Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-11-2024 11:22
Static task
static1
Behavioral task
behavioral1
Sample
8b39e67eede194c5437b1dea3c7a3c9f_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
8b39e67eede194c5437b1dea3c7a3c9f_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
8b39e67eede194c5437b1dea3c7a3c9f_JaffaCakes118.html
-
Size
272KB
-
MD5
8b39e67eede194c5437b1dea3c7a3c9f
-
SHA1
5ea24ca1430bdb068d2bdf7982a3a25e1572a333
-
SHA256
20829650cea75f6235b8476923566091fd50502917ccbed13368e6cd3205e456
-
SHA512
402c419d2810adb544a6f22e820a1e9f37293a9460ad44fcf8d6e368f55de9688a2a731cd87f505174ac616c28104931c3b16dbfb3a2fdf89d1508b09f1b0e8f
-
SSDEEP
6144:Gop/Vk7yF5b66zJoWBYRrtLVeXkPCd5AiPBtLnF33dnMM3MxuTI2t8aN4YhzJRJT:Gop9k7yF5b66zJoWBYRrtLVeXkPCd5FZ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 5116 msedge.exe 5116 msedge.exe 3444 msedge.exe 3444 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe 2980 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe 3444 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3444 wrote to memory of 3104 3444 msedge.exe 84 PID 3444 wrote to memory of 3104 3444 msedge.exe 84 PID 3444 wrote to memory of 1528 3444 msedge.exe 85 PID 3444 wrote to memory of 1528 3444 msedge.exe 85 PID 3444 wrote to memory of 1528 3444 msedge.exe 85 PID 3444 wrote to memory of 1528 3444 msedge.exe 85 PID 3444 wrote to memory of 1528 3444 msedge.exe 85 PID 3444 wrote to memory of 1528 3444 msedge.exe 85 PID 3444 wrote to memory of 1528 3444 msedge.exe 85 PID 3444 wrote to memory of 1528 3444 msedge.exe 85 PID 3444 wrote to memory of 1528 3444 msedge.exe 85 PID 3444 wrote to memory of 1528 3444 msedge.exe 85 PID 3444 wrote to memory of 1528 3444 msedge.exe 85 PID 3444 wrote to memory of 1528 3444 msedge.exe 85 PID 3444 wrote to memory of 1528 3444 msedge.exe 85 PID 3444 wrote to memory of 1528 3444 msedge.exe 85 PID 3444 wrote to memory of 1528 3444 msedge.exe 85 PID 3444 wrote to memory of 1528 3444 msedge.exe 85 PID 3444 wrote to memory of 1528 3444 msedge.exe 85 PID 3444 wrote to memory of 1528 3444 msedge.exe 85 PID 3444 wrote to memory of 1528 3444 msedge.exe 85 PID 3444 wrote to memory of 1528 3444 msedge.exe 85 PID 3444 wrote to memory of 1528 3444 msedge.exe 85 PID 3444 wrote to memory of 1528 3444 msedge.exe 85 PID 3444 wrote to memory of 1528 3444 msedge.exe 85 PID 3444 wrote to memory of 1528 3444 msedge.exe 85 PID 3444 wrote to memory of 1528 3444 msedge.exe 85 PID 3444 wrote to memory of 1528 3444 msedge.exe 85 PID 3444 wrote to memory of 1528 3444 msedge.exe 85 PID 3444 wrote to memory of 1528 3444 msedge.exe 85 PID 3444 wrote to memory of 1528 3444 msedge.exe 85 PID 3444 wrote to memory of 1528 3444 msedge.exe 85 PID 3444 wrote to memory of 1528 3444 msedge.exe 85 PID 3444 wrote to memory of 1528 3444 msedge.exe 85 PID 3444 wrote to memory of 1528 3444 msedge.exe 85 PID 3444 wrote to memory of 1528 3444 msedge.exe 85 PID 3444 wrote to memory of 1528 3444 msedge.exe 85 PID 3444 wrote to memory