Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06-09-2024 10:20
Static task
static1
Behavioral task
behavioral1
Sample
cf5252088fea2f616763efc952d0ae9a_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
cf5252088fea2f616763efc952d0ae9a_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
cf5252088fea2f616763efc952d0ae9a_JaffaCakes118.html
-
Size
57KB
-
MD5
cf5252088fea2f616763efc952d0ae9a
-
SHA1
608afd85d45d29dddee7143cdbba810da2e3832e
-
SHA256
973384b89642bd81f43422da30e0c09998b540196285a589fdec97feb281639d
-
SHA512
5d23178a17b9545712615a8ad42a61adcd134213852220143699f64eb497c5446382ce5ec6a966726df0fff706ac3ac828e040aae52a73abb510c9f687f51cd8
-
SSDEEP
1536:ijEQvK8OPHdsASo2vgyHJv0owbd6zKD6CDK2RVrobQwpDK2RVy:ijnOPHdso2vgyHJutDK2RVrobQwpDK2m
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1004 msedge.exe 1004 msedge.exe 3184 msedge.exe 3184 msedge.exe 2664 identity_helper.exe 2664 identity_helper.exe 5280 msedge.exe 5280 msedge.exe 5280 msedge.exe 5280 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3184 wrote to memory of 732 3184 msedge.exe 83 PID 3184 wrote to memory of 732 3184 msedge.exe 83 PID 3184 wrote to memory of 1876 3184 msedge.exe 84 PID 3184 wrote to memory of 1876 3184 msedge.exe 84 PID 3184 wrote to memory of 1876 3184 msedge.exe 84 PID 3184 wrote to memory of 1876 3184 msedge.exe 84 PID 3184 wrote to memory of 1876 3184 msedge.exe 84 PID 3184 wrote to memory of 1876 3184 msedge.exe 84 PID 3184 wrote to memory of 1876 3184 msedge.exe 84 PID 3184 wrote to memory of 1876 3184 msedge.exe 84 PID 3184 wrote to memory of 1876 3184 msedge.exe 84 PID 3184 wrote to memory of 1876 3184 msedge.exe 84 PID 3184 wrote to memory of 1876 3184 msedge.exe 84 PID 3184 wrote to memory of 1876 3184 msedge.exe 84 PID 3184 wrote to memory of 1876 3184 msedge.exe 84 PID 3184 wrote to memory of 1876 3184 msedge.exe 84 PID 3184 wrote to memory of 1876 3184 msedge.exe 84 PID 3184 wrote to memory of 1876 3184 msedge.exe 84 PID 3184 wrote to memory of 1876 3184 msedge.exe 84 PID 3184 wrote to memory of 1876 3184 msedge.exe 84 PID 3184 wrote to memory of 1876 3184 msedge.exe 84 PID 3184 wrote to memory of 1876 3184 msedge.exe 84 PID 3184 wrote to memory of 1876 3184 msedge.exe 84 PID 3184 wrote to memory of 1876 3184 msedge.exe 84 PID 3184 wrote to memory of 1876 3184 msedge.exe 84 PID 3184 wrote to memory of 1876 3184 msedge.exe 84 PID 3184 wrote to memory of 1876 3184 msedge.exe 84 PID 3184 wrote to memory of 1876 3184 msedge.exe 84 PID 3184 wrote to memory of 1876 3184 msedge.exe 84 PID 3184 wrote to memory of 1876 3184 msedge.exe 84 PID 3184 wrote to memory of 1876 3184 msedge.exe 84 PID 3184 wrote to memory of 1876 3184 msedge.exe 84 PID 3184 wrote to memory of 1876 3184 msedge.exe 84 PID 3184 wrote to memory of 1876 3184 msedge.exe 84 PID 3184 wrote to memory of 1876 3184 msedge.exe 84 PID 3184 wrote to memory of 1876 3184 msedge.exe 84 PID 3184 wrote to memory of 1876 3184 msedge.exe 84 PID 3184 wrote to memory of 1876 3184 msedge.exe 84 PID 3184 wrote to memory of 1876 3184 msedge.exe 84 PID 3184 wrote to memory of 1876 3184 msedge.exe 84 PID 3184 wrote to memory of 1876 3184 msedge.exe 84 PID 3184 wrote to memory of 1876 3184 msedge.exe 84 PID 3184 wrote to memory of 1004 3184 msedge.exe 85 PID 3184 wrote to memory of 1004 3184 msedge.exe 85 PID 3184 wrote to memory of 4928 3184 msedge.exe 86 PID 3184 wrote to memory of 4928 3184 msedge.exe 86 PID 3184 wrote to memory of 4928 3184 msedge.exe 86 PID 3184 wrote to memory of 4928 3184 msedge.exe 86 PID 3184 wrote to memory of 4928 3184 msedge.exe 86 PID 3184 wrote to memory of 4928 3184 msedge.exe 86 PID 3184 wrote to memory of 4928 3184 msedge.exe 86 PID 3184 wrote to memory of 4928 3184 msedge.exe 86 PID 3184 wrote to memory of 4928 3184 msedge.exe 86 PID 3184 wrote to memory of 4928 3184 msedge.exe 86 PID 3184 wrote to memory of 4928 3184 msedge.exe 86 PID 3184 wrote to memory of 4928 3184 msedge.exe 86 PID 3184 wrote to memory of 4928 3184 msedge.exe 86 PID 3184 wrote to memory of 4928 3184 msedge.exe 86 PID 3184 wrote to memory of 4928 3184 msedge.exe 86 PID 3184 wrote to memory of 4928 3184 msedge.exe 86 PID 3184 wrote to memory of 4928 3184 msedge.exe 86 PID 3184 wrote to memory of 4928 3184 msedge.exe 86 PID 3184 wrote to memory of 4928 3184 msedge.exe 86 PID 3184 wrote to memory of 4928 3184 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\cf5252088fea2f616763efc952d0ae9a_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3184 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff83db846f8,0x7ff83db84708,0x7ff83db847182⤵PID:732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,17112583342772415273,17180511837096102132,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2144 /prefetch:22⤵PID:1876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,17112583342772415273,17180511837096102132,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2136,17112583342772415273,17180511837096102132,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2860 /prefetch:82⤵PID:4928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,17112583342772415273,17180511837096102132,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:2668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,17112583342772415273,17180511837096102132,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,17112583342772415273,17180511837096102132,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4712 /prefetch:12⤵PID:3456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,17112583342772415273,17180511837096102132,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5328 /prefetch:12⤵PID:2156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,17112583342772415273,17180511837096102132,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5512 /prefetch:12⤵PID:1504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,17112583342772415273,17180511837096102132,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3388 /prefetch:12⤵PID:2808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,17112583342772415273,17180511837096102132,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5968 /prefetch:82⤵PID:2168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,17112583342772415273,17180511837096102132,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5968 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,17112583342772415273,17180511837096102132,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5992 /prefetch:12⤵PID:3328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,17112583342772415273,17180511837096102132,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6072 /prefetch:12⤵PID:4092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,17112583342772415273,17180511837096102132,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6404 /prefetch:12⤵PID:2808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,17112583342772415273,17180511837096102132,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5012 /prefetch:12⤵PID:4912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,17112583342772415273,17180511837096102132,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2744 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5280
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2128
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:876
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f9664c896e19205022c094d725f820b6
SHA1f8f1baf648df755ba64b412d512446baf88c0184
SHA2567121d84202a850791c2320385eb59eda4d697310dc51b1fcd4d51264aba2434e
SHA5123fa5d2c68a9e70e4a25eaac2095171d87c741eec2624c314c6a56f4fa390d6319633bf4c48b1a4af7e9a0451f346beced9693da88cfc7bcba8dfe209cbd1b3ae
-
Filesize
152B
MD5847d47008dbea51cb1732d54861ba9c9
SHA1f2099242027dccb88d6f05760b57f7c89d926c0d
SHA25610292fa05d896a2952c1d602a72d761d34bc776b44d6a7df87e49b5b613a8ac1
SHA512bd1526aa1cc1c016d95dfcc53a78b45b09dde4ce67357fc275ab835dbe1bb5b053ca386239f50cde95ad243a9c1bbb12f7505818577589beecc6084f7b94e83f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize816B
MD540e020c6bbea0b28b66f5f7f8b00ae82
SHA1f2deb1285431537469df7884733afb464d4bda18
SHA256e6ae6e8811be40ad48a4ec0f55dcc502af409266abdc8ef1a6bba66245547c60
SHA512bbe79c22729929ea1bbf1c2cff264857e2f7754ec864db6d905c1fc37a18fda165d5c7cc77a8f549c397b29effd1e353b9ae6ac280e0029feb0a0496b5d7b9db
-
Filesize
1KB
MD52fc170354280693c3b6ef3cd614bb1dd
SHA1755060cb643f5dc296d4d75ae72c10b0c913ab84
SHA25675f80859fad67dd127d23eeb2c946c0b5c815815625a7ed44fbdcb74987f3f14
SHA512be57338f823e64e1ba8bad896a4f67b3ee7f4e54e54e02c5de64344bc89958ab245deb7185ba397553999e51838fdf31d4e1440f60cf4745aebb484b976f095f
-
Filesize
5KB
MD561b86283390bf72d4eb500ab927a28b6
SHA156346847d00b93675546fd0447da66e61e105499
SHA25670b06a3e893f7733a9369da66e46a31de66ec8a451fb86f110b75b884778bcf4
SHA5123f2098b2ab657fed392aec6cf18bf0d7e4647ab16f41bae187b4ab6989b837bd7c1b0dc87b2e6ad29312ebb7f98fd6d651b2df505df873fdbfebf8278bad9e1e
-
Filesize
6KB
MD5d0e2d6d172d488fa6cff5ffe8764ef1a
SHA121e1526709023524371ae54abb87aa841fc52bd9
SHA25623f912c7fd37dcc098c27e7e72f391ccdb9ea84da89dd7b3fd8fc28ac150fa63
SHA5125ad2b60f79cbdbde2e47546d21c020865a150e613187094bc0dcbf398c78d270f4ac7ed294cab799d9c3fce1cc2e9c0847397f9f79705d0fc09ee67dd77df438
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD51ecd2cb8614e5a3a7d4eb736055f65c6
SHA17f2b4da06541c98d795c8211ff3d9258ad07af1c
SHA2567aa7736fd53061d2c97bab12def31e6dab3b918bdd3b2e31d2633edc5040396c
SHA51227bb3f47b17786e96590afea08aab00c9b92ceb8e79aa4f6a570b0111253c01753c9e37508bdcb827fc13cf75d9b33aa5f033a532e22e46d899b6b30764b2022