Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
11/05/2024, 19:57
Static task
static1
Behavioral task
behavioral1
Sample
36481d3342e81423beb19cd18a47d929_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
36481d3342e81423beb19cd18a47d929_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
36481d3342e81423beb19cd18a47d929_JaffaCakes118.html
-
Size
40KB
-
MD5
36481d3342e81423beb19cd18a47d929
-
SHA1
bf5581a3b1d15adce44f8bb912249216eb116bcc
-
SHA256
c6a375c2b4cd86eb02a3f4141e45e7e7fd2df068b24945469e4ceef2a4477253
-
SHA512
247fc447f7f0c749b0577db05c903831933d0e03f4270858cd18aa047a37e7150888c0339a853e51df6d2383b20a4c4cd2aca8cae9a6ab8f4578225eac15789e
-
SSDEEP
768:vOT0EipBlqcuxP1gRvZMLfaFT7BbM9uJxNElyX0ky9GTc:2TupBlqcuxPMvZMLy7valN
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3948 msedge.exe 3948 msedge.exe 1116 msedge.exe 1116 msedge.exe 2888 identity_helper.exe 2888 identity_helper.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 1116 msedge.exe 1116 msedge.exe 1116 msedge.exe 1116 msedge.exe 1116 msedge.exe 1116 msedge.exe 1116 msedge.exe 1116 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1116 msedge.exe 1116 msedge.exe 1116 msedge.exe 1116 msedge.exe 1116 msedge.exe 1116 msedge.exe 1116 msedge.exe 1116 msedge.exe 1116 msedge.exe 1116 msedge.exe 1116 msedge.exe 1116 msedge.exe 1116 msedge.exe 1116 msedge.exe 1116 msedge.exe 1116 msedge.exe 1116 msedge.exe 1116 msedge.exe 1116 msedge.exe 1116 msedge.exe 1116 msedge.exe 1116 msedge.exe 1116 msedge.exe 1116 msedge.exe 1116 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1116 msedge.exe 1116 msedge.exe 1116 msedge.exe 1116 msedge.exe 1116 msedge.exe 1116 msedge.exe 1116 msedge.exe 1116 msedge.exe 1116 msedge.exe 1116 msedge.exe 1116 msedge.exe 1116 msedge.exe 1116 msedge.exe 1116 msedge.exe 1116 msedge.exe 1116 msedge.exe 1116 msedge.exe 1116 msedge.exe 1116 msedge.exe 1116 msedge.exe 1116 msedge.exe 1116 msedge.exe 1116 msedge.exe 1116 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1116 wrote to memory of 1964 1116 msedge.exe 82 PID 1116 wrote to memory of 1964 1116 msedge.exe 82 PID 1116 wrote to memory of 3260 1116 msedge.exe 83 PID 1116 wrote to memory of 3260 1116 msedge.exe 83 PID 1116 wrote to memory of 3260 1116 msedge.exe 83 PID 1116 wrote to memory of 3260 1116 msedge.exe 83 PID 1116 wrote to memory of 3260 1116 msedge.exe 83 PID 1116 wrote to memory of 3260 1116 msedge.exe 83 PID 1116 wrote to memory of 3260 1116 msedge.exe 83 PID 1116 wrote to memory of 3260 1116 msedge.exe 83 PID 1116 wrote to memory of 3260 1116 msedge.exe 83 PID 1116 wrote to memory of 3260 1116 msedge.exe 83 PID 1116 wrote to memory of 3260 1116 msedge.exe 83 PID 1116 wrote to memory of 3260 1116 msedge.exe 83 PID 1116 wrote to memory of 3260 1116 msedge.exe 83 PID 1116 wrote to memory of 3260 1116 msedge.exe 83 PID 1116 wrote to memory of 3260 1116 msedge.exe 83 PID 1116 wrote to memory of 3260 1116 msedge.exe 83 PID 1116 wrote to memory of 3260 1116 msedge.exe 83 PID 1116 wrote to memory of 3260 1116 msedge.exe 83 PID 1116 wrote to memory of 3260 1116 msedge.exe 83 PID 1116 wrote to memory of 3260 1116 msedge.exe 83 PID 1116 wrote to memory of 3260 1116 msedge.exe 83 PID 1116 wrote to memory of 3260 1116 msedge.exe 83 PID 1116 wrote to memory of 3260 1116 msedge.exe 83 PID 1116 wrote to memory of 3260 1116 msedge.exe 83 PID 1116 wrote to memory of 3260 1116 msedge.exe 83 PID 1116 wrote to memory of 3260 1116 