Analysis
-
max time kernel
145s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08/09/2024, 02:01
Static task
static1
Behavioral task
behavioral1
Sample
d3492a6a8e968844e18f3e85053bd437_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d3492a6a8e968844e18f3e85053bd437_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d3492a6a8e968844e18f3e85053bd437_JaffaCakes118.html
-
Size
51KB
-
MD5
d3492a6a8e968844e18f3e85053bd437
-
SHA1
3018dfa6921d107dc9fce0257642050d42eb738a
-
SHA256
5dc8f17c49f3e6188d45bb90a5358158ceaead0bf37e4cd14955ef4cac6fd74e
-
SHA512
663062006cd6f52a485c47cc1fae740bd53146783939290654a8033f313881bb0db0bfc5c69830a5b8000f9b1239f0ebe163ae8142f41d440df4cab7bceb0900
-
SSDEEP
768:apHvvCIogeQhubLJ/qiKW7Pdnbnnb1HQJoeAu7KxTgpIe6x5ixXhFbuBO3vJ:6Hv7ogTubLJPmbuo
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3620 msedge.exe 3620 msedge.exe 5000 msedge.exe 5000 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5000 wrote to memory of 1724 5000 msedge.exe 85 PID 5000 wrote to memory of 1724 5000 msedge.exe 85 PID 5000 wrote to memory of 2900 5000 msedge.exe 86 PID 5000 wrote to memory of 2900 5000 msedge.exe 86 PID 5000 wrote to memory of 2900 5000 msedge.exe 86 PID 5000 wrote to memory of 2900 5000 msedge.exe 86 PID 5000 wrote to memory of 2900 5000 msedge.exe 86 PID 5000 wrote to memory of 2900 5000 msedge.exe 86 PID 5000 wrote to memory of 2900 5000 msedge.exe 86 PID 5000 wrote to memory of 2900 5000 msedge.exe 86 PID 5000 wrote to memory of 2900 5000 msedge.exe 86 PID 5000 wrote to memory of 2900 5000 msedge.exe 86 PID 5000 wrote to memory of 2900 5000 msedge.exe 86 PID 5000 wrote to memory of 2900 5000 msedge.exe 86 PID 5000 wrote to memory of 2900 5000 msedge.exe 86 PID 5000 wrote to memory of 2900 5000 msedge.exe 86 PID 5000 wrote to memory of 2900 5000 msedge.exe 86 PID 5000 wrote to memory of 2900 5000 msedge.exe 86 PID 5000 wrote to memory of 2900 5000 msedge.exe 86 PID 5000 wrote to memory of 2900 5000 msedge.exe 86 PID 5000 wrote to memory of 2900 5000 msedge.exe 86 PID 5000 wrote to memory of 2900 5000 msedge.exe 86 PID 5000 wrote to memory of 2900 5000 msedge.exe 86 PID 5000 wrote to memory of 2900 5000 msedge.exe 86 PID 5000 wrote to memory of 2900 5000 msedge.exe 86 PID 5000 wrote to memory of 2900 5000 msedge.exe 86 PID 5000 wrote to memory of 2900 5000 msedge.exe 86 PID 5000 wrote to memory of 2900 5000 msedge.exe 86 PID 5000 wrote to memory of 2900 5000 msedge.exe 86 PID 5000 wrote to memory of 2900 5000 msedge.exe 86 PID 5000 wrote to memory of 2900 5000 msedge.exe 86 PID 5000 wrote to memory of 2900 5000 msedge.exe 86 PID 5000 wrote to memory of 2900 5000 msedge.exe 86 PID 5000 wrote to memory of 2900 5000 msedge.exe 86 PID 5000 wrote to memory of 2900 5000 msedge.exe 86 PID 5000 wrote to memory of 2900 5000 msedge.exe 86 PID 5000 wrote to memory of 2900 5000 msedge.exe 86 PID 5000 wrote to memory of 2900 5000 msedge.exe 86 PID 5000 wrote to memory of 2900 5000 msedge.exe 86 PID 5000 wrote to memory of 2900 5000 msedge.exe 86 PID 5000 wrote to memory of 2900 5000 msedge.exe 86 PID 5000 wrote to memory of 2900 5000 msedge.exe 86 PID 5000 wrote to memory of 3620 5000 msedge.exe 87 PID 5000 wrote to memory of 3620 5000 msedge.exe 87 PID 5000 wrote to memory of 2504 5000 msedge.exe 88 PID 5000 wrote to memory of 2504 5000 msedge.exe 88 PID 5000 wrote to memory of 2504 5000 msedge.exe 88 PID 5000 wrote to memory of 2504 5000 msedge.exe 88 PID 5000 wrote to memory of 2504 5000 msedge.exe 88 PID 5000 wrote to memory of 2504 5000 msedge.exe 88 PID 5000 wrote to memory of 2504 5000 msedge.exe 88 PID 5000 wrote to memory of 2504 5000 msedge.exe 88 PID 5000 wrote to memory of 2504 5000 msedge.exe 88 PID 5000 wrote to memory of 2504 5000 msedge.exe 88 PID 5000 wrote to memory of 2504 5000 msedge.exe 88 PID 5000 wrote to memory of 2504 5000 msedge.exe 88 PID 5000 wrote to memory of 2504 5000 msedge.exe 88 PID 5000 wrote to memory of 2504 5000 msedge.exe 88 PID 5000 wrote to memory of 2504 5000 msedge.exe 88 PID 5000 wrote to memory of 2504 5000 msedge.exe 88 PID 5000 wrote to memory of 2504 5000 msedge.exe 88 PID 5000 wrote to memory of 2504 5000 msedge.exe 88 PID 5000 wrote to memory of 2504 5000 msedge.exe 88 PID 5000 wrote to memory of 2504 5000 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\d3492a6a8e968844e18f3e85053bd437_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5000 