Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04/10/2024, 17:44
Static task
static1
Behavioral task
behavioral1
Sample
145588ffe37bf7752d3384beb85644ea_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
145588ffe37bf7752d3384beb85644ea_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
145588ffe37bf7752d3384beb85644ea_JaffaCakes118.html
-
Size
26KB
-
MD5
145588ffe37bf7752d3384beb85644ea
-
SHA1
e98574fcbf23b693ed6a5d8b950e6383529ae6b6
-
SHA256
a96ea1c03cba345beaea29e83824ba25079eb2f2fa43cd7f077ebf0de861c3c4
-
SHA512
36879b4f7c258859bd4c9c08fc5063ebcc5db5870c166cf970bf02e451e0ed1ee4de183f3b8420d10ea598bc2806cec51c65b8758b6a86895428170f92913342
-
SSDEEP
384:DyKlIcctG4EgGTHq/xpIqta9sYTGXYegAh77sq/gRPsw8guLZ:7wPYegug5kxLZ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2380 msedge.exe 2380 msedge.exe 3060 msedge.exe 3060 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3060 wrote to memory of 432 3060 msedge.exe 82 PID 3060 wrote to memory of 432 3060 msedge.exe 82 PID 3060 wrote to memory of 2980 3060 msedge.exe 83 PID 3060 wrote to memory of 2980 3060 msedge.exe 83 PID 3060 wrote to memory of 2980 3060 msedge.exe 83 PID 3060 wrote to memory of 2980 3060 msedge.exe 83 PID 3060 wrote to memory of 2980 3060 msedge.exe 83 PID 3060 wrote to memory of 2980 3060 msedge.exe 83 PID 3060 wrote to memory of 2980 3060 msedge.exe 83 PID 3060 wrote to memory of 2980 3060 msedge.exe 83 PID 3060 wrote to memory of 2980 3060 msedge.exe 83 PID 3060 wrote to memory of 2980 3060 msedge.exe 83 PID 3060 wrote to memory of 2980 3060 msedge.exe 83 PID 3060 wrote to memory of 2980 3060 msedge.exe 83 PID 3060 wrote to memory of 2980 3060 msedge.exe 83 PID 3060 wrote to memory of 2980 3060 msedge.exe 83 PID 3060 wrote to memory of 2980 3060 msedge.exe 83 PID 3060 wrote to memory of 2980 3060 msedge.exe 83 PID 3060 wrote to memory of 2980 3060 msedge.exe 83 PID 3060 wrote to memory of 2980 3060 msedge.exe 83 PID 3060 wrote to memory of 2980 3060 msedge.exe 83 PID 3060 wrote to memory of 2980 3060 msedge.exe 83 PID 3060 wrote to memory of 2980 3060 msedge.exe 83 PID 3060 wrote to memory of 2980 3060 msedge.exe 83 PID 3060 wrote to memory of 2980 3060 msedge.exe 83 PID 3060 wrote to memory of 2980 3060 msedge.exe 83 PID 3060 wrote to memory of 2980 3060 msedge.exe 83 PID 3060 wrote to memory of 2980 3060 msedge.exe 83 PID 3060 wrote to memory of 2980 3060 msedge.exe 83 PID 3060 wrote to memory of 2980 3060 msedge.exe 83 PID 3060 wrote to memory of 2980 3060 msedge.exe 83 PID 3060 wrote to memory of 2980 3060 msedge.exe 83 PID 3060 wrote to memory of 2980 3060 msedge.exe 83 PID 3060 wrote to memory of 2980 3060 msedge.exe 83 PID 3060 wrote to memory of 2980 3060 msedge.exe 83 PID 3060 wrote to memory of 2980 3060 msedge.exe 83 PID 3060 wrote to memory of 2980 3060 msedge.exe 83 PID 3060 wrote to memory of 2980 3060 msedge.exe 83 PID 3060 wrote to memory of 2980 3060 msedge.exe 83 PID 3060 wrote to memory of 2980 3060 msedge.exe 83 PID 3060 wrote to memory of 2980 3060 msedge.exe 83 PID 3060 wrote to memory of 2980 3060 msedge.exe 83 PID 3060 wrote to memory of 2380 3060 msedge.exe 84 PID 3060 wrote to memory of 2380 3060 msedge.exe 84 PID 3060 wrote to memory of 5028 3060 msedge.exe 85 PID 3060 wrote to memory of 5028 3060 msedge.exe 85 PID 3060 wrote to memory of 5028 3060 msedge.exe 85 PID 3060 wrote to memory of 5028 3060 msedge.exe 85 PID 3060 wrote to memory of 5028 3060 msedge.exe 85 PID 3060 wrote to memory of 5028 3060 msedge.exe 85 PID 3060 wrote to memory of 5028 3060 msedge.exe 85 PID 3060 wrote to memory of 5028 3060 msedge.exe 85 PID 3060 wrote to memory of 5028 3060 msedge.exe 85 PID 3060 wrote to memory of 5028 3060 msedge.exe 85 PID 3060 wrote to memory of 5028 3060 msedge.exe 85 PID 3060 wrote to memory of 5028 3060 msedge.exe 85 