Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
11/05/2024, 18:32
Static task
static1
Behavioral task
behavioral1
Sample
35f743f38a5eef50471893f812a36b02_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
35f743f38a5eef50471893f812a36b02_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
35f743f38a5eef50471893f812a36b02_JaffaCakes118.html
-
Size
42KB
-
MD5
35f743f38a5eef50471893f812a36b02
-
SHA1
09e5283d2a7366f495fbcbd18da66329838477bb
-
SHA256
6b47c06866278feec312b204af7e684d22d5a83dd4ae0df7e826a266f24abb61
-
SHA512
354ac03c14aecaaa27d4a72022a6f0698b5e93ca2c6ac88ff572017f0fc245b0d724885f7f66a10235de6a50ea95d3136c18d234c31040fea8d3e4a3a1f15170
-
SSDEEP
768:wURpELmx5GCYxdj9wzU5xPlfCUwwTjdx8O9gjOH8/tyRU9JvjkciX/2941:wLL45KYU5xPlfmc5x8O9FHCaU9Jvjkcs
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3560 msedge.exe 3560 msedge.exe 456 msedge.exe 456 msedge.exe 336 identity_helper.exe 336 identity_helper.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe 1948 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 456 wrote to memory of 3444 456 msedge.exe 82 PID 456 wrote to memory of 3444 456 msedge.exe 82 PID 456 wrote to memory of 1316 456 msedge.exe 83 PID 456 wrote to memory of 1316 456 msedge.exe 83 PID 456 wrote to memory of 1316 456 msedge.exe 83 PID 456 wrote to memory of 1316 456 msedge.exe 83 PID 456 wrote to memory of 1316 456 msedge.exe 83 PID 456 wrote to memory of 1316 456 msedge.exe 83 PID 456 wrote to memory of 1316 456 msedge.exe 83 PID 456 wrote to memory of 1316 456 msedge.exe 83 PID 456 wrote to memory of 1316 456 msedge.exe 83 PID 456 wrote to memory of 1316 456 msedge.exe 83 PID 456 wrote to memory of 1316 456 msedge.exe 83 PID 456 wrote to memory of 1316 456 msedge.exe 83 PID 456 wrote to memory of 1316 456 msedge.exe 83 PID 456 wrote to memory of 1316 456 msedge.exe 83 PID 456 wrote to memory of 1316 456 msedge.exe 83 PID 456 wrote to memory of 1316 456 msedge.exe 83 PID 456 wrote to memory of 1316 456 msedge.exe 83 PID 456 wrote to memory of 1316 456 msedge.exe 83 PID 456 wrote to memory of 1316 456 msedge.exe 83 PID 456 wrote to memory of 1316 456 msedge.exe 83 PID 456 wrote to memory of 1316 456 msedge.exe 83 PID 456 wrote to memory of 1316 456 msedge.exe 83 PID 456 wrote to memory of 1316 456 msedge.exe 83 PID 456 wrote to memory of 1316 456 msedge.exe 83 PID 456 wrote to memory of 1316 456 msedge.exe 83 PID 456 wrote to memory of 1316 456 msedge.exe 83 PID 456 wrote to memory of 1316 456 msedge.exe 83 PID 456 wrote to memory of 1316 456 msedge.exe 83 PID 456 wrote to memory of 1316 456 msedge.exe 83 PID 456 wrote to memory of 1316 456 msedge.exe 83 PID 456 wrote to memory of 1316 456 msedge.exe 83 PID 456 wrote to memory of 1316 456 msedge.exe 83 PID 456 wrote to memory of 1316 456 msedge.exe 83 PID 456 wrote to memory of 1316 456 msedge.exe 83 PID 456 wrote to memory of 1316 456 msedge.exe 83 PID 456 wrote to memory of 1316 456 msedge.exe 83 PID 456 wrote to memory of 1316 456 msedge.exe 83 PID 456 wrote to memory of 1316 456 msedge.exe 83 PID 456 wrote to memory of 1316 456 msedge.exe 83 PID 456 wrote to memory of 1316 456 msedge.exe 83 PID 456 wrote to memory of 3560 456 msedge.exe 84 PID 456 wrote to memory of 3560 456 msedge.exe 84 PID 456 wrote to memory of 4084 456 msedge.exe 85 PID 456 wrote to memory of 4084 456 msedge.exe 85 PID 456 wrote to memory of 4084 456 msedge.exe 85 PID 456 wrote to memory of 4084 456 