Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29/08/2024, 11:51
Static task
static1
Behavioral task
behavioral1
Sample
c8c3fdb721ac1c47bf27899cca2b0119_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c8c3fdb721ac1c47bf27899cca2b0119_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c8c3fdb721ac1c47bf27899cca2b0119_JaffaCakes118.html
-
Size
37KB
-
MD5
c8c3fdb721ac1c47bf27899cca2b0119
-
SHA1
a11ce3f4c93fdf45e5287e638045b1e45f3e90da
-
SHA256
b6da0412451462cba36e4a346c49835a9929342f3c3037a26d0ae8a3a49d1053
-
SHA512
791a0f68f94c2bf50037176e4c5f1934115f019f5723c6bb58dae37ef604bdefd28532326470446fd27ef01e41bdd602b59ebcffe3e6be26eb01c6047b2525d9
-
SSDEEP
768:4nNtDmWJDvHV1hYQ7YDZEAvrV1htwBgFVHwoYDE7:4nCWJLXSXwBgFVHwoYDE7
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1712 msedge.exe 1712 msedge.exe 1616 msedge.exe 1616 msedge.exe 4640 identity_helper.exe 4640 identity_helper.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe 1616 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1616 wrote to memory of 3560 1616 msedge.exe 83 PID 1616 wrote to memory of 3560 1616 msedge.exe 83 PID 1616 wrote to memory of 1556 1616 msedge.exe 84 PID 1616 wrote to memory of 1556 1616 msedge.exe 84 PID 1616 wrote to memory of 1556 1616 msedge.exe 84 PID 1616 wrote to memory of 1556 1616 msedge.exe 84 PID 1616 wrote to memory of 1556 1616 msedge.exe 84 PID 1616 wrote to memory of 1556 1616 msedge.exe 84 PID 1616 wrote to memory of 1556 1616 msedge.exe 84 PID 1616 wrote to memory of 1556 1616 msedge.exe 84 PID 1616 wrote to memory of 1556 1616 msedge.exe 84 PID 1616 wrote to memory of 1556 1616 msedge.exe 84 PID 1616 wrote to memory of 1556 1616 msedge.exe 84 PID 1616 wrote to memory of 1556 1616 msedge.exe 84 PID 1616 wrote to memory of 1556 1616 msedge.exe 84 PID 1616 wrote to memory of 1556 1616 msedge.exe 84 PID 1616 wrote to memory of 1556 1616 msedge.exe 84 PID 1616 wrote to memory of 1556 1616 msedge.exe 84 PID 1616 wrote to memory of 1556 1616 msedge.exe 84 PID 1616 wrote to memory of 1556 1616 msedge.exe 84 PID 1616 wrote to memory of 1556 1616 msedge.exe 84 PID 1616 wrote to memory of 1556 1616 msedge.exe 84 PID 1616 wrote to memory of 1556 1616 msedge.exe 84 PID 1616 wrote to memory of 1556 1616 msedge.exe 84 PID 1616 wrote to memory of 1556 1616 msedge.exe 84 PID 1616 wrote to memory of 1556 1616 msedge.exe 84 PID 1616 wrote to memory of 1556 1616 msedge.exe 84 PID 1616 wrote to memory of 1556 1616 msedge.exe 84 PID 1616 wrote to memory of 1556 1616 msedge.exe 84 PID 1616 wrote to memory of 1556 1616 msedge.exe 84 PID 1616 wrote to memory of 1556 1616 msedge.exe 84 PID 1616 wrote to memory of 1556 1616 msedge.exe 84 PID 1616 wrote to memory of 1556 1616 msedge.exe 84 PID 1616 wrote to memory of 1556 1616 msedge.exe 84 PID 1616 wrote to memory of 1556 1616 msedge.exe 84 PID 1616 wrote to memory of 1556 1616 msedge.exe 84 PID 1616 wrote to memory of 1556 1616 msedge.exe 84 PID 1616 wrote to memory of 1556 1616 msedge.exe 84 PID 1616 wrote to memory of 1556 1616 msedge.exe 84 PID 1616 wrote to memory of 1556 1616 msedge.exe 84 PID 1616 wrote to memory of 1556 1616 msedge.exe 84 PID 1616 wrote to memory of 1556 1616 msedge.exe 84 PID 1616 wrote to memory of 1712 1616 msedge.exe 85 PID 1616 wrote to memory of 1712 1616 msedge.exe 85 PID 1616 wrote to memory of 1612 1616 msedge.exe 86 PID 1616 wrote to memory of 1612 1616 msedge.exe 86 PID 1616 wrote to memory of 1612 1616 msedge.exe 86 PID 1616 wrote to memory of 1612 1616 msedge.exe 86 PID 1616 wrote to memory of 1612 1616 msedge.exe 86 PID 1616 wrote to memory of 1612 1616 msedge.exe 86 PID 1616 wrote to memory of 1612 1616 msedge.exe 86 PID 1616 wrote to memory of 1612 1616 msedge.exe 86 PID 1616 wrote to memory of 1612 1616 msedge.exe 86 PID 1616 wrote to memory of 1612 1616 msedge.exe 86 PID 1616 wrote to memory of 1612 1616 msedge.exe 86 PID 1616 wrote to memory of 1612 1616 msedge.exe 86 PID 1616 wrote to memory of 1612 1616 msedge.exe 86 PID 1616 wrote to memory of 1612 1616 msedge.exe 86 PID 1616 wrote to memory of 1612 1616 msedge.exe 86 PID 1616 wrote to memory of 1612 1616 msedge.exe 86 PID 1616 wrote to memory of 1612 1616 msedge.exe 86 PID 1616 wrote to memory of 1612 1616 msedge.exe 86 PID 1616 wrote to memory of 1612 1616 msedge.exe 86 PID 1616 wrote to memory of 1612 1616 