Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
11/07/2024, 20:28
Static task
static1
Behavioral task
behavioral1
Sample
3a9b61994885e788009720d6245ce4f2_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3a9b61994885e788009720d6245ce4f2_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
3a9b61994885e788009720d6245ce4f2_JaffaCakes118.html
-
Size
10KB
-
MD5
3a9b61994885e788009720d6245ce4f2
-
SHA1
d55778b8dd2e1cf46db5945c18924d2874dea623
-
SHA256
19c2c5ea68b4f723740797938203834cf7adc0296dcdc909b55b67ee8d96d321
-
SHA512
737fe01e2a4f56c0a6051e3bf082b179152830986a535c0e13146b4484acc1890673485b6a0bcb1dcb420ce0d16f3607dc624dfc6dc5b8d58b791ca33ac5262e
-
SSDEEP
192:2V+lIsr03aP8k/w1wvqVkZfBZgn8rC3E/013auBuLbdU8d:s+lIcuaJ/gYfBZgn8rC3E/03aguLZ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 400 msedge.exe 400 msedge.exe 6084 msedge.exe 6084 msedge.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 6084 msedge.exe 6084 msedge.exe 6084 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 6084 msedge.exe 6084 msedge.exe 6084 msedge.exe 6084 msedge.exe 6084 msedge.exe 6084 msedge.exe 6084 msedge.exe 6084 msedge.exe 6084 msedge.exe 6084 msedge.exe 6084 msedge.exe 6084 msedge.exe 6084 msedge.exe 6084 msedge.exe 6084 msedge.exe 6084 msedge.exe 6084 msedge.exe 6084 msedge.exe 6084 msedge.exe 6084 msedge.exe 6084 msedge.exe 6084 msedge.exe 6084 msedge.exe 6084 msedge.exe 6084 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 6084 msedge.exe 6084 msedge.exe 6084 msedge.exe 6084 msedge.exe 6084 msedge.exe 6084 msedge.exe 6084 msedge.exe 6084 msedge.exe 6084 msedge.exe 6084 msedge.exe 6084 msedge.exe 6084 msedge.exe 6084 msedge.exe 6084 msedge.exe 6084 msedge.exe 6084 msedge.exe 6084 msedge.exe 6084 msedge.exe 6084 msedge.exe 6084 msedge.exe 6084 msedge.exe 6084 msedge.exe 6084 msedge.exe 6084 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 6084 wrote to memory of 5796 6084 msedge.exe 86 PID 6084 wrote to memory of 5796 6084 msedge.exe 86 PID 6084 wrote to memory of 4956 6084 msedge.exe 87 PID 6084 wrote to memory of 4956 6084 msedge.exe 87 PID 6084 wrote to memory of 4956 6084 msedge.exe 87 PID 6084 wrote to memory of 4956 6084 msedge.exe 87 PID 6084 wrote to memory of 4956 6084 msedge.exe 87 PID 6084 wrote to memory of 4956 6084 msedge.exe 87 PID 6084 wrote to memory of 4956 6084 msedge.exe 87 PID 6084 wrote to memory of 4956 6084 msedge.exe 87 PID 6084 wrote to memory of 4956 6084 msedge.exe 87 PID 6084 wrote to memory of 4956 6084 msedge.exe 87 PID 6084 wrote to memory of 4956 6084 msedge.exe 87 PID 6084 wrote to memory of 4956 6084 msedge.exe 87 PID 6084 wrote to memory of 4956 6084 msedge.exe 87 PID 6084 wrote to memory of 4956 6084 msedge.exe 87 PID 6084 wrote to memory of 4956 6084 msedge.exe 87 PID 6084 wrote to memory of 4956 6084 msedge.exe 87 PID 6084 wrote to memory of 4956 6084 msedge.exe 87 PID 6084 wrote to memory of 4956 6084 msedge.exe 87 PID 6084 wrote to memory of 4956 6084 msedge.exe 87 PID 6084 wrote to memory of 4956 6084 msedge.exe 87 PID 6084 wrote to memory of 4956 6084 msedge.exe 87 PID 6084 wrote to memory of 4956 6084 msedge.exe 87 PID 6084 wrote to memory of 4956 6084 msedge.exe 87 PID 6084 wrote to memory of 4956 6084 msedge.exe 87 PID 6084 wrote to memory of 4956 6084 msedge.exe 87 PID 6084 wrote to memory of 4956 6084 msedge.exe 87 PID 6084 wrote to memory of 4956 6084 msedge.exe 87 PID 6084 wrote to memory of 4956 6084 msedge.exe 87 PID 6084 wrote to memory of 4956 6084 msedge.exe 87 PID 6084 wrote to memory of 4956 6084 msedge.exe 87 PID 6084 wrote to memory of 4956 6084 msedge.exe 87 PID 6084 wrote to memory of 4956 6084 msedge.exe 87 PID 6084 wrote to memory of 4956 6084 msedge.exe 87 PID 6084 wrote to memory of 4956 6084 msedge.exe 87 PID 6084 wrote to memory of 4956 6084 msedge.exe 87 PID 6084 wrote to memory of 4956 6084 msedge.exe 87 PID 6084 wrote to memory of 4956 6084 msedge.exe 87 PID 6084 wrote to memory of 4956 6084 msedge.exe 87 PID 6084 wrote to memory of 4956 6084 msedge.exe 87 PID 6084 wrote to memory of 4956 6084 msedge.exe 87 PID 6084 wrote to memory of 400 6084 msedge.exe 88 PID 6084 wrote to memory of 400 6084 msedge.exe 88 PID 6084 wrote to memory of 1388 6084 msedge.exe 89 PID 6084 wrote to memory of 1388 6084 msedge.exe 89 PID 6084 wrote to memory of 1388 6084 msedge.exe 89 PID 6084 wrote to memory of 