Analysis
-
max time kernel
145s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
10-07-2024 05:11
Static task
static1
Behavioral task
behavioral1
Sample
336afafaa49c61907d4d4e6c70ef417d_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
336afafaa49c61907d4d4e6c70ef417d_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
336afafaa49c61907d4d4e6c70ef417d_JaffaCakes118.html
-
Size
9KB
-
MD5
336afafaa49c61907d4d4e6c70ef417d
-
SHA1
d03ace18bbb94ac4468d066374a52be6c514cdf9
-
SHA256
db3d0780f78691e77e13041cd154d7dfd4a095570944676e1fe32a3af6f70fff
-
SHA512
ca8d676019a050ee3eebd5b779277185d797ec90923ba0040026e169b62db8cce6b7733a07da9995b531730abc15f50cb25f5906eedf84ab7d35d6afba2f2c26
-
SSDEEP
192:rWpiGAtElAd9NQMC4JbDRZlWXQYjh4iyOykbb2Z8fNHYL9d:rtaAd9Nh1VDflLipykbyZeNHqd
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4688 msedge.exe 4688 msedge.exe 4476 msedge.exe 4476 msedge.exe 3700 identity_helper.exe 3700 identity_helper.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe 4476 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4476 wrote to memory of 4988 4476 msedge.exe 81 PID 4476 wrote to memory of 4988 4476 msedge.exe 81 PID 4476 wrote to memory of 1644 4476 msedge.exe 82 PID 4476 wrote to memory of 1644 4476 msedge.exe 82 PID 4476 wrote to memory of 1644 4476 msedge.exe 82 PID 4476 wrote to memory of 1644 4476 msedge.exe 82 PID 4476 wrote to memory of 1644 4476 msedge.exe 82 PID 4476 wrote to memory of 1644 4476 msedge.exe 82 PID 4476 wrote to memory of 1644 4476 msedge.exe 82 PID 4476 wrote to memory of 1644 4476 msedge.exe 82 PID 4476 wrote to memory of 1644 4476 msedge.exe 82 PID 4476 wrote to memory of 1644 4476 msedge.exe 82 PID 4476 wrote to memory of 1644 4476 msedge.exe 82 PID 4476 wrote to memory of 1644 4476 msedge.exe 82 PID 4476 wrote to memory of 1644 4476 msedge.exe 82 PID 4476 wrote to memory of 1644 4476 msedge.exe 82 PID 4476 wrote to memory of 1644 4476 msedge.exe 82 PID 4476 wrote to memory of 1644 4476 msedge.exe 82 PID 4476 wrote to memory of 1644 4476 msedge.exe 82 PID 4476 wrote to memory of 1644 4476 msedge.exe 82 PID 4476 wrote to memory of 1644 4476 msedge.exe 82 PID 4476 wrote to memory of 1644 4476 msedge.exe 82 PID 4476 wrote to memory of 1644 4476 msedge.exe 82 PID 4476 wrote to memory of 1644 4476 msedge.exe 82 PID 4476 wrote to memory of 1644 4476 msedge.exe 82 PID 4476 wrote to memory of 1644 4476 msedge.exe 82 PID 4476 wrote to memory of 1644 4476 msedge.exe 82 PID 4476 wrote to memory of 1644 4476 msedge.exe 82 PID 4476 wrote to memory of 1644 4476 msedge.exe 82 PID 4476 wrote to memory of 1644 4476 msedge.exe 82 PID 4476 wrote to memory of 1644 4476 msedge.exe 82 PID 4476 wrote to memory of 1644 4476 msedge.exe 82 PID 4476 wrote to memory of 1644 4476 msedge.exe 82 PID 4476 wrote to memory of 1644 4476 msedge.exe 82 PID 4476 wrote to memory of 1644 4476 msedge.exe 82 PID 4476 wrote to memory of 1644 4476 msedge.exe 82 PID 4476 wrote to memory of 1644 4476 msedge.exe 82 PID 4476 wrote to memory of 1644 4476 msedge.exe 82 PID 4476 wrote to memory of 1644 4476 msedge.exe 82 PID 4476 wrote to memory of 1644 4476 msedge.exe 82 PID 4476 wrote to memory of 1644 4476 msedge.exe 82 PID 4476 wrote to memory of 1644 4476 msedge.exe 82 PID 4476 wrote to memory of 4688 4476 msedge.exe 83 PID 4476 wrote to memory of 4688 4476 msedge.exe 83 PID 4476 wrote to memory of 3844 4476 msedge.exe 84 PID 4476 wrote to memory of 3844 4476 msedge.exe 84 PID 4476 wrote to memory of 3844 4476 msedge.exe 84 PID 4476 wrote to memory of 3844 4476 msedge.exe 84 PID 4476 wrote to memory of 3844 4476 msedge.exe 84 PID 4476 wrote to memory of 3844 4476 msedge.exe 84 PID 4476 wrote to memory of 3844 4476 msedge.exe 84 PID 4476 wrote to memory of 3844 4476 msedge.exe 84 PID 4476 wrote to memory of 3844 4476 msedge.exe 84 PID 4476 wrote to memory of 3844 4476 msedge.exe 84 PID 4476 wrote to memory of 3844 4476 msedge.exe 84 PID 4476 wrote to memory of 3844 4476 msedge.exe 84 PID 4476 wrote to memory of 3844 4476 msedge.exe 84 PID 4476 wrote to memory of 3844 4476 msedge.exe 84 PID 4476 wrote to memory of 3844 4476 msedge.exe 84 PID 4476 wrote to memory of 3844 4476 msedge.exe 84 