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\c8c3fdb721ac1c47bf27899cca2b0119_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffae86e46f8,0x7ffae86e4708,0x7ffae86e47182⤵PID:3560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,1345183698702720722,11278031699629255442,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:22⤵PID:1556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,1345183698702720722,11278031699629255442,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,1345183698702720722,11278031699629255442,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2880 /prefetch:82⤵PID:1612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,1345183698702720722,11278031699629255442,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3148 /prefetch:12⤵PID:3376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,1345183698702720722,11278031699629255442,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3156 /prefetch:12⤵PID:4972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,1345183698702720722,11278031699629255442,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4140 /prefetch:12⤵PID:4312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,1345183698702720722,11278031699629255442,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5376 /prefetch:82⤵PID:3768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,1345183698702720722,11278031699629255442,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5376 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,1345183698702720722,11278031699629255442,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5440 /prefetch:12⤵PID:3708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,1345183698702720722,11278031699629255442,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5448 /prefetch:12⤵PID:4976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,1345183698702720722,11278031699629255442,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5868 /prefetch:12⤵PID:868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,1345183698702720722,11278031699629255442,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5808 /prefetch:12⤵PID:2584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,1345183698702720722,11278031699629255442,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3036 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3156
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1192
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1644
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e4f80e7950cbd3bb11257d2000cb885e
SHA110ac643904d539042d8f7aa4a312b13ec2106035
SHA2561184ee8d32d0edecddd93403fb888fad6b3e2a710d37335c3989cc529bc08124
SHA5122b92c9807fdcd937e514d4e7e1cc7c2d3e3aa162099b7289ceac2feea72d1a4afbadf1c09b3075d470efadf9a9edd63e07ea7e7a98d22243e45b3d53473fa4f0
-
Filesize
152B
MD52dc1a9f2f3f8c3cfe51bb29b078166c5
SHA1eaf3c3dad3c8dc6f18dc3e055b415da78b704402
SHA256dcb76fa365c2d9ee213b224a91cdd806d30b1e8652d72a22f2371124fa4479fa
SHA512682061d9cc86a6e5d99d022da776fb554350fc95efbf29cd84c1db4e2b7161b76cd1de48335bcc3a25633079fb0bd412e4f4795ed6291c65e9bc28d95330bb25
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize216B
MD5309bc8c22562a7eda21d43c47932d8ff
SHA1d217eb54ccc17437178c087d9b001418a44d91f7
SHA256048cf87924b81f0f737d301399f2ddb9e6d79b4e31f3af07706d6e16be95c2c1
SHA512c467c6f2cdc4850c24dc5b6c47d5f035a2b85afefd9547d3e3b3201fae38c165157d7523c8119193f53ffa9113091f3e6740ed90dcc96a60d7a6817dec5ad3e9
-
Filesize
495B
MD5ec242ee491925cd4b644dc0c707ec016
SHA165d9edef253ef05f8a52b9c41edc3bcdd2c23012
SHA25687e8b6e538e7def2d9dc549c24e6c8b8f96ec733cd3e0830ba53a4e5a3e64507
SHA5124745a3c39d3563233e5f513409ca6b147230a85ebd2e0bc1a76b15c69994b22c10ddb9f9fc630129bdd8b123cbcc636e03306df8b1ed5c9e9d7db474e0715747
-
Filesize
5KB
MD5201551f9e15f133b1e76a24b3f4be9c9
SHA1147f2b78db3db69d5a987e651afb973095a88375
SHA25646af67aa040fb915349fbe9b78878ea44e6d948cca4cdeb5905ecfcc8f039c73
SHA512ac66d77d0e74541fe9dd5dcd701918dbbed639f8e91d285aeb33fbf1865dbab4dda656985e07bf0761498e55f566f853edcad0217d2a55b0ab695ee17334fef1
-
Filesize
6KB
MD51151e75dee46855d54a34ba8d6468b02
SHA110d7d37428bc2970b0a05bf48ddbc31cc555296e
SHA25625d8c042223816beee7b7c238e485fa19bbaead0c0ab42ea57e33df32f4048b4
SHA5128926d834a3dbc8fa5e3dd68c70bbc8c341e5ef81aaadf8ecd06a888eb3a3ff5abc5d9d0c40b8add69f83928267b87b4d645d15a860832c3e500d631e9edbaee5
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD509e1aaf8eb80449cda897a860d11950f
SHA1abf99f69b4060d29cd4f176e07919731b59daaad
SHA25614d75b3dd6548db3859eb3ec2f944369c076d9bb5a45d52007dbb22413e974c4
SHA5121b65d2137a639335e47c2ba2fab78b17558e4be36bc82dbbf469908b428ab02daaccad8fb1a27a35cc13cf2774a5bee5d443872c1609eb4446bf4f1198e02569