Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
11-05-2024 03:57
Static task
static1
Behavioral task
behavioral1
Sample
3297e82d3e782e901201b63ecef3a6a8_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
3297e82d3e782e901201b63ecef3a6a8_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
3297e82d3e782e901201b63ecef3a6a8_JaffaCakes118.html
-
Size
140KB
-
MD5
3297e82d3e782e901201b63ecef3a6a8
-
SHA1
6ddcb44c72856f5d366deb42fb0e30375cccabc4
-
SHA256
cf5efdc8d9c1aaf9ee5f2d6c3ec5f1e089aa5c88ba488968f02f67cfbec7b3cb
-
SHA512
f33adb1057273fe35954cf418290a058dfce1e52f630b5d3848cf65668c87ac0b29e4f473d32e2daa3267413c64b1dc63fd626d36fea1719564bb1b51c518210
-
SSDEEP
3072:l/EWaxiKY65h65h65h65h65h65h65h65+r:+
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3480 msedge.exe 3480 msedge.exe 3864 msedge.exe 3864 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3864 msedge.exe 3864 msedge.exe 3864 msedge.exe 3864 msedge.exe 3864 msedge.exe 3864 msedge.exe 3864 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3864 msedge.exe 3864 msedge.exe 3864 msedge.exe 3864 msedge.exe 3864 msedge.exe 3864 msedge.exe 3864 msedge.exe 3864 msedge.exe 3864 msedge.exe 3864 msedge.exe 3864 msedge.exe 3864 msedge.exe 3864 msedge.exe 3864 msedge.exe 3864 msedge.exe 3864 msedge.exe 3864 msedge.exe 3864 msedge.exe 3864 msedge.exe 3864 msedge.exe 3864 msedge.exe 3864 msedge.exe 3864 msedge.exe 3864 msedge.exe 3864 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3864 msedge.exe 3864 msedge.exe 3864 msedge.exe 3864 msedge.exe 3864 msedge.exe 3864 msedge.exe 3864 msedge.exe 3864 msedge.exe 3864 msedge.exe 3864 msedge.exe 3864 msedge.exe 3864 msedge.exe 3864 msedge.exe 3864 msedge.exe 3864 msedge.exe 3864 msedge.exe 3864 msedge.exe 3864 msedge.exe 3864 msedge.exe 3864 msedge.exe 3864 msedge.exe 3864 msedge.exe 3864 msedge.exe 3864 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3864 wrote to memory of 2504 3864 msedge.exe 82 PID 3864 wrote to memory of 2504 3864 msedge.exe 82 PID 3864 wrote to memory of 2740 3864 msedge.exe 85 PID 3864 wrote to memory of 2740 3864 msedge.exe 85 PID 3864 wrote to memory of 2740 3864 msedge.exe 85 PID 3864 wrote to memory of 2740 3864 msedge.exe 85 PID 3864 wrote to memory of 2740 3864 msedge.exe 85 PID 3864 wrote to memory of 2740 3864 msedge.exe 85 PID 3864 wrote to memory of 2740 3864 msedge.exe 85 PID 3864 wrote to memory of 2740 3864 msedge.exe 85 PID 3864 wrote to memory of 2740 3864 msedge.exe 85 PID 3864 wrote to memory of 2740 3864 msedge.exe 85 PID 3864 wrote to memory of 2740 3864 msedge.exe 85 PID 3864 wrote to memory of 2740 3864 msedge.exe 85 PID 3864 wrote to memory of 2740 3864 msedge.exe 85 PID 3864 wrote to memory of 2740 3864 msedge.exe 85 PID 3864 wrote to memory of 2740 3864 msedge.exe 85 PID 3864 wrote to memory of 2740 3864 msedge.exe 85 PID 3864 wrote to memory of 2740 3864 msedge.exe 85 PID 3864 wrote to memory of 2740 3864 msedge.exe 85 PID 3864 wrote to memory of 2740 3864 msedge.exe 85 PID 3864 wrote to memory of 2740 3864 msedge.exe 85 PID 3864 wrote to memory of 2740 3864 msedge.exe 85 PID 3864 wrote to memory of 2740 3864 msedge.exe 85 PID 3864 wrote to memory of 2740 3864 msedge.exe 85 PID 3864 wrote to memory of 2740 3864 msedge.exe 85 PID 3864 wrote to memory of 