Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
30/05/2024, 11:12
Static task
static1
Behavioral task
behavioral1
Sample
8405d8a930fb2014a5fb97ba4596cbab_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
8405d8a930fb2014a5fb97ba4596cbab_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
8405d8a930fb2014a5fb97ba4596cbab_JaffaCakes118.html
-
Size
210KB
-
MD5
8405d8a930fb2014a5fb97ba4596cbab
-
SHA1
02d97e911a8acbf6654ef8551a0e89fc6abe342d
-
SHA256
d827aa4b4c6655bd584b261ab4b187e148ea07705f14e1e16819742636994ea3
-
SHA512
f65b8780886cbe8b56a2571ab0e86bcf273894589a8e8e2ce86b33501e7a582cbe7920bac83749072f8a716fbfa4f987b934272346a53b45a143c1122f937161
-
SSDEEP
3072:7Hgk1mol+7xXNoZxnp6yGJ8G5Q6DM6ioHE:7BfJGJ8G5Q6DzS
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2892 msedge.exe 2892 msedge.exe 100 msedge.exe 100 msedge.exe 2560 msedge.exe 2560 msedge.exe 2560 msedge.exe 2560 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 100 msedge.exe 100 msedge.exe 100 msedge.exe 100 msedge.exe 100 msedge.exe 100 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 100 msedge.exe 100 msedge.exe 100 msedge.exe 100 msedge.exe 100 msedge.exe 100 msedge.exe 100 msedge.exe 100 msedge.exe 100 msedge.exe 100 msedge.exe 100 msedge.exe 100 msedge.exe 100 msedge.exe 100 msedge.exe 100 msedge.exe 100 msedge.exe 100 msedge.exe 100 msedge.exe 100 msedge.exe 100 msedge.exe 100 msedge.exe 100 msedge.exe 100 msedge.exe 100 msedge.exe 100 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 100 msedge.exe 100 msedge.exe 100 msedge.exe 100 msedge.exe 100 msedge.exe 100 msedge.exe 100 msedge.exe 100 msedge.exe 100 msedge.exe 100 msedge.exe 100 msedge.exe 100 msedge.exe 100 msedge.exe 100 msedge.exe 100 msedge.exe 100 msedge.exe 100 msedge.exe 100 msedge.exe 100 msedge.exe 100 msedge.exe 100 msedge.exe 100 msedge.exe 100 msedge.exe 100 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 100 wrote to memory of 220 100 msedge.exe 83 PID 100 wrote to memory of 220 100 msedge.exe 83 PID 100 wrote to memory of 4184 100 msedge.exe 86 PID 100 wrote to memory of 4184 100 msedge.exe 86 PID 100 wrote to memory of 4184 100 msedge.exe 86 PID 100 wrote to memory of 4184 100 msedge.exe 86 PID 100 wrote to memory of 4184 100 msedge.exe 86 PID 100 wrote to memory of 4184 100 msedge.exe 86 PID 100 wrote to memory of 4184 100 msedge.exe 86 PID 100 wrote to memory of 4184 100 msedge.exe 86 PID 100 wrote to memory of 4184 100 msedge.exe 86 PID 100 wrote to memory of 4184 100 msedge.exe 86 PID 100 wrote to memory of 4184 100 msedge.exe 86 PID 100 wrote to memory of 4184 100 msedge.exe 86 PID 100 wrote to memory of 4184 100 msedge.exe 86 PID 100 wrote to memory of 4184 100 msedge.exe 86 PID 100 wrote to memory of 4184 100 msedge.exe 86 PID 100 wrote to memory of 4184 100 msedge.exe 86 PID 100 wrote to memory of 4184 100 msedge.exe 86 PID 100 wrote to memory of 4184 100 msedge.exe 86 PID 100 wrote to memory of 4184 100 msedge.exe 86 PID 100 wrote to memory of 4184 100 msedge.exe 86 PID 100 wrote to memory of 4184 100 msedge.exe 86 PID 100 wrote to memory of 4184 100 msedge.exe 86 PID 100 wrote to memory of 4184 100 msedge.exe 86 PID 100 wrote to memory of 4184 100 msedge.exe 86 PID 100 wrote to memory of 4184 100 msedge.exe 86 PID 100 wrote to memory of 4184 100 msedge.exe 86 PID 100 wrote to memory of 4184 100 msedge.exe 86 PID 100 wrote to memory of 4184 100 msedge.exe 86 PID 100 wrote to memory of 4184 100 msedge.exe 86 PID 100 wrote to memory of 4184 100 msedge.exe 86 PID 100 