Analysis
-
max time kernel
145s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
09/07/2024, 18:28
Static task
static1
Behavioral task
behavioral1
Sample
317c4803487e1d4c3c38ba293e52b90e_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
317c4803487e1d4c3c38ba293e52b90e_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
317c4803487e1d4c3c38ba293e52b90e_JaffaCakes118.html
-
Size
2KB
-
MD5
317c4803487e1d4c3c38ba293e52b90e
-
SHA1
d997312fc8fa9057974e8500ec6f23aba8972220
-
SHA256
b05bb3a98be4da8311920f8625dde9a1404a9214770f8751361c97a0aefd3391
-
SHA512
b589381aa3c5535b739970021c941f099300138676bda8f9323cde47ede2496b230352ae93cf4929e66df2f3ef79328b5dfe594e41e9b3589558d9c041ad483f
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3884 msedge.exe 3884 msedge.exe 3488 msedge.exe 3488 msedge.exe 4864 identity_helper.exe 4864 identity_helper.exe 2256 msedge.exe 2256 msedge.exe 2256 msedge.exe 2256 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3488 wrote to memory of 2528 3488 msedge.exe 81 PID 3488 wrote to memory of 2528 3488 msedge.exe 81 PID 3488 wrote to memory of 3480 3488 msedge.exe 83 PID 3488 wrote to memory of 3480 3488 msedge.exe 83 PID 3488 wrote to memory of 3480 3488 msedge.exe 83 PID 3488 wrote to memory of 3480 3488 msedge.exe 83 PID 3488 wrote to memory of 3480 3488 msedge.exe 83 PID 3488 wrote to memory of 3480 3488 msedge.exe 83 PID 3488 wrote to memory of 3480 3488 msedge.exe 83 PID 3488 wrote to memory of 3480 3488 msedge.exe 83 PID 3488 wrote to memory of 3480 3488 msedge.exe 83 PID 3488 wrote to memory of 3480 3488 msedge.exe 83 PID 3488 wrote to memory of 3480 3488 msedge.exe 83 PID 3488 wrote to memory of 3480 3488 msedge.exe 83 PID 3488 wrote to memory of 3480 3488 msedge.exe 83 PID 3488 wrote to memory of 3480 3488 msedge.exe 83 PID 3488 wrote to memory of 3480 3488 msedge.exe 83 PID 3488 wrote to memory of 3480 3488 msedge.exe 83 PID 3488 wrote to memory of 3480 3488 msedge.exe 83 PID 3488 wrote to memory of 3480 3488 msedge.exe 83 PID 3488 wrote to memory of 3480 3488 msedge.exe 83 PID 3488 wrote to memory of 3480 3488 msedge.exe 83 PID 3488 wrote to memory of 3480 3488 msedge.exe 83 PID 3488 wrote to memory of 3480 3488 msedge.exe 83 PID 3488 wrote to memory of 3480 3488 msedge.exe 83 PID 3488 wrote to memory of 3480 3488 msedge.exe 83 PID 3488 wrote to memory of 3480 3488 msedge.exe 83 PID 3488 wrote to memory of 3480 3488 msedge.exe 83 PID 3488 wrote to memory of 3480 3488 msedge.exe 83 PID 3488 wrote to memory of 3480 3488 msedge.exe 83 PID 3488 wrote to memory of 3480 3488 msedge.exe 83 PID 3488 wrote to memory of 3480 3488 msedge.exe 83 PID 3488 wrote to memory of 3480 3488 msedge.exe 83 PID 3488 wrote to memory of 3480 3488 msedge.exe 83 PID 3488 wrote to memory of 3480 3488 msedge.exe 83 PID 3488 wrote to memory of 3480 3488 msedge.exe 83 PID 3488 wrote to memory of 3480 3488 msedge.exe 83 PID 3488 wrote to memory of 3480 3488 msedge.exe 83 PID 3488 wrote to memory of 3480 3488 msedge.exe 83 PID 3488 wrote to memory of 3480 3488 msedge.exe 83 PID 3488 wrote to memory of 3480 3488 msedge.exe 83 PID 3488 wrote to memory of 3480 3488 msedge.exe 83 PID 3488 wrote to memory of 3884 3488 msedge.exe 84 PID 3488 wrote to memory of 3884 3488 msedge.exe 84 PID 3488 wrote to memory of 4704 3488 msedge.exe 85 PID 3488 wrote to memory of 4704 3488 msedge.exe 85 PID 3488 wrote to memory of 4704 3488 msedge.exe 85 PID 3488 wrote to memory of 4704 3488 msedge.exe 85 PID 3488 wrote to memory of 4704 3488 msedge.exe 85 PID 3488 wrote to memory of 4704 3488 msedge.exe 85 PID 3488 wrote to memory of 4704 3488 msedge.exe 85 PID 3488 wrote to memory of 4704 3488 msedge.exe 85 PID 3488 wrote to memory of 4704 3488 msedge.exe 85 PID 3488 wrote to memory of 4704 3488 msedge.exe 85 PID 3488 wrote to memory of 4704 3488 msedge.exe 85 PID 3488 wrote to memory of 4704 3488 msedge.exe 85 PID 3488 wrote to memory of 4704 3488 msedge.exe 85 PID 3488 wrote to memory of 4704 3488 msedge.exe 85 PID 3488 wrote to memory of 4704 3488 msedge.exe 85 PID 3488 wrote to memory of 4704 3488 msedge.exe 85 PID 3488 wrote to memory of 4704 3488 msedge.exe 85 PID 3488 wrote to memory of 4704 3488 msedge.exe 85 PID 3488 wrote to memory of 4704 3488 msedge.exe 85 PID 3488 wrote to memory of 4704 3488 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\317c4803487e1d4c3c38ba293e52b90e_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3488 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa8ddb46f8,0x7ffa8ddb4708,0x7ffa8ddb47182⤵PID:2528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1996,1274895971208155520,10701575742122046025,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2012 /prefetch:22⤵PID:3480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1996,1274895971208155520,10701575742122046025,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2552 