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8841246f8,0x7ff884124708,0x7ff8841247182⤵PID:1724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,4575210562681423183,1111883775198563866,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2176 /prefetch:22⤵PID:2900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,4575210562681423183,1111883775198563866,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2236 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,4575210562681423183,1111883775198563866,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2784 /prefetch:82⤵PID:2504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,4575210562681423183,1111883775198563866,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:3456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,4575210562681423183,1111883775198563866,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:4536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,4575210562681423183,1111883775198563866,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5156 /prefetch:12⤵PID:1180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,4575210562681423183,1111883775198563866,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5344 /prefetch:12⤵PID:4644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,4575210562681423183,1111883775198563866,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5544 /prefetch:12⤵PID:3888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,4575210562681423183,1111883775198563866,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5112 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1384
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1144
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:852
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ff63763eedb406987ced076e36ec9acf
SHA116365aa97cd1a115412f8ae436d5d4e9be5f7b5d
SHA2568f460e8b7a67f0c65b7248961a7c71146c9e7a19772b193972b486dbf05b8e4c
SHA512ce90336169c8b2de249d4faea2519bf7c3df48ae9d77cdf471dd5dbd8e8542d47d9348080a098074aa63c255890850ee3b80ddb8eef8384919fdca3bb9371d9f
-
Filesize
152B
MD52783c40400a8912a79cfd383da731086
SHA1001a131fe399c30973089e18358818090ca81789
SHA256331fa67da5f67bbb42794c3aeab8f7819f35347460ffb352ccc914e0373a22c5
SHA512b7c7d3aa966ad39a86aae02479649d74dcbf29d9cb3a7ff8b9b2354ea60704da55f5c0df803fd0a7191170a8e72fdd5eacfa1a739d7a74e390a7b74bdced1685
-
Filesize
23KB
MD533a83c16527e4531fbfca2631f653674
SHA187a63514c262ba4bffc52d2ceebb3ca14353507a
SHA2561156bb50a264543f6a9dc8922dd2c65d444c8bb11b3b18be95d5adff840b33b4
SHA512f1dba28d0f81aa0894436ae7b4ba76a2e635f002f666d17d31b8b21500dc2321d7862ca8dcfd22e44aab4d1f33112c076dc95191c889546a40f9c6197cccbda3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD544198d1e7d23baa141c8605c4a94f2c4
SHA1cfe096e517a517292feeffc980a53cb795fa930d
SHA2562fe435b83f3a8edb74f00d9ea6a71099d14ef8632f262681c4f1a03c9ed8db34
SHA512274b6547c1836ee944bacdb76d9ca3dcda692176ef783ecec49c232f814bb227f03feba6804efe8abc0e9a378fb572a10b0d5873b74a404aea560be0049b48f1
-
Filesize
1KB
MD50cb937d3169eb09588a6b9760472297b
SHA172284dfec4d28ada26d12208f94949ac51281cb9
SHA2560b33ea8655bc0b5829b3e636e3f770c8e6ddfe981cf1050b1f3eb9bde95ab93b
SHA512c5d343ea8d32b2178609db1e93391ab9f5ea1cd376eb01f362a471cd65d4c20e6f99d8e80116ad882e8d5a9fae36f9b0b376c943ca45f215cabbf51157d2590f
-
Filesize
6KB
MD523e55995882b2c30d1447572135cb714
SHA142b08ef8c6427a502e31438fef42fc80b913455b
SHA2564783a01a2b532db1ab06aec884e9adb3c094dfb1ad481bf22db94be9b9c6e03f
SHA5122a2b6a3e209b98f86296f8739f57bd1e4f0b7c3428a90e05018696e635c6a5e1736ffa27fc6d80cb687af72d7cca910b08665198947be7fbba433ffa6da0700a
-
Filesize
6KB
MD5ef915802eaf8410bf59d76aa786bc916
SHA1277fb3ef1818ced180b1439c455117a720736656
SHA25636e5166e042bfcd58d3c84ea7cb0a700e63f7ccfaf37ecd4688f69bedeef7125
SHA5124dca58029044f3fffaf3d3802fb8fb4eaba0cecca84a3e6c244b7a355ccf37aa9aecff54d1a7d124416c14acbc6152e0fa290c13253bbad9b683e87e0472a788
-
Filesize
6KB
MD588deb4b88948464058379ecb3e80b996
SHA10a10539d17966f72f108d672b75900ebfedc967f
SHA256caace95ec653615e55d842f0f3e12f455e232db16e1c5d739a050c4383718cbf
SHA512b8f7a1878ad21b5d1270ef637ce18db660823bfe1b11e3fc32a55fa34a9a65a8a706b9f55ee6337d33025783fe6bb343a181493f85c94a0cec5c397ef2faf0cb
-
Filesize
10KB
MD5af2b09aec7cb360c000ede1c94972825
SHA12a4800d4451351a67c67478b2e38233dae0b04df
SHA2560e756d88e2504fe9a0aa20f69f5b4f1e7ee82ec4e9b6fc246cfb99e90e2aff9b
SHA51251eb1036e24e85a89f71382e742463fd61521f98fe72ba8cc00b5486756420fa46819ef37ebcd182d0368e108b5e312caf4903b197eb12f72db8269aa3de0b9c