wrote to memory of 4184 100 msedge.exe 86 PID 100 wrote to memory of 4184 100 msedge.exe 86 PID 100 wrote to memory of 4184 100 msedge.exe 86 PID 100 wrote to memory of 4184 100 msedge.exe 86 PID 100 wrote to memory of 4184 100 msedge.exe 86 PID 100 wrote to memory of 4184 100 msedge.exe 86 PID 100 wrote to memory of 4184 100 msedge.exe 86 PID 100 wrote to memory of 4184 100 msedge.exe 86 PID 100 wrote to memory of 4184 100 msedge.exe 86 PID 100 wrote to memory of 4184 100 msedge.exe 86 PID 100 wrote to memory of 2892 100 msedge.exe 87 PID 100 wrote to memory of 2892 100 msedge.exe 87 PID 100 wrote to memory of 3036 100 msedge.exe 88 PID 100 wrote to memory of 3036 100 msedge.exe 88 PID 100 wrote to memory of 3036 100 msedge.exe 88 PID 100 wrote to memory of 3036 100 msedge.exe 88 PID 100 wrote to memory of 3036 100 msedge.exe 88 PID 100 wrote to memory of 3036 100 msedge.exe 88 PID 100 wrote to memory of 3036 100 msedge.exe 88 PID 100 wrote to memory of 3036 100 msedge.exe 88 PID 100 wrote to memory of 3036 100 msedge.exe 88 PID 100 wrote to memory of 3036 100 msedge.exe 88 PID 100 wrote to memory of 3036 100 msedge.exe 88 PID 100 wrote to memory of 3036 100 msedge.exe 88 PID 100 wrote to memory of 3036 100 msedge.exe 88 PID 100 wrote to memory of 3036 100 msedge.exe 88 PID 100 wrote to memory of 3036 100 msedge.exe 88 PID 100 wrote to memory of 3036 100 msedge.exe 88 PID 100 wrote to memory of 3036 100 msedge.exe 88 PID 100 wrote to memory of 3036 100 msedge.exe 88 PID 100 wrote to memory of 3036 100 msedge.exe 88 PID 100 wrote to memory of 3036 100 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\8405d8a930fb2014a5fb97ba4596cbab_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:100 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8c93a46f8,0x7ff8c93a4708,0x7ff8c93a47182⤵PID:220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,10560505101916176648,14944585737194589129,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2068 /prefetch:22⤵PID:4184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2052,10560505101916176648,14944585737194589129,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2288 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2052,10560505101916176648,14944585737194589129,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2672 /prefetch:82⤵PID:3036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,10560505101916176648,14944585737194589129,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,10560505101916176648,14944585737194589129,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:3972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,10560505101916176648,14944585737194589129,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1768 /prefetch:12⤵PID:2004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,10560505101916176648,14944585737194589129,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5088 /prefetch:12⤵PID:1952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,10560505101916176648,14944585737194589129,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1256 /prefetch:12⤵PID:4512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,10560505101916176648,14944585737194589129,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2136 /prefetch:12⤵PID:4660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,10560505101916176648,14944585737194589129,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5344 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2560
