Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
11-05-2024 18:07
Static task
static1
Behavioral task
behavioral1
Sample
35e0588d70b691a9bef2c11761cd5f76_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
35e0588d70b691a9bef2c11761cd5f76_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
35e0588d70b691a9bef2c11761cd5f76_JaffaCakes118.html
-
Size
155KB
-
MD5
35e0588d70b691a9bef2c11761cd5f76
-
SHA1
84b071be892c68463e0cdda65f0051d1cb452d42
-
SHA256
5cbfe643bb720380bb8fdd758f92f8e4b6fcbabf67bf944aa1d99c7e6523a782
-
SHA512
62147cd9f7f93063612923032cbcdff13ba55196cb1e04fcefea43efa0125cae02eceb6b5d07182b9404852811e4f0e566fc28d47b7aa9da074e988a7c4a3955
-
SSDEEP
3072:lNIlkujH+6yzQPnV3htq5izxwaUOl3og+SQA:lN5G
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3560 msedge.exe 3560 msedge.exe 3224 msedge.exe 3224 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe 1160 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3224 wrote to memory of 116 3224 msedge.exe 82 PID 3224 wrote to memory of 116 3224 msedge.exe 82 PID 3224 wrote to memory of 3652 3224 msedge.exe 83 PID 3224 wrote to memory of 3652 3224 msedge.exe 83 PID 3224 wrote to memory of 3652 3224 msedge.exe 83 PID 3224 wrote to memory of 3652 3224 msedge.exe 83 PID 3224 wrote to memory of 3652 3224 msedge.exe 83 PID 3224 wrote to memory of 3652 3224 msedge.exe 83 PID 3224 wrote to memory of 3652 3224 msedge.exe 83 PID 3224 wrote to memory of 3652 3224 msedge.exe 83 PID 3224 wrote to memory of 3652 3224 msedge.exe 83 PID 3224 wrote to memory of 3652 3224 msedge.exe 83 PID 3224 wrote to memory of 3652 3224 msedge.exe 83 PID 3224 wrote to memory of 3652 3224 msedge.exe 83 PID 3224 wrote to memory of 3652 3224 msedge.exe 83 PID 3224 wrote to memory of 3652 3224 msedge.exe 83 PID 3224 wrote to memory of 3652 3224 msedge.exe 83 PID 3224 wrote to memory of 3652 3224 msedge.exe 83 PID 3224 wrote to memory of 3652 3224 msedge.exe 83 PID 3224 wrote to memory of 3652 3224 msedge.exe 83 PID 3224 wrote to memory of 3652 3224 msedge.exe 83 PID 3224 wrote to memory of 3652 3224 msedge.exe 83 PID 3224 wrote to memory of 3652 3224 msedge.exe 83 PID 3224 wrote to memory of 3652 3224 msedge.exe 83 PID 3224 wrote to memory of 3652 3224 msedge.exe 83 PID 3224 wrote to memory of 3652 3224 msedge.exe 83 PID 3224 wrote to memory of 3652 3224 msedge.exe 83 PID 3224 wrote to memory of 3652 3224 msedge.exe 83 PID 3224 wrote to memory of 3652 3224 msedge.exe 83 PID 3224 wrote to memory of 3652 3224 msedge.exe 83 PID 3224 wrote to memory of 3652 3224 msedge.exe 83 PID 3224 wrote to memory of 3652 3224 msedge.exe 83 PID 3224 wrote to memory of 3652 3224 msedge.exe 83 PID 3224 wrote to memory of 3652 3224 msedge.exe 83 PID 3224 wrote to memory of 3652 3224 msedge.exe 83 PID 3224 wrote to memory of 3652 3224 msedge.exe 83 PID 3224 wrote to memory of 3652 3224 msedge.exe 83 PID 3224 wrote to memory of 3652 3224 msedge.exe 83 PID 3224 wrote to memory of 3652 3224 msedge.exe 83 PID 3224 wrote to memory of 3652 3224 msedge.exe 83 PID 3224 wrote to memory of 3652 3224 msedge.exe 83 PID 3224 wrote to memory of 3652 3224 msedge.exe 83 PID 3224 wrote to memory of 3560 3224 msedge.exe 84 PID 3224 wrote to memory of 3560 3224 msedge.exe 84 PID 3224 wrote to memory of 4496 3224 msedge.exe 85 PID 3224 wrote to memory of 4496 3224 msedge.exe 85 PID 3224 wrote to memory of 4496 3224 msedge.exe 85 PID 3224 wrote to memory of 4496 3224 msedge.exe 85 PID 3224 wrote to memory of 4496 3224 msedge.exe 85 PID 3224 wrote to memory of 4496 3224 msedge.exe 85 PID 3224 wrote to memory of 4496 3224 msedge.exe 85 PID 3224 wrote to memory of 4496 3224 msedge.exe 85 PID 3224 wrote to memory of 4496 3224 msedge.exe 85 PID 3224 wrote to memory of 4496 3224 msedge.exe 85 PID 3224 wrote to memory of 4496 3224 msedge.exe 85 PID 3224 wrote to memory of 4496 3224 msedge.exe 85 PID 3224 wrote to memory of 4496 3224 msedge.exe 85 PID 3224 wrote to memory of 4496 3224 msedge.exe 85 PID 3224 wrote to memory of 4496 3224 msedge.exe 85 PID 3224 wrote to