Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
14/05/2024, 21:37
Static task
static1
Behavioral task
behavioral1
Sample
432d79b5a73c3131ccbbd8c452f4be26_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
432d79b5a73c3131ccbbd8c452f4be26_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
432d79b5a73c3131ccbbd8c452f4be26_JaffaCakes118.html
-
Size
69KB
-
MD5
432d79b5a73c3131ccbbd8c452f4be26
-
SHA1
0dad8f9ddad8df5c94e2c3bfc10ca58f0f69c15f
-
SHA256
4f284bffba2d826b8de201d70c36e9536bfe51a3d54af561d18eca3adf9abbed
-
SHA512
53d4e9a31458c6f7104b4817dda205943fe5b6d08bc3f3b235a6b9b714a4f5cf886d3bfc5f4bf9946643d93be7abcc3e871aac2542eba4c86d0e0e14fd7bb7ac
-
SSDEEP
768:LlkDgOriWNcaSoagG0keXxt//eItgoXwwN1nNttI29rM8l:J/Cke1f1NttF3
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4996 msedge.exe 4996 msedge.exe 1848 msedge.exe 1848 msedge.exe 1852 identity_helper.exe 1852 identity_helper.exe 2288 msedge.exe 2288 msedge.exe 2288 msedge.exe 2288 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1848 wrote to memory of 2208 1848 msedge.exe 82 PID 1848 wrote to memory of 2208 1848 msedge.exe 82 PID 1848 wrote to memory of 2684 1848 msedge.exe 83 PID 1848 wrote to memory of 2684 1848 msedge.exe 83 PID 1848 wrote to memory of 2684 1848 msedge.exe 83 PID 1848 wrote to memory of 2684 1848 msedge.exe 83 PID 1848 wrote to memory of 2684 1848 msedge.exe 83 PID 1848 wrote to memory of 2684 1848 msedge.exe 83 PID 1848 wrote to memory of 2684 1848 msedge.exe 83 PID 1848 wrote to memory of 2684 1848 msedge.exe 83 PID 1848 wrote to memory of 2684 1848 msedge.exe 83 PID 1848 wrote to memory of 2684 1848 msedge.exe 83 PID 1848 wrote to memory of 2684 1848 msedge.exe 83 PID 1848 wrote to memory of 2684 1848 msedge.exe 83 PID 1848 wrote to memory of 2684 1848 msedge.exe 83 PID 1848 wrote to memory of 2684 1848 msedge.exe 83 PID 1848 wrote to memory of 2684 1848 msedge.exe 83 PID 1848 wrote to memory of 2684 1848 msedge.exe 83 PID 1848 wrote to memory of 2684 1848 msedge.exe 83 PID 1848 wrote to memory of 2684 1848 msedge.exe 83 PID 1848 wrote to memory of 2684 1848 msedge.exe 83 PID 1848 wrote to memory of 2684 1848 msedge.exe 83 PID 1848 wrote to memory of 2684 1848 msedge.exe 83 PID 1848 wrote to memory of 2684 1848 msedge.exe 83 PID 1848 wrote to memory of 2684 1848 msedge.exe 83 PID 1848 wrote to memory of 2684 1848 msedge.exe 83 PID 1848 wrote to memory of 2684 1848 msedge.exe 83 PID 1848 wrote to memory of 2684 1848 msedge.exe 83 PID 1848 wrote to memory of 2684 1848 msedge.exe 83 PID 1848 wrote to memory of 2684 1848 msedge.exe 83 PID 1848 wrote to memory of 2684 1848 msedge.exe 83 PID 1848 wrote to memory of 2684 1848 msedge.exe 83 PID 1848 wrote to memory of 2684 1848 msedge.exe 83 PID 1848 wrote to memory of 2684 1848 msedge.exe 83 PID 1848 wrote to memory of 2684 1848 msedge.exe 83 PID 1848 wrote to memory of 2684 1848 msedge.exe 83 PID 1848 wrote to memory of 2684 1848 msedge.exe 83 PID 1848 wrote to memory of 2684 1848 msedge.exe 83 PID 1848 wrote to memory of 2684 1848 msedge.exe 83 PID 1848 wrote to memory of 2684 1848 msedge.exe 83 PID 1848 wrote to memory of 2684 1848 msedge.exe 83 PID 1848 wrote to memory of 2684 1848 msedge.exe 83 PID 1848 wrote to memory of 4996 1848 msedge.exe 84 PID 1848 wrote to memory of 4996 1848 msedge.exe 84 PID 1848 wrote to memory of 3084 1848 msedge.exe 85 PID 1848 wrote to memory of 3084 1848 msedge.exe 85 PID 1848 wrote to memory of 3084 1848 msedge.exe 85 PID 1848 wrote to memory of 3084 1848 msedge.exe 85 PID 1848 wrote to memory of 3084 1848 msedge.exe 85 PID 1848 wrote to memory of 3084 1848 msedge.exe 85 PID 1848 wrote to memory of 3084 1848 msedge.exe 85 PID 1848 wrote to memory of 3084 1848 msedge.exe 85 PID 1848 wrote to memory of 3084 1848 msedge.exe 85 PID 1848 wrote to memory of 3084 1848 msedge.exe 85 PID 1848 wrote to memory of 3084 1848 msedge.exe 85 PID 1848 wrote to memory of 3084 1848 msedge.exe 85 PID 1848 wrote to memory of 3084 1848 msedge.exe 85 PID 1848 wrote to memory of 3084 1848 msedge.exe 85 PID 1848 wrote to memory of 3084 1848 msedge.exe 85 PID 1848 wrote to memory of 3084 1848 msedge.exe 85 PID 1848 wrote to memory of 3084 1848 msedge.exe 85 PID 1848 wrote to memory of 3084 1848 msedge.exe 85 PID 1848 wrote to memory of 3084 1848 msedge.exe 85 PID 1848 wrote to memory of 3084 1848 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\432d79b5a73c3131ccbbd8c452f4be26_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd5eb246f8,0x7ffd5eb24708,0x7ffd5eb247182⤵PID:2208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2200,3393009295570191678,11616205795481057471,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2208 /prefetch:22⤵PID:2684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2200,3393009295570191678,11616205795481057471,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2272 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2200,3393009295570191678,11616205795481057471,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2928 /prefetch:82⤵PID:3084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,3393009295570191678,11616205795481057471,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:12⤵PID:3376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,3393009295570191678,11616205795481057471,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:12⤵PID:1236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,3393009295570191678,11616205795481057471,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4724 /prefetch:12⤵PID:536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,3393009295570191678,11616205795481057471,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2280 /prefetch:12⤵PID:4076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,3393009295570191678,11616205795481057471,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1308 /prefetch:12⤵PID:4068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,3393009295570191678,11616205795481057471,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1320 /prefetch:12⤵PID:2688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2200,3393009295570191678,11616205795481057471,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6304 /prefetch:82⤵PID:3744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2200,3393009295570191678,11616205795481057471,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6304 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,3393009295570191678,11616205795481057471,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5048 /prefetch:12⤵PID:3100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,3393009295570191678,11616205795481057471,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4932 /prefetch:12⤵PID:4408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2200,3393009295570191678,11616205795481057471,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5912 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2288
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1068
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1648
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD5960d13eff605426cd734a5fa4d0c0ef7
SHA1fa3ea28c2b950553347eb6f67fdfa37b34b31ea1
SHA25623725365787cb1e27c6ed2276aeb0a8f1a980bbd63226903493ee65ffcc0024e
SHA512723926225f4ed94cce4e0a6599367dad563ef33687ca92e1f5e3231f4e5c89a4997c2b754bed70ff357f3a14a57b2900331d10f1a8af711d3dbdbc909840f16f
-
Filesize
995B
MD5e14cbfa280d34fa0573575b349fffb4c
SHA1ab10b696b6e78efce50864eee1185b779fc16701
SHA256afc052fa4c8c130f17a67ba612984aa4637cfeeaca18c3b5379ed2a2696590bc
SHA51214b6445c0481f74d36023e962a5f219ceacc6eec0195c57f07dfc786b9d730c57e8beb027cf5ca7267ad6e4969a367815ab30248314facd14baf6472105096b0
-
Filesize
6KB
MD575b0c7a0dc2c6bb9c5843cf768c7a7f8
SHA1a6db60720304a13b3684dba663a26fce8996f564
SHA256dffc2af001036574ef2a778df346c5573e1b46365cc2edd41562d1331522aa2c
SHA51236ed5f1f28324dec8e22e933d7d82e6e1f7ff7d3c8e9d40a8ddc829436122c4bee49629608b486de755eb5b10ee9341225c8639b714a98d8bcc6e5fc06409577
-
Filesize
6KB
MD59103e2c0dea0d5164576eaa88a1541e6
SHA179db180d98b89b585d222b60a6f9a9cdc0bbdbe2
SHA2567d65064afe265705e03dc4a95563cc9cf1217d8de25dcb689d11fa9f2429f3fc
SHA51267aa1b0be5190793f21c0b5e712e7c4c49277c96dd4f0a91a3305ce10b1b3c0a8216742c740e36ae9b8f0e0fce6626b27a96b4b3c4e401eb607fa16aa7e89bec
-
Filesize
6KB
MD59f4a925bd4512be2ab69893f3c8d629a
SHA13793679bff5ea063505c6c68f0b5ca262b29c120
SHA2565a28f2113ebd4f4dad728db6adb35f81ed2b4b8c4b0631caa6afc7457639f7de
SHA51221013bd4cb10924a6b007b19e6ea6a08ec493afd2d547b6dad10b8ce7956dee7338d948e2c18bcd02b90a8dade83ef55702e4b2f587e64c6077ad8029d444b38
-
Filesize
6KB
MD5c492622d8a34cfb1006764690b298ed8
SHA178e1f2b5b7ba43a475c06923cd792a649db41a9e
SHA25629202295accfbe5f5da38e1adcbb4f2d2844f0dfc77bab102f98fa3ff4226434
SHA512b4633dfa4047e4c3cb0957397c7c9e6321b02c70d75b92e09de418e050af2040b138dd13e50a0e2d7a73146a8e9d375bb160b6604cf4f7a42fafb302cb863d02
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD50ac29da28d263ac4e0ce4fcfdf4de0a2
SHA17b7f22ec0a3c1cdd6f5acf6cb2d1fd6cfe6d0a7e
SHA25644e030883c6d7aba8f5e3760f9f80942aeb035203c6759d7c1b03f2eacee76ec
SHA512379a643ab0a4f8a4db5318fb91d76a67bffa0396b7fd3a98055ad2dc8dc9e2e199235f66cebeb2c7fcc86501edb023df75ff03e5db97f2d61e16866a6e5189b7