Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11/08/2024, 02:44
Static task
static1
Behavioral task
behavioral1
Sample
88ae70287592b0f28b76d03f78b05a2b_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
88ae70287592b0f28b76d03f78b05a2b_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
88ae70287592b0f28b76d03f78b05a2b_JaffaCakes118.html
-
Size
56KB
-
MD5
88ae70287592b0f28b76d03f78b05a2b
-
SHA1
1fa232c887de7bd8075dd4ea11f46bff67a17a17
-
SHA256
1cef8bdb7a02db4634a4cc9c868fbdb3b8ab1a818022a9668e8f50484074b66d
-
SHA512
ea13c04c212f98ea5d824ec4f1fefc90cc903ae239eabdf3216c97d3e742c0dafd2273f2caf988aa6679efe3e056a124b199d411147778afcf3ef038781c9c48
-
SSDEEP
768:Zcd9QZBC7mOdMgPpC5I9nC4j0obKVi/HUiPPd:gQZBCCOdr0IxCE1x/TPPd
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2548 msedge.exe 2548 msedge.exe 3328 msedge.exe 3328 msedge.exe 4488 identity_helper.exe 4488 identity_helper.exe 5804 msedge.exe 5804 msedge.exe 5804 msedge.exe 5804 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3328 wrote to memory of 3168 3328 msedge.exe 84 PID 3328 wrote to memory of 3168 3328 msedge.exe 84 PID 3328 wrote to memory of 1948 3328 msedge.exe 85 PID 3328 wrote to memory of 1948 3328 msedge.exe 85 PID 3328 wrote to memory of 1948 3328 msedge.exe 85 PID 3328 wrote to memory of 1948 3328 msedge.exe 85 PID 3328 wrote to memory of 1948 3328 msedge.exe 85 PID 3328 wrote to memory of 1948 3328 msedge.exe 85 PID 3328 wrote to memory of 1948 3328 msedge.exe 85 PID 3328 wrote to memory of 1948 3328 msedge.exe 85 PID 3328 wrote to memory of 1948 3328 msedge.exe 85 PID 3328 wrote to memory of 1948 3328 msedge.exe 85 PID 3328 wrote to memory of 1948 3328 msedge.exe 85 PID 3328 wrote to memory of 1948 3328 msedge.exe 85 PID 3328 wrote to memory of 1948 3328 msedge.exe 85 PID 3328 wrote to memory of 1948 3328 msedge.exe 85 PID 3328 wrote to memory of 1948 3328 msedge.exe 85 PID 3328 wrote to memory of 1948 3328 msedge.exe 85 PID 3328 wrote to memory of 1948 3328 msedge.exe 85 PID 3328 wrote to memory of 1948 3328 msedge.exe 85 PID 3328 wrote to memory of 1948 3328 msedge.exe 85 PID 3328 wrote to memory of 1948 3328 msedge.exe 85 PID 3328 wrote to memory of 1948 3328 msedge.exe 85 PID 3328 wrote to memory of 1948 3328 msedge.exe 85 PID 3328 wrote to memory of 1948 3328 msedge.exe 85 PID 3328 wrote to memory of 1948 3328 msedge.exe 85 PID 3328 wrote to memory of 1948 3328 msedge.exe 85 PID 3328 wrote to memory of 1948 3328 msedge.exe 85 PID 3328 wrote to memory of 1948 3328 msedge.exe 85 PID 3328 wrote to memory of 1948 3328 msedge.exe 85 PID 3328 wrote to memory of 1948 3328 msedge.exe 85 PID 3328 wrote to memory of 1948 3328 msedge.exe 85 PID 3328 wrote to memory of 1948 3328 msedge.exe 85 PID 3328 wrote to memory of 1948 3328 msedge.exe 85 PID 3328 wrote to memory of 1948 3328 msedge.exe 85 PID 3328 wrote to memory of 1948 3328 msedge.exe 85 PID 3328 wrote to memory of 1948 3328 msedge.exe 85 PID 3328 wrote to memory of 1948 3328 msedge.exe 85 PID 3328 wrote to memory of 1948 3328 msedge.exe 85 PID 3328 wrote to memory of 1948 3328 msedge.exe 85 PID 3328 wrote to memory of 1948 3328 msedge.exe 85 PID 3328 wrote to memory of 1948 3328 msedge.exe 85 PID 3328 wrote to memory of 2548 3328 msedge.exe 86 PID 3328 wrote to memory of 2548 3328 msedge.exe 86 PID 3328 wrote to memory of 3020 3328 msedge.exe 87 PID 3328 wrote to memory of 3020 3328 msedge.exe 87 PID 3328 wrote to memory of 3020 3328 msedge.exe 87 PID 3328 wrote to memory of 3020 3328 msedge.exe 87 PID 3328 wrote to memory of 3020 3328 msedge.exe 87 PID 3328 wrote to memory of 3020 3328 msedge.exe 87 PID 3328 wrote to memory of 3020 3328 msedge.exe 87 PID 3328 wrote to memory of 3020 3328 msedge.exe 87 PID 3328 wrote to memory of 3020 3328 msedge.exe 87 PID 3328 wrote to memory of 3020 3328 msedge.exe 87 PID 3328 wrote to memory of 3020 3328 msedge.exe 87 PID 3328 wrote to memory of 3020 3328 msedge.exe 87 PID 3328 wrote to memory of 3020 3328 msedge.exe 87 PID 3328 wrote to memory of 3020 3328 msedge.exe 87 PID 3328 wrote to memory of 3020 3328 msedge.exe 87 PID 3328 wrote to memory of 3020 3328 msedge.exe 87 PID 3328 wrote to memory of 3020 3328 msedge.exe 87 PID 3328 wrote to memory of 3020 3328 msedge.exe 87 PID 3328 wrote to memory of 3020 3328 msedge.exe 87 PID 3328 wrote to memory of 3020 3328 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\88ae70287592b0f28b76d03f78b05a2b_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3328 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff6cd046f8,0x7fff6cd04708,0x7fff6cd047182⤵PID:3168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,15093858509036662464,6896701378729473894,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:22⤵PID:1948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,15093858509036662464,6896701378729473894,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,15093858509036662464,6896701378729473894,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2828 /prefetch:82⤵PID:3020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,15093858509036662464,6896701378729473894,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:4440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,15093858509036662464,6896701378729473894,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:1052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,15093858509036662464,6896701378729473894,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4304 /prefetch:12⤵PID:2220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,15093858509036662464,6896701378729473894,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3812 /prefetch:12⤵PID:932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,15093858509036662464,6896701378729473894,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5520 /prefetch:12⤵PID:868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,15093858509036662464,6896701378729473894,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6260 /prefetch:82⤵PID:1516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,15093858509036662464,6896701378729473894,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6260 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,15093858509036662464,6896701378729473894,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6288 /prefetch:12⤵PID:2016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,15093858509036662464,6896701378729473894,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5584 /prefetch:12⤵PID:2232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,15093858509036662464,6896701378729473894,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5376 /prefetch:12⤵PID:4436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,15093858509036662464,6896701378729473894,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4156 /prefetch:12⤵PID:1056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,15093858509036662464,6896701378729473894,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6108 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5804
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1592
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:832
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5111c361619c017b5d09a13a56938bd54
SHA1e02b363a8ceb95751623f25025a9299a2c931e07
SHA256d7be4042a1e3511b0dbf0ab5c493245e4ac314440a4ae0732813db01a21ef8bc
SHA512fc16a4ad0b56899b82d05114d7b0ca8ee610cdba6ff0b6a67dea44faf17b3105109335359b78c0a59c9011a13152744a7f5d4f6a5b66ea519df750ef03f622b2
-
Filesize
152B
MD5983cbc1f706a155d63496ebc4d66515e
SHA1223d0071718b80cad9239e58c5e8e64df6e2a2fe
SHA256cc34b8f8e3f4bfe4c9a227d88f56ea2dd276ca3ac81df622ff5e9a8ec46b951c
SHA512d9cf2ca46d9379902730c81e615a3eb694873ffd535c6bb3ded2dc97cdbbfb71051ab11a07754ed6f610f04285605b702b5a48a6cfda3ee3287230c41c9c45cd
-
Filesize
210KB
MD548d2860dd3168b6f06a4f27c6791bcaa
SHA1f5f803efed91cd45a36c3d6acdffaaf0e863bf8c
SHA25604d7bf7a6586ef00516bdb3f7b96c65e0b9c6b940f4b145121ed00f6116bbb77
SHA512172da615b5b97a0c17f80ddd8d7406e278cd26afd1eb45a052cde0cb55b92febe49773b1e02cf9e9adca2f34abbaa6d7b83eaad4e08c828ef4bf26f23b95584e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize504B
MD534f21c2ac8b6d24cf827e06b01b39787
SHA19ae8b10c6b6c37acd1aef77aad1d1c8109c6d2b6
SHA2567943f23cc76aa9d80e881296abe922df78911996c2376c2fdb07e5b8613f392e
SHA51244a5878fe3b72694ead316fd31549bc186b64fa4888fd36cb0f870ba06b7ddedad9daea4d0c8a866f925063cfd468e08278063d0a4f213751d835b3d39a0fd4b
-
Filesize
1KB
MD540d1c0cebd7ecebb0aef3c9918ffbe47
SHA17a6d652da656851f8a9cdf67510f6ff6a8588e24
SHA256ec3111401e8a85ca157186684b729c6c6024e949736d23056da2f15d9cf2d892
SHA512bcc8d6692774daeb2f2c1b946689a2f5798b3d42ab5637733f8073c9b069a38d9c0e85ed198d2eb07fa2dd8b3ed9712d16a4a4be09867d447438ca2c1b63e679
-
Filesize
6KB
MD50fb125813ad6b484cfb25a8a5283bd90
SHA13f65db63d96c5a823e5aa4fbda2ad29a63d1a07e
SHA2561b33dfab149300146e4adc63e46bbb89ad4545b321e2a89c8ea70f076b544861
SHA51203ef194e653d91698794a541ea4ec28720c662e4c51a7336af152e95e627917796f0650e61b0e393cb351f8b8dc76b0fe9beb8446710c07ebeb65bc7479d3429
-
Filesize
6KB
MD50095a83b080f6f96b75ad70b73de222d
SHA1fa50e2cb730c6ebfd2ab9a2468d23c24c5c97170
SHA2563e46f2e78dd7444dab7150103fa2c901490283009f84a4d044e627f8facd51df
SHA512856cd4e0dbcceaafbbc13e81e633a56758ad3874030ea196478f737c04ada559b4960ddbdfaf41d2c7a0b9a240b2c08d7f3af32822597713d8f0387f93d24a78
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5efd60ab6668e89eda8b36da43e4e2a03
SHA1ee3750c3c4329bdd5ee1573b848b14fab5df4252
SHA256297949ebbd8c0c7fabed5252dfb2cf5416b13882d5b509bbd02ec89bf90f1b43
SHA5127d15e0c19ace2a4b0ffb3f20fbce0e404fea50f0e5df52b99cad86e5ddc2ccad023eb028c19c7390a1cfc5a33db733e0df3ed953999398165fbfbdc8f2de2922