Analysis
-
max time kernel
149s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14/08/2024, 10:31
Static task
static1
Behavioral task
behavioral1
Sample
95b81ac8d3b4b54b7cf731728085968c_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
95b81ac8d3b4b54b7cf731728085968c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
95b81ac8d3b4b54b7cf731728085968c_JaffaCakes118.html
-
Size
477KB
-
MD5
95b81ac8d3b4b54b7cf731728085968c
-
SHA1
f1c2876e81ec81605a3426a98488ee65a146a97b
-
SHA256
6542d8fd5240bcb9dd54086dc9ea1106fc2d5bb8735e5412fae6e859433ff049
-
SHA512
a7a54b3f34f2bcb6972ab152aba882541f006d0435855f3d12f545ea5347a6473e6d94424b4eb0ab801e9d933e44633ae909419c65dc8abe8cfe95ee90b58c1c
-
SSDEEP
3072:KciV80rhB9CyHxX7Be7iAvtLPbAwuBNKifXTJj1RdS:K98Mz9VxLY7iAVLTBQJlQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4388 msedge.exe 4388 msedge.exe 4632 msedge.exe 4632 msedge.exe 1636 identity_helper.exe 1636 identity_helper.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe 404 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4632 wrote to memory of 4572 4632 msedge.exe 84 PID 4632 wrote to memory of 4572 4632 msedge.exe 84 PID 4632 wrote to memory of 4336 4632 msedge.exe 85 PID 4632 wrote to memory of 4336 4632 msedge.exe 85 PID 4632 wrote to memory of 4336 4632 msedge.exe 85 PID 4632 wrote to memory of 4336 4632 msedge.exe 85 PID 4632 wrote to memory of 4336 4632 msedge.exe 85 PID 4632 wrote to memory of 4336 4632 msedge.exe 85 PID 4632 wrote to memory of 4336 4632 msedge.exe 85 PID 4632 wrote to memory of 4336 4632 msedge.exe 85 PID 4632 wrote to memory of 4336 4632 msedge.exe 85 PID 4632 wrote to memory of 4336 4632 msedge.exe 85 PID 4632 wrote to memory of 4336 4632 msedge.exe 85 PID 4632 wrote to memory of 4336 4632 msedge.exe 85 PID 4632 wrote to memory of 4336 4632 msedge.exe 85 PID 4632 wrote to memory of 4336 4632 msedge.exe 85 PID 4632 wrote to memory of 4336 4632 msedge.exe 85 PID 4632 wrote to memory of 4336 4632 msedge.exe 85 PID 4632 wrote to memory of 4336 4632 msedge.exe 85 PID 4632 wrote to memory of 4336 4632 msedge.exe 85 PID 4632 wrote to memory of 4336 4632 msedge.exe 85 PID 4632 wrote to memory of 4336 4632 msedge.exe 85 PID 4632 wrote to memory of 4336 4632 msedge.exe 85 PID 4632 wrote to memory of 4336 4632 msedge.exe 85 PID 4632 wrote to memory of 4336 4632 msedge.exe 85 PID 4632 wrote to memory of 4336 4632 msedge.exe 85 PID 4632 wrote to memory of 4336 4632 msedge.exe 85 PID 4632 wrote to memory of 4336 4632 msedge.exe 85 PID 4632 wrote to memory of 4336 4632 msedge.exe 85 PID 4632 wrote to memory of 4336 4632 msedge.exe 85 PID 4632 wrote to memory of 4336 4632 msedge.exe 85 PID 4632 wrote to memory of 4336 4632 msedge.exe 85 PID 4632 wrote to memory of 4336 4632 msedge.exe 85 PID 4632 wrote to memory of 4336 4632 msedge.exe 85 PID 4632 wrote to memory of 4336 4632 msedge.exe 85 PID 4632 wrote to memory of 4336 4632 msedge.exe 85 PID 4632 wrote to memory of 4336 4632 msedge.exe 85 PID 4632 wrote to memory of 4336 4632 msedge.exe 85 PID 4632 wrote to memory of 4336 4632 msedge.exe 85 PID 4632 wrote to memory of 4336 4632 msedge.exe 85 PID 4632 wrote to memory of 4336 4632 msedge.exe 85 PID 4632 wrote to memory of 4336 4632 msedge.exe 85 PID 4632 wrote to memory of 4388 4632 msedge.exe 86 PID 4632 wrote to memory of 4388 4632 msedge.exe 86 PID 4632 wrote to memory of 2916 4632 msedge.exe 87 PID 4632 wrote to memory of 2916 4632 msedge.exe 87 PID 4632 wrote to memory of 2916 4632 msedge.exe 87 PID 4632 wrote to memory of 2916 4632 msedge.exe 87 PID 4632 wrote to memory of 2916 4632 msedge.exe 87 PID 4632 wrote to memory of 2916 4632 msedge.exe 87 PID 4632 wrote to memory of 2916 4632 msedge.exe 87 PID 4632 wrote to memory of 2916 4632 msedge.exe 87 PID 4632 wrote to memory of 2916 4632 msedge.exe 87 PID 4632 wrote to memory of 2916 4632 msedge.exe 87 PID 4632 wrote to memory of 2916 4632 msedge.exe 87 PID 4632 wrote to memory of 2916 4632 msedge.exe 87 PID 4632 wrote to memory of 2916 4632 msedge.exe 87 PID 4632 wrote to memory of 2916 4632 msedge.exe 87 PID 4632 wrote to memory of 2916 4632 msedge.exe 87 PID 4632 wrote to memory of 2916 4632 msedge.exe 87 PID 4632 wrote to memory of 2916 4632 msedge.exe 87 PID 4632 wrote to memory of 2916 4632 msedge.exe 87 PID 4632 wrote to memory of 2916 4632 msedge.exe 87 PID 4632 wrote to memory of 2916 4632 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\95b81ac8d3b4b54b7cf731728085968c_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4632 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe54e446f8,0x7ffe54e44708,0x7ffe54e447182⤵PID:4572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2028,1799372478620864994,7282432290306219694,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2036 /prefetch:22⤵PID:4336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2028,1799372478620864994,7282432290306219694,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2384 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2028,1799372478620864994,7282432290306219694,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2816 /prefetch:82⤵PID:2916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,1799372478620864994,7282432290306219694,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:2924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,1799372478620864994,7282432290306219694,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:3052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,1799372478620864994,7282432290306219694,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3884 /prefetch:12⤵PID:1980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2028,1799372478620864994,7282432290306219694,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5816 /prefetch:82⤵PID:2632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2028,1799372478620864994,7282432290306219694,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5816 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,1799372478620864994,7282432290306219694,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5280 /prefetch:12⤵PID:1944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,1799372478620864994,7282432290306219694,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5564 /prefetch:12⤵PID:2068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,1799372478620864994,7282432290306219694,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5108 /prefetch:12⤵PID:4308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,1799372478620864994,7282432290306219694,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3976 /prefetch:12⤵PID:2444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2028,1799372478620864994,7282432290306219694,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5008 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:404
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3100
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3232
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ecf7ca53c80b5245e35839009d12f866
SHA1a7af77cf31d410708ebd35a232a80bddfb0615bb
SHA256882a513b71b26210ff251769b82b2c5d59a932f96d9ce606ca2fab6530a13687
SHA512706722bd22ce27d854036b1b16e6a3cdb36284b66edc76238a79c2e11cee7d1307b121c898ad832eb1af73e4f08d991d64dc0bff529896ffb4ebe9b3dc381696
-
Filesize
152B
MD54dd2754d1bea40445984d65abee82b21
SHA14b6a5658bae9a784a370a115fbb4a12e92bd3390
SHA256183b8e82a0deaa83d04736553671cedb738adc909f483b3c5f822a0e6be7477d
SHA51292d44ee372ad33f892b921efa6cabc78e91025e89f05a22830763217826fa98d51d55711f85c8970ac58abf9adc6c85cc40878032cd6d2589ab226cd099f99e1
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD553e0f2150f1a1c700ea1fb6d626074d3
SHA180a867181a31682baea25e2f1bb1789d7d51400e
SHA256b839dc28789c52a1d03294e0fef4679133c32cf8ab218fba4e48ea7ba6ae10cb
SHA512162c58f4872a091fd3b2a8ed47fa17a60590a913d4ac6377134f50632591c579ace181920bd1e7e7491ba103644fa87a49b713c7b4c300789163141291b09ed0
-
Filesize
1KB
MD59b645af5e878b4ac2f6855fe616b0f36
SHA1977621a62d9504a20236b2ab3b2f5b1737bfafa8
SHA256d630039a4adcf636d0931c65aa431917c060feebc377b51abaf6b761875418a6
SHA512173dbd2bfd338319ba7f1a60065ad3501a77e2378ca8a20828f7c56392939683503f71c83966edaf447920ab246801f2e262627fccca28b3ee06117be057f1ba
-
Filesize
6KB
MD5e5c4d6b29202ebcadfecec03b6118f58
SHA16a97c68e55351b630dbb355a6d0f15944e1fff26
SHA25677c3dfbcee7e388184e8a37a5f173f0cc55360c64186913672a34218502916be
SHA512bb31825b6a6a3c28f1848da86dd2f870c3c2b2b9e7040de096aab3e0530df5a1c15c3b2a97a1001e22b9c27b9765e8196f56fe5fd990f03b1d95cd238240f036
-
Filesize
7KB
MD5d00abaee86dbadd2066982b58459af35
SHA1a56a2203ab4263c1ecc662611a5c18bb471cf3a0
SHA256c0e4cea9b0eed1d6250d21cf83d5bcddba0499d58ad601f810fcccbd9c4fb9a2
SHA51225c1af053b7ec4754fb4a2f41201e98ec61aea0896e47a89197351a97f6e45f5533fba3573431bfa92e30a97d99fce2ec289a8b1e8a8d4dc9f8a11c777355a6a
-
Filesize
7KB
MD58bdf2b593a8972250a337b4c015e28ff
SHA148352bf05ef9845bb30f7014e1184288f9b2eaad
SHA2567df06183d2625a8c9b048b60db69349f081885b187859bfff37b666f301569e4
SHA512b8cc5d335241cdd145a7c9a75a06c88bd6732611381098fc4449f82444182a1141dd174fabe6fd40caaa4c0dd99b55fe646e955e4ded0bb92b6fac98a01d7bdb
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD58d886c65369374c03824f0f7a5874419
SHA1588ea03b2a33e4126d1db67d3f059b562fdea5c8
SHA256a356b3022e66e93bedccfa98c49f7b5f8533c487a358b766b3ff01cc9030a6e4
SHA512d194719938677aa232368bf791d4de6c487b1a2aa4efbe8e05a07b7ec959d9a0952d76b289e6f38625b5e00237e76b4eb614c10f264f4019ff048cce9b522ffb