Analysis
-
max time kernel
145s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
14/06/2024, 14:36
Static task
static1
Behavioral task
behavioral1
Sample
aa34e9b273f6ba8ee7458d995221c364_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
aa34e9b273f6ba8ee7458d995221c364_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
aa34e9b273f6ba8ee7458d995221c364_JaffaCakes118.html
-
Size
74KB
-
MD5
aa34e9b273f6ba8ee7458d995221c364
-
SHA1
6b1950aa183400387c04e4ff72f6775d645f9dba
-
SHA256
c4d2b10f6b4d605474cc5e0a4aa6aadd8bb5197b5f8d9888b381f4d65019a547
-
SHA512
b66c21d0a59ce060487426bc9aee71b9968ed7f98ee219aa6d1d13dedae3584990c55333e529b0d3480c42b1dc12b8612780d1a620bbf8a3d7ab49184306794a
-
SSDEEP
1536:46m8rKZytE/o5IRgPWAncVpVSV0Pah+uMVdjc4jn0QMp4nNDFYVwy5cx7o3bzfq+:458rKZytE/o5IRIgPah+uMVdY4zpgiNK
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 4800 msedge.exe 4800 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 4232 msedge.exe 4232 msedge.exe 4232 msedge.exe 4232 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1140 wrote to memory of 4420 1140 msedge.exe 82 PID 1140 wrote to memory of 4420 1140 msedge.exe 82 PID 1140 wrote to memory of 3180 1140 msedge.exe 83 PID 1140 wrote to memory of 3180 1140 msedge.exe 83 PID 1140 wrote to memory of 3180 1140 msedge.exe 83 PID 1140 wrote to memory of 3180 1140 msedge.exe 83 PID 1140 wrote to memory of 3180 1140 msedge.exe 83 PID 1140 wrote to memory of 3180 1140 msedge.exe 83 PID 1140 wrote to memory of 3180 1140 msedge.exe 83 PID 1140 wrote to memory of 3180 1140 msedge.exe 83 PID 1140 wrote to memory of 3180 1140 msedge.exe 83 PID 1140 wrote to memory of 3180 1140 msedge.exe 83 PID 1140 wrote to memory of 3180 1140 msedge.exe 83 PID 1140 wrote to memory of 3180 1140 msedge.exe 83 PID 1140 wrote to memory of 3180 1140 msedge.exe 83 PID 1140 wrote to memory of 3180 1140 msedge.exe 83 PID 1140 wrote to memory of 3180 1140 msedge.exe 83 PID 1140 wrote to memory of 3180 1140 msedge.exe 83 PID 1140 wrote to memory of 3180 1140 msedge.exe 83 PID 1140 wrote to memory of 3180 1140 msedge.exe 83 PID 1140 wrote to memory of 3180 1140 msedge.exe 83 PID 1140 wrote to memory of 3180 1140 msedge.exe 83 PID 1140 wrote to memory of 3180 1140 msedge.exe 83 PID 1140 wrote to memory of 3180 1140 msedge.exe 83 PID 1140 wrote to memory of 3180 1140 msedge.exe 83 PID 1140 wrote to memory of 3180 1140 msedge.exe 83 PID 1140 wrote to memory of 3180 1140 msedge.exe 83 PID 1140 wrote to memory of 3180 1140 msedge.exe 83 PID 1140 wrote to memory of 3180 1140 msedge.exe 83 PID 1140 wrote to memory of 3180 1140 msedge.exe 83 PID 1140 wrote to memory of 3180 1140 msedge.exe 83 PID 1140 wrote to memory of 3180 1140 msedge.exe 83 PID 1140 wrote to memory of 3180 1140 msedge.exe 83 PID 1140 wrote to memory of 3180 1140 msedge.exe 83 PID 1140 wrote to memory of 3180 1140 msedge.exe 83 PID 1140 wrote to memory of 3180 1140 msedge.exe 83 PID 1140 wrote to memory of 3180 1140 msedge.exe 83 PID 1140 wrote to memory of 3180 1140 msedge.exe 83 PID 1140 wrote to memory of 3180 1140 msedge.exe 83 PID 1140 wrote to memory of 3180 1140 msedge.exe 83 PID 1140 wrote to memory of 3180 1140 msedge.exe 83 PID 1140 wrote to memory of 3180 1140 msedge.exe 83 PID 1140 wrote to memory of 4800 1140 msedge.exe 84 PID 1140 wrote to memory of 4800 1140 msedge.exe 84 PID 1140 wrote to memory of 636 1140 msedge.exe 85 PID 1140 wrote to memory of 636 1140 msedge.exe 85 PID 1140 wrote to memory of 