Analysis
-
max time kernel
145s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
20/05/2024, 17:01
Static task
static1
Behavioral task
behavioral1
Sample
60358c8223d9de2cc79d6884d16caadf_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
60358c8223d9de2cc79d6884d16caadf_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
60358c8223d9de2cc79d6884d16caadf_JaffaCakes118.html
-
Size
123KB
-
MD5
60358c8223d9de2cc79d6884d16caadf
-
SHA1
86442bb06e86696bf3762b00a56861124aa430f0
-
SHA256
3e70bd5f52bc8f61c4d6ffee456a4d336b34ca6954b4e1a52322a82431c66792
-
SHA512
ac5ff6ccbe28a2a8db7c8bbcf805d888796e169732b8c33f69d8b7af663fad7bb302335322ca4a89e594bb4d6c975babb4562ff99867d7e8813dfdd7e5b34dc0
-
SSDEEP
1536:2QYcvR3VhH37Ha7EmakRhIHAZkCDy08otU6myJXXxMZyYk0AjrzCqlKDh9YhnaT2:2QY8MaW2b+UELKTqnAditye36nZC
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 432 msedge.exe 432 msedge.exe 464 msedge.exe 464 msedge.exe 5096 msedge.exe 5096 msedge.exe 5096 msedge.exe 5096 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 464 msedge.exe 464 msedge.exe 464 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe 464 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 464 wrote to memory of 3620 464 msedge.exe 82 PID 464 wrote to memory of 3620 464 msedge.exe 82 PID 464 wrote to memory of 3652 464 msedge.exe 83 PID 464 wrote to memory of 3652 464 msedge.exe 83 PID 464 wrote to memory of 3652 464 msedge.exe 83 PID 464 wrote to memory of 3652 464 msedge.exe 83 PID 464 wrote to memory of 3652 464 msedge.exe 83 PID 464 wrote to memory of 3652 464 msedge.exe 83 PID 464 wrote to memory of 3652 464 msedge.exe 83 PID 464 wrote to memory of 3652 464 msedge.exe 83 PID 464 wrote to memory of 3652 464 msedge.exe 83 PID 464 wrote to memory of 3652 464 msedge.exe 83 PID 464 wrote to memory of 3652 464 msedge.exe 83 PID 464 wrote to memory of 3652 464 msedge.exe 83 PID 464 wrote to memory of 3652 464 msedge.exe 83 PID 464 wrote to memory of 3652 464 msedge.exe 83 PID 464 wrote to memory of 3652 464 msedge.exe 83 PID 464 wrote to memory of 3652 464 msedge.exe 83 PID 464 wrote to memory of 3652 464 msedge.exe 83 PID 464 wrote to memory of 3652 464 msedge.exe 83 PID 464 wrote to memory of 3652 464 msedge.exe 83 PID 464 wrote to memory of 3652 464 msedge.exe 83 PID 464 wrote to memory of 3652 464 msedge.exe 83 PID 464 wrote to memory of 3652 464 msedge.exe 83 PID 464 wrote to memory of 3652 464 msedge.exe 83 PID 464 wrote to memory of 3652 464 msedge.exe 83 PID 464 wrote to memory of 3652 464 msedge.exe 83 PID 464 wrote to memory of 3652 464 msedge.exe 83 PID 464 wrote to memory of 3652 464 msedge.exe 83 PID 464 wrote to memory of 3652 464 msedge.exe 83 PID 464 wrote to memory of 3652 464 msedge.exe 83 PID 464 wrote to memory of 3652 464 msedge.exe 83 PID 464 wrote to memory of 3652 464 msedge.exe 83 PID 464 wrote to memory of 3652 464 msedge.exe 83 PID 464 wrote to memory of 3652 464 msedge.exe 83 PID 464 wrote to memory of 3652 464 msedge.exe 83 PID 464 wrote to memory of 3652 464 msedge.exe 83 PID 464 wrote to memory of 3652 464 msedge.exe 83 PID 464 wrote to memory of 3652 464 msedge.exe 83 PID 464 wrote to memory of 3652 464 msedge.exe 83 PID 464 wrote to memory of 3652 464 msedge.exe 83 PID 464 wrote to memory of 3652 464 msedge.exe 83 PID 464 wrote to memory of 432 464 msedge.exe 84 PID 464 wrote to memory of 432 464 msedge.exe 84 PID 464 wrote to memory of 724 464 msedge.exe 85 PID 464 wrote to memory of 724 464 msedge.exe 85 PID 464 wrote to memory of 724 464 msedge.exe 85 PID 464 wrote to memory of 724 464 msedge.exe 85 PID 464 wrote to memory of 724 464 msedge.exe 85 PID 464 wrote to memory of 724 464 msedge.exe 85 PID 464 wrote to memory of 724 464 msedge.exe 85 PID 464 wrote to memory of 724 464 msedge.exe 85 PID 464 wrote to memory of 724 464 msedge.exe 85 PID 464 wrote to memory of 724 464 msedge.exe 85 PID 464 wrote to memory of 724 464 msedge.exe 85 PID 464 wrote to memory of 724 464 msedge.exe 85 PID 464 wrote to memory of 724 464 msedge.exe 85 PID 464 wrote to memory of 724 464 msedge.exe 85 PID 464 