Analysis
-
max time kernel
148s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
30/09/2024, 00:29
Static task
static1
Behavioral task
behavioral1
Sample
ff93d4b17c0424035e126dceb031b8eb_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ff93d4b17c0424035e126dceb031b8eb_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ff93d4b17c0424035e126dceb031b8eb_JaffaCakes118.html
-
Size
5KB
-
MD5
ff93d4b17c0424035e126dceb031b8eb
-
SHA1
e95f2a8094e6c446d7beaddf84408d7b16808185
-
SHA256
4ee42a1e56bc12dead511d1dd779bd4d52ff8d8c7925e8086d2ba90e99ec8817
-
SHA512
0cc0bcc2ca28ebe74815e28e7f431ba5f6e0487dfd0d0a4b2c2482763b8b48f20fef75945d1cc151a45b7b44da48d4d9d9b8f4ad9769bc4e6ea56e7b4809f661
-
SSDEEP
96:8iJYjaQtiEtmAR3CQue1wg95X+g7Gvf33TVewGVsuYQ2se+vqNCTI:8OYjaQ0EAAVz/5XP7G33he7PYxTgqNCM
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 116 msedge.exe 116 msedge.exe 4004 msedge.exe 4004 msedge.exe 1452 identity_helper.exe 1452 identity_helper.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe 4468 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4004 wrote to memory of 2864 4004 msedge.exe 82 PID 4004 wrote to memory of 2864 4004 msedge.exe 82 PID 4004 wrote to memory of 2800 4004 msedge.exe 83 PID 4004 wrote to memory of 2800 4004 msedge.exe 83 PID 4004 wrote to memory of 2800 4004 msedge.exe 83 PID 4004 wrote to memory of 2800 4004 msedge.exe 83 PID 4004 wrote to memory of 2800 4004 msedge.exe 83 PID 4004 wrote to memory of 2800 4004 msedge.exe 83 PID 4004 wrote to memory of 2800 4004 msedge.exe 83 PID 4004 wrote to memory of 2800 4004 msedge.exe 83 PID 4004 wrote to memory of 2800 4004 msedge.exe 83 PID 4004 wrote to memory of 2800 4004 msedge.exe 83 PID 4004 wrote to memory of 2800 4004 msedge.exe 83 PID 4004 wrote to memory of 2800 4004 msedge.exe 83 PID 4004 wrote to memory of 2800 4004 msedge.exe 83 PID 4004 wrote to memory of 2800 4004 msedge.exe 83 PID 4004 wrote to memory of 2800 4004 msedge.exe 83 PID 4004 wrote to memory of 2800 4004 msedge.exe 83 PID 4004 wrote to memory of 2800 4004 msedge.exe 83 PID 4004 wrote to memory of 2800 4004 msedge.exe 83 PID 4004 wrote to memory of 2800 4004 msedge.exe 83 PID 4004 wrote to memory of 2800 4004 msedge.exe 83 PID 4004 wrote to memory of 2800 4004 msedge.exe 83 PID 4004 wrote to memory of 2800 4004 msedge.exe 83 PID 4004 wrote to memory of 2800 4004 msedge.exe 83 PID 4004 wrote to memory of 2800 4004 msedge.exe 83 PID 4004 wrote to memory of 2800 4004 msedge.exe 83 PID 4004 wrote to memory of 2800 4004 msedge.exe 83 PID 4004 wrote to memory of 2800 4004 msedge.exe 83 PID 4004 wrote to memory of 2800 4004 msedge.exe 83 PID 4004 wrote to memory of 2800 4004 msedge.exe 83 PID 4004 wrote to memory of 2800 4004 msedge.exe 83 PID 4004 wrote to memory of 2800 4004 msedge.exe 83 PID 4004 wrote to memory of 2800 4004 msedge.exe 83 PID 4004 wrote to memory of 2800 4004 msedge.exe 83 PID 4004 wrote to memory of 2800 4004 msedge.exe 83 PID 4004 wrote to memory of 2800 4004 msedge.exe 83 PID 4004 wrote to memory of 2800 4004 msedge.exe 83 PID 4004 wrote to memory of 2800 4004 msedge.exe 83 PID 4004 wrote to memory of 2800 4004 msedge.exe 83 PID 4004 wrote to memory of 2800 4004 msedge.exe 83 PID 4004 wrote to memory of 2800 4004 msedge.exe 83 PID 4004 wrote to memory of 116 4004 msedge.exe 84 PID 4004 wrote to memory of 116 4004 msedge.exe 84 PID 4004 wrote to memory of 2328 4004 msedge.exe 85 PID 4004 wrote to memory of 2328 4004 msedge.exe 85 PID 4004 wrote to memory of 2328 4004 msedge.exe 85 PID 4004 wrote to memory of 2328 4004 msedge.exe 85 PID 4004 wrote to memory of 2328 4004 msedge.exe 85 PID 4004 wrote to memory of 2328 4004 msedge.exe 85 PID 4004 wrote to memory of 2328 4004 msedge.exe 85 PID 4004 wrote to memory of 2328 4004 msedge.exe 85 PID 4004 wrote to memory of 2328 4004 msedge.exe 85 PID 4004 wrote to memory of 2328 4004 msedge.exe 85 PID 4004 wrote to memory of 2328 4004 msedge.exe 85 PID 4004 wrote to memory of 2328 4004 msedge.exe 85 PID 4004 wrote to memory of 2328 4004 msedge.exe 85 PID 4004 wrote to memory of 2328 4004 msedge.exe 85 PID 4004 wrote to memory of 2328 4004 