2740 3864 msedge.exe 85 PID 3864 wrote to memory of 2740 3864 msedge.exe 85 PID 3864 wrote to memory of 2740 3864 msedge.exe 85 PID 3864 wrote to memory of 2740 3864 msedge.exe 85 PID 3864 wrote to memory of 2740 3864 msedge.exe 85 PID 3864 wrote to memory of 2740 3864 msedge.exe 85 PID 3864 wrote to memory of 2740 3864 msedge.exe 85 PID 3864 wrote to memory of 2740 3864 msedge.exe 85 PID 3864 wrote to memory of 2740 3864 msedge.exe 85 PID 3864 wrote to memory of 2740 3864 msedge.exe 85 PID 3864 wrote to memory of 2740 3864 msedge.exe 85 PID 3864 wrote to memory of 2740 3864 msedge.exe 85 PID 3864 wrote to memory of 2740 3864 msedge.exe 85 PID 3864 wrote to memory of 2740 3864 msedge.exe 85 PID 3864 wrote to memory of 2740 3864 msedge.exe 85 PID 3864 wrote to memory of 2740 3864 msedge.exe 85 PID 3864 wrote to memory of 3480 3864 msedge.exe 86 PID 3864 wrote to memory of 3480 3864 msedge.exe 86 PID 3864 wrote to memory of 3904 3864 msedge.exe 87 PID 3864 wrote to memory of 3904 3864 msedge.exe 87 PID 3864 wrote to memory of 3904 3864 msedge.exe 87 PID 3864 wrote to memory of 3904 3864 msedge.exe 87 PID 3864 wrote to memory of 3904 3864 msedge.exe 87 PID 3864 wrote to memory of 3904 3864 msedge.exe 87 PID 3864 wrote to memory of 3904 3864 msedge.exe 87 PID 3864 wrote to memory of 3904 3864 msedge.exe 87 PID 3864 wrote to memory of 3904 3864 msedge.exe 87 PID 3864 wrote to memory of 3904 3864 msedge.exe 87 PID 3864 wrote to memory of 3904 3864 msedge.exe 87 PID 3864 wrote to memory of 3904 3864 msedge.exe 87 PID 3864 wrote to memory of 3904 3864 msedge.exe 87 PID 3864 wrote to memory of 3904 3864 msedge.exe 87 PID 3864 wrote to memory of 3904 3864 msedge.exe 87 PID 3864 wrote to memory of 3904 3864 msedge.exe 87 PID 3864 wrote to memory of 3904 3864 msedge.exe 87 PID 3864 wrote to memory of 3904 3864 msedge.exe 87 PID 3864 wrote to memory of 3904 3864 msedge.exe 87 PID 3864 wrote to memory of 3904 3864 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\3297e82d3e782e901201b63ecef3a6a8_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3864 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffceb5246f8,0x7ffceb524708,0x7ffceb5247182⤵PID:2504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,17666268711354455187,7768936778280092762,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:22⤵PID:2740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,17666268711354455187,7768936778280092762,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,17666268711354455187,7768936778280092762,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2672 /prefetch:82⤵PID:3904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,17666268711354455187,7768936778280092762,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:2012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,17666268711354455187,7768936778280092762,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,17666268711354455187,7768936778280092762,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3988 /prefetch:12⤵PID:4068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,17666268711354455187,7768936778280092762,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4676 /prefetch:12⤵PID:4816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,17666268711354455187,7768936778280092762,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4812 /prefetch:12⤵PID:1528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,17666268711354455187,7768936778280092762,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5080 /prefetch:12⤵PID:1028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,17666268711354455187,7768936778280092762,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2992 /prefetch:12⤵PID:756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,17666268711354455187,7768936778280092762,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=7896 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4876
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5004
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4420
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ae54e9db2e89f2c54da8cc0bfcbd26bd
SHA1a88af6c673609ecbc51a1a60dfbc8577830d2b5d
SHA2565009d3c953de63cfd14a7d911156c514e179ff07d2b94382d9caac6040cb72af
SHA512e3b70e5eb7321b9deca6f6a17424a15b9fd5c4008bd3789bd01099fd13cb2f4a2f37fe4b920fb51c50517745b576c1f94df83efd1a7e75949551163985599998
-
Filesize
152B
MD5f53207a5ca2ef5c7e976cbb3cb26d870
SHA149a8cc44f53da77bb3dfb36fc7676ed54675db43
SHA25619ab4e3c9da6d9cedda7461efdba9a2085e743513ab89f1dd0fd5a8f9486ad23
SHA512be734c7e8afda19f445912aef0d78f9941add29baebd4a812bff27f10a1d78b52aeb11c551468c8644443c86e1a2a6b2e4aead3d7f81d39925e3c20406ac1499
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD544161db93d5285a3e08dca766f6f52fd
SHA154696d00c9d6e15de182e19298083632af5b4d13
SHA256f8543e6ec1cd63df43c98f0d9d91a26c65b38e4d69c3e1102dd4d90b67793f76
SHA51258a9ea84ded3d21678b793578eb54020d5038a5233ee9a659442a9d18774d5a0984b322db26007651d7530ba16e356233f189ba29ccdd025f4a03f1cda7d4b25
-
Filesize
642B
MD562d3e2de8119db203acb01e9a75629cc
SHA11701440a273ed6dd291d1b84990db11989b3b9d8
SHA256153d1d82091645b57bc8f5d9f28b52bfd699244394367c86ead4f5719663dd91
SHA512a11dc9dde685cff48d2898828923b471e741274ddd1a809d5377121e7be9abfaaf98e14bf0ff359689ce5719f31bf0c5a9863efeb097c31a302ec0421fcac80c
-
Filesize
5KB
MD57ab5a012d45f2e3a900b7daedae0a334
SHA1d0132df4dc6efe16216546c1cbce3d53ba6150ab
SHA2562dbe914ac8aad99c5405fcd918549a11a0c0f8c9f47fced80c718b9bea1f7a51
SHA5126b41a89d90ac77d5de04bbb7a2f7ad18a302db49fc57fc3b40b92a312726396aec3b9aa1845520ea409e815c118f9d685b9fad68fcb6246a39c040278aeb135e
-
Filesize
6KB
MD5434396055768d2b3f3da62076bad06c1
SHA1004ecb84b127c46240b04c9b52b2884a45c8fdf2
SHA2564d22016d2a142f8c62e6a8b4117202b955628911554f96b474f6ab7add7b9671
SHA512bafd49c4b5ab08f97cf0784bcbed62e04247a76619595b26c0682c2e12a2759fcd9ed944da442f2f63ab13ed24737913f585f7a763ad368717ac52fc55351b04
-
Filesize
6KB
MD5188ffcaec9ebebb3bd632d4a699ba74e
SHA1cca0544eac469b11faf0341b8e4c4554ecb58916
SHA256c360581b947e81de752c8fca39cf4f0d3745fe29c71cd3a87031b313b042671a
SHA51296ef206bf1eae70ba9e543220195ecadddaa67a2f927e0eec51f5020399f8e26ad7b6175f9984c6e02ffe68a6a80c8e28e5fe55cc8dad95a31dae6fd998b9f40
-
Filesize
11KB
MD5859f830a577d648b1d4206a6aa7d5873
SHA1513a650632a236ece3a73adf5b608a106607f043
SHA256bccd34759d950ef988a0c7a52ffdcaf92f297d0e9c9d79a9a35b3120c59dad8e
SHA512f645aed00594746505f6df92280b5e68a1c822e1c669195240f65a7155d30000d753017bb67dbddbf41638b542b721d3f4b69fd31da34a72c3afe7c010a9619f