Analysis
-
max time kernel
145s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
14/05/2024, 10:06
Static task
static1
Behavioral task
behavioral1
Sample
411a79f94aa443eb393dbea9fdcf39aa_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
411a79f94aa443eb393dbea9fdcf39aa_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
411a79f94aa443eb393dbea9fdcf39aa_JaffaCakes118.html
-
Size
1KB
-
MD5
411a79f94aa443eb393dbea9fdcf39aa
-
SHA1
c403c7b951e257345e10c99e8d1506c4b35ed60f
-
SHA256
82bb1db17d571e72263ec072bb17d965c2021f5642e7b5ade6b4fa00f7a84f35
-
SHA512
bb777735053911e11700e7faa0bf9c5fe7af6480319081351e1373c5b031f2979b88064a652b8f96237e7efd5f42659f09662c807ec59c45960341c9ca3a43d7
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4440 msedge.exe 4440 msedge.exe 468 msedge.exe 468 msedge.exe 4248 identity_helper.exe 4248 identity_helper.exe 4184 msedge.exe 4184 msedge.exe 4184 msedge.exe 4184 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 468 wrote to memory of 1612 468 msedge.exe 83 PID 468 wrote to memory of 1612 468 msedge.exe 83 PID 468 wrote to memory of 1144 468 msedge.exe 84 PID 468 wrote to memory of 1144 468 msedge.exe 84 PID 468 wrote to memory of 1144 468 msedge.exe 84 PID 468 wrote to memory of 1144 468 msedge.exe 84 PID 468 wrote to memory of 1144 468 msedge.exe 84 PID 468 wrote to memory of 1144 468 msedge.exe 84 PID 468 wrote to memory of 1144 468 msedge.exe 84 PID 468 wrote to memory of 1144 468 msedge.exe 84 PID 468 wrote to memory of 1144 468 msedge.exe 84 PID 468 wrote to memory of 1144 468 msedge.exe 84 PID 468 wrote to memory of 1144 468 msedge.exe 84 PID 468 wrote to memory of 1144 468 msedge.exe 84 PID 468 wrote to memory of 1144 468 msedge.exe 84 PID 468 wrote to memory of 1144 468 msedge.exe 84 PID 468 wrote to memory of 1144 468 msedge.exe 84 PID 468 wrote to memory of 1144 468 msedge.exe 84 PID 468 wrote to memory of 1144 468 msedge.exe 84 PID 468 wrote to memory of 1144 468 msedge.exe 84 PID 468 wrote to memory of 1144 468 msedge.exe 84 PID 468 wrote to memory of 1144 468 msedge.exe 84 PID 468 wrote to memory of 1144 468 msedge.exe 84 PID 468 wrote to memory of 1144 468 msedge.exe 84 PID 468 wrote to memory of 1144 468 msedge.exe 84 PID 468 wrote to memory of 1144 468 msedge.exe 84 PID 468 wrote to memory of 1144 468 msedge.exe 84 PID 468 wrote to memory of 1144 468 msedge.exe 84 PID 468 wrote to memory of 1144 468 msedge.exe 84 PID 468 wrote to memory of 1144 468 msedge.exe 84 PID 468 wrote to memory of 1144 468 msedge.exe 84 PID 468 wrote to memory of 1144 468 msedge.exe 84 PID 468 wrote to memory of 1144 468 msedge.exe 84 PID 468 wrote to memory of 1144 468 msedge.exe 84 PID 468 wrote to memory of 1144 468 msedge.exe 84 PID 468 wrote to memory of 1144 468 msedge.exe 84 PID 468 wrote to memory of 1144 468 msedge.exe 84 PID 468 wrote to memory of 1144 468 msedge.exe 84 PID 468 wrote to memory of 1144 468 msedge.exe 84 PID 468 wrote to memory of 1144 468 msedge.exe 84 PID 468 wrote to memory of 1144 468 msedge.exe 84 PID 468 wrote to memory of 1144 468 msedge.exe 84 PID 468 wrote to memory of 4440 468 msedge.exe 85 PID 468 wrote to memory of 4440 468 msedge.exe 85 PID 468 wrote to memory of 3448 468 msedge.exe 86 PID 468 wrote to memory of 3448 468 msedge.exe 86 PID 468 wrote to memory of 3448 468 msedge.exe 86 PID 468 wrote to memory of 3448 468 msedge.exe 86 PID 468 wrote to memory of 3448 468 msedge.exe 86 PID 468 wrote to memory of 3448 468 msedge.exe 86 PID 468 wrote to memory of 3448 468 msedge.exe 86 PID 468 wrote to memory of 3448 468 msedge.exe 86 PID 468 wrote to memory of 3448 468 msedge.exe 86 PID 468 wrote to memory of 3448 468 msedge.exe 86 PID 468 wrote to memory of 3448 468 msedge.exe 86 PID 468 wrote to memory of 3448 468 msedge.exe 86 PID 468 wrote to memory of 3448 468 msedge.exe 86 PID 468 wrote to memory of 3448 468 msedge.exe 86 PID 468 wrote to memory of 3448 468 msedge.exe 86 PID 468 wrote to memory of 3448 468 msedge.exe 86 PID 468 wrote to memory of 3448 468 msedge.exe 86 PID 468 wrote to memory of 3448 468 msedge.exe 86 PID 468 wrote to memory of 3448 468 msedge.exe 86 PID 468 wrote to memory of 3448 468 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\411a79f94aa443eb393dbea9fdcf39aa_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:468 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb576846f8,0x7ffb57684708,0x7ffb576847182⤵PID:1612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,7809368061402414279,3585150223851674175,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:22⤵PID:1144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,7809368061402414279,3585150223851674175,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,7809368061402414279,3585150223851674175,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2672 /prefetch:82⤵PID:3448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,7809368061402414279,3585150223851674175,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:3096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,7809368061402414279,3585150223851674175,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:2104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,7809368061402414279,3585150223851674175,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4684 /prefetch:12⤵PID:1700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,7809368061402414279,3585150223851674175,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5248 /prefetch:82⤵PID:892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,7809368061402414279,3585150223851674175,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5248 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,7809368061402414279,3585150223851674175,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5320 /prefetch:12⤵PID:3712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,7809368061402414279,3585150223851674175,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5344 /prefetch:12⤵PID:724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,7809368061402414279,3585150223851674175,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4764 /prefetch:12⤵PID:4872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,7809368061402414279,3585150223851674175,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4744 /prefetch:12⤵PID:4848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,7809368061402414279,3585150223851674175,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1788 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4184
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1648
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4084
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54f7152bc5a1a715ef481e37d1c791959
SHA1c8a1ed674c62ae4f45519f90a8cc5a81eff3a6d7
SHA256704dd4f98d8ca34ec421f23ba1891b178c23c14b3301e4655efc5c02d356c2bc
SHA5122e6b02ca35d76a655a17a5f3e9dbd8d7517c7dae24f0095c7350eb9e7bdf9e1256a7009aa8878f96c89d1ea4fe5323a41f72b8c551806dda62880d7ff231ff5c
-
Filesize
152B
MD5ea98e583ad99df195d29aa066204ab56
SHA1f89398664af0179641aa0138b337097b617cb2db
SHA256a7abb51435909fa2d75c6f2ff5c69a93d4a0ab276ed579e7d8733b2a63ffbee6
SHA512e109be3466e653e5d310b3e402e1626298b09205d223722a82344dd78504f3c33e1e24e8402a02f38cd2c9c50d96a303ce4846bea5a583423937ab018cd5782f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD5c76a852f7bd00361e12765cc897871c8
SHA1863630b2af0a75afab0cf79d328810c578a2948b
SHA25672d5b94314e46c3a5a7dd880409cb5b088c7229c9efe7cb3bec08358dd642ac5
SHA512bac098d912e7e3eafa261a101f33e94468c5fd7c283869fb63d94a7a50d284e0f9f7367cd272b8acf2e42ef491f08ddfe39cb1449d3ce97507821e4d87d5f026
-
Filesize
407B
MD54cda5c4a49dd1870be315237311c76d2
SHA16307e09708b57a8c017bbb447a241147c5f49b0a
SHA256558395ec5c88eb7b9417f81c963235029761f5b530fdf600834077fee2ec17df
SHA5121f739dadbada4278db65bc53cc088d37261ee3b299045c38a1f796cebe000e7368452856bab01912be10021e6b3084791bfb2fb9ae30ef017498c4134cacf760
-
Filesize
5KB
MD58eb73cbf47f3e0865d91a5e938867d52
SHA16f9fcde4a90a7620f334bf074b52ffaf98b1ef93
SHA2566d614598b0595ffe222816deeb4828440ba6fa767c11eefea974c1cc8baa23f3
SHA5126811193d72060dff74e1945f4abcf195cc856e8199519e3f91a637cd71edd251c22665dc8adb1f7e5370c7e92086fbd3574d5b058e950e8773386048004830d8
-
Filesize
6KB
MD5cbcd1aeef5514e803e19cf754eb3fddf
SHA156093bc663c2b6c34fbe65c7befb3d3d23724fd4
SHA25655938e54d11f734ae4d2fef8e1d4349cf87423f55be21156c55b9a527c98fb88
SHA512bd3cdbef9306580f9f7596922d9e96c5fd26608dab6e0c8c835fb52f43324afc0caa1e025fd795c1437621d0e71d1ce18773d475db168aa008ea7adbc18a7414
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5597ccdd9479ab827543c4ee28d5a27d3
SHA1d7430eb4f31ddb442b88bda82101bfc4fd633ab4
SHA256dc43152b6caa32770ee66d1cb0f99560786a89d7207bc8f7801d8c8c245aa933
SHA512a95193ea461686038d6a91e2e266d8b99f1af4827cf11a52016730baa190b56fc1e036885d8597c206559aaeea17db2a687f93b55e0060a9b1b9e84c9e2611eb
-
Filesize
11KB
MD5df3d26c541059bed80df54c5f55c8a69
SHA1ae17c7899a437e53fd0687d8f0dbed307abdbb4e
SHA256c1f2b2051f92182f62edd042270fa31c8c980f1fa87ec398c5c37c1cf127ce12
SHA512b1b36629413617e5532276130d9017b3e4766d2d4ee16d9de8cac8fbe133c588385c3953f31abf9fce9e50b51b3d4741963a6e65be295add7f7a1b0d4965fb91