636 1140 msedge.exe 85 PID 1140 wrote to memory of 636 1140 msedge.exe 85 PID 1140 wrote to memory of 636 1140 msedge.exe 85 PID 1140 wrote to memory of 636 1140 msedge.exe 85 PID 1140 wrote to memory of 636 1140 msedge.exe 85 PID 1140 wrote to memory of 636 1140 msedge.exe 85 PID 1140 wrote to memory of 636 1140 msedge.exe 85 PID 1140 wrote to memory of 636 1140 msedge.exe 85 PID 1140 wrote to memory of 636 1140 msedge.exe 85 PID 1140 wrote to memory of 636 1140 msedge.exe 85 PID 1140 wrote to memory of 636 1140 msedge.exe 85 PID 1140 wrote to memory of 636 1140 msedge.exe 85 PID 1140 wrote to memory of 636 1140 msedge.exe 85 PID 1140 wrote to memory of 636 1140 msedge.exe 85 PID 1140 wrote to memory of 636 1140 msedge.exe 85 PID 1140 wrote to memory of 636 1140 msedge.exe 85 PID 1140 wrote to memory of 636 1140 msedge.exe 85 PID 1140 wrote to memory of 636 1140 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\aa34e9b273f6ba8ee7458d995221c364_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9fe4746f8,0x7ff9fe474708,0x7ff9fe4747182⤵PID:4420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,5958733241640445709,9245706626923159818,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2088 /prefetch:22⤵PID:3180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2072,5958733241640445709,9245706626923159818,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2892 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2072,5958733241640445709,9245706626923159818,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2932 /prefetch:82⤵PID:636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,5958733241640445709,9245706626923159818,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:2588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,5958733241640445709,9245706626923159818,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:2024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,5958733241640445709,9245706626923159818,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:4516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,5958733241640445709,9245706626923159818,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5356 /prefetch:12⤵PID:1320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,5958733241640445709,9245706626923159818,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4184 /prefetch:12⤵PID:3184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,5958733241640445709,9245706626923159818,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5656 /prefetch:12⤵PID:4368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,5958733241640445709,9245706626923159818,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5512 /prefetch:12⤵PID:4580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,5958733241640445709,9245706626923159818,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1456 /prefetch:12⤵PID:516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,5958733241640445709,9245706626923159818,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4232
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2432
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1896
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c5abc082d9d9307e797b7e89a2f755f4
SHA154c442690a8727f1d3453b6452198d3ec4ec13df
SHA256a055d69c6aba59e97e632d118b7960a5fdfbe35cfdfaa0de14f194fc6f874716
SHA512ad765cddbf89472988de5356db5e0ee254ca3475491c6034fba1897c373702ab7cfa4bd21662ab862eebb48a757c3eb86b1f8ed58629751f71863822a59cd26c