memory of 4496 3224 msedge.exe 85 PID 3224 wrote to memory of 4496 3224 msedge.exe 85 PID 3224 wrote to memory of 4496 3224 msedge.exe 85 PID 3224 wrote to memory of 4496 3224 msedge.exe 85 PID 3224 wrote to memory of 4496 3224 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\35e0588d70b691a9bef2c11761cd5f76_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3224 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcfc0446f8,0x7ffcfc044708,0x7ffcfc0447182⤵PID:116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,12613489906267956114,8728240063925428463,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2060 /prefetch:22⤵PID:3652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2064,12613489906267956114,8728240063925428463,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2156 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2064,12613489906267956114,8728240063925428463,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2808 /prefetch:82⤵PID:4496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,12613489906267956114,8728240063925428463,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3176 /prefetch:12⤵PID:2208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,12613489906267956114,8728240063925428463,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3192 /prefetch:12⤵PID:4336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,12613489906267956114,8728240063925428463,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4968 /prefetch:12⤵PID:3296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,12613489906267956114,8728240063925428463,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1896 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1160
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2228
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2480
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52daa93382bba07cbc40af372d30ec576
SHA1c5e709dc3e2e4df2ff841fbde3e30170e7428a94
SHA2561826d2a57b1938c148bf212a47d947ed1bfb26cfc55868931f843ee438117f30
SHA51265635cb59c81548a9ef8fdb0942331e7f3cd0c30ce1d4dba48aed72dbb27b06511a55d2aeaadfadbbb4b7cb4b2e2772bbabba9603b3f7d9c8b9e4a7fbf3d6b6b
-
Filesize
152B
MD5ecdc2754d7d2ae862272153aa9b9ca6e
SHA1c19bed1c6e1c998b9fa93298639ad7961339147d
SHA256a13d791473f836edcab0e93451ce7b7182efbbc54261b2b5644d319e047a00a7
SHA512cd4fb81317d540f8b15f1495a381bb6f0f129b8923a7c06e4b5cf777d2625c30304aee6cc68aa20479e08d84e5030b43fbe93e479602400334dfdd7297f702f2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD504e668e350600db855c2b9c561517120
SHA1bf8e7d2abd3c52a336709623829e3db9ebe3dc7c
SHA25630da81f2f4a41fe1c78050fcb7d5748554d1e146caf9a4ab8b91274f21fa368c
SHA512582d95abe58ce49ccad344329765bdb62e03d6985513253d076397c8013386da9e4f734111baf4dd54fd95b6d19adbedecfcdc36c67ccfcbccbb0c5440345371
-
Filesize
1KB
MD5e271666633004c200d243e4ec4ad8984
SHA14e12aaa97e42c94e78a9522f578a95ba09c9624f
SHA2569ec71a38ae17d39153ab8b22c222b70aedb76f857549fbdd0212c4d53179348c
SHA512b5d87ce25ff9a94cd2c29da212ea52798a932fd8d7f6712d4cf4d1a282e773e3876643029db378f09e43b3e57bc3f2761378242d0a0e8170adec6bdebac7170a
-
Filesize
5KB
MD5f639e6fb40e293af05606955d9cf9148
SHA1522bf0b32880ee6eccdfe0304fce8256c8d47c75
SHA2561a4a5c14ac5bddd763741b0dc328be46e8b9ca991fa3c8c66bae3ff66bf409ca
SHA5122af77dd28dca27a60f3204f2760db91b0512eae52d6eda32125e6bcac5cd38573bcbc273651aafd9476ce0672c644c05a3ddcdb9e18b876ea9a68c3854b946f3
-
Filesize
6KB
MD588a3b44f7c6c23dc3f551262d2c87d9f
SHA10ab37f0f4c674ecc29732c82696bbcfded348f2c
SHA2569a899983ee55b4aba5e02ae8cd27a832fa46b6337d59a54fc0681159aef539ae
SHA512895c248a045ec8bfd61eaef44dd43b703c30dcaf3e81978441d018a396aa37988f94395279300f90f4c82569f8b16d99c8d0cd4737d61b59bae1ef64c097b588
-
Filesize
11KB
MD5151b6484b3efd7d2cd643a1412d4d902
SHA1af6f8d4f63ccec47f5b602d8b703744778422d45
SHA25668901965b20c54ecd6fc2b1fcfb6545d6ca4eebbfb73735bd8ced7aa485986bc
SHA512578c73c2322cef56109b30a3d0c80e6b2642bd748c9ac82b168df1250ce16644487b9eb2b305f4b0ecb92e95b942d205e1974d9e140aca9f0f98fe2e01c707ec