Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02/10/2024, 02:24
Static task
static1
Behavioral task
behavioral1
Sample
086e67a1cc10dabc7b68c9b01ade2cea_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
086e67a1cc10dabc7b68c9b01ade2cea_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
086e67a1cc10dabc7b68c9b01ade2cea_JaffaCakes118.html
-
Size
29KB
-
MD5
086e67a1cc10dabc7b68c9b01ade2cea
-
SHA1
5c9ace065895038bff1a1f8789718cae94e33bfa
-
SHA256
69e8fae779feb2e793960fe3777d8419da3b34bf1894c4fc3b0709f48d3ef27b
-
SHA512
8c1024b0a95aa9f48f00e075d7819d4c6d391753094b293e8377388d9162befb9b8a462ee5fd4c74b3303b473e05baff09a4d3245d9a73828e4f8db43f7c2698
-
SSDEEP
384:Sc0p04xDZw2SX+HbHDh9ZkKDlfJijwNocHTBaUzEWKwzm:Sj2ODZ3ZHrXiEKQlKAm
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2276 msedge.exe 2276 msedge.exe 4588 msedge.exe 4588 msedge.exe 1048 identity_helper.exe 1048 identity_helper.exe 2152 msedge.exe 2152 msedge.exe 2152 msedge.exe 2152 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4588 wrote to memory of 3448 4588 msedge.exe 82 PID 4588 wrote to memory of 3448 4588 msedge.exe 82 PID 4588 wrote to memory of 2000 4588 msedge.exe 83 PID 4588 wrote to memory of 2000 4588 msedge.exe 83 PID 4588 wrote to memory of 2000 4588 msedge.exe 83 PID 4588 wrote to memory of 2000 4588 msedge.exe 83 PID 4588 wrote to memory of 2000 4588 msedge.exe 83 PID 4588 wrote to memory of 2000 4588 msedge.exe 83 PID 4588 wrote to memory of 2000 4588 msedge.exe 83 PID 4588 wrote to memory of 2000 4588 msedge.exe 83 PID 4588 wrote to memory of 2000 4588 msedge.exe 83 PID 4588 wrote to memory of 2000 4588 msedge.exe 83 PID 4588 wrote to memory of 2000 4588 msedge.exe 83 PID 4588 wrote to memory of 2000 4588 msedge.exe 83 PID 4588 wrote to memory of 2000 4588 msedge.exe 83 PID 4588 wrote to memory of 2000 4588 msedge.exe 83 PID 4588 wrote to memory of 2000 4588 msedge.exe 83 PID 4588 wrote to memory of 2000 4588 msedge.exe 83 PID 4588 wrote to memory of 2000 4588 msedge.exe 83 PID 4588 wrote to memory of 2000 4588 msedge.exe 83 PID 4588 wrote to memory of 2000 4588 msedge.exe 83 PID 4588 wrote to memory of 2000 4588 msedge.exe 83 PID 4588 wrote to memory of 2000 4588 msedge.exe 83 PID 4588 wrote to memory of 2000 4588 msedge.exe 83 PID 4588 wrote to memory of 2000 4588 msedge.exe 83 PID 4588 wrote to memory of 2000 4588 msedge.exe 83 PID 4588 wrote to memory of 2000 4588 msedge.exe 83 PID 4588 wrote to memory of 2000 4588 msedge.exe 83 PID 4588 wrote to memory of 2000 4588 msedge.exe 83 PID 4588 wrote to memory of 2000 4588 msedge.exe 83 PID 4588 wrote to memory of 2000 4588 msedge.exe 83 PID 4588 wrote to memory of 2000 4588 msedge.exe 83 PID 4588 wrote to memory of 2000 4588 msedge.exe 83 PID 4588 wrote to memory of 2000 4588 msedge.exe 83 PID 4588 wrote to memory of 2000 4588 msedge.exe 83 PID 4588 wrote to memory of 2000 4588 msedge.exe 83 PID 4588 wrote to memory of 2000 4588 msedge.exe 83 PID 4588 wrote to memory of 2000 4588 msedge.exe 83 PID 4588 wrote to memory of 2000 4588 msedge.exe 83 PID 4588 wrote to memory of 2000 4588 msedge.exe 83 PID 4588 wrote to memory of 2000 4588 msedge.exe 83 PID 4588 wrote to memory of 2000 4588 msedge.exe 83 PID 4588 wrote to memory of 2276 4588 msedge.exe 84 PID 4588 wrote to memory of 2276 4588 msedge.exe 84 PID 4588 wrote to memory of 1272 4588 msedge.exe 85 PID 4588 wrote to memory of 1272 4588 msedge.exe 85 PID 4588 wrote to memory of 1272 4588 msedge.exe 85 PID 4588 wrote to memory of 1272 4588 msedge.exe 85 PID 4588 wrote to memory of 1272 4588 msedge.exe 85 PID 4588 wrote to memory of 1272 4588 msedge.exe 85 PID 4588 wrote to memory of 1272 4588 msedge.exe 85 PID 4588 wrote to memory of 1272 4588 msedge.exe 85 PID 4588 wrote to memory of 1272 4588 msedge.exe 85 PID 4588 wrote to memory of 1272 4588 msedge.exe 85 PID 4588 wrote to memory of 1272 4588 msedge.exe 85 PID 4588 wrote to memory of 1272 4588 msedge.exe 85 PID 4588 wrote to memory of 1272 4588 msedge.exe 85 PID 4588 wrote to memory of 1272 4588 msedge.exe 85 PID 4588 wrote to memory of 1272 4588 msedge.exe 85 PID 4588 wrote to memory of 1272 4588 msedge.exe 85 PID 4588 wrote to memory of 1272 4588 msedge.exe 85 PID 4588 wrote to memory of 1272 4588 msedge.exe 85 PID 4588 wrote to memory of 1272 4588 msedge.exe 85 PID 4588 wrote to memory of 1272 4588 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\086e67a1cc10dabc7b68c9b01ade2cea_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4588 