Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
25/05/2024, 16:09
Static task
static1
Behavioral task
behavioral1
Sample
7284c074b8b5b2a6b4be8ac2efbed074_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
7284c074b8b5b2a6b4be8ac2efbed074_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
7284c074b8b5b2a6b4be8ac2efbed074_JaffaCakes118.html
-
Size
49KB
-
MD5
7284c074b8b5b2a6b4be8ac2efbed074
-
SHA1
c0e957ffae3c7d015af587943caad5cc4e012c72
-
SHA256
6643c2c55947c6f63537faf01426b98f60cb31ab36d15fb6875dae7b8ba8e2d4
-
SHA512
c76ad6a1d84ef297ef4979fabb46b75154ace8b40a75e6b9ab9da15015f4972552a9960ea37508db1b4dfb916fbcf96f5a6cc5a06448569190f205fdfc3da5e2
-
SSDEEP
1536:f0AmW/HJ2XYRcxvcrabdYzfxEAh5ZcYTylJm:foW/HJ2XYRcxvcrabdYzfxE45SllJm
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4932 msedge.exe 4932 msedge.exe 3788 msedge.exe 3788 msedge.exe 3064 identity_helper.exe 3064 identity_helper.exe 5576 msedge.exe 5576 msedge.exe 5576 msedge.exe 5576 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3788 wrote to memory of 1324 3788 msedge.exe 83 PID 3788 wrote to memory of 1324 3788 msedge.exe 83 PID 3788 wrote to memory of 3284 3788 msedge.exe 84 PID 3788 wrote to memory of 3284 3788 msedge.exe 84 PID 3788 wrote to memory of 3284 3788 msedge.exe 84 PID 3788 wrote to memory of 3284 3788 msedge.exe 84 PID 3788 wrote to memory of 3284 3788 msedge.exe 84 PID 3788 wrote to memory of 3284 3788 msedge.exe 84 PID 3788 wrote to memory of 3284 3788 msedge.exe 84 PID 3788 wrote to memory of 3284 3788 msedge.exe 84 PID 3788 wrote to memory of 3284 3788 msedge.exe 84 PID 3788 wrote to memory of 3284 3788 msedge.exe 84 PID 3788 wrote to memory of 3284 3788 msedge.exe 84 PID 3788 wrote to memory of 3284 3788 msedge.exe 84 PID 3788 wrote to memory of 3284 3788 msedge.exe 84 PID 3788 wrote to memory of 3284 3788 msedge.exe 84 PID 3788 wrote to memory of 3284 3788 msedge.exe 84 PID 3788 wrote to memory of 3284 3788 msedge.exe 84 PID 3788 wrote to memory of 3284 3788 msedge.exe 84 PID 3788 wrote to memory of 3284 3788 msedge.exe 84 PID 3788 wrote to memory of 3284 3788 msedge.exe 84 PID 3788 wrote to memory of 3284 3788 msedge.exe 84 PID 3788 wrote to memory of 3284 3788 msedge.exe 84 PID 3788 wrote to memory of 3284 3788 msedge.exe 84 PID 3788 wrote to memory of 3284 3788 msedge.exe 84 PID 3788 wrote to memory of 3284 3788 msedge.exe 84 PID 3788 wrote to memory of 3284 3788 msedge.exe 84 PID 3788 wrote to memory of 3284 3788 msedge.exe 84 PID 3788 wrote to memory of 3284 3788 msedge.exe 84 PID 3788 wrote to memory of 3284 3788 msedge.exe 84 PID 3788 wrote to memory of 3284 3788 msedge.exe 84 PID 3788 wrote to memory of 3284 3788 msedge.exe 84 PID 3788 wrote to memory of 3284 3788 msedge.exe 84 PID 3788 wrote to memory of 3284 3788 msedge.exe 84 PID 3788 wrote to memory of 3284 3788 msedge.exe 84 PID 3788 wrote to memory of 3284 3788 msedge.exe 84 PID 3788 wrote to memory of 3284 3788 msedge.exe 84 PID 3788 wrote to memory of 3284 3788 msedge.exe 84 PID 3788 wrote to memory of 3284 3788 msedge.exe 84 PID 3788 wrote to memory of 3284 3788 msedge.exe 84 PID 3788 wrote to memory of 3284 3788 msedge.exe 84 PID 3788 wrote to memory of 3284 3788 