Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
24/08/2024, 21:13
Static task
static1
Behavioral task
behavioral1
Sample
bf6c5a61350721909a199af8a10ac091_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
bf6c5a61350721909a199af8a10ac091_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
bf6c5a61350721909a199af8a10ac091_JaffaCakes118.html
-
Size
112KB
-
MD5
bf6c5a61350721909a199af8a10ac091
-
SHA1
60697c501c61265ace37fa5dfb51743b00274629
-
SHA256
e0175d14cc882f9efa6d7f73cbebeb8a79e0dcbdf10b779f967a56cc5884197a
-
SHA512
0e0a2ff82121caab888153ecf924a0f727ac1ecccf184b70f8a07aa1131ec30044286a92b2daa4897698a10802514afa8110b9ade3f3e8528dcce5b6d5baee1a
-
SSDEEP
3072:csWxw9qGevJGfQYTGXL5J4d/BQG/bEfKBSH:yVvJ4w5
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2580 msedge.exe 2580 msedge.exe 3100 msedge.exe 3100 msedge.exe 4608 identity_helper.exe 4608 identity_helper.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe 3100 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3100 wrote to memory of 1628 3100 msedge.exe 84 PID 3100 wrote to memory of 1628 3100 msedge.exe 84 PID 3100 wrote to memory of 3856 3100 msedge.exe 85 PID 3100 wrote to memory of 3856 3100 msedge.exe 85 PID 3100 wrote to memory of 3856 3100 msedge.exe 85 PID 3100 wrote to memory of 3856 3100 msedge.exe 85 PID 3100 wrote to memory of 3856 3100 msedge.exe 85 PID 3100 wrote to memory of 3856 3100 msedge.exe 85 PID 3100 wrote to memory of 3856 3100 msedge.exe 85 PID 3100 wrote to memory of 3856 3100 msedge.exe 85 PID 3100 wrote to memory of 3856 3100 msedge.exe 85 PID 3100 wrote to memory of 3856 3100 msedge.exe 85 PID 3100 wrote to memory of 3856 3100 msedge.exe 85 PID 3100 wrote to memory of 3856 3100 msedge.exe 85 PID 3100 wrote to memory of 3856 3100 msedge.exe 85 PID 3100 wrote to memory of 3856 3100 msedge.exe 85 PID 3100 wrote to memory of 3856 3100 msedge.exe 85 PID 3100 wrote to memory of 3856 3100 msedge.exe 85 PID 3100 wrote to memory of 3856 3100 msedge.exe 85 PID 3100 wrote to memory of 3856 3100 msedge.exe 85 PID 3100 wrote to memory of 3856 3100 msedge.exe 85 PID 3100 wrote to memory of 3856 3100 msedge.exe 85 PID 3100 wrote to memory of 3856 3100 msedge.exe 85 PID 3100 wrote to memory of 3856 3100 msedge.exe 85 PID 3100 wrote to memory of 3856 3100 msedge.exe 85 PID 3100 wrote to memory of 3856 3100 msedge.exe 85 PID 3100 wrote to memory of 3856 3100 msedge.exe 85 PID 3100 wrote to memory of 3856 3100 msedge.exe 85 PID 3100 wrote to memory of 3856 3100 msedge.exe 85 PID 3100 wrote to memory of 3856 3100 msedge.exe 85 PID 3100 wrote to memory of 3856 3100 msedge.exe 85 PID 3100 wrote to memory of 3856 3100 msedge.exe 85 PID 3100 wrote to memory of 3856 3100 msedge.exe 85 PID 3100 wrote to memory of 3856 3100 msedge.exe 85 PID 3100 wrote to memory of 3856 3100 msedge.exe 85 PID 3100 wrote to memory of 3856 3100 msedge.exe 85 PID 3100 wrote to memory of 3856 3100 msedge.exe 85 PID 3100 wrote to memory of 3856 3100 msedge.exe 85 PID 3100 wrote to memory of 3856 3100 msedge.exe 85 PID 3100 wrote to memory of 3856 3100 msedge.exe 85 PID 3100 wrote to memory of 3856 3100 msedge.exe 85 PID 3100 wrote to memory of 3856 3100 msedge.exe 85 PID 3100 wrote to memory of 2580 3100 msedge.exe 86 PID 3100 wrote to memory of 2580 3100 msedge.exe 86 PID 3100 wrote to memory of 2456 3100 msedge.exe 87 PID 3100 wrote to memory of 2456 3100 msedge.exe 87 PID 3100 wrote to memory of 2456 3100 msedge.exe 87 PID 3100 wrote to memory of 2456 3100 msedge.exe 87 PID 3100 wrote to memory of 2456 3100 msedge.exe 87 PID 3100 wrote to memory of 2456 3100 msedge.exe 87 PID 3100 wrote to memory of 2456 3100 msedge.exe 87 PID 3100 wrote to memory of 2456 3100 msedge.exe 87 PID 3100 wrote to memory of 2456 3100 msedge.exe 87 PID 3100 wrote to memory of 2456 3100 msedge.exe 87 PID 3100 wrote to memory of 2456 3100 msedge.exe 87 PID 3100 wrote to memory of 2456 3100 msedge.exe 87 PID 3100 wrote to memory of 2456 3100 msedge.exe 87 PID 3100 wrote to memory of 2456 3100 msedge.exe 87 PID 3100 wrote to memory of 2456 3100 msedge.exe 87 PID 3100 wrote to memory of 2456 3100 msedge.exe 87 PID 3100 wrote to memory of 2456 3100 msedge.exe 87 PID 3100 wrote to memory of 2456 3100 msedge.exe 87 PID 3100 wrote to memory of 2456 3100 msedge.exe 87 PID 3100 wrote to memory of 2456 3100 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\bf6c5a61350721909a199af8a10ac091_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3100 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdce3446f8,0x7ffdce344708,0x7ffdce3447182⤵PID:1628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2200,12751911374141177603,4026925301259394536,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2208 /prefetch:22⤵PID:3856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2200,12751911374141177603,4026925301259394536,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2412 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2200,12751911374141177603,4026925301259394536,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2672 /prefetch:82⤵PID:2456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,12751911374141177603,4026925301259394536,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3180 /prefetch:12⤵PID:4144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,12751911374141177603,4026925301259394536,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3204 /prefetch:12⤵PID:220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,12751911374141177603,4026925301259394536,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5088 /prefetch:12⤵PID:3648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2200,12751911374141177603,4026925301259394536,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5796 /prefetch:82⤵PID:4344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2200,12751911374141177603,4026925301259394536,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5796 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,12751911374141177603,4026925301259394536,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5988 /prefetch:12⤵PID:1264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,12751911374141177603,4026925301259394536,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5992 /prefetch:12⤵PID:4428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,12751911374141177603,4026925301259394536,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5132 /prefetch:12⤵PID:1188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,12751911374141177603,4026925301259394536,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5204 /prefetch:12⤵PID:1644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2200,12751911374141177603,4026925301259394536,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5788 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1384
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3304
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:524
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD553bc70ecb115bdbabe67620c416fe9b3
SHA1af66ec51a13a59639eaf54d62ff3b4f092bb2fc1
SHA256b36cad5c1f7bc7d07c7eaa2f3cad2959ddb5447d4d3adcb46eb6a99808e22771
SHA512cad44933b94e17908c0eb8ac5feeb53d03a7720d97e7ccc8724a1ed3021a5bece09e1f9f3cec56ce0739176ebbbeb20729e650f8bca04e5060c986b75d8e4921
-
Filesize
152B
MD5e765f3d75e6b0e4a7119c8b14d47d8da
SHA1cc9f7c7826c2e1a129e7d98884926076c3714fc0
SHA256986443556d3878258b710d9d9efbf4f25f0d764c3f83dc54217f2b12a6eccd89
SHA512a1872a849f27da78ebe9adb9beb260cb49ed5f4ca2d403f23379112bdfcd2482446a6708188100496e45db1517cdb43aba8bb93a75e605713c3f97cd716b1079
-
Filesize
21KB
MD5e0f78790cb3a8b2bbfa790779c576bce
SHA1495cefefc27651acc6055a8e06812ded11bd293f
SHA256196377c90a2ecc83ccff630daaf67dd853e6ae3f3824eb222f1e18c2469c4724
SHA512b89d39b8cf3890a4a7339bd91dcb81e91bfb9ebc1280364abf2826817c5b9152bb002bbe5a9cebcfff065b190a839446ce205f45e6eaada9914c67dc1093dd7e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD52447e5709044fff45646836c3016f296
SHA10f2c87f00087f2065c65d4c9282a141ba17cc6d8
SHA256ca1efa10f9b227d21bee65895e21ac5c66b2ea8e45596fb80447dd24d5bcce86
SHA512638d54bceb7ea9fc27ac2384fbcca75ef179aa67cb3d58aab29d075f619aeb9ddd25e3fc26b9d4a2de41d105253dba11fb526745c062f2d58fef171a66a568f6
-
Filesize
1KB
MD5306fb3e80dd6b185bd955a9942b20d29
SHA1671ec7defab85b7b7d95d813b35fa25f9f830ee9
SHA256f9ef61be03f13d15745047f4cc4fc064bdfc85153afcdc63671a9d225b1c25c2
SHA5120aadab70ab4b3b6b989c0b4632c118cdc87924af92b97810b3161dff523fb84cc069419b60cfb36584acba7b7603812a5edcd44e0eaeaa5917e041841a1cc20d
-
Filesize
5KB
MD5eedc541f09677bcafef4c32dfb1c54b9
SHA12c966a664327593047f6be2ae7e0feafe80ae7cf
SHA2568d249c1f4e479393a99800124cce7042c9527d37d430ddd79cba341f1133a8fe
SHA512a6ab1b091df6a6b33b529189d5c0f49eae8d7e4f4c880d613e7ec779d0b1e4e39677aa0bf8dc3ac0d9075e17f8c7052e8d94d6cf6a17d822839207e7250c65a0
-
Filesize
7KB
MD59463e8e6c3c3f4d5e97eb370fcd217ed
SHA1d0c114d05f54f7ca4f3edb1b587a6bc692dd0ee0
SHA256019204f5d1d9318f367fbf11321136f0603f06bf10d9cc4e7122fadb0b38297c
SHA512e6c063b4deddd8e8ca51931b24d4b0ead5d91cf7f26eb36835fbc3d50b349c7ac5fa2d9b4f8005b167d0c3a433ebf5f5cacf36b7e5867b06edae097cb2f5f961
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD52a43fa166bc744754c085dbd1a623146
SHA1d01e948d076cc50e310de3ec1e0397fed7d2120d
SHA2561ff81ba93061da517aaa46f41d2bdf7c72b66bab329b9bcb2b5a7275e57c109a
SHA512b017c799fc94ef878d466fd1fc25760a815de3166e644f78b97dd8b872d0f7058c0f29853b78073831213353872cb847285a4c860131fdc64445b1a4881d7b6f