Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29-08-2024 11:41
Static task
static1
Behavioral task
behavioral1
Sample
c8c03c701d60dd09e5f36837136a5353_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c8c03c701d60dd09e5f36837136a5353_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c8c03c701d60dd09e5f36837136a5353_JaffaCakes118.html
-
Size
99KB
-
MD5
c8c03c701d60dd09e5f36837136a5353
-
SHA1
01a5aac8c2325e114e76c15e96816bd4d4a86e91
-
SHA256
776e791fe96a26017630eadb0430c281c7ec5900f6b936b281ed088f7dd66459
-
SHA512
974c92197d07a39208a5c858b8d0a70bb3fdb1da85d17f12ce3208c9fdc371d564dbd1f478e04d5662734fc53956734ffe108bdf96a8a585d8f3a19bed67f7ab
-
SSDEEP
768:2i1S5y5vCCsYcVcEgZr5kLLkFDV0xr92QnGgH4SXek58axyL/DfuD5lw29CB:bg81CCsYHcIg/F5VcLc5la
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4168 msedge.exe 4168 msedge.exe 1244 msedge.exe 1244 msedge.exe 4112 identity_helper.exe 4112 identity_helper.exe 5644 msedge.exe 5644 msedge.exe 5644 msedge.exe 5644 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1244 msedge.exe 1244 msedge.exe 1244 msedge.exe 1244 msedge.exe 1244 msedge.exe 1244 msedge.exe 1244 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1244 msedge.exe 1244 msedge.exe 1244 msedge.exe 1244 msedge.exe 1244 msedge.exe 1244 msedge.exe 1244 msedge.exe 1244 msedge.exe 1244 msedge.exe 1244 msedge.exe 1244 msedge.exe 1244 msedge.exe 1244 msedge.exe 1244 msedge.exe 1244 msedge.exe 1244 msedge.exe 1244 msedge.exe 1244 msedge.exe 1244 msedge.exe 1244 msedge.exe 1244 msedge.exe 1244 msedge.exe 1244 msedge.exe 1244 msedge.exe 1244 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1244 msedge.exe 1244 msedge.exe 1244 msedge.exe 1244 msedge.exe 1244 msedge.exe 1244 msedge.exe 1244 msedge.exe 1244 msedge.exe 1244 msedge.exe 1244 msedge.exe 1244 msedge.exe 1244 msedge.exe 1244 msedge.exe 1244 msedge.exe 1244 msedge.exe 1244 msedge.exe 1244 msedge.exe 1244 msedge.exe 1244 msedge.exe 1244 msedge.exe 1244 msedge.exe 1244 msedge.exe 1244 msedge.exe 1244 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1244 wrote to memory of 2924 1244 msedge.exe 86 PID 1244 wrote to memory of 2924 1244 msedge.exe 86 PID 1244 wrote to memory of 3280 1244 msedge.exe 87 PID 1244 wrote to memory of 3280 1244 msedge.exe 87 PID 1244 wrote to memory of 3280 1244 msedge.exe 87 PID 1244 wrote to memory of 3280 1244 msedge.exe 87 PID 1244 wrote to memory of 3280 1244 msedge.exe 87 PID 1244 wrote to memory of 3280 1244 msedge.exe 87 PID 1244 wrote to memory of 3280 1244 msedge.exe 87 PID 1244 wrote to memory of 3280 1244 msedge.exe 87 PID 1244 wrote to memory of 3280 1244 msedge.exe 87 PID 1244 wrote to memory of 3280 1244 msedge.exe 87 PID 1244 wrote to memory of 3280 1244 msedge.exe 87 PID 1244 wrote to memory of 3280 1244 msedge.exe 87 PID 1244 wrote to memory of 3280 1244 msedge.exe 87 PID 1244 wrote to memory of 3280 1244 msedge.exe 87 PID 1244 wrote to memory of 3280 1244 msedge.exe 87 PID 1244 wrote to memory of 3280 1244 msedge.exe 87 PID 1244 wrote to memory of 3280 1244 msedge.exe 87 PID 1244 wrote to memory of 3280 1244 msedge.exe 87 PID 1244 wrote to memory of 3280 1244 msedge.exe 87 PID 1244 wrote to memory of 3280 1244 msedge.exe 87 PID 1244 wrote to memory of 3280 1244 msedge.exe 87 PID 1244 wrote to memory of 3280 1244 msedge.exe 87 PID 1244 wrote to memory of 3280 1244 msedge.exe 87 PID 1244 wrote to memory of 3280 1244 msedge.exe 87 PID 1244 wrote to memory of 3280 1244 msedge.exe 87 PID 1244 wrote to memory of 3280 1244 msedge.exe 87 PID 1244 wrote to memory of 3280 1244 msedge.exe 87 PID 1244 wrote to memory of 3280 1244 msedge.exe 87 PID 1244 wrote to memory of 3280 1244 msedge.exe 87 PID 