Analysis
-
max time kernel
145s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
10-08-2024 17:45
Static task
static1
Behavioral task
behavioral1
Sample
87087bd496eb374aa31f3dfd4d6d7de1_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
87087bd496eb374aa31f3dfd4d6d7de1_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
87087bd496eb374aa31f3dfd4d6d7de1_JaffaCakes118.html
-
Size
71KB
-
MD5
87087bd496eb374aa31f3dfd4d6d7de1
-
SHA1
cb62362da82871bf083b73fca602e7949c49104e
-
SHA256
b4d9ae91ca5061b1b0e715a187b72259e281b28f62d0b5062d71d47994aabcba
-
SHA512
b78c4eaa1bce422d93b2d3fc70b2b309c42076ecf3570e34357e7507439bf6e2ab64c13156538b21e4e9a1f17b57a05d27d932efce5fe3670c13b203b40e78b7
-
SSDEEP
1536:qZyPAFBWnhpjJOXOrShEdqFKJfggjt2eVUDDkw354YLNwqNa:qZEAinhpjJbIEdqafggK354YLNwqNa
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4336 msedge.exe 4336 msedge.exe 1864 msedge.exe 1864 msedge.exe 2936 identity_helper.exe 2936 identity_helper.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe 1864 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1864 wrote to memory of 3156 1864 msedge.exe 84 PID 1864 wrote to memory of 3156 1864 msedge.exe 84 PID 1864 wrote to memory of 2020 1864 msedge.exe 85 PID 1864 wrote to memory of 2020 1864 msedge.exe 85 PID 1864 wrote to memory of 2020 1864 msedge.exe 85 PID 1864 wrote to memory of 2020 1864 msedge.exe 85 PID 1864 wrote to memory of 2020 1864 msedge.exe 85 PID 1864 wrote to memory of 2020 1864 msedge.exe 85 PID 1864 wrote to memory of 2020 1864 msedge.exe 85 PID 1864 wrote to memory of 2020 1864 msedge.exe 85 PID 1864 wrote to memory of 2020 1864 msedge.exe 85 PID 1864 wrote to memory of 2020 1864 msedge.exe 85 PID 1864 wrote to memory of 2020 1864 msedge.exe 85 PID 1864 wrote to memory of 2020 1864 msedge.exe 85 PID 1864 wrote to memory of 2020 1864 msedge.exe 85 PID 1864 wrote to memory of 2020 1864 msedge.exe 85 PID 1864 wrote to memory of 2020 1864 msedge.exe 85 PID 1864 wrote to memory of 2020 1864 msedge.exe 85 PID 1864 wrote to memory of 2020 1864 msedge.exe 85 PID 1864 wrote to memory of 2020 1864 msedge.exe 85 PID 1864 wrote to memory of 2020 1864 msedge.exe 85 PID 1864 wrote to memory of 2020 1864 msedge.exe 85 PID 1864 wrote to memory of 2020 1864 msedge.exe 85 PID 1864 wrote to memory of 2020 1864 msedge.exe 85 PID 1864 wrote to memory of 2020 1864 msedge.exe 85 PID 1864 wrote to memory of 2020 1864 msedge.exe 85 PID 1864 wrote to memory of 2020 1864 msedge.exe 85 PID 1864 wrote to memory of 2020 1864 msedge.exe 85 PID 1864 wrote to memory of 2020 1864 msedge.exe 85 PID 1864 wrote to memory of 2020 1864 msedge.exe 85 PID 1864 wrote to memory of 2020 1864 msedge.exe 85 PID 1864 wrote to memory of 2020 1864 msedge.exe 85 PID 1864 wrote to memory of 2020 1864 msedge.exe 85 PID 1864 wrote to memory of 2020 1864 msedge.exe 85 PID 1864 wrote to memory of 2020 1864 msedge.exe 85 PID 1864 wrote to memory of 2020 1864 msedge.exe 85 PID 1864 wrote to memory of 2020 1864 msedge.exe 85 PID 1864 wrote to memory of 2020 1864 msedge.exe 85 PID 1864 wrote to memory of 2020 1864 msedge.exe 85 PID 1864 wrote to memory of 2020 1864 msedge.exe 85 PID 1864 wrote to memory of 2020 1864 msedge.exe 85 PID 1864 wrote to memory of 2020 1864 msedge.exe 85 PID 1864 wrote to memory of 