Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12/08/2024, 06:58
Static task
static1
Behavioral task
behavioral1
Sample
8dc20606fc6050c858364280fdd447aa_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
8dc20606fc6050c858364280fdd447aa_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
8dc20606fc6050c858364280fdd447aa_JaffaCakes118.html
-
Size
17KB
-
MD5
8dc20606fc6050c858364280fdd447aa
-
SHA1
e5f905bfd27362278928ce47c3af5394329918c8
-
SHA256
dd89c67a42a8ddbd38c4f68ba24194f0a230f258b572b0f2f1a37dd5918f5d35
-
SHA512
0468e3f56c51f12a9ed4384e8f1c14a1280303a79d905640bed8d989b57b6e734f38aa25aa655ffd48f85ed78bd9a3e82e570bde67f97f874d2f9cb287c86909
-
SSDEEP
192:CeyhG5jc+cz1Q+SsEvOUajdiaK2ay/9ygTyMdDHCR5Aqn0Kn4kKMp+iXJij9I08E:QGc+IEOdiHqygLNCMq0S4W8HVEJ2
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4952 msedge.exe 4952 msedge.exe 4356 msedge.exe 4356 msedge.exe 2364 identity_helper.exe 2364 identity_helper.exe 5572 msedge.exe 5572 msedge.exe 5572 msedge.exe 5572 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4356 wrote to memory of 4896 4356 msedge.exe 84 PID 4356 wrote to memory of 4896 4356 msedge.exe 84 PID 4356 wrote to memory of 4460 4356 msedge.exe 85 PID 4356 wrote to memory of 4460 4356 msedge.exe 85 PID 4356 wrote to memory of 4460 4356 msedge.exe 85 PID 4356 wrote to memory of 4460 4356 msedge.exe 85 PID 4356 wrote to memory of 4460 4356 msedge.exe 85 PID 4356 wrote to memory of 4460 4356 msedge.exe 85 PID 4356 wrote to memory of 4460 4356 msedge.exe 85 PID 4356 wrote to memory of 4460 4356 msedge.exe 85 PID 4356 wrote to memory of 4460 4356 msedge.exe 85 PID 4356 wrote to memory of 4460 4356 msedge.exe 85 PID 4356 wrote to memory of 4460 4356 msedge.exe 85 PID 4356 wrote to memory of 4460 4356 msedge.exe 85 PID 4356 wrote to memory of 4460 4356 msedge.exe 85 PID 4356 wrote to memory of 4460 4356 msedge.exe 85 PID 4356 wrote to memory of 4460 4356 msedge.exe 85 PID 4356 wrote to memory of 4460 4356 msedge.exe 85 PID 4356 wrote to memory of 4460 4356 msedge.exe 85 PID 4356 wrote to memory of 4460 4356 msedge.exe 85 PID 4356 wrote to memory of 4460 4356 msedge.exe 85 PID 4356 wrote to memory of 4460 4356 msedge.exe 85 PID 4356 wrote to memory of 4460 4356 msedge.exe 85 PID 4356 wrote to memory of 4460 4356 msedge.exe 85 PID 4356 wrote to memory of 4460 4356 msedge.exe 85 PID 4356 wrote to memory of 4460 4356 msedge.exe 85 PID 4356 wrote to memory of 4460 4356 msedge.exe 85 PID 4356 wrote to memory of 4460 4356 msedge.exe 85 PID 4356 wrote to memory of 4460 4356 msedge.exe 85 PID 4356 wrote to memory of 4460 4356 msedge.exe 85 PID 4356 wrote to memory of 4460 4356 msedge.exe 85 PID 4356 wrote to memory of 4460 4356 msedge.exe 85 PID 4356 wrote to memory of 4460 4356 msedge.exe 85 PID 4356 wrote to memory of 4460 4356 msedge.exe 85 PID 4356 wrote to memory of 4460 4356 msedge.exe 85 PID 4356 wrote to memory of 4460 4356 msedge.exe 85 PID 4356 wrote to memory of 4460 4356 msedge.exe 85 PID 4356 wrote to memory of 4460 4356 msedge.exe 85 PID 4356 wrote to memory of 4460 4356 msedge.exe 85 PID 4356 wrote to memory of 4460 4356 msedge.exe 85 PID 4356 wrote to memory of 4460 4356 msedge.exe 85 PID 4356 wrote to memory of 4460 4356 msedge.exe 85 PID 4356 wrote to memory of 4952 4356 msedge.exe 86 PID 4356 wrote to memory of 4952 4356 msedge.exe 86 PID 4356 wrote to memory of 756 4356 msedge.exe 87 PID 4356 wrote to memory of 756 4356 msedge.exe 87 PID 4356 wrote to memory of 756 4356 msedge.exe 87 PID 4356 wrote to memory of 756 4356 msedge.exe 87 PID 4356 wrote to memory of 756 4356 msedge.exe 87 PID 4356 wrote to memory of 756 4356 msedge.exe 87 PID 4356 wrote to memory of 756 4356 msedge.exe 87 PID 4356 wrote to memory of 756 4356 msedge.exe 87 PID 4356 wrote to memory of 756 4356 msedge.exe 87 PID 4356 wrote to memory of 756 4356 msedge.exe 87 PID 4356 wrote to memory of 756 4356 msedge.exe 87 PID 4356 wrote to memory of 756 4356 msedge.exe 87 PID 4356 wrote to memory of 756 4356 msedge.exe 87 PID 4356 wrote to memory of 756 4356 msedge.exe 87 PID 4356 wrote to memory of 756 4356 msedge.exe 87 PID 4356 wrote to memory of 756 4356 msedge.exe 87 PID 4356 wrote to memory of 756 4356 msedge.exe 87 PID 4356 wrote to memory of 756 4356 msedge.exe 87 PID 4356 wrote to memory of 756 4356 msedge.exe 87 PID 4356 wrote to memory of 756 4356 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\8dc20606fc6050c858364280fdd447aa_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4356 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffeebe946f8,0x7ffeebe94708,0x7ffeebe947182⤵PID:4896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,13333123831661379483,13847106736275706191,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2068 /prefetch:22⤵PID:4460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2056,13333123831661379483,13847106736275706191,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2136 