Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240910-en -
resource tags
arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 07:06
Static task
static1
Behavioral task
behavioral1
Sample
ead0f775888f6e93b4dab7352564cb7c_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ead0f775888f6e93b4dab7352564cb7c_JaffaCakes118.html
Resource
win10v2004-20240910-en
General
-
Target
ead0f775888f6e93b4dab7352564cb7c_JaffaCakes118.html
-
Size
10KB
-
MD5
ead0f775888f6e93b4dab7352564cb7c
-
SHA1
b624e3c6db2515e67416adb63210ba998fe1e483
-
SHA256
ec71ab8b59485122c44148bc4112af81609d0cc2f5aa267dd05406d8c623eac5
-
SHA512
d0b8389874a1e711ca3223c005dc2948c991184008dee87124392d80650c1ff1b267b854d549143159d5a06c649261048b36cb04db27af0ec249a6c00e872c42
-
SSDEEP
96:SYo7izKi4Ndv3/XERmFqcJKOlSjIi/pItazQTkRi2RoWSXIHFGZ7C4a+9XlcebPx:SO3yiZnQ4AkixtGQoQHHKpK5
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2308 msedge.exe 2308 msedge.exe 3260 msedge.exe 3260 msedge.exe 3088 identity_helper.exe 3088 identity_helper.exe 3708 msedge.exe 3708 msedge.exe 3708 msedge.exe 3708 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3260 wrote to memory of 4808 3260 msedge.exe 84 PID 3260 wrote to memory of 4808 3260 msedge.exe 84 PID 3260 wrote to memory of 4816 3260 msedge.exe 85 PID 3260 wrote to memory of 4816 3260 msedge.exe 85 PID 3260 wrote to memory of 4816 3260 msedge.exe 85 PID 3260 wrote to memory of 4816 3260 msedge.exe 85 PID 3260 wrote to memory of 4816 3260 msedge.exe 85 PID 3260 wrote to memory of 4816 3260 msedge.exe 85 PID 3260 wrote to memory of 4816 3260 msedge.exe 85 PID 3260 wrote to memory of 4816 3260 msedge.exe 85 PID 3260 wrote to memory of 4816 3260 msedge.exe 85 PID 3260 wrote to memory of 4816 3260 msedge.exe 85 PID 3260 wrote to memory of 4816 3260 msedge.exe 85 PID 3260 wrote to memory of 4816 3260 msedge.exe 85 PID 3260 wrote to memory of 4816 3260 msedge.exe 85 PID 3260 wrote to memory of 4816 3260 msedge.exe 85 PID 3260 wrote to memory of 4816 3260 msedge.exe 85 PID 3260 wrote to memory of 4816 3260 msedge.exe 85 PID 3260 wrote to memory of 4816 3260 msedge.exe 85 PID 3260 wrote to memory of 4816 3260 msedge.exe 85 PID 3260 wrote to memory of 4816 3260 msedge.exe 85 PID 3260 wrote to memory of 4816 3260 msedge.exe 85 PID 3260 wrote to memory of 4816 3260 msedge.exe 85 PID 3260 wrote to memory of 4816 3260 msedge.exe 85 PID 3260 wrote to memory of 4816 3260 msedge.exe 85 PID 3260 wrote to memory of 4816 3260 msedge.exe 85 PID 3260 wrote to memory of 4816 3260 msedge.exe 85 PID 3260 wrote to memory of 4816 3260 msedge.exe 85 PID 3260 wrote to memory of 4816 3260 msedge.exe 85 PID 3260 wrote to memory of 4816 3260 msedge.exe 85 PID 3260 wrote to memory of 4816 3260 msedge.exe 85 PID 3260 wrote to memory of 4816 3260 msedge.exe 85 PID 3260 wrote to memory of 4816 3260 msedge.exe 85 PID 3260 wrote to memory of 4816 3260 msedge.exe 85 PID 3260 wrote to memory of 4816 3260 msedge.exe 85 PID 3260 wrote to memory of 4816 3260 msedge.exe 85 PID 3260 wrote to memory of 4816 3260 msedge.exe 85 PID 3260 wrote to memory of 4816 3260 msedge.exe 85 PID 3260 wrote to memory of 4816 3260 msedge.exe 85 PID 3260 wrote to memory of 4816 3260 msedge.exe 85 PID 3260 wrote to memory of 4816 3260 msedge.exe 85 PID 3260 wrote to memory of 4816 3260 msedge.exe 85 PID 3260 wrote to memory of 2308 3260 msedge.exe 86 PID 3260 wrote to memory of 2308 3260 msedge.exe 86 PID 3260 wrote to memory of 2020 3260 msedge.exe 87 PID 3260 wrote to memory of 2020 3260 msedge.exe 87 PID 3260 wrote to memory of 2020 3260 msedge.exe 87 PID 3260 wrote to memory of 2020 3260 msedge.exe 87 PID 3260 wrote to memory of 2020 3260 msedge.exe 87 PID 3260 wrote to memory of 2020 3260 msedge.exe 87 PID 3260 wrote to memory of 2020 3260 msedge.exe 87 PID 3260 wrote to memory of 2020 3260 msedge.exe 87 PID 3260 wrote to memory of 2020 3260 msedge.exe 87 PID 3260 wrote to memory of 2020 3260 msedge.exe 87 PID 3260 wrote to memory of 2020 3260 msedge.exe 87 PID 3260 wrote to memory of 2020 3260 msedge.exe 87 PID 3260 wrote to memory of 2020 3260 msedge.exe 87 PID 3260 wrote to memory of 2020 3260 msedge.exe 87 PID 3260 wrote to memory of 2020 3260 msedge.exe 87 PID 3260 wrote to memory of 2020 3260 msedge.exe 87 PID 3260 wrote to memory of 2020 3260 msedge.exe 87 PID 3260 wrote to memory of 2020 3260 msedge.exe 87 PID 3260 wrote to memory of 2020 3260 msedge.exe 87 PID 3260 wrote to memory of 2020 3260 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\ead0f775888f6e93b4dab7352564cb7c_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3260 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8297146f8,0x7ff829714708,0x7ff8297147182⤵PID:4808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,12195083819934135169,7378578232965880878,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2080 /prefetch:22⤵PID:4816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2056,12195083819934135169,7378578232965880878,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2176 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2056,12195083819934135169,7378578232965880878,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2728 /prefetch:82⤵PID:2020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,12195083819934135169,7378578232965880878,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:2880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,12195083819934135169,7378578232965880878,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:3816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,12195083819934135169,7378578232965880878,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4632 /prefetch:12⤵PID:1532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,12195083819934135169,7378578232965880878,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5272 /prefetch:12⤵PID:3292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,12195083819934135169,7378578232965880878,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5424 /prefetch:82⤵PID:3500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,12195083819934135169,7378578232965880878,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5424 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,12195083819934135169,7378578232965880878,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5416 /prefetch:12⤵PID:3884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,12195083819934135169,7378578232965880878,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5396 /prefetch:12⤵PID:832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,12195083819934135169,7378578232965880878,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5536 /prefetch:12⤵PID:2588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,12195083819934135169,7378578232965880878,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5824 /prefetch:12⤵PID:4388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,12195083819934135169,7378578232965880878,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4952 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3708
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2560
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2096
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD57006aacd11b992cd29fca21e619e86ea
SHA1f224b726a114d4c73d7379236739d5fbb8e7f7b7
SHA2563c434b96841d5a0fa0a04a6b503c3c4d46f1c4e3a1be77853175e5680e182814
SHA5126de169882c0e01217c4ca01f6ead8e5ebb316a77558e51cd862532dbf9147d9e267f8db667ff6e9fa33164243724f5e437cb882392382f3cae1072dadb762c1d
-
Filesize
152B
MD5b80cf20d9e8cf6a579981bfaab1bdce2
SHA1171a886be3a882bd04206295ce7f1db5b8b7035e
SHA25610d995b136b604440ac4033b2222543975779068a321d7bddf675d0cb2a4c2b1
SHA5120233b34866be1afd214a1c8a9dcf8328d16246b3a5ef142295333547b4cfdc787c8627439a2ca03c20cb49107f7428d39696143b71f56b7f1f05029b3a14376a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD55626bd2dfed24ae0bca3ee2583d8db09
SHA13f5f2811e3eab0b4669177dfcdc17d61bce9d5db
SHA256ff883124033469f3afb47c1e41d6755b1c9704d01c59517b808bb7839f2d38f0
SHA512a17c6a7d8aa1d24355ff7c0ff3a02ec18b6e00225459254d3374d1c55200243762db21e62eb79026c4bd6594025fbadc879bbe1402d112c640891850bd077814
-
Filesize
877B
MD5f6c809aa6ae60d86dd3f0486ce8c4987
SHA12fe8304696ae5c5d6a1b0ada4fc102fbbdb46fde
SHA256d2118068d9c9e25abea62288b69b0badba4ffb0d2cc76ad37476a54d1e9b4636
SHA512f9cab50b2186abef812302e65802a66ebfb092444c6bcce95e752e67372a82bebc59c164dc3a067221d1ce99b0ffaa713fec28ae25830a5aaee974b34257bde8
-
Filesize
5KB
MD56c02383e5ee0874fc131c9137509d3e5
SHA1d17cca8190d7af52d33d594dbf4a18c47b43834b
SHA25655209b01d2d93522c46714239d96ddbb18b0c4888c1fa1e99b87af2b59e7cff8
SHA512e5784308ad64c789f15fddbeddb050548b684b2ab2da2ca56e3a1580e8debd084561de3ac49fa5a89de3b1cc7d53cd51e94e79e5393689ad4c76c42062c5f6fb
-
Filesize
6KB
MD573053d4cd1c8ac9512ce2cc13b70a733
SHA100dc6dee863f614b43738aaeb692661c961c1815
SHA2562246956d6ac9e8ef5fab9397fcd266dc809154654d7ffc4cd93227e5b1d09b2b
SHA51237612d451da816a43bd0b71b415fd6d6bdacc5614fa81816520ab5d2d3b7ff4c8602e7cc183bbdc80d504740147c2f75241c772402f9eb901b2f6f17134458ef
-
Filesize
6KB
MD5f55568ef8dc72da86a392d534cf62a07
SHA1f734ba3ba20b0615de0035aa1ca9f2ecbf4cd58f
SHA256e226fe552098275cf99a5e8d147359a6fcd816ea069a8604b62b4b5379adf337
SHA5128b0dd164044cff84d3b847e6fa2432fa31016986f23d1854f290ae9ec4d36138ed557df15fc7a9ef31053437fc4e708a10bbd200a93b657d365fa3737e51c621
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD54cd73c1432179690251e53d3c1d0fe9d
SHA143c8b7e981b560b93134fc657ba96f8096b367fc
SHA2567e7917d7de4c1e127fbb8c2c67264104e9f9189f439913b8f788808b18944ab7
SHA5127ebe37278c8cc99e7790d0b7063c3efd4cb498540117affedef15973818fcd8175ada81c96ae5a261a46cf3c360a1987063106f0715ac748650eb08df10a4e7c