Analysis
-
max time kernel
145s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-11-2024 12:14
Static task
static1
Behavioral task
behavioral1
Sample
8b6e29db08a246590976763d2bbaf597_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
8b6e29db08a246590976763d2bbaf597_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
8b6e29db08a246590976763d2bbaf597_JaffaCakes118.html
-
Size
228KB
-
MD5
8b6e29db08a246590976763d2bbaf597
-
SHA1
15e1b6b073b1a0da839e91d990f9b7929ece318f
-
SHA256
0ca0a96b78c548bced34d9ad21d6e4d56827b96d5c732074ccda14dcd5334400
-
SHA512
b2e5624d4583df521e5a37958015fc8727cb19d500f7ee74620d24254c890734acf93bc3420b311db15c9d0c0fcde3958bcfe0223d71bb3ae56122392c33d0e7
-
SSDEEP
6144:o+RELVzhXkA3d8VZQvzwV2lms5JBpknvjXGXgcHSPBaKQk:LRELVzhXkAN8VZQLfh5JBpknvjXGXgcO
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2440 msedge.exe 2440 msedge.exe 3516 msedge.exe 3516 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3516 msedge.exe 3516 msedge.exe 3516 msedge.exe 3516 msedge.exe 3516 msedge.exe 3516 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3516 msedge.exe 3516 msedge.exe 3516 msedge.exe 3516 msedge.exe 3516 msedge.exe 3516 msedge.exe 3516 msedge.exe 3516 msedge.exe 3516 msedge.exe 3516 msedge.exe 3516 msedge.exe 3516 msedge.exe 3516 msedge.exe 3516 msedge.exe 3516 msedge.exe 3516 msedge.exe 3516 msedge.exe 3516 msedge.exe 3516 msedge.exe 3516 msedge.exe 3516 msedge.exe 3516 msedge.exe 3516 msedge.exe 3516 msedge.exe 3516 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3516 msedge.exe 3516 msedge.exe 3516 msedge.exe 3516 msedge.exe 3516 msedge.exe 3516 msedge.exe 3516 msedge.exe 3516 msedge.exe 3516 msedge.exe 3516 msedge.exe 3516 msedge.exe 3516 msedge.exe 3516 msedge.exe 3516 msedge.exe 3516 msedge.exe 3516 msedge.exe 3516 msedge.exe 3516 msedge.exe 3516 msedge.exe 3516 msedge.exe 3516 msedge.exe 3516 msedge.exe 3516 msedge.exe 3516 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3516 wrote to memory of 768 3516 msedge.exe 86 PID 3516 wrote to memory of 768 3516 msedge.exe 86 PID 3516 wrote to memory of 4288 3516 msedge.exe 87 PID 3516 wrote to memory of 4288 3516 msedge.exe 87 PID 3516 wrote to memory of 4288 3516 msedge.exe 87 PID 3516 wrote to memory of 4288 3516 msedge.exe 87 PID 3516 wrote to memory of 4288 3516 msedge.exe 87 PID 3516 wrote to memory of 4288 3516 msedge.exe 87 PID 3516 wrote to memory of 4288 3516 msedge.exe 87 PID 3516 wrote to memory of 4288 3516 msedge.exe 87 PID 3516 wrote to memory of 4288 3516 msedge.exe 87 PID 3516 wrote to memory of 4288 3516 msedge.exe 87 PID 3516 wrote to memory of 4288 3516 msedge.exe 87 PID 3516 wrote to memory of 4288 3516 msedge.exe 87 PID 3516 wrote to memory of 4288 3516 msedge.exe 87 PID 3516 wrote to memory of 4288 3516 msedge.exe 87 PID 3516 wrote to memory of 4288 3516 msedge.exe 87 PID 3516 wrote to memory of 4288 3516 msedge.exe 87 PID 3516 wrote to memory of 4288 3516 msedge.exe 87 PID 3516 wrote to memory of 4288 3516 msedge.exe 87 PID 3516 wrote to memory of 4288 3516 msedge.exe 87 PID 3516 wrote to memory of 4288 3516 msedge.exe 87 PID 3516 wrote to memory of 4288 3516 msedge.exe 87 PID 3516 wrote to memory of 4288 3516 msedge.exe 87 PID 3516 wrote to memory of 4288 3516 msedge.exe 87 PID 3516 wrote to memory of 4288 3516 msedge.exe 87 PID 3516 wrote to memory of 4288 3516 msedge.exe 87 PID 3516 wrote to memory of 4288 3516 msedge.exe 87 PID 3516 wrote to memory of 4288 3516 msedge.exe 87 PID 3516 wrote to memory of 4288 3516 msedge.exe 87 PID 3516 wrote to memory of 4288 3516 msedge.exe 87 PID 3516 wrote to memory of 4288 3516 msedge.exe 87 PID 3516 wrote to memory of 4288 3516 msedge.exe 87 PID 3516 wrote to memory of 4288 3516 msedge.exe 87 PID 3516 wrote to memory of 4288 3516 msedge.exe 87 PID 3516 wrote to memory of 4288 