Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
10-07-2024 10:26
Static task
static1
Behavioral task
behavioral1
Sample
3457bea8368868230d1aea31fedec38d_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3457bea8368868230d1aea31fedec38d_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
3457bea8368868230d1aea31fedec38d_JaffaCakes118.html
-
Size
19KB
-
MD5
3457bea8368868230d1aea31fedec38d
-
SHA1
e05fd763cee6325bb37e8401de0a4e328f3f6706
-
SHA256
c44a6ca0f219ba3e6cab5a17f01a5e691a01be4b9396ecc2b0c481067602ce8a
-
SHA512
f02b6400b750b7830fabc0dc3e5e46f9d71ce0f283bbf1eb41d21930dd551602bd628db17d8ec25f55dd35137ec816267e09aa26c35a37473090d686151b7e56
-
SSDEEP
384:iu6/K7o0lNW3gnK5KgczITHLDmzi85I8L:JlPeoxL
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 60 msedge.exe 60 msedge.exe 3480 msedge.exe 3480 msedge.exe 3084 identity_helper.exe 3084 identity_helper.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe 1852 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe 3480 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3480 wrote to memory of 3008 3480 msedge.exe 83 PID 3480 wrote to memory of 3008 3480 msedge.exe 83 PID 3480 wrote to memory of 3344 3480 msedge.exe 84 PID 3480 wrote to memory of 3344 3480 msedge.exe 84 PID 3480 wrote to memory of 3344 3480 msedge.exe 84 PID 3480 wrote to memory of 3344 3480 msedge.exe 84 PID 3480 wrote to memory of 3344 3480 msedge.exe 84 PID 3480 wrote to memory of 3344 3480 msedge.exe 84 PID 3480 wrote to memory of 3344 3480 msedge.exe 84 PID 3480 wrote to memory of 3344 3480 msedge.exe 84 PID 3480 wrote to memory of 3344 3480 msedge.exe 84 PID 3480 wrote to memory of 3344 3480 msedge.exe 84 PID 3480 wrote to memory of 3344 3480 msedge.exe 84 PID 3480 wrote to memory of 3344 3480 msedge.exe 84 PID 3480 wrote to memory of 3344 3480 msedge.exe 84 PID 3480 wrote to memory of 3344 3480 msedge.exe 84 PID 3480 wrote to memory of 3344 3480 msedge.exe 84 PID 3480 wrote to memory of 3344 3480 msedge.exe 84 PID 3480 wrote to memory of 3344 3480 msedge.exe 84 PID 3480 wrote to memory of 3344 3480 msedge.exe 84 PID 3480 wrote to memory of 3344 3480 msedge.exe 84 PID 3480 wrote to memory of 3344 3480 msedge.exe 84 PID 3480 wrote to memory of 3344 3480 msedge.exe 84 PID 3480 wrote to memory of 3344 3480 msedge.exe 84 PID 3480 wrote to memory of 3344 3480 msedge.exe 84 PID 3480 wrote to memory of 3344 3480 msedge.exe 84 PID 3480 wrote to memory of 3344 3480 msedge.exe 84 PID 3480 wrote to memory of 3344 3480 msedge.exe 84 PID 3480 wrote to memory of 3344 3480 msedge.exe 84 PID 3480 wrote to memory of 3344 3480 msedge.exe 84 PID 3480 wrote to memory of 3344 3480 msedge.exe 84 PID 3480 wrote to memory of 3344 3480 msedge.exe 84 PID 3480 wrote to memory of 3344 3480 msedge.exe 84 PID 3480 wrote to memory of 3344 3480 msedge.exe 84 PID 3480 wrote to memory of 3344 3480 msedge.exe 84 PID 3480 wrote to memory of 3344 3480 msedge.exe 84 PID 3480 wrote to memory of 3344 3480 msedge.exe 84 PID 3480 wrote to memory of 3344 3480 msedge.exe 84 PID 3480 wrote to memory of 3344 3480 msedge.exe 84 PID 3480 wrote to memory of 3344 3480 msedge.exe 84 PID 3480 wrote to memory of 3344 3480 msedge.exe 84 PID 3480 wrote to memory of 3344 3480 msedge.exe 84 PID 3480 wrote to memory of 60 3480 msedge.exe 85 PID 3480 wrote to memory of 60 3480 msedge.exe 85 PID 3480 wrote to memory of 864 3480 msedge.exe 86 PID 3480 wrote to memory of 864 3480 msedge.exe 86 PID 3480 wrote to memory of 864 3480 msedge.exe 86 PID 3480 wrote to memory of 864 3480 msedge.exe 86 PID 3480 wrote to memory of 864 3480 msedge.exe 86 PID 3480 wrote to memory of 864 3480 msedge.exe 86 PID 3480 wrote to memory of 864 3480 msedge.exe 86 PID 3480 wrote to memory of 864 3480 msedge.exe 86 PID 3480 wrote to memory of 864 3480 msedge.exe 86 PID 3480 wrote to memory of 864 3480 msedge.exe 86 PID 3480 wrote to memory of 864 3480 msedge.exe 86 PID 3480 wrote to memory of 864 3480 msedge.exe 86 PID 3480 wrote to memory of 864 3480 msedge.exe 86 PID 3480 wrote to memory of 864 3480 msedge.exe 86 PID 3480 wrote to memory of 864 3480 msedge.exe 86 PID 3480 wrote to memory of 864 3480 msedge.exe 86 PID 3480 wrote to memory of 864 3480 msedge.exe 86 PID 3480 wrote to memory of 864 3480 msedge.exe 86 PID 3480 wrote to memory of 864 3480 msedge.exe 86 PID 3480 wrote to memory of 864 3480 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\3457bea8368868230d1aea31fedec38d_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3480 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff911e946f8,0x7ff911e94708,0x7ff911e947182⤵PID:3008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,8987270813544918061,2436916522164910638,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2060 /prefetch:22⤵PID:3344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2044,8987270813544918061,2436916522164910638,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2380 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:60