1244 wrote to memory of 3280 1244 msedge.exe 87 PID 1244 wrote to memory of 3280 1244 msedge.exe 87 PID 1244 wrote to memory of 3280 1244 msedge.exe 87 PID 1244 wrote to memory of 3280 1244 msedge.exe 87 PID 1244 wrote to memory of 3280 1244 msedge.exe 87 PID 1244 wrote to memory of 3280 1244 msedge.exe 87 PID 1244 wrote to memory of 3280 1244 msedge.exe 87 PID 1244 wrote to memory of 3280 1244 msedge.exe 87 PID 1244 wrote to memory of 3280 1244 msedge.exe 87 PID 1244 wrote to memory of 3280 1244 msedge.exe 87 PID 1244 wrote to memory of 3280 1244 msedge.exe 87 PID 1244 wrote to memory of 4168 1244 msedge.exe 88 PID 1244 wrote to memory of 4168 1244 msedge.exe 88 PID 1244 wrote to memory of 1736 1244 msedge.exe 89 PID 1244 wrote to memory of 1736 1244 msedge.exe 89 PID 1244 wrote to memory of 1736 1244 msedge.exe 89 PID 1244 wrote to memory of 1736 1244 msedge.exe 89 PID 1244 wrote to memory of 1736 1244 msedge.exe 89 PID 1244 wrote to memory of 1736 1244 msedge.exe 89 PID 1244 wrote to memory of 1736 1244 msedge.exe 89 PID 1244 wrote to memory of 1736 1244 msedge.exe 89 PID 1244 wrote to memory of 1736 1244 msedge.exe 89 PID 1244 wrote to memory of 1736 1244 msedge.exe 89 PID 1244 wrote to memory of 1736 1244 msedge.exe 89 PID 1244 wrote to memory of 1736 1244 msedge.exe 89 PID 1244 wrote to memory of 1736 1244 msedge.exe 89 PID 1244 wrote to memory of 1736 1244 msedge.exe 89 PID 1244 wrote to memory of 1736 1244 msedge.exe 89 PID 1244 wrote to memory of 1736 1244 msedge.exe 89 PID 1244 wrote to memory of 1736 1244 msedge.exe 89 PID 1244 wrote to memory of 1736 1244 msedge.exe 89 PID 1244 wrote to memory of 1736 1244 msedge.exe 89 PID 1244 wrote to memory of 1736 1244 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\c8c03c701d60dd09e5f36837136a5353_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffeadb946f8,0x7ffeadb94708,0x7ffeadb947182⤵PID:2924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,5775333434074607594,17781958383982448061,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:22⤵PID:3280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,5775333434074607594,17781958383982448061,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2228 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,5775333434074607594,17781958383982448061,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2896 /prefetch:82⤵PID:1736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,5775333434074607594,17781958383982448061,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,5775333434074607594,17781958383982448061,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:12⤵PID:208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,5775333434074607594,17781958383982448061,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4712 /prefetch:12⤵PID:2660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,5775333434074607594,17781958383982448061,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5780 /prefetch:12⤵PID:2416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,5775333434074607594,17781958383982448061,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5796 /prefetch:12⤵PID:3756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,5775333434074607594,17781958383982448061,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6116 /prefetch:82⤵PID:1880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,5775333434074607594,17781958383982448061,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6116 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,5775333434074607594,17781958383982448061,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4780 /prefetch:12⤵PID:5088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,5775333434074607594,17781958383982448061,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6036 /prefetch:12⤵PID:3976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,5775333434074607594,17781958383982448061,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5896 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5644
