Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
11/05/2024, 00:36
Static task
static1
Behavioral task
behavioral1
Sample
31d83b1c126a30527f18576e8de279d6_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
31d83b1c126a30527f18576e8de279d6_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
31d83b1c126a30527f18576e8de279d6_JaffaCakes118.html
-
Size
70KB
-
MD5
31d83b1c126a30527f18576e8de279d6
-
SHA1
b76683439b8a37fd6e9a9a4c5f6658867ee84780
-
SHA256
3dd4f40abbbc8fa3e7477b613ffa93e5e06dac0333a1a31a89fe0d37b8d7412b
-
SHA512
89ee94dec4a1b7d57a96da7d5f797c5f39cac230a9a281474aa7bbbd3e402404689a4c4884bcf4f5a8cc97e71237271abde67ed4bce2b342bd3ce4e4a2bf5e3c
-
SSDEEP
1536:RWw9+OBMxR9Vxl9Sxr92xy99xi99xZ9rxc9Qxh93x19qx69Lx09qxM93xgte9Gck:RWw9dB/8
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2100 msedge.exe 2100 msedge.exe 4364 msedge.exe 4364 msedge.exe 2368 identity_helper.exe 2368 identity_helper.exe 5360 msedge.exe 5360 msedge.exe 5360 msedge.exe 5360 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4364 wrote to memory of 2808 4364 msedge.exe 83 PID 4364 wrote to memory of 2808 4364 msedge.exe 83 PID 4364 wrote to memory of 768 4364 msedge.exe 84 PID 4364 wrote to memory of 768 4364 msedge.exe 84 PID 4364 wrote to memory of 768 4364 msedge.exe 84 PID 4364 wrote to memory of 768 4364 msedge.exe 84 PID 4364 wrote to memory of 768 4364 msedge.exe 84 PID 4364 wrote to memory of 768 4364 msedge.exe 84 PID 4364 wrote to memory of 768 4364 msedge.exe 84 PID 4364 wrote to memory of 768 4364 msedge.exe 84 PID 4364 wrote to memory of 768 4364 msedge.exe 84 PID 4364 wrote to memory of 768 4364 msedge.exe 84 PID 4364 wrote to memory of 768 4364 msedge.exe 84 PID 4364 wrote to memory of 768 4364 msedge.exe 84 PID 4364 wrote to memory of 768 4364 msedge.exe 84 PID 4364 wrote to memory of 768 4364 msedge.exe 84 PID 4364 wrote to memory of 768 4364 msedge.exe 84 PID 4364 wrote to memory of 768 4364 msedge.exe 84 PID 4364 wrote to memory of 768 4364 msedge.exe 84 PID 4364 wrote to memory of 768 4364 msedge.exe 84 PID 4364 wrote to memory of 768 4364 msedge.exe 84 PID 4364 wrote to memory of 768 4364 msedge.exe 84 PID 4364 wrote to memory of 768 4364 msedge.exe 84 PID 4364 wrote to memory of 768 4364 msedge.exe 84 PID 4364 wrote to memory of 768 4364 msedge.exe 84 PID 4364 wrote to memory of 768 4364 msedge.exe 84 PID 4364 wrote to memory of 768 4364 msedge.exe 84 PID 4364 wrote to memory of 768 4364 msedge.exe 84 PID 4364 wrote to memory of 768 4364 msedge.exe 84 PID 4364 wrote to memory of 768 4364 msedge.exe 84 PID 4364 wrote to memory of 768 4364 msedge.exe 84 PID 4364 wrote to memory of 768 4364 msedge.exe 84 PID 4364 wrote to memory of 768 4364 msedge.exe 84 PID 4364 wrote to memory of 768 4364 msedge.exe 84 PID 4364 wrote to memory of 768 4364 msedge.exe 84 PID 4364 wrote to memory of 768 4364 msedge.exe 84 PID 4364 wrote to memory of 768 4364 msedge.exe 84 PID 4364 wrote to memory of 768 4364 msedge.exe 84 PID 4364 wrote to memory of 768 4364 msedge.exe 84 PID 4364 wrote to memory of 768 4364 msedge.exe 84 PID 4364 wrote to memory of 768 4364 msedge.exe 84 PID 4364 wrote to memory of 768 4364 msedge.exe 84 PID 4364 wrote to memory of 2100 4364 msedge.exe 85 PID 4364 wrote to memory of 2100 4364 msedge.exe 85 PID 4364 wrote to memory of 2264 4364 msedge.exe 86 PID 4364 wrote to memory of 2264 4364 msedge.exe 86 PID 4364 wrote to memory of 2264 4364 msedge.exe 86 PID 4364 wrote to memory of 2264 4364 msedge.exe 86 PID 4364 wrote to memory of 2264 4364 msedge.exe 86 PID 4364 wrote to memory of 2264 4364 msedge.exe 86 PID 4364 wrote to memory of 2264 4364 msedge.exe 86 PID 4364 wrote to memory of 2264 4364 msedge.exe 86 PID 4364 wrote to memory of 2264 4364 msedge.exe 86 PID 4364 wrote to memory of 2264 4364 msedge.exe 86 PID 4364 wrote to memory of 2264 4364 msedge.exe 86 PID 4364 wrote to memory of 2264 4364 msedge.exe 86 PID 4364 wrote to memory of 2264 4364 msedge.exe 86 PID 4364 wrote to memory of 2264 4364 msedge.exe 86 PID 4364 wrote to memory of 2264 4364 msedge.exe 86 PID 4364 wrote to memory of 2264 4364 msedge.exe 86 PID 4364 wrote to memory of 2264 4364 msedge.exe 86 PID 4364 wrote to memory of 2264 4364 msedge.exe 86 PID 4364 wrote to memory of 2264 4364 msedge.exe 86 PID 4364 wrote to memory of 2264 4364 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\31d83b1c126a30527f18576e8de279d6_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4364 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffee1a946f8,0x7ffee1a94708,0x7ffee1a947182⤵PID:2808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,16108812710914779186,14934077308742939912,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:22⤵PID:768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2052,16108812710914779186,14934077308742939912,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2184 