Analysis
-
max time kernel
145s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12/08/2024, 05:05
Static task
static1
Behavioral task
behavioral1
Sample
8d6d085e26213866d2cb951e33b29ed3_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
8d6d085e26213866d2cb951e33b29ed3_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
8d6d085e26213866d2cb951e33b29ed3_JaffaCakes118.html
-
Size
28KB
-
MD5
8d6d085e26213866d2cb951e33b29ed3
-
SHA1
af8f240e02636c4cf2c6beda79fca5beb5b5b6d5
-
SHA256
42e80cb5ac29d4697b2cc799439f20d1804f0874bcbee70a0c21653a4f235736
-
SHA512
18e90263112277a3dab1247509295684e1fc245c14fe984875bf351cfad98abf033cef92f92f9f0076973369657e4fc5372c3fe1297d08541cdb89c2f2807185
-
SSDEEP
384:r1uc6PgQLVX8pBS9A5EnpG4Fo7nVrmPCCP3Jp43tv4VR2bwI1ICMG8:r1uc6IQLVX8pBUS4eMCCP3JpNiG5
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1980 msedge.exe 1980 msedge.exe 3912 msedge.exe 3912 msedge.exe 2516 identity_helper.exe 2516 identity_helper.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3912 wrote to memory of 3036 3912 msedge.exe 84 PID 3912 wrote to memory of 3036 3912 msedge.exe 84 PID 3912 wrote to memory of 700 3912 msedge.exe 86 PID 3912 wrote to memory of 700 3912 msedge.exe 86 PID 3912 wrote to memory of 700 3912 msedge.exe 86 PID 3912 wrote to memory of 700 3912 msedge.exe 86 PID 3912 wrote to memory of 700 3912 msedge.exe 86 PID 3912 wrote to memory of 700 3912 msedge.exe 86 PID 3912 wrote to memory of 700 3912 msedge.exe 86 PID 3912 wrote to memory of 700 3912 msedge.exe 86 PID 3912 wrote to memory of 700 3912 msedge.exe 86 PID 3912 wrote to memory of 700 3912 msedge.exe 86 PID 3912 wrote to memory of 700 3912 msedge.exe 86 PID 3912 wrote to memory of 700 3912 msedge.exe 86 PID 3912 wrote to memory of 700 3912 msedge.exe 86 PID 3912 wrote to memory of 700 3912 msedge.exe 86 PID 3912 wrote to memory of 700 3912 msedge.exe 86 PID 3912 wrote to memory of 700 3912 msedge.exe 86 PID 3912 wrote to memory of 700 3912 msedge.exe 86 PID 3912 wrote to memory of 700 3912 msedge.exe 86 PID 3912 wrote to memory of 700 3912 msedge.exe 86 PID 3912 wrote to memory of 700 3912 msedge.exe 86 PID 3912 wrote to memory of 700 3912 msedge.exe 86 PID 3912 wrote to memory of 700 3912 msedge.exe 86 PID 3912 wrote to memory of 700 3912 msedge.exe 86 PID 3912 wrote to memory of 700 3912 msedge.exe 86 PID 3912 wrote to memory of 700 3912 msedge.exe 86 PID 3912 wrote to memory of 700 3912 msedge.exe 86 PID 3912 wrote to memory of 700 3912 msedge.exe 86 PID 3912 wrote to memory of 700 3912 msedge.exe 86 PID 3912 wrote to memory of 700 3912 msedge.exe 86 PID 3912 wrote to memory of 700 3912 msedge.exe 86 PID 3912 wrote to memory of 700 3912 msedge.exe 86 PID 3912 wrote to memory of 700 3912 msedge.exe 86 PID 3912 wrote to memory of 700 3912 msedge.exe 86 PID 3912 wrote to memory of 700 3912 msedge.exe 86 PID 3912 wrote to memory of 700 3912 msedge.exe 86 PID 3912 wrote to memory of 700 3912 msedge.exe 86 PID 3912 wrote to memory of 700 3912 msedge.exe 86 PID 3912 wrote to memory of 700 3912 msedge.exe 86 PID 3912 wrote to memory of 700 3912 msedge.exe 86 PID 3912 wrote to memory of 700 3912 msedge.exe 86 PID 3912 wrote to memory of 1980 3912 msedge.exe 87 PID 3912 wrote to memory of 1980 3912 msedge.exe 87 PID 3912 wrote to memory of 4868 3912 msedge.exe 88 PID 3912 wrote to memory of 4868 3912 msedge.exe 88 PID 3912 wrote to memory of 4868 3912 msedge.exe 88 PID 3912 wrote to memory of 4868 3912 msedge.exe 88 PID 3912 wrote to memory of 4868 3912 msedge.exe 88 PID 3912 wrote to memory of 4868 3912 msedge.exe 88 PID 3912 wrote to memory of 4868 3912 msedge.exe 88 PID 3912 wrote to memory of 4868 3912 msedge.exe 88 PID 3912 wrote to memory of 4868 3912 msedge.exe 88 PID 3912 wrote to memory of 4868 3912 msedge.exe 88 PID 3912 wrote to memory of 4868 3912 msedge.exe 88 PID 3912 wrote to memory of 4868 3912 msedge.exe 88 PID 3912 wrote to memory of 4868 3912 msedge.exe 88 PID 3912 wrote to memory of 4868 3912 msedge.exe 88 PID 3912 wrote to memory of 4868 3912 msedge.exe 88 PID 3912 wrote to memory of 4868 3912 msedge.exe 88 PID 3912 wrote to memory of 4868 3912 msedge.exe 88 PID 3912 wrote to memory of 4868 3912 msedge.exe 88 PID 3912 wrote to memory of 4868 3912 msedge.exe 88 PID 3912 wrote to memory of 4868 3912 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\8d6d085e26213866d2cb951e33b29ed3_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3912 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbb4c946f8,0x7ffbb4c94708,0x7ffbb4c947182⤵PID:3036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2216,11242808886234777475,8288406208318703319,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2244 /prefetch:22⤵PID:700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2216,11242808886234777475,8288406208318703319,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2300 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2216,11242808886234777475,8288406208318703319,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2856 /prefetch:82⤵PID:4868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,11242808886234777475,8288406208318703319,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:1016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,11242808886234777475,8288406208318703319,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:4248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,11242808886234777475,8288406208318703319,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5184 /prefetch:12⤵PID:2128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2216,11242808886234777475,8288406208318703319,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5816 /prefetch:82⤵PID:4224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2216,11242808886234777475,8288406208318703319,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5816 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,11242808886234777475,8288406208318703319,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5464 /prefetch:12⤵PID:368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,11242808886234777475,8288406208318703319,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5500 /prefetch:12⤵PID:4412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,11242808886234777475,8288406208318703319,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5236 /prefetch:12⤵PID:884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,11242808886234777475,8288406208318703319,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5152 /prefetch:12⤵PID:1284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2216,11242808886234777475,8288406208318703319,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4940 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3040
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2160
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4412
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1372
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59b008261dda31857d68792b46af6dd6d
SHA1e82dc88e2d1da2df7cb19d79a0346b9bb90d52b3
SHA2569ac598d4f8170f7e475d84103aead9e3c23d5f2d292741a7f56a17bde8b6f7da
SHA51278853091403a06beeec4998e2e3a4342111895ffd485f7f7cd367741a4883f7a25864cba00a6c86f27dc0c9ce9d04f08011ecc40c8ae9383d33274739ac39f10
-
Filesize
152B
MD50446fcdd21b016db1f468971fb82a488
SHA1726b91562bb75f80981f381e3c69d7d832c87c9d
SHA25662c5dc18b25e758f3508582a7c58bb46b734a774d97fc0e8a20614235caa8222
SHA5121df7c085042266959f1fe0aedc5f6d40ceba485b54159f51f0c38f17bb250b79ea941b735e1b6faf219f23fe8ab65ac4557f545519d52d5416b89ad0f9047a31
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize216B
MD556a1fce8baa2a28bd83c20c16da92dce
SHA1ed0530eccddcc4dae0e11c928486f0427ccdfed9
SHA256a312b4f511ce28aade76342a9d368109b73d294f97b1bfb975d7fff11ff7dd02
SHA51242327e360d03ddaafe7c66f1d2711f9c5dae7896edc3eec0c2efafa9a078f8d2516ae43c33882f0dbba54e7efc10c8a87d517411551e728ebddb0ad03bb967b6
-
Filesize
2KB
MD52c45148f141002554ce3f76e16e9c11c
SHA19a1820504407627af3d0377cb14f6a8beadc1cbe
SHA256c6fe9f70c57846f4558f2e6de7d390caa9a02559a4ab4c44d1fba88abc487466
SHA512ff04631f603693005f18a144205150ac7288b7248b1879a71cb8cbec933d0a99a79f2268acc4567e6714079b9d973f9e5e1a62c9fca9842df402ee687d31bcf2
-
Filesize
6KB
MD54bd688b51e7993e7d9ff0cef1eab078e
SHA177a3b288bcfd19569aa44f47eb985747d5406378
SHA25605ef738ea050e844e4f88fbd5eb2d845d056c29726bc19f0f4162544860ce320
SHA51200c37fb18f8b251369fd3257b0769d9a0a243849d9094f5ce08f72f4d3c894b693877b076837f433e45c21ae555e13f1b33f95073950ee88ec2df24d29bd6801
-
Filesize
6KB
MD503fca0c6994df792595333e30ada9a3b
SHA1cef8f7d6519c89413de90f0b47b61295b93f6ddd
SHA256cdacedd348b37a728cfb21d1df3a8d0d4453b3dee701fd1d49b81edb1944f7c3
SHA512e0951360196651760749d5d382a482a60fd0d36c9d3b455d0ec5d91cd4b11d05089c63f757d48d016cef54fac0cc4c446d47f61401fe081273510d7bfe03eb51
-
Filesize
7KB
MD5937b283965991073ee3c8fc0f18ca6d2
SHA1ace927362e19f0c6d423277d1bbc407940c971c5
SHA256290fbeaf3c9cc35fd5a70d3155f398c12994a87221958b2806bef822b28faeac
SHA51214aaf7223ffb39670c4f1e81895a795e71152577e4310c13237fa47bb368d3fd965b5f80a03d8f2badba0d33779f62797944a9c665509e49a552a1d829cbbb9d
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5b792693836c1d32528f11f32566f86b1
SHA1587a61acadf0771799bb8e62a09f76da7c5fccb7
SHA256bcadc734e8e026ab0954ae19d69f64b7f8ef80fba52c48fac8ab59b3b8b053f2
SHA512e39a89864b5b2113925eb414be8589405bd65d750e5b6b5a3c97a2e49b3661bbff98cdff222fcc27cd252bd56c430d8ee9e87465ea09790c8911f9a4d545261f