Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
24/06/2024, 08:49
Static task
static1
Behavioral task
behavioral1
Sample
0789e9da8a7657fabbed7229da958bee_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
0789e9da8a7657fabbed7229da958bee_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
0789e9da8a7657fabbed7229da958bee_JaffaCakes118.html
-
Size
17KB
-
MD5
0789e9da8a7657fabbed7229da958bee
-
SHA1
17f3faf2d405f5b4f59b399800af0551f935295d
-
SHA256
9783c7d307b4c3f108a1f062310d0d93629e1dc5e76a26a7a99e69dbc955992c
-
SHA512
59378074b4cefb3b1c817707687fdbe7a607c0b03a859f3a4b857dca83d0f4ffecba665321645178a77b97efed2824fedf4a3a7cb12b3c582fa34fb362550dff
-
SSDEEP
384:sTlIci9DJnlx+PeP+PeP6PaP4PaPKPOP2PyPmPePmPWP+PuPSPSPcPWPePhPQa/2:sggkxLZ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1060 msedge.exe 1060 msedge.exe 3708 msedge.exe 3708 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe 2792 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3708 msedge.exe 3708 msedge.exe 3708 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3708 msedge.exe 3708 msedge.exe 3708 msedge.exe 3708 msedge.exe 3708 msedge.exe 3708 msedge.exe 3708 msedge.exe 3708 msedge.exe 3708 msedge.exe 3708 msedge.exe 3708 msedge.exe 3708 msedge.exe 3708 msedge.exe 3708 msedge.exe 3708 msedge.exe 3708 msedge.exe 3708 msedge.exe 3708 msedge.exe 3708 msedge.exe 3708 msedge.exe 3708 msedge.exe 3708 msedge.exe 3708 msedge.exe 3708 msedge.exe 3708 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3708 msedge.exe 3708 msedge.exe 3708 msedge.exe 3708 msedge.exe 3708 msedge.exe 3708 msedge.exe 3708 msedge.exe 3708 msedge.exe 3708 msedge.exe 3708 msedge.exe 3708 msedge.exe 3708 msedge.exe 3708 msedge.exe 3708 msedge.exe 3708 msedge.exe 3708 msedge.exe 3708 msedge.exe 3708 msedge.exe 3708 msedge.exe 3708 msedge.exe 3708 msedge.exe 3708 msedge.exe 3708 msedge.exe 3708 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3708 wrote to memory of 220 3708 msedge.exe 85 PID 3708 wrote to memory of 220 3708 msedge.exe 85 PID 3708 wrote to memory of 3588 3708 msedge.exe 86 PID 3708 wrote to memory of 3588 3708 msedge.exe 86 PID 3708 wrote to memory of 3588 3708 msedge.exe 86 PID 3708 wrote to memory of 3588 3708 msedge.exe 86 PID 3708 wrote to memory of 3588 3708 msedge.exe 86 PID 3708 wrote to memory of 3588 3708 msedge.exe 86 PID 3708 wrote to memory of 3588 3708 msedge.exe 86 PID 3708 wrote to memory of 3588 3708 msedge.exe 86 PID 3708 wrote to memory of 3588 3708 msedge.exe 86 PID 3708 wrote to memory of 3588 3708 msedge.exe 86 PID 3708 wrote to memory of 3588 3708 msedge.exe 86 PID 3708 wrote to memory of 3588 3708 msedge.exe 86 PID 3708 wrote to memory of 3588 3708 msedge.exe 86 PID 3708 wrote to memory of 3588 3708 msedge.exe 86 PID 3708 wrote to memory of 3588 3708 msedge.exe 86 PID 3708 wrote to memory of 3588 3708 msedge.exe 86 PID 3708 wrote to memory of 3588 3708 msedge.exe 86 PID 3708 wrote to memory of 3588 3708 msedge.exe 86 PID 3708 wrote to memory of 3588 3708 msedge.exe 86 PID 3708 wrote to memory of 3588 3708 msedge.exe 86 PID 3708 wrote to memory of 3588 3708 msedge.exe 86 PID 3708 wrote to memory of 3588 3708 msedge.exe 86 PID 3708 wrote to memory of 3588 3708 msedge.exe 86 PID 3708 wrote to memory of 3588 3708 msedge.exe 86 PID 3708 wrote to memory of 3588 3708 msedge.exe 86 PID 3708 wrote to memory of 3588 3708 msedge.exe 86 PID 3708 wrote to memory of 3588 3708 msedge.exe 86 PID 3708 wrote to memory of 3588 3708 msedge.exe 86 PID 3708 wrote to memory of 3588 3708 msedge.exe 86 PID 3708 wrote to memory of 3588 3708 msedge.exe 86 PID 3708 wrote to memory of 3588 3708 msedge.exe 86 PID 3708 wrote to memory of 3588 3708 msedge.exe 86 PID 3708 wrote to memory of 3588 3708 msedge.exe 86 PID 3708 wrote to memory of 3588 3708 msedge.exe 86 PID 3708 wrote to memory of 3588 3708 msedge.exe 86 PID 3708 wrote to memory of 3588 3708 msedge.exe 86 PID 3708 wrote to memory of 3588 3708 msedge.exe 86 PID 3708 wrote to memory of 3588 3708 msedge.exe 86 PID 3708 wrote to memory of 3588 3708 msedge.exe 86 PID 3708 wrote to memory of 3588 3708 msedge.exe 86 PID 3708 wrote to memory of 1060 3708 msedge.exe 87 PID 3708 wrote to memory of 1060 3708 msedge.exe 87 PID 3708 wrote to memory of 2668 3708 msedge.exe 88 PID 3708 wrote to memory of 2668 3708 msedge.exe 88 PID 3708 wrote to memory of 2668 3708 msedge.exe 88 