Analysis
-
max time kernel
145s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
10-05-2024 23:48
Static task
static1
Behavioral task
behavioral1
Sample
31aa0b175c281a10e578a67e189dadbe_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
31aa0b175c281a10e578a67e189dadbe_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
31aa0b175c281a10e578a67e189dadbe_JaffaCakes118.html
-
Size
175KB
-
MD5
31aa0b175c281a10e578a67e189dadbe
-
SHA1
515161cb97f9d69d820c500b1a88318165d6cace
-
SHA256
1a4858947206f1797f85a1ec598d3c6cf5e307167e94e9e92281b15f86ec7942
-
SHA512
0eb59dd8b664d5c8448b0da197c4cf8fffb5d099212b927a005e93588fd37eb3a7119c200b0b2c7fd28c26602ed00bd593c4b20aa2b77957272605fad19d3e33
-
SSDEEP
1536:Sqt58gd8Wu8pI8Cd8hd8dQgbH//WoS3NGNkF4YfBCJiZu+aeTH+WK/Lf1/hpnVSV:SHCT3N/FdBCJiJB
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4616 msedge.exe 4616 msedge.exe 760 msedge.exe 760 msedge.exe 3524 identity_helper.exe 3524 identity_helper.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 760 msedge.exe 760 msedge.exe 760 msedge.exe 760 msedge.exe 760 msedge.exe 760 msedge.exe 760 msedge.exe 760 msedge.exe 760 msedge.exe 760 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 760 msedge.exe 760 msedge.exe 760 msedge.exe 760 msedge.exe 760 msedge.exe 760 msedge.exe 760 msedge.exe 760 msedge.exe 760 msedge.exe 760 msedge.exe 760 msedge.exe 760 msedge.exe 760 msedge.exe 760 msedge.exe 760 msedge.exe 760 msedge.exe 760 msedge.exe 760 msedge.exe 760 msedge.exe 760 msedge.exe 760 msedge.exe 760 msedge.exe 760 msedge.exe 760 msedge.exe 760 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 760 msedge.exe 760 msedge.exe 760 msedge.exe 760 msedge.exe 760 msedge.exe 760 msedge.exe 760 msedge.exe 760 msedge.exe 760 msedge.exe 760 msedge.exe 760 msedge.exe 760 msedge.exe 760 msedge.exe 760 msedge.exe 760 msedge.exe 760 msedge.exe 760 msedge.exe 760 msedge.exe 760 msedge.exe 760 msedge.exe 760 msedge.exe 760 msedge.exe 760 msedge.exe 760 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 760 wrote to memory of 4856 760 msedge.exe 81 PID 760 wrote to memory of 4856 760 msedge.exe 81 PID 760 wrote to memory of 1552 760 msedge.exe 82 PID 760 wrote to memory of 1552 760 msedge.exe 82 PID 760 wrote to memory of 1552 760 msedge.exe 82 PID 760 wrote to memory of 1552 760 msedge.exe 82 PID 760 wrote to memory of 1552 760 msedge.exe 82 PID 760 wrote to memory of 1552 760 msedge.exe 82 PID 760 wrote to memory of 1552 760 msedge.exe 82 PID 760 wrote to memory of 1552 760 msedge.exe 82 PID 760 wrote to memory of 1552 760 msedge.exe 82 PID 760 wrote to memory of 1552 760 msedge.exe 82 PID 760 wrote to memory of 1552 760 msedge.exe 82 PID 760 wrote to memory of 1552 760 msedge.exe 82 PID 760 wrote to memory of 1552 760 msedge.exe 82 PID 760 wrote to memory of 1552 760 msedge.exe 82 PID 760 wrote to memory of 1552 760 msedge.exe 82 PID 760 wrote to memory of 1552 760 msedge.exe 82 PID 760 wrote to memory of 1552 760 msedge.exe 82 PID 760 wrote to memory of 1552 760 msedge.exe 82 PID 760 wrote to memory of 1552 760 msedge.exe 82 PID 760 wrote to memory of 1552 760 msedge.exe 82 PID 760 wrote to memory of 1552 760 msedge.exe 82 PID 760 wrote to memory of 1552 760 msedge.exe 82 PID 760 wrote to memory of 1552 760 msedge.exe 82 PID 760 wrote to memory of 1552 760 msedge.exe 82 PID 760 wrote to memory of 1552 760 msedge.exe 82 PID 760 wrote to memory of 1552 760 msedge.exe 82 PID 760 wrote to memory of 1552 760 msedge.exe 82 PID 760 wrote to memory of 1552 760 msedge.exe 82 PID 760 wrote to memory of 1552 760 msedge.exe 82 PID 760 wrote to memory of 1552 760 msedge.exe 82 PID 