dd
SHA256c9cb54cc32df0680bdad63d8395c035debca069ae64578f7bebd4bf479374535
SHA512b9d5de479ba8fcdb4e9f9a4f49bff6118b4ce77f783a2e57268e456d40ea47c5f2458f660de743bae726668fde383e37876525438afde45e62c6533ccf9c9992
-
Filesize
6KB
MD5568682ac2507f4011ea5ad88601ab358
SHA141ca4ee782182c283fb0b05ad4588640a9ae729b
SHA256056d3cea36340285c68303a0ced05c8282124a38405baa3b8dad554625f721e9
SHA5123cab3d02254470d501d40dcf32a737706b7cf47ce893731e6f7ec19d536d939e91fbc2e7f3731cf7024d06b223233e2c06e0280cc6484d80f648f245cc75de37
-
Filesize
6KB
MD5fb65bbf021bbf5323c8d73bb81c36c06
SHA1c0eccb8ad2038c41f80b077872d7129d429f94bb
SHA2568f1699068917de14773acd2ad4332891267b38b439b6f083b21ca59945a8f976
SHA512625eb749c830c72e7196a87cf6c6c2724d55bc9a8bb92b0c44962001926b499baf64a5d4783e722d9052b09250af34fcfd46f1ada14afcf1066e79a7324835dd
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD54b553c384fba271e7eb58df172144cfe
SHA11763be3e6cc610858a738075070e578fae717222
SHA256c6ccb09f53a411a5a1778d51c648f64570e025609ec886b27adbb8d2c6931624
SHA512294adb01386c8ac8822dddb1fe84c2b5069bff24f743e5681874254b82a1b239b713fffe9ba46d58a0cc32a4e1513f6f20387a4ad15ddcc3383a92a67da255d8