Analysis
-
max time kernel
145s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/08/2024, 18:26
Static task
static1
Behavioral task
behavioral1
Sample
ac16c3b2cd77f8202dff89cf8c53c89c_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ac16c3b2cd77f8202dff89cf8c53c89c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ac16c3b2cd77f8202dff89cf8c53c89c_JaffaCakes118.html
-
Size
3KB
-
MD5
ac16c3b2cd77f8202dff89cf8c53c89c
-
SHA1
6a26bb1a361e80cc8cd61c5fa60f6bd45e9da995
-
SHA256
7d4547e803eb723bf43a833ec97bfec05184c782addeb9067e978b5410a10824
-
SHA512
dc4b5a7dc867f7ac5b508111b476926660946ab14ca44398d873ac98adc8afb940f19414897c45fdf5679c8a0374358f10fd77219eb6a838da91c354dea19c92
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 2744 msedge.exe 2744 msedge.exe 5096 msedge.exe 5096 msedge.exe 5096 msedge.exe 4432 identity_helper.exe 4432 identity_helper.exe 5988 msedge.exe 5988 msedge.exe 5988 msedge.exe 5988 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 5096 msedge.exe 5096 msedge.exe 5096 msedge.exe 5096 msedge.exe 5096 msedge.exe 5096 msedge.exe 5096 msedge.exe 5096 msedge.exe 5096 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5096 msedge.exe 5096 msedge.exe 5096 msedge.exe 5096 msedge.exe 5096 msedge.exe 5096 msedge.exe 5096 msedge.exe 5096 msedge.exe 5096 msedge.exe 5096 msedge.exe 5096 msedge.exe 5096 msedge.exe 5096 msedge.exe 5096 msedge.exe 5096 msedge.exe 5096 msedge.exe 5096 msedge.exe 5096 msedge.exe 5096 msedge.exe 5096 msedge.exe 5096 msedge.exe 5096 msedge.exe 5096 msedge.exe 5096 msedge.exe 5096 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5096 msedge.exe 5096 msedge.exe 5096 msedge.exe 5096 msedge.exe 5096 msedge.exe 5096 msedge.exe 5096 msedge.exe 5096 msedge.exe 5096 msedge.exe 5096 msedge.exe 5096 msedge.exe 5096 msedge.exe 5096 msedge.exe 5096 msedge.exe 5096 msedge.exe 5096 msedge.exe 5096 msedge.exe 5096 msedge.exe 5096 msedge.exe 5096 msedge.exe 5096 msedge.exe 5096 msedge.exe 5096 msedge.exe 5096 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5096 wrote to memory of 3156 5096 msedge.exe 84 PID 5096 wrote to memory of 3156 5096 msedge.exe 84 PID 5096 wrote to memory of 1144 5096 msedge.exe 85 PID 5096 wrote to memory of 1144 5096 msedge.exe 85 PID 5096 wrote to memory of 1144 5096 msedge.exe 85 PID 5096 wrote to memory of 1144 5096 msedge.exe 85 PID 5096 wrote to memory of 1144 5096 msedge.exe 85 PID 5096 wrote to memory of 1144 5096 msedge.exe 85 PID 5096 wrote to memory of 1144 5096 msedge.exe 85 PID 5096 wrote to memory of 1144 5096 msedge.exe 85 PID 5096 wrote to memory of 1144 5096 msedge.exe 85 PID 5096 wrote to memory of 1144 5096 msedge.exe 85 PID 5096 wrote to memory of 1144 5096 msedge.exe 85 PID 5096 wrote to memory of 1144 5096 msedge.exe 85 PID 5096 wrote to memory of 1144 5096 msedge.exe 85 PID 5096 wrote to memory of 1144 5096 msedge.exe 85 PID 5096 wrote to memory of 1144 5096 msedge.exe 85 PID 5096 wrote to memory of 1144 5096 msedge.exe 85 PID 5096 wrote to memory of 1144 5096 msedge.exe 85 PID 5096 wrote to memory of 1144 5096 msedge.exe 85 PID 5096 wrote to memory of 1144 5096 msedge.exe 85 PID 5096 wrote to memory of 1144 5096 msedge.exe 85 PID 5096 wrote to memory of 1144 5096 msedge.exe 85 PID 5096 wrote to memory of 1144 5096 msedge.exe 85 PID 5096 wrote to memory of 1144 5096 msedge.exe 85 PID 5096 wrote to memory of 1144 5096 msedge.exe 85 PID 5096 wrote to memory of 1144 5096 msedge.exe 85 PID 5096 wrote to memory of 1144 5096 msedge.exe 85 PID 5096 wrote to memory of 1144 5096 