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbd21b46f8,0x7ffbd21b4708,0x7ffbd21b47182⤵PID:3448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,7941132771045124498,5251549235888206293,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵PID:2000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2060,7941132771045124498,5251549235888206293,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2140 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2060,7941132771045124498,5251549235888206293,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2584 /prefetch:82⤵PID:1272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,7941132771045124498,5251549235888206293,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:4156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,7941132771045124498,5251549235888206293,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:4980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,7941132771045124498,5251549235888206293,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4848 /prefetch:12⤵PID:3028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,7941132771045124498,5251549235888206293,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5280 /prefetch:82⤵PID:184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,7941132771045124498,5251549235888206293,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5280 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,7941132771045124498,5251549235888206293,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5460 /prefetch:12⤵PID:2576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,7941132771045124498,5251549235888206293,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5476 /prefetch:12⤵PID:1776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,7941132771045124498,5251549235888206293,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6064 /prefetch:12⤵PID:4968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,7941132771045124498,5251549235888206293,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6068 /prefetch:12⤵PID:1588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,7941132771045124498,5251549235888206293,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2552 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2152
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:412
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3432
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e4f80e7950cbd3bb11257d2000cb885e
SHA110ac643904d539042d8f7aa4a312b13ec2106035
SHA2561184ee8d32d0edecddd93403fb888fad6b3e2a710d37335c3989cc529bc08124
SHA5122b92c9807fdcd937e514d4e7e1cc7c2d3e3aa162099b7289ceac2feea72d1a4afbadf1c09b3075d470efadf9a9edd63e07ea7e7a98d22243e45b3d53473fa4f0
-
Filesize
152B
MD52dc1a9f2f3f8c3cfe51bb29b078166c5
SHA1eaf3c3dad3c8dc6f18dc3e055b415da78b704402
SHA256dcb76fa365c2d9ee213b224a91cdd806d30b1e8652d72a22f2371124fa4479fa
SHA512682061d9cc86a6e5d99d022da776fb554350fc95efbf29cd84c1db4e2b7161b76cd1de48335bcc3a25633079fb0bd412e4f4795ed6291c65e9bc28d95330bb25
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD5741e76f87b7ab0e8bfce9a84038baa1a
SHA10c416145c4dc1936979cc6b938084639c09570b2
SHA256f5b520c93a2546b8d0fbdc3f2b12fd2dcf3ed3f4a9611fd941161084d6c803aa
SHA512d7dc10fa6fc9a5d4a74f86a952835a55db90e62aa8ef52ee586c79e196350ceab05b696f17c373f1b9945200a617acb262f8784bae762b4052355b42589cae01
-
Filesize
1KB
MD55485e64db4df90dd0191be43452888b9
SHA160074c4a698b407159d0e4dd49ef842c7c44e437
SHA25627af4062df902b60a537308361dc12289c33de9c40def3de434d807269f33448
SHA51241dc2f1be32ac8e4146af662267ecfda19846f209f7af0889740be3c29ba8d9da4c2757e45b410f4c306b9f17aa34d64a736025dcc4fe6f106288abe98522c14
-
Filesize
5KB
MD5e7afe72b471db3bfa1a3b9833679272d
SHA1bb05cf7c883ab68b5692c648d36940cb92a3fa6d
SHA256fdcea7e49429583f25db7e7206e4afeb2959cb34e5327fb433b8799143925add
SHA512feadf388c3737f822f9c3501c4f90c93ad1b23d2b83acb05768a2c1339af001b32f8694912778d38f65582202009caec77591e6107517cc7bb1b25e2fdd2f1ce
-
Filesize
6KB
MD5e5de780b3a4aa764e5ec0312fbaeccde
SHA1ddfc98f8bc4be712c86b873fa3e18b23c733b341
SHA2561fda619c572ac890bef148e0b653172aeeae583005fc5b884aa49eb1069d3698
SHA5128c9cdc4e4c7a6615e1c77a520c8504a6280f2559679b054f66a843fc01dffcc4e60f17fcaa13aae27f1356fc9dfe49ce703abed77e8c1778622dda0e58e27d4c
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD585ad981294f964d3c62226c85b7066fc
SHA17778cdbd91028d8214fad5ece753c12fcca30239
SHA256754f323adfcf5966cd1cc41760372253e33faa41b25c9761924aa30406d6ed7b
SHA51219b133a513e792d8cf4b30c5b439e84ee31a46c0cf761a43033f8b3aba7bb3218157629f80021a763bacf61f10425de5bb4a13f2697926ef06e9ee5559325859