Analysis
-
max time kernel
145s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
11/05/2024, 18:11
Static task
static1
Behavioral task
behavioral1
Sample
35e41f86091cda7ef362363414be2441_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
35e41f86091cda7ef362363414be2441_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
35e41f86091cda7ef362363414be2441_JaffaCakes118.html
-
Size
903B
-
MD5
35e41f86091cda7ef362363414be2441
-
SHA1
028abf5085cdb77d57d9333b5760984988ad4893
-
SHA256
20b8c7cbe3ce595d005712fa5809239d27448ff1f9876f7fe9a71e69c76bbaa3
-
SHA512
734b910b4793be8339e49565d2371f0813bf74c012a0981b7951b1152e0dca84d31895f77427333cfb10d38d0d0e1f933afa9023511bb7f918e27e513081aa25
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3304 msedge.exe 3304 msedge.exe 1360 msedge.exe 1360 msedge.exe 4488 identity_helper.exe 4488 identity_helper.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe 1448 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1360 wrote to memory of 1328 1360 msedge.exe 81 PID 1360 wrote to memory of 1328 1360 msedge.exe 81 PID 1360 wrote to memory of 4004 1360 msedge.exe 82 PID 1360 wrote to memory of 4004 1360 msedge.exe 82 PID 1360 wrote to memory of 4004 1360 msedge.exe 82 PID 1360 wrote to memory of 4004 1360 msedge.exe 82 PID 1360 wrote to memory of 4004 1360 msedge.exe 82 PID 1360 wrote to memory of 4004 1360 msedge.exe 82 PID 1360 wrote to memory of 4004 1360 msedge.exe 82 PID 1360 wrote to memory of 4004 1360 msedge.exe 82 PID 1360 wrote to memory of 4004 1360 msedge.exe 82 PID 1360 wrote to memory of 4004 1360 msedge.exe 82 PID 1360 wrote to memory of 4004 1360 msedge.exe 82 PID 1360 wrote to memory of 4004 1360 msedge.exe 82 PID 1360 wrote to memory of 4004 1360 msedge.exe 82 PID 1360 wrote to memory of 4004 1360 msedge.exe 82 PID 1360 wrote to memory of 4004 1360 msedge.exe 82 PID 1360 wrote to memory of 4004 1360 msedge.exe 82 PID 1360 wrote to memory of 4004 1360 msedge.exe 82 PID 1360 wrote to memory of 4004 1360 msedge.exe 82 PID 1360 wrote to memory of 4004 1360 msedge.exe 82 PID 1360 wrote to memory of 4004 1360 msedge.exe 82 PID 1360 wrote to memory of 4004 1360 msedge.exe 82 PID 1360 wrote to memory of 4004 1360 msedge.exe 82 PID 1360 wrote to memory of 4004 1360 msedge.exe 82 PID 1360 wrote to memory of 4004 1360 msedge.exe 82 PID 1360 wrote to memory of 4004 1360 msedge.exe 82 PID 1360 wrote to memory of 4004 1360 msedge.exe 82 PID 1360 wrote to memory of 4004 1360 msedge.exe 82 PID 1360 wrote to memory of 4004 1360 msedge.exe 82 PID 1360 wrote to memory of 4004 1360 msedge.exe 82 PID 1360 wrote to memory of 4004 1360 msedge.exe 82 PID 1360 wrote to memory of 4004 1360 msedge.exe 82 PID 1360 wrote to memory of 4004 1360 msedge.exe 82 PID 1360 wrote to memory of 4004 1360 msedge.exe 82 PID 1360 wrote to memory of 4004 1360 msedge.exe 82 PID 1360 wrote to memory of 4004 1360 msedge.exe 82 PID 1360 wrote to memory of 4004 1360 msedge.exe 82 PID 1360 wrote to memory of 4004 1360 msedge.exe 82 PID 1360 wrote to memory of 4004 1360 msedge.exe 82 PID 1360 wrote to memory of 4004 1360 msedge.exe 82 PID 1360 wrote to memory of 4004 1360 msedge.exe 82 PID 1360 wrote to memory of 3304 1360 msedge.exe 83 PID 1360 wrote to memory of 3304 1360 msedge.exe 83 PID 1360 wrote to memory of 3396 1360 msedge.exe 84 PID 1360 wrote to memory of 3396 1360 msedge.exe 84 PID 1360 wrote to memory of 3396 1360 msedge.exe 84 PID 1360 wrote to memory of 3396 1360 msedge.exe 84 PID 1360 wrote to memory of 3396 1360 msedge.exe 84 PID 1360 wrote to memory of 3396 1360 msedge.exe 84 PID 1360 wrote to memory of 3396 1360 msedge.exe 84 PID 1360 wrote to memory of 3396 1360 msedge.exe 84 PID 1360 wrote to memory of 3396 1360 msedge.exe 84 PID 1360 wrote to memory of 3396 1360 msedge.exe 84 PID 1360 wrote to memory of 3396 1360 msedge.exe 84 PID 1360 wrote to memory of 3396 1360 msedge.exe 84 PID 1360 wrote to memory of 3396 1360 msedge.exe 84 PID 1360 wrote to memory of 3396 1360 msedge.exe 84 PID 1360 wrote to memory of 3396 1360 msedge.exe 84 PID 1360 wrote to memory of 3396 1360 msedge.exe 84 PID 1360 wrote to memory of 3396 1360 msedge.exe 84 PID 1360 wrote to memory of 3396 1360 msedge.exe 84 PID 1360 wrote to memory of 3396 1360 msedge.exe 84 PID 1360 wrote to memory