Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
30-05-2024 04:32
Static task
static1
Behavioral task
behavioral1
Sample
830994d1100ce5b49a807a18dbfbc87e_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
830994d1100ce5b49a807a18dbfbc87e_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
830994d1100ce5b49a807a18dbfbc87e_JaffaCakes118.html
-
Size
21KB
-
MD5
830994d1100ce5b49a807a18dbfbc87e
-
SHA1
12d0f53bebb772fc093333541ed10f93830bbbcf
-
SHA256
e2da9f8cd152a60ce98a69d400109919b848cd74526e26d542c01b890b879e87
-
SHA512
2f86440e8faf0d67435d314951d44671783713e6b436ce0e6600fdee1c27db8d9ef2e8705913c2b706790a6a8ca14107d88508caceb1135cb62cee9c5fbb6455
-
SSDEEP
384:banaA9ohsLimyVUqiSiDfQ3akZT1DAA2usOwCxtyV6yV6yVQAhyV9skkUg+QU0Ws:banaA9ohsLimyVY7DfQFdJA6VyV6yV6m
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4164 msedge.exe 4164 msedge.exe 3244 msedge.exe 3244 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe 3128 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe 3244 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3244 wrote to memory of 4748 3244 msedge.exe 82 PID 3244 wrote to memory of 4748 3244 msedge.exe 82 PID 3244 wrote to memory of 1408 3244 msedge.exe 83 PID 3244 wrote to memory of 1408 3244 msedge.exe 83 PID 3244 wrote to memory of 1408 3244 msedge.exe 83 PID 3244 wrote to memory of 1408 3244 msedge.exe 83 PID 3244 wrote to memory of 1408 3244 msedge.exe 83 PID 3244 wrote to memory of 1408 3244 msedge.exe 83 PID 3244 wrote to memory of 1408 3244 msedge.exe 83 PID 3244 wrote to memory of 1408 3244 msedge.exe 83 PID 3244 wrote to memory of 1408 3244 msedge.exe 83 PID 3244 wrote to memory of 1408 3244 msedge.exe 83 PID 3244 wrote to memory of 1408 3244 msedge.exe 83 PID 3244 wrote to memory of 1408 3244 msedge.exe 83 PID 3244 wrote to memory of 1408 3244 msedge.exe 83 PID 3244 wrote to memory of 1408 3244 msedge.exe 83 PID 3244 wrote to memory of 1408 3244 msedge.exe 83 PID 3244 wrote to memory of 1408 3244 msedge.exe 83 PID 3244 wrote to memory of 1408 3244 msedge.exe 83 PID 3244 wrote to memory of 1408 3244 msedge.exe 83 PID 3244 wrote to memory of 1408 3244 msedge.exe 83 PID 3244 wrote to memory of 1408 3244 msedge.exe 83 PID 3244 wrote to memory of 1408 3244 msedge.exe 83 PID 3244 wrote to memory of 1408 3244 msedge.exe 83 PID 3244 wrote to memory of 1408 3244 msedge.exe 83 PID 3244 wrote to memory of 1408 3244 msedge.exe 83 PID 3244 wrote to memory of 1408 3244 msedge.exe 83 PID 3244 wrote to memory of 1408 3244 msedge.exe 83 PID 3244 wrote to memory of 1408 3244 msedge.exe 83 PID 3244 wrote to memory of 1408 3244 msedge.exe 83 PID 3244 wrote to memory of 1408 3244 msedge.exe 83 PID 3244 wrote to memory of 1408 3244 msedge.exe 83 PID 3244 wrote to memory of 1408 3244 msedge.exe 83 PID 3244 wrote to memory of 1408 3244 msedge.exe 83 PID 3244 wrote to memory of 1408 3244 msedge.exe 83 PID 3244 wrote to memory of 1408 3244 msedge.exe 83 PID 3244 wrote to memory of 1408 3244 msedge.exe 83 PID 3244 wrote to memory of 1408 3244 msedge.exe 83 PID 3244 wrote to memory of 1408 3244 msedge.exe 83 PID 3244 wrote to memory of 1408 3244 msedge.exe 83 PID 3244 wrote to memory of 1408 3244 msedge.exe 83 PID 3244 wrote to memory of 1408 3244 msedge.exe 83 PID 3244 wrote to memory of 4164 3244 msedge.exe 84 PID 3244 wrote to memory of 4164 3244 msedge.exe 84 PID 3244 wrote to memory of 672 3244 msedge.exe 85 PID 3244 wrote to memory of 672 3244 msedge.exe 85 PID 3244 wrote to memory of 672 3244 msedge.exe 85 PID 3244 wrote to memory of 672 3244 msedge.exe 85 PID 3244 wrote to memory of 672 3244 msedge.exe 85 PID 3244 wrote to memory of 672 3244 msedge.exe 85 PID 3244 wrote to memory of 672 3244 msedge.exe 85 PID 3244 wrote to memory of 672 3244 msedge.exe 85 PID 3244 wrote to memory of 672 3244 msedge.exe 85 PID 3244 wrote to memory of 672 3244 msedge.exe 85 PID 3244 wrote to memory of 672 3244 msedge.exe 85 PID 3244 wrote to memory of 672 3244 msedge.exe 85 PID 3244 wrote to memory of 672 3244 msedge.exe 85 PID 3244 wrote to memory of 672 3244 msedge.exe 85 PID 3244 wrote to memory of 672 3244 msedge.exe 85 PID 3244 wrote to memory of 672 3244 msedge.exe 85 PID 3244 wrote to memory of 672 3244 msedge.exe 85 PID 3244 wrote to memory of 672 3244 msedge.exe 85 PID 3244 wrote to memory of 672 3244 msedge.exe 85 PID 3244 wrote to memory of 672 3244 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\830994d1100ce5b49a807a18dbfbc87e_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3244 