Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
28-07-2024 00:12
Static task
static1
Behavioral task
behavioral1
Sample
034bfe8fe76aa3cd109d16023e356edd_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
034bfe8fe76aa3cd109d16023e356edd_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
034bfe8fe76aa3cd109d16023e356edd_JaffaCakes118.html
-
Size
229KB
-
MD5
034bfe8fe76aa3cd109d16023e356edd
-
SHA1
b6258e0a9d51f2ba1b769622d3b85589365b45d5
-
SHA256
5e5e4ac18176953352a9da2d18281b8762ce351e3213ea5c43156ca6003a48b6
-
SHA512
b231079992e11f713ccecf6313120be657a6e26d84344ea6c921ffd3547871f69b6da9b071478519d8dd896f6c35dc49fd7096c31672d05dfc6b802eab3e7366
-
SSDEEP
3072:vrUEvNz//geesR+g1Qt5oPmhymhEImh+NFZhGzymc8:zUEvNWhBh+htL
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1524 msedge.exe 1524 msedge.exe 468 msedge.exe 468 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 468 msedge.exe 468 msedge.exe 468 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 468 wrote to memory of 2224 468 msedge.exe 84 PID 468 wrote to memory of 2224 468 msedge.exe 84 PID 468 wrote to memory of 3824 468 msedge.exe 85 PID 468 wrote to memory of 3824 468 msedge.exe 85 PID 468 wrote to memory of 3824 468 msedge.exe 85 PID 468 wrote to memory of 3824 468 msedge.exe 85 PID 468 wrote to memory of 3824 468 msedge.exe 85 PID 468 wrote to memory of 3824 468 msedge.exe 85 PID 468 wrote to memory of 3824 468 msedge.exe 85 PID 468 wrote to memory of 3824 468 msedge.exe 85 PID 468 wrote to memory of 3824 468 msedge.exe 85 PID 468 wrote to memory of 3824 468 msedge.exe 85 PID 468 wrote to memory of 3824 468 msedge.exe 85 PID 468 wrote to memory of 3824 468 msedge.exe 85 PID 468 wrote to memory of 3824 468 msedge.exe 85 PID 468 wrote to memory of 3824 468 msedge.exe 85 PID 468 wrote to memory of 3824 468 msedge.exe 85 PID 468 wrote to memory of 3824 468 msedge.exe 85 PID 468 wrote to memory of 3824 468 msedge.exe 85 PID 468 wrote to memory of 3824 468 msedge.exe 85 PID 468 wrote to memory of 3824 468 msedge.exe 85 PID 468 wrote to memory of 3824 468 msedge.exe 85 PID 468 wrote to memory of 3824 468 msedge.exe 85 PID 468 wrote to memory of 3824 468 msedge.exe 85 PID 468 wrote to memory of 3824 468 msedge.exe 85 PID 468 wrote to memory of 3824 468 msedge.exe 85 PID 468 wrote to memory of 3824 468 msedge.exe 85 PID 468 wrote to memory of 3824 468 msedge.exe 85 PID 468 wrote to memory of 3824 468 msedge.exe 85 PID 468 wrote to memory of 3824 468 msedge.exe 85 PID 468 wrote to memory of 3824 468 msedge.exe 85 PID 468 wrote to memory of 3824 468 msedge.exe 85 PID 468 wrote to memory of 3824 468 msedge.exe 85 PID 468 wrote to memory of 3824 468 msedge.exe 85 PID 468 wrote to memory of 3824 468 msedge.exe 85 PID 468 wrote to memory of 3824 468 msedge.exe 85 PID 468 wrote to memory of 3824 468 msedge.exe 85 PID 468 wrote to memory of 3824 468 msedge.exe 85 PID 468 wrote to memory of 3824 468 msedge.exe 85 PID 468 wrote to memory of 3824 468 msedge.exe 85 PID 468 wrote to memory of 3824 468 msedge.exe 85 PID 468 wrote to memory of 3824 468 msedge.exe 85 PID 468 wrote to memory of 1524 468 msedge.exe 86 PID 468 wrote to memory of 1524 468 msedge.exe 86 PID 468 wrote to memory of 1488 468 msedge.exe 87 PID 468 wrote to memory of 1488 468 msedge.exe 87 PID 468 wrote to memory of 1488 468 msedge.exe 87 PID 468 wrote to memory of 1488 468 msedge.exe 87 PID 468 wrote to memory of 1488 468 msedge.exe 87 PID 468 wrote to memory of 1488 468 msedge.exe 87 PID 468 wrote to memory of 1488 468 msedge.exe 87 PID 468 wrote to memory of 1488 468 msedge.exe 87 PID 468 wrote to memory of 1488 468 msedge.exe 87 PID 468 wrote to memory of 1488 468 msedge.exe 87 PID 468 wrote to memory of 1488 468 msedge.exe 87 PID 468 wrote to memory of 1488 468 msedge.exe 87 PID 468 wrote to memory of 1488 468 msedge.exe 87 PID 468 wrote to memory of 1488 468 msedge.exe 87 PID 468 wrote to memory of 1488 468 msedge.exe 87 PID 468 wrote to memory of 1488 468 