PID 4476 wrote to memory of 3844 4476 msedge.exe 84 PID 4476 wrote to memory of 3844 4476 msedge.exe 84 PID 4476 wrote to memory of 3844 4476 msedge.exe 84 PID 4476 wrote to memory of 3844 4476 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\336afafaa49c61907d4d4e6c70ef417d_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4476 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb873746f8,0x7ffb87374708,0x7ffb873747182⤵PID:4988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,900958664753807056,4561711334164726060,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:22⤵PID:1644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,900958664753807056,4561711334164726060,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2528 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,900958664753807056,4561711334164726060,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2860 /prefetch:82⤵PID:3844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,900958664753807056,4561711334164726060,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,900958664753807056,4561711334164726060,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:1960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,900958664753807056,4561711334164726060,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5152 /prefetch:82⤵PID:212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,900958664753807056,4561711334164726060,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5152 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,900958664753807056,4561711334164726060,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4884 /prefetch:12⤵PID:3972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,900958664753807056,4561711334164726060,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4752 /prefetch:12⤵PID:4144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,900958664753807056,4561711334164726060,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5408 /prefetch:12⤵PID:4764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,900958664753807056,4561711334164726060,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4672 /prefetch:12⤵PID:3644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,900958664753807056,4561711334164726060,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3188 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2932
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3948
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3460
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD575c9f57baeefeecd6c184627de951c1e
SHA152e0468e13cbfc9f15fc62cc27ce14367a996cff
SHA256648ba270261690bb792f95d017e134d81a612ef4fc76dc41921c9e5b8f46d98f
SHA512c4570cc4bb4894de3ecc8eee6cd8bfa5809ea401ceef683557fb170175ff4294cc21cdc6834db4e79e5e82d3bf16105894fff83290d26343423324bc486d4a15
-
Filesize
152B
MD510fa19df148444a77ceec60cabd2ce21
SHA1685b599c497668166ede4945d8885d204fd8d70f
SHA256c3b5deb970d0f06a05c8111da90330ffe25da195aafa4e182211669484d1964b
SHA5123518ce16fef66c59e0bdb772db51aeaa9042c44ca399be61ca3d9979351f93655393236711cf2b1988d5f90a5b9318a7569a8cef3374fc745a8f9aa8323691ef
-
Filesize
6KB
MD51ab5a55297ba279b98d1f320908b8fd7
SHA1cf59797e9b0619e29b798e8d3ec8fd27d6c0fec9
SHA25651afe25653229496aedae81b03528bf32026a24ca4c30238deb94ad2da310adf
SHA5124822e50906d0d1377700ea3f2ad6e3ace7d6e383159c5977782c1316d72df22ecb5ea7b9edc64adc99f2640a0d80edbace2db329a872f4eddb0398a3d40a9598
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\a305a78a-0e43-444a-acb5-6092641ce99f.tmp
Filesize6KB
MD5deeebfb5c5d1f312abbc6fcad1c59876
SHA17100a3669a6c3f175977c2441e4ba3943f210c3a
SHA256ebccac4eb4e30ba38b9f0712c2be6ba1e32bfd6f48ab32707eb807b7f0060023
SHA5129ca74d6c5d78ca5db340657ce53d799b35a74684a5f7d4b33490b2ab082d2cc082e8ad762890f26a98f199d7b7160e61cffc324eab1f5d03728f5246b1131d68
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5cabf41f27587ae6e69b3127d6f7620ed
SHA19312521536476aa65cb0a98cd08bab3ea58551e6
SHA256ba3ad52aeb30cd52399284d008803c0d87801b56df02d06e868189e7785bd523
SHA512d660cda543ebb093b60f067a6a45ffa9f86a6815a2baf087a39cf81cc02205e0fc52f944baf96ab4897606a1eeccf3f79b4307852d32eb9a90dde802c06d2f1b