Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
09/04/2024, 16:49
Static task
static1
Behavioral task
behavioral1
Sample
ea7471a9c22210aee5ae0100475439c3_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
ea7471a9c22210aee5ae0100475439c3_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
ea7471a9c22210aee5ae0100475439c3_JaffaCakes118.html
-
Size
10KB
-
MD5
ea7471a9c22210aee5ae0100475439c3
-
SHA1
56238ce20c6795ea46d7c0521a47351eb2bafcb4
-
SHA256
e041c8672b381ce2a39a550b42e4e42de7432d8a8ffa6f73d57475c58f134915
-
SHA512
ab4ae5e894dd31510a3a21b5f788b40054cb4c8626078b9e68675872a849eb24d2e3c4665329f5c69587162220b9efd41f2ef267db17fb5f809f1e8455139d96
-
SSDEEP
192:2VRlIsr03RS8k/w1wvqLkZmB+FnjECM/Y01z6uBuLbdU8d:sRlIcuR6/gumB+FnjECM/Y0z6guLZ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4944 msedge.exe 4944 msedge.exe 4536 msedge.exe 4536 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe 4536 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4536 wrote to memory of 1724 4536 msedge.exe 87 PID 4536 wrote to memory of 1724 4536 msedge.exe 87 PID 4536 wrote to memory of 5080 4536 msedge.exe 88 PID 4536 wrote to memory of 5080 4536 msedge.exe 88 PID 4536 wrote to memory of 5080 4536 msedge.exe 88 PID 4536 wrote to memory of 5080 4536 msedge.exe 88 PID 4536 wrote to memory of 5080 4536 msedge.exe 88 PID 4536 wrote to memory of 5080 4536 msedge.exe 88 PID 4536 wrote to memory of 5080 4536 msedge.exe 88 PID 4536 wrote to memory of 5080 4536 msedge.exe 88 PID 4536 wrote to memory of 5080 4536 msedge.exe 88 PID 4536 wrote to memory of 5080 4536 msedge.exe 88 PID 4536 wrote to memory of 5080 4536 msedge.exe 88 PID 4536 wrote to memory of 5080 4536 msedge.exe 88 PID 4536 wrote to memory of 5080 4536 msedge.exe 88 PID 4536 wrote to memory of 5080 4536 msedge.exe 88 PID 4536 wrote to memory of 5080 4536 msedge.exe 88 PID 4536 wrote to memory of 5080 4536 msedge.exe 88 PID 4536 wrote to memory of 5080 4536 msedge.exe 88 PID 4536 wrote to memory of 5080 4536 msedge.exe 88 PID 4536 wrote to memory of 5080 4536 msedge.exe 88 PID 4536 wrote to memory of 5080 4536 msedge.exe 88 PID 4536 wrote to memory of 5080 4536 msedge.exe 88 PID 4536 wrote to memory of 5080 4536 msedge.exe 88 PID 4536 wrote to memory of 5080 4536 msedge.exe 88 PID 4536 wrote to memory of 5080 4536 msedge.exe 88 PID 4536 wrote to memory of 5080 4536 msedge.exe 88 PID 4536 wrote to memory of 5080 4536 msedge.exe 88 PID 4536 wrote to memory of 5080 4536 msedge.exe 88 PID 4536 wrote to memory of 5080 4536 msedge.exe 88 PID 4536 wrote to memory of 5080 4536 msedge.exe 88 PID 4536 wrote to memory of 5080 4536 msedge.exe 88 PID 4536 wrote to memory of 5080 4536 msedge.exe 88 PID 4536 wrote to memory of 5080 4536 msedge.exe 88 PID 4536 wrote to memory of 5080 4536 msedge.exe 88 PID 4536 wrote to memory of 5080 4536 msedge.exe 88 PID 4536 wrote to memory of 5080 4536 msedge.exe 88 PID 4536 wrote to memory of 5080 4536 msedge.exe 88 PID 4536 wrote to memory of 5080 4536 msedge.exe 88 PID 4536 wrote to memory of 5080 4536 msedge.exe 88 PID 4536 wrote to memory of 5080 4536 msedge.exe 88 PID 4536 wrote to memory of 5080 4536 msedge.exe 88 PID 4536 wrote to memory of 4944 4536 msedge.exe 89 PID 4536 wrote to memory of 4944 4536 msedge.exe 89 PID 4536 wrote to memory of 2624 4536 msedge.exe 90 PID 4536 wrote to memory of 2624 4536 msedge.exe 90 PID 4536 wrote to memory of 2624 4536 msedge.exe 90 PID 4536 wrote to memory of 2624 4536 msedge.exe 90 PID 4536 wrote to memory of 2624 4536 msedge.exe 90 PID 4536 wrote to memory of 2624 4536 msedge.exe 90 PID 4536 wrote to memory of 2624 4536 msedge.exe 90 PID 4536 wrote to memory of 2624 4536 msedge.exe 90 PID 4536 wrote to memory of 2624 4536 msedge.exe 90 PID 4536 wrote to memory of 2624 4536 msedge.exe 90 PID 4536 wrote to memory of 2624 4536 msedge.exe 90 PID 4536 wrote to memory of 2624 4536 msedge.exe 90 PID 4536 wrote to memory of 2624 4536 msedge.exe 90 PID 4536 wrote to memory of 2624 4536 msedge.exe 90 PID 4536 wrote to memory of 2624 4536 msedge.exe 90 PID 4536 wrote to memory of 2624 4536 msedge.exe 90 PID 4536 wrote to memory of 2624 4536 msedge.exe 90 PID 4536 wrote to memory of 2624 4536 msedge.exe 90 PID 4536 wrote to memory of 2624 4536 msedge.exe 90 PID 4536 wrote to memory of 2624 4536 msedge.exe 90