msedge.exe 85 PID 456 wrote to memory of 4084 456 msedge.exe 85 PID 456 wrote to memory of 4084 456 msedge.exe 85 PID 456 wrote to memory of 4084 456 msedge.exe 85 PID 456 wrote to memory of 4084 456 msedge.exe 85 PID 456 wrote to memory of 4084 456 msedge.exe 85 PID 456 wrote to memory of 4084 456 msedge.exe 85 PID 456 wrote to memory of 4084 456 msedge.exe 85 PID 456 wrote to memory of 4084 456 msedge.exe 85 PID 456 wrote to memory of 4084 456 msedge.exe 85 PID 456 wrote to memory of 4084 456 msedge.exe 85 PID 456 wrote to memory of 4084 456 msedge.exe 85 PID 456 wrote to memory of 4084 456 msedge.exe 85 PID 456 wrote to memory of 4084 456 msedge.exe 85 PID 456 wrote to memory of 4084 456 msedge.exe 85 PID 456 wrote to memory of 4084 456 msedge.exe 85 PID 456 wrote to memory of 4084 456 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\35f743f38a5eef50471893f812a36b02_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:456 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcca3d46f8,0x7ffcca3d4708,0x7ffcca3d47182⤵PID:3444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1836,18384121560403131142,10838074820214607704,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2100 /prefetch:22⤵PID:1316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1836,18384121560403131142,10838074820214607704,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1836,18384121560403131142,10838074820214607704,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2816 /prefetch:82⤵PID:4084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1836,18384121560403131142,10838074820214607704,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:4928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1836,18384121560403131142,10838074820214607704,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:12⤵PID:2064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1836,18384121560403131142,10838074820214607704,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4772 /prefetch:12⤵PID:4020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1836,18384121560403131142,10838074820214607704,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5628 /prefetch:12⤵PID:1176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1836,18384121560403131142,10838074820214607704,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5636 /prefetch:12⤵PID:672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1836,18384121560403131142,10838074820214607704,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6044 /prefetch:82⤵PID:4564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1836,18384121560403131142,10838074820214607704,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6044 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1836,18384121560403131142,10838074820214607704,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5620 /prefetch:12⤵PID:3476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1836,18384121560403131142,10838074820214607704,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5032 /prefetch:12⤵PID:2688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1836,18384121560403131142,10838074820214607704,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6056 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1948
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3476
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4236
