Analysis
-
max time kernel
145s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
08/07/2024, 17:27
Static task
static1
Behavioral task
behavioral1
Sample
2d33cd7a759d6af1945472f3ced68a9a_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2d33cd7a759d6af1945472f3ced68a9a_JaffaCakes118.html
Resource
win10v2004-20240704-en
General
-
Target
2d33cd7a759d6af1945472f3ced68a9a_JaffaCakes118.html
-
Size
18KB
-
MD5
2d33cd7a759d6af1945472f3ced68a9a
-
SHA1
e53c227c788d455303be2689fcd75e95cca58a01
-
SHA256
40b97ef9a57a234f62ffc49b581245fb24a7cdc13d39fde44f790d40781923ac
-
SHA512
251202f60ced3d73afad2810dd232d3cb0b1fffed94d9d28dfe69e2eb64771c82e8b9500478801e71bc0a9284dd9dcca9d493e9b09077b7b7632fa93b8a5e70e
-
SSDEEP
192:KwAlIsr2C8tJ4PnGTHSsQ6rEfupsdBuCC8k/w1whqJkM1y5uBuLbdU8d:vAlIcotJ4PnGTHYfupsQ/gly5guLZ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1880 msedge.exe 1880 msedge.exe 3824 msedge.exe 3824 msedge.exe 1500 identity_helper.exe 1500 identity_helper.exe 828 msedge.exe 828 msedge.exe 828 msedge.exe 828 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3824 wrote to memory of 4624 3824 msedge.exe 82 PID 3824 wrote to memory of 4624 3824 msedge.exe 82 PID 3824 wrote to memory of 3004 3824 msedge.exe 83 PID 3824 wrote to memory of 3004 3824 msedge.exe 83 PID 3824 wrote to memory of 3004 3824 msedge.exe 83 PID 3824 wrote to memory of 3004 3824 msedge.exe 83 PID 3824 wrote to memory of 3004 3824 msedge.exe 83 PID 3824 wrote to memory of 3004 3824 msedge.exe 83 PID 3824 wrote to memory of 3004 3824 msedge.exe 83 PID 3824 wrote to memory of 3004 3824 msedge.exe 83 PID 3824 wrote to memory of 3004 3824 msedge.exe 83 PID 3824 wrote to memory of 3004 3824 msedge.exe 83 PID 3824 wrote to memory of 3004 3824 msedge.exe 83 PID 3824 wrote to memory of 3004 3824 msedge.exe 83 PID 3824 wrote to memory of 3004 3824 msedge.exe 83 PID 3824 wrote to memory of 3004 3824 msedge.exe 83 PID 3824 wrote to memory of 3004 3824 msedge.exe 83 PID 3824 wrote to memory of 3004 3824 msedge.exe 83 PID 3824 wrote to memory of 3004 3824 msedge.exe 83 PID 3824 wrote to memory of 3004 3824 msedge.exe 83 PID 3824 wrote to memory of 3004 3824 msedge.exe 83 PID 3824 wrote to memory of 3004 3824 msedge.exe 83 PID 3824 wrote to memory of 3004 3824 msedge.exe 83 PID 3824 wrote to memory of 3004 3824 msedge.exe 83 PID 3824 wrote to memory of 3004 3824 msedge.exe 83 PID 3824 wrote to memory of 3004 3824 msedge.exe 83 PID 3824 wrote to memory of 3004 3824 msedge.exe 83 PID 3824 wrote to memory of 3004 3824 msedge.exe 83 PID 3824 wrote to memory of 3004 3824 msedge.exe 83 PID 3824 wrote to memory of 3004 3824 msedge.exe 83 PID 3824 wrote to memory of 3004 3824 msedge.exe 83 PID 3824 wrote to memory of 3004 3824 msedge.exe 83 PID 3824 wrote to memory of 3004 3824 msedge.exe 83 PID 3824 wrote to memory of 3004 3824 msedge.exe 83 PID 3824 wrote to memory of 3004 3824 msedge.exe 83 PID 3824 wrote to memory of 3004 3824 msedge.exe 83 PID 3824 wrote to memory of 3004 3824 msedge.exe 83 PID 3824 wrote to memory of 3004 3824 msedge.exe 83 PID 3824 wrote to memory of 3004 3824 msedge.exe 83 PID 3824 wrote to memory of 3004 3824 msedge.exe 83 PID 3824 wrote to memory of 3004 3824 msedge.exe 83 PID 3824 wrote to memory of 3004 3824 msedge.exe 83 PID 3824 wrote to memory of 1880 3824 msedge.exe 84 PID 3824 wrote to memory of 1880 3824 msedge.exe 84 PID 3824 wrote to memory of 2896 3824 msedge.exe 85 PID 3824 wrote to memory of 2896 3824 msedge.exe 85 PID 3824 wrote to memory of 2896 3824 msedge.exe 85 PID 3824 wrote to memory of 2896 3824 msedge.exe 85 PID 3824 wrote to memory of 2896 3824 msedge.exe 85 PID 3824 wrote to memory of 2896 3824 msedge.exe 85 PID 3824 wrote to memory of 2896 3824 msedge.exe 85 PID 3824 wrote to memory of 2896 3824 msedge.exe 85 PID 3824 wrote to memory of 2896 3824 msedge.exe 85 PID 3824 wrote to memory of 2896 3824 msedge.exe 85 PID 3824 wrote to memory of 2896 3824 msedge.exe 85 PID 3824 wrote to memory of 2896 3824 msedge.exe 85 PID 3824 wrote to memory of 2896 3824 msedge.exe 85 PID 3824 wrote to memory of 2896 3824 msedge.exe 85 PID 3824 wrote to memory of 2896 3824 msedge.exe 85 PID 3824 wrote to memory of 2896 3824 msedge.exe 85 PID 3824 wrote to memory of 2896 3824 msedge.exe 85 PID 3824 wrote to memory of 2896 3824 msedge.exe 85 PID 3824 wrote to memory of 2896 3824 msedge.exe 85 PID 3824 wrote to memory of 2896 3824 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2d33cd7a759d6af1945472f3ced68a9a_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3824 