Analysis
-
max time kernel
148s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
11/05/2024, 01:42
Static task
static1
Behavioral task
behavioral1
Sample
321555d149b18636d4759743219208bf_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
321555d149b18636d4759743219208bf_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
321555d149b18636d4759743219208bf_JaffaCakes118.html
-
Size
2KB
-
MD5
321555d149b18636d4759743219208bf
-
SHA1
2a865380e93631388badc47bfe6a2537eb68ad5f
-
SHA256
1b4e6a6025ef29f539aedb49d480869cd65bdbf0da019891ce8967aca7ddb251
-
SHA512
b89c8a827518b999bb2d704c7896e7f3ccd3a042ba7fd4293c039387726fa3936b80848d246baf63f56a30b8c97f1792168d98d981e651b9cf08873d058ec9e7
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1276 msedge.exe 1276 msedge.exe 2496 msedge.exe 2496 msedge.exe 1028 identity_helper.exe 1028 identity_helper.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2496 wrote to memory of 1808 2496 msedge.exe 82 PID 2496 wrote to memory of 1808 2496 msedge.exe 82 PID 2496 wrote to memory of 2512 2496 msedge.exe 83 PID 2496 wrote to memory of 2512 2496 msedge.exe 83 PID 2496 wrote to memory of 2512 2496 msedge.exe 83 PID 2496 wrote to memory of 2512 2496 msedge.exe 83 PID 2496 wrote to memory of 2512 2496 msedge.exe 83 PID 2496 wrote to memory of 2512 2496 msedge.exe 83 PID 2496 wrote to memory of 2512 2496 msedge.exe 83 PID 2496 wrote to memory of 2512 2496 msedge.exe 83 PID 2496 wrote to memory of 2512 2496 msedge.exe 83 PID 2496 wrote to memory of 2512 2496 msedge.exe 83 PID 2496 wrote to memory of 2512 2496 msedge.exe 83 PID 2496 wrote to memory of 2512 2496 msedge.exe 83 PID 2496 wrote to memory of 2512 2496 msedge.exe 83 PID 2496 wrote to memory of 2512 2496 msedge.exe 83 PID 2496 wrote to memory of 2512 2496 msedge.exe 83 PID 2496 wrote to memory of 2512 2496 msedge.exe 83 PID 2496 wrote to memory of 2512 2496 msedge.exe 83 PID 2496 wrote to memory of 2512 2496 msedge.exe 83 PID 2496 wrote to memory of 2512 2496 msedge.exe 83 PID 2496 wrote to memory of 2512 2496 msedge.exe 83 PID 2496 wrote to memory of 2512 2496 msedge.exe 83 PID 2496 wrote to memory of 2512 2496 msedge.exe 83 PID 2496 wrote to memory of 2512 2496 msedge.exe 83 PID 2496 wrote to memory of 2512 2496 msedge.exe 83 PID 2496 wrote to memory of 2512 2496 msedge.exe 83 PID 2496 wrote to memory of 2512 2496 msedge.exe 83 PID 2496 wrote to memory of 2512 2496 msedge.exe 83 PID 2496 wrote to memory of 2512 2496 msedge.exe 83 PID 2496 wrote to memory of 2512 2496 msedge.exe 83 PID 2496 wrote to memory of 2512 2496 msedge.exe 83 PID 2496 wrote to memory of 2512 2496 msedge.exe 83 PID 2496 wrote to memory of 2512 2496 msedge.exe 83 PID 2496 wrote to memory of 2512 2496 msedge.exe 83 PID 2496 wrote to memory of 2512 2496 msedge.exe 83 PID 2496 wrote to memory of 2512 2496 msedge.exe 83 PID 2496 wrote to memory of 2512 2496 msedge.exe 83 PID 2496 wrote to memory of 2512 2496 msedge.exe 83 PID 2496 wrote to memory of 2512 2496 msedge.exe 83 PID 2496 wrote to memory of 2512 2496 msedge.exe 83 PID 2496 wrote to memory of 2512 2496 msedge.exe 83 PID 2496 wrote to memory of 1276 2496 msedge.exe 84 PID 2496 wrote to memory of 1276 2496 msedge.exe 84 PID 2496 wrote to memory of 3916 2496 msedge.exe 85 PID 2496 wrote to memory of 3916 2496 msedge.exe 85 PID 2496 wrote to memory of 3916 2496 msedge.exe 85 PID 2496 wrote to memory of 3916 2496 msedge.exe 85 PID 2496 wrote to memory of 3916 2496 msedge.exe 85 PID 2496 wrote to memory of 3916 2496 msedge.exe 85 PID 2496 wrote to memory of 3916 2496 msedge.exe 85 PID 2496 wrote to memory of 3916 2496 msedge.exe 85 PID 2496 wrote to memory of 3916 2496 msedge.exe 85 PID 2496 wrote to memory of 3916 2496 msedge.exe 85 PID 2496 wrote to memory of 3916 2496 msedge.exe 85 PID 2496 wrote to memory of 3916 2496 msedge.exe 85 PID 2496 wrote to memory of 3916 2496 msedge.exe 85 PID 2496 wrote to memory of 3916 2496 msedge.exe 85 PID 2496 wrote to memory of 3916 2496 msedge.exe 85 PID 2496 wrote to memory of 3916 2496 msedge.exe 85 PID 2496 wrote to memory of 3916 2496 msedge.exe 85 PID 2496 wrote to memory of 3916 2496 msedge.exe 85 PID 2496 wrote to memory of 3916 2496 msedge.exe 85 PID 2496 wrote to memory of 3916 2496 