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2052,16108812710914779186,14934077308742939912,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2812 /prefetch:82⤵PID:2264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,16108812710914779186,14934077308742939912,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,16108812710914779186,14934077308742939912,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:1812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,16108812710914779186,14934077308742939912,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3984 /prefetch:12⤵PID:4920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,16108812710914779186,14934077308742939912,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4852 /prefetch:12⤵PID:4492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,16108812710914779186,14934077308742939912,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4988 /prefetch:12⤵PID:2008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,16108812710914779186,14934077308742939912,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5504 /prefetch:12⤵PID:2040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,16108812710914779186,14934077308742939912,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5708 /prefetch:82⤵PID:3580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,16108812710914779186,14934077308742939912,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5708 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,16108812710914779186,14934077308742939912,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4036 /prefetch:12⤵PID:4716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,16108812710914779186,14934077308742939912,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5980 /prefetch:12⤵PID:1924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,16108812710914779186,14934077308742939912,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5964 /prefetch:12⤵PID:5436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,16108812710914779186,14934077308742939912,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6244 /prefetch:12⤵PID:5444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,16108812710914779186,14934077308742939912,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1848 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5360
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4980
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3008
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c9c4c494f8fba32d95ba2125f00586a3
SHA18a600205528aef7953144f1cf6f7a5115e3611de
SHA256a0ca609205813c307df9122c0c5b0967c5472755700f615b0033129cf7d6b35b
SHA5129d30cea6cfc259e97b0305f8b5cd19774044fb78feedfcef2014b2947f2e6a101273bc4ad30db9cc1724e62eb441266d7df376e28ac58693f128b9cce2c7d20d
-
Filesize
152B
MD54dc6fc5e708279a3310fe55d9c44743d
SHA1a42e8bdf9d1c25ef3e223d59f6b1d16b095f46d2
SHA256a1c5f48659d4b3af960971b3a0f433a95fee5bfafe5680a34110c68b342377d8
SHA5125874b2310187f242b852fa6dcded244cc860abb2be4f6f5a6a1db8322e12e1fef8f825edc0aae75adbb7284a2cd64730650d0643b1e2bb7ead9350e50e1d8c13
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD5b64642de8ec63f9a4bbdeec700720b79
SHA1d418a951ca78fc2483e56bf43340d8fbf78586fe
SHA25655cde917f0691d8db8d6bf36d970dc13b8b230cdb57f0bf4279321446417d894
SHA5124e75ebf0e4b832c09f73609608fa2471667ba3bcb3f5b70341dd829830d60f7bf92cb7a8fa4124e4a89900b3e4c2530865b240ff66f38b83c9a0e3919e4dfc12
-
Filesize
417B
MD591546653b42232b5add4ef8e63feb507
SHA1bcfacc1964030520b9dba73d420966b99848bca6
SHA2567c7c4fb3cd6c8982a36efe8aa7ea9955f7ed651a64428d56e838968951c2dc35
SHA512f5519ba0d9eae424286b11a92a5d721baedf22a2aa014ac538305698cf11fd25ed5091226ec9ee1f92f8c214353a0a388117f507eb77789a2e3a5c295bdc952a
-
Filesize
5KB
MD5ef068af835ec6ee7dfaa3290a893f7ca
SHA17fafe5748d24d6f1385e06b88a5374d1072ba9a9
SHA256d5699f990fb276a379853eb9fedf015441062b966080318523346ad03965d119
SHA512abde8a01aabb6f1b9e137bd357d113a2e025975187365b218f7cbab9568d7f8f446dec2c35e839f0cc3a444da82b3eef675b31348cbe4248bba3255845d3bd76
-
Filesize
6KB
MD5dfcc5d406175df9ac0f7f62b47306b92
SHA14436af1f40f371598552fc91fe4a83b57cb8faf4
SHA2562290979137752e0114c2ee0c3267b70474fe86f0acab1677355f36174192c948
SHA512fcfa38a9c76ef044185c02cfec51b126183d91fedefdddc62ff62c4bd13db0ca0f9e5c68000c6bdebfbe787c6ec028904a16ec2bf55690a2467cd0877aa9e761
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD52c6780649cd1c3bc89ee965669968788
SHA19c8f286545a3797bf03fee28e3165c43743b727b
SHA256332728769025e399cfb3fb64228f159bd603aebf05a6f680e5f6cdce6fc04da4
SHA512e75fd7231d1691bf3d4e84b6615284c26ca83208aa7aec92f0bf828e30a98bc97673c2f3246bc29c6b1885ae59dfba6575c9b65675075ebd3aff39f4363fd314