Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
09-05-2024 12:31
Static task
static1
Behavioral task
behavioral1
Sample
29fb488e112770f3cadee4f71e127d35_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
29fb488e112770f3cadee4f71e127d35_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
29fb488e112770f3cadee4f71e127d35_JaffaCakes118.html
-
Size
86KB
-
MD5
29fb488e112770f3cadee4f71e127d35
-
SHA1
532ed79507d6a34e25865d40680cfabaf2fbb2cc
-
SHA256
48401653db80a5c98bf8aff655b7a1363acc245fe9451c73fd65d4b06de5f2ce
-
SHA512
31e70572e0de0c64c31891af1b946743d0eadd59a27be69c82db197f016b535b3732c4614b62c911ccc8ec29f3affe4bc8124d870a48c9916b8ebd6accf65717
-
SSDEEP
1536:MWGEijZeqLbEijZeqL+3gqj0c20iHzG1Q4sAL3/i6A+yUWT:bGEijZeqLbEijZeqL+Qk0d08K1Q4sALS
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3448 msedge.exe 3448 msedge.exe 3920 msedge.exe 3920 msedge.exe 3704 msedge.exe 3704 msedge.exe 3704 msedge.exe 3704 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3920 msedge.exe 3920 msedge.exe 3920 msedge.exe 3920 msedge.exe 3920 msedge.exe 3920 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3920 msedge.exe 3920 msedge.exe 3920 msedge.exe 3920 msedge.exe 3920 msedge.exe 3920 msedge.exe 3920 msedge.exe 3920 msedge.exe 3920 msedge.exe 3920 msedge.exe 3920 msedge.exe 3920 msedge.exe 3920 msedge.exe 3920 msedge.exe 3920 msedge.exe 3920 msedge.exe 3920 msedge.exe 3920 msedge.exe 3920 msedge.exe 3920 msedge.exe 3920 msedge.exe 3920 msedge.exe 3920 msedge.exe 3920 msedge.exe 3920 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3920 msedge.exe 3920 msedge.exe 3920 msedge.exe 3920 msedge.exe 3920 msedge.exe 3920 msedge.exe 3920 msedge.exe 3920 msedge.exe 3920 msedge.exe 3920 msedge.exe 3920 msedge.exe 3920 msedge.exe 3920 msedge.exe 3920 msedge.exe 3920 msedge.exe 3920 msedge.exe 3920 msedge.exe 3920 msedge.exe 3920 msedge.exe 3920 msedge.exe 3920 msedge.exe 3920 msedge.exe 3920 msedge.exe 3920 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3920 wrote to memory of 3968 3920 msedge.exe 82 PID 3920 wrote to memory of 3968 3920 msedge.exe 82 PID 3920 wrote to memory of 4576 3920 msedge.exe 83 PID 3920 wrote to memory of 4576 3920 msedge.exe 83 PID 3920 wrote to memory of 4576 3920 msedge.exe 83 PID 3920 wrote to memory of 4576 3920 msedge.exe 83 PID 3920 wrote to memory of 4576 3920 msedge.exe 83 PID 3920 wrote to memory of 4576 3920 msedge.exe 83 PID 3920 wrote to memory of 4576 3920 msedge.exe 83 PID 3920 wrote to memory of 4576 3920 msedge.exe 83 PID 3920 wrote to memory of 4576 3920 msedge.exe 83 PID 3920 wrote to memory of 4576 3920 msedge.exe 83 PID 3920 wrote to memory of 4576 3920 msedge.exe 83 PID 3920 wrote to memory of 4576 3920 msedge.exe 83 PID 3920 wrote to memory of 4576 3920 msedge.exe 83 PID 3920 wrote to memory of 4576 3920 msedge.exe 83 PID 3920 wrote to memory of 4576 3920 msedge.exe 83 PID 3920 wrote to memory of 4576 3920 msedge.exe 83 PID 3920 wrote to memory of 4576 3920 msedge.exe 83 PID 3920 wrote to memory of 4576 3920 msedge.exe 83 PID 3920 wrote to memory of 4576 3920 msedge.exe 83 PID 3920 wrote to memory of 4576 3920 msedge.exe 83 PID 3920 wrote to memory of 4576 3920 msedge.exe 83 PID 3920 wrote to memory of 4576 3920 msedge.exe 83 PID 3920 wrote to memory of 4576 3920 msedge.exe 83 PID 3920 wrote to memory of 4576 3920 msedge.exe 83 PID 3920 wrote to memory of 4576 3920 msedge.exe 83 PID 3920 wrote to memory of 4576 3920 msedge.exe 83 PID 3920 wrote to memory of 4576 3920 msedge.exe 