Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
11/07/2024, 05:12
Static task
static1
Behavioral task
behavioral1
Sample
37d3b1dc423c2baba0c0c276a54b90d4_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
37d3b1dc423c2baba0c0c276a54b90d4_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
37d3b1dc423c2baba0c0c276a54b90d4_JaffaCakes118.html
-
Size
57KB
-
MD5
37d3b1dc423c2baba0c0c276a54b90d4
-
SHA1
28a8de1991704914dfb9bce1a85c21fed0a4b6ff
-
SHA256
9349b3a5866c409ba866a416c0aaecb6743046fc8e2d01713afb81aa9d51ad96
-
SHA512
0a5181ebf21d54acf41e6c2bac37a82abcc62748b8e84e205acaaf997be11b0b148349f9958977a6574d5b49586573f4c4a7f6f37a7ce7512f2bc3712c6caca1
-
SSDEEP
1536:ijEQvK8OPHdsAXo2vgyHJv0owbd6zKD6CDK2RVrozxwpDK2RVy:ijnOPHdsB2vgyHJutDK2RVrozxwpDK2m
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3308 msedge.exe 3308 msedge.exe 2312 msedge.exe 2312 msedge.exe 3848 identity_helper.exe 3848 identity_helper.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe 3124 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe 2312 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2312 wrote to memory of 456 2312 msedge.exe 83 PID 2312 wrote to memory of 456 2312 msedge.exe 83 PID 2312 wrote to memory of 1780 2312 msedge.exe 85 PID 2312 wrote to memory of 1780 2312 msedge.exe 85 PID 2312 wrote to memory of 1780 2312 msedge.exe 85 PID 2312 wrote to memory of 1780 2312 msedge.exe 85 PID 2312 wrote to memory of 1780 2312 msedge.exe 85 PID 2312 wrote to memory of 1780 2312 msedge.exe 85 PID 2312 wrote to memory of 1780 2312 msedge.exe 85 PID 2312 wrote to memory of 1780 2312 msedge.exe 85 PID 2312 wrote to memory of 1780 2312 msedge.exe 85 PID 2312 wrote to memory of 1780 2312 msedge.exe 85 PID 2312 wrote to memory of 1780 2312 msedge.exe 85 PID 2312 wrote to memory of 1780 2312 msedge.exe 85 PID 2312 wrote to memory of 1780 2312 msedge.exe 85 PID 2312 wrote to memory of 1780 2312 msedge.exe 85 PID 2312 wrote to memory of 1780 2312 msedge.exe 85 PID 2312 wrote to memory of 1780 2312 msedge.exe 85 PID 2312 wrote to memory of 1780 2312 msedge.exe 85 PID 2312 wrote to memory of 1780 2312 msedge.exe 85 PID 2312 wrote to memory of 1780 2312 msedge.exe 85 PID 2312 wrote to memory of 1780 2312 msedge.exe 85 PID 2312 wrote to memory of 1780 2312 msedge.exe 85 PID 2312 wrote to memory of 1780 2312 msedge.exe 85 PID 2312 wrote to memory of 1780 2312 msedge.exe 85 PID 2312 wrote to memory of 1780 2312 msedge.exe 85 PID 2312 wrote to memory of 1780 2312 msedge.exe 85 PID 2312 wrote to memory of 1780 2312 msedge.exe 85 PID 2312 wrote to memory of 1780 2312 msedge.exe 85 PID 2312 wrote to memory of 1780 2312 msedge.exe 85 PID 2312 wrote to memory of 1780 2312 msedge.exe 85 PID 2312 wrote to memory of 1780 2312 msedge.exe 85 PID 2312 wrote to memory of 1780 2312 msedge.exe 85 PID 2312 wrote to memory of 1780 2312 msedge.exe 85 PID 2312 wrote to memory of 1780 2312 msedge.exe 85 PID 2312 wrote to memory of 1780 2312 msedge.exe 85 PID 2312 wrote to memory of 1780 2312 msedge.exe 85 PID 2312 wrote to memory of 1780 2312 msedge.exe 85 PID 2312 wrote to memory of 1780 2312 msedge.exe 85 PID 2312 wrote to memory of 1780 2312 msedge.exe 85 PID 2312 wrote to memory of 1780 2312 msedge.exe 85 PID 2312 wrote to memory of 1780 2312 msedge.exe 85 PID 2312 wrote to memory of 3308 2312 msedge.exe 86 PID 2312 wrote to memory of 3308 2312 msedge.exe 86 PID 2312 wrote to memory of 1672 2312 msedge.exe 87 PID 2312 wrote to memory of 1672 2312 msedge.exe 87 PID 2312 wrote to memory of 1672 2312 msedge.exe 87 PID 2312 wrote to memory of 1672 2312 msedge.exe 87 PID 2312 wrote to memory of 1672 2312 msedge.exe 87 PID 2312 wrote to memory of 1672 2312 msedge.exe 87 PID 2312 wrote to memory of 1672 2312 msedge.exe 87 PID 2312 wrote to memory of 1672 2312 msedge.exe 87 PID 2312 wrote to memory of 1672 2312 msedge.exe 87 PID 2312 wrote to memory of 1672 2312 msedge.exe 87 PID 2312 wrote to memory of 1672 2312 msedge.exe 87 PID 2312 wrote to memory of 1672 2312 msedge.exe 87 PID 2312 wrote to memory of 1672 2312 msedge.exe 87 PID 2312 wrote to memory of 1672 2312 msedge.exe 87 PID 2312 wrote to memory of 1672 2312 msedge.exe 87 PID 2312 wrote to memory of 1672 2312 msedge.exe 87 PID 2312 wrote to memory of 1672 2312 msedge.exe 87 PID 2312 wrote to memory of 1672 2312 msedge.exe 87 PID 2312 wrote to memory of 1672 2312 msedge.exe 87 PID 2312 wrote to memory of 1672 2312 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\37d3b1dc423c2baba0c0c276a54b90d4_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc1bd346f8,0x7ffc1bd34708,0x7ffc1bd347182⤵PID:456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2172,9833843121083122544,9401393453743233231,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2152 /prefetch:22⤵PID:1780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2172,9833843121083122544,9401393453743233231,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2256 