Analysis
-
max time kernel
145s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02/10/2024, 04:13
Static task
static1
Behavioral task
behavioral1
Sample
08d428eeff43184656c67b1c6f918ca4_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
08d428eeff43184656c67b1c6f918ca4_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
08d428eeff43184656c67b1c6f918ca4_JaffaCakes118.html
-
Size
26KB
-
MD5
08d428eeff43184656c67b1c6f918ca4
-
SHA1
0888d4df648382019bba131de9d3a314ca6fc5d8
-
SHA256
b744911b1fa8bf4f7c8f9370ba074116068a797dedb165274468f16d844aae31
-
SHA512
5163027ba04ce3cf338873de4af99719c00145c88f2dc83cee2822fb16bdaf4291bae8adcbe478c1a5baf522216b4ded2d7f4ec498959bbaf855fddc43477ed3
-
SSDEEP
384:4+QfPFd9QZBC7mOdMU0BKfpC5IgSnbmFe7Acjq6ikkJvAgo0icAHPd:Zcd9QZBC7mOdMUZpC5I9nC4oIP0icUPd
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1216 msedge.exe 1216 msedge.exe 4568 msedge.exe 4568 msedge.exe 4664 identity_helper.exe 4664 identity_helper.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe 4568 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4568 wrote to memory of 4468 4568 msedge.exe 85 PID 4568 wrote to memory of 4468 4568 msedge.exe 85 PID 4568 wrote to memory of 4436 4568 msedge.exe 86 PID 4568 wrote to memory of 4436 4568 msedge.exe 86 PID 4568 wrote to memory of 4436 4568 msedge.exe 86 PID 4568 wrote to memory of 4436 4568 msedge.exe 86 PID 4568 wrote to memory of 4436 4568 msedge.exe 86 PID 4568 wrote to memory of 4436 4568 msedge.exe 86 PID 4568 wrote to memory of 4436 4568 msedge.exe 86 PID 4568 wrote to memory of 4436 4568 msedge.exe 86 PID 4568 wrote to memory of 4436 4568 msedge.exe 86 PID 4568 wrote to memory of 4436 4568 msedge.exe 86 PID 4568 wrote to memory of 4436 4568 msedge.exe 86 PID 4568 wrote to memory of 4436 4568 msedge.exe 86 PID 4568 wrote to memory of 4436 4568 msedge.exe 86 PID 4568 wrote to memory of 4436 4568 msedge.exe 86 PID 4568 wrote to memory of 4436 4568 msedge.exe 86 PID 4568 wrote to memory of 4436 4568 msedge.exe 86 PID 4568 wrote to memory of 4436 4568 msedge.exe 86 PID 4568 wrote to memory of 4436 4568 msedge.exe 86 PID 4568 wrote to memory of 4436 4568 msedge.exe 86 PID 4568 wrote to memory of 4436 4568 msedge.exe 86 PID 4568 wrote to memory of 4436 4568 msedge.exe 86 PID 4568 wrote to memory of 4436 4568 msedge.exe 86 PID 4568 wrote to memory of 4436 4568 msedge.exe 86 PID 4568 wrote to memory of 4436 4568 msedge.exe 86 PID 4568 wrote to memory of 4436 4568 msedge.exe 86 PID 4568 wrote to memory of 4436 4568 msedge.exe 86 PID 4568 wrote to memory of 4436 4568 msedge.exe 86 PID 4568 wrote to memory of 4436 4568 msedge.exe 86 PID 4568 wrote to memory of 4436 4568 msedge.exe 86 PID 4568 wrote to memory of 4436 4568 msedge.exe 86 PID 4568 wrote to memory of 4436 4568 msedge.exe 86 PID 4568 wrote to memory of 4436 4568 msedge.exe 86 PID 4568 wrote to memory of 4436 4568 msedge.exe 86 PID 4568 wrote to memory of 4436 4568 msedge.exe 86 PID 4568 wrote to memory of 4436 4568 msedge.exe 86 PID 4568 wrote to memory of 4436 4568 msedge.exe 86 PID 4568 wrote to memory of 4436 4568 msedge.exe 86 PID 4568 wrote to memory of 4436 4568 msedge.exe 86 PID 4568 wrote to memory of 4436 4568 msedge.exe 86 PID 4568 wrote to memory of 4436 4568 msedge.exe 86 PID 4568 wrote to memory of 1216 4568 msedge.exe 87 PID 4568 wrote to memory of 1216 4568 msedge.exe 87 PID 4568 wrote to memory of 1936 4568 msedge.exe 88 PID 4568 wrote to memory of 1936 4568 msedge.exe 88 PID 4568 wrote to memory of 1936 4568 msedge.exe 88 PID 4568 wrote to memory of 1936 4568 msedge.exe 88 PID 4568 wrote to memory of 1936 4568 msedge.exe 88 PID 4568 wrote to memory of 1936 4568 msedge.exe 88 PID 4568 wrote to memory of 1936 4568 msedge.exe 88 PID 4568 wrote to memory of 1936 4568 msedge.exe 88 PID 4568 wrote to memory of 1936 4568 msedge.exe 88 PID 4568 wrote to memory of 1936 4568 msedge.exe 88 PID 4568 wrote to memory of 1936 4568 msedge.exe 88 PID 4568 wrote to memory of 1936 4568 msedge.exe 88 PID 4568 wrote to memory of 1936 4568 msedge.exe 88 PID 4568 wrote to memory of 1936 4568 msedge.exe 88 PID 4568 wrote to memory of 1936 4568 msedge.exe 88 PID 4568 wrote to memory of 1936 4568 msedge.exe 88 PID 4568 wrote to memory of 1936 4568 msedge.exe 88 PID 4568 wrote to memory of 1936 4568 msedge.exe 88 PID 4568 wrote to memory of 1936 4568 msedge.exe 88 PID 4568 wrote to memory of 1936 4568 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\08d428eeff43184656c67b1c6f918ca4_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4568 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb979446f8,0x7ffb97944708,0x7ffb979447182⤵PID:4468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,2424512872658526349,4591184767525178164,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2236 /prefetch:22⤵PID:4436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,2424512872658526349,4591184767525178164,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2316 