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54b4f91fa1b362ba5341ecb2836438dea
SHA19561f5aabed742404d455da735259a2c6781fa07
SHA256d824b742eace197ddc8b6ed5d918f390fde4b0fbf0e371b8e1f2ed40a3b6455c
SHA512fef22217dcdd8000bc193e25129699d4b8f7a103ca4fe1613baf73ccf67090d9fbae27eb93e4bb8747455853a0a4326f2d0c38df41c8d42351cdcd4132418dac
-
Filesize
152B
MD5eaa3db555ab5bc0cb364826204aad3f0
SHA1a4cdfaac8de49e6e6e88b335cfeaa7c9e3c563ca
SHA256ef7baeb1b2ab05ff3c5fbb76c2759db49294654548706c7c8e87f0cde855b86b
SHA512e13981da51b52c15261ecabb98af32f9b920651b46b10ce0cc823c5878b22eb1420258c80deef204070d1e0bdd3a64d875ac2522e3713a3cf11657aa55aeccd4
-
Filesize
22KB
MD55e74c6d871232d6fe5d88711ece1408b
SHA11a5d3ac31e833df4c091f14c94a2ecd1c6294875
SHA256bcadf445d413314a44375c63418a0f255fbac7afae40be0a80c9231751176105
SHA5129d001eabce7ffdbf8e338725ef07f0033d0780ea474b7d33c2ad63886ff3578d818eb5c9b130d726353cd813160b49f572736dd288cece84e9bd8b784ce530d5
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD5900ef8e5f88c8c92b4e9de8e64af7e29
SHA12b75414b9c5dd1372049f6f01c11889f8659a5a4
SHA256bc898e14d6fd8e27b7f63b6b15182067ffec09f7bb885865889227b278ff428d
SHA512678b05e01ba7fe9d789cc3006f0f24695e8046775d4b9284bd58953888c8597dab72a2b02a64e007a7be46b4816520f8850e18d1dc365720be3a5b0eda1a83d1
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD5d97e7b3acd4d41ca867f550a33f159fa
SHA1be3b215402e23fd36aa8d14c41e810e070199a89
SHA2567b51a2a13fa850ebb9cada7924ae31e0c80431193d735339a6d1d71b8e4e9401
SHA5121580b060c5cfabb54cfcc0ba86c92a6ab0af202b02e5e63e2edd874e59958d75603bdffd29dc50a78cfc0d65b6b15a20848d96ec9126ac26c1f23ca348431c8b
-
Filesize
1KB
MD5d1b63c89e825a22f3eb907878bd516eb
SHA15f5f76d896ff871d437d22a357e9d3b36b212308
SHA256e6861f10cb1cd09621121551ec365faa99b5ba76b77111658eb2ff3c65ee4a38
SHA512e2ee504c872610c2b37c7742342a2d7bfc9309907c97d332b46c150b98248de6498a8fba63ea5d41e364eb230f9039d1ad019436e1ec89e2f98e731ea916fe9a
-
Filesize
6KB
MD5d6573e623e27f542dbee4127c3bdf8d4
SHA1132a9efd9410e0b50d8b859d977775c73113b3f0
SHA256e7fb15f831ac498b761cb2179d141e3b66cb9a8584fe2c2b54ac8bbbe147a00f
SHA512a8a4ac4e1dd0feb0f894b087e13d3d5b6554e06af36a3504077e59b2052a06e82eb41d3aacbb764f56340ebff559b49c337b71a62b358333806d5d305b753708
-
Filesize
7KB
MD52a6e4c5c819578cde0ea80ea19c2516d
SHA18485af662f1608bf6d2339a192a6b8819e59c136
SHA25629922b5c6c0fba9fa4979577671c88dee14e0b1258066753e3ac91d1bb638be2
SHA51227b2dc714b8d2ac17ee01fe1bb3cc86965689e456ebe8039801b9de4f2384ebea2cf9280c925be9857f09e64c8054a25ea523539b7237b492684f384f63a177f
-
Filesize
7KB
MD5735e8dec80c01df9ec0f8dbd00ac8cf5
SHA1c88fbe329302c74f0b20be0bf75f2f7d09f8e5cf
SHA256cb8f87f8ec989988e571ee068e6bf6a3b93c278ad05f1abf8f8f5eb35b8e4407
SHA5128e815df60965cc838fde9e7c7af1a3225566cd06910ce22872a88615c6ed2e0f20b4d8c4b2f663f242ae13f0af5eadfd4f424dc8ea55a138682da1d6c384cd75
-
Filesize
7KB
MD5c424c40792570868c7403a6efb97c0c1
SHA19b449afff9bf3428482c64f22a95dfc612bc6ac7
SHA256756f223b5ebd55e583522bb8972fb743fd7874451a91feaa79e1fb010b0204fa
SHA512880be145d66bb3e6367d2fe892ea9e2784e858901307211c841384b05ff6c10e2dbeabb720da8ffd2755b001412e1b710f1b50aa5e383bd5741abf43637507e5
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD588d5830af28401451ab2c61da42bc635
SHA1a4410597855d8e7656c95d80426cd8fb19f3d339
SHA25633be22919cf33565012cf556500cee4a67e9534d3dd5a61862f2ec2db0abba35
SHA512e7bd17470bca68beb7118ad1a78271c981efe26c3e4254806a86cda0d125f0c8e7075ab0facefa6c65f53499c383e941e5f2d166001e21f8ae506ef2f7c620bb