-
Filesize
152B
MD5b4a74bc775caf3de7fc9cde3c30ce482
SHA1c6ed3161390e5493f71182a6cb98d51c9063775d
SHA256dfad4e020a946f85523604816a0a9781091ee4669c870db2cabab027f8b6f280
SHA51255578e254444a645f455ea38480c9e02599ebf9522c32aca50ff37aad33976db30e663d35ebe31ff0ecafb4007362261716f756b3a0d67ac3937ca62ff10e25f
-
Filesize
23KB
MD5e1c71f7c04be834f5587230db2ad24b3
SHA1f3bab9cb99d9f343bf7ed3981aaa7450515d2424
SHA2569fb6c768068467b58cc773a3907f3f5ec170bfe02ca8f301f6a232a9daf5a899
SHA512205366b4a3ca0dae58722a19ba24088dd8db483db9d14b376434024b064715ade720347ff5de87db014e32d2ef8192e71bbbdd3c885d5a8581b4aafc6e88ce51
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize192B
MD59fd743a729a591a05f33480d6b7985e8
SHA179635b19449adf02466a61142bcca29233f12d5e
SHA2563d3493cb5edfdab97a4e11134032744ee2fd1cbbbe0d60b9f4c2391cff1022a2
SHA51290bfd54878baba49876ebc7196ee7df10ad42afabbe5e149f847203577a5d75560c158c6a2fbc3a9e55a9fc33f7a07c46b002cfe060a66c056abd3224e9d115b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize168B
MD52bbb2784c0f523ce43848b3b86d0dcbc
SHA1122e698e073a667a256fc427ab3f07e9caab093c
SHA2565248109db10dfb4a89c1bf08b5887235519aeb1fe0ffb95baf369f9d11166bfb
SHA5125e6739cb5bf4f07c5c5b35f70e3e03db470c7ca5ebd109b33beedff1fe7ece9bb2d537a841718f6779c9391b39de9aa8d8fbe93986296242fb14286999d90fe0
-
Filesize
1KB
MD5ab1126f484bfc3b8e3e5e7c87e2b5695
SHA129a84690cebdcb474cecfbbf1c72965ac451a9df
SHA256c2e8e6285ea4ba8abcfce630f7e74bb3b6d347721ee75fb760b422bf16d21b5f
SHA5120644afaf14438c3d4cac139fcb3b7c389a66a45c5c35409cfa625074617c59b27f502db59b241dc3bd0556c57cf3a1b4454b1bc679c4741e6f891247e3b82a4c
-
Filesize
6KB
MD5a5dba4ce42d2db26f276c96ddc1a7226
SHA1d77f1435ade585f4975800ad7183f602d5fa7acc
SHA256b3c2619ef33336db46d0314f582b45c1b5a82b9c8c559a3aa7e99a16cbe63b2b
SHA51296895d2187066073fc24a4bffbbb974c314a71a8310d2075146e95dc1d35f67c80e69c4fca82bcd7190cc5c93caf0c9f423a0f13ed563c9306933ede7f8c1f27
-
Filesize
7KB
MD5cc9ea5bdbb4207fdce2cf15150a3f66f
SHA1944fea461390bdae0959fa6b4000d536330b383b
SHA2565fe25793e6025bd55425de914637ea143ba7cbe91e2deb00f2db9a6566a24322
SHA51290cb5e49bd025cdc40f447e35c0721d820d963af82c8ef0b4f011d80af22d8b5cf27cc0c4deef2ac2719a9691ac73a19eba494c0c6d94c485012866ee8ac8578
-
Filesize
7KB
MD51d99cf4589c3a15a6291ed614e1eb401
SHA197f0d0267d9e1b73fdb6635a8014702a4e9561c2
SHA2564ef04fff1347774ac4b44d49a3f2bd48425bb217c5fb31a9bd018295c5be374b
SHA512920f7eb74171dadc3e6e6f9afe61b6534e3d2718276bb65c73b3704cb5994434b5f9d5f0c2f4f0c216c16e359f475db59801569806b195d07bce0157b9214ef8
-
Filesize
706B
MD5d429c720cb05f9523809541b9ea0dd7b
SHA18134a016e5bf40ad3fa21187a153aaa93e5bcf30
SHA256510ee79977e877c7c405acd02ddf27880b1b0d404cb722724221bc328ecfc1fc
SHA512f71f621ea47541fc16dd862475a4dd1533e14154f4ca73c823de5433a4c9b6b9d112728466a5f2f5d7d8354f48f61f4d39c1f042c8b08be4b3e957d4bca72039
-
Filesize
370B
MD5148ae6eab04fb81428585dc73a019a47
SHA18f87856abc9219c166db17651599171c78ba466c
SHA2563b2475bed299a9bcfcd0c9063874783bd5f6416df70ff567764e5901a33ba8a2
SHA512e187e6771cd11accea0ab901e63e9b12a19c166a1d613471834372cb493301d2784e26a15e7333d610679e2aa978f2141aa08a8f6a0e8cde594d6115d9c13c50
-
Filesize
11KB
MD56a5b49927533c682086edbb4318a8283
SHA13bba7a6ac6361eea0672bee76047bc67d0a3ad44
SHA256abba9c73628b4634d3dda60dcbaa0830ff363172291662dd46c0b6e75ac7ff58
SHA512888e55ef6f2ffa272fa5f34d1518f78f1eebe5294e7f069e874312280c883159ca4f3d3f598908fc7c142a5be463b1d3417571aba7226383dc62e957de003bb9