Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21/09/2024, 12:15
Static task
static1
Behavioral task
behavioral1
Sample
efc5b0c668046a3a92ec506b6237b9d8_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
efc5b0c668046a3a92ec506b6237b9d8_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
efc5b0c668046a3a92ec506b6237b9d8_JaffaCakes118.html
-
Size
21KB
-
MD5
efc5b0c668046a3a92ec506b6237b9d8
-
SHA1
b8d2f0ff422889c2235c977e9963b34650002c54
-
SHA256
4aa2407034fc118bc55171c3bfe3984ee206edaa0763ba0411235e7d4ab258d1
-
SHA512
c58dd4b00423fe4965b7d212cfe199b2d2a6843d012e8a21ccef08baed0c349aea0c21bd73a5917e4387fe14b6b555482250157aaa8874d50296b1dd8e29bcdf
-
SSDEEP
384:fhskE0KCqbtD08wqR34CdhBMg5wLmTJhqnl6j0Z3+eW/:ukEXnbtD08wqbhChmTJhqoj09+eW/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4400 msedge.exe 4400 msedge.exe 3132 msedge.exe 3132 msedge.exe 2780 identity_helper.exe 2780 identity_helper.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe 2088 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe 3132 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3132 wrote to memory of 956 3132 msedge.exe 81 PID 3132 wrote to memory of 956 3132 msedge.exe 81 PID 3132 wrote to memory of 4020 3132 msedge.exe 82 PID 3132 wrote to memory of 4020 3132 msedge.exe 82 PID 3132 wrote to memory of 4020 3132 msedge.exe 82 PID 3132 wrote to memory of 4020 3132 msedge.exe 82 PID 3132 wrote to memory of 4020 3132 msedge.exe 82 PID 3132 wrote to memory of 4020 3132 msedge.exe 82 PID 3132 wrote to memory of 4020 3132 msedge.exe 82 PID 3132 wrote to memory of 4020 3132 msedge.exe 82 PID 3132 wrote to memory of 4020 3132 msedge.exe 82 PID 3132 wrote to memory of 4020 3132 msedge.exe 82 PID 3132 wrote to memory of 4020 3132 msedge.exe 82 PID 3132 wrote to memory of 4020 3132 msedge.exe 82 PID 3132 wrote to memory of 4020 3132 msedge.exe 82 PID 3132 wrote to memory of 4020 3132 msedge.exe 82 PID 3132 wrote to memory of 4020 3132 msedge.exe 82 PID 3132 wrote to memory of 4020 3132 msedge.exe 82 PID 3132 wrote to memory of 4020 3132 msedge.exe 82 PID 3132 wrote to memory of 4020 3132 msedge.exe 82 PID 3132 wrote to memory of 4020 3132 msedge.exe 82 PID 3132 wrote to memory of 4020 3132 msedge.exe 82 PID 3132 wrote to memory of 4020 3132 msedge.exe 82 PID 3132 wrote to memory of 4020 3132 msedge.exe 82 PID 3132 wrote to memory of 4020 3132 msedge.exe 82 PID 3132 wrote to memory of 4020 3132 msedge.exe 82 PID 3132 wrote to memory of 4020 3132 msedge.exe 82 PID 3132 wrote to memory of 4020 3132 msedge.exe 82 PID 3132 wrote to memory of 4020 3132 msedge.exe 82 PID 3132 wrote to memory of 4020 3132 msedge.exe 82 PID 3132 wrote to memory of 4020 3132 msedge.exe 82 PID 3132 wrote to memory of 4020 3132 msedge.exe 82 PID 3132 wrote to memory of 4020 3132 msedge.exe 82 PID 3132 wrote to memory of 4020 3132 msedge.exe 82 PID 3132 wrote to memory of 4020 3132 msedge.exe 82 PID 3132 wrote to memory of 4020 3132 msedge.exe 82 PID 3132 wrote to memory of 4020 3132 msedge.exe 82 PID 3132 wrote to memory of 4020 3132 msedge.exe 82 PID 3132 wrote to memory of 4020 3132 msedge.exe 82 PID 3132 wrote to memory of 4020 3132 msedge.exe 82 PID 3132 wrote to memory of 4020 3132 msedge.exe 82 PID 3132 wrote to memory of 4020 3132 msedge.exe 82 PID 3132 wrote to memory of 4400 3132 msedge.exe 83 PID 3132 wrote to memory of 4400 3132 msedge.exe 83 PID 3132 wrote to memory of 1292 3132 msedge.exe 84 PID 3132 wrote to memory of 1292 3132 msedge.exe 84 PID 3132 wrote to memory of 1292 3132 msedge.exe 84 PID 3132 wrote to memory of 1292 3132 msedge.exe 84 PID 3132 wrote to memory of 1292 3132 msedge.exe 84 PID 3132 wrote to memory of 1292 3132 msedge.exe 84 PID 3132 wrote to memory of 1292 3132 msedge.exe 84 PID 3132 wrote to memory of 1292 3132 msedge.exe 84 PID 3132 wrote to memory of 1292 3132 msedge.exe 84 PID 3132 wrote to memory of 1292 3132 msedge.exe 84 PID 3132 wrote to memory of 1292 3132 msedge.exe 84 PID 3132 wrote to memory of 1292 3132 msedge.exe 84 PID 3132 wrote to memory of 1292 3132 msedge.exe 84 PID 3132 wrote to memory of 1292 3132 msedge.exe 84 PID 3132 wrote to memory of 1292 3132 msedge.exe 84 PID 3132 wrote to memory of 1292 3132 msedge.exe 84 PID 3132 wrote to memory of 1292 3132 msedge.exe 84 PID 3132 wrote to memory of 1292 3132 msedge.exe 84 PID 3132 wrote to memory of 1292 3132 msedge.exe 84 PID 3132 wrote to memory of 1292 3132 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\efc5b0c668046a3a92ec506b6237b9d8_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3132 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffae86e46f8,0x7ffae86e4708,0x7ffae86e47182⤵PID:956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2188,15137667198034291310,7220502832641777461,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2220 /prefetch:22⤵PID:4020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2188,15137667198034291310,7220502832641777461,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1808 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2188,15137667198034291310,7220502832641777461,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2780 /prefetch:82⤵PID:1292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,15137667198034291310,7220502832641777461,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:3600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,15137667198034291310,7220502832641777461,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:2928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,15137667198034291310,7220502832641777461,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3856 /prefetch:12⤵PID:224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2188,15137667198034291310,7220502832641777461,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5308 /prefetch:82⤵PID:3992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2188,15137667198034291310,7220502832641777461,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5308 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,15137667198034291310,7220502832641777461,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5332 /prefetch:12⤵PID:2396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,15137667198034291310,7220502832641777461,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5388 /prefetch:12⤵PID:1852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,15137667198034291310,7220502832641777461,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3976 /prefetch:12⤵PID:3236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,15137667198034291310,7220502832641777461,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5712 /prefetch:12⤵PID:1924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2188,15137667198034291310,7220502832641777461,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1908 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2088
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4396
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2744
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2284
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e4f80e7950cbd3bb11257d2000cb885e
SHA110ac643904d539042d8f7aa4a312b13ec2106035
SHA2561184ee8d32d0edecddd93403fb888fad6b3e2a710d37335c3989cc529bc08124
SHA5122b92c9807fdcd937e514d4e7e1cc7c2d3e3aa162099b7289ceac2feea72d1a4afbadf1c09b3075d470efadf9a9edd63e07ea7e7a98d22243e45b3d53473fa4f0
-
Filesize
152B
MD52dc1a9f2f3f8c3cfe51bb29b078166c5
SHA1eaf3c3dad3c8dc6f18dc3e055b415da78b704402
SHA256dcb76fa365c2d9ee213b224a91cdd806d30b1e8652d72a22f2371124fa4479fa
SHA512682061d9cc86a6e5d99d022da776fb554350fc95efbf29cd84c1db4e2b7161b76cd1de48335bcc3a25633079fb0bd412e4f4795ed6291c65e9bc28d95330bb25
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize216B
MD5e1be54db9cffad7cb5ba013c0fae89bb
SHA1d35049b6b3cd4d029823776bd1bc3a3f8e901b46
SHA256358802e2c9f45332423c3816ca318e45f497cae12fe810b3fee2578c8fbafc71
SHA51299ca6b79800c6e75e52a69de8c11c14203518379c74d996ca28b4b7290744a4a373bdebd0cd0a4f347e392d3a29de86022ba68903edd0326632a2c56d65ae376
-
Filesize
2KB
MD5e60dc33c0b4d96cadb00ad8cb0a0cdcc
SHA14bc36b3c030313ea6c4501d1db081f684f4a9bff
SHA256d92e22a8311906f4a04b3b73f5fadc4714bf0ff6aa9c4520fb0279dbfba2a958
SHA512a58abc30b111a94d28f5f117088ad38d129a4ea3d07d7855321b6e615d167778ee74570ea87dc3785b3213a1c68f9693f4250a8e162039321ec294f565429f86
-
Filesize
2KB
MD5a7f24567eeca47920442a58c691a4687
SHA196b75af785c1a7dab1c7633c98cf1cab98e6ae9b
SHA25668f6bddc5499611e4ec09ef7b598a2c5fe508c6192333f5bb4b3b6e8cfd85e6e
SHA512fe57361155d1c5cfe2a2660ffb94548180e2a23629c547a9cdae1b1cb50d976e10076d4ecaaefad75dfe578e8179db2929daca84abad9378ac0244077a956f42
-
Filesize
5KB
MD5aa035a12d2433d635ffd01a91df89bfc
SHA15797af4ddc7a854b7da15ce94f7e810a2ecb4fb6
SHA2565955e303e90b7389e580de63343a7068aca0408546fc786a46dbea8d040c8988
SHA512f373a3072204f6f2aa25cb574c83626e45cf96a0a6f07b03043b0cac064bf979f2edcf637b6bf63473a57c2c0a86fa59ec6df3b4eca5bfc37ec50686f44f7820
-
Filesize
6KB
MD591a8b2eb679af2e1cacf5c78288585cf
SHA1f19ecf3f0ced8bcddb202e40edbb8b6fefdd03ea
SHA256e7a23535f4f9b108a99833aaaf8950c8777fe6872a3e9ee7250ae882d0f28b09
SHA512c498b6f9f5ae4e07365b834f2aa1220867dc1a59815343c84680617ffaafdf3e0c92217af4d95474266e6b99e29b84a1013f97a50bf4e0ef45696a588bb029dd
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5ea16431621c3aaebd67a8959601d5d13
SHA1fcc7590007d2d3f4f963b33eb7baff54369a05b3
SHA25634cd2eae56c5bd7e507ca5fe0aba5ad2e64b8cb912d22dee320b7ab725bf6221
SHA512bea8b26afcc9f56a249399b6e6dd246507bd20ca6a7295414eb2b6ee6c76900b761403a087232b6b5bd19a412c63980a249b4754b3b3f66f1f801283fe9c089d