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff5a4f46f8,0x7fff5a4f4708,0x7fff5a4f47182⤵PID:4748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,16734060332900834463,12648959427329755359,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2188 /prefetch:22⤵PID:1408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2132,16734060332900834463,12648959427329755359,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2312 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2132,16734060332900834463,12648959427329755359,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2872 /prefetch:82⤵PID:672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,16734060332900834463,12648959427329755359,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:2084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,16734060332900834463,12648959427329755359,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:12⤵PID:716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,16734060332900834463,12648959427329755359,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4108 /prefetch:12⤵PID:3744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,16734060332900834463,12648959427329755359,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5128 /prefetch:12⤵PID:4136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,16734060332900834463,12648959427329755359,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5096 /prefetch:12⤵PID:3136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,16734060332900834463,12648959427329755359,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5616 /prefetch:12⤵PID:5088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,16734060332900834463,12648959427329755359,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5440 /prefetch:12⤵PID:2816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,16734060332900834463,12648959427329755359,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1776 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3128
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2908
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1028
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54b4f91fa1b362ba5341ecb2836438dea
SHA19561f5aabed742404d455da735259a2c6781fa07
SHA256d824b742eace197ddc8b6ed5d918f390fde4b0fbf0e371b8e1f2ed40a3b6455c
SHA512fef22217dcdd8000bc193e25129699d4b8f7a103ca4fe1613baf73ccf67090d9fbae27eb93e4bb8747455853a0a4326f2d0c38df41c8d42351cdcd4132418dac
-
Filesize
152B
MD5eaa3db555ab5bc0cb364826204aad3f0
SHA1a4cdfaac8de49e6e6e88b335cfeaa7c9e3c563ca
SHA256ef7baeb1b2ab05ff3c5fbb76c2759db49294654548706c7c8e87f0cde855b86b
SHA512e13981da51b52c15261ecabb98af32f9b920651b46b10ce0cc823c5878b22eb1420258c80deef204070d1e0bdd3a64d875ac2522e3713a3cf11657aa55aeccd4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\393bd4b9-b8cb-4a23-a4e1-becb5382d473.tmp
Filesize5KB
MD54ba0b6252453b67025999184926dec54
SHA1afac1a9a0171dd8a22f334d11d4d6cad5853bd57
SHA2564a7c10e8b73ab3f4ddfd72ff3fcd08e0469708af559b2ca213dab2006cc9dfac
SHA51210bd1ae7213da7bb7e4f7df14392e72bc14a02e894acc21ee91d9ff24a94800956d7b46834a2e9c3b26bf824f9657c1ecde2b4c09e8c0f252c83881111d513e2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize744B
MD56941e5d88a3b174e59430eabccffa8e0
SHA172241d1735edd0f8c12de027fb8dccccc701abe2
SHA25627a7b498509df9853f69b274e0f036876bcb676855f41677733d3dff7715adcb
SHA512e40ded194fa354f0a4c57d55305eb866110590c6c1715f153cc72db35cff07c95718fadf25be38f5d45805815da753e1dff0bede6e40572c68f381203aef6d7e
-
Filesize
2KB
MD588c9da5b0b112594412d520b5f00c07f
SHA107bc294775225ffa4d89f6566ca4a2adc22eb1dd
SHA25623aeb84715c72e7804c0a876a45ae30708b48ec2693b8c16a4d738002beaba79
SHA512b74ec064c8ca50ed4c32500ecc2e8cb42ff11c21a4df6f264dad6c0a1cd0ddd1b25a85a7a83636fa64a82138ff32c17e9ae2d9598314b4910ac722b02f2d17bf
-
Filesize
6KB
MD5a00d65ac5b6da7da22ffeb24656af8c3
SHA1590c277ccf311a04c0397ec07c77ec72035d0843
SHA25699a6fae4bd367ca51419cbd1810d42602d774ac4179bae4cd7d6b04f69166767
SHA512b6dd970aad8e48f582899c9e34e9eaf4fa363241f79669892fc48f8258a52fc7c4c91720ee5a934ce377fdffb751dc489140aeaf6b263043c523ca60b17cec32
-
Filesize
11KB
MD511b9da31a5f420b8b6b7cdd9d13ab313
SHA10a7227138969b1c12709c318e08f3db1fe9ed33f
SHA256e0d2e8d93f3c974a251720f84ad4410d60e8f36059c6e4fe3928add57cb10c03
SHA512b2fb00dc01730de505f91c4845d1f839b26cc1a011978e8ca9dc8a950ca41c71d41abb2927728740c392ddc506fb6f2d961cf2e888975463df70ce99cc20a915