Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
13/07/2024, 21:15
Static task
static1
Behavioral task
behavioral1
Sample
435d8d4d39728f80dae1132e29237fa7_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
435d8d4d39728f80dae1132e29237fa7_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
435d8d4d39728f80dae1132e29237fa7_JaffaCakes118.html
-
Size
31KB
-
MD5
435d8d4d39728f80dae1132e29237fa7
-
SHA1
9e876c79558bc8aceeb3c0e3d6c2bb03efeb3f38
-
SHA256
2db293010f5e9c773ea9a6a9c9b30957371ed2ac13f6f123132752307616f836
-
SHA512
167b909c7a9500cc91985affd182f56ebe2c296c814bf257ebc26e325b4db4796d956e0f15e6a6270c6dd58f5e8ddca976932e190ceb099149b01e1f30598700
-
SSDEEP
384:rPlIc2t04xfGTHe3UGOOtz9utTGNfkZORrUtSuxyhkxvjpJc0/gbpLOXguLZ:ws4rwyGg9ExLZ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3596 msedge.exe 3596 msedge.exe 996 msedge.exe 996 msedge.exe 1996 msedge.exe 1996 msedge.exe 1996 msedge.exe 1996 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 996 msedge.exe 996 msedge.exe 996 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 996 wrote to memory of 4492 996 msedge.exe 82 PID 996 wrote to memory of 4492 996 msedge.exe 82 PID 996 wrote to memory of 3552 996 msedge.exe 84 PID 996 wrote to memory of 3552 996 msedge.exe 84 PID 996 wrote to memory of 3552 996 msedge.exe 84 PID 996 wrote to memory of 3552 996 msedge.exe 84 PID 996 wrote to memory of 3552 996 msedge.exe 84 PID 996 wrote to memory of 3552 996 msedge.exe 84 PID 996 wrote to memory of 3552 996 msedge.exe 84 PID 996 wrote to memory of 3552 996 msedge.exe 84 PID 996 wrote to memory of 3552 996 msedge.exe 84 PID 996 wrote to memory of 3552 996 msedge.exe 84 PID 996 wrote to memory of 3552 996 msedge.exe 84 PID 996 wrote to memory of 3552 996 msedge.exe 84 PID 996 wrote to memory of 3552 996 msedge.exe 84 PID 996 wrote to memory of 3552 996 msedge.exe 84 PID 996 wrote to memory of 3552 996 msedge.exe 84 PID 996 wrote to memory of 3552 996 msedge.exe 84 PID 996 wrote to memory of 3552 996 msedge.exe 84 PID 996 wrote to memory of 3552 996 msedge.exe 84 PID 996 wrote to memory of 3552 996 msedge.exe 84 PID 996 wrote to memory of 3552 996 msedge.exe 84 PID 996 wrote to memory of 3552 996 msedge.exe 84 PID 996 wrote to memory of 3552 996 msedge.exe 84 PID 996 wrote to memory of 3552 996 msedge.exe 84 PID 996 wrote to memory of 3552 996 msedge.exe 84 PID 996 wrote to memory of 3552 996 msedge.exe 84 PID 996 wrote to memory of 3552 996 msedge.exe 84 PID 996 wrote to memory of 3552 996 msedge.exe 84 PID 996 wrote to memory of 3552 996 msedge.exe 84 PID 996 wrote to memory of 3552 996 msedge.exe 84 PID 996 wrote to memory of 3552 996 msedge.exe 84 PID 996 wrote to memory of 3552 996 msedge.exe 84 PID 996 wrote to memory of 3552 996 msedge.exe 84 PID 996 wrote to memory of 3552 996 msedge.exe 84 PID 996 wrote to memory of 3552 996 msedge.exe 84 PID 996 wrote to memory of 3552 996 msedge.exe 84 PID 996 wrote to memory of 3552 996 msedge.exe 84 PID 996 wrote to memory of 3552 996 msedge.exe 84 PID 996 wrote to memory of 3552 996 msedge.exe 84 PID 996 wrote to memory of 3552 996 msedge.exe 84 PID 996 wrote to memory of 3552 996 msedge.exe 84 PID 996 wrote to memory of 3596 996 msedge.exe 85 PID 996 wrote to memory of 3596 996 msedge.exe 85 PID 996 wrote to memory of 2388 996 msedge.exe 86 PID 996 wrote to memory of 2388 996 msedge.exe 86 PID 996 wrote to memory of 2388 996 msedge.exe 86 PID 996 wrote to memory of 2388 996 msedge.exe 86 PID 996 wrote to memory of 2388 996 msedge.exe 86 PID 996 wrote to memory of 2388 996 msedge.exe 86 PID 996 wrote to memory of 2388 996 msedge.exe 86 PID 996 wrote to memory of 2388 996 msedge.exe 86 PID 996 wrote to memory of 2388 996 msedge.exe 86 PID 996 wrote to memory of 2388 996 msedge.exe 86 PID 996 wrote to memory of 2388 996 msedge.exe 86 PID 996 wrote to memory of 2388 996 msedge.exe 86 PID 996 wrote to memory of 2388 996 msedge.exe 86 PID 996 wrote to memory of 2388 996 msedge.exe 86 PID 996 wrote to memory of 2388 996 msedge.exe 86 PID 996 wrote to memory of 2388 996 