Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29/09/2024, 23:34
Static task
static1
Behavioral task
behavioral1
Sample
ff816edee422665830b465bb34332813_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ff816edee422665830b465bb34332813_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ff816edee422665830b465bb34332813_JaffaCakes118.html
-
Size
42KB
-
MD5
ff816edee422665830b465bb34332813
-
SHA1
031f84e4f98bf22f393a409b323cb85a90b16521
-
SHA256
4ff8f44a018d568cc2c2c481e098fa076f7161b6f4ebeff12f7f7dd8a0c69018
-
SHA512
200172ae2671dfdc7a4e09f60e59084b48b7e053154028c4a3afd2c0fb185110d4bb9fb1bcb9138be6a2468a197a6d32a489a4aad35f20e471e602bbad2dd822
-
SSDEEP
768:PFlT0EipBfg55XJlwJyHk9LnIXAT8ncMU8NQD29hN+5gL:DTupBfg5V3wJ8k9vMdQ8
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 404 msedge.exe 404 msedge.exe 1672 msedge.exe 1672 msedge.exe 4596 identity_helper.exe 4596 identity_helper.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe 5048 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1672 wrote to memory of 4892 1672 msedge.exe 83 PID 1672 wrote to memory of 4892 1672 msedge.exe 83 PID 1672 wrote to memory of 4780 1672 msedge.exe 84 PID 1672 wrote to memory of 4780 1672 msedge.exe 84 PID 1672 wrote to memory of 4780 1672 msedge.exe 84 PID 1672 wrote to memory of 4780 1672 msedge.exe 84 PID 1672 wrote to memory of 4780 1672 msedge.exe 84 PID 1672 wrote to memory of 4780 1672 msedge.exe 84 PID 1672 wrote to memory of 4780 1672 msedge.exe 84 PID 1672 wrote to memory of 4780 1672 msedge.exe 84 PID 1672 wrote to memory of 4780 1672 msedge.exe 84 PID 1672 wrote to memory of 4780 1672 msedge.exe 84 PID 1672 wrote to memory of 4780 1672 msedge.exe 84 PID 1672 wrote to memory of 4780 1672 msedge.exe 84 PID 1672 wrote to memory of 4780 1672 msedge.exe 84 PID 1672 wrote to memory of 4780 1672 msedge.exe 84 PID 1672 wrote to memory of 4780 1672 msedge.exe 84 PID 1672 wrote to memory of 4780 1672 msedge.exe 84 PID 1672 wrote to memory of 4780 1672 msedge.exe 84 PID 1672 wrote to memory of 4780 1672 msedge.exe 84 PID 1672 wrote to memory of 4780 1672 msedge.exe 84 PID 1672 wrote to memory of 4780 1672 msedge.exe 84 PID 1672 wrote to memory of 4780 1672 msedge.exe 84 PID 1672 wrote to memory of 4780 1672 msedge.exe 84 PID 1672 wrote to memory of 4780 1672 msedge.exe 84 PID 1672 wrote to memory of 4780 1672 msedge.exe 84 PID 1672 wrote to memory of 4780 1672 msedge.exe 84 PID 1672 wrote to memory of 4780 1672 msedge.exe 84 PID 1672 wrote to memory of 4780 1672 msedge.exe 84 PID 1672 wrote to memory of 4780 1672 msedge.exe 84 PID 1672 wrote to memory of 4780 1672 msedge.exe 84 PID 1672 wrote to memory of 4780 1672 msedge.exe 84 PID 1672 wrote to memory of 4780 1672 msedge.exe 84 PID 1672 wrote to memory of 4780 1672 msedge.exe 84 PID 1672 wrote to memory of 4780 1672 msedge.exe 84 PID 1672 wrote to memory of 4780 1672 msedge.exe 84 PID 1672 wrote to memory of 4780 1672 msedge.exe 84 PID 1672 wrote to memory of 4780 1672 msedge.exe 84 PID 1672 wrote to memory of 4780 1672 msedge.exe 84 PID 1672 wrote to memory of 4780 1672 msedge.exe 84 PID 1672 wrote to memory of 4780 1672 msedge.exe 84 PID 1672 wrote to memory of 4780 1672 msedge.exe 84 PID 1672 wrote to memory of 404 1672 msedge.exe 85 PID 1672 wrote to memory of 404 1672 msedge.exe 85 PID 1672 wrote to memory of 2648 1672 msedge.exe 86 PID 1672 wrote to memory of 2648 1672 msedge.exe 86 PID 1672 wrote to memory of 2648 1672 msedge.exe 86 PID 1672 wrote to memory of 2648 1672 msedge.exe 86 PID 1672 wrote to memory of 2648 1672 msedge.exe 86 PID 1672 wrote to memory of 2648 1672 msedge.exe 86 PID 1672 wrote to memory of 2648 1672 msedge.exe 86 PID 1672 wrote to memory of 2648 1672 msedge.exe 86 PID 1672 wrote to memory of 2648 1672 msedge.exe 86 PID 1672 wrote to memory of 2648 1672 msedge.exe 86 PID 1672 wrote to memory of 2648 1672 msedge.exe 86 PID 1672 wrote to memory of 2648 1672 msedge.exe 86 PID 1672 wrote to memory of 2648 1672 msedge.exe 86 PID 1672 wrote to memory of 2648 1672 msedge.exe 86 PID 1672 wrote to memory of 2648 1672 msedge.exe 86 PID 1672 wrote to memory of 2648 1672 msedge.exe 86 PID 1672 wrote to memory of 2648 1672 msedge.exe 86 PID 1672 wrote to memory of 2648 1672 msedge.exe 86 PID 1672 wrote to memory of 2648 1672 msedge.exe 86 PID 1672 wrote to memory of 2648 1672 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\ff816edee422665830b465bb34332813_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd15f846f8,0x7ffd15f84708,0x7ffd15f847182⤵PID:4892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,15564625948100230058,10244585078345122938,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:22⤵PID:4780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,15564625948100230058,10244585078345122938,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2192 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,15564625948100230058,10244585078345122938,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2788 /prefetch:82⤵PID:2648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,15564625948100230058,10244585078345122938,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:3440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,15564625948100230058,10244585078345122938,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:2236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,15564625948100230058,10244585078345122938,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4736 /prefetch:12⤵PID:1152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,15564625948100230058,10244585078345122938,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4852 /prefetch:12⤵PID:1864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,15564625948100230058,10244585078345122938,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5076 /prefetch:12⤵PID:1000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,15564625948100230058,10244585078345122938,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5392 /prefetch:82⤵PID:1320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,15564625948100230058,10244585078345122938,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5392 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,15564625948100230058,10244585078345122938,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5388 /prefetch:12⤵PID:436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,15564625948100230058,10244585078345122938,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6308 /prefetch:12⤵PID:3412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,15564625948100230058,10244585078345122938,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4112 /prefetch:12⤵PID:1332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,15564625948100230058,10244585078345122938,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5148 /prefetch:12⤵PID:676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,15564625948100230058,10244585078345122938,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5048
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1544
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3728
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ff63763eedb406987ced076e36ec9acf
SHA116365aa97cd1a115412f8ae436d5d4e9be5f7b5d
SHA2568f460e8b7a67f0c65b7248961a7c71146c9e7a19772b193972b486dbf05b8e4c
SHA512ce90336169c8b2de249d4faea2519bf7c3df48ae9d77cdf471dd5dbd8e8542d47d9348080a098074aa63c255890850ee3b80ddb8eef8384919fdca3bb9371d9f
-
Filesize
152B
MD52783c40400a8912a79cfd383da731086
SHA1001a131fe399c30973089e18358818090ca81789
SHA256331fa67da5f67bbb42794c3aeab8f7819f35347460ffb352ccc914e0373a22c5
SHA512b7c7d3aa966ad39a86aae02479649d74dcbf29d9cb3a7ff8b9b2354ea60704da55f5c0df803fd0a7191170a8e72fdd5eacfa1a739d7a74e390a7b74bdced1685
-
Filesize
23KB
MD5c897f8479da25ec570027594f1b4db24
SHA181a3ff06cf35a87e697fc4733966dffc270ad06b
SHA2567fd05e325904c9c31e435d5c65b9b4ffa11a9116d1df0282d6cd7c87ef6f1dbc
SHA512b1c1c46810c3bc5c407f7d30a9d74db8242860965d958ffc5bfeed35b1204774843775ae81b8c414ea89322d00d7ab97313965e20cebba588edf13b9b8dcbc10
-
Filesize
45KB
MD5ede70f717200a59b4cb831635de913a1
SHA1d4d6e893ac192b5df087e924ab3356852f8a7bc0
SHA256c63fbcc69de230e4844cf735ccf668eeaf30e42126eeb464da39c2de6b0b0051
SHA512b621bde28b90ba97c122677989d994cb5e88fd0906366af1a23ad3f9d9f3b7f2bbef95873f29100433d4068fbbf7ab798505e68deefc118097fc5f76dfc4b672
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD58369f2430cb481c4f6d271b964a4828a
SHA100ed68d362d00b59ec3c335a6f390d5105e8afa9
SHA256702df03e19c7520ad8d3aa06f68b01365d61615a121701f20127a284eb9ffe95
SHA5127f16986a37d8e831260ee5c780afef55702478588207b6b711592705203e48d22509600749d55e166f7184f7286a9a967431651ae4270a8c3cbd82508faa6e32
-
Filesize
1KB
MD55c1e2d65e0e6d42e6f3588b297ca9f95
SHA14fc773dd24a6beb1ca4a5520cf26229f31d7ffa7
SHA256a2a8d9eda0c5eab36ff4a0a8ff7439714a4b14bdc5b130e0b51981ca2fc03a0c
SHA5128c72772fc699d48242b84596676fe457e9f7d487675213b309007995f832b8d032ec5d4f558a301090d9c3a3fb04a9c545c8b6951130679ee6d8c9ae78198fbc
-
Filesize
5KB
MD5565a30de78886d3537bb362e54984862
SHA12ac0ca13b9b7920e98116e6bdd031e9288adf90a
SHA256f2055453159c1eabf4452d32cd6062d5eaea94c9efe8620705cec7c76672ac23
SHA5129bf31824d3c9891d2ee35cac1e74ce8bbf6b3315be49be63f7c505355339ef5bf0176025592b1bd30d694e3a8068ee0ddea4480bdae2643835fa29d2b5ee9edf
-
Filesize
6KB
MD5b6e4c6851873c35fce098145baaa25cf
SHA17679b5b7bbc78437ec3d45c37a8cb18f4070162f
SHA25651786d746babc1947e395b2da4055901442d2c1ecb8a8ea7a1a786c5d4a5bdfb
SHA51273f90150f9e1b04d68bb24baabb1fa72d56dc49fa76b42771702b0f3eb91736e52a8a4d865731bc306f2a1740e06663f98996f74ceb0aa2b620bfd140abf5feb
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD514224fd36277fab217f11adbac0e3505
SHA1d1cfcc1c814c882ac2804e8cc7c832ba0ffb4b9b
SHA2565ab23bf08519232f61668968642474d2a3e9b32938b2e2306325c0b26fdf10a6
SHA51295d6dedfad753c525f7b88d13e3d79207d22326f53d8e8b3b742f9511bfb906c9c6f86e6f41fcd0d462f4feddbc8d4eb259a99811c803a82248933a0152ec0ba