Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
09/07/2024, 16:10
Static task
static1
Behavioral task
behavioral1
Sample
311018cd27594811a11c899a48427e0c_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
311018cd27594811a11c899a48427e0c_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
311018cd27594811a11c899a48427e0c_JaffaCakes118.html
-
Size
57KB
-
MD5
311018cd27594811a11c899a48427e0c
-
SHA1
b1691d54ca98132467addab89f5932cb2882aaba
-
SHA256
c8f0dd944807e9c3f1529ce06081f21414b42cc50b37492edbf01aa046c029f2
-
SHA512
601ac60a9f37fc186f47713f1fb3399776108099afa271b516b9b26a1659cf25c6771da8a8303f753d0c37af6d600dc2776dbc2795ac845879976a502fe58461
-
SSDEEP
1536:ijEQvK8OPHdFAko2vgyHJv0owbd6zKD6CDK2RVroZewpDK2RVy:ijnOPHdFK2vgyHJutDK2RVroZewpDK2m
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4836 msedge.exe 4836 msedge.exe 2456 msedge.exe 2456 msedge.exe 2752 identity_helper.exe 2752 identity_helper.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe 2456 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2456 wrote to memory of 4156 2456 msedge.exe 79 PID 2456 wrote to memory of 4156 2456 msedge.exe 79 PID 2456 wrote to memory of 216 2456 msedge.exe 80 PID 2456 wrote to memory of 216 2456 msedge.exe 80 PID 2456 wrote to memory of 216 2456 msedge.exe 80 PID 2456 wrote to memory of 216 2456 msedge.exe 80 PID 2456 wrote to memory of 216 2456 msedge.exe 80 PID 2456 wrote to memory of 216 2456 msedge.exe 80 PID 2456 wrote to memory of 216 2456 msedge.exe 80 PID 2456 wrote to memory of 216 2456 msedge.exe 80 PID 2456 wrote to memory of 216 2456 msedge.exe 80 PID 2456 wrote to memory of 216 2456 msedge.exe 80 PID 2456 wrote to memory of 216 2456 msedge.exe 80 PID 2456 wrote to memory of 216 2456 msedge.exe 80 PID 2456 wrote to memory of 216 2456 msedge.exe 80 PID 2456 wrote to memory of 216 2456 msedge.exe 80 PID 2456 wrote to memory of 216 2456 msedge.exe 80 PID 2456 wrote to memory of 216 2456 msedge.exe 80 PID 2456 wrote to memory of 216 2456 msedge.exe 80 PID 2456 wrote to memory of 216 2456 msedge.exe 80 PID 2456 wrote to memory of 216 2456 msedge.exe 80 PID 2456 wrote to memory of 216 2456 msedge.exe 80 PID 2456 wrote to memory of 216 2456 msedge.exe 80 PID 2456 wrote to memory of 216 2456 msedge.exe 80 PID 2456 wrote to memory of 216 2456 msedge.exe 80 PID 2456 wrote to memory of 216 2456 msedge.exe 80 PID 2456 wrote to memory of 216 2456 msedge.exe 80 PID 2456 wrote to memory of 216 2456 msedge.exe 80 PID 2456 wrote to memory of 216 2456 msedge.exe 80 PID 2456 wrote to memory of 216 2456 msedge.exe 80 PID 2456 wrote to memory of 216 2456 msedge.exe 80 PID 2456 wrote to memory of 216 2456 msedge.exe 80 PID 2456 wrote to memory of 216 2456 msedge.exe 80 PID 2456 wrote to memory of 216 2456 msedge.exe 80 PID 2456 wrote to memory of 216 2456 msedge.exe 80 PID 2456 wrote to memory of 216 2456 msedge.exe 80 PID 2456 wrote to memory of 216 2456 msedge.exe 80 PID 2456 wrote to memory of 216 2456 msedge.exe 80 PID 2456 wrote to memory of 216 2456 msedge.exe 80 PID 2456 wrote to memory of 216 2456 msedge.exe 80 PID 2456 wrote to memory of 216 2456 msedge.exe 80 PID 2456 wrote to memory of 216 2456 msedge.exe 80 PID 2456 wrote to memory of 4836 2456 msedge.exe 81 PID 2456 wrote to memory of 4836 2456 msedge.exe 81 PID 2456 wrote to memory of 1444 2456 msedge.exe 82 PID 2456 wrote to memory of 1444 2456 msedge.exe 82 PID 2456 wrote to memory of 1444 2456 msedge.exe 82 PID 2456 wrote to memory of 1444 2456 msedge.exe 82 PID 2456 wrote to memory of 1444 2456 msedge.exe 82 PID 2456 wrote to memory of 1444 2456 msedge.exe 82 PID 2456 wrote to memory of 1444 2456 msedge.exe 82 PID 2456 wrote to memory of 1444 2456 msedge.exe 82 PID 2456 wrote to memory of 1444 2456 msedge.exe 82 PID 2456 wrote to memory of 1444 2456 msedge.exe 82 PID 2456 wrote to memory of 1444 2456 msedge.exe 82 PID 2456 wrote to memory of 1444 2456 msedge.exe 82 PID 2456 wrote to memory of 1444 2456 msedge.exe 82 PID 2456 wrote to memory of 1444 2456 msedge.exe 82 PID 2456 wrote to memory of 1444 2456 msedge.exe 82 PID 2456 wrote to memory of 1444 2456 msedge.exe 82 PID 2456 wrote to memory of 1444 2456 msedge.exe 82 PID 2456 wrote to memory of 1444 2456 msedge.exe 82 PID 2456 wrote to memory of 1444 2456 msedge.exe 82 PID 2456 wrote to memory of 1444 2456 msedge.exe 82
