Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
10-07-2024 21:30
Static task
static1
Behavioral task
behavioral1
Sample
36765596c36b7b2a97c526ab639c4529_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
36765596c36b7b2a97c526ab639c4529_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
36765596c36b7b2a97c526ab639c4529_JaffaCakes118.html
-
Size
12KB
-
MD5
36765596c36b7b2a97c526ab639c4529
-
SHA1
31308702e861fd7fce1703465d74147366052199
-
SHA256
1c205151561750e18287d280f9747b8f010f2299d42cbe3f270403e9e4196f48
-
SHA512
de3beb8ff6daff91a47b0ff9c46eb66d02c86941377e1b4bd14f845f29fca0b1be5b56b49a2a09dd802c8d897931de88fc73f858698c9dcc12f93bce9e806adf
-
SSDEEP
192:2VwlIsr0KXyJxVC4N5+D8k/w1wvqygB/Z3n1wWda01JauBuLbdU8d:swlIc0V/j+V/gcgB/Z3n1wWda0JaguLZ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2668 msedge.exe 2668 msedge.exe 3464 msedge.exe 3464 msedge.exe 3192 identity_helper.exe 3192 identity_helper.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe 3572 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3464 wrote to memory of 3096 3464 msedge.exe 83 PID 3464 wrote to memory of 3096 3464 msedge.exe 83 PID 3464 wrote to memory of 3432 3464 msedge.exe 84 PID 3464 wrote to memory of 3432 3464 msedge.exe 84 PID 3464 wrote to memory of 3432 3464 msedge.exe 84 PID 3464 wrote to memory of 3432 3464 msedge.exe 84 PID 3464 wrote to memory of 3432 3464 msedge.exe 84 PID 3464 wrote to memory of 3432 3464 msedge.exe 84 PID 3464 wrote to memory of 3432 3464 msedge.exe 84 PID 3464 wrote to memory of 3432 3464 msedge.exe 84 PID 3464 wrote to memory of 3432 3464 msedge.exe 84 PID 3464 wrote to memory of 3432 3464 msedge.exe 84 PID 3464 wrote to memory of 3432 3464 msedge.exe 84 PID 3464 wrote to memory of 3432 3464 msedge.exe 84 PID 3464 wrote to memory of 3432 3464 msedge.exe 84 PID 3464 wrote to memory of 3432 3464 msedge.exe 84 PID 3464 wrote to memory of 3432 3464 msedge.exe 84 PID 3464 wrote to memory of 3432 3464 msedge.exe 84 PID 3464 wrote to memory of 3432 3464 msedge.exe 84 PID 3464 wrote to memory of 3432 3464 msedge.exe 84 PID 3464 wrote to memory of 3432 3464 msedge.exe 84 PID 3464 wrote to memory of 3432 3464 msedge.exe 84 PID 3464 wrote to memory of 3432 3464 msedge.exe 84 PID 3464 wrote to memory of 3432 3464 msedge.exe 84 PID 3464 wrote to memory of 3432 3464 msedge.exe 84 PID 3464 wrote to memory of 3432 3464 msedge.exe 84 PID 3464 wrote to memory of 3432 3464 msedge.exe 84 PID 3464 wrote to memory of 3432 3464 msedge.exe 84 PID 3464 wrote to memory of 3432 3464 msedge.exe 84 PID 3464 wrote to memory of 3432 3464 msedge.exe 84 PID 3464 wrote to memory of 3432 3464 msedge.exe 84 PID 3464 wrote to memory of 3432 3464 msedge.exe 84 PID 3464 wrote to memory of 3432 3464 msedge.exe 84 PID 3464 wrote to memory of 3432 3464 msedge.exe 84 PID 3464 wrote to memory of 3432 3464 msedge.exe 84 PID 3464 wrote to memory of 3432 3464 msedge.exe 84 PID 3464 wrote to memory of 3432 3464 msedge.exe 84 PID 3464 wrote to memory of 3432 3464 msedge.exe 84 PID 3464 wrote to memory of 3432 3464 msedge.exe 84 PID 3464 wrote to memory of 3432 3464 msedge.exe 84 PID 3464 wrote to memory of 3432 3464 msedge.exe 84 PID 3464 wrote to memory of 3432 3464 msedge.exe 84 PID 3464 wrote to memory of 2668 3464 msedge.exe 85 PID 3464 wrote to memory of 2668 3464 msedge.exe 85 PID 3464 wrote to memory of 908 3464 msedge.exe 86 PID 3464 wrote to memory of 908 3464 msedge.exe 86 PID 3464 wrote to memory of 908 3464 msedge.exe 86 PID 3464 wrote to memory of 908 3464 msedge.exe 86 PID 3464 wrote to memory of 908 3464 msedge.exe 86 PID 3464 wrote to memory of 908 3464 msedge.exe 86 PID 3464 wrote to memory of 908 3464 msedge.exe 86 PID 3464 wrote to memory of 908 3464 msedge.exe 86 PID 3464 wrote to memory of 908 3464 msedge.exe 86 PID 3464 wrote to memory of 908 3464 msedge.exe 86 PID 3464 wrote to memory of 908 3464 msedge.exe 86 PID 3464 wrote to memory of 908 3464 msedge.exe 86 PID 3464 wrote to memory of 908 3464 msedge.exe 86 PID 3464 wrote to memory of 908 3464 msedge.exe 86 PID 3464 wrote to memory of 908 3464 msedge.exe 86 PID 3464 wrote to memory of 908 3464 msedge.exe 86 PID 3464 wrote to memory of 908 3464 msedge.exe 86 PID 3464 wrote to memory of 908 3464 msedge.exe 86 PID 3464 wrote to memory of 908 3464 msedge.exe 86 PID 3464 wrote to memory of 908 3464 