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe931446f8,0x7ffe93144708,0x7ffe931447182⤵PID:4624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2220,16201765159662002216,10355773041226111304,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2244 /prefetch:22⤵PID:3004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2220,16201765159662002216,10355773041226111304,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2476 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2220,16201765159662002216,10355773041226111304,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2780 /prefetch:82⤵PID:2896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,16201765159662002216,10355773041226111304,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:1884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,16201765159662002216,10355773041226111304,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:3252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,16201765159662002216,10355773041226111304,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4332 /prefetch:12⤵PID:368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2220,16201765159662002216,10355773041226111304,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2384 /prefetch:82⤵PID:3568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2220,16201765159662002216,10355773041226111304,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2384 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,16201765159662002216,10355773041226111304,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5416 /prefetch:12⤵PID:376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,16201765159662002216,10355773041226111304,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5384 /prefetch:12⤵PID:1520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,16201765159662002216,10355773041226111304,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5524 /prefetch:12⤵PID:2100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,16201765159662002216,10355773041226111304,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4172 /prefetch:12⤵PID:440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2220,16201765159662002216,10355773041226111304,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1328 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:828
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3904
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3452
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5b6c11a2e74ef272858b9bcac8f5ebf97
SHA12a06945314ebaa78f3ede1ff2b79f7357c3cb36b
SHA256f88faeb70e2a7849587be3e49e6884f5159ac76ef72b7077ac36e5fbf332d777
SHA512d577a5b3a264829494f5520cc975f4c2044648d51438885f319c2c74a080ea5dd719b6a885ed4d3401fd7a32341f88f26da5e3f29214da9afbbbd5ee950e8ec3
-
Filesize
152B
MD59abb787f6c5a61faf4408f694e89b50e
SHA1914247144868a2ff909207305255ab9bbca33d7e
SHA256ecfd876b653319de412bf6be83bd824dda753b4d9090007231a335819d29ea07
SHA5120f8139c45a7efab6de03fd9ebfe152e183ff155f20b03d4fac4a52cbbf8a3779302fed56facc9c7678a2dcf4f1ee89a26efd5bada485214edd9bf6b5cd238a55
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD505d4776d873587f736e90d2688137774
SHA175a1468fb9876956e8c386c29e23ad2c63e7d680
SHA2565767a6ac3864577507c487457391791b5d56300460bd8e8db03c511525539941
SHA51263996d802de93f84238fe8ea7fcba6b1e8df18ed62cab223a75cbdb4bb09c72fe03bf58c399cb4b70d51789a464e9b712ce0df7c09e9856c8a8e687d68b99244
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize168B
MD5d27e2797f593466c936a1d3cab6a7e80
SHA1f61eff02010438d61885b8fc841fdd2e40a95d9d
SHA256f19e0af73bf6fbb239cf7cc5101f2fe5683f53db292c1777086714ed54d2d0f4
SHA51222e6b3f1ccd708a2535433fdb39217d208351c2af510f47167bf4a7a21c2131d7c15cfece8fbc75e1e00c8697e6aa5ceec6d669691c9b0ebc023fb3effd4e7c6
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
6KB
MD544c4660518f7ba0887a1f4f6c3047121
SHA10326f077119a61d7156f21f85cf450d63cef7887
SHA256ad1d6d0f900d293f01a9dc0c5f78ae4d8673f9c5e925c83c3f8b81142c9b2c41
SHA512df836b5bc5913fa74d8b7c6ec2cce5ccf80a8342dad6ce60f5c83132c5c981e18a330a623505c022996d77612f35de741f00e244d746f90d340b2acf94472272
-
Filesize
6KB
MD53602d7629cb33da07e27efea4831300f
SHA1b8e32f9d874b55fcbf165236f840ca59ed0f4363
SHA256879bb263207216abe893ee0f8b4f2b7aa856e127125838aac96988585795479b
SHA512e402627dead6fd4f96f1d1cfc3e902e0a6bb22b39cc856870262b2a574e0cd4ef849fa525f17929e8eeb616c2b61be3f726120a89c50b0d3f626a03edb9da93a
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5a81fe213b567048b50af0c7c2074be2f
SHA16f577c264e93ec34167d78afb5cfbf49430eb59f
SHA256b59ec1eecf95df0189b4262e07be82c11f30c1c8d827c77f4b41b48a311c6c51
SHA51225e603184ea33ee6318e4101d419bf0de2b55a518dd5894004918eb14f779dbc11f3f63fc44db4b02bd163c86af6fc3d2d4a39d27b29bcf7d96f1436b006ed20