3516 msedge.exe 87 PID 3516 wrote to memory of 4288 3516 msedge.exe 87 PID 3516 wrote to memory of 4288 3516 msedge.exe 87 PID 3516 wrote to memory of 4288 3516 msedge.exe 87 PID 3516 wrote to memory of 4288 3516 msedge.exe 87 PID 3516 wrote to memory of 4288 3516 msedge.exe 87 PID 3516 wrote to memory of 4288 3516 msedge.exe 87 PID 3516 wrote to memory of 2440 3516 msedge.exe 88 PID 3516 wrote to memory of 2440 3516 msedge.exe 88 PID 3516 wrote to memory of 5024 3516 msedge.exe 89 PID 3516 wrote to memory of 5024 3516 msedge.exe 89 PID 3516 wrote to memory of 5024 3516 msedge.exe 89 PID 3516 wrote to memory of 5024 3516 msedge.exe 89 PID 3516 wrote to memory of 5024 3516 msedge.exe 89 PID 3516 wrote to memory of 5024 3516 msedge.exe 89 PID 3516 wrote to memory of 5024 3516 msedge.exe 89 PID 3516 wrote to memory of 5024 3516 msedge.exe 89 PID 3516 wrote to memory of 5024 3516 msedge.exe 89 PID 3516 wrote to memory of 5024 3516 msedge.exe 89 PID 3516 wrote to memory of 5024 3516 msedge.exe 89 PID 3516 wrote to memory of 5024 3516 msedge.exe 89 PID 3516 wrote to memory of 5024 3516 msedge.exe 89 PID 3516 wrote to memory of 5024 3516 msedge.exe 89 PID 3516 wrote to memory of 5024 3516 msedge.exe 89 PID 3516 wrote to memory of 5024 3516 msedge.exe 89 PID 3516 wrote to memory of 5024 3516 msedge.exe 89 PID 3516 wrote to memory of 5024 3516 msedge.exe 89 PID 3516 wrote to memory of 5024 3516 msedge.exe 89 PID 3516 wrote to memory of 5024 3516 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\8b6e29db08a246590976763d2bbaf597_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3516 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbb03046f8,0x7ffbb0304708,0x7ffbb03047182⤵PID:768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2040,3816674721102961090,15439456896417486741,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵PID:4288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2040,3816674721102961090,15439456896417486741,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2040,3816674721102961090,15439456896417486741,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2740 /prefetch:82⤵PID:5024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,3816674721102961090,15439456896417486741,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:4680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,3816674721102961090,15439456896417486741,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3388 /prefetch:12⤵PID:4312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,3816674721102961090,15439456896417486741,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2116 /prefetch:12⤵PID:4304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,3816674721102961090,15439456896417486741,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6072 /prefetch:12⤵PID:5072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,3816674721102961090,15439456896417486741,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5936 /prefetch:12⤵PID:4108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,3816674721102961090,15439456896417486741,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5000 /prefetch:12⤵PID:4328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2040,3816674721102961090,15439456896417486741,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1252 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3972
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3976
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3092
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5bffcefacce25cd03f3d5c9446ddb903d
SHA18923f84aa86db316d2f5c122fe3874bbe26f3bab
SHA25623e7cbbf64c81122c3cb30a0933c10a320e254447771737a326ce37a0694d405
SHA512761dae5315b35ec0b2fe68019881397f5d2eadba3963aba79a89f8953a0cd705012d7faf3a204a5f36008926b9f614980e333351596b06ce7058d744345ce2e7