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2172,9833843121083122544,9401393453743233231,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2908 /prefetch:82⤵PID:1672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,9833843121083122544,9401393453743233231,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:2324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,9833843121083122544,9401393453743233231,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:4716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,9833843121083122544,9401393453743233231,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4668 /prefetch:12⤵PID:2844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,9833843121083122544,9401393453743233231,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4132 /prefetch:12⤵PID:2848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,9833843121083122544,9401393453743233231,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4232 /prefetch:12⤵PID:2460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,9833843121083122544,9401393453743233231,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5728 /prefetch:12⤵PID:2424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,9833843121083122544,9401393453743233231,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5680 /prefetch:12⤵PID:5072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,9833843121083122544,9401393453743233231,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5360 /prefetch:12⤵PID:2892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2172,9833843121083122544,9401393453743233231,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6084 /prefetch:82⤵PID:4884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2172,9833843121083122544,9401393453743233231,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6084 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,9833843121083122544,9401393453743233231,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6412 /prefetch:12⤵PID:4008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,9833843121083122544,9401393453743233231,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5816 /prefetch:12⤵PID:4380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2172,9833843121083122544,9401393453743233231,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6336 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3124
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:628
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1192
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c00b0d6e0f836dfa596c6df9d3b2f8f2
SHA169ad27d9b4502630728f98917f67307e9dd12a30
SHA256578481cd359c669455e24983b13723c25584f58925b47283cb580019ef3142b1
SHA5120e098ab5f5772fec17880e228a0dccbbaa06dc1af14e0fd827f361599c61899fe07d612a7f7b049ff6661d27fdc495566dd20fc28ceed022b87c212bf00be5da
-
Filesize
152B
MD554f1b76300ce15e44e5cc1a3947f5ca9
SHA1c978bfaa6ec6dae05464c6426eaa6cb3c3e2f3b7
SHA25643dec5d87b7ee892a3d99cb61f772ba403882ac0772423f36034e84244c1ca24
SHA512ac26e5676c675be329eb62b5d5a36a0e6014ab8a6366684b0fc2a59ae5f061f596f462b82eb4e9f135d2235a0cbd4af96680d234eecc873a8397fd81507d277a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize768B
MD54c58dfa2423b27997ea4767b4335e32c
SHA1bde8d7d6c0c527c71b5c95af02be69e43c4cdc08
SHA2567ff1858e97ecf64fce247ed2902a1bb67b12ad6975145a4aad4ae96bf8a40056
SHA5120421cf4096ec38763b76e0cf4215008edf143ea14f57511a5fe86949c493f8beb4109a7b928e61df6e12df557a9d2ff06de6e8c8fa7e5522d11ed3c183cabbff
-
Filesize
1KB
MD5e6a9169c6b3ae8e4f261b8fbb5abc3ef
SHA1397379466a0f20ea37ed2022608cb82fcfb33600
SHA2569db6c85d848db4888a23089595d03237377963e238f74df7ba0e132d96a9e4e2
SHA512939ef79d8d2abbfbf5e527bccae44c1d087910ac1bd58cc6b65fac7a6acc255b5fa22ef2f06ded5ee28b846c71fe1b29d1360edb856d5f0a424e1a03967ef09a
-
Filesize
6KB
MD59fc367090d47c52630a7cdd7be53837b
SHA17cc786cce911d490d37a2ac4b40628e33721adab
SHA256c1fa3c5c3fe3f8a3e56c13f1cb39426a02f1e7bdd087c2203594e71ab0593632
SHA5122ba452397aef0f1899590bbb2e04144c64512a1347a8ec26b2113cf078ed460998ca6623d8ce70b49e05e81f6bc250aa81656eaf819ffc758717921800d276de
-
Filesize
6KB
MD5a81556f5542817e47c126406af774de8
SHA1ef830632422ee8f5e1f9d25e1f568a2123938337
SHA2566371d923dc26775e206f91705e8cf2a19b076b1815e35122ed4890d0107c414e
SHA5129aa1d41d59ac4520ecb14074c50173ed520102407e8fc3c24bd29d1ca3bee76b86136ed2ef24211ecc304ee16db32f1dc423fd49c2568e0a39b5d53d841d8b55
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5c699f85af4823054a3ff0007c33d573f
SHA1f9d80487231de04639a2c2deac62e337f39e6a7e
SHA25670ec67ae3bf80ca45c2cc47e709e0a249025a2862d5f28e3083e4e0d415c096b
SHA512bebea8a838e276b1d64973870a34e0d7fb074d7c046b5505b5b2e29480f03dcc7be48757f788ddd08f352fd94a36e539b46a086ce4d28aad6c7050aa85f0c8b3