Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11-08-2024 00:30
Static task
static1
Behavioral task
behavioral1
Sample
884b3f6c534488744fc428876ddad37c_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
884b3f6c534488744fc428876ddad37c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
884b3f6c534488744fc428876ddad37c_JaffaCakes118.html
-
Size
48KB
-
MD5
884b3f6c534488744fc428876ddad37c
-
SHA1
f538ba335804cb6e33d76b8f0892e277d5abc735
-
SHA256
7413e3f4b3367e862b73de2a3d85c1b81417f949956b829f0bc3d9c8d6bfd4b5
-
SHA512
999bc955159e7f4fb06f6b080f6c53cea500597a80ef002073c0e61a9df76bf3133703fef1b196164355de87af90c1851f317b862e44529c5540b7c0dcf86552
-
SSDEEP
768:Y3PgOriWNcaSoBgGjThOQOeigFsluKvm94LE+Nz7gFNxg2S8eKA:Y3QaNThoe5Fs0h7iz7gFNx8
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4556 msedge.exe 4556 msedge.exe 4984 msedge.exe 4984 msedge.exe 2932 identity_helper.exe 2932 identity_helper.exe 2132 msedge.exe 2132 msedge.exe 2132 msedge.exe 2132 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4984 wrote to memory of 3004 4984 msedge.exe 88 PID 4984 wrote to memory of 3004 4984 msedge.exe 88 PID 4984 wrote to memory of 2748 4984 msedge.exe 89 PID 4984 wrote to memory of 2748 4984 msedge.exe 89 PID 4984 wrote to memory of 2748 4984 msedge.exe 89 PID 4984 wrote to memory of 2748 4984 msedge.exe 89 PID 4984 wrote to memory of 2748 4984 msedge.exe 89 PID 4984 wrote to memory of 2748 4984 msedge.exe 89 PID 4984 wrote to memory of 2748 4984 msedge.exe 89 PID 4984 wrote to memory of 2748 4984 msedge.exe 89 PID 4984 wrote to memory of 2748 4984 msedge.exe 89 PID 4984 wrote to memory of 2748 4984 msedge.exe 89 PID 4984 wrote to memory of 2748 4984 msedge.exe 89 PID 4984 wrote to memory of 2748 4984 msedge.exe 89 PID 4984 wrote to memory of 2748 4984 msedge.exe 89 PID 4984 wrote to memory of 2748 4984 msedge.exe 89 PID 4984 wrote to memory of 2748 4984 msedge.exe 89 PID 4984 wrote to memory of 2748 4984 msedge.exe 89 PID 4984 wrote to memory of 2748 4984 msedge.exe 89 PID 4984 wrote to memory of 2748 4984 msedge.exe 89 PID 4984 wrote to memory of 2748 4984 msedge.exe 89 PID 4984 wrote to memory of 2748 4984 msedge.exe 89 PID 4984 wrote to memory of 2748 4984 msedge.exe 89 PID 4984 wrote to memory of 2748 4984 msedge.exe 89 PID 4984 wrote to memory of 2748 4984 msedge.exe 89 PID 4984 wrote to memory of 2748 4984 msedge.exe 89 PID 4984 wrote to memory of 2748 4984 msedge.exe 89 PID 4984 wrote to memory of 2748 4984 msedge.exe 89 PID 4984 wrote to memory of 2748 4984 msedge.exe 89 PID 4984 wrote to memory of 2748 4984 msedge.exe 89 PID 4984 wrote to memory of 2748 4984 msedge.exe 89 PID 4984 wrote to memory of 2748 4984 msedge.exe 89 PID 4984 wrote to memory of 2748 4984 msedge.exe 89 PID 4984 wrote to memory of 2748 4984 msedge.exe 89 PID 4984 wrote to memory of 2748 4984 msedge.exe 89 PID 4984 wrote to memory of 2748 4984 msedge.exe 89 PID 4984 wrote to memory of 2748 4984 msedge.exe 89 PID 4984 wrote to memory of 2748 4984 msedge.exe 89 PID 4984 wrote to memory of 2748 4984 msedge.exe 89 PID 4984 wrote to memory of 2748 4984 msedge.exe 89 PID 4984 wrote to memory of 2748 4984 msedge.exe 89 PID 4984 wrote to memory of 2748 4984 msedge.exe 89 PID 4984 wrote to memory of 4556 4984 msedge.exe 90 PID 4984 wrote to memory of 4556 4984 msedge.exe 90 PID 4984 wrote to memory of 2192 4984 msedge.exe 91 PID 4984 wrote to memory of 2192 4984 msedge.exe 91 PID 4984 wrote to memory of 2192 4984 msedge.exe 91 PID 4984 wrote to memory of 2192 4984 msedge.exe 91 PID 4984 wrote to memory of 2192 4984 msedge.exe 91 PID 4984 wrote to memory of 2192 4984 msedge.exe 91 PID 4984 wrote to memory of 2192 4984 msedge.exe 91 PID 4984 wrote to memory of 2192 4984 msedge.exe 91 PID 4984 wrote to memory of 2192 4984 msedge.exe 91 PID 4984 wrote to memory of 2192 4984 msedge.exe 91 PID 4984 wrote to memory of 2192 4984 msedge.exe 91 PID 4984 wrote to memory of 2192 4984 msedge.exe 91 PID 4984 wrote to memory of 2192 4984 msedge.exe 91 PID 4984 wrote to memory of 2192 4984 msedge.exe 91 PID 4984 wrote to memory of 2192 4984 msedge.exe 91 PID 4984 wrote to memory of 2192 4984 msedge.exe 91 PID 4984 wrote to memory of 2192 4984 msedge.exe 91 PID 4984 wrote to memory of 2192 4984 msedge.exe 91 PID 4984 wrote to memory of 2192 4984 msedge.exe 91 PID 4984 wrote to memory of 2192 4984 msedge.exe 91