of 1528 3444 msedge.exe 85 PID 3444 wrote to memory of 1528 3444 msedge.exe 85 PID 3444 wrote to memory of 1528 3444 msedge.exe 85 PID 3444 wrote to memory of 1528 3444 msedge.exe 85 PID 3444 wrote to memory of 1528 3444 msedge.exe 85 PID 3444 wrote to memory of 5116 3444 msedge.exe 86 PID 3444 wrote to memory of 5116 3444 msedge.exe 86 PID 3444 wrote to memory of 4784 3444 msedge.exe 87 PID 3444 wrote to memory of 4784 3444 msedge.exe 87 PID 3444 wrote to memory of 4784 3444 msedge.exe 87 PID 3444 wrote to memory of 4784 3444 msedge.exe 87 PID 3444 wrote to memory of 4784 3444 msedge.exe 87 PID 3444 wrote to memory of 4784 3444 msedge.exe 87 PID 3444 wrote to memory of 4784 3444 msedge.exe 87 PID 3444 wrote to memory of 4784 3444 msedge.exe 87 PID 3444 wrote to memory of 4784 3444 msedge.exe 87 PID 3444 wrote to memory of 4784 3444 msedge.exe 87 PID 3444 wrote to memory of 4784 3444 msedge.exe 87 PID 3444 wrote to memory of 4784 3444 msedge.exe 87 PID 3444 wrote to memory of 4784 3444 msedge.exe 87 PID 3444 wrote to memory of 4784 3444 msedge.exe 87 PID 3444 wrote to memory of 4784 3444 msedge.exe 87 PID 3444 wrote to memory of 4784 3444 msedge.exe 87 PID 3444 wrote to memory of 4784 3444 msedge.exe 87 PID 3444 wrote to memory of 4784 3444 msedge.exe 87 PID 3444 wrote to memory of 4784 3444 msedge.exe 87 PID 3444 wrote to memory of 4784 3444 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\8b39e67eede194c5437b1dea3c7a3c9f_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3444 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffad15346f8,0x7ffad1534708,0x7ffad15347182⤵PID:3104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2028,12254844566406106691,1160915352669671548,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2056 /prefetch:22⤵PID:1528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2028,12254844566406106691,1160915352669671548,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2028,12254844566406106691,1160915352669671548,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2692 /prefetch:82⤵PID:4784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,12254844566406106691,1160915352669671548,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:2412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,12254844566406106691,1160915352669671548,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:3148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,12254844566406106691,1160915352669671548,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5172 /prefetch:12⤵PID:4352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2028,12254844566406106691,1160915352669671548,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2172 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2980
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2440
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4896
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD58749e21d9d0a17dac32d5aa2027f7a75
SHA1a5d555f8b035c7938a4a864e89218c0402ab7cde