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2136,2424512872658526349,4591184767525178164,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2652 /prefetch:82⤵PID:1936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,2424512872658526349,4591184767525178164,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:3784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,2424512872658526349,4591184767525178164,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:2264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,2424512872658526349,4591184767525178164,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4216 /prefetch:12⤵PID:3108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,2424512872658526349,4591184767525178164,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4884 /prefetch:12⤵PID:1848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,2424512872658526349,4591184767525178164,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5092 /prefetch:12⤵PID:1536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,2424512872658526349,4591184767525178164,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6256 /prefetch:82⤵PID:4640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,2424512872658526349,4591184767525178164,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6256 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,2424512872658526349,4591184767525178164,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5548 /prefetch:12⤵PID:2492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,2424512872658526349,4591184767525178164,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5580 /prefetch:12⤵PID:2336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,2424512872658526349,4591184767525178164,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4116 /prefetch:12⤵PID:1628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,2424512872658526349,4591184767525178164,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5052 /prefetch:12⤵PID:2708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,2424512872658526349,4591184767525178164,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4820 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2184
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1156
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3704
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5eeaa8087eba2f63f31e599f6a7b46ef4
SHA1f639519deee0766a39cfe258d2ac48e3a9d5ac03
SHA25650fe80c9435f601c30517d10f6a8a0ca6ff8ca2add7584df377371b5a5dbe2d9
SHA512eaabfad92c84f422267615c55a863af12823c5e791bdcb30cabe17f72025e07df7383cf6cf0f08e28aa18a31c2aac5985cf5281a403e22fbcc1fb5e61c49fc3c
-
Filesize
152B
MD5b9569e123772ae290f9bac07e0d31748
SHA15806ed9b301d4178a959b26d7b7ccf2c0abc6741
SHA25620ab88e23fb88186b82047cd0d6dc3cfa23422e4fd2b8f3c8437546a2a842c2b
SHA512cfad8ce716ac815b37e8cc0e30141bfb3ca7f0d4ef101289bddcf6ed3c579bc34d369f2ec2f2dab98707843015633988eb97f1e911728031dd897750b8587795
-
Filesize
213KB
MD5f942900ff0a10f251d338c612c456948
SHA14a283d3c8f3dc491e43c430d97c3489ee7a3d320
SHA25638b76a54655aff71271a9ad376ac17f20187abd581bf5aced69ccde0fe6e2fd6
SHA5129b393ce73598ed1997d28ceeddb23491a4d986c337984878ebb0ae06019e30ea77448d375d3d6563c774856d6bc98ee3ca0e0ba88ea5769a451a5e814f6ddb41
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize504B
MD59fdae9a3b2e4cfa1b442a8156fc1b31e
SHA18b39bfaf9356ae088be33d5c5630505e70a44472
SHA256e8c7b6c8077b4e88e5e48e2cb27079344750bd4dbbee597903d02a6f180900f5
SHA512f32cbd329478a59eaa1a92ec48b6ddd55c7a1ff456827b611ae0812fbecbc0d24adbf900c41564f07d1dffaadba1750f724af3e25ab1d8d68681e833687ee7b2
-
Filesize
1KB
MD51e3f2c86930b02057b106f1ea4c08431
SHA17093f41044ffd1ce88c91f910885fc2990262a60
SHA256e6eafcad74039f8d3b41ede73afb023ced220ad64e9d965cf9fffd1057ebf5fd
SHA51261eda81249b27c13b56fd503f47820ffca8ba2d474d8c025c11852915f4d9b9ba9df28fc6eee3ed94cd9a00f65f0c9ab04e1d965c5f46190389d3eab58614158
-
Filesize
6KB
MD54d9445f13a88d540c08449d30e4955c6
SHA102913a0673d3425f75f98d12ae91b6cce4613593
SHA256b3374ac2ae56708c06ce1bb1a7f9e63116909f1af0e9727725ef54755361e82d
SHA512ebd7ac43797241c3571654ada73ac185f6d2efcc1b65b36867dde40f1dba8d46e22f8360ac2472ae2ce43900f169aef888dee20607c08cf63ed33357f76b78bb
-
Filesize
6KB
MD54058e305a26417551e95e0a3afd03d9e
SHA1e1f4c3d450dda00c66cae2b348b874d6577559a4
SHA256cf24aaa9d77c9f17bc67f6483134a49cb17371747f1fa745c023f1bc6a3acc77
SHA512c078a8440d9b4fd5963a0fb82f602d10aa1b33e199b978c025f22e5e009d99ccb52ec80607a096b9c0727bf6e3b39768dad77d6576058d0496bcdeeadd918df5
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5b260c8ce5a2d2a46502fa96363e9e29d
SHA171a2d979e5004ba30991e8faafe237fb594feee9
SHA2560552f73189f0a81cf7afeab7c8dfcc29d69af70c6a4a6f89f546efe88bdb3760
SHA512e42e5e14a3d6ac72d3f92f89a0982e7f7370c6f95d63f8e26ee3cdb1eb1ce902ffcf479fdeaedcae402f26f8086dff73deb41c9cd9c337c3fe44386ba1401ad5