Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06/09/2024, 11:57
Static task
static1
Behavioral task
behavioral1
Sample
cf79d18e703fda3ccc2a7c6f9a3beea8_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cf79d18e703fda3ccc2a7c6f9a3beea8_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
cf79d18e703fda3ccc2a7c6f9a3beea8_JaffaCakes118.html
-
Size
20KB
-
MD5
cf79d18e703fda3ccc2a7c6f9a3beea8
-
SHA1
d5ef3fc147ba546ddd40d4641406a04f3b383c3a
-
SHA256
863b58fae4c0d2a35433ea390ef339c267f93209ed33eff471ae885b0a5b4228
-
SHA512
73505fee6ed45a75fa8af346f4262e4877a72a84ac9f0dc4d69dd1bb3ad105d26a80737cbf8ef4003528d57b9b098a99b0d7185ae5bc47d3cd2ab629e1310946
-
SSDEEP
384:zirKcRAa5r9DIimVBD8ccQ3RWrkYhaAtmd5WScfIk9xheKHzVc9ly:zioa5r9DYgc/3ck4hmNOIk9eKTqly
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2168 msedge.exe 2168 msedge.exe 4268 msedge.exe 4268 msedge.exe 4604 identity_helper.exe 4604 identity_helper.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4268 wrote to memory of 2844 4268 msedge.exe 84 PID 4268 wrote to memory of 2844 4268 msedge.exe 84 PID 4268 wrote to memory of 3068 4268 msedge.exe 85 PID 4268 wrote to memory of 3068 4268 msedge.exe 85 PID 4268 wrote to memory of 3068 4268 msedge.exe 85 PID 4268 wrote to memory of 3068 4268 msedge.exe 85 PID 4268 wrote to memory of 3068 4268 msedge.exe 85 PID 4268 wrote to memory of 3068 4268 msedge.exe 85 PID 4268 wrote to memory of 3068 4268 msedge.exe 85 PID 4268 wrote to memory of 3068 4268 msedge.exe 85 PID 4268 wrote to memory of 3068 4268 msedge.exe 85 PID 4268 wrote to memory of 3068 4268 msedge.exe 85 PID 4268 wrote to memory of 3068 4268 msedge.exe 85 PID 4268 wrote to memory of 3068 4268 msedge.exe 85 PID 4268 wrote to memory of 3068 4268 msedge.exe 85 PID 4268 wrote to memory of 3068 4268 msedge.exe 85 PID 4268 wrote to memory of 3068 4268 msedge.exe 85 PID 4268 wrote to memory of 3068 4268 msedge.exe 85 PID 4268 wrote to memory of 3068 4268 msedge.exe 85 PID 4268 wrote to memory of 3068 4268 msedge.exe 85 PID 4268 wrote to memory of 3068 4268 msedge.exe 85 PID 4268 wrote to memory of 3068 4268 msedge.exe 85 PID 4268 wrote to memory of 3068 4268 msedge.exe 85 PID 4268 wrote to memory of 3068 4268 msedge.exe 85 PID 4268 wrote to memory of 3068 4268 msedge.exe 85 PID 4268 wrote to memory of 3068 4268 msedge.exe 85 PID 4268 wrote to memory of 3068 4268 msedge.exe 85 PID 4268 wrote to memory of 3068 4268 msedge.exe 85 PID 4268 wrote to memory of 3068 4268 msedge.exe 85 PID 4268 wrote to memory of 3068 4268 msedge.exe 85 PID 4268 wrote to memory of 3068 4268 msedge.exe 85 PID 4268 wrote to memory of 3068 4268 msedge.exe 85 PID 4268 wrote to memory of 3068 4268 msedge.exe 85 PID 4268 wrote to memory of 3068 4268 msedge.exe 85 PID 4268 wrote to memory of 3068 4268 msedge.exe 85 PID 4268 wrote to memory of 3068 4268 msedge.exe 85 PID 4268 wrote to memory of 3068 4268 msedge.exe 85 PID 4268 wrote to memory of 3068 4268 msedge.exe 85 PID 4268 wrote to memory of 3068 4268 msedge.exe 85 PID 4268 wrote to memory of 3068 4268 msedge.exe 85 PID 4268 wrote to memory of 3068 4268 msedge.exe 85 PID 4268 wrote to memory of 3068 4268 msedge.exe 85 PID 4268 wrote to memory of 2168 4268 msedge.exe 86 PID 4268 wrote to memory of 2168 4268 msedge.exe 86 PID 4268 wrote to memory of 1856 4268 msedge.exe 87 PID 4268 wrote to memory of 1856 4268 msedge.exe 87 PID 4268 wrote to memory of 1856 4268 msedge.exe 87 PID 4268 wrote to memory of 1856 4268 msedge.exe 87 PID 4268 wrote to memory of 1856 4268 msedge.exe 87 PID 4268 wrote to memory of 1856 4268 msedge.exe 87 PID 4268 wrote to memory of 1856 4268 msedge.exe 87 PID 4268 wrote to memory of 1856 4268 msedge.exe 87 PID 4268 wrote to memory of 1856 4268 msedge.exe 87 PID 4268 wrote to memory of 1856 4268 msedge.exe 87 PID 4268 wrote to memory of 1856 4268 msedge.exe 87 PID 4268 wrote to memory of 1856 4268 msedge.exe 87 PID 4268 wrote to memory of 1856 4268 msedge.exe 87 PID 4268 wrote to memory of 1856 4268 msedge.exe 87 PID 4268 wrote to memory of 1856 4268 msedge.exe 87 PID 4268 wrote to memory of 1856 4268 msedge.exe 87 PID 4268 wrote to memory of 1856 4268 msedge.exe 87 PID 4268 wrote to memory of 1856 4268 msedge.exe 87 PID 4268 wrote to memory of 1856 4268 msedge.exe 87 PID 4268 wrote to memory of 1856 4268 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\cf79d18e703fda3ccc2a7c6f9a3beea8_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4268 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9feca46f8,0x7ff9feca4708,0x7ff9feca47182⤵PID:2844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,8951374344147029940,10269877878900955667,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:22⤵PID:3068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,8951374344147029940,10269877878900955667,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,8951374344147029940,10269877878900955667,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2812 /prefetch:82⤵PID:1856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,8951374344147029940,10269877878900955667,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:1436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,8951374344147029940,10269877878900955667,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:5108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,8951374344147029940,10269877878900955667,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4696 /prefetch:12⤵PID:4104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,8951374344147029940,10269877878900955667,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5184 /prefetch:12⤵PID:4320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,8951374344147029940,10269877878900955667,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5484 /prefetch:82⤵PID:4828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,8951374344147029940,10269877878900955667,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5484 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,8951374344147029940,10269877878900955667,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5552 /prefetch:12⤵PID:2272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,8951374344147029940,10269877878900955667,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5564 /prefetch:12⤵PID:1440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,8951374344147029940,10269877878900955667,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5980 /prefetch:12⤵PID:4184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,8951374344147029940,10269877878900955667,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6104 /prefetch:12⤵PID:456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,8951374344147029940,10269877878900955667,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4600 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2712
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2556
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1404
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD553bc70ecb115bdbabe67620c416fe9b3
SHA1af66ec51a13a59639eaf54d62ff3b4f092bb2fc1
SHA256b36cad5c1f7bc7d07c7eaa2f3cad2959ddb5447d4d3adcb46eb6a99808e22771
SHA512cad44933b94e17908c0eb8ac5feeb53d03a7720d97e7ccc8724a1ed3021a5bece09e1f9f3cec56ce0739176ebbbeb20729e650f8bca04e5060c986b75d8e4921
-
Filesize
152B
MD5e765f3d75e6b0e4a7119c8b14d47d8da
SHA1cc9f7c7826c2e1a129e7d98884926076c3714fc0
SHA256986443556d3878258b710d9d9efbf4f25f0d764c3f83dc54217f2b12a6eccd89
SHA512a1872a849f27da78ebe9adb9beb260cb49ed5f4ca2d403f23379112bdfcd2482446a6708188100496e45db1517cdb43aba8bb93a75e605713c3f97cd716b1079
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\93733286-5ff2-45c6-acb1-39be1d7f6149.tmp
Filesize5KB
MD59f515e82e6d9759209ea5d0204e9e36b
SHA16aa51b60cf9edf398c6435eca242be3db5567a80
SHA256e2a58544a0226d4ee309db8cf027e50698ebcb332d015439de3a81b6dad38f4a
SHA512b2554d8f1736ce49dabb90b7a4cbb80c8016f9b3bb19d0c6b3bf34f7a6e8d4879b6e67d9a66d14eaedfe0ee8c5bfa09e7a0615249b3bff6adb35994fdd4d6fc6
-
Filesize
212KB
MD508ec57068db9971e917b9046f90d0e49
SHA128b80d73a861f88735d89e301fa98f2ae502e94b
SHA2567a68efe41e5d8408eed6e9d91a7b7b965a3062e4e28eeffeefb8cdba6391f4d1
SHA512b154142173145122bc49ddd7f9530149100f6f3c5fd2f2e7503b13f7b160147b8b876344f6faae5e8616208c51311633df4c578802ac5d34c005bb154e9057cf
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD594dbbaae2c9c4775c7baab2121e898a2
SHA1b73591b27a09fc3bc9a403de315942bb8f06ac48
SHA256e62743a4208d55a7fa5720753017f3ed8ec2c72257414f2c8f929df734d53af3
SHA51222409b71579280bb4e9fc8f153fa570fc0c3e59c6605f4d09922c6b98e22bed0318a7d103e590245f0544a190fe253d70f4a3a1e7e58562ea1ae99e13a939cc5
-
Filesize
1014B
MD5ea60573530e56db69112eb71b98844a1
SHA177039288785f002617c2066a0449654b7770ee4a
SHA25669aca5875cf56f643095d0f0e290f55e98cd4303997536dd329c167db5bac809
SHA512379355d41c9bc713ed7edddfb2d05ea9063cf365816eaf14df5f16fd222e64c34b3b93dd508cd5bfea8bc378b076a65af3e6a7d2bf33e39946e0a1f5e0b1ccf0
-
Filesize
6KB
MD5f6c737a3021391443d4febf02b59554c
SHA1b1c13a9a81b86635a26195166ed24b1174505a85
SHA256e5d4409d9d963569c2ebc0ccaa54c5645c036c9a0170e86433546749e9043843
SHA512457e1692ac4db733cfaf724a34fe433fcf5d96ffe84eef68787b3bc0d96ce3e412e5bd769c3aef07a011f3931d1d9adcf841f1db5830f6682719cff0886af400
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5a0f2fd4ef8b660e8ab8e411b923e3707
SHA18e07a2d4d4cb5af56c7cefdf253d7338bbd84e3f
SHA256e517d9df7c5cb73af9761b103f598a5ae8602b38a6e5440eb19ed9a80f25bdbb
SHA512e94d8572127aeb67b8d81d0c4ae098ce74e220c3d0e8847b5d72697970c0f38b3f2140ee276cc513c2b63130a6ce5a5f6fd83ef479d4e8bc19754c93ef4dc2e7