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2044,8987270813544918061,2436916522164910638,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2796 /prefetch:82⤵PID:864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,8987270813544918061,2436916522164910638,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:3052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,8987270813544918061,2436916522164910638,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:2704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,8987270813544918061,2436916522164910638,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4684 /prefetch:12⤵PID:4824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,8987270813544918061,2436916522164910638,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5148 /prefetch:12⤵PID:1616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2044,8987270813544918061,2436916522164910638,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5792 /prefetch:82⤵PID:4188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2044,8987270813544918061,2436916522164910638,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5792 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,8987270813544918061,2436916522164910638,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4936 /prefetch:12⤵PID:1244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,8987270813544918061,2436916522164910638,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5584 /prefetch:12⤵PID:4552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,8987270813544918061,2436916522164910638,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1712 /prefetch:12⤵PID:2016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,8987270813544918061,2436916522164910638,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5452 /prefetch:12⤵PID:1032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,8987270813544918061,2436916522164910638,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4976 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1852
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4108
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1992
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD58dc45b70cbe29a357e2c376a0c2b751b
SHA125d623cea817f86b8427db53b82340410c1489b2
SHA256511cfb6bedbad2530b5cc5538b6ec2184fc4f85947ba4c8166d0bb9f5fe2703a
SHA5123ce0f52675feb16d6e62aae1c50767da178b93bdae28bacf6df3a2f72b8cc75b09c5092d9065e0872e5d09fd9ffe0c6931d6ae1943ddb1927b85d60659ef866e
-
Filesize
152B
MD51790c766c15938258a4f9b984cf68312
SHA115c9827d278d28b23a8ea0389d42fa87e404359f
SHA2562e3978bb58c701f3c6b05de9349b7334a194591bec7bcf73f53527dc0991dc63
SHA5122682d9c60c9d67608cf140b6ca4958d890bcbc3c8a8e95fcc639d2a11bb0ec348ca55ae99a5840e1f50e5c5bcf3e27c97fc877582d869d98cc4ea3448315aafb
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize168B
MD5e092b708c5233682d1027a1c0bdcb40e
SHA19be6758dbcffee0fac774acda1501710cc7abdcf
SHA25623ba73bce505c40df2eb0a6d67eb16f71c4d730b7f286f3b276f6c3a0ff668a3
SHA5123a255d22ff065c0de140ee4a00d86a56db97047957a8a6d64a8fc0cd0b3b19f5c2ea7ebf485fe54cc97a953c07cf779b10840547b3043c3bc39f4ac8944abfff
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize192B
MD508e06f077f95866daf173bf912690c8f
SHA1ba6baefe1d9ac58991eb58b289947480aafd1fd0
SHA25645ddaea884c9e009fc8ae766be048d5c0f005ce92b74f884fbea938224f85879
SHA5121b899ba46c09f0924522cfd34a2caae6e2d3bf7283cf187138550e405256b3948a293a8b4ddd06fd592aff6dc6a3495f13033685d38b6f67f7395b4477555e0d
-
Filesize
613B
MD504b0f749066617deaa22c290ea969e65
SHA195d27163a11b15ec640e3cc50695932686c6e002
SHA256a323b47e2fec0d9198d122891e0c58e11fbe3dad432644d0ad05392bb328e1ad
SHA5127ad59c8e45f3a8fd3cdcd95c39e84dd1a9e8b93e4103a09dd664c7acad9e150609b3c336351492e497953e29d2f1d6ae9cae33af29bc1b74d3e6ed15a17cfec8
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
6KB
MD55cfd2534019483871443c98a21be0dcf
SHA1389da539175ffa17075ee5b63d06dc6bcb76fd0e
SHA256504314c700fb9c216005c2e32dc72d743a2dd14b016ae1e9560ed4bea69ac7ed
SHA5122d20073b31a8d8aee8b53baa55b1c929bfcb9f78e99a485f65d412fbb00f67aaedf8783707ba8c121f85428a8e969e71013d43a5be28e23176bfcddeca5fe22f
-
Filesize
6KB
MD519d309fe74576782fe846c6ede38864f
SHA170d43f6d353ab0c3fe124fe0323639a359cf1b9c
SHA2561e1a15e9bf197c8a17dd87eeed215b117e2f096da70061c1b1755c262a853337
SHA5124aeaf96ea1f5e45af61991baa78d9185b4a7bbae148d10cad3080ad32bd4ad23f575a8fb433350c71d036e17537d7ddd8ab9c628553b60f09fb6f7c2f09db2ea
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD54fc10ebf9c47db210228657561ee9172
SHA159264b2dd345bb1e31ea9b86731c4d74c652c694
SHA2562a9812630dd524c87daaf38de2e00563d60391d28d0bbb4def8b48f9931a629b
SHA5120518fd3c10a60a5d4ee366a06738f1ca625b040acbdfdda58a5ad80035fe043348d713e73b48c9d9f5a8c2a648d769c377aa5bce4533e91c1fb197fcf064dfac