Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21-09-2024 10:38
Static task
static1
Behavioral task
behavioral1
Sample
ef9ce43da55fdfa6d92bc1639dca805c_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ef9ce43da55fdfa6d92bc1639dca805c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ef9ce43da55fdfa6d92bc1639dca805c_JaffaCakes118.html
-
Size
57KB
-
MD5
ef9ce43da55fdfa6d92bc1639dca805c
-
SHA1
f3cc9c6d62fb916d47567e41058186e0c417c0e1
-
SHA256
93015d377f2de5174b28a9038a987e918c5b3da55da390720e1b213d118f8089
-
SHA512
b4522ce2e64e7b4ddcb3cb05f7a275bfe59a86d154e064d91ecd869ecd090877a4a45d8a646039cf3cb007d34c94a599eb25a14127e6b7e328531bb0951c003c
-
SSDEEP
1536:ijEQvK8OPHdFAso2vgyHJv0owbd6zKD6CDK2RVrozEwpDK2RVy:ijnOPHdFw2vgyHJutDK2RVrozEwpDK2m
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3528 msedge.exe 3528 msedge.exe 4792 msedge.exe 4792 msedge.exe 2924 identity_helper.exe 2924 identity_helper.exe 2356 msedge.exe 2356 msedge.exe 2356 msedge.exe 2356 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4792 wrote to memory of 1180 4792 msedge.exe 82 PID 4792 wrote to memory of 1180 4792 msedge.exe 82 PID 4792 wrote to memory of 1668 4792 msedge.exe 83 PID 4792 wrote to memory of 1668 4792 msedge.exe 83 PID 4792 wrote to memory of 1668 4792 msedge.exe 83 PID 4792 wrote to memory of 1668 4792 msedge.exe 83 PID 4792 wrote to memory of 1668 4792 msedge.exe 83 PID 4792 wrote to memory of 1668 4792 msedge.exe 83 PID 4792 wrote to memory of 1668 4792 msedge.exe 83 PID 4792 wrote to memory of 1668 4792 msedge.exe 83 PID 4792 wrote to memory of 1668 4792 msedge.exe 83 PID 4792 wrote to memory of 1668 4792 msedge.exe 83 PID 4792 wrote to memory of 1668 4792 msedge.exe 83 PID 4792 wrote to memory of 1668 4792 msedge.exe 83 PID 4792 wrote to memory of 1668 4792 msedge.exe 83 PID 4792 wrote to memory of 1668 4792 msedge.exe 83 PID 4792 wrote to memory of 1668 4792 msedge.exe 83 PID 4792 wrote to memory of 1668 4792 msedge.exe 83 PID 4792 wrote to memory of 1668 4792 msedge.exe 83 PID 4792 wrote to memory of 1668 4792 msedge.exe 83 PID 4792 wrote to memory of 1668 4792 msedge.exe 83 PID 4792 wrote to memory of 1668 4792 msedge.exe 83 PID 4792 wrote to memory of 1668 4792 msedge.exe 83 PID 4792 wrote to memory of 1668 4792 msedge.exe 83 PID 4792 wrote to memory of 1668 4792 msedge.exe 83 PID 4792 wrote to memory of 1668 4792 msedge.exe 83 PID 4792 wrote to memory of 1668 4792 msedge.exe 83 PID 4792 wrote to memory of 1668 4792 msedge.exe 83 PID 4792 wrote to memory of 1668 4792 msedge.exe 83 PID 4792 wrote to memory of 1668 4792 msedge.exe 83 PID 4792 wrote to memory of 1668 4792 msedge.exe 83 PID 4792 wrote to memory of 1668 4792 msedge.exe 83 PID 4792 wrote to memory of 1668 4792 msedge.exe 83 PID 4792 wrote to memory of 1668 4792 msedge.exe 83 PID 4792 wrote to memory of 1668 4792 msedge.exe 83 PID 4792 wrote to memory of 1668 4792 msedge.exe 83 PID 4792 wrote to memory of 1668 4792 msedge.exe 83 PID 4792 wrote to memory of 1668 4792 msedge.exe 83 PID 4792 wrote to memory of 1668 4792 msedge.exe 83 PID 4792 wrote to memory of 1668 4792 msedge.exe 83 PID 4792 wrote to memory of 1668 4792 msedge.exe 83 PID 4792 wrote to memory of 1668 4792 msedge.exe 83 PID 4792 wrote to memory of 3528 4792 msedge.exe 84 PID 4792 wrote to memory of 3528 4792 msedge.exe 84 PID 4792 wrote to memory of 640 4792 msedge.exe 85 PID 4792 wrote to memory of 640 4792 msedge.exe 85 PID 4792 wrote to memory of 640 4792 msedge.exe 85 PID 4792 wrote to memory of 640 4792 msedge.exe 85 PID 4792 wrote to memory of 640 4792 msedge.exe 85 PID 4792 wrote to memory of 640 4792 msedge.exe 85 PID 4792 wrote to memory of 640 4792 msedge.exe 85 PID 4792 wrote to memory of 640 4792 msedge.exe 85 PID 4792 wrote to memory of 640 4792 msedge.exe 85 PID 4792 wrote to memory of 640 4792 msedge.exe 85 PID 4792 wrote to memory of 640 4792 msedge.exe 85 PID 4792 wrote to memory of 640 4792 msedge.exe 85 PID 4792 wrote to memory of 640 4792 msedge.exe 85 PID 4792 wrote to memory of 640 4792 msedge.exe 85 PID 4792 wrote to memory of 640 4792 msedge.exe 85 PID 4792 wrote to memory of 640 4792 msedge.exe 85 PID 4792 wrote to memory of 640 4792 msedge.exe 85 PID 4792 wrote to memory of 640 4792 msedge.exe 85 PID 4792 wrote to memory of 640 4792 msedge.exe 85 PID 4792 wrote to memory of 640 4792 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\ef9ce43da55fdfa6d92bc1639dca805c_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4792 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa579246f8,0x7ffa57924708,0x7ffa579247182⤵PID:1180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,9302960505516676028,13147682580704015114,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 /prefetch:22⤵PID:1668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,9302960505516676028,13147682580704015114,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2196 