Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
10-05-2024 23:23
Static task
static1
Behavioral task
behavioral1
Sample
318f3c0cf7a1112deec86db1688351d3_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
318f3c0cf7a1112deec86db1688351d3_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
318f3c0cf7a1112deec86db1688351d3_JaffaCakes118.html
-
Size
124KB
-
MD5
318f3c0cf7a1112deec86db1688351d3
-
SHA1
3091c9c28795279a3a47dbe0cd19a1126c2b6917
-
SHA256
9f306545fb2c837fcbde96760b8115c73560bd2eb3f926f0ef37e9cfbef6c29f
-
SHA512
13c5960db8ac8a045ac116c93b4249e418f9e89b42ab97586cc035ceed9fc3f33895aefb41404aa392699a60b119b8cac95b680d13c18cfd168ed0ebad714e58
-
SSDEEP
1536:STmWqBfzEBq3Gn0cafW5XHadk8Hr0VqYoV:STmWMzEBEWKp
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4508 msedge.exe 4508 msedge.exe 916 msedge.exe 916 msedge.exe 3452 identity_helper.exe 3452 identity_helper.exe 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe 916 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 916 wrote to memory of 3320 916 msedge.exe 82 PID 916 wrote to memory of 3320 916 msedge.exe 82 PID 916 wrote to memory of 4856 916 msedge.exe 83 PID 916 wrote to memory of 4856 916 msedge.exe 83 PID 916 wrote to memory of 4856 916 msedge.exe 83 PID 916 wrote to memory of 4856 916 msedge.exe 83 PID 916 wrote to memory of 4856 916 msedge.exe 83 PID 916 wrote to memory of 4856 916 msedge.exe 83 PID 916 wrote to memory of 4856 916 msedge.exe 83 PID 916 wrote to memory of 4856 916 msedge.exe 83 PID 916 wrote to memory of 4856 916 msedge.exe 83 PID 916 wrote to memory of 4856 916 msedge.exe 83 PID 916 wrote to memory of 4856 916 msedge.exe 83 PID 916 wrote to memory of 4856 916 msedge.exe 83 PID 916 wrote to memory of 4856 916 msedge.exe 83 PID 916 wrote to memory of 4856 916 msedge.exe 83 PID 916 wrote to memory of 4856 916 msedge.exe 83 PID 916 wrote to memory of 4856 916 msedge.exe 83 PID 916 wrote to memory of 4856 916 msedge.exe 83 PID 916 wrote to memory of 4856 916 msedge.exe 83 PID 916 wrote to memory of 4856 916 msedge.exe 83 PID 916 wrote to memory of 4856 916 msedge.exe 83 PID 916 wrote to memory of 4856 916 msedge.exe 83 PID 916 wrote to memory of 4856 916 msedge.exe 83 PID 916 wrote to memory of 4856 916 msedge.exe 83 PID 916 wrote to memory of 4856 916 msedge.exe 83 PID 916 wrote to memory of 4856 916 msedge.exe 83 PID 916 wrote to memory of 4856 916 msedge.exe 83 PID 916 wrote to memory of 4856 916 msedge.exe 83 PID 916 wrote to memory of 4856 916 msedge.exe 83 PID 916 wrote to memory of 4856 916 msedge.exe 83 PID 916 wrote to memory of 4856 916 msedge.exe 83 PID 916 wrote to memory of 4856 916 msedge.exe 83 PID 916 wrote to memory of 4856 916 msedge.exe 83 PID 916 wrote to memory of 4856 916 msedge.exe 83 PID 916 wrote to memory of 4856 916 msedge.exe 83 PID 916 wrote to memory of 4856 916 msedge.exe 83 PID 916 wrote to memory of 4856 916 msedge.exe 83 PID 916 wrote to memory of 4856 916 msedge.exe 83 PID 916 wrote to memory of 4856 916 msedge.exe 83 PID 916 wrote to memory of 4856 916 msedge.exe 83 PID 916 wrote to memory of 4856 916 msedge.exe 83 PID 916 wrote to memory of 4508 916 msedge.exe 84 PID 916 wrote to memory of 4508 916 msedge.exe 84 PID 916 wrote to memory of 664 916 msedge.exe 85 PID 916 wrote to memory of 664 916 msedge.exe 85 PID 916 wrote to memory of 664 916 msedge.exe 85 PID 916 wrote to memory of 664 916 msedge.exe 85 PID 916 wrote to memory of 664 916 msedge.exe 85 PID 916 wrote to memory of 664 916 msedge.exe 85 PID 916 wrote to memory of 664 916 msedge.exe 85 PID 916 wrote to memory of 664 916 msedge.exe 85 PID 916 wrote to memory of 664 916 msedge.exe 85 PID 916 wrote to memory of 664 916 msedge.exe 85 PID 916 wrote to memory of 664 916 msedge.exe 85 PID 916 wrote to memory of 664 916 msedge.exe 85 PID 916 wrote to memory of 664 916 msedge.exe 85 PID 916 wrote to memory of 664 916 msedge.exe 85 PID 916 wrote to memory of 664 916 msedge.exe 85 PID 916 wrote to memory of 664 916 msedge.exe 85 PID 916 wrote to memory of 664 916 msedge.exe 85 PID 916 wrote to memory of 664 916 msedge.exe 85 PID 916 wrote to memory of 664 916 msedge.exe 85 PID 916 wrote to memory of 664 