Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29/08/2024, 10:40
Static task
static1
Behavioral task
behavioral1
Sample
c8a98beb9b65b1bb9eeacc6d47eead24_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c8a98beb9b65b1bb9eeacc6d47eead24_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c8a98beb9b65b1bb9eeacc6d47eead24_JaffaCakes118.html
-
Size
16KB
-
MD5
c8a98beb9b65b1bb9eeacc6d47eead24
-
SHA1
a42f6cccc44b813bf1d0d086b1d66bb468d3a325
-
SHA256
3133e551911e49362d909dc27bf9cf41259cee35a2acd424cacb9b2ae491027a
-
SHA512
586340b8ee5c8193870bf106174557e4aa5a7cf36bce9a013cdb25eb5b2cc20fce1c5450ac98a8645bb5cd9335d3dc4a766c495546486f2e1eaad04027fdf6a7
-
SSDEEP
384:HtOJqlObclcv8k898REFSRWE/EEA+ll44:xlOAlckN96LllR
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 880 msedge.exe 880 msedge.exe 4424 msedge.exe 4424 msedge.exe 2792 identity_helper.exe 2792 identity_helper.exe 5256 msedge.exe 5256 msedge.exe 5256 msedge.exe 5256 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4424 wrote to memory of 4368 4424 msedge.exe 84 PID 4424 wrote to memory of 4368 4424 msedge.exe 84 PID 4424 wrote to memory of 3308 4424 msedge.exe 85 PID 4424 wrote to memory of 3308 4424 msedge.exe 85 PID 4424 wrote to memory of 3308 4424 msedge.exe 85 PID 4424 wrote to memory of 3308 4424 msedge.exe 85 PID 4424 wrote to memory of 3308 4424 msedge.exe 85 PID 4424 wrote to memory of 3308 4424 msedge.exe 85 PID 4424 wrote to memory of 3308 4424 msedge.exe 85 PID 4424 wrote to memory of 3308 4424 msedge.exe 85 PID 4424 wrote to memory of 3308 4424 msedge.exe 85 PID 4424 wrote to memory of 3308 4424 msedge.exe 85 PID 4424 wrote to memory of 3308 4424 msedge.exe 85 PID 4424 wrote to memory of 3308 4424 msedge.exe 85 PID 4424 wrote to memory of 3308 4424 msedge.exe 85 PID 4424 wrote to memory of 3308 4424 msedge.exe 85 PID 4424 wrote to memory of 3308 4424 msedge.exe 85 PID 4424 wrote to memory of 3308 4424 msedge.exe 85 PID 4424 wrote to memory of 3308 4424 msedge.exe 85 PID 4424 wrote to memory of 3308 4424 msedge.exe 85 PID 4424 wrote to memory of 3308 4424 msedge.exe 85 PID 4424 wrote to memory of 3308 4424 msedge.exe 85 PID 4424 wrote to memory of 3308 4424 msedge.exe 85 PID 4424 wrote to memory of 3308 4424 msedge.exe 85 PID 4424 wrote to memory of 3308 4424 msedge.exe 85 PID 4424 wrote to memory of 3308 4424 msedge.exe 85 PID 4424 wrote to memory of 3308 4424 msedge.exe 85 PID 4424 wrote to memory of 3308 4424 msedge.exe 85 PID 4424 wrote to memory of 3308 4424 msedge.exe 85 PID 4424 wrote to memory of 3308 4424 msedge.exe 85 PID 4424 wrote to memory of 3308 4424 msedge.exe 85 PID 4424 wrote to memory of 3308 4424 msedge.exe 85 PID 4424 wrote to memory of 3308 4424 msedge.exe 85 PID 4424 wrote to memory of 3308 4424 msedge.exe 85 PID 4424 wrote to memory of 3308 4424 msedge.exe 85 PID 4424 wrote to memory of 3308 4424 msedge.exe 85 PID 4424 wrote to memory of 3308 4424 msedge.exe 85 PID 4424 wrote to memory of 3308 4424 msedge.exe 85 PID 4424 wrote to memory of 3308 4424 msedge.exe 85 PID 4424 wrote to memory of 3308 4424 msedge.exe 85 PID 4424 wrote to memory of 3308 4424 msedge.exe 85 PID 4424 wrote to memory of 3308 4424 msedge.exe 85 PID 4424 wrote to memory of 880 4424 msedge.exe 86 PID 4424 wrote to memory of 880 4424 msedge.exe 86 PID 4424 wrote to memory of 4940 4424 msedge.exe 87 PID 4424 wrote to memory of 4940 4424 msedge.exe 87 PID 4424 wrote to memory of 4940 4424 msedge.exe 87 PID 4424 wrote to memory of 4940 4424 msedge.exe 87 PID 4424 wrote to memory of 4940 4424 msedge.exe 87 PID 4424 wrote to memory of 4940 4424 msedge.exe 87 PID 4424 wrote to memory of 4940 4424 msedge.exe 87 PID 4424 wrote to memory of 4940 4424 msedge.exe 87 PID 4424 wrote to memory of 4940 4424 msedge.exe 87 PID 4424 wrote to memory of 4940 4424 msedge.exe 87 PID 4424 wrote to memory of 4940 4424 msedge.exe 87 PID 4424 wrote to memory of 4940 4424 msedge.exe 87 PID 4424 wrote to memory of 4940 4424 msedge.exe 87 PID 4424 wrote to memory of 4940 4424 msedge.exe 87 PID 4424 wrote to memory of 4940 4424 msedge.exe 87 PID 4424 wrote to memory of 4940 4424 msedge.exe 87 PID 4424 wrote to memory of 4940 4424 msedge.exe 87 PID 4424 wrote to memory of 4940 4424 msedge.exe 87 PID 4424 wrote to memory of 4940 4424 msedge.exe 87 PID 4424 wrote to memory of 4940 4424 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\c8a98beb9b65b1bb9eeacc6d47eead24_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4424 