msedge.exe 84 PID 3788 wrote to memory of 4932 3788 msedge.exe 85 PID 3788 wrote to memory of 4932 3788 msedge.exe 85 PID 3788 wrote to memory of 5004 3788 msedge.exe 86 PID 3788 wrote to memory of 5004 3788 msedge.exe 86 PID 3788 wrote to memory of 5004 3788 msedge.exe 86 PID 3788 wrote to memory of 5004 3788 msedge.exe 86 PID 3788 wrote to memory of 5004 3788 msedge.exe 86 PID 3788 wrote to memory of 5004 3788 msedge.exe 86 PID 3788 wrote to memory of 5004 3788 msedge.exe 86 PID 3788 wrote to memory of 5004 3788 msedge.exe 86 PID 3788 wrote to memory of 5004 3788 msedge.exe 86 PID 3788 wrote to memory of 5004 3788 msedge.exe 86 PID 3788 wrote to memory of 5004 3788 msedge.exe 86 PID 3788 wrote to memory of 5004 3788 msedge.exe 86 PID 3788 wrote to memory of 5004 3788 msedge.exe 86 PID 3788 wrote to memory of 5004 3788 msedge.exe 86 PID 3788 wrote to memory of 5004 3788 msedge.exe 86 PID 3788 wrote to memory of 5004 3788 msedge.exe 86 PID 3788 wrote to memory of 5004 3788 msedge.exe 86 PID 3788 wrote to memory of 5004 3788 msedge.exe 86 PID 3788 wrote to memory of 5004 3788 msedge.exe 86 PID 3788 wrote to memory of 5004 3788 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\7284c074b8b5b2a6b4be8ac2efbed074_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3788 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9cc9c46f8,0x7ff9cc9c4708,0x7ff9cc9c47182⤵PID:1324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,4768553070422535082,13186482475742485358,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:22⤵PID:3284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,4768553070422535082,13186482475742485358,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,4768553070422535082,13186482475742485358,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2532 /prefetch:82⤵PID:5004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,4768553070422535082,13186482475742485358,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,4768553070422535082,13186482475742485358,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,4768553070422535082,13186482475742485358,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4012 /prefetch:12⤵PID:3520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,4768553070422535082,13186482475742485358,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5768 /prefetch:82⤵PID:3124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,4768553070422535082,13186482475742485358,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5768 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,4768553070422535082,13186482475742485358,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5336 /prefetch:12⤵PID:4844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,4768553070422535082,13186482475742485358,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5356 /prefetch:12⤵PID:2164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,4768553070422535082,13186482475742485358,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4092 /prefetch:12⤵PID:3096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,4768553070422535082,13186482475742485358,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5248 /prefetch:12⤵PID:2028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,4768553070422535082,13186482475742485358,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2284 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5576
