Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
15/06/2024, 00:47
Static task
static1
Behavioral task
behavioral1
Sample
ac4ad81bfea290bc81842fb1b2efe964_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
ac4ad81bfea290bc81842fb1b2efe964_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
ac4ad81bfea290bc81842fb1b2efe964_JaffaCakes118.html
-
Size
18KB
-
MD5
ac4ad81bfea290bc81842fb1b2efe964
-
SHA1
9c50d9b1164d34259ff9b8d034d9e35c9223dbc1
-
SHA256
db0c250c587111dde8bf09443dc24538527de1ac56ac36208a5e727ddc3052ab
-
SHA512
d995490e960c3d0f2073a5c257d6a3d028ee740bf17e2353c464071102f1aacfa2b1680460af5d6766d9b61c4452f720f295ad0757e70fc2c575a465ec17b2d1
-
SSDEEP
192:cwHPitYSuWT/EF/kBwnAlgRDOG6vLWr9K6tnKWf2bd:cwqtYSuWbhwnAlA3656Nff2B
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2720 msedge.exe 2720 msedge.exe 1136 msedge.exe 1136 msedge.exe 4624 msedge.exe 4624 msedge.exe 4624 msedge.exe 4624 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe 1136 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1136 wrote to memory of 4588 1136 msedge.exe 82 PID 1136 wrote to memory of 4588 1136 msedge.exe 82 PID 1136 wrote to memory of 4636 1136 msedge.exe 83 PID 1136 wrote to memory of 4636 1136 msedge.exe 83 PID 1136 wrote to memory of 4636 1136 msedge.exe 83 PID 1136 wrote to memory of 4636 1136 msedge.exe 83 PID 1136 wrote to memory of 4636 1136 msedge.exe 83 PID 1136 wrote to memory of 4636 1136 msedge.exe 83 PID 1136 wrote to memory of 4636 1136 msedge.exe 83 PID 1136 wrote to memory of 4636 1136 msedge.exe 83 PID 1136 wrote to memory of 4636 1136 msedge.exe 83 PID 1136 wrote to memory of 4636 1136 msedge.exe 83 PID 1136 wrote to memory of 4636 1136 msedge.exe 83 PID 1136 wrote to memory of 4636 1136 msedge.exe 83 PID 1136 wrote to memory of 4636 1136 msedge.exe 83 PID 1136 wrote to memory of 4636 1136 msedge.exe 83 PID 1136 wrote to memory of 4636 1136 msedge.exe 83 PID 1136 wrote to memory of 4636 1136 msedge.exe 83 PID 1136 wrote to memory of 4636 1136 msedge.exe 83 PID 1136 wrote to memory of 4636 1136 msedge.exe 83 PID 1136 wrote to memory of 4636 1136 msedge.exe 83 PID 1136 wrote to memory of 4636 1136 msedge.exe 83 PID 1136 wrote to memory of 4636 1136 msedge.exe 83 PID 1136 wrote to memory of 4636 1136 msedge.exe 83 PID 1136 wrote to memory of 4636 1136 msedge.exe 83 PID 1136 wrote to memory of 4636 1136 msedge.exe 83 PID 1136 wrote to memory of 4636 1136 msedge.exe 83 PID 1136 wrote to memory of 4636 1136 msedge.exe 83 PID 1136 wrote to memory of 4636 1136 msedge.exe 83 PID 1136 wrote to memory of 4636 1136 msedge.exe 83 PID 1136 wrote to memory of 4636 1136 msedge.exe 83 PID 1136 wrote to memory of 4636 1136 msedge.exe 83 PID 1136 wrote to memory of 4636 1136 msedge.exe 83 PID 1136 wrote to memory of 4636 1136 msedge.exe 83 PID 1136 wrote to memory of 4636 1136 msedge.exe 83 PID 1136 wrote to memory of 4636 1136 msedge.exe 83 PID 1136 wrote to memory of 4636 1136 msedge.exe 83 PID 1136 wrote to memory of 4636 1136 msedge.exe 83 PID 1136 wrote to memory of 4636 1136 msedge.exe 83 PID 1136 wrote to memory of 4636 1136 msedge.exe 83 PID 1136 wrote to memory of 4636 1136 msedge.exe 83 PID 1136 wrote to memory of 4636 1136 msedge.exe 83 PID 1136 wrote to memory of 2720 1136 msedge.exe 84 PID 1136 wrote to memory of 2720 1136 msedge.exe 84 PID 1136 wrote to memory of 2572 1136 msedge.exe 85 PID 1136 wrote to memory of 2572 1136 msedge.exe 85 PID 1136 wrote to memory of 2572 1136 msedge.exe 85 PID 1136 wrote to memory of 2572 1136 msedge.exe 85 PID 1136 wrote to memory of 2572 1136 msedge.exe 85 PID 1136 wrote to memory of 2572 1136 msedge.exe 85 PID 1136 wrote to memory of 2572 1136 msedge.exe 85 PID 1136 wrote to memory of 2572 1136 msedge.exe 85 PID 1136 wrote to memory of 2572 1136 msedge.exe 85 PID 1136 wrote to memory of 2572 1136 msedge.exe 85 PID 1136 wrote to memory of 2572 1136 msedge.exe 85 PID 1136 wrote to memory of 2572 1136 msedge.exe 85 PID 1136 wrote to memory of 2572 1136 msedge.exe 85 PID 1136 wrote to memory of 2572 1136 msedge.exe 85 PID 1136 wrote to memory of 2572 1136 msedge.exe 85 PID 1136 wrote to memory of 2572 1136 msedge.exe 85 PID 1136 wrote to memory of 2572 1136 msedge.exe 85 PID 1136 wrote to memory of 2572 1136 msedge.exe 85 PID 1136 wrote to memory of 2572 1136 