Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02-10-2024 04:06
Static task
static1
Behavioral task
behavioral1
Sample
08cbf5de051eaa34deac9e1acc9beb25_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
08cbf5de051eaa34deac9e1acc9beb25_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
08cbf5de051eaa34deac9e1acc9beb25_JaffaCakes118.html
-
Size
69KB
-
MD5
08cbf5de051eaa34deac9e1acc9beb25
-
SHA1
54bddfb2866dcc4ca73eeadd21ce9bd4d5aa6850
-
SHA256
a0c9275d823052d5d02b973a36e40c3189177170d214fe1aa7ee40d53878e78f
-
SHA512
b7f15cc5abbc50f145d6d7a16a772f72f8d67040041a1768fff3b3f01cd773b8928b275cc3ef7b972ea24ecdca2f7e95045f701583136d4fd91a96c4cd1aab2f
-
SSDEEP
1536:gQZBCCOdx0IxCJxBxD+CFt3XVgf6Iqtjld9M03zPOssz2rtvhITMaCI/TejwS8ar:gk2D0IxAxD+CFt3XVgf6Iqtjld9M03zT
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 708 msedge.exe 708 msedge.exe 996 msedge.exe 996 msedge.exe 216 identity_helper.exe 216 identity_helper.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe 2804 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 996 wrote to memory of 3296 996 msedge.exe 82 PID 996 wrote to memory of 3296 996 msedge.exe 82 PID 996 wrote to memory of 2792 996 msedge.exe 83 PID 996 wrote to memory of 2792 996 msedge.exe 83 PID 996 wrote to memory of 2792 996 msedge.exe 83 PID 996 wrote to memory of 2792 996 msedge.exe 83 PID 996 wrote to memory of 2792 996 msedge.exe 83 PID 996 wrote to memory of 2792 996 msedge.exe 83 PID 996 wrote to memory of 2792 996 msedge.exe 83 PID 996 wrote to memory of 2792 996 msedge.exe 83 PID 996 wrote to memory of 2792 996 msedge.exe 83 PID 996 wrote to memory of 2792 996 msedge.exe 83 PID 996 wrote to memory of 2792 996 msedge.exe 83 PID 996 wrote to memory of 2792 996 msedge.exe 83 PID 996 wrote to memory of 2792 996 msedge.exe 83 PID 996 wrote to memory of 2792 996 msedge.exe 83 PID 996 wrote to memory of 2792 996 msedge.exe 83 PID 996 wrote to memory of 2792 996 msedge.exe 83 PID 996 wrote to memory of 2792 996 msedge.exe 83 PID 996 wrote to memory of 2792 996 msedge.exe 83 PID 996 wrote to memory of 2792 996 msedge.exe 83 PID 996 wrote to memory of 2792 996 msedge.exe 83 PID 996 wrote to memory of 2792 996 msedge.exe 83 PID 996 wrote to memory of 2792 996 msedge.exe 83 PID 996 wrote to memory of 2792 996 msedge.exe 83 PID 996 wrote to memory of 2792 996 msedge.exe 83 PID 996 wrote to memory of 2792 996 msedge.exe 83 PID 996 wrote to memory of 2792 996 msedge.exe 83 PID 996 wrote to memory of 2792 996 msedge.exe 83 PID 996 wrote to memory of 2792 996 msedge.exe 83 PID 996 wrote to memory of 2792 996 msedge.exe 83 PID 996 wrote to memory of 2792 996 msedge.exe 83 PID 996 wrote to memory of 2792 996 msedge.exe 83 PID 996 wrote to memory of 2792 996 msedge.exe 83 PID 996 wrote to memory of 2792 996 msedge.exe 83 PID 996 wrote to memory of 2792 996 msedge.exe 83 PID 996 wrote to memory of 2792 996 msedge.exe 83 PID 996 wrote to memory of 2792 996 msedge.exe 83 PID 996 wrote to memory of 2792 996 msedge.exe 83 PID 996 wrote to memory of 2792 996 msedge.exe 83 PID 996 wrote to memory of 2792 996 msedge.exe 83 PID 996 wrote to memory of 2792 996 msedge.exe 83 PID 996 wrote to memory of 708 996 msedge.exe 84 PID 996 wrote to memory of 708 996 msedge.exe 84 PID 996 wrote to memory of 2200 996 msedge.exe 85 PID 996 wrote to memory of 2200 996 msedge.exe 85 PID 996 wrote to memory of 2200 996 msedge.exe 85 PID 996 wrote to memory of 2200 996 msedge.exe 85 PID 996 wrote to memory of 2200 996 msedge.exe 85 PID 996 wrote to memory of 2200 996 msedge.exe 85 PID 996 wrote to memory of 2200 996 msedge.exe 85 PID 996 wrote to memory of 2200 996 msedge.exe 85 PID 996 wrote to memory of 2200 996 msedge.exe 85 PID 996 wrote to memory of 2200 996 msedge.exe 85 PID 996 wrote to memory of 2200 996 msedge.exe 85 PID 996 wrote to memory of 2200 996 msedge.exe 85 PID 996 wrote to memory of 2200 996 msedge.exe 85 PID 996 wrote to memory of 2200 996 msedge.exe 85 PID 996 wrote to memory of 2200 996 msedge.exe 85 PID 996 wrote to memory of 2200 996 msedge.exe 85 PID 996 wrote to memory of 2200 996 msedge.exe 85 PID 996 wrote to memory of 2200 996 msedge.exe 85 PID 996 wrote to memory of 2200 996 msedge.exe 85 PID 996 wrote to memory of 2200 996 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\08cbf5de051eaa34deac9e1acc9beb25_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:996 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe72da46f8,0x7ffe72da4708,0x7ffe72da47182⤵PID:3296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,2616487575878235101,7072236447433519608,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:22⤵PID:2792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,2616487575878235101,7072236447433519608,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2212 