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4524
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3688
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54f7152bc5a1a715ef481e37d1c791959
SHA1c8a1ed674c62ae4f45519f90a8cc5a81eff3a6d7
SHA256704dd4f98d8ca34ec421f23ba1891b178c23c14b3301e4655efc5c02d356c2bc
SHA5122e6b02ca35d76a655a17a5f3e9dbd8d7517c7dae24f0095c7350eb9e7bdf9e1256a7009aa8878f96c89d1ea4fe5323a41f72b8c551806dda62880d7ff231ff5c
-
Filesize
152B
MD5ea98e583ad99df195d29aa066204ab56
SHA1f89398664af0179641aa0138b337097b617cb2db
SHA256a7abb51435909fa2d75c6f2ff5c69a93d4a0ab276ed579e7d8733b2a63ffbee6
SHA512e109be3466e653e5d310b3e402e1626298b09205d223722a82344dd78504f3c33e1e24e8402a02f38cd2c9c50d96a303ce4846bea5a583423937ab018cd5782f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize312B
MD551f99cfe9151f4460fd61e4355bbd999
SHA17db329e2f1aa4505fcde1af841377901b8be8378
SHA2565df8e318dafc8278d27dde66a4d69500ca2cdd4b207dffbf2cbc0449c6ba0248
SHA51281cf4c67d4719062919d78ce58af1bdcd61d3560db17cd01f5c6b2fa964d84dee9b80be5224383eaf0eb10e7254d151c2b582e1596b07807d330ad370ca9cc41
-
Filesize
2KB
MD5c496c5008c389727a4fed8c35694afbb
SHA1d1323c8c7973ade45dd209529281857a5c39c517
SHA25684a7e26dcaf1c7a3a315f632f785427b17c5886754ef0f4bf6cd6b85d2f11e85
SHA5124acb2b82f928144c3d1160d347b45680dbb2fbaefba77f0f9ccb74943bd18b81018e256329be1dacb559f528091610cd9408a70222d197c288c9246c908d0578
-
Filesize
1KB
MD58255275a49d05a0944cbc2e3eeb579c7
SHA19ac5bd5223c3020b423ad3e24807744fee21fc6c
SHA256cccb3a5f7c3a5c8fa889beff6ec100ed8831aac373c73934647cd5cc95c59c66
SHA51256af29d22e6d1c5cf41969795fda7aa563ecba52b4eb63634bf6926b0410c78272b0d280051e1e0c812eddbfe0dc2c1332c0f97b21438214a7934ead5630f684
-
Filesize
5KB
MD5d7ca54e141dd4aaa085a2b008f05e7e7
SHA1f7411489de728b89db88860105b48f3a979a2676
SHA256abc13a128c71da3484a32b92af940f1d968a5e3c651238e4ee33b11277350b53
SHA512e41335ec9888c6f94e56c7eebbcb7629203ae7a0d9d7cdb699c6621498f2367964739f320ee4b9e338d29fd616179cf72086bfd730e04b002f36e10644db8768
-
Filesize
7KB
MD5d5a25ac970d6c866277c9741637b19e5
SHA1811d25fa1f92f46dc4bfab9281da3fd82df9b433
SHA256e5b550d145dd7210621147e59c51f1d05b12cc8e22c56ef59448c76fd0be6a44
SHA51220306d266b33fadf42feb311c128f830d1131abf962e19c5f16785fe1c33e4886ab7f2c5d95ae43077f245df7dee0dcbb396ecf4a98c8bf56f6e092716eb3572
-
Filesize
6KB
MD58de519efa42dc6669796d6f89e5a769e
SHA1ee1adea3bf6830c470dc378e5f2149f74c608a1a
SHA25600033991b851f125c61e8356b6d72e8b18bb425332db4f30498819cb51381630
SHA51262eb80e8ed2e6e468b082b2ebf5230e367da1309f63f1f9cddd205713ce07b9c3925632e8a01c04a65e461f146137937de8da4edd87a8da28b9325ea5dbddf24
-
Filesize
538B
MD51253d52f1cf92b07125aacec4bfd147a
SHA176a481868d3dddf461b67c224c09767893a06bf1
SHA25697ed4870ec9c84335ba207952c209c28a4730c7f9467c6c9c5d812c096e483ff
SHA5120e97252dfc5924fbb520b8d494b32dab38ced676200520857ef7be373bd60838c4d5be3e1ce4ecdfa6aeb301412c4f6b05cdaedbbfc372aad2d68955de9eadb4
-
Filesize
203B
MD5ef1a422f874bd4eaa8a0ba1e48baf93e
SHA1b857661510ae101f7dc9abf5364145fb5127b3ad
SHA2568c56fe4391b52ef088ca5aca2ebdce0df571bf7140e9a22ec0255bee88762ff6
SHA512186b6704924a5cbce252ffcc7a4324c1b23dc3be6ab1933600c8fc89a4015b5a8bf8c35596fd6b81624cc65c082c522a52f30d8b30bad15678a99fa7344736cb
-
Filesize
10KB
MD5133a6f9fe5bd796277a4165c7c41eda1
SHA1f9d667138b6484ecae2fe10498bd9ff3c25ed5e9
SHA2560bba3000447d67581502460b78eff76bf2d6eff948e5db5a3a3717d4bf0eff3a
SHA5125b0b43d0323eb504c4db67a7b2ee013aec42901b31a4af7b393728d720b344d122f5862e6746f287e5b4108221520c5ab6ffaa9889ffc4961926be51a0a4d681