83 PID 3920 wrote to memory of 4576 3920 msedge.exe 83 PID 3920 wrote to memory of 4576 3920 msedge.exe 83 PID 3920 wrote to memory of 4576 3920 msedge.exe 83 PID 3920 wrote to memory of 4576 3920 msedge.exe 83 PID 3920 wrote to memory of 4576 3920 msedge.exe 83 PID 3920 wrote to memory of 4576 3920 msedge.exe 83 PID 3920 wrote to memory of 4576 3920 msedge.exe 83 PID 3920 wrote to memory of 4576 3920 msedge.exe 83 PID 3920 wrote to memory of 4576 3920 msedge.exe 83 PID 3920 wrote to memory of 4576 3920 msedge.exe 83 PID 3920 wrote to memory of 4576 3920 msedge.exe 83 PID 3920 wrote to memory of 4576 3920 msedge.exe 83 PID 3920 wrote to memory of 4576 3920 msedge.exe 83 PID 3920 wrote to memory of 3448 3920 msedge.exe 84 PID 3920 wrote to memory of 3448 3920 msedge.exe 84 PID 3920 wrote to memory of 1524 3920 msedge.exe 85 PID 3920 wrote to memory of 1524 3920 msedge.exe 85 PID 3920 wrote to memory of 1524 3920 msedge.exe 85 PID 3920 wrote to memory of 1524 3920 msedge.exe 85 PID 3920 wrote to memory of 1524 3920 msedge.exe 85 PID 3920 wrote to memory of 1524 3920 msedge.exe 85 PID 3920 wrote to memory of 1524 3920 msedge.exe 85 PID 3920 wrote to memory of 1524 3920 msedge.exe 85 PID 3920 wrote to memory of 1524 3920 msedge.exe 85 PID 3920 wrote to memory of 1524 3920 msedge.exe 85 PID 3920 wrote to memory of 1524 3920 msedge.exe 85 PID 3920 wrote to memory of 1524 3920 msedge.exe 85 PID 3920 wrote to memory of 1524 3920 msedge.exe 85 PID 3920 wrote to memory of 1524 3920 msedge.exe 85 PID 3920 wrote to memory of 1524 3920 msedge.exe 85 PID 3920 wrote to memory of 1524 3920 msedge.exe 85 PID 3920 wrote to memory of 1524 3920 msedge.exe 85 PID 3920 wrote to memory of 1524 3920 msedge.exe 85 PID 3920 wrote to memory of 1524 3920 msedge.exe 85 PID 3920 wrote to memory of 1524 3920 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\29fb488e112770f3cadee4f71e127d35_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3920 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xb4,0x108,0x7ffdf58f46f8,0x7ffdf58f4708,0x7ffdf58f47182⤵PID:3968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1864,5470377293336015571,2561422930781442254,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:22⤵PID:4576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1864,5470377293336015571,2561422930781442254,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2192 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1864,5470377293336015571,2561422930781442254,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2808 /prefetch:82⤵PID:1524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1864,5470377293336015571,2561422930781442254,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:3780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1864,5470377293336015571,2561422930781442254,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1864,5470377293336015571,2561422930781442254,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4976 /prefetch:12⤵PID:1496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1864,5470377293336015571,2561422930781442254,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4980 /prefetch:12⤵PID:1544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1864,5470377293336015571,2561422930781442254,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5380 /prefetch:12⤵PID:5064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1864,5470377293336015571,2561422930781442254,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2564 /prefetch:12⤵PID:4736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1864,5470377293336015571,2561422930781442254,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1816 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3704