msedge.exe 83 PID 1116 wrote to memory of 3260 1116 msedge.exe 83 PID 1116 wrote to memory of 3260 1116 msedge.exe 83 PID 1116 wrote to memory of 3260 1116 msedge.exe 83 PID 1116 wrote to memory of 3260 1116 msedge.exe 83 PID 1116 wrote to memory of 3260 1116 msedge.exe 83 PID 1116 wrote to memory of 3260 1116 msedge.exe 83 PID 1116 wrote to memory of 3260 1116 msedge.exe 83 PID 1116 wrote to memory of 3260 1116 msedge.exe 83 PID 1116 wrote to memory of 3260 1116 msedge.exe 83 PID 1116 wrote to memory of 3260 1116 msedge.exe 83 PID 1116 wrote to memory of 3260 1116 msedge.exe 83 PID 1116 wrote to memory of 3260 1116 msedge.exe 83 PID 1116 wrote to memory of 3260 1116 msedge.exe 83 PID 1116 wrote to memory of 3260 1116 msedge.exe 83 PID 1116 wrote to memory of 3948 1116 msedge.exe 84 PID 1116 wrote to memory of 3948 1116 msedge.exe 84 PID 1116 wrote to memory of 2416 1116 msedge.exe 85 PID 1116 wrote to memory of 2416 1116 msedge.exe 85 PID 1116 wrote to memory of 2416 1116 msedge.exe 85 PID 1116 wrote to memory of 2416 1116 msedge.exe 85 PID 1116 wrote to memory of 2416 1116 msedge.exe 85 PID 1116 wrote to memory of 2416 1116 msedge.exe 85 PID 1116 wrote to memory of 2416 1116 msedge.exe 85 PID 1116 wrote to memory of 2416 1116 msedge.exe 85 PID 1116 wrote to memory of 2416 1116 msedge.exe 85 PID 1116 wrote to memory of 2416 1116 msedge.exe 85 PID 1116 wrote to memory of 2416 1116 msedge.exe 85 PID 1116 wrote to memory of 2416 1116 msedge.exe 85 PID 1116 wrote to memory of 2416 1116 msedge.exe 85 PID 1116 wrote to memory of 2416 1116 msedge.exe 85 PID 1116 wrote to memory of 2416 1116 msedge.exe 85 PID 1116 wrote to memory of 2416 1116 msedge.exe 85 PID 1116 wrote to memory of 2416 1116 msedge.exe 85 PID 1116 wrote to memory of 2416 1116 msedge.exe 85 PID 1116 wrote to memory of 2416 1116 msedge.exe 85 PID 1116 wrote to memory of 2416 1116 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\36481d3342e81423beb19cd18a47d929_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1116 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff956ee46f8,0x7ff956ee4708,0x7ff956ee47182⤵PID:1964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2176,9900071070307839451,11945667142209108293,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2184 /prefetch:22⤵PID:3260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2176,9900071070307839451,11945667142209108293,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2236 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2176,9900071070307839451,11945667142209108293,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2516 /prefetch:82⤵PID:2416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,9900071070307839451,11945667142209108293,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:1920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,9900071070307839451,11945667142209108293,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:4540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,9900071070307839451,11945667142209108293,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4636 /prefetch:12⤵PID:2656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,9900071070307839451,11945667142209108293,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4848 /prefetch:12⤵PID:4004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2176,9900071070307839451,11945667142209108293,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5972 /prefetch:82⤵PID:3096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2176,9900071070307839451,11945667142209108293,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5972 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,9900071070307839451,11945667142209108293,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5580 /prefetch:12⤵PID:1000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,9900071070307839451,11945667142209108293,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5248 /prefetch:12⤵PID:400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,9900071070307839451,11945667142209108293,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4976 /prefetch:12⤵PID:1192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,9900071070307839451,11945667142209108293,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5644 /prefetch:12⤵PID:2272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2176,9900071070307839451,11945667142209108293,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5124 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:752
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1608
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4580
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
Filesize
20KB
MD5b6c8122025aff891940d1d5e1ab95fce
SHA1a0c7ca41d0922d085c358f5dde81ae3e85a8c9c4
SHA2569954c64c68000f615e5066bc255eced1195d1f8b7dbc715f9062ddf9f147e87e
SHA512e62a37b55b6b8d95c24fb624105ff6ff72f118e31760d0da1e8df8e8acf627ec6327c26dfa26df8535585877604c7948d2f621ccabc39beec49787e22c302c10
-
Filesize
44KB
MD588477d32f888c2b8a3f3d98deb460b3d
SHA11fae9ac6c1082fc0426aebe4e683eea9b4ba898c
SHA2561b1f0b5ef5f21d5742d84f331def7116323365c3dd4aec096a55763e310879d8
SHA512e0c0588ff27a989cac47797e5a8044983d0b3c75c44416c5f977e0e93e9d3a9321b9283ea077e6dcad0619ac960ee45fe8570f1d5cc7d5d4117fee4f2f0c96b3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD5f14b30edc1206484824261301ebef446
SHA12c4e4de5e16245288fd63674776da668e2aae533
SHA256c2fa6e8d055510acc1f67bc1b905c01f1c6beeb3b59dfce5290649863f87aa97
SHA51275c09a7a36781527feff125eba27ec1ac9cc34cfaf6efbd2bf5e4a6c2a29c7d6575aab0ae6a8bf637182223dbaa4b8729ab48591ea833cf81afaf499da253ac8
-
Filesize
1KB
MD5d5dc5df4f87e3f1f9ae3b09e404b0140
SHA18bc5a318dcf077cfd03daa9b8479d935b98f2e89
SHA25643b4181c80a3d2251480925cb9509e9390befd973a8f222dd1fb66695b6e6e04
SHA51220dbb108f5b2c51fb06ddc3a28c0fd8c8672a53425dfc03bb33d01bec50d8f1ce943377c7db290a122e1796c654d299cb8831eb3bb0ac6f251a0caa88103b835
-
Filesize
6KB
MD5ebb41c1fc23d852d8b64cfc3b050024e
SHA1bf6073a9d7e6adac62d22bb4c4ce56683d183b36
SHA256a71e577f73b942697fd74305f1e421a06f957c8f386c2f204cbef229b6ac63f5
SHA51281d1fb9a840c87992a6acdb31bb21369f5fa1aa8fd025386eaba83609d731b5e470c62d800b1fdb8fa108f82a7c586f312ff69d6b9663de1d4eb48caf6404b52
-
Filesize
6KB
MD5edc35bf8357674b222f939e2aaa32eb3
SHA1f5b7bc523abe1bfe1bf42affac91d9b1eacd325a
SHA256c361df2d004b38033235056655fb017dd0abb640d3eb8bd026aa73d2e8f411ac
SHA51230eb992c42760c6005498839b3a595fb56a66d2f11cbf53c044e3e92983948dac670da6a96780eb647b7a853de30447018efa978221de3f5ebeb67d470029e23
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5bb6a5d9d7c33782c761771b6b980b15b
SHA185f5c88406287f080bfe3a8d2da2e888251569b1
SHA25689cc0f89d33d7fd440cde8c0b6e078ed6cfcc05f194c42f14b37a1232e6ce742
SHA512ba336cea6f21a05f8bd73bb52b90d56c2f179ddc8db960c8ee498a0107fdbe56dfb1c4d2bc10cccc929fa12fcecbb9e1a3c3bc06deaf4cebd0af7004b9e652c0