Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
11-05-2024 18:14
Static task
static1
Behavioral task
behavioral1
Sample
35e782e82aefd5dedfd1754cea81f834_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
35e782e82aefd5dedfd1754cea81f834_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
35e782e82aefd5dedfd1754cea81f834_JaffaCakes118.html
-
Size
22KB
-
MD5
35e782e82aefd5dedfd1754cea81f834
-
SHA1
92f9e1ba7cbae1094447869102cccab207c4db50
-
SHA256
cdef439cf51a00d591042eab5264de7aec51d65ae2c2b5b09c6df8a046aa9afd
-
SHA512
41fbd5613880eb906b0eea551ac84a0d2a00cedbd8a768fb376d56b6c563915a072667babeeb3851fea3d00d3d56c20a878d429de4ec775fd289b860700a6c7f
-
SSDEEP
384:banqtOhsLimyVUqiSiDfQ3akZT1rU8oYOu1ewvewEewDSPewtyV6yV6yVQAhyV9a:banqtOhsLimyVY7DfQFd1Ui3yV6yV6yl
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4400 msedge.exe 4400 msedge.exe 64 msedge.exe 64 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe 2812 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 64 wrote to memory of 728 64 msedge.exe 82 PID 64 wrote to memory of 728 64 msedge.exe 82 PID 64 wrote to memory of 1916 64 msedge.exe 83 PID 64 wrote to memory of 1916 64 msedge.exe 83 PID 64 wrote to memory of 1916 64 msedge.exe 83 PID 64 wrote to memory of 1916 64 msedge.exe 83 PID 64 wrote to memory of 1916 64 msedge.exe 83 PID 64 wrote to memory of 1916 64 msedge.exe 83 PID 64 wrote to memory of 1916 64 msedge.exe 83 PID 64 wrote to memory of 1916 64 msedge.exe 83 PID 64 wrote to memory of 1916 64 msedge.exe 83 PID 64 wrote to memory of 1916 64 msedge.exe 83 PID 64 wrote to memory of 1916 64 msedge.exe 83 PID 64 wrote to memory of 1916 64 msedge.exe 83 PID 64 wrote to memory of 1916 64 msedge.exe 83 PID 64 wrote to memory of 1916 64 msedge.exe 83 PID 64 wrote to memory of 1916 64 msedge.exe 83 PID 64 wrote to memory of 1916 64 msedge.exe 83 PID 64 wrote to memory of 1916 64 msedge.exe 83 PID 64 wrote to memory of 1916 64 msedge.exe 83 PID 64 wrote to memory of 1916 64 msedge.exe 83 PID 64 wrote to memory of 1916 64 msedge.exe 83 PID 64 wrote to memory of 1916 64 msedge.exe 83 PID 64 wrote to memory of 1916 64 msedge.exe 83 PID 64 wrote to memory of 1916 64 msedge.exe 83 PID 64 wrote to memory of 1916 64 msedge.exe 83 PID 64 wrote to memory of 1916 64 msedge.exe 83 PID 64 wrote to memory of 1916 64 msedge.exe 83 PID 64 wrote to memory of 1916 64 msedge.exe 83 PID 64 wrote to memory of 1916 64 msedge.exe 83 PID 64 wrote to memory of 1916 64 msedge.exe 83 PID 64 wrote to memory of 1916 64 msedge.exe 83 PID 64 wrote to memory of 1916 64 msedge.exe 83 PID 64 wrote to memory of 1916 64 msedge.exe 83 PID 64 wrote to memory of 1916 64 msedge.exe 83 PID 64 wrote to memory of 1916 64 msedge.exe 83 PID 64 wrote to memory of 1916 64 msedge.exe 83 PID 64 wrote to memory of 1916 64 msedge.exe 83 PID 64 wrote to memory of 1916 64 msedge.exe 83 PID 64 wrote to memory of 1916 64 msedge.exe 83 PID 64 wrote to memory of 1916 64 msedge.exe 83 PID 64 wrote to memory of 1916 64 msedge.exe 83 PID 64 wrote to memory of 4400 64 msedge.exe 84 PID 64 wrote to memory of 4400 64 msedge.exe 84 PID 64 wrote to memory of 3956 64 msedge.exe 85 PID 64 wrote to memory of 3956 64 msedge.exe 85 PID 64 wrote to memory of 3956 64 msedge.exe 85 PID 64 wrote to memory of 3956 64 msedge.exe 85 PID 64 wrote to memory of 3956 64 msedge.exe 85 PID 64 wrote to memory of 3956 64 msedge.exe 85 PID 64 wrote to memory of 3956 64 msedge.exe 85 PID 64 wrote to memory of 3956 64 msedge.exe 85 PID 64 wrote to memory of 3956 64 msedge.exe 85 PID 64 wrote to memory of 3956 64 msedge.exe 85 PID 64 wrote to memory of 3956 64 msedge.exe 85 PID 64 wrote to memory of 3956 64 msedge.exe 85 PID 64 wrote to memory of 3956 64 msedge.exe 85 PID 64 wrote to memory of 3956 64 msedge.exe 85 PID 64 wrote to memory of 3956 64 msedge.exe 85 PID 64 wrote to memory of 3956 64 msedge.exe 85 PID 64 wrote to memory of 3956 64 msedge.exe 85 PID 64 wrote to memory of 3956 64 msedge.exe 85 PID 64 wrote to memory of 3956 64 msedge.exe 85 PID 64 wrote to memory of 