Analysis
-
max time kernel
145s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
11-05-2024 09:22
Static task
static1
Behavioral task
behavioral1
Sample
33df2773f818c18ed0b55ca254dc8684_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
33df2773f818c18ed0b55ca254dc8684_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
33df2773f818c18ed0b55ca254dc8684_JaffaCakes118.html
-
Size
21KB
-
MD5
33df2773f818c18ed0b55ca254dc8684
-
SHA1
4454259d801ab7c2165c5732a0c366f965dcc187
-
SHA256
cf3869bf2627b07e4fc9a9f545235dc5333d28db76accb23b2ddaf98f7aad034
-
SHA512
a4857f23d43c2570127ff57ed7fb8d43a14004a32561717c2c365331ebdcfe67c9b63d6ee046766f9988ae1008392e5e0de010f331eb21b9a7d70467c49f8139
-
SSDEEP
384:ban0n9AhsLimyVUqiSiDfQ3akZT1r22IOuIwKxwXtyV6yV6yVQAhyV9skkUg+QUE:ban0n9AhsLimyVY7DfQFd12/5yV6yV6m
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 384 msedge.exe 384 msedge.exe 3912 msedge.exe 3912 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3912 wrote to memory of 1596 3912 msedge.exe 81 PID 3912 wrote to memory of 1596 3912 msedge.exe 81 PID 3912 wrote to memory of 512 3912 msedge.exe 82 PID 3912 wrote to memory of 512 3912 msedge.exe 82 PID 3912 wrote to memory of 512 3912 msedge.exe 82 PID 3912 wrote to memory of 512 3912 msedge.exe 82 PID 3912 wrote to memory of 512 3912 msedge.exe 82 PID 3912 wrote to memory of 512 3912 msedge.exe 82 PID 3912 wrote to memory of 512 3912 msedge.exe 82 PID 3912 wrote to memory of 512 3912 msedge.exe 82 PID 3912 wrote to memory of 512 3912 msedge.exe 82 PID 3912 wrote to memory of 512 3912 msedge.exe 82 PID 3912 wrote to memory of 512 3912 msedge.exe 82 PID 3912 wrote to memory of 512 3912 msedge.exe 82 PID 3912 wrote to memory of 512 3912 msedge.exe 82 PID 3912 wrote to memory of 512 3912 msedge.exe 82 PID 3912 wrote to memory of 512 3912 msedge.exe 82 PID 3912 wrote to memory of 512 3912 msedge.exe 82 PID 3912 wrote to memory of 512 3912 msedge.exe 82 PID 3912 wrote to memory of 512 3912 msedge.exe 82 PID 3912 wrote to memory of 512 3912 msedge.exe 82 PID 3912 wrote to memory of 512 3912 msedge.exe 82 PID 3912 wrote to memory of 512 3912 msedge.exe 82 PID 3912 wrote to memory of 512 3912 msedge.exe 82 PID 3912 wrote to memory of 512 3912 msedge.exe 82 PID 3912 wrote to memory of 512 3912 msedge.exe 82 PID 3912 wrote to memory of 512 3912 msedge.exe 82 PID 3912 wrote to memory of 512 3912 msedge.exe 82 PID 3912 wrote to memory of 512 3912 msedge.exe 82 PID 3912 wrote to memory of 512 3912 msedge.exe 82 PID 3912 wrote to memory of 512 3912 msedge.exe 82 PID 3912 wrote to memory of 512 3912 msedge.exe 82 PID 3912 wrote to memory of 512 3912 msedge.exe 82 PID 3912 wrote to memory of 512 3912 msedge.exe 82 PID 3912 wrote to memory of 512 3912 msedge.exe 82 PID 3912 wrote to memory of 512 3912 msedge.exe 82 PID 3912 wrote to memory of 512 3912 msedge.exe 82 PID 3912 wrote to memory of 512 3912 msedge.exe 82 PID 3912 wrote to memory of 512 3912 msedge.exe 82 PID 3912 wrote to memory of 512 3912 msedge.exe 82 PID 3912 wrote to memory of 512 3912 msedge.exe 82 PID 3912 wrote to memory of 512 3912 msedge.exe 82 PID 3912 wrote to memory of 384 3912 msedge.exe 83 PID 3912 wrote to memory of 384 3912 msedge.exe 83 PID 3912 wrote to memory of 3464 3912 msedge.exe 84 PID 3912 wrote to memory of 3464 3912 msedge.exe 84 PID 3912 wrote to memory of 3464 3912 msedge.exe 84 PID 3912 wrote to memory of 3464 3912 msedge.exe 84 PID 3912 wrote to memory of 3464 3912 msedge.exe 84 PID 3912 wrote to memory of 3464 3912 msedge.exe 84 PID 3912 wrote to memory of 3464 3912 msedge.exe 84 PID 3912 wrote to memory of 3464 3912 msedge.exe 84 PID 3912 wrote to memory of 3464 3912 msedge.exe 84 PID 3912 wrote to memory of 3464 3912 msedge.exe 84 PID 3912 wrote to memory of 3464 3912 msedge.exe 84 PID 3912 wrote to memory of 3464 3912 msedge.exe 84 PID 3912 wrote to memory