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\884b3f6c534488744fc428876ddad37c_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4984 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd101246f8,0x7ffd10124708,0x7ffd101247182⤵PID:3004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,14912938268611407975,2625441765476312444,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2084 /prefetch:22⤵PID:2748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2072,14912938268611407975,2625441765476312444,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2316 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2072,14912938268611407975,2625441765476312444,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2680 /prefetch:82⤵PID:2192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,14912938268611407975,2625441765476312444,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:4832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,14912938268611407975,2625441765476312444,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:12⤵PID:4496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,14912938268611407975,2625441765476312444,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4808 /prefetch:12⤵PID:3504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,14912938268611407975,2625441765476312444,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6084 /prefetch:82⤵PID:2584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,14912938268611407975,2625441765476312444,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6084 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,14912938268611407975,2625441765476312444,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5808 /prefetch:12⤵PID:1584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,14912938268611407975,2625441765476312444,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5836 /prefetch:12⤵PID:4760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,14912938268611407975,2625441765476312444,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4164 /prefetch:12⤵PID:3008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,14912938268611407975,2625441765476312444,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4796 /prefetch:12⤵PID:4332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,14912938268611407975,2625441765476312444,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5036 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2132
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2800
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1724
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e4f80e7950cbd3bb11257d2000cb885e
SHA110ac643904d539042d8f7aa4a312b13ec2106035
SHA2561184ee8d32d0edecddd93403fb888fad6b3e2a710d37335c3989cc529bc08124
SHA5122b92c9807fdcd937e514d4e7e1cc7c2d3e3aa162099b7289ceac2feea72d1a4afbadf1c09b3075d470efadf9a9edd63e07ea7e7a98d22243e45b3d53473fa4f0
-
Filesize
152B
MD52dc1a9f2f3f8c3cfe51bb29b078166c5
SHA1eaf3c3dad3c8dc6f18dc3e055b415da78b704402
SHA256dcb76fa365c2d9ee213b224a91cdd806d30b1e8652d72a22f2371124fa4479fa
SHA512682061d9cc86a6e5d99d022da776fb554350fc95efbf29cd84c1db4e2b7161b76cd1de48335bcc3a25633079fb0bd412e4f4795ed6291c65e9bc28d95330bb25
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD5a840b64dd5187e8c02aed27bd0c42aae
SHA1ba749563533c8316d39b20a2f7951306421ec856
SHA2568f876046c64af5d8bb41d7f6b85a0a7e6fc6d0f805841b8b7b0d36598a030217
SHA512604ab7e6d26b55f3457d42aa086caff1ae5c3e753a8818708e9e4c99c8ed167aa645d54c444a51b5fa90595b610f7a5a6f2ec98bbd193bec6745684fc6c68bb3
-
Filesize
852B
MD5b77f30009262df9107f7241e7e12c514
SHA144b76a78aaa605b3479eb50eb56c67aa13ba8501
SHA256f157633d9eb0bb211cac99026d7831768cd864001ae2d38745d57ebec0c2b760
SHA51209628f06cf2636f94b8cfbc7a79ac8066ce0f9fb7a7df621f1892a1cd81fe2ea6cff9a77d392865dc24c33b52e3890c9b8fa12184b091241fab183730182efd4
-
Filesize
6KB
MD50fe1fb22a394100e3680d59b87eb01c2
SHA1816d20cf8633e3bfa2d85f3ebee8cf92b600c051
SHA256ebd6e9b5d005e7f267a0f67bd0240850366459c5c1fa44ae6ed762c5130c6143
SHA512a673006f059ecf85f909e78b03f9d1a3b328af29d3f3f035fff21281f321ec5efa3e8a38845cf60e4bd76186c6099dbaa8a50dd9ffba6c1f63f48157417832e4
-
Filesize
6KB
MD51350c8ec07f87509c5564a250790a819
SHA19e43fba1daf405287e73361861dce7dbdf65a5ee
SHA25669f903d4347ca0f7de4637155ea3c0249530ff661200f817849b0970a6e16199
SHA512a8606c96cc362e496f3f95780fc8ec049409edd43af7d760fce79f1d44fa8b30341d3ff024cdd6dedd3e0d73b23bc7aff29beef8c35b80f4c5a496ea644fd69e
-
Filesize
6KB
MD552a9e4cad332161e1d333b6c75dcfe5e
SHA1223ff8bc6bcdfb68a71b94208267a5231bb90a0e
SHA256f49d4ee1ce19bf32484bb36dc54ca4be41c4282c473c23f8d667907648c0ec1a
SHA5121f9de17efd22282f79462e8a33d1b93f740e35f83e32e9f4f13d707b45fce88c318cc0c4af550ccf9e74112aa38cf65adbb8b37af2894c562490673a1f2e3d04
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5d346e1991d4686e34423dfc48a3f1961
SHA12696ff6e1f78a5b85e9f3bf83f2a0d8a8d22cb64
SHA25642218dcee248f8320dd3c0956e34d59764b18df7791d5853288cff0530c9b455
SHA5124decb16de3b83aebdc470549104c1f441c0b80aecca498f3555d0e60fc86b1b975cd3b0cc43139235b8ed276ffa49a4f3db5d3c730b740affefb60d29c8dd587