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2112
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4688
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54b4f91fa1b362ba5341ecb2836438dea
SHA19561f5aabed742404d455da735259a2c6781fa07
SHA256d824b742eace197ddc8b6ed5d918f390fde4b0fbf0e371b8e1f2ed40a3b6455c
SHA512fef22217dcdd8000bc193e25129699d4b8f7a103ca4fe1613baf73ccf67090d9fbae27eb93e4bb8747455853a0a4326f2d0c38df41c8d42351cdcd4132418dac
-
Filesize
152B
MD5eaa3db555ab5bc0cb364826204aad3f0
SHA1a4cdfaac8de49e6e6e88b335cfeaa7c9e3c563ca
SHA256ef7baeb1b2ab05ff3c5fbb76c2759db49294654548706c7c8e87f0cde855b86b
SHA512e13981da51b52c15261ecabb98af32f9b920651b46b10ce0cc823c5878b22eb1420258c80deef204070d1e0bdd3a64d875ac2522e3713a3cf11657aa55aeccd4
-
Filesize
40KB
MD55ce7bdeeea547dc5e395554f1de0b179
SHA13dba53fa4da7c828a468d17abc09b265b664078a
SHA256675cd5fdfe3c14504b7af2d1012c921ab0b5af2ab93bf4dfbfe6505cae8b79a9
SHA5120bf3e39c11cfefbd4de7ec60f2adaacfba14eac0a4bf8e4d2bc80c4cf1e9d173035c068d8488436c4cf9840ae5c7cfccbefddf9d184e60cab78d1043dc3b9c4e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize192B
MD549ea7af514814910b2b507e30458ccbb
SHA1b6fabb16b288b267d2dea07533df021dcd7b0f09
SHA2565c62195712f672849cd04c3166ff65e266607c6e5decfde35a46916fe0383c88
SHA5123dc646236cbe5385bd674f98b6056818d032e5af8587b0cb62531d953697f9e52c5db1e016406177369c5c927925c3393e7170f4aa7111370fab06d7dadf9fe5
-
Filesize
2KB
MD5e5bf595d0ef1361f77a8afe79ed62b7c
SHA184f47f8be6e2a97734714513819b762d7c9ecba6
SHA25634d36695c69696f8f3822bc7760c989270f2ad2dd1dc965cf40dbf0bddde1085
SHA5125294797c01e0f84352f84841554fd1aebf68f5a40743d406c93cc96761f9a3ef09d112a2577b4b729cd449ed85fe9b260a07150c3e41a3fccdd094f7d9c4dbcc
-
Filesize
5KB
MD5a8cf71a2a0a5a018b959112d5f278ce2
SHA1f22454486a654aea5df3bd9991a2b8777bb3f422
SHA2567fb9b9ef598a02941996b4fd4273b4402761fb771b32577e98b4fbf227ffda66
SHA512cd583b761837ccb335c151c3b0c8ba504ed44041f4f6a3c837a9675bdce4df3c9343c5cb908ce8a548528cf1b805959e6acafb6078b17a7d34818791a2002dcf
-
Filesize
6KB
MD5eb853d25fe265d48bbe39bfc9d9dd199
SHA1c5a3b0f92d22d55b04b5178a82df9f0215f28a29
SHA2562b79ce577edf60a6e905dcc6413b02953519182b2a5a047e5d7eb8ec1efa74fe
SHA512304ef193a006ef21ba4085eb292db942bf38d025f4cd032c67b311f651600d6e85292cafbd0198da14682babe20750a7ac9e02fd8cd5a0465db21bdad86a8f01
-
Filesize
6KB
MD5b460e0d315cc4aca77214d01b7abdfc9
SHA1ab97935fb1e35cd0317955a3c71db7cdd734297c
SHA256406c16d3f028aaf16199d2ff51c3c85ccaf116964eeefc1a1ac9fa4e2d5668a7
SHA512ecf400e7e52deb28663beb6a85a76c1db6e3260677069141283667008ae607822697fe90080beb12678141dd92099d99a1105d71f811560f3c1b8dcadcf1d231
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5f450d8197f75c09722f028a414581389
SHA17b8f86bea9e21bf0a55234727cf8db68fab3c037
SHA256ed00c72f944782f177b45072715fb728823ea3b1316f50b70b5204ce9d27d072
SHA51265caac5621f56171e62d8557b0af0c557ac35f59d2b3b4002ece9ea75f819cd8f55f45c121c337977a059e3ccd19ad2f472e77b5af5c0a49250a9d3288f3f102