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\ea7471a9c22210aee5ae0100475439c3_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4536 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd796c46f8,0x7ffd796c4708,0x7ffd796c47182⤵PID:1724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1928,16462354261341978606,7900642228302318732,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2252 /prefetch:22⤵PID:5080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1928,16462354261341978606,7900642228302318732,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2312 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1928,16462354261341978606,7900642228302318732,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3008 /prefetch:12⤵PID:2624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1928,16462354261341978606,7900642228302318732,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=4 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3016 /prefetch:12⤵PID:1916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1928,16462354261341978606,7900642228302318732,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3420 /prefetch:82⤵PID:4752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1928,16462354261341978606,7900642228302318732,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4700 /prefetch:12⤵PID:1236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1928,16462354261341978606,7900642228302318732,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1728 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5060
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2664
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2084
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f35bb0615bb9816f562b83304e456294
SHA11049e2bd3e1bbb4cea572467d7c4a96648659cb4
SHA25605e80abd624454e5b860a08f40ddf33d672c3fed319aac180b7de5754bc07b71
SHA512db9100f3e324e74a9c58c7d9f50c25eaa4c6c4553c93bab9b80c6f7bef777db04111ebcd679f94015203b240fe9f4f371cae0d4290ec891a4173c746ff4b11c1
-
Filesize
152B
MD51eb86108cb8f5a956fdf48efbd5d06fe
SHA17b2b299f753798e4891df2d9cbf30f94b39ef924
SHA2561b53367e0041d54af89e7dd59733231f5da1393c551ed2b943c89166c0baca40
SHA512e2a661437688a4a01a6eb3b2bd7979ecf96b806f5a487d39354a7f0d44cb693a3b1c2cf6b1247b04e4106cc816105e982569572042bdddb3cd5bec23b4fce29d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize168B
MD5122231cf8975c6b693fbeee5ef4e8589
SHA144a772943ad6c2922da83fb08737591c2bb6efea
SHA256878b0a7bd4ee03a10a78183ae07a5ee5e026dfa634c2eba0dbb694c603667e5b
SHA51265dafe43f18a7c5cd09019e52d35fecda95e56715d2804a9c6981bda61c28ba4cd1f00c2be05982b4c329ec3232da89fa65b09445df7a9502670c1666a41fac7
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
6KB
MD5a8b2e00e15c5e2bc3637927b0476d968
SHA105a0a085af227ef29908467c2745cf0efd64efc9
SHA256161fae04885ada0a6e0ea37aa8bf387921b154b6c5471e42324758e0cf29c8c8
SHA512ece34b8b2858dc17743897d8ece538968c59777e59e3319dbf81ce615231e3a6f98fa4eb58f77bb66823c974468b509c80956791fd540dd7e2fa7621a99a30e2
-
Filesize
6KB
MD5b5f4d718a3c5e8aecd062276fecde4aa
SHA1d9bef5c35968d0fb4eec39912792eef40d62d762
SHA2561cc3dbd3eaeea2ed56129a33e772db11dab2ef83daa56faa676d74d819081556
SHA512d8a7ab9640384b70a50611036ecc33db33594bd8c75c3c4aaa6ce7de303cc508f28eab965ae802c6a95e5b3aa241809a81c898170fa6d85760bdb00db123dace
-
Filesize
11KB
MD5b371a85349defa67932d8a512146e591
SHA1fe954b8ef62e904bdb515f37d986e52fb5fbf615
SHA256d9b6310029e110ccdcf8eee6324db50c2d8cef120bdc5e4c0096817b03c862e7
SHA512a4b4e16e908b2bded18045f906683c3095ca9c64604cba7916f3421c369e8bbac0073d8e88e11c4a6cdf241bf7bb85672281ca1169406a4265b884902021cd5c