PID 3060 wrote to memory of 5028 3060 msedge.exe 85 PID 3060 wrote to memory of 5028 3060 msedge.exe 85 PID 3060 wrote to memory of 5028 3060 msedge.exe 85 PID 3060 wrote to memory of 5028 3060 msedge.exe 85 PID 3060 wrote to memory of 5028 3060 msedge.exe 85 PID 3060 wrote to memory of 5028 3060 msedge.exe 85 PID 3060 wrote to memory of 5028 3060 msedge.exe 85 PID 3060 wrote to memory of 5028 3060 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\145588ffe37bf7752d3384beb85644ea_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffadbad46f8,0x7ffadbad4708,0x7ffadbad47182⤵PID:432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,1913429620147233349,11922724185106143823,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2080 /prefetch:22⤵PID:2980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2072,1913429620147233349,11922724185106143823,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2144 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2072,1913429620147233349,11922724185106143823,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2740 /prefetch:82⤵PID:5028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,1913429620147233349,11922724185106143823,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:1508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,1913429620147233349,11922724185106143823,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:3224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,1913429620147233349,11922724185106143823,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4656 /prefetch:12⤵PID:3320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,1913429620147233349,11922724185106143823,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1316 /prefetch:22⤵PID:3456
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:64
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4184
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ab8ce148cb7d44f709fb1c460d03e1b0
SHA144d15744015155f3e74580c93317e12d2cc0f859
SHA256014006a90e43ea9a1903b08b843a5aab8ad3823d22e26e5b113fad5f9fa620ff
SHA512f685423b1eaee18a2a06030b4b2977335f62499c0041c142a92f6e6f846c2b9ce54324b6ae94efbbb303282dcda70e2b1597c748fddc251c0b3122a412c2d7c4
-
Filesize
152B
MD538f59a47b777f2fc52088e96ffb2baaf
SHA1267224482588b41a96d813f6d9e9d924867062db
SHA25613569c5681c71dc42ab57d34879f5a567d7b94afe0e8f6d7c6f6c1314fb0087b
SHA5124657d13e1bb7cdd7e83f5f2562f5598cca12edf839626ae96da43e943b5550fab46a14b9018f1bec90de88cc714f637605531ccda99deb9e537908ddb826113b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize168B
MD5c2d71575264620ff9150cb6d62e82000
SHA1f3873f7b08a542927bc33a945971968b41058584
SHA256e9f134677e1a6fe635411c5a7499481fc39e9170f15d45130e17de737a2f3b44
SHA5122cc49a5d1f19dae9ced1ef285840b7a373afaf9f68700d6616b028bd1aee353d6afd38b7cac41189d6c1c62c40b34025668f1466a9dba01bf44fcdaa0d09d510
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
5KB
MD5dbd9a2d66f58818097b392388c785ae9
SHA1eda5e07b9e05b45e9fbe917af44beb619597074b
SHA2563b45be54883a53b976d8cb942dae8f7afa89bd8505c4d5a2dd8b7be986ec194d
SHA5129bdc867cb8df3e210de223e6e9009835692df67c2b6f760928bfebeede8b558053b09d8ba1970f272509e1aa588665b550bae343b3f659c7d9a909eca58fb63b
-
Filesize
6KB
MD5e9692f3d32580bc60a7c5fa608043a5f
SHA1fa1ae991dd97cdb6ff50d975de1aa7694ce9b825
SHA2560b9d4e3ffeafffff89155dade2119fa8918849dde879ab8c5e2f00fc8ffca598
SHA5120bd7daf78a3ff35de5255492cfb035cada04d2a9ff629b30b6d7ad02bbe79b33d784d37789cc547ac5ee8c5ed63ca98b3d0aab78c6c9f5046ab1c0322b4be188
-
Filesize
10KB
MD5f08b34820fc4ed6dcf2b087e84e9e5e8
SHA1cf82886d7fa502179cc87e54135c6f3c3a4d3559
SHA2568b96c01780477ce6d2aa8cf5e1cbae21ab13bb6aa0c2c1956d54edb45687fe59
SHA512206c4a5cc232b3bb337e80175dfaf988905c0b0a33a7619262b7742de1b8af81aa0ede7f426821abf70c1bde005aa69bfbe01ec41a299a2e1c26299f9f62ccaa