SHA256915193bd331ee9ea7c750398a37fbb552b8c5a1d90edec6293688296bda6f304
SHA512c645a41180ed01e854f197868283f9b40620dbbc813a1c122f6870db574ebc1c4917da4d320bdfd1cc67f23303a2c6d74e4f36dd9d3ffcfa92d3dfca3b7ca31a
-
Filesize
152B
MD534d2c4f40f47672ecdf6f66fea242f4a
SHA14bcad62542aeb44cae38a907d8b5a8604115ada2
SHA256b214e3affb02a2ea4469a8bbdfa8a179e7cc57cababd83b4bafae9cdbe23fa33
SHA51250fba54ec95d694211a005d0e3e6cf5b5677efa16989cbf854207a1a67e3a139f32b757c6f2ce824a48f621440b93fde60ad1dc790fcec4b76edddd0d92a75d6
-
Filesize
42KB
MD5101f2295c59a6c129b95bb68093aed06
SHA112f5843daaf99bdb874dfebaf10660c54ede2120
SHA2569b59525954d9da17ff56cac0c0cda55bb6c4df6b7550fe68565fe0d24a963ac7
SHA512f5e54b7609a1884253f1d05d9245def95b3721e1163ddabb6d32f5b31f824a218c60533eef25a6f91d8ae6fa314128ae258fdc341cf9a4f36bf378e874b5277f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize336B
MD5634a7fb9201013b5bedf942d6b253851
SHA1c7ec719bfe40fa4285856ae91c26a09051472c0b
SHA2562ca4136d0d0a145def99b1d5c135e12098e1b7a15d90ee2b3513f3efc116821e
SHA5125a047060f48e0e4a353462683846b8f88537a1c6b017467f7a1c0cf6465a53c184b49b9f76b8853bd7fa160e15880d7884b2b19d493527b8496c945f0df9d943
-
Filesize
3KB
MD5edc3b79da938d1314719549c66ded181
SHA1b3a54c3f6c4fe07fb1a3a24a6a69a0375d55da00
SHA2564068a5804b480295d4f2d27bb94d5acf0243639202c13a61ea44ced03167c78e
SHA51208c58f5e92e539ccdc4e6bd69d487b96b6c4677b0e871d6d4681625369725cde42ee9b755caf01354e2868e0c813247273636db16bf9b6bc5e9b9b95afe85cd8
-
Filesize
5KB
MD505afe785aa1644bb218e8ecff739dd95
SHA122f0c42a9765ab4997116c1338464cb2241046f6
SHA256480291a38d1310bb97957e63dd87588ff5be909db247a578360fa6fa009b0fb5
SHA512a25d1f22ae63127218d64c3ce737279b729d9db2c63bace33186fdd79d2bc61e8ae232b3b19eae40b26cb70724c82f6fa9f9214e947b869c5af0a399111cbd5a
-
Filesize
6KB
MD5cc78dc284aeaa64984580cc25c37854e
SHA11217fb53e63e1fb2ad7622efe9c09f9b634db605
SHA256f8d25ef9172791a4b1eb0103318debc1ddc7551242d7930547b4c42d584317e5
SHA5121505c5f86558142d372b01c6982e48caf958a99640371df31dee2ca684ff5d6ad1c34bba5393ed94b6a3024b5cbcda66e8a87f6cbaf74a129e1eea99244f9883
-
Filesize
371B
MD59430286531e3f2110f313442ee4f5636
SHA1c2ab2e95bc3449bcf0500e1baa2a347cdc6fa392
SHA256fe9da26408f0de0560f3d192301a60a3ed14d0575ce2e40c1e6980567f7bb7fa
SHA5129c980472d9dfbe30a8f511778d0df454627125f857b51ea3033482d55b1dd8aeb042c030ea39b21be289651c5fee83a23abddb7c942faa784c36656cb9c7ae84
-
Filesize
204B
MD5810157316ae10bc01e4ee69b3b31c345
SHA1f6bc43d058e1904981d2bf26ad10ded450fff40f
SHA256d9222e72a6d79387e07b3f8cf7495d57179c183a6511fa2d0b9c6ed6dcc1485f
SHA5121f68f8c6872fe2618e67c08c1284711dd552d238a0e528743bc10adfe008af861a5e5b4f4db329000068a38e3b25b7ee0b9d05e8dea242a853d72a66c30ec2e3
-
Filesize
10KB
MD5437c4fe0fcc1ca834e319c7a4ccaadbc
SHA1f240f4dbbc0b4d13c4d8dbd9aa2d00658096e472
SHA25632e3d5ecb89a3f8d4c7c1586b9c54e8e3c02dc32eab08daa7b7cbd389caf99c5
SHA51201696637046825ce78d99a11b52cf86557593e2dd4df3f88d5f341232b35dff70c2c775b42f96066e389d59630690836a7bce19e9b53a5a3d0366a297109e233