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1072
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:812
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
20KB
MD5b6c8122025aff891940d1d5e1ab95fce
SHA1a0c7ca41d0922d085c358f5dde81ae3e85a8c9c4
SHA2569954c64c68000f615e5066bc255eced1195d1f8b7dbc715f9062ddf9f147e87e
SHA512e62a37b55b6b8d95c24fb624105ff6ff72f118e31760d0da1e8df8e8acf627ec6327c26dfa26df8535585877604c7948d2f621ccabc39beec49787e22c302c10
-
Filesize
44KB
MD588477d32f888c2b8a3f3d98deb460b3d
SHA11fae9ac6c1082fc0426aebe4e683eea9b4ba898c
SHA2561b1f0b5ef5f21d5742d84f331def7116323365c3dd4aec096a55763e310879d8
SHA512e0c0588ff27a989cac47797e5a8044983d0b3c75c44416c5f977e0e93e9d3a9321b9283ea077e6dcad0619ac960ee45fe8570f1d5cc7d5d4117fee4f2f0c96b3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize264B
MD5120a037d666b2ff9ce65220d2627b5ec
SHA18bb3f98d04212cc92cc6b4534d9355079b2297d1
SHA2560ed99148cc9f35aa7893d42c7e843e2d6285873426793b93d327e6c0dcd365e7
SHA5126830efad8abaf258fdcd064435c9ebedcf25386451ba7e24766beba0fb621db6d55fc3243b55a2bc3177bec5d54214d419b1f1d02cd991e3d8a281ef2044d1fc
-
Filesize
1KB
MD5f9325a87004c656af22d5e82051b0c12
SHA13da783c7ee1e8cc9b255b1ffbda16d01914f36ba
SHA256268a2cba0cc85f1c281aee03f8b53640293c6ba2fceb4e13b8af3e8e3f474db2
SHA512b308e4d9e37ee09fed64960b07e5dd1131a0c1495c8424ee03ec3183b989e10388e94d8d91147a915b602599e30c832d2f069d9f47fbcc38464ab246bdc8158b
-
Filesize
1KB
MD53df8e8fd1a5398e869e6d5f53b003f23
SHA18525b0a1fbf82b194bc3f8f1cbed23d4c0082bf8
SHA256867d86aa9e2f08e4c0148121dc8d24d91c49b8d4c8b23d439cfb2d66c80c8385
SHA512984cbdc3ec308ef3efe3293284923949015e6e7634e264ff4229c7d82f0a005dc414a767b0655e66080650fd6f5f49c32c3c76bd04f16767bf10073a174fa5e7
-
Filesize
6KB
MD5d0910d2e0e4de3fd3d17397084677d0d
SHA11c32e7c5f1e0c1ac345b10f73e417ce5eda481bc
SHA25689b924ac1aa3d890ca6fadfd20b909a5552eeb7b010b36d1570cefc67e8330fc
SHA512ee7799a3cb2a35da4e00a98a3e635855d3a457e3bdba6657e24f0ef74be53a0941f30c012a653023f09035438ebad8b8ae2432c94da6f180950af48595ef189c
-
Filesize
7KB
MD57e56a46de7b1db8ed4daa779986806fc
SHA1600b2d52d35b8f71aca482f3d89648277bf721be
SHA256c1bccfa8c0eeca243d242a8803046f02f60ea5e4035f1cebd9142a821373e75d
SHA512507159353cab5693c6515e7216c918114dccecd2a2152ea73397d0b24449ff8aa4bc247db204a8b950adbf32d6ea3739aaaab2349b754f89579fc436575db695
-
Filesize
203B
MD5dccd58bb527e203e08bdbbaaa8008219
SHA1986c46944fb2b3a6ad46fee7ed529b09f8469243
SHA2566c12f3db85beaaa9785c53fc3f93e6428b880520fdd586cacac8ed4afb785696
SHA512e0403b22988a327743bb881cd2213c7a8ef563397bc5c2cbfc075e5c5ece5b8c29ee69274d96c133d6dbb153c0e46b54cd04a6f90042c5a1634a1ede0a618109
-
Filesize
203B
MD5b92fddcdb43afd0ca0a486e9e85a7807
SHA13a876f4761631b74333d5f7844d3c1126e730a2d
SHA2566b2098997b4e6d140e6f2efcbe4dfb3cb062b488aabe6cc72a1933dac88a6f1b
SHA5123ef3a4c7f1e95d306d4f460e5897f0b6378bd4a4be33a2a0d5b0f9b31d45d171272ab0a48e9441c1c7aefd4a36a93bfa5195d69c6431d1590433353767e78fc0
-
Filesize
11KB
MD5a905a39c59e9ce7e90cb2fa3f34520c8
SHA193abd345f2e1ee7aefca8c0686b0760bdce371f0
SHA2565bf18766325803bfe4f19541ed2b2f4a9be33d9e54d8c4edb958dfd6a111d96f
SHA512fa14b36d7050d01daba535a00afc7390c2d367aa22fd0b1a2ef04cbde5da657f4b60edde1533dab5b01be74be354478551e25d605472a7e31bf3e1ff19f06442