4336 1864 msedge.exe 86 PID 1864 wrote to memory of 4336 1864 msedge.exe 86 PID 1864 wrote to memory of 1148 1864 msedge.exe 87 PID 1864 wrote to memory of 1148 1864 msedge.exe 87 PID 1864 wrote to memory of 1148 1864 msedge.exe 87 PID 1864 wrote to memory of 1148 1864 msedge.exe 87 PID 1864 wrote to memory of 1148 1864 msedge.exe 87 PID 1864 wrote to memory of 1148 1864 msedge.exe 87 PID 1864 wrote to memory of 1148 1864 msedge.exe 87 PID 1864 wrote to memory of 1148 1864 msedge.exe 87 PID 1864 wrote to memory of 1148 1864 msedge.exe 87 PID 1864 wrote to memory of 1148 1864 msedge.exe 87 PID 1864 wrote to memory of 1148 1864 msedge.exe 87 PID 1864 wrote to memory of 1148 1864 msedge.exe 87 PID 1864 wrote to memory of 1148 1864 msedge.exe 87 PID 1864 wrote to memory of 1148 1864 msedge.exe 87 PID 1864 wrote to memory of 1148 1864 msedge.exe 87 PID 1864 wrote to memory of 1148 1864 msedge.exe 87 PID 1864 wrote to memory of 1148 1864 msedge.exe 87 PID 1864 wrote to memory of 1148 1864 msedge.exe 87 PID 1864 wrote to memory of 1148 1864 msedge.exe 87 PID 1864 wrote to memory of 1148 1864 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\87087bd496eb374aa31f3dfd4d6d7de1_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1864 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffdcd646f8,0x7fffdcd64708,0x7fffdcd647182⤵PID:3156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,3076720036654045919,10509277363497801009,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2080 /prefetch:22⤵PID:2020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2068,3076720036654045919,10509277363497801009,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2068,3076720036654045919,10509277363497801009,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2736 /prefetch:82⤵PID:1148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,3076720036654045919,10509277363497801009,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:1100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,3076720036654045919,10509277363497801009,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:1884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,3076720036654045919,10509277363497801009,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4752 /prefetch:12⤵PID:4132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,3076720036654045919,10509277363497801009,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5528 /prefetch:82⤵PID:3508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,3076720036654045919,10509277363497801009,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5528 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,3076720036654045919,10509277363497801009,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5408 /prefetch:12⤵PID:3664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,3076720036654045919,10509277363497801009,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5216 /prefetch:12⤵PID:4060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,3076720036654045919,10509277363497801009,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5256 /prefetch:12⤵PID:3136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,3076720036654045919,10509277363497801009,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5320 /prefetch:12⤵PID:4264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,3076720036654045919,10509277363497801009,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5560 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1788