msedge.exe 85 PID 5096 wrote to memory of 1144 5096 msedge.exe 85 PID 5096 wrote to memory of 1144 5096 msedge.exe 85 PID 5096 wrote to memory of 1144 5096 msedge.exe 85 PID 5096 wrote to memory of 1144 5096 msedge.exe 85 PID 5096 wrote to memory of 1144 5096 msedge.exe 85 PID 5096 wrote to memory of 1144 5096 msedge.exe 85 PID 5096 wrote to memory of 1144 5096 msedge.exe 85 PID 5096 wrote to memory of 1144 5096 msedge.exe 85 PID 5096 wrote to memory of 1144 5096 msedge.exe 85 PID 5096 wrote to memory of 1144 5096 msedge.exe 85 PID 5096 wrote to memory of 1144 5096 msedge.exe 85 PID 5096 wrote to memory of 1144 5096 msedge.exe 85 PID 5096 wrote to memory of 1144 5096 msedge.exe 85 PID 5096 wrote to memory of 2744 5096 msedge.exe 86 PID 5096 wrote to memory of 2744 5096 msedge.exe 86 PID 5096 wrote to memory of 3340 5096 msedge.exe 87 PID 5096 wrote to memory of 3340 5096 msedge.exe 87 PID 5096 wrote to memory of 3340 5096 msedge.exe 87 PID 5096 wrote to memory of 3340 5096 msedge.exe 87 PID 5096 wrote to memory of 3340 5096 msedge.exe 87 PID 5096 wrote to memory of 3340 5096 msedge.exe 87 PID 5096 wrote to memory of 3340 5096 msedge.exe 87 PID 5096 wrote to memory of 3340 5096 msedge.exe 87 PID 5096 wrote to memory of 3340 5096 msedge.exe 87 PID 5096 wrote to memory of 3340 5096 msedge.exe 87 PID 5096 wrote to memory of 3340 5096 msedge.exe 87 PID 5096 wrote to memory of 3340 5096 msedge.exe 87 PID 5096 wrote to memory of 3340 5096 msedge.exe 87 PID 5096 wrote to memory of 3340 5096 msedge.exe 87 PID 5096 wrote to memory of 3340 5096 msedge.exe 87 PID 5096 wrote to memory of 3340 5096 msedge.exe 87 PID 5096 wrote to memory of 3340 5096 msedge.exe 87 PID 5096 wrote to memory of 3340 5096 msedge.exe 87 PID 5096 wrote to memory of 3340 5096 msedge.exe 87 PID 5096 wrote to memory of 3340 5096 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\ac16c3b2cd77f8202dff89cf8c53c89c_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5096 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbfd4046f8,0x7ffbfd404708,0x7ffbfd4047182⤵PID:3156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1960,16063810772603167141,15113551098732185690,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2000 /prefetch:22⤵PID:1144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1960,16063810772603167141,15113551098732185690,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2436 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1960,16063810772603167141,15113551098732185690,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2832 /prefetch:82⤵PID:3340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1960,16063810772603167141,15113551098732185690,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:3212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1960,16063810772603167141,15113551098732185690,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:3076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1960,16063810772603167141,15113551098732185690,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4232 /prefetch:12⤵PID:3840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1960,16063810772603167141,15113551098732185690,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5412 /prefetch:12⤵PID:4572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1960,16063810772603167141,15113551098732185690,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5640 /prefetch:12⤵PID:316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1960,16063810772603167141,15113551098732185690,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6272 /prefetch:82⤵PID:2072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1960,16063810772603167141,15113551098732185690,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6272 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1960,16063810772603167141,15113551098732185690,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6268 /prefetch:12⤵PID:2624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1960,16063810772603167141,15113551098732185690,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6048 /prefetch:12⤵PID:2344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1960,16063810772603167141,15113551098732185690,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4180 /prefetch:12⤵PID:5156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1960,16063810772603167141,15113551098732185690,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5216 /prefetch:12⤵PID:5164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1960,16063810772603167141,15113551098732185690,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5108 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5988
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4924
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1572
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5eeaa8087eba2f63f31e599f6a7b46ef4
SHA1f639519deee0766a39cfe258d2ac48e3a9d5ac03
SHA25650fe80c9435f601c30517d10f6a8a0ca6ff8ca2add7584df377371b5a5dbe2d9
SHA512eaabfad92c84f422267615c55a863af12823c5e791bdcb30cabe17f72025e07df7383cf6cf0f08e28aa18a31c2aac5985cf5281a403e22fbcc1fb5e61c49fc3c
-
Filesize
152B
MD5b9569e123772ae290f9bac07e0d31748
SHA15806ed9b301d4178a959b26d7b7ccf2c0abc6741
SHA25620ab88e23fb88186b82047cd0d6dc3cfa23422e4fd2b8f3c8437546a2a842c2b
SHA512cfad8ce716ac815b37e8cc0e30141bfb3ca7f0d4ef101289bddcf6ed3c579bc34d369f2ec2f2dab98707843015633988eb97f1e911728031dd897750b8587795
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize768B
MD56f6d5421ba9800dbe02aaad02ca33a47
SHA1772dfc23373517382a7276f221a3e41970c9715f
SHA256b755e138ef9a6d07c87a1d5e31b08d566720e5c3f56177c2d52f8c4dfdac9bcf
SHA5125b69dc802ebc3cc6d22c3f5ea894f1a299a86abdfe1162d72d51272cf23218916827b461288102f115a58130cd1f8a32559e7c542147b159cb08b4cb657c1971
-
Filesize
1KB
MD53d8ab9576a7fc9335146bfbec86d07ab
SHA169fd8adf8cc83ed97503c6d9293f7b3d25cc76eb
SHA256d15b4636114f5ef945776525ab0c9b662537ad711bb7df2ec9560f070fff0631
SHA5128088868ccebb127e3ed4dc46fcbc4c75e9dd47b11da37d78cc1ed7a87ab00892a8d09a0dc8e376f7954254faf97570cbef1af66d4d74e9cd5a43aa3db08a6c14
-
Filesize
5KB
MD5e61c44f234c678fc737ceb3876a22770
SHA19cd6279034ad00c45d5a23a617c12de4259a206f
SHA256c560eca2f6d757393a537d747578b9c545b5f196735dee6b42acb9a9ba395e4b
SHA51273d747dd5bc6a8fdd3afe435a39b32b9d2a882108f91d82cab56baf54afc64eba8f827d3357ebd3da9ccc264000cf21d5dd9bdd23beaab875059e26390677263
-
Filesize
7KB
MD5bbe8145fd4ba21e6bd5b5190b2cd0328
SHA16e95ad181f8f8029140defcbbfaaf82f8f1fe8d0
SHA2563cb57d3f6e790da00a20fe2a27d43960b5e4fef51c4a8d03077093c1b4b3e5f4
SHA51289f92cf6d11066b7cb9ae5ce6a096d46f8a45b261d50ccebfaf2c0852126cb46269af72176b71ae66868a51dc1b4052f8234bbb3e497b1c0f7ec0299f8d68e6f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD551b8c3a2afe15d56786df2086ba121f3
SHA1e5a23e1ade79478b9790e73edcf3d35a46678574
SHA256a6f55f8ecd0e67343d4292722d299f9ed6a9ffdbe32a9a0870c5a2d998bd49fe
SHA5124dbf714a09ddb0d7e2a9cb64bee027ed775e1f8ebe46623c2c95404a682e420ae4d94264075194d552d3eb7a0ecc3bea349ac2deb3e55b4ddff9ae69dd8dd1eb