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\36765596c36b7b2a97c526ab639c4529_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3464 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff98a7a46f8,0x7ff98a7a4708,0x7ff98a7a47182⤵PID:3096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,1587535337424768585,6192137839204405408,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:22⤵PID:3432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,1587535337424768585,6192137839204405408,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2192 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,1587535337424768585,6192137839204405408,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2868 /prefetch:82⤵PID:908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,1587535337424768585,6192137839204405408,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,1587535337424768585,6192137839204405408,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:3008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,1587535337424768585,6192137839204405408,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4696 /prefetch:12⤵PID:452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,1587535337424768585,6192137839204405408,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6072 /prefetch:82⤵PID:3940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,1587535337424768585,6192137839204405408,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6072 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,1587535337424768585,6192137839204405408,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5564 /prefetch:12⤵PID:4296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,1587535337424768585,6192137839204405408,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5560 /prefetch:12⤵PID:3576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,1587535337424768585,6192137839204405408,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4168 /prefetch:12⤵PID:4776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,1587535337424768585,6192137839204405408,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4980 /prefetch:12⤵PID:2748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,1587535337424768585,6192137839204405408,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3060 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3572
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3564
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:892
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD58dc45b70cbe29a357e2c376a0c2b751b
SHA125d623cea817f86b8427db53b82340410c1489b2
SHA256511cfb6bedbad2530b5cc5538b6ec2184fc4f85947ba4c8166d0bb9f5fe2703a
SHA5123ce0f52675feb16d6e62aae1c50767da178b93bdae28bacf6df3a2f72b8cc75b09c5092d9065e0872e5d09fd9ffe0c6931d6ae1943ddb1927b85d60659ef866e
-
Filesize
152B
MD51790c766c15938258a4f9b984cf68312
SHA115c9827d278d28b23a8ea0389d42fa87e404359f
SHA2562e3978bb58c701f3c6b05de9349b7334a194591bec7bcf73f53527dc0991dc63
SHA5122682d9c60c9d67608cf140b6ca4958d890bcbc3c8a8e95fcc639d2a11bb0ec348ca55ae99a5840e1f50e5c5bcf3e27c97fc877582d869d98cc4ea3448315aafb
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize168B
MD52982f7c85119cea0ccd86fc6598baa38
SHA105eb82a209829f4d6497550307851f4ad6006a3a
SHA2562f7cd514b90447e92628ddf5c0ad8b3dbf7d2d4d2dbe3c2b1d2a37b3f3c06c85
SHA51242c238e59fd1bece2acac61faef8a7c2670ab019d79e8b4aa4148b2c84ed40b4b144afcbd024aaf5ae75152e6c46a3faa73f4831c7158a505c38da22bc4e8a19
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
6KB
MD569ff953f79161cce342a0f28aed53bba
SHA18e8d4211d00f38cc6421dde6ad7c0778a7e30821
SHA256ea8983667cc7ece42b8720f638ddea2d2725f3f2a9c71c995ba1ea732dda58ca
SHA5129d0ba1c5020532cdd85809092f1ddb6aef041a4e7df94b789f50da7d2a03f349c881bb24860ba4bdc54eea8898dc1b72986d6812a19502c5fa0932e9cae93801
-
Filesize
6KB
MD576a5d41c39b16915c23f59b96c344034
SHA15042cc91275334f94a1dd6d31671335bbe9c4419
SHA256d801d6063a240abaea1c76c4bc8e5d897f430d7bbda3ded0cf399e20d1171af5
SHA51280615816bf919f29a1df77c5476dfbbdbe4160e604c73c0c2cd52fc37e8c562e20f57f140389642a512aa012a0b1fa61123044b7b3d986b1d72d168b169ec16a
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD545f5493d44e7608f661bbd3fd68e437e
SHA1be895126070c1552bb7c187a1caecca06edce055
SHA2569d9ecb166c542ef4916f952e6c50204e17487aee075afe1b4e3cd1c4d9ca91bb
SHA5125cc13eafa052f3b925f5866bcf715ea597e5cb2042eca9023ece711297e00c289603b4d16f7ab911ba6b8eba0900226881302930a745c68d3e13fb541774e962