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\321555d149b18636d4759743219208bf_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8591c46f8,0x7ff8591c4708,0x7ff8591c47182⤵PID:1808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,4146175785005461606,15574843360298080389,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:22⤵PID:2512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,4146175785005461606,15574843360298080389,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2192 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,4146175785005461606,15574843360298080389,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2836 /prefetch:82⤵PID:3916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,4146175785005461606,15574843360298080389,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:2472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,4146175785005461606,15574843360298080389,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:4816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,4146175785005461606,15574843360298080389,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4584 /prefetch:12⤵PID:1372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,4146175785005461606,15574843360298080389,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5200 /prefetch:12⤵PID:3672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,4146175785005461606,15574843360298080389,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3700 /prefetch:12⤵PID:3796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,4146175785005461606,15574843360298080389,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4876 /prefetch:12⤵PID:400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,4146175785005461606,15574843360298080389,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4860 /prefetch:12⤵PID:1912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,4146175785005461606,15574843360298080389,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5592 /prefetch:82⤵PID:2864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,4146175785005461606,15574843360298080389,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5592 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,4146175785005461606,15574843360298080389,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5852 /prefetch:12⤵PID:2892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,4146175785005461606,15574843360298080389,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5844 /prefetch:12⤵PID:1272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,4146175785005461606,15574843360298080389,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4972 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1376
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3940
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1424
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD5d4dddd37eb5dceb2ea1210c10fb360e3
SHA1a23bce3ee05acab7b24ab413f2117905810a8cee
SHA256d7cbb3f5541235702440559a0def5167a724b6629624d5bfe13b8536b3a155e2
SHA512505ec71555d81d1f2111bda2b06f6bc73e7d3278354a7bb359ceaafa76f7546fe520b9fc931933391e77f60475415be2a4905f886e1316cdce7653d150a2bcba
-
Filesize
1KB
MD5eaf8a886ca06207f08d4168af25a56b2
SHA15370e6b23c4c02b3c8b71dd1cb1c503c9786bd36
SHA2569bf39c56c6aee837b2f83fb12b13059c450c5a0bada3df3cec31a4afcd1f68d3
SHA512a7f6ca8a50d3df49b610bb02f43cc6ca860e50652cc33cf34d5d077f210dfa6127ccad3540403672d538bcddcb3ad2745be18ed742b751c696aab08cd842bfdb
-
Filesize
6KB
MD50c53e2803454d08ff4a2c422b0439778
SHA10ba373292d9de0657721b3f5a635c88672d06fbb
SHA2562b17f6af397d05d889ad30396f74c50c7d459a05df45b35252ce5894177d135c
SHA512c28379ac2d441679729d571a4a12414cb11bacf8921e3215859fbefdef6ac6c538a536a07a8d01af71291383ff0b03f3f1ab10725a04ab49361939c4f24f118d
-
Filesize
6KB
MD5d82a8dcddadf7821f6911e6f9fdbec3b
SHA18b6ffa38c2dcc6343ae081353f690beff2c44c72
SHA256d91c3606711fdd9cedf30a1c2a3755c949b7279c47fe0c3b900b7267eeb3b8b5
SHA512d8832b14d0cafef32f9dd4046279afe4da07697c1fd53b18226ee9af6af2381620ca5f351bcb8472a6601e4499c024ea7e6e59713fb207a5a80145224eba9aad
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5f3485e06872d6af3f43dd60ee6b0d4e8
SHA110c11fad1756b58dc24eeecd8f64bebd17bb5f5a
SHA256913ad6d206208ccda38aff3bcd6e3b515cf689a1d1eeb9bef6316ad98a36ae2f
SHA512efb54a70b04a7fad2868c23d2c28aa8803d006ebdc4e35d7c20577fe56d4162851cee57fc8757f8c48b85dee4ddc5f63810300fa64f802548605492b33cddc5d