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1996,1274895971208155520,10701575742122046025,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2764 /prefetch:82⤵PID:4704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,1274895971208155520,10701575742122046025,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:2688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,1274895971208155520,10701575742122046025,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:4556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,1274895971208155520,10701575742122046025,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4708 /prefetch:12⤵PID:1324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,1274895971208155520,10701575742122046025,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5200 /prefetch:12⤵PID:4368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,1274895971208155520,10701575742122046025,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4028 /prefetch:12⤵PID:4760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,1274895971208155520,10701575742122046025,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3520 /prefetch:12⤵PID:2404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1996,1274895971208155520,10701575742122046025,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3392 /prefetch:82⤵PID:2988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1996,1274895971208155520,10701575742122046025,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3392 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,1274895971208155520,10701575742122046025,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5556 /prefetch:12⤵PID:3364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,1274895971208155520,10701575742122046025,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5576 /prefetch:12⤵PID:2896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,1274895971208155520,10701575742122046025,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5944 /prefetch:12⤵PID:2388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,1274895971208155520,10701575742122046025,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5920 /prefetch:12⤵PID:4844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1996,1274895971208155520,10701575742122046025,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2256
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3600
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4844
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5bafce9e4c53a0cb85310891b6b21791b
SHA15d70027cc137a7cbb38f5801b15fd97b05e89ee2
SHA25671fb546b5d2210a56e90b448ee10120cd92c518c8f79fb960f01b918f89f2b00
SHA512c0e4d3eccc0135ac92051539a18f64b8b8628cfe74e5b019d4f8e1dcbb51a9b49c486a1523885fe6be53da7118c013852e753c26a5490538c1e721fd0188836c
-
Filesize
152B
MD5a499254d6b5d91f97eb7a86e5f8ca573
SHA103dbfebfec8c94a9c06f9b0cd81ebe0a2b8be3d1
SHA256fb87b758c2b98989df851380293ff6786cb9a5cf2b3a384cec70d9f3eb064499
SHA512d7adcc76d0470bcd68d7644de3c8d2b6d61df8485979a4752ceea3df4d85bd1c290f72b3d8d5c8d639d5a10afa48d80e457f76b44dd8107ac97eb80fd98c7b0c
-
Filesize
211KB
MD5151fb811968eaf8efb840908b89dc9d4
SHA17ec811009fd9b0e6d92d12d78b002275f2f1bee1
SHA256043fd8558e4a5a60aaccd2f0377f77a544e3e375242e9d7200dc6e51f94103ed
SHA51283aface0ab01da52fd077f747c9d5916e3c06b0ea5c551d7d316707ec3e8f3f986ce1c82e6f2136e48c6511a83cb0ac67ff6dc8f0e440ac72fc6854086a87674
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD5b5ba5a5d340ec79e7840c6a81d0e3657
SHA1cd98b39825994f8173967fac532901d1a8e5d6ff
SHA256e8c2dacccc3472d950cd2e711d1e74d6ecf928971d2864abf3c8c7649e83dff0
SHA512df83f14b9419e291e26ee7de8756a199cbf0aa1966a87937da19813f273dae5474a1e62ed04194f586664ee2b00f98e93055e5625bfc50838325926789e50cb6
-
Filesize
1KB
MD5eb918faa50a13db1d8f2529bf5308c39
SHA172704bafff05bb2f34278b0b129987f2157672f9
SHA2569d33637cc48c7e817a68cc956ed1bf77b4e7a60dfdb1096e3d8c3e33d51c98c8
SHA512cc6d439b15c1373a7bd6e472296452b9fac0e70648cdb01f5c852e0d1c7551a6588c9f2658e9f4d1a1ad59812f586f323de433a8f558e5dc33773c036daca20d
-
Filesize
6KB
MD5e6f97f083567509ca934acca11fea792
SHA1a72468fd9b2b5ea9120a2ca1ad94b2ca7d088d9a
SHA256258ab7150a89953cbf9f3c631c9d92a8ec5d6361f64022361ff370bbe260a7c0
SHA512cf983631dd417a6a8d10fd83618342dd08ab0abebb9ff63aa018cd52d2209f40d23a285e28e9dea48f174ea2cc18f50a1af2daf209d793c68907cbd543bc9942
-
Filesize
6KB
MD585afbba489c8414a452554df1f866e3d
SHA13df5ac725c5e9f5c5cc8c6bd92c7e511db7d4037
SHA256edad01290bef6aac28a00b8e698c2919c84b0183ceb283c4f1d8c261c184c66c
SHA51251de473a3f4b73497246a1b0eef3393df9e67882b347addec00e9e64c1361d8debb17a1c70f3aa2f4f9544b576e5cdaf238cfac4479b18b1955fe6b43cd8ac94
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5b3bb083c5405747b6efd6197cae210be
SHA1a24b0ecfe2014f06f63fb42f9ee69c4d19813ff6
SHA2568d1a7a37205a134d424cb5e52d218448844686d7c0e015b87a5eb0f0d67c6dff
SHA5124b07c119935cc13eea246715253059a455496e2c3cf927e41d01e698a0e60805b640a9c4001c23849516af255de70668273a123e83274cbc5563f8181affca7d