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3860
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2376
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ff63763eedb406987ced076e36ec9acf
SHA116365aa97cd1a115412f8ae436d5d4e9be5f7b5d
SHA2568f460e8b7a67f0c65b7248961a7c71146c9e7a19772b193972b486dbf05b8e4c
SHA512ce90336169c8b2de249d4faea2519bf7c3df48ae9d77cdf471dd5dbd8e8542d47d9348080a098074aa63c255890850ee3b80ddb8eef8384919fdca3bb9371d9f
-
Filesize
152B
MD52783c40400a8912a79cfd383da731086
SHA1001a131fe399c30973089e18358818090ca81789
SHA256331fa67da5f67bbb42794c3aeab8f7819f35347460ffb352ccc914e0373a22c5
SHA512b7c7d3aa966ad39a86aae02479649d74dcbf29d9cb3a7ff8b9b2354ea60704da55f5c0df803fd0a7191170a8e72fdd5eacfa1a739d7a74e390a7b74bdced1685
-
Filesize
23KB
MD533a83c16527e4531fbfca2631f653674
SHA187a63514c262ba4bffc52d2ceebb3ca14353507a
SHA2561156bb50a264543f6a9dc8922dd2c65d444c8bb11b3b18be95d5adff840b33b4
SHA512f1dba28d0f81aa0894436ae7b4ba76a2e635f002f666d17d31b8b21500dc2321d7862ca8dcfd22e44aab4d1f33112c076dc95191c889546a40f9c6197cccbda3
-
Filesize
45KB
MD5aa6a698d1c7fc6d35265b10af5570e9c
SHA100da372ad4964a5d5b8afff7fe1b207ff284f232
SHA25602f6ae7bda59fb1a20d3386021fb972ced348bf724fea42157225d416f9f049a
SHA512f5b2f732e899cc0fed577e1ef1c51c154ede5d206543e8ac7c1fabb182901f8e93e137b63f12cbb87b3f570a283a368bfb1b9d637cc5b1c4f1669ff5cfbf306b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD5e8a13efee7b228bd3c00caf143d330ce
SHA133ffcffe839b01400a8fd0cd7a654d5685964d4c
SHA2562c650dfa579806f9cb3269a782b63bce523ee90149c7ffb93a1635126e6993c1
SHA512b743784ef4791f090654603afde6bd1fd4eefdf913eeca0a04e717f3962335ff5bff2223af2c4dab11480dba382f33716ab21f8c3f222c6f228a26b5fa595cf8
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
1KB
MD5d6b9537d434aacb900102584e3a763a7
SHA1e28318415845134eb9facdc771318d4cc618b4fb
SHA25675c386defb4d280ddab8ffff1201ac854fd3aa6bc0d723723a2dc68c335ee6d0
SHA5128863eae3e90a62b1011504b7d82e224718096e93be495e9a8a7ab5617084d0e26a9f5488b96f399ee821ef684d74515a30305171e79613fec57dea80a384f425
-
Filesize
5KB
MD52993ddae70afa77ca5be19d896f87b11
SHA150e64bdb3f95714100c021f4a61a153b4c9f0bbf
SHA25674e5a3a18eec86f86e52955d1e2fc4caf06dfc594e89d7bf25c245fcd4b28f1f
SHA512347905a92b45327899535d98cd21581e36d8861ba866eab2925c0bbde6c4511dc0ad4f6993d34fe3ac35e1497dd5f7cbb4e2669dec48acb3fdbdf25ac0e0646d
-
Filesize
6KB
MD5a1f4f57145d2c6b0cc525e7861ca23e0
SHA12b54918ec063896438933ba6e7a6e499c5b4f183
SHA25687808e3d3fef1073d353a402ee1edd01a06c36f409414caf4f247661779f44e6
SHA512e4946800b95e6214e19a9db9ca1801a5e25b9366ffb084fcf94cb4ee36d85d288b5f02c32fde2a9e1d592eaa5675cc576a998b8a9f0fa3343d709ff06d5b68a8
-
Filesize
6KB
MD5d43767b2e2ad07c7233349d12dbbd482
SHA1deab04d0ac510734aa8fc03f5b253cbd61f1c4cb
SHA2568b012531f5256b89ca969bd69c180bad47d076313343d185c31370c7e0192a58
SHA51239138370bc0678743642622523110688840e9767c370172c531783ce9e754198bc804271bd67eab12c8875b507b9be85e58a78d6a12c1b78406c6bf8c5c2629e
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD57e5e1734ba615578263a93ea21cb5469
SHA1c4e3f11c270c2f459cf3e04405fa14ec2479acb2
SHA256b0b9a30aff14bcfcc75b1f150f7a7c6450c008e71cdef85d5120d26eceab0040
SHA5120af4d33db34c4332d619a2365c2ed00bcd31808a0f821c61ae3830cf0ed9b4c281e7ee13fa751364bc44e4d33d562c07337381654683a73ac4d13f2a8ededf43