of 3464 3912 msedge.exe 84 PID 3912 wrote to memory of 3464 3912 msedge.exe 84 PID 3912 wrote to memory of 3464 3912 msedge.exe 84 PID 3912 wrote to memory of 3464 3912 msedge.exe 84 PID 3912 wrote to memory of 3464 3912 msedge.exe 84 PID 3912 wrote to memory of 3464 3912 msedge.exe 84 PID 3912 wrote to memory of 3464 3912 msedge.exe 84 PID 3912 wrote to memory of 3464 3912 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\33df2773f818c18ed0b55ca254dc8684_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3912 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9e53746f8,0x7ff9e5374708,0x7ff9e53747182⤵PID:1596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2032,15051921495745488901,16980628123997555427,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2044 /prefetch:22⤵PID:512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2032,15051921495745488901,16980628123997555427,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2264 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2032,15051921495745488901,16980628123997555427,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2728 /prefetch:82⤵PID:3464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,15051921495745488901,16980628123997555427,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:4760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,15051921495745488901,16980628123997555427,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:1092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,15051921495745488901,16980628123997555427,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4996 /prefetch:12⤵PID:2404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,15051921495745488901,16980628123997555427,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5160 /prefetch:12⤵PID:1568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,15051921495745488901,16980628123997555427,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5396 /prefetch:12⤵PID:4756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2032,15051921495745488901,16980628123997555427,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2232 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2376
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2528
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3440
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD58e351d34348e287b997c617c269dfad7
SHA1f41ea696aa914bcdb9f5956561005d002f6816f0
SHA2560bd214070264ae4a2cc159612232a1097a4a65b304bea32930a2ff74793afe19
SHA512148b1ea249b6799d494d588636d94c83ecda11515a00b198207d3b2982b42f08f082974990c91a66c177a3a799341eb84512bc0c6b9a0f25a344c334d167ccec
-
Filesize
2KB
MD5956694e21e348fc5071b2a3ec9e6d0e9
SHA17f37eea3f7adf55db9e0b304b5813781c769003e
SHA2563e6043af2fd3fecd4918385a2959b1ebaf23b0864256b7038527efda8d42fbd2
SHA5122708e928912d027a00f7312f44714fd729cdedb32a61f87a1d71c2dbbf89e50d7d125b51c8a92facd6317cd0a7302738581e73b469d6ccf63ce581f02aa3e2a2
-
Filesize
6KB
MD5bd507718fe92cc19e98332658ee74987
SHA1117860f17e6ad1b36c90ca9d5fd4e8cc6642945a
SHA256a36a6280ed8c059e4bd632af34823f76a8ac3ef44f8d5002479d5e6de73e19be
SHA512aa212364ce887afb52bd7768fd70a6a3f8e1912531f2bfc8abd1c3cd22ea4c34f558c21c336c18a57f0e12464c430bdf991000f8f65c100e0c98dea579199582
-
Filesize
6KB
MD50243e9657decdc6b4fe6418dff0fac15
SHA195b0bd6fafc68e11235015008ae8cd6fe8075a2b
SHA256fa729d9c1c2a5b9c77e75fb279dca3b1b50b51e8262681002a4fbc1b57aa9e9a
SHA51219faf651b99d7ca7126fffcd4e295a8b77e20fdd9ca83eac12b5efb5f296c18d2e891ad13861bc4ed05d5e4135885726a4965c19eb59f2f4dd318d3f2b34b1fe
-
Filesize
11KB
MD509f0e0aea045acf848ef68eaae0b9802
SHA1d00ef6fe4a237439cb313d63b7a7e1338786fe41
SHA256cdd7dfce896764e6c4edc6779ab3f405148ef8522ce19d7ae01aed0a40a53598
SHA512731b74186e4adf768d27e16489195dc8ae24c2b09e7dca7a5ef7fd39af25b7211bb4773e755c450b1ee49ee6545e7c83a39bd29e9b10c7d2994963714c5c3442