916 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\318f3c0cf7a1112deec86db1688351d3_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:916 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa05d646f8,0x7ffa05d64708,0x7ffa05d647182⤵PID:3320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,18299288541893008522,9337703676979454955,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2100 /prefetch:22⤵PID:4856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,18299288541893008522,9337703676979454955,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2504 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,18299288541893008522,9337703676979454955,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1468 /prefetch:82⤵PID:664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,18299288541893008522,9337703676979454955,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:4784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,18299288541893008522,9337703676979454955,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:2116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,18299288541893008522,9337703676979454955,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4776 /prefetch:12⤵PID:5096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,18299288541893008522,9337703676979454955,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5772 /prefetch:82⤵PID:3324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,18299288541893008522,9337703676979454955,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5772 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,18299288541893008522,9337703676979454955,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5768 /prefetch:12⤵PID:4316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,18299288541893008522,9337703676979454955,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5144 /prefetch:12⤵PID:1740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,18299288541893008522,9337703676979454955,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4900 /prefetch:12⤵PID:4928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,18299288541893008522,9337703676979454955,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4764 /prefetch:12⤵PID:4612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,18299288541893008522,9337703676979454955,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1048 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3416
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2768
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3324
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD540edbcf8cb7913b55de92a0494acfa41
SHA15b837600cb5ba2d89d27d61b819e9486f2f47c93
SHA256aadf64883efc178bf151b0c6edd3d6fd7de5f360991eddb8bd2b214a4ba1c021
SHA51271860d69e687efe03776ae0f75770d18755c73974b6f1c8c09e2852c8c9dd6e7d5633ba74a9147b116901ede5081f5b93c349ae164453a23c617c945a7594b7e
-
Filesize
324B
MD5ff17505b02d988cd94ac6b26bf718018
SHA169f3ba890950867b858fb4c1bface08058ddc38d
SHA256d0718af13cae3e6a7b66a86da4da75938d0d6b84bf5f9039f812d588ab9a02d4
SHA512c6570711fc94751163c9a7b8f9932d51b7e472e86707ad8a651f76814408b01e00a0f4710d680f9b168c510bfb527dc3106a254e0747f3254afadbfc73737984
-
Filesize
6KB
MD5e8e9f8fe2329966f0fcfe28a64b9ba22
SHA13b851ccf1124e6dedc02fdbf885770c7b44e344b
SHA2565f429f071383e6f8137fca4cfefbcaeb71b40e91b115643d9fbf7a1c6eac160d
SHA51210c983ad26e0efdd71aec4f3491675edcfe2b7a4abe82239b51ba512da264f215ae74ee1117d6a6f6b082ee7f25ab87e51ffaccb2b7e8fa440f3601e9b0f9030
-
Filesize
6KB
MD59f1ae8004de347cdbea625b737dfb59a
SHA1863b88732337aeb2f3a3dc4c788d8ec98dcf944f
SHA2565b15417a2a2727e3c478290820ee6a04cb73ac991d3cc1021f7e35831374ebb4
SHA5121d7f64742a80bf9cb2809b92cc55c1ccc8c3b7865b4ba2fa7dc3103582c14583f8138abbd49253ef86638d64eff3e6b3c48efcab1015d0836e0e9d621814cb8c
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD540d60fd4abe839148db8336dcdd95698
SHA1c7ee35522805319f714c4d0cec7f9f16a11a4d9c
SHA2561d12e0434da83a2aab08d540dec6e6ec44f7f7edc9bf17586da675de9edd2006
SHA51240be1debc84ef364569a94b0695d7ce8f4a1c0e2b486e07376aa108d14eb8f1a01ef3094abb307d6137833a7bc02822c26fcf120229713afa817adabfc28e653