PID 3708 wrote to memory of 2668 3708 msedge.exe 88 PID 3708 wrote to memory of 2668 3708 msedge.exe 88 PID 3708 wrote to memory of 2668 3708 msedge.exe 88 PID 3708 wrote to memory of 2668 3708 msedge.exe 88 PID 3708 wrote to memory of 2668 3708 msedge.exe 88 PID 3708 wrote to memory of 2668 3708 msedge.exe 88 PID 3708 wrote to memory of 2668 3708 msedge.exe 88 PID 3708 wrote to memory of 2668 3708 msedge.exe 88 PID 3708 wrote to memory of 2668 3708 msedge.exe 88 PID 3708 wrote to memory of 2668 3708 msedge.exe 88 PID 3708 wrote to memory of 2668 3708 msedge.exe 88 PID 3708 wrote to memory of 2668 3708 msedge.exe 88 PID 3708 wrote to memory of 2668 3708 msedge.exe 88 PID 3708 wrote to memory of 2668 3708 msedge.exe 88 PID 3708 wrote to memory of 2668 3708 msedge.exe 88 PID 3708 wrote to memory of 2668 3708 msedge.exe 88 PID 3708 wrote to memory of 2668 3708 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\0789e9da8a7657fabbed7229da958bee_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3708 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffaa00d46f8,0x7ffaa00d4708,0x7ffaa00d47182⤵PID:220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,15985814008041201054,1258814749580139556,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2144 /prefetch:22⤵PID:3588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,15985814008041201054,1258814749580139556,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2348 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,15985814008041201054,1258814749580139556,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2972 /prefetch:82⤵PID:2668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,15985814008041201054,1258814749580139556,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:4088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,15985814008041201054,1258814749580139556,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:4068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,15985814008041201054,1258814749580139556,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4672 /prefetch:12⤵PID:1524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,15985814008041201054,1258814749580139556,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5060 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2792
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4356
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1312
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD581e892ca5c5683efdf9135fe0f2adb15
SHA139159b30226d98a465ece1da28dc87088b20ecad
SHA256830f394548cff6eed3608476190a7ee7d65fe651adc638c5b27ce58639a91e17
SHA512c943f4cfe8615ac159cfac13c10b67e6c0c9093851dd3ac6dda3b82e195d3554e3c37962010a2d0ae5074828d376402624f0dda5499c9997e962e4cfd26444c0
-
Filesize
152B
MD556067634f68231081c4bd5bdbfcc202f
SHA15582776da6ffc75bb0973840fc3d15598bc09eb1
SHA2568c08b0cbceb301c8f960aa674c6e7f6dbf40b4a1c2684e6fb0456ec5ff0e56b4
SHA512c4657393e0b9ec682570d7e251644a858d33e056ccd0f3eebffd0fde25244b3a699b8d9244bcdac00d6f74b49833629b270e099c2b557f729a9066922583f784
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize168B
MD523757afacf5646b898441a6753a755bb
SHA1e92171b14201b8f44eeffdb0cd5bfab31c7fdb7c
SHA256fdcd244655467a49ed1131b0e6b7a3b60716992aab09680f34f7d1da9a0af163
SHA51268b754750a38eccb6e46d6a6caf0f0ba3c0e6dd30ba262aba4c8693c0f4db77a40ee96ff174e948cd1a4b3ba8318f902c841bfa8f25b5cd07307a05165dad2f2
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
6KB
MD52dd39930785649d7e3b659f20cda2766
SHA1a5fc101eac9bf6037a64d30e8204992f2387526b
SHA256d81c0d9535e0133fce9e2792a0b7b4a80504d4b991fabab3e54867945063963e
SHA5129406b9ddccd0a728ae617de314201929469bae5eebbb3669793c6dd4a1dca3d7e942085dc56ad3b45a5948ff84605c5087df9eaf33e0a604d5fee5b7edd76661
-
Filesize
6KB
MD53979f119ad92a04bc9ae74e466beada1
SHA18cd01b38fa8da371bfe09c0b9635714b2cd622b9
SHA256682c8852dd6aa340aef1ad214489ae31d3b955158b19fa0cca9e2302423ea4c3
SHA512a1367ce2a8ae6012296519dbd0964d5641e06fa9ebdc93130d987bef5686126ab182e0cdeb952243f87c6e3060003372089f5d0eaa96e21f174863c5f72f3223
-
Filesize
11KB
MD51e860403ac1e21d388a4d926f244d7c7
SHA1f9ea0ace7246e516621d8dbee19a01a321a1338b
SHA256cd99e9757c77fbf1da7d077ba7af156ea81f816fcaf9327f65b4753d97854d85
SHA512163181518f6e90a716d2c2eb887c9093a0fb05489512dcd06fac4e62102af646e9311e24e02d00d964cc1b9306176d5edc0f996f424a01b787f46fe174fe5e50