Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11-08-2024 14:44
Static task
static1
Behavioral task
behavioral1
Sample
8ac41a7ef787f7000437b89c7da71ad8_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
8ac41a7ef787f7000437b89c7da71ad8_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
8ac41a7ef787f7000437b89c7da71ad8_JaffaCakes118.html
-
Size
60KB
-
MD5
8ac41a7ef787f7000437b89c7da71ad8
-
SHA1
1ec7c530728e777247bcda1d93e9107a4b20f13d
-
SHA256
4ab4a13cb6f902a44fcdfd28c91af9afb943fd4a9340762bcf085d5584082416
-
SHA512
1fdd22d5124784de73b7c174b984299c3a22753720f898ca572a84cfd730626987aa0bdeeb36fab07269858f5d65d5cb72fdcb60c26db50c72c39f99948b16b2
-
SSDEEP
768:63RygOriWNcaSoBgGjvJO1rgkxBSAig2sBuERm54FE+NtHFXx7a2S9Nx:63RdaNvJOlxBR52sgLZitHFXx78x
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1612 msedge.exe 1612 msedge.exe 4256 msedge.exe 4256 msedge.exe 4076 identity_helper.exe 4076 identity_helper.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe 4256 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4256 wrote to memory of 4988 4256 msedge.exe 84 PID 4256 wrote to memory of 4988 4256 msedge.exe 84 PID 4256 wrote to memory of 1496 4256 msedge.exe 85 PID 4256 wrote to memory of 1496 4256 msedge.exe 85 PID 4256 wrote to memory of 1496 4256 msedge.exe 85 PID 4256 wrote to memory of 1496 4256 msedge.exe 85 PID 4256 wrote to memory of 1496 4256 msedge.exe 85 PID 4256 wrote to memory of 1496 4256 msedge.exe 85 PID 4256 wrote to memory of 1496 4256 msedge.exe 85 PID 4256 wrote to memory of 1496 4256 msedge.exe 85 PID 4256 wrote to memory of 1496 4256 msedge.exe 85 PID 4256 wrote to memory of 1496 4256 msedge.exe 85 PID 4256 wrote to memory of 1496 4256 msedge.exe 85 PID 4256 wrote to memory of 1496 4256 msedge.exe 85 PID 4256 wrote to memory of 1496 4256 msedge.exe 85 PID 4256 wrote to memory of 1496 4256 msedge.exe 85 PID 4256 wrote to memory of 1496 4256 msedge.exe 85 PID 4256 wrote to memory of 1496 4256 msedge.exe 85 PID 4256 wrote to memory of 1496 4256 msedge.exe 85 PID 4256 wrote to memory of 1496 4256 msedge.exe 85 PID 4256 wrote to memory of 1496 4256 msedge.exe 85 PID 4256 wrote to memory of 1496 4256 msedge.exe 85 PID 4256 wrote to memory of 1496 4256 msedge.exe 85 PID 4256 wrote to memory of 1496 4256 msedge.exe 85 PID 4256 wrote to memory of 1496 4256 msedge.exe 85 PID 4256 wrote to memory of 1496 4256 msedge.exe 85 PID 4256 wrote to memory of 1496 4256 msedge.exe 85 PID 4256 wrote to memory of 1496 4256 msedge.exe 85 PID 4256 wrote to memory of 1496 4256 msedge.exe 85 PID 4256 wrote to memory of 1496 4256 msedge.exe 85 PID 4256 wrote to memory of 1496 4256 msedge.exe 85 PID 4256 wrote to memory of 1496 4256 msedge.exe 85 PID 4256 wrote to memory of 1496 4256 msedge.exe 85 PID 4256 wrote to memory of 1496 4256 msedge.exe 85 PID 4256 wrote to memory of 1496 4256 msedge.exe 85 PID 4256 wrote to memory of 1496 4256 msedge.exe 85 PID 4256 wrote to memory of 1496 4256 msedge.exe 85 PID 4256 wrote to memory of 1496 4256 msedge.exe 85 PID 4256 wrote to memory of 1496 4256 msedge.exe 85 PID 4256 wrote to memory of 1496 4256 msedge.exe 85 PID 4256 wrote to memory of 1496 4256 msedge.exe 85 PID 4256 wrote to memory of 1496 4256 msedge.exe 85 PID 4256 wrote to memory of 1612 4256 msedge.exe 