Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
09-07-2024 12:00
Static task
static1
Behavioral task
behavioral1
Sample
304a082f0ed7824f37eea35abd7aa4cc_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
304a082f0ed7824f37eea35abd7aa4cc_JaffaCakes118.html
Resource
win10v2004-20240704-en
General
-
Target
304a082f0ed7824f37eea35abd7aa4cc_JaffaCakes118.html
-
Size
24KB
-
MD5
304a082f0ed7824f37eea35abd7aa4cc
-
SHA1
168bffe66e5a80fa12323f102435215c17f7f247
-
SHA256
05f56712de1f0fb5f6a31ff6074d309825159415c9554a723f47996cb527f7d6
-
SHA512
217910f107a74f96e78b6bb43720fa1c0970512bb99f3e9a75e042e08918a8ef0c412a6dc0e0f5107c6a85129c2974cccd492074a09c9119685a004e30dcf63c
-
SSDEEP
384:SW6ZB9bfmYHejkZWSbMyGCNezXCqg0VHwolDEuk:SWabfnej5aM8QLBg0VHwolDE7
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4832 msedge.exe 4832 msedge.exe 2992 msedge.exe 2992 msedge.exe 2636 identity_helper.exe 2636 identity_helper.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe 2992 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2992 wrote to memory of 1476 2992 msedge.exe 82 PID 2992 wrote to memory of 1476 2992 msedge.exe 82 PID 2992 wrote to memory of 2856 2992 msedge.exe 83 PID 2992 wrote to memory of 2856 2992 msedge.exe 83 PID 2992 wrote to memory of 2856 2992 msedge.exe 83 PID 2992 wrote to memory of 2856 2992 msedge.exe 83 PID 2992 wrote to memory of 2856 2992 msedge.exe 83 PID 2992 wrote to memory of 2856 2992 msedge.exe 83 PID 2992 wrote to memory of 2856 2992 msedge.exe 83 PID 2992 wrote to memory of 2856 2992 msedge.exe 83 PID 2992 wrote to memory of 2856 2992 msedge.exe 83 PID 2992 wrote to memory of 2856 2992 msedge.exe 83 PID 2992 wrote to memory of 2856 2992 msedge.exe 83 PID 2992 wrote to memory of 2856 2992 msedge.exe 83 PID 2992 wrote to memory of 2856 2992 msedge.exe 83 PID 2992 wrote to memory of 2856 2992 msedge.exe 83 PID 2992 wrote to memory of 2856 2992 msedge.exe 83 PID 2992 wrote to memory of 2856 2992 msedge.exe 83 PID 2992 wrote to memory of 2856 2992 msedge.exe 83 PID 2992 wrote to memory of 2856 2992 msedge.exe 83 PID 2992 wrote to memory of 2856 2992 msedge.exe 83 PID 2992 wrote to memory of 2856 2992 msedge.exe 83 PID 2992 wrote to memory of 2856 2992 msedge.exe 83 PID 2992 wrote to memory of 2856 2992 msedge.exe 83 PID 2992 wrote to memory of 2856 2992 msedge.exe 83 PID 2992 wrote to memory of 2856 2992 msedge.exe 83 PID 2992 wrote to memory of 2856 2992 msedge.exe 83 PID 2992 wrote to memory of 2856 2992 msedge.exe 83 PID 2992 wrote to memory of 2856 2992 msedge.exe 83 PID 2992 wrote to memory of 2856 2992 msedge.exe 83 PID 2992 wrote to memory of 2856 2992 msedge.exe 83 PID 2992 wrote to memory of 2856 2992 msedge.exe 83 PID 2992 wrote to memory of 2856 2992 msedge.exe 83 PID 2992 wrote to memory of 2856 2992 msedge.exe 83 PID 2992 wrote to memory of 2856 2992 msedge.exe 83 PID 2992 wrote to memory of 2856 2992 msedge.exe 83 PID 2992 wrote to memory of 2856 2992 msedge.exe 83 PID 2992 wrote to memory of 2856 2992 msedge.exe 83 PID 2992 wrote to memory of 2856 2992 msedge.exe 83 PID 2992 wrote to memory of 2856 2992 msedge.exe 83 PID 2992 wrote to memory of 2856 2992 msedge.exe 83 PID 2992 wrote to memory of 2856 2992 msedge.exe 83 PID 2992 wrote to memory of 4832 2992 msedge.exe 84 PID 2992 wrote to memory of 4832 2992 msedge.exe 84 PID 2992 wrote to memory of 3420 2992 msedge.exe 85 PID 2992 wrote to memory of 3420 2992 msedge.exe 85 PID 2992 wrote to memory of 3420 2992 msedge.exe 85 PID 2992 wrote to memory of 3420 2992 msedge.exe 85 PID 2992 wrote to memory of 3420 2992 msedge.exe 85 PID 2992 wrote to memory of 3420 2992 msedge.exe 85 PID 2992 wrote to memory of 3420 2992 msedge.exe 85 PID 2992 wrote to memory of 3420 2992 msedge.exe 85 PID 2992 wrote to memory of 3420 2992 msedge.exe 85 PID 2992 wrote to memory of 3420 2992 msedge.exe 85 PID 2992 wrote to memory of 3420 2992 msedge.exe 85 PID 2992 wrote to memory of 3420 2992 msedge.exe 85 PID 2992 wrote to memory of 3420 2992 msedge.exe 85 PID 2992 wrote to memory of 3420 2992 msedge.exe 85 PID 2992 wrote to memory of 3420 2992 msedge.exe 85 PID 2992 wrote to memory of 3420 2992 msedge.exe 85 PID 2992 wrote to memory of 3420 2992 msedge.exe 85 PID 2992 wrote to memory of 3420 2992 msedge.exe 85 PID 2992 wrote to memory of 3420 2992 msedge.exe 85 PID 2992 wrote to memory of 3420 2992 