760 wrote to memory of 1552 760 msedge.exe 82 PID 760 wrote to memory of 1552 760 msedge.exe 82 PID 760 wrote to memory of 1552 760 msedge.exe 82 PID 760 wrote to memory of 1552 760 msedge.exe 82 PID 760 wrote to memory of 1552 760 msedge.exe 82 PID 760 wrote to memory of 1552 760 msedge.exe 82 PID 760 wrote to memory of 1552 760 msedge.exe 82 PID 760 wrote to memory of 1552 760 msedge.exe 82 PID 760 wrote to memory of 1552 760 msedge.exe 82 PID 760 wrote to memory of 1552 760 msedge.exe 82 PID 760 wrote to memory of 4616 760 msedge.exe 83 PID 760 wrote to memory of 4616 760 msedge.exe 83 PID 760 wrote to memory of 2480 760 msedge.exe 84 PID 760 wrote to memory of 2480 760 msedge.exe 84 PID 760 wrote to memory of 2480 760 msedge.exe 84 PID 760 wrote to memory of 2480 760 msedge.exe 84 PID 760 wrote to memory of 2480 760 msedge.exe 84 PID 760 wrote to memory of 2480 760 msedge.exe 84 PID 760 wrote to memory of 2480 760 msedge.exe 84 PID 760 wrote to memory of 2480 760 msedge.exe 84 PID 760 wrote to memory of 2480 760 msedge.exe 84 PID 760 wrote to memory of 2480 760 msedge.exe 84 PID 760 wrote to memory of 2480 760 msedge.exe 84 PID 760 wrote to memory of 2480 760 msedge.exe 84 PID 760 wrote to memory of 2480 760 msedge.exe 84 PID 760 wrote to memory of 2480 760 msedge.exe 84 PID 760 wrote to memory of 2480 760 msedge.exe 84 PID 760 wrote to memory of 2480 760 msedge.exe 84 PID 760 wrote to memory of 2480 760 msedge.exe 84 PID 760 wrote to memory of 2480 760 msedge.exe 84 PID 760 wrote to memory of 2480 760 msedge.exe 84 PID 760 wrote to memory of 2480 760 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\31aa0b175c281a10e578a67e189dadbe_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:760 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc74e946f8,0x7ffc74e94708,0x7ffc74e947182⤵PID:4856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,13012356441470065172,11554830717253405715,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2156 /prefetch:22⤵PID:1552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2140,13012356441470065172,11554830717253405715,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2328 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2140,13012356441470065172,11554830717253405715,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2812 /prefetch:82⤵PID:2480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,13012356441470065172,11554830717253405715,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,13012356441470065172,11554830717253405715,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:3076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,13012356441470065172,11554830717253405715,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4632 /prefetch:12⤵PID:2740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,13012356441470065172,11554830717253405715,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4636 /prefetch:12⤵PID:3500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,13012356441470065172,11554830717253405715,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4940 /prefetch:12⤵PID:2972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,13012356441470065172,11554830717253405715,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5072 /prefetch:12⤵PID:208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,13012356441470065172,11554830717253405715,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4736 /prefetch:82⤵PID:992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,13012356441470065172,11554830717253405715,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4736 