msedge.exe 85 PID 1136 wrote to memory of 2572 1136 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\ac4ad81bfea290bc81842fb1b2efe964_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1136 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb325c46f8,0x7ffb325c4708,0x7ffb325c47182⤵PID:4588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,10495218835917169650,16289344897709059761,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2168 /prefetch:22⤵PID:4636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2152,10495218835917169650,16289344897709059761,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2236 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2152,10495218835917169650,16289344897709059761,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2828 /prefetch:82⤵PID:2572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,10495218835917169650,16289344897709059761,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:2256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,10495218835917169650,16289344897709059761,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:4916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,10495218835917169650,16289344897709059761,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4652 /prefetch:12⤵PID:3964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,10495218835917169650,16289344897709059761,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1616 /prefetch:12⤵PID:2368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,10495218835917169650,16289344897709059761,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2196 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4624
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3748
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5016
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c5abc082d9d9307e797b7e89a2f755f4
SHA154c442690a8727f1d3453b6452198d3ec4ec13df
SHA256a055d69c6aba59e97e632d118b7960a5fdfbe35cfdfaa0de14f194fc6f874716
SHA512ad765cddbf89472988de5356db5e0ee254ca3475491c6034fba1897c373702ab7cfa4bd21662ab862eebb48a757c3eb86b1f8ed58629751f71863822a59cd26c
-
Filesize
152B
MD5b4a74bc775caf3de7fc9cde3c30ce482
SHA1c6ed3161390e5493f71182a6cb98d51c9063775d
SHA256dfad4e020a946f85523604816a0a9781091ee4669c870db2cabab027f8b6f280
SHA51255578e254444a645f455ea38480c9e02599ebf9522c32aca50ff37aad33976db30e663d35ebe31ff0ecafb4007362261716f756b3a0d67ac3937ca62ff10e25f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD5ab13d983563cde08ae940a97c7ed8349
SHA1eafc415b7b426c939e95ddeca6c339ac3e5f0410
SHA25641d3c834f4c800d43df084b3d6bc542dd2776f1ff3d3bd65c46ebf15eef1f31e
SHA5124c274ebf904fe0e506b12da96ae04d079f489d587a84f3d48df3ede30f987875931ce289b9b74dfde7d3bdd7af4dfd5a5fd2fbf37c2e61e51227797bec7ba10d
-
Filesize
187B
MD5f4c7ed45791c5fe01581cd6bd3499283
SHA145bb3b574c0fb8b7e6f9cfda89c69aa1ac49bd5b
SHA25626c812d81524994ef63a2c7b7222edafe28a76f2c3f985c7c9c36b3411ce9722
SHA512c75ba1c8f34e6f8756464d7cb4bb27a1a5434372ab837c4bdde5dbe6b6f819f663217176ebded25ed2b999d0090832b4680b5331152c0aca3187093fc9d3a96f
-
Filesize
6KB
MD51f99c77af0626051096aa4de41c285b2
SHA1fe15c6e166b7599a6e29e1102c18c2c5935c005f
SHA256c1ed8b2a66afb63d93e2041e1676b81c725717269111685ef9671a5c6d5209f7
SHA5126f49c07676a7dfc4734557afe6e3b5aab07864078913f47bb15f7a463299c07fdf073dbacbdf01c45131cc13b486c24333837ca1b56971264cc55542b1f6c906
-
Filesize
6KB
MD529179914b7e1416a92791426836eb5bc
SHA137c4663755cc54a8470e6a9211a436c534bb2deb
SHA256aab33add27fdb525af683ea28fc39a84565284d7aa458398472888a4886d9270
SHA512518a32d4bcfea92b1236b67b9f4ab259f122f3f1cf2d6351af8b23a9f2f1c28e66c32a23ea0d17250d7b05c1de8be569c695bc350a7e43473bcfcecd4e4d1760
-
Filesize
6KB
MD59e2ec3c965f7ed08e0eb459a076c5911
SHA11586afd3c900978fca493f4fe986a300f3a35ecb
SHA25686e975e0d6674f96ef015a1009238c7bfff815160385b9c33ee4631ec4d9072c
SHA5128af3f19fdc5205799b8f0643ac2a36d604776a35470b68e8342c053897bcf17548f4b58a14592e152ade3d35c6036f94f527a1049a69b88575af5617cc107739
-
Filesize
11KB
MD5a39cd23fb6a23c9769d4524b75e53165
SHA10f19d4201e80749561caac51f20a2f4e94383839
SHA256045a50998f8eb62a2c3fe8ab08ad99a009346473769c88fea1fac7ed54ee5ce4
SHA512581a0fe684d86b257ee83e199fafdf7e021344d74ba597928873d303d56f37e4f29073e1335eb76543e16194fab303848e0cdd73f33d84d7bb3f4b1e9f1658f1