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,9302960505516676028,13147682580704015114,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2728 /prefetch:82⤵PID:640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,9302960505516676028,13147682580704015114,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:4788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,9302960505516676028,13147682580704015114,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:4696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,9302960505516676028,13147682580704015114,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4732 /prefetch:12⤵PID:4752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,9302960505516676028,13147682580704015114,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5248 /prefetch:12⤵PID:2392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,9302960505516676028,13147682580704015114,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4724 /prefetch:12⤵PID:580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,9302960505516676028,13147682580704015114,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3536 /prefetch:12⤵PID:2364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,9302960505516676028,13147682580704015114,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5836 /prefetch:12⤵PID:4372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,9302960505516676028,13147682580704015114,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5824 /prefetch:12⤵PID:388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,9302960505516676028,13147682580704015114,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3488 /prefetch:82⤵PID:2476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,9302960505516676028,13147682580704015114,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3488 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,9302960505516676028,13147682580704015114,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6048 /prefetch:12⤵PID:2728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,9302960505516676028,13147682580704015114,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4968 /prefetch:12⤵PID:4932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,9302960505516676028,13147682580704015114,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2564 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2356
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3532
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2468
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ff63763eedb406987ced076e36ec9acf
SHA116365aa97cd1a115412f8ae436d5d4e9be5f7b5d
SHA2568f460e8b7a67f0c65b7248961a7c71146c9e7a19772b193972b486dbf05b8e4c
SHA512ce90336169c8b2de249d4faea2519bf7c3df48ae9d77cdf471dd5dbd8e8542d47d9348080a098074aa63c255890850ee3b80ddb8eef8384919fdca3bb9371d9f
-
Filesize
152B
MD52783c40400a8912a79cfd383da731086
SHA1001a131fe399c30973089e18358818090ca81789
SHA256331fa67da5f67bbb42794c3aeab8f7819f35347460ffb352ccc914e0373a22c5
SHA512b7c7d3aa966ad39a86aae02479649d74dcbf29d9cb3a7ff8b9b2354ea60704da55f5c0df803fd0a7191170a8e72fdd5eacfa1a739d7a74e390a7b74bdced1685
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize816B
MD560366c09b6c3b556744f3b6626e4fdba
SHA135480432389678e5c797abdc36b3afa4986a6299
SHA25664776ad42274615984a0ae78fb57ce6cb7cd8f03a1e3115ca9a6358bf7ea3f55
SHA512be564b177f046a82d18cec61c0e4be9e3f656c3d2254003aa2e619e11ac5e2a37ff773db081ae37bcdfb27a3d8c0ada61867aaa8db5b7c759003b0336319676c
-
Filesize
1KB
MD548e1420d6488d7ee0126f97a59df8d66
SHA10eb3ba2d2b1623316d26b2f3302516af47a6c6cc
SHA2563145f87e22f67336f74ac704b715b1f5c8e61a677e528b18c79b6c0544f39e0d
SHA512d4c112240baf6b08bf6e034bf6a69b90553de34230893c47bdcd59520d763b62621e33115e4b1d2e2c820b2314ecc8c7169307746cf7cb54c7a3a385282945aa
-
Filesize
5KB
MD55ca39cc8a418aa0fb81e67193f4c680b
SHA1324a222af1c52577913e06f63fb42a10f9c36fa2
SHA256609f366ecfcfe0b6bca458decff3085c95be30cd91ce8ae38e183c4e0dbbb86f
SHA5121e93b764d4af423a7b34833cff716d376b2e3dfdbc23f9d5a01ae3d1f315f874c346e5fad3d42ad476fe751607280f5a2b70bb0ca07218b109b91dbfebb0014d
-
Filesize
6KB
MD5b51b7925dac092323f5c3cb41ef55d06
SHA14a621a7151f70680f0e274b8c5efecacd7f421f2
SHA256612dafda85cc8470ad8cedd826b44196080b9421d1b205c21f91696b00cb0dd5
SHA512680b528722de78d855cef1dfad66dd25f04c26fbfe08b820a1d3714511cab20d342b893284050af028322e72a99588a6c80836b8abeeb9f4c5425f1f3ab23cd7
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD51e0889852d8f4629f853ac9b6a9d2cad
SHA12a2c0669a426002a05f7815ab3b86525144ab81a
SHA2569d4e059aa54b6b3bae1dd0136f78f1e4025e5e249cd9867927cf563a193cb3b1
SHA512e68fb3f09fc8c11b12ed2b3285ad4ff5bba53c998c49dc857b9aba4181ff77392ada168799db081faa7fcef4ec2771a5eba17aae1384166ae4983b87612d81dd