Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
11-05-2024 12:40
Static task
static1
Behavioral task
behavioral1
Sample
34a1e8847d4fc6c4ce070bdedceb9b92_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
34a1e8847d4fc6c4ce070bdedceb9b92_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
34a1e8847d4fc6c4ce070bdedceb9b92_JaffaCakes118.html
-
Size
2KB
-
MD5
34a1e8847d4fc6c4ce070bdedceb9b92
-
SHA1
b55473fa6bd2c83fd7d69eec8ab8e75aaba2d2af
-
SHA256
b24529f37991e2f9fa77620d61c43b433291a0437753a2197c0f777cf1af1bec
-
SHA512
7a8a9108935fdaf8107cdca3c503cbc2fe18d0cbb21ede96e6a7e92fe897f097b53bcbbf7aa97b19261b2dfcaba1ff72fb001342ff855623b682b5fcbf9e37c5
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 692 msedge.exe 692 msedge.exe 3056 msedge.exe 3056 msedge.exe 4540 identity_helper.exe 4540 identity_helper.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe 3056 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3056 wrote to memory of 3492 3056 msedge.exe 82 PID 3056 wrote to memory of 3492 3056 msedge.exe 82 PID 3056 wrote to memory of 1588 3056 msedge.exe 83 PID 3056 wrote to memory of 1588 3056 msedge.exe 83 PID 3056 wrote to memory of 1588 3056 msedge.exe 83 PID 3056 wrote to memory of 1588 3056 msedge.exe 83 PID 3056 wrote to memory of 1588 3056 msedge.exe 83 PID 3056 wrote to memory of 1588 3056 msedge.exe 83 PID 3056 wrote to memory of 1588 3056 msedge.exe 83 PID 3056 wrote to memory of 1588 3056 msedge.exe 83 PID 3056 wrote to memory of 1588 3056 msedge.exe 83 PID 3056 wrote to memory of 1588 3056 msedge.exe 83 PID 3056 wrote to memory of 1588 3056 msedge.exe 83 PID 3056 wrote to memory of 1588 3056 msedge.exe 83 PID 3056 wrote to memory of 1588 3056 msedge.exe 83 PID 3056 wrote to memory of 1588 3056 msedge.exe 83 PID 3056 wrote to memory of 1588 3056 msedge.exe 83 PID 3056 wrote to memory of 1588 3056 msedge.exe 83 PID 3056 wrote to memory of 1588 3056 msedge.exe 83 PID 3056 wrote to memory of 1588 3056 msedge.exe 83 PID 3056 wrote to memory of 1588 3056 msedge.exe 83 PID 3056 wrote to memory of 1588 3056 msedge.exe 83 PID 3056 wrote to memory of 1588 3056 msedge.exe 83 PID 3056 wrote to memory of 1588 3056 msedge.exe 83 PID 3056 wrote to memory of 1588 3056 msedge.exe 83 PID 3056 wrote to memory of 1588 3056 msedge.exe 83 PID 3056 wrote to memory of 1588 3056 msedge.exe 83 PID 3056 wrote to memory of 1588 3056 msedge.exe 83 PID 3056 wrote to memory of 1588 3056 msedge.exe 83 PID 3056 wrote to memory of 1588 3056 msedge.exe 83 PID 3056 wrote to memory of 1588 3056 msedge.exe 83 PID 3056 wrote to memory of 1588 3056 msedge.exe 83 PID 3056 wrote to memory of 1588 3056 msedge.exe 83 PID 3056 wrote to memory of 1588 3056 msedge.exe 83 PID 3056 wrote to memory of 1588 3056 msedge.exe 83 PID 3056 wrote to memory of 1588 3056 msedge.exe 83 PID 3056 wrote to memory of 1588 3056 msedge.exe 83 PID 3056 wrote to memory of 1588 3056 msedge.exe 83 PID 3056 wrote to memory of 1588 3056 msedge.exe 83 PID 3056 wrote to memory of 1588 3056 msedge.exe 83 PID 3056 wrote to memory of 1588 3056 msedge.exe 83 PID 3056 wrote to memory of 1588 3056 msedge.exe 83 PID 3056 wrote to memory of 692 3056 msedge.exe 84 PID 3056 wrote to memory of 692 3056 msedge.exe 84 PID 3056 wrote to memory of 1928 3056 msedge.exe 85 PID 3056 wrote to memory of 1928 3056 msedge.exe 85 PID 3056 wrote to memory of 1928 3056 msedge.exe 85 PID 3056 wrote to memory of 1928 3056 msedge.exe 85 PID 3056 wrote to memory of 1928 3056 msedge.exe 85 PID 3056 wrote to memory of 1928 3056 msedge.exe 85 PID 3056 wrote to memory of 1928 3056 msedge.exe 85 PID 3056 wrote to memory of 1928 3056 msedge.exe 85 PID 3056 wrote to memory of 1928 3056 msedge.exe 85 PID 3056 wrote to memory of 1928 3056 msedge.exe 85 PID 3056 wrote to memory of 1928 3056 msedge.exe 85 PID 3056 wrote to memory of 1928 3056 msedge.exe 85 PID 3056 wrote to memory of 1928 3056 msedge.exe 85 PID 3056 wrote to memory of 1928 3056 msedge.exe 85 PID 3056 wrote to memory of 1928 3056 msedge.exe 85 PID 3056 wrote to memory of 1928 3056 msedge.exe 85 PID 3056 wrote to memory of 1928 3056 msedge.exe 85 PID 3056 wrote to memory of 1928 3056 msedge.exe 85 PID 3056 wrote to memory of 1928 3056 msedge.exe 85 PID 3056 wrote to memory of 1928 3056 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\34a1e8847d4fc6c4ce070bdedceb9b92_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe92d846f8,0x7ffe92d84708,0x7ffe92d847182⤵PID:3492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2180,13789594135644752106,251412938168821668,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2192 /prefetch:22⤵PID:1588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2180,13789594135644752106,251412938168821668,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2244 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2180,13789594135644752106,251412938168821668,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2880 /prefetch:82⤵PID:1928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,13789594135644752106,251412938168821668,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:2224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,13789594135644752106,251412938168821668,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:3240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,13789594135644752106,251412938168821668,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4148 /prefetch:12⤵PID:3760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,13789594135644752106,251412938168821668,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5248 /prefetch:12⤵PID:3384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2180,13789594135644752106,251412938168821668,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5384 /prefetch:82⤵PID:3864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2180,13789594135644752106,251412938168821668,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5384 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,13789594135644752106,251412938168821668,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:12⤵PID:2668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,13789594135644752106,251412938168821668,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3600 /prefetch:12⤵PID:3804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,13789594135644752106,251412938168821668,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5500 /prefetch:12⤵PID:4764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,13789594135644752106,251412938168821668,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5580 /prefetch:12⤵PID:2724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2180,13789594135644752106,251412938168821668,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4940 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2652
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2196
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:404
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54b4f91fa1b362ba5341ecb2836438dea
SHA19561f5aabed742404d455da735259a2c6781fa07
SHA256d824b742eace197ddc8b6ed5d918f390fde4b0fbf0e371b8e1f2ed40a3b6455c
SHA512fef22217dcdd8000bc193e25129699d4b8f7a103ca4fe1613baf73ccf67090d9fbae27eb93e4bb8747455853a0a4326f2d0c38df41c8d42351cdcd4132418dac
-
Filesize
152B
MD5eaa3db555ab5bc0cb364826204aad3f0
SHA1a4cdfaac8de49e6e6e88b335cfeaa7c9e3c563ca
SHA256ef7baeb1b2ab05ff3c5fbb76c2759db49294654548706c7c8e87f0cde855b86b
SHA512e13981da51b52c15261ecabb98af32f9b920651b46b10ce0cc823c5878b22eb1420258c80deef204070d1e0bdd3a64d875ac2522e3713a3cf11657aa55aeccd4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD58d3739d1eff7c35c6bd3b61c81c1317a
SHA12dd2d8aadce62ac4ff0dba56ca113a79690e37cf
SHA2563771d28b2cf8f572216940d3f48b4c6ac03c80d967c3bafbf48f9efac02ce19d
SHA5127e2a90649561df3e93095ef87081524191f2946e5720e69956ad66b3a81dd3e07eca48365750a95ec5bd8da158dd6e87e9af2dd92a801bb3b8ca7226d4457ab6
-
Filesize
564B
MD5750565172f35c4e2779c75b9a5826770
SHA160832a51d25cdd6ed9c130cdaa2a16cb30ecbc13
SHA25636cdc925e761fe708493520baf3d7addc5f4aba4a0a98e31f8c4076b63b6e362
SHA51249caa7d8946d2583bf4b31a82e5d211d33a017e004446f0dc7c16990057e3eb9510edaf0c1bce7e5d4a7e61d854c8cec9fa4660b013329f14a47efa871c90aed
-
Filesize
6KB
MD544c65586e7411b104c3ed56734e4ec9c
SHA1d675d9d1c5eb1fb07586094bb4875abdbceb95b3
SHA256241c0ce1ae7e95501a9d6aa1591c3fc6cfe79d25f2eaf37083e349d70915ed7a
SHA512af6175a50937c8a7ba7205185f6aade558efc3e04fe9a8658ba11dcf1f22b349a95cb4c935257db07faa2aa78761799dd8d111e4538cad80ec38f6bd501b4d2f
-
Filesize
6KB
MD53fc6cb7e5ad1ea359939432069d5b342
SHA1f6fdfd954b4b4d64e2501efde3841ef8270c3cad
SHA256dfe70f61d4393c31cf811dca6929d415d1c494152569ac4eb51ee5298ef407e9
SHA51288df67eb87c89b65c653fba5ac1fffbbe50f89664eed9b7d7a3a665dcdf7a5ffb728725080f0602add4bf6b89cdc7def42c10bedbc0028b1e55a78c73cbc9e97
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5aef91b06fbfdc3d4cfcd96e41b873005
SHA113026bec888ed3c86475e9cd9a3fb345a4e6ed7e
SHA2563013252211367977dc7f0ab782175c86339b590dd462d586e2cbf6ea33e8ddf7
SHA512a50fe49fc662fa62dcdbcab1dcd015f67152e95b9c5c39b9a9e9de10e04db62308c6e2187229d04fcfc914a629f5d6a27a6a5779d082242afc8d02fb0225be68