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2056,13333123831661379483,13847106736275706191,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2880 /prefetch:82⤵PID:756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,13333123831661379483,13847106736275706191,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:4564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,13333123831661379483,13847106736275706191,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:4160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,13333123831661379483,13847106736275706191,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4212 /prefetch:12⤵PID:1376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,13333123831661379483,13847106736275706191,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3856 /prefetch:12⤵PID:60
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,13333123831661379483,13847106736275706191,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5148 /prefetch:12⤵PID:1796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,13333123831661379483,13847106736275706191,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5704 /prefetch:82⤵PID:4280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,13333123831661379483,13847106736275706191,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5704 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,13333123831661379483,13847106736275706191,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5780 /prefetch:12⤵PID:3916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,13333123831661379483,13847106736275706191,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5792 /prefetch:12⤵PID:3136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,13333123831661379483,13847106736275706191,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4160 /prefetch:12⤵PID:4280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,13333123831661379483,13847106736275706191,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6264 /prefetch:12⤵PID:5048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,13333123831661379483,13847106736275706191,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3112 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5572
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2948
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1448
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5111c361619c017b5d09a13a56938bd54
SHA1e02b363a8ceb95751623f25025a9299a2c931e07
SHA256d7be4042a1e3511b0dbf0ab5c493245e4ac314440a4ae0732813db01a21ef8bc
SHA512fc16a4ad0b56899b82d05114d7b0ca8ee610cdba6ff0b6a67dea44faf17b3105109335359b78c0a59c9011a13152744a7f5d4f6a5b66ea519df750ef03f622b2
-
Filesize
152B
MD5983cbc1f706a155d63496ebc4d66515e
SHA1223d0071718b80cad9239e58c5e8e64df6e2a2fe
SHA256cc34b8f8e3f4bfe4c9a227d88f56ea2dd276ca3ac81df622ff5e9a8ec46b951c
SHA512d9cf2ca46d9379902730c81e615a3eb694873ffd535c6bb3ded2dc97cdbbfb71051ab11a07754ed6f610f04285605b702b5a48a6cfda3ee3287230c41c9c45cd
-
Filesize
210KB
MD548d2860dd3168b6f06a4f27c6791bcaa
SHA1f5f803efed91cd45a36c3d6acdffaaf0e863bf8c
SHA25604d7bf7a6586ef00516bdb3f7b96c65e0b9c6b940f4b145121ed00f6116bbb77
SHA512172da615b5b97a0c17f80ddd8d7406e278cd26afd1eb45a052cde0cb55b92febe49773b1e02cf9e9adca2f34abbaa6d7b83eaad4e08c828ef4bf26f23b95584e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize312B
MD598c0c1f96f79c5084edc207eb064fafc
SHA1ac51475b8c295e826e4834c6a350f59126f433c4
SHA256170b8bdb47b05184596420891eee28325581881ae01a987e76bfeda2286eb153
SHA512143acc57eb7d8e553481347ec6334e705984abf93e582d54a5822d82aba53b964bb0be1605285bc695b6772a23bd44737e2094ebcb9dab452c89cb2c65f6cf92
-
Filesize
1KB
MD530558447d1b4bb352ce652f4117682de
SHA17e9e0fadf096cf701da5c7b8c9530ab972b1abc1
SHA2569b259ba347dbbe5aa576ed141968a8c35d8defc8b9e1ab81e085245ba8728caa
SHA512e5c91ad3d71e8531b1bb16321ba8e88d9eb2e6960f7fafaa9ca8c1264096a6eee698448cb33a8576add9a3ab324cacb8373b1bce19ab45c192f7eb5b46396449
-
Filesize
6KB
MD58ea2fd65538e3577e75096028beeecea
SHA14ea7247a9a6ac6491059348a25013a3c8b339440
SHA256b19a48e8cfa46652b392a6e8ed846e4647c0ca17b050ccac1a3f63c2cc36dfa7
SHA512589184e1b8b39be6387698afe8f7c9b3250e1163a473bf00acadef6ff206a2b59b2dad96fceee227aab095e55c95c23b466d085cb2a5e38fe2c42e8dff29682d
-
Filesize
7KB
MD57d66debdf548d4c08f3437ed0dfd94bd
SHA1795a04d98e75ed5a2238fb25b951c0d82d35c7a4
SHA2565f2d48fc758433dd8946eabbf7cb3d796c234b87498f573c0fc8eb6e605015ef
SHA5126d0007c33ec107536034bdf773fdc8e7b91aacbfe9a978d847a39ffde84eadbf5cb8fb5754fb3c7c86ceb43b2c610db86c1f1699e1455e3508a6cb9ae476a0b0
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD538b731501d5101886eb2de17d2b65472
SHA19de6f2514303db5ee8d70eaeee82630bdb7b1e08
SHA256d1e38d6e6d045804372e42cdc9cb24980daf81ab24bf451c7af6a61245c852a1
SHA5127b7569ed9705ba0c61a5b44a8db0037c0a4873a1ef04286c3a033e8d81d554c34c1cd4db9d1b39bbe624bc0b3306ce8ff3ada5645d6d12e6cd0defaa99a8b588