3956 64 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\35e782e82aefd5dedfd1754cea81f834_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:64 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffea93746f8,0x7ffea9374708,0x7ffea93747182⤵PID:728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2032,495575272140291232,16832760462798206071,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:22⤵PID:1916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2032,495575272140291232,16832760462798206071,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2032,495575272140291232,16832760462798206071,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2780 /prefetch:82⤵PID:3956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,495575272140291232,16832760462798206071,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:4976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,495575272140291232,16832760462798206071,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:1332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,495575272140291232,16832760462798206071,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4932 /prefetch:12⤵PID:4216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,495575272140291232,16832760462798206071,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5116 /prefetch:12⤵PID:4960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,495575272140291232,16832760462798206071,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5392 /prefetch:12⤵PID:3592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2032,495575272140291232,16832760462798206071,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5348 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2812
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3168
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4100
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54f7152bc5a1a715ef481e37d1c791959
SHA1c8a1ed674c62ae4f45519f90a8cc5a81eff3a6d7
SHA256704dd4f98d8ca34ec421f23ba1891b178c23c14b3301e4655efc5c02d356c2bc
SHA5122e6b02ca35d76a655a17a5f3e9dbd8d7517c7dae24f0095c7350eb9e7bdf9e1256a7009aa8878f96c89d1ea4fe5323a41f72b8c551806dda62880d7ff231ff5c
-
Filesize
152B
MD5ea98e583ad99df195d29aa066204ab56
SHA1f89398664af0179641aa0138b337097b617cb2db
SHA256a7abb51435909fa2d75c6f2ff5c69a93d4a0ab276ed579e7d8733b2a63ffbee6
SHA512e109be3466e653e5d310b3e402e1626298b09205d223722a82344dd78504f3c33e1e24e8402a02f38cd2c9c50d96a303ce4846bea5a583423937ab018cd5782f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD54e8bc9f3c8f2bbab85195a1fce500aea
SHA1fb1e88e5e92b0425025c484242fd5cfd1ecb7ed5
SHA256ff2f1cc2887fae3ce3a958b01bd58ad258de08ddb75d098475ae6277bcf5696a
SHA512ad671271e02e45fd62dc90db9f029ba01dccd9ce14380eda0ed9b248cfd731847bfe935793828836569b64f3add9026259b0ef601c360241443b58dc99ab5f9e
-
Filesize
2KB
MD50388682ef76a30cafaa152290c6eb731
SHA14416e91cbed2b9cee2bc148cba40f5adc3b4d8cb
SHA256536008b3a3849b5adadae699a88ec223764b3a4bc2b54a0ac3a34f3d17dc8944
SHA51293f401d2fdb1762c302bb927d11e5f32b1370151a516fbea8a820a80a74e920378d1c6a72822a2d3dcf665267934861268b5c165c931a47cd547d7f463a7f36a
-
Filesize
5KB
MD57f38bc403aafcd73a3a3900d8ece0ab1
SHA135e63894dcb53c25e1991d63e4cb9db3b528b395
SHA256137338f422ed4de0ab8b78b28a8faa4b8923f0b40c3bc52ca202efeb64e1494b
SHA5126605a9b66c0954fdd79813f952d6c5a02c2b85763978ee2634158fbe34b8c0499ad873a49ac7391d7c4ba9f28bb7a1a014bc8d6badb69174bc1e14b640b8f49b
-
Filesize
6KB
MD59d625097d86a6a9dd88ecb53e0ca018c
SHA11461f58bceb9989cac39fb5ad48a34850dfd4095
SHA256bb3503af0d41cadefefcc757c6c19889afedb34e0e41894e83a453c37549ff45
SHA512f35bb26af9a00e0f6e1d990dfc6005ced6a0a4f955fb433f6a8dda8636e00c97b9b92e6a3cecc5d0e8c0e91bc2fa3e4f2142cc6c422238e97b5d134e2622d0b7
-
Filesize
11KB
MD5b3fb05cdd6c0ba934bdcf2ed9fc9d9c3
SHA1eaeb7828995e378a57cabbe4679334955d900098
SHA25618245f375921fc6faa0acc6da2cdf0d2888b24895b45924cb24ea1909851bac6
SHA51284fd18ea07ae8b96ebba4ad2d24e6644cfe242e67fd99a306432640beaaac0b367ddec3ff5ec7b0fa1e768f86ff2479143d70a910d25bbc36acf3d9fbb26bb56