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\311018cd27594811a11c899a48427e0c_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc2c0346f8,0x7ffc2c034708,0x7ffc2c0347182⤵PID:4156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,3782133524587286080,1242986105899375697,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2096 /prefetch:22⤵PID:216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,3782133524587286080,1242986105899375697,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,3782133524587286080,1242986105899375697,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2880 /prefetch:82⤵PID:1444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,3782133524587286080,1242986105899375697,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:1436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,3782133524587286080,1242986105899375697,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:3404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,3782133524587286080,1242986105899375697,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4244 /prefetch:12⤵PID:2376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,3782133524587286080,1242986105899375697,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4232 /prefetch:12⤵PID:2516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,3782133524587286080,1242986105899375697,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5452 /prefetch:12⤵PID:1440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,3782133524587286080,1242986105899375697,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5772 /prefetch:12⤵PID:2416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,3782133524587286080,1242986105899375697,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5924 /prefetch:12⤵PID:4872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,3782133524587286080,1242986105899375697,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:3412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,3782133524587286080,1242986105899375697,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5872 /prefetch:82⤵PID:4232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,3782133524587286080,1242986105899375697,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5872 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,3782133524587286080,1242986105899375697,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4032 /prefetch:12⤵PID:4348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,3782133524587286080,1242986105899375697,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6556 /prefetch:12⤵PID:4980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,3782133524587286080,1242986105899375697,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3068 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3548
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5108
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1960
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5dd3cbdd9b21b657bafd3d1a07bfefcb3
SHA133b62105c7e00f8ca3755b6ad6b26da9511120e1
SHA256a95559b0ad0ce9d0854bbba31162efae7b483be4ca9d9069bb8d00da015a4f78
SHA5121e330bab2e2fe11de514d6cb794529029dbe9067d18ed82364abd3c2e8874f94d37096b66ce3fc2f592defeab365681096dc2aa94503c881d6d955dd0e90d2eb
-
Filesize
152B
MD56c86c838cf1dc704d2be375f04e1e6c6
SHA1ad2911a13a3addc86cc46d4329b2b1621cbe7e35
SHA256dff0886331bb45ec7711af92ab10be76291fde729dff23ca3270c86fb6e606bb
SHA512a120248263919c687f09615fed56c7cac825c8c93c104488632cebc1abfa338c39ebdc191e5f0c45ff30f054f08d4c02d12b013de6322490197606ce0c0b4f37
-
Filesize
152B
MD527f3335bf37563e4537db3624ee378da
SHA157543abc3d97c2a2b251b446820894f4b0111aeb
SHA256494425284ba12ee2fb07890e268be7890b258e1b1e5ecfa4a4dbc3411ab93b1a
SHA5122bef861f9d2d916272f6014110fdee84afced515710c9d69b3c310f6bf41728d1b2d41fee3c86441ff96c08c7d474f9326e992b9164b9a3f13627f7d24d0c485
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize792B
MD5da5763999d331fd1800fb14d8e70c126
SHA1864046ab68bd301d0ca1de4f2117718646bee82a
SHA2567953d6f800b103ede18d41b7b53691a1245bb290e4fa0b51de07f07366c476bf
SHA512f6dda2daa26068334f802d71a208753182dd73de88d8798a54fc9107722ef3a9e76ef49cb52db2b030c3f0a31663dba7c8295b8d6e9d6a28a621b4346c18ef32
-
Filesize
1KB
MD52be1716f898b9e6d5ee84242a46646c3
SHA10ee428df8acc1f4ddf3512630088f3f9f58b579a
SHA256bdfb6b35761022f94c3342dd68dbdb82ffc70c0bc1f8eb111b8c740d3f554916
SHA5122c5e14067ceb3ad44957fae9c197a930bd124034f2564880fe10668cd9838978413d87efae05529d13d4b234857f2ae66ae19c0e63a63e3f8b7423d422b45913
-
Filesize
6KB
MD55ce9a24b1cb267b0b404ca16bed34a64
SHA108e08bf88ac8f84359d196d74dba25e5fc4225fe
SHA256f48d4d4bd17e71a23cf10cdafd0b02888f13d87d7136d01092c4e4664fab66be
SHA5122922971e2869e2958da331d398248a0087e8dde1fe14dae16f665cffc8df91a0364c6659be78ad598c225557281b6d134fd80bea41fc7cf04d1c65376d94d038
-
Filesize
6KB
MD5e8f5a29c2686b1d3a033f003e33bbbf9
SHA12e0e4c3a267651b008e3082c65778fef38f6c517
SHA25646b3658b4d76c140a23543106b985495542d325121406d4f14151a84ca32ba36
SHA512ed38fa08b070b220f4e1d55439b7036f3257f2f33e303db49ce1d775e93437fac1347708ce931a914bfdb66c32d825d83a54b4708b32e308a63748a20ba1958f
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23