of 3396 1360 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\35e41f86091cda7ef362363414be2441_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1360 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcda8746f8,0x7ffcda874708,0x7ffcda8747182⤵PID:1328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,16660637769237831224,13504367159541790864,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:22⤵PID:4004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,16660637769237831224,13504367159541790864,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2364 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,16660637769237831224,13504367159541790864,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2848 /prefetch:82⤵PID:3396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,16660637769237831224,13504367159541790864,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:1528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,16660637769237831224,13504367159541790864,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:1776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,16660637769237831224,13504367159541790864,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4912 /prefetch:12⤵PID:2384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,16660637769237831224,13504367159541790864,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4248 /prefetch:12⤵PID:4568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,16660637769237831224,13504367159541790864,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:12⤵PID:924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,16660637769237831224,13504367159541790864,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5608 /prefetch:82⤵PID:4780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,16660637769237831224,13504367159541790864,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5608 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,16660637769237831224,13504367159541790864,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5596 /prefetch:12⤵PID:3100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,16660637769237831224,13504367159541790864,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5664 /prefetch:12⤵PID:3372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,16660637769237831224,13504367159541790864,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5396 /prefetch:12⤵PID:4120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,16660637769237831224,13504367159541790864,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3696 /prefetch:12⤵PID:2052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,16660637769237831224,13504367159541790864,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3064 /prefetch:12⤵PID:2100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,16660637769237831224,13504367159541790864,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5704 /prefetch:12⤵PID:1256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,16660637769237831224,13504367159541790864,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5860 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1448
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3536
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1108
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
Filesize
6KB
MD587bb6362283d01a7ec2b82b7213e69d5
SHA1c9d7081c50e15f101ddeeeef38515640c3c520f4
SHA25660f3ffea4e570b151cbc2db1280dcc8c0c9fab1669f1c6582e5a6165e97cef8e
SHA512061aded757b99dc7688ef952ec80b256ea5acbb87b417c841ee5681a607afc6c673532f3f62a22b81a9c872a225aca5b9fbb5d8d14ffc7b97361deab2c380a07
-
Filesize
6KB
MD5131a1639bb2fb94dce1498d97a1ed788
SHA1bad3d4570198c4a785d33a6280cc5ec64da7b8ab
SHA256f20e1eb74ad09e7165f7fe49538c7745b6db9f05b896ade7da07f13f084e4ad0
SHA5127a7656ecbfae53970bed66529844ea73771051124058a86bb089e1a671a01dad7c1582612fdca3f4127f2f204f970f512954348f63e62b7d95f61c80839d147c
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD56f6ccb717b9b59022e9bd0762289c832
SHA1207d5e7ad6f39da19698ddca3376ccda69344ef5
SHA256dfb91f9e275715940474fdc22125a97e7b5a74cf6f7c23f2325c0bd91101de24
SHA5126b8fee91f71084b9446c403f7fcae971bc321fd6beb3efe57b806d8af32ab77d9a44f1354d636c939397b07acc56639c8b91aca0860bd3759a497d48346cfa04