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\304a082f0ed7824f37eea35abd7aa4cc_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9da2846f8,0x7ff9da284708,0x7ff9da2847182⤵PID:1476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,2663362241888563983,2981662167755675565,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:22⤵PID:2856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,2663362241888563983,2981662167755675565,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2248 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,2663362241888563983,2981662167755675565,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2928 /prefetch:82⤵PID:3420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,2663362241888563983,2981662167755675565,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:2656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,2663362241888563983,2981662167755675565,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3452 /prefetch:12⤵PID:2352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,2663362241888563983,2981662167755675565,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5140 /prefetch:12⤵PID:4476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,2663362241888563983,2981662167755675565,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5336 /prefetch:82⤵PID:4548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,2663362241888563983,2981662167755675565,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5336 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,2663362241888563983,2981662167755675565,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5740 /prefetch:12⤵PID:4456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,2663362241888563983,2981662167755675565,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5772 /prefetch:12⤵PID:2432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,2663362241888563983,2981662167755675565,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5944 /prefetch:12⤵PID:5040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,2663362241888563983,2981662167755675565,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5732 /prefetch:12⤵PID:1764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,2663362241888563983,2981662167755675565,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4812 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5000
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:392
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3116
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD53c78617ec8f88da19254f9ff03312175
SHA1344e9fed9434d924d1c9f05351259cbc21e434d3
SHA2563cb47fcdca33bb3c8f4acc98424140987235ad79815da4f0e7593e4591ae90ed
SHA5125b58675088b0fc2b2d705cb648ea89385b80c7cf908b0f4f95a9acdbd350b50754e1b586202db6a918eef70029fafb210947f3c43c570ecf7657e08939fd7e9c
-
Filesize
152B
MD509c7ae658385f6de986103443217840b
SHA1298d880503edce4413337c09d3525f27a2edcd28
SHA25691e04ec38abdb0204458543592c4621b7bc0306407884f764aa9596a52454cd7
SHA5124e1272b209487d1e9e7d8502be49ebce91c76718410e817b3ac7faf47d9b699210aab1b941fbb5ddafc192ddf4b2ba151afd47fab753ec62bc0bca36039c55c3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize216B
MD5a86fe67676468d13a55a9961fba0bd80
SHA113a54e3450dfcbfaaf10fc99ccca01597b8189eb
SHA2561c6841224b8e61e1187cacc495956d683e725d0af52a8a5336c3897c12e0ee8a
SHA512429606e34913ef46a24a2124f7ac3e6b5d470122a1fb5fe6b94584e9075c2a90106f10a2821f9bf54f846edb7f3c556beb8aeb583a8b71fde83963430cb7a343
-
Filesize
491B
MD5ab6a375874d25d026524b1e074a0483b
SHA184f3d7652c11a367fcba0005c3f0cf076724de37
SHA256ba2b47044c2b42d2cd16490b193da5b6dcc063f3e87ac60ab742fa4b1d700adb
SHA512bc180fc42ff016d05a86d363fa4136146c110cc70a39a71d92589c1d5d3c9330524fdd1ea3cba98411adf6c751cf02071465f14015d55f3432599ca8a8d7dae4
-
Filesize
6KB
MD5c764a4519686cb49fa758ba80190b161
SHA1d7fe432fac252dffa1071e5d3b053177e1a89bb4
SHA2567fba842136df0dd79c05a85da7f30c381f4d3123610e591d9f5e71db35f52529
SHA5122d2197e22a318427fdf98b2384324b4aa67dc913623d864b94b5edd290c24686d7d2699ce1252faad5ac6e3522fea11df568ee84ad059247827546ddbdebfb5c
-
Filesize
6KB
MD54174730078dea6c597d60cc81abda120
SHA1e22675f8936f0f2ea4caf6426854ae9e80527afe
SHA256f97ae3af17f7e96eb0adc907a087207294b470f78a221b748060d2fc89e73b13
SHA5123e824ea62944715ede808ec2301378de0a2e908c52c73adcd3a9d60a733bd426022c75a5752b395f9fb1d2f6eeb7e79697917aae9e7a6d9bf7aedca54659f4e9
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD563913485ce91e690e18c9db5d0e52744
SHA16277549fe5e19237d976dad04285f83c99c481e2
SHA2565fd7049204cb5d89a248b18d098e88d9bc84727aeffebb4e066e99b08b604d02
SHA5124cacb15834e92feafa9d77accd64cc31a385d7ee027bc888d58e7a684c75ff88972abbf15d2006f61deab2bf6655d37cf1fe1abd5d8569524eb06da0dfab51c5