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,2616487575878235101,7072236447433519608,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2816 /prefetch:82⤵PID:2200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,2616487575878235101,7072236447433519608,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:1896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,2616487575878235101,7072236447433519608,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:2716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,2616487575878235101,7072236447433519608,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4156 /prefetch:12⤵PID:2708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,2616487575878235101,7072236447433519608,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4320 /prefetch:12⤵PID:1416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,2616487575878235101,7072236447433519608,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5072 /prefetch:12⤵PID:2832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,2616487575878235101,7072236447433519608,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5976 /prefetch:82⤵PID:3904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,2616487575878235101,7072236447433519608,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5976 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,2616487575878235101,7072236447433519608,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6024 /prefetch:12⤵PID:2712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,2616487575878235101,7072236447433519608,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5448 /prefetch:12⤵PID:4460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,2616487575878235101,7072236447433519608,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4108 /prefetch:12⤵PID:356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,2616487575878235101,7072236447433519608,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5656 /prefetch:12⤵PID:1128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,2616487575878235101,7072236447433519608,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2216 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2804
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2388
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3244
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e4f80e7950cbd3bb11257d2000cb885e
SHA110ac643904d539042d8f7aa4a312b13ec2106035
SHA2561184ee8d32d0edecddd93403fb888fad6b3e2a710d37335c3989cc529bc08124
SHA5122b92c9807fdcd937e514d4e7e1cc7c2d3e3aa162099b7289ceac2feea72d1a4afbadf1c09b3075d470efadf9a9edd63e07ea7e7a98d22243e45b3d53473fa4f0
-
Filesize
152B
MD52dc1a9f2f3f8c3cfe51bb29b078166c5
SHA1eaf3c3dad3c8dc6f18dc3e055b415da78b704402
SHA256dcb76fa365c2d9ee213b224a91cdd806d30b1e8652d72a22f2371124fa4479fa
SHA512682061d9cc86a6e5d99d022da776fb554350fc95efbf29cd84c1db4e2b7161b76cd1de48335bcc3a25633079fb0bd412e4f4795ed6291c65e9bc28d95330bb25
-
Filesize
213KB
MD5f942900ff0a10f251d338c612c456948
SHA14a283d3c8f3dc491e43c430d97c3489ee7a3d320
SHA25638b76a54655aff71271a9ad376ac17f20187abd581bf5aced69ccde0fe6e2fd6
SHA5129b393ce73598ed1997d28ceeddb23491a4d986c337984878ebb0ae06019e30ea77448d375d3d6563c774856d6bc98ee3ca0e0ba88ea5769a451a5e814f6ddb41
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize504B
MD58cedac34b6302f1c5735a49c20d0f527
SHA1cb6bdde876b2624a77585afefbed3c0d20b3e36f
SHA2567588ab6653a74422e967af80132779f752a5c5e0b75d015642b80f33cdf00b62
SHA512ff2f1d39bdbc675d88154a416c48689fca1c94900e3e309f19590cb4c1c8fd6380d63ddc8ea42bc06b84af601f991a92129164b6b5b0adac9dabc1792811fee0
-
Filesize
1KB
MD504259b7bf950e64e243ecd34440eef0a
SHA1783e0d326e21d8220c008ced22fe4fc8985c3d27
SHA25694c5a736266c7fc307e05d4fa199231fb25802eaa08cc5138ca4608aec7064f2
SHA51291d80c9f5162b72d2a289c369a48fdbf23fb7f246a772e1be2ca44bb105dbfaf4be43f63e6b9b73df13b87a5401d67e4c337433e6a820b15dd7b1288d18e620a
-
Filesize
6KB
MD5f3562c209ef2406f4925d16fdb01707b
SHA12ce751edd1c33b881ee77120af8a5210819fa62b
SHA256f1beafcf78a2116c5c903b10125c7140ec70a2ae75e75a92a16622ad9c12aa7f
SHA5129d6d3877c83204af572b3d568d0aa397949d34b6d0d79f1ef86a82dd9da00e407b19433af74e5efc61713b35ee1050c6e9eb9ad3c04b7b85b6432885f51cfc67
-
Filesize
5KB
MD5cd63fa7971cd962401af20d3315f1eea
SHA12d54b84aa32357846add7be8c0d60c897ab78f3e
SHA25693d03c8ae788229b763d6dd42164f7b507a9efacba65d1600def2484daed8dc6
SHA512984a2ae304b3b8f52d6de86290de043ab28887ead5c3b16f29cc37d8073236468136fecc57cad362c2b735583af181adc80446ce648e35efb68c6c390e368fcd
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5e066e84c4ec468b16f23b1937648e7e0
SHA1a1032e10497d83f76ae26bcf19efa4f0ac6f59da
SHA256e1f8a8dfa87ff70704728967d1905dcb6afc37d4bde9a482d18abbde6348f02d
SHA51205b282177331c245be78436ac111cecc34ffb3b6dc6be1246b00a6d329e92497935b2fc701236ac680a138fb9f1e384158de4aa79adefcdbdd3f4fbade75717d