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,13012356441470065172,11554830717253405715,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4732 /prefetch:12⤵PID:3688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,13012356441470065172,11554830717253405715,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4728 /prefetch:12⤵PID:2452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,13012356441470065172,11554830717253405715,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5244 /prefetch:12⤵PID:2620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,13012356441470065172,11554830717253405715,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5220 /prefetch:12⤵PID:432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,13012356441470065172,11554830717253405715,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=212 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4728
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:952
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5084
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3276
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f61fa5143fe872d1d8f1e9f8dc6544f9
SHA1df44bab94d7388fb38c63085ec4db80cfc5eb009
SHA256284a24b5b40860240db00ef3ae6a33c9fa8349ab5490a634e27b2c6e9a191c64
SHA512971000784a6518bb39c5cf043292c7ab659162275470f5f6b632ea91a6bcae83bc80517ceb983dd5abfe8fb4e157344cb65c27e609a879eec00b33c5fad563a6
-
Filesize
152B
MD587f7abeb82600e1e640b843ad50fe0a1
SHA1045bbada3f23fc59941bf7d0210fb160cb78ae87
SHA256b35d6906050d90a81d23646f86c20a8f5d42f058ffc6436fb0a2b8bd71ee1262
SHA512ea8e7f24ab823ad710ce079c86c40aa957353a00d2775732c23e31be88a10d212e974c4691279aa86016c4660f5795febf739a15207833df6ed964a9ed99d618
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize360B
MD5592235cc77d8e5fe5ae3857ff3cb261b
SHA1a0a961714a377300a1a29a7b775b042beb319fd6
SHA256098fac223ee6af60dd7227d1f1a2f8835aedafd80fd91599eb814d2fa8890a88
SHA5128d89f16f0323e6cb262c1737ca60631509e88b8848238aaa11b178b6be6bf13113e0660bc62b65d8d82d528da39b1bdcb4b44a6338a85c003c1a90404d730b74
-
Filesize
2KB
MD54dbb2d4d95955ea5d6117fee8ee6ccbe
SHA1be16216ee03c9e270f907de650b4ee35b1fdccc5
SHA256ca04cae8fabef2d6dccd7dfd0bc14ec042791d57a1c60179d25d2bec759c3320
SHA5125cf3c9b36764d9893299d51828e6d62831f68096e0df56bfae603315453fa19a8fadb138971f7992f8e42139e4d77d7e9f8ef4f9c3624d671f31c76863b5e072
-
Filesize
2KB
MD5658d1d86d07bea8352ba3c63b2fb9405
SHA122eb6414f6fb4840ee99a5491fe0157b7b2106d2
SHA256f4008c805b80440a8909a4336f2c25066b2e4af5bb920f970195f8f5c9eebbed
SHA512edaf48c4cbf4a6b8ed83ae5b44926ce8a09765279606e80860b45bc479d31fd98d4b708db39ad6e8e9d5c55c673a33be5f7c87c8079962c0840e62daebefc219
-
Filesize
6KB
MD5d4ee53c0d63bb4a1801f1111d06a38b7
SHA1cbb3741846c3644f9d6e66185b99c6a15d35db7c
SHA256008fc1abcb6320fcf7e8837314b9602af58a613558797c97fe3912c02b9755e0
SHA512c989963bc3fa6b047b67146d59ed1d16fb339f6efb461151f3af4d44509db80679d5a13acaf340a63374fc0a4aa1cbe61f34fac6baf8793329cea515fbc87f3b
-
Filesize
7KB
MD52949649a257eef455890fcff86e62361
SHA1813fcc3bef211613a2a4cd05cf1e1076f2634c14
SHA25622ea2a9c3c10b1a42c364f349810f0edf4c59bae087ae050fef6505dcbd7f879
SHA5123efaf66febc904cce4334b38e6e42f383e4e6eac386c0609fad687f1cc27f7266b5b5f05b31d49a9bbd08239b7d50f3ae6bfee2acf477200b2691ad1c4358369
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD59471194d19c8dd94b827a62f8b278fc9
SHA1d1f5c6bc1d7cd619d8f1829ee8caa25f994fc327
SHA25606488e437fc3d51826d34f798d895e9ae8fad5e29a949ee9ecf7a806de63cd16
SHA512f6dde9590fe16a13b74b27ab145683fd8cc858964fbd6278b9894194489445b078ca0b226bad994accc27084ff5d98e353b5b77579742a00123af7d5bc8e6011