86 PID 4256 wrote to memory of 1612 4256 msedge.exe 86 PID 4256 wrote to memory of 2796 4256 msedge.exe 87 PID 4256 wrote to memory of 2796 4256 msedge.exe 87 PID 4256 wrote to memory of 2796 4256 msedge.exe 87 PID 4256 wrote to memory of 2796 4256 msedge.exe 87 PID 4256 wrote to memory of 2796 4256 msedge.exe 87 PID 4256 wrote to memory of 2796 4256 msedge.exe 87 PID 4256 wrote to memory of 2796 4256 msedge.exe 87 PID 4256 wrote to memory of 2796 4256 msedge.exe 87 PID 4256 wrote to memory of 2796 4256 msedge.exe 87 PID 4256 wrote to memory of 2796 4256 msedge.exe 87 PID 4256 wrote to memory of 2796 4256 msedge.exe 87 PID 4256 wrote to memory of 2796 4256 msedge.exe 87 PID 4256 wrote to memory of 2796 4256 msedge.exe 87 PID 4256 wrote to memory of 2796 4256 msedge.exe 87 PID 4256 wrote to memory of 2796 4256 msedge.exe 87 PID 4256 wrote to memory of 2796 4256 msedge.exe 87 PID 4256 wrote to memory of 2796 4256 msedge.exe 87 PID 4256 wrote to memory of 2796 4256 msedge.exe 87 PID 4256 wrote to memory of 2796 4256 msedge.exe 87 PID 4256 wrote to memory of 2796 4256 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\8ac41a7ef787f7000437b89c7da71ad8_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4256 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff132a46f8,0x7fff132a4708,0x7fff132a47182⤵PID:4988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1800,9532685690138445202,6418127872469809807,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2088 /prefetch:22⤵PID:1496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1800,9532685690138445202,6418127872469809807,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2192 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1800,9532685690138445202,6418127872469809807,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2792 /prefetch:82⤵PID:2796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1800,9532685690138445202,6418127872469809807,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:3500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1800,9532685690138445202,6418127872469809807,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:1740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1800,9532685690138445202,6418127872469809807,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4736 /prefetch:12⤵PID:2496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1800,9532685690138445202,6418127872469809807,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5648 /prefetch:82⤵PID:2340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1800,9532685690138445202,6418127872469809807,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5648 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1800,9532685690138445202,6418127872469809807,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5260 /prefetch:12⤵PID:2896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1800,9532685690138445202,6418127872469809807,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5224 /prefetch:12⤵PID:4840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1800,9532685690138445202,6418127872469809807,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4984 /prefetch:12⤵PID:3428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1800,9532685690138445202,6418127872469809807,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5216 /prefetch:12⤵PID:2640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1800,9532685690138445202,6418127872469809807,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5032 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:704