msedge.exe 87 PID 468 wrote to memory of 1488 468 msedge.exe 87 PID 468 wrote to memory of 1488 468 msedge.exe 87 PID 468 wrote to memory of 1488 468 msedge.exe 87 PID 468 wrote to memory of 1488 468 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\034bfe8fe76aa3cd109d16023e356edd_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:468 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffafc8146f8,0x7ffafc814708,0x7ffafc8147182⤵PID:2224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,8628730409912949171,5268598739706562065,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2152 /prefetch:22⤵PID:3824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,8628730409912949171,5268598739706562065,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2268 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2136,8628730409912949171,5268598739706562065,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2808 /prefetch:82⤵PID:1488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,8628730409912949171,5268598739706562065,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3196 /prefetch:12⤵PID:5076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,8628730409912949171,5268598739706562065,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:4372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,8628730409912949171,5268598739706562065,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3796 /prefetch:12⤵PID:3164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,8628730409912949171,5268598739706562065,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4648 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3792
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4924
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3024
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5bafce9e4c53a0cb85310891b6b21791b
SHA15d70027cc137a7cbb38f5801b15fd97b05e89ee2
SHA25671fb546b5d2210a56e90b448ee10120cd92c518c8f79fb960f01b918f89f2b00
SHA512c0e4d3eccc0135ac92051539a18f64b8b8628cfe74e5b019d4f8e1dcbb51a9b49c486a1523885fe6be53da7118c013852e753c26a5490538c1e721fd0188836c
-
Filesize
152B
MD5a499254d6b5d91f97eb7a86e5f8ca573
SHA103dbfebfec8c94a9c06f9b0cd81ebe0a2b8be3d1
SHA256fb87b758c2b98989df851380293ff6786cb9a5cf2b3a384cec70d9f3eb064499
SHA512d7adcc76d0470bcd68d7644de3c8d2b6d61df8485979a4752ceea3df4d85bd1c290f72b3d8d5c8d639d5a10afa48d80e457f76b44dd8107ac97eb80fd98c7b0c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD5f550f9b9d8d1d2cb97e5d7cd0cc7aa35
SHA1a5f109ce9d0e85b1782149d7d1d6e74c7d4ef635
SHA2567b47810f1bc592a1f18d999dddf385de776b2892fe8f26fb35a68b0322299269
SHA51297653436d4edbbed4841c5915ae9fb391b5364b6bc7f047bc6bdf2db4ebfbfb2e1d7d039c15ddc03cdd9d970c72dee406a089edd2a89e9877ecb3a5d056e73e1
-
Filesize
1KB
MD5d1dff237e802a58e65331bbe7de6426d
SHA179778c90fbaf62f31fa800ab8523ac60580f9854
SHA256c07162aeded1b292055c037a50ac13bb1b71d587a8c4f12f372b56b2165aa316
SHA512414044d0a6cb61b363088b6b727ca0f3c8049e4f75a6786f5e45b8db88e3d8fed6f85bf2a9f2a308bcb67c22fbc7bd2382578882a57519f40ce2040bb262bb7c
-
Filesize
5KB
MD5a497173bd76752d44e0a0c093e3101d9
SHA1edb7f1cb3cb87e71982da1bcb63100263934525b
SHA25686e1ae6cf0d20d26a24b614b17bfc8337d06d7d9ed68613badc700ce85be0000
SHA512415b1b9c3012ef59a74828726580899087a0e221d2df68734120778ddc9dceac433002c7e257d23465a32af9f1b4c329dc5b3b8ae650960fe631b69fca580a3b
-
Filesize
6KB
MD5582f44ea93331eb4cba589add9495331
SHA1adb483c0625267ff2b5faaffdc27e599203f8815
SHA2568d79f303bd06511a55f8a0204dc7db1bd43225d636fddc1e6b57a08b0e4ce2c0
SHA51282cdf4396b87ddae1c3a56e252f4ad5b48785519c160b307adaee9445aab8ecd1fd183f72af6f442ee7ad689edb267a7ec37026baf40309a53525c98229b55ba
-
Filesize
10KB
MD5d5efbe214ccc9672f5624e6f5c36b124
SHA1a42c5e81e13651e7955b14ac06b355636159addc
SHA2564cdd46d2acaec826c39d1a3ba2202d330e2afe705cc5f77b7a3e34b04c21b19f
SHA512f27b3446991d688fb3c8839edd1f5bad7055119b77cad2f542de78171f6eb67063aa5665598bd9a5f7e5c2939e4e2eae17a9f04039ada6bb6e6a8c8ad95586f0