-
Filesize
152B
MD5d22073dea53e79d9b824f27ac5e9813e
SHA16d8a7281241248431a1571e6ddc55798b01fa961
SHA25686713962c3bb287964678b148ee08ea83fb83483dff8be91c8a6085ca560b2a6
SHA51297152091ee24b6e713b8ec8123cb62511f8a7e8a6c6c3f2f6727d0a60497be28814613b476009b853575d4931e5df950e28a41afbf6707cb672206f1219c4413
-
Filesize
42KB
MD5101f2295c59a6c129b95bb68093aed06
SHA112f5843daaf99bdb874dfebaf10660c54ede2120
SHA2569b59525954d9da17ff56cac0c0cda55bb6c4df6b7550fe68565fe0d24a963ac7
SHA512f5e54b7609a1884253f1d05d9245def95b3721e1163ddabb6d32f5b31f824a218c60533eef25a6f91d8ae6fa314128ae258fdc341cf9a4f36bf378e874b5277f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD53a4583a20c050c8d871e902e6c35e0c5
SHA17232483240317bc778de844250ecfad4ffe476a8
SHA2568a3a855789f0a23986e15e0724121f2aae443604d55b7f2077cbe57ec3111bd8
SHA512c2a3e3f3380156725eeacffad74a8a6b6fb74e6215429681775590ce63208a7ad009c5667f126a18ebd66ae7963366fa59729f63142c0866a39ad8fc5a546e85
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize168B
MD560198517f5bfccff1ba6fed45ac211d9
SHA1984155458ff1384bf4c31fa23785659efc8c1653
SHA2567e06a6fc5d5a801694538eeb7e69e7f7de2482f583d7512ba6fc46609fb0ae5e
SHA5123cc5fb0e4093907313ce43452af137a14eee77619e202e703eb25be3b87c2743e376aea64457d43e1f6ab561dc751bfc17891d564eb1592d57ac8adb9b8fd702
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize192B
MD561c7a8a1d682b362131f970247429321
SHA1c41c41829863e4acd6e34d2621262cd560b7b5ca
SHA256dd0b9a7a37398bdcd7c38118d35eeea366356c4e8f541a80ebda2d50d25ce89d
SHA51230d33ef18a3dd4be615a0fd61df994afedea30ee423f106a73b0d6f070a48b0f7ba36864cb1c08943ed5304962f6a396751e0856b3905917b9e22b39bd648ab1
-
Filesize
1KB
MD59831f8ad23a8eee3a1ef74da2b5e3df9
SHA18a5e21ed2e3fdc212bad3cdc38a742862bc3e030
SHA256ad8f09204fb9eac230da8cf63638f78f08c4ccbe126b6f8b804b46732a1da501
SHA512f51f0aa478999d95f5ff7d79b9b036907b29b93b2515b1e50f5615a63df4cf851bcb5663a58a46fc6c5fe631a8b4c178d3efa26726075c366685f6b0b6e7e6e9
-
Filesize
5KB
MD573b89d116ad2855f9a163c0837da340d
SHA1b21b77801b7eab7191d56d53954783a30613fa02
SHA256d5055223a0fdd6828ef5287b7051d6825ae02d332d8e52e319baa71637e534ef
SHA5124f743bfd278c885529191b2efefe39cc43b4f8fd9065a914d2cd2cd1b4446bfebe1417acfe8207f5a0671666e3f11a25422f06f94ce1a84f8e915244c22a71d9
-
Filesize
7KB
MD598f89d4462bf79e42a47df67b3ce7d62
SHA1cd9de7cae17168c2ed5a626c844f1faaaef5c061
SHA256609192f7a5ae6644cd79b91781f432751f9284c3472077edb78870d3afc088fe
SHA512a3e2bf52d26c8d06fba5a6a873cc63f851436760b6dffca68800bb5aac5667966773e93567001be66817b626279c1c83abc7efe9ea8cda4b1b748b1afd74ac80
-
Filesize
6KB
MD57b7171aeb447448be2a2542b320d8b50
SHA1d1c7ceebf3bfa3cfddffe20acb01cdd02b37f651
SHA256bd384a16ccc4feb6a5526302dd1947dbddee39715bddf3e1b51309be8a4a8c01
SHA512fbe1a2f9f7be7cde4cca5c1209030f7f157d8e97472fd376f422bd42c4cd77a3c107fc2307b6ab01c75072b5cbeb5fe297756fe6698c3fd4374cbaded2d4f91c
-
Filesize
201B
MD5750eb418ce0568a9729f5fefd498d570
SHA1ff3ac68395e9f2020865fc8bfb448b1b40831216
SHA2565b13df6217bd65d4b30a1099f303a7d0276970dbb95ff1d0ff4995a484aec56b
SHA5125656121fd9209135013ba9c9f9b6a11667cacd4a8120b29556d478d9d53dd53aa9eaba167007e54aa5d2165a17d88c294340cb14e7e074637f9504f27b06f696
-
Filesize
201B
MD5a155f63537e5e6c84db0d13037db113e
SHA161d188b8ea0131fd58297af0eaf016add7861a55
SHA25641d808ad8651c8ff41b74d585b718f4ab5cb85519d1a4e87c3c2d7e2a672bbf9
SHA51202185e4cd0efb8b62c6706dd0b74aafc528530e83168b7fd4305698335ff44e0112bc0882086f01f5727a86bde83d4ce9cbcc14dfba2330459517ba8c75de4b2
-
Filesize
10KB
MD5bd1e373c931ec5b730d44397ef7804fc
SHA1299f5ee73d5cd8130d6daa5fb3697f4029ad4842
SHA25682449c0fed5b33ee4ddbc1c4ce0a7fb6f01c2767f5f8a64bf3dca531948ee4c2
SHA512b7c33302701b97ebef98c151b33abd4ef395d73301c87f227fea3147060453b565a720c7bec1773072bb01929342af4e37c7af0db99fe0c2cef39cba9d48ba1a