1388 6084 msedge.exe 89 PID 6084 wrote to memory of 1388 6084 msedge.exe 89 PID 6084 wrote to memory of 1388 6084 msedge.exe 89 PID 6084 wrote to memory of 1388 6084 msedge.exe 89 PID 6084 wrote to memory of 1388 6084 msedge.exe 89 PID 6084 wrote to memory of 1388 6084 msedge.exe 89 PID 6084 wrote to memory of 1388 6084 msedge.exe 89 PID 6084 wrote to memory of 1388 6084 msedge.exe 89 PID 6084 wrote to memory of 1388 6084 msedge.exe 89 PID 6084 wrote to memory of 1388 6084 msedge.exe 89 PID 6084 wrote to memory of 1388 6084 msedge.exe 89 PID 6084 wrote to memory of 1388 6084 msedge.exe 89 PID 6084 wrote to memory of 1388 6084 msedge.exe 89 PID 6084 wrote to memory of 1388 6084 msedge.exe 89 PID 6084 wrote to memory of 1388 6084 msedge.exe 89 PID 6084 wrote to memory of 1388 6084 msedge.exe 89 PID 6084 wrote to memory of 1388 6084 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\3a9b61994885e788009720d6245ce4f2_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:6084 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbbe1d46f8,0x7ffbbe1d4708,0x7ffbbe1d47182⤵PID:5796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2212,2846411200571296046,18082254502625078859,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2228 /prefetch:22⤵PID:4956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2212,2846411200571296046,18082254502625078859,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2288 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2212,2846411200571296046,18082254502625078859,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2668 /prefetch:82⤵PID:1388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,2846411200571296046,18082254502625078859,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:1452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,2846411200571296046,18082254502625078859,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:1536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,2846411200571296046,18082254502625078859,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4724 /prefetch:12⤵PID:2100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2212,2846411200571296046,18082254502625078859,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6132 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2416
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2424
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3680
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD58dc45b70cbe29a357e2c376a0c2b751b
SHA125d623cea817f86b8427db53b82340410c1489b2
SHA256511cfb6bedbad2530b5cc5538b6ec2184fc4f85947ba4c8166d0bb9f5fe2703a
SHA5123ce0f52675feb16d6e62aae1c50767da178b93bdae28bacf6df3a2f72b8cc75b09c5092d9065e0872e5d09fd9ffe0c6931d6ae1943ddb1927b85d60659ef866e
-
Filesize
152B
MD51790c766c15938258a4f9b984cf68312
SHA115c9827d278d28b23a8ea0389d42fa87e404359f
SHA2562e3978bb58c701f3c6b05de9349b7334a194591bec7bcf73f53527dc0991dc63
SHA5122682d9c60c9d67608cf140b6ca4958d890bcbc3c8a8e95fcc639d2a11bb0ec348ca55ae99a5840e1f50e5c5bcf3e27c97fc877582d869d98cc4ea3448315aafb
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD5d5236400e369f3ac05860498b52ad874
SHA12a952d6a87b8d527214758f5019a3cd029590cb7
SHA25667bc610e94290fd4ca869f39fba026703857909832964f53f8a2038f8d37c143
SHA512d8bccf3bb1bf54fe1a93302499aa72c59c0403f7a7cfbc1cd6b60370e755e62268f9fc6f9f62eba8f1223c80682cffcbdb21a68e9770b5b266db7ccce1569333
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
6KB
MD5506c5969c738b7e3240cac675d1a21d0
SHA197b7bcdf87a86b134c83283e12fe2a3cc1994cef
SHA25630ed3bae06531cf703aeb16bc6dd0fe78de8cda892b8c5e2c608a75e98f3af18
SHA512da5a44c7b0bae4e5b797772cebbc4918c2c01ac45a23e63d416d8a31dae81f3c504009abf94d2643110fee5fe4973d91514e73b90a08e6ba68955c29118b3dfe
-
Filesize
6KB
MD532124aa5273005fc84f483fb4753f043
SHA1469ec10129a833faec32c102be4e3cc36e5cedc6
SHA25669cc9593ca9abc8dc6688b4f4c908780430607cb0d14e4357ad35aa2909d9971
SHA51251624578c9a0fdcf65937a0e4afb3951e7cfa71e2dcc231307400579a8fefcf9710c876b637ea24dfd722a851c88be730fd785618c6cf4f3e02fd8ec6ec26b6a
-
Filesize
11KB
MD50911dc986d9021e8653951db9e15026b
SHA1ed58729132ea5ca387a07964ad27ff2afb254cbb
SHA256d209a6b43e186ee264eafaf6da6b79d0a5b76884d605891d5edef33574c87ac4
SHA51256d4342e3e1cfc0d05722e50a71a75e02390aaf6feb8cc7644e21d301b9b3493fc792f6b62eb715ef76677e02c75835aa15249fc29ed997e35f4464c16ac7496