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa8b5d46f8,0x7ffa8b5d4708,0x7ffa8b5d47182⤵PID:4368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,15743009693941879566,17950255075127248946,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1984 /prefetch:22⤵PID:3308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2068,15743009693941879566,17950255075127248946,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2156 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2068,15743009693941879566,17950255075127248946,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2692 /prefetch:82⤵PID:4940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,15743009693941879566,17950255075127248946,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:1564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,15743009693941879566,17950255075127248946,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:3996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,15743009693941879566,17950255075127248946,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4744 /prefetch:12⤵PID:2124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,15743009693941879566,17950255075127248946,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5700 /prefetch:82⤵PID:2328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,15743009693941879566,17950255075127248946,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5700 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,15743009693941879566,17950255075127248946,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5352 /prefetch:12⤵PID:4000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,15743009693941879566,17950255075127248946,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5412 /prefetch:12⤵PID:4028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,15743009693941879566,17950255075127248946,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5880 /prefetch:12⤵PID:1540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,15743009693941879566,17950255075127248946,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5848 /prefetch:12⤵PID:536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,15743009693941879566,17950255075127248946,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5824 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5256
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4448
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1064
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59e3fc58a8fb86c93d19e1500b873ef6f
SHA1c6aae5f4e26f5570db5e14bba8d5061867a33b56
SHA256828f4eacac1c40b790fd70dbb6fa6ba03dcc681171d9b2a6579626d27837b1c4
SHA512e5e245b56fa82075e060f468a3224cf2ef43f1b6d87f0351a2102d85c7c897e559be4caeaecfdc4059af29fdc674681b61229319dda95cb2ee649b2eb98d313e
-
Filesize
152B
MD527304926d60324abe74d7a4b571c35ea
SHA178b8f92fcaf4a09eaa786bbe33fd1b0222ef29c1
SHA2567039ad5c2b40f4d97c8c2269f4942be13436d739b2e1f8feb7a0c9f9fdb931de
SHA512f5b6181d3f432238c7365f64fc8a373299e23ba8178bcc419471916ef8b23e909787c7c0617ab22e4eb90909c02bd7b84f1386fbc61e2bdb5a0eb474175da4bd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD59bcde483d927052690af624377060f03
SHA1a712a01e2df0b228ce1807392729a3a821e91b4e
SHA2564c8a5ddead5ddf8ace8fd3ea2b4d2b5ee5417f4a39c3f2030769f8d63440eafa
SHA5121e9f9dad03d8d0233d24dfe7ecae38fa04facfcc6c0fab1c461670d40ac6f37ee3de422533ae0d75867af108ed2960db3050f798a36de9576fe4891c98971baf
-
Filesize
1KB
MD555958545192c060efc1f3b04d3133f7f
SHA1f0069d5089ecc245d6530dc0f3d19f1a08954d3c
SHA2563ad758519e4f494b544cc66f3b251bb5b6f60e8dfec6317c79bc7fbf6ffb14ce
SHA512e4384199b8e88383d19b6e1075ab17c02b031327414502e421ad572c15c52e7773c8418cd64dcd10267daae1e4220348db9de45b8f7639942235d33a8cbb29c8
-
Filesize
5KB
MD5b6a2eb8750a6a90da846bc5c980e55e1
SHA142138121af1156fcf3f5233b265b42d3804afa8b
SHA256da97bf968f716dc99ac5fceaf41a42ced1a6f6c8ef5673e6135c37596e59dd99
SHA5129a215078d4978d0ef73dee0d7a9601921cded9c8eaf9a815c22e8be0e9dd946b7338953e52efdea90a466fde711a2ecc3c4d3d90944323adcd74e9775bf48c6a
-
Filesize
6KB
MD5911ea0c6a3457dc770d6f636eae5cacd
SHA1936033be9cc21a3f853e47bca307db3612eae796
SHA2569629663a89b1788578e2c23dc00408dfaf1cca626dc24d3ba8a4d6a61bbb2f9d
SHA512888df8b63ab4f93a95f09e7007d9bf60855e6d316abb0198171a015c4743d1adeddca15219b8f5ffd5d2d618b906677a6ce6df2e5538e64d0c7b4e31779737a8
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5795aee17b114a44bed9705fef6f6bd9a
SHA169b809c9ab323a95d8ccc0e003209649de6209d9
SHA256b61fda8ecda00ed3cdf34cd9ab1aa72b431acb584fb8798e822a7e9a92f08eb1
SHA512f2faf9622e14445e80e995dd8408498f5a619f55f364eb0a690b4da432adec6162a5dd6d96c4af5f2df8a6a1bcedc4dd7152ca2006e80a90a0c3445b747df431