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:244
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4476
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5eeaa8087eba2f63f31e599f6a7b46ef4
SHA1f639519deee0766a39cfe258d2ac48e3a9d5ac03
SHA25650fe80c9435f601c30517d10f6a8a0ca6ff8ca2add7584df377371b5a5dbe2d9
SHA512eaabfad92c84f422267615c55a863af12823c5e791bdcb30cabe17f72025e07df7383cf6cf0f08e28aa18a31c2aac5985cf5281a403e22fbcc1fb5e61c49fc3c
-
Filesize
152B
MD5b9569e123772ae290f9bac07e0d31748
SHA15806ed9b301d4178a959b26d7b7ccf2c0abc6741
SHA25620ab88e23fb88186b82047cd0d6dc3cfa23422e4fd2b8f3c8437546a2a842c2b
SHA512cfad8ce716ac815b37e8cc0e30141bfb3ca7f0d4ef101289bddcf6ed3c579bc34d369f2ec2f2dab98707843015633988eb97f1e911728031dd897750b8587795
-
Filesize
21KB
MD5c3a1bf5fbff5530f55ad9f9fa464f25c
SHA1449a621b775cbe1d3ab69c54a0e18c0ccf6d6caa
SHA2564ea6b3a39d794db93d1084770cc340272f8e5ffd5cd8d0c05c1f5841e5dc13e0
SHA51275aa617b33be2eabe9f67166d14939d58abdb2396b9911dc7ba612130d2ba9adfc90a3cc9b6de4dd6cf8731c90f2ca74b7f9cfaf4a9d0bcbf90d03c907e45a54
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD569419ffec2e4652317272ccbc571f5c2
SHA123e6347b74ecba2948ee580b1c7ac7c5f580beaf
SHA256a5677f24f07e642d57e50255da80dbdfbfb9dffc858113efa54f9cfd1d3e26c4
SHA512e69371e9ddc6f1541d1f7839b40725e9804f9b17cd7f16d2e5d940c354d018159a03ec58b60171e7b13effbad7cee53da980b8ff928a8c5aa9c70b942ba5136e
-
Filesize
1KB
MD5d2f890d68eb6cca386ab0b6772bc35fb
SHA155d760e645b1ff074bae1cabf3661805a3a6566a
SHA2562b45b472400c7317ad14103c04104e3bf5d5bb2facaceca1872b055c2c70e9ee
SHA51225f52b4f68edec66dc7f55eea50c2417046fbcbd987bb8dd641d08c9be271d9a4a9953327d56d0cea01c520256485d02530f84bf0df48759b8e07123f71ba7a3
-
Filesize
6KB
MD537e8cddc275c0f949e154dd7e23b4645
SHA11dd710e739d0ccffc688e7c4a269f62d53791019
SHA2566b228a1987ec720f370865405728796ab734185850f10b9309256bc9efb141b8
SHA51297bcecbf34e1759b486464a2c73fbacf969419f1988184882fb84d58f1fcae68cdd44c73c0145765a67044174a27459a82f1cf503c2b2918ef95eac68622e067
-
Filesize
7KB
MD582715422baeef4cfef50143507c41a77
SHA131755fb2147edc69f005ef10e5dea61fa5b59382
SHA256673528bd37ced838132738ae62204a817c6d027852fab2b4de555fb9d0b0943c
SHA512a4eed38636da37a9b9728c95ae4f5f476ba23960506b50be73581b6b175640cb117202249b4871690d4df17fb2e8fc93df1e65253106674a8ee7598fee551b32
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\b019845a-4acd-4cc6-a14a-9ecbd712dba0.tmp
Filesize7KB
MD56021ebab1763ca67544f4280aeb35291
SHA1df88f77c704cb5c537f60dc1d812bbe7e9325b34
SHA256361087a3df850649e18e42f491282d20977c6a2cb843da11d8d723cf014acf9c
SHA5123aabdaa03430094770299100c4d3cb3fd8b553c2362a9dc441cc3e8a6a15f9c382f5848700f163856ddfba23a82139ec4f77b6961a4a3287e8169ff7d8649f30
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5027901107fd1d435f8cb43dea98a3ffc
SHA1048d3ddc8c9ebcb2186b6cfb5e5dbdbe4f527cae
SHA2568886f5033fb379706d1a26f549db13e7d246baf053ef717e6b4d8ffb57c64be8
SHA5127a6127a80be108c67c489462e694cbc98cf4508a5731e68dd422cb4dfbe5c1ad849d7be70e8e23ef532d162b7187bb9171207345ac161a53fd164ff54c20c369