wrote to memory of 724 464 msedge.exe 85 PID 464 wrote to memory of 724 464 msedge.exe 85 PID 464 wrote to memory of 724 464 msedge.exe 85 PID 464 wrote to memory of 724 464 msedge.exe 85 PID 464 wrote to memory of 724 464 msedge.exe 85 PID 464 wrote to memory of 724 464 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\60358c8223d9de2cc79d6884d16caadf_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:464 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffc66746f8,0x7fffc6674708,0x7fffc66747182⤵PID:3620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2252,15592293123731448286,14446351085615974149,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2260 /prefetch:22⤵PID:3652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2252,15592293123731448286,14446351085615974149,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2312 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2252,15592293123731448286,14446351085615974149,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2768 /prefetch:82⤵PID:724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2252,15592293123731448286,14446351085615974149,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:1860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2252,15592293123731448286,14446351085615974149,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:4360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2252,15592293123731448286,14446351085615974149,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5116 /prefetch:12⤵PID:1376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2252,15592293123731448286,14446351085615974149,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1924 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5096
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4920
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2408
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f61fa5143fe872d1d8f1e9f8dc6544f9
SHA1df44bab94d7388fb38c63085ec4db80cfc5eb009
SHA256284a24b5b40860240db00ef3ae6a33c9fa8349ab5490a634e27b2c6e9a191c64
SHA512971000784a6518bb39c5cf043292c7ab659162275470f5f6b632ea91a6bcae83bc80517ceb983dd5abfe8fb4e157344cb65c27e609a879eec00b33c5fad563a6
-
Filesize
152B
MD587f7abeb82600e1e640b843ad50fe0a1
SHA1045bbada3f23fc59941bf7d0210fb160cb78ae87
SHA256b35d6906050d90a81d23646f86c20a8f5d42f058ffc6436fb0a2b8bd71ee1262
SHA512ea8e7f24ab823ad710ce079c86c40aa957353a00d2775732c23e31be88a10d212e974c4691279aa86016c4660f5795febf739a15207833df6ed964a9ed99d618
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize192B
MD5fca7e687f754e42bf4b5c00a70e71c79
SHA1ee3aafbda306de44e081b61a180a403e724e114e
SHA2561dc1565737f9c4f9c6d43c9f9e00eb14a91f1c2fd65a9f2f09989f7d132d0022
SHA512add133918e4c1dcce185dd5674c085aa8d2f33f1f7a5f93b28394d6167c854cbc0624f8d162e3d3a1a1245e4eed3319d208dee8c7ec5911ea1b7fe6695bb6d99
-
Filesize
547B
MD5edb9a604ea5034bf7abafa55570e9353
SHA156900c754f23bb0cd380d8398f3bbac9e9d6dd42
SHA2567f50d0be17cb8266769655212d425c81e85d58ccf9e5be181147e83b9b1e556b
SHA5125f1d9c65ad2f40fda265e88b3279f482902ce9faa44b4acd06d6bdaf9efa13d5a49962bf99ce682b766acb1f4d1ba57c6f07522b8aed367a1856def0181e78df
-
Filesize
6KB
MD52f5965519e836e74135b747cd0fbb163
SHA1294ac3b2767fda98557ca84ad036e9007a91149e
SHA256c0e4a7269d53a6e8caf5d714967cec74a68c6c8d0ad1b9c703734ad6586b1c80
SHA5120bd2305bf9fad02ba14a39666b775ceddb0a5384cfbb26baebed825bfcf191fcfb34b2e2b52771ba2fede302e129d8fa4d08a9a8421cb3c15e9eceb8eb94a98b
-
Filesize
5KB
MD5748d40dc35cce5275cd77c1bfa09e925
SHA1830299af00d0d5733dc12f99082685c7aee19b6f
SHA256890223ff7bebb9c940b8208d5d17bf3fc58dba1270a44bf569db1c10695c6778
SHA512c2e2f05263bbb535ff4fed8c0137aba92932a4798c1fdedfd94bb1ee46a5f3d9de85342fa001c13e91b5139103137537176a9281d9cb371d22111252af1a626f
-
Filesize
11KB
MD54ac4bbd714bfdc9f94ddd577748265a4
SHA1c446b01e632e238204137bc04d403b673305d866
SHA256b50fdc3684722b639887dd863c03bf0e750040571bd1134b401b6653aa9438bc
SHA5126d91bbec631aaa26173f455b93e6f3d723cc89ab77f9ad8ec3bd267ab31aed2df6c4f9f55102a90a6181b033143e650bb4efa54733f929edca6f7654c276fc9c