msedge.exe 86 PID 996 wrote to memory of 2388 996 msedge.exe 86 PID 996 wrote to memory of 2388 996 msedge.exe 86 PID 996 wrote to memory of 2388 996 msedge.exe 86 PID 996 wrote to memory of 2388 996 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\435d8d4d39728f80dae1132e29237fa7_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:996 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8b27246f8,0x7ff8b2724708,0x7ff8b27247182⤵PID:4492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2220,10083823300333687219,11303011894922201099,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2228 /prefetch:22⤵PID:3552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2220,10083823300333687219,11303011894922201099,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2276 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2220,10083823300333687219,11303011894922201099,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2716 /prefetch:82⤵PID:2388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,10083823300333687219,11303011894922201099,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:4484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,10083823300333687219,11303011894922201099,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:4984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2220,10083823300333687219,11303011894922201099,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4644 /prefetch:12⤵PID:876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2220,10083823300333687219,11303011894922201099,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5100 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1996
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4168
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2136
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5eaaad45aced1889a90a8aa4c39f92659
SHA15c0130d9e8d1a64c97924090d9a5258b8a31b83c
SHA2565e3237f26b6047f64459cd5d3a6bc3563e2642b98d75b97011c93e0a9bd26f3b
SHA5120db1c6bdb51f4e6ba5ef4dc12fc73886e599ab28f1eec5d943110bc3d856401ca31c05baa9026dd441b69f3de92307eb77d93f089ba6e2b84eea6e93982620e4
-
Filesize
152B
MD53ee50fb26a9d3f096c47ff8696c24321
SHA1a8c83e798d2a8b31fec0820560525e80dfa4fe66
SHA256d80ec29cb17280af0c7522b30a80ffa19d1e786c0b09accfe3234b967d23eb6f
SHA512479c0d2b76850aa79b58f9e0a8ba5773bd8909d915b98c2e9dc3a95c0ac18d7741b2ee571df695c0305598d89651c7aef2ff7c2fedb8b6a6aa30057ecfc872c5
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD56f55f94487b0e610292998b1bd43a129
SHA157b21a4d3e7fc42bcda198d3f9b3e8e4bf198486
SHA256769e42216979a6532a8dfac096db7837541a261674e3d192af9401b86b19f17a
SHA51220e120f355e8388cbea37a882d6ab35cf45bed2b0da3dc36e6db18e9789ceb3c36a1b04269ffb9b758cd65749d0423325b0a6703a7c7065248f7991c8dd30aaf
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD58327dab2aecba187e1d6ecbacb5d3bc3
SHA1ca6f956a5c6d54fbaab6391df9ad7e9714e5ff71
SHA256071503b167a9e9193071a67d531ca017d24dec77ae3217cb815651d6f33b63ff
SHA51281c4f677d982e5ab5a1b63376d3ef591ac5bf75d3a8b90184758f2bed00026bcdd421a3b6cc434c1f7571983948a905d6065bec6ef3018c56776163c9ca0918b
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
6KB
MD5ae57c6db90c01e6c9a8a754cb939e9e3
SHA106b4c2e61742c1ecbb84b5a3c2cd2f7444100ba9
SHA25605ea243622c811d569ea28ca5d5bd8c983cf06161533d8e7cbef2eb729d97a10
SHA512f827eff6222e7576ee7edc122f76ca8cfdabebc26013b2b38a16e5256d211ba651e4195ef66b675f4462d0695c8b53f55d663c51ae606593b003c55b60a7d456
-
Filesize
6KB
MD5113131c41f3f6eee822f9b4e3f0c7c3a
SHA1c84dc83c457b131f3b80e94774d3f7f68d36eb07
SHA25659231c5e07f03b924ca3fc628fd8028ca6177dd4cad34aeffa124ecb785e06bf
SHA51213130f792ff856857e57e954b8c127c58300dd9d9be25d8fc992e27f2e5ef2abb833c81c8dc8c38b3253ce78050830f8d134e9b64a72d3d30904cded8fcc5bbf
-
Filesize
11KB
MD531dc3457c5ac91a65bf9ffa887ff9ccb
SHA1e845c2481a242f69dc424b93c434421d3b4ba6f3
SHA256f70bc9dec3f8ff47e903093c0da2ff89fae6a5e0b4db803e9f525be7c967c5ef
SHA5127ba4e5cd4283c9c382df3c9d0060ef7002f7d4fd2923495765b739d188bcd91d61b3d93a229996d42ad7427556ee2ad71a74873644899bfd57145befc1c6cd9a