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5012
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2104
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD553bc70ecb115bdbabe67620c416fe9b3
SHA1af66ec51a13a59639eaf54d62ff3b4f092bb2fc1
SHA256b36cad5c1f7bc7d07c7eaa2f3cad2959ddb5447d4d3adcb46eb6a99808e22771
SHA512cad44933b94e17908c0eb8ac5feeb53d03a7720d97e7ccc8724a1ed3021a5bece09e1f9f3cec56ce0739176ebbbeb20729e650f8bca04e5060c986b75d8e4921
-
Filesize
152B
MD5e765f3d75e6b0e4a7119c8b14d47d8da
SHA1cc9f7c7826c2e1a129e7d98884926076c3714fc0
SHA256986443556d3878258b710d9d9efbf4f25f0d764c3f83dc54217f2b12a6eccd89
SHA512a1872a849f27da78ebe9adb9beb260cb49ed5f4ca2d403f23379112bdfcd2482446a6708188100496e45db1517cdb43aba8bb93a75e605713c3f97cd716b1079
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD50e515ec51b0546ba6f00aa0221a7b2e3
SHA1d84190682dafc4c2a9b07d34048108c8cac5ab8c
SHA256f856034811007c128c98c3bb14acb61eff2eec1626aaa60b7e319c6653f17a1f
SHA5129e913bf92d62ad82a4750594e0be5ba55b1b0145ea361ac53653cf22bf2f4f5cc86750bffbbb30cbe2136ed398325550405b70e7b3f88552e012508bcb83c325
-
Filesize
1KB
MD5d75772c04cd19ea77cb414fd33f90757
SHA1aa1c2f2edaa4fc44f6c5af3400803ff621e733c2
SHA25649e1f3674aff67b0025c4745bbb99bd7b284f59126677e37f716c5320469a5cb
SHA512ecbf5f1ded39880e6d7f5c05f6a86f5910be827d190af80192650353e92d433243973a98a1203afd847caa02974f783033f0ccb77bcae9f21ab4fea35f6539fe
-
Filesize
1KB
MD582673a44573baa8e54c9fd1390542249
SHA1fb522b97d41f1b79eccad8f1337a8ec0ce13358b
SHA256fada820c2df71ae1255997df691e9580a7c78f9900bb455f5b4e47fb1c9f5ef4
SHA512cb94df61f7a684f2ad78502aad24bec15d718740bd9e8ac035d954e9a489f822a0a63bf1610ae1e5df64db2cf30345f944c8ecf2490c33ca1e8f6ce508f50cc3
-
Filesize
6KB
MD586ab323aedd49e52ee69240559875435
SHA144b5e310445fa2f33e682c7dec00225dc17c476b
SHA2562d6d2cdb9d77bee2ef194554ed4448494eedfa3d27af7a1d07937117d2224a08
SHA512680b5f28f731b10225280dc4131597d30942fe96ccef467de60e4dca899bef368cb9390f6fcb85b2e85ebe0c53f95e5d978cc963ab32d45b2d022c98b9d20a2c
-
Filesize
6KB
MD59f78dd7d5654b288f23db481cf24e9db
SHA16f90c83c91385cf1a9d374b1ed02c751cd768026
SHA256738204275985b975337af6f58b4a9f5406a3033c117afa9bad6c307cf7ee6f00
SHA5126f52768a70ea33821b2c14f98d770839c4f4ecb7a12aad72ab77f876155e1a5f36785ee2e9d10775d2f90b18d461c3ea9a3dfc633c2bff7ed65afdb6b1e47b4d
-
Filesize
6KB
MD5ce69ffecb952f274deedd3ddcfbb6132
SHA19825de2b8aa6c44f27d207eb4b80089cbc94c2a8
SHA256925c9a00d92b6548865417d61934074d078e1a5d02fb2c9cef5c253e9b908616
SHA512345bd55f34a1da3852140e3564b0a36b5eed31d88185bd57bad3f3797079ca2bcb6d6ba442564707b13305d9b60a09ec86df14cff1bde6a4f1fb88e6aa2692c1
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD58242f398da48b7af2909dddd873d2e3b
SHA15a09d35d651e062f045709109b6a2202304d2885
SHA2561d36e89068b6d32b55e7599dffcee90ac886e56c7f971b7b7431d72f37cfe929
SHA5128edd00a1bd663fd7b47e6568475f427bd322aca5d69a043a1837d42cffc40f6a7dd343a4117237400e0a8e07f22b9ed7528ede13cfa589344cf543244d7caf7c