msedge.exe 85 PID 4004 wrote to memory of 2328 4004 msedge.exe 85 PID 4004 wrote to memory of 2328 4004 msedge.exe 85 PID 4004 wrote to memory of 2328 4004 msedge.exe 85 PID 4004 wrote to memory of 2328 4004 msedge.exe 85 PID 4004 wrote to memory of 2328 4004 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\ff93d4b17c0424035e126dceb031b8eb_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4004 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcd3eb46f8,0x7ffcd3eb4708,0x7ffcd3eb47182⤵PID:2864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,9064306686298138388,14693958915546361695,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:22⤵PID:2800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,9064306686298138388,14693958915546361695,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2144 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,9064306686298138388,14693958915546361695,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2840 /prefetch:82⤵PID:2328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,9064306686298138388,14693958915546361695,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:2740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,9064306686298138388,14693958915546361695,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:2772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,9064306686298138388,14693958915546361695,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:3368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,9064306686298138388,14693958915546361695,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5260 /prefetch:82⤵PID:1604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,9064306686298138388,14693958915546361695,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5260 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,9064306686298138388,14693958915546361695,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5324 /prefetch:12⤵PID:4660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,9064306686298138388,14693958915546361695,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5340 /prefetch:12⤵PID:4048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,9064306686298138388,14693958915546361695,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6032 /prefetch:12⤵PID:992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,9064306686298138388,14693958915546361695,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6060 /prefetch:12⤵PID:2624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,9064306686298138388,14693958915546361695,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1720 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4468
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3720
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4968
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ecf7ca53c80b5245e35839009d12f866
SHA1a7af77cf31d410708ebd35a232a80bddfb0615bb
SHA256882a513b71b26210ff251769b82b2c5d59a932f96d9ce606ca2fab6530a13687
SHA512706722bd22ce27d854036b1b16e6a3cdb36284b66edc76238a79c2e11cee7d1307b121c898ad832eb1af73e4f08d991d64dc0bff529896ffb4ebe9b3dc381696
-
Filesize
152B
MD54dd2754d1bea40445984d65abee82b21
SHA14b6a5658bae9a784a370a115fbb4a12e92bd3390
SHA256183b8e82a0deaa83d04736553671cedb738adc909f483b3c5f822a0e6be7477d
SHA51292d44ee372ad33f892b921efa6cabc78e91025e89f05a22830763217826fa98d51d55711f85c8970ac58abf9adc6c85cc40878032cd6d2589ab226cd099f99e1
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD52c676b0a8b383d3b9bb5cd5cccc9b38e
SHA1767341cf5dd75abc92bc4819c60407352e4f0345
SHA25604701bf03c5f1e809937724e42b7eedb31cef5d5bc5b813ca5c94d93685b6bc9
SHA51273d8e90aee0bc4d33ecc9e215f1fe576d8d738c667662bab4fdd64f74e8439c047c56d591d4f031f7483ad9b3d9f78aa9ca503d32ffb52bbfa4ad532558c5647
-
Filesize
723B
MD5ecb1004c5fc711b42ff721dc431ec23e
SHA1a74aa2c5d82a6c0b37b6bfb54b889cb7760c9883
SHA256d3c6fb7d52a87b5679e92fa7d50489bd2b49bd26da875d17a2e1a7d3a4b850ca
SHA512339d44854088eb90e3127e0480d1c3db2c6e516c62db6b5b70c128855b5450dbe94cc2597c3dd04d6a1ec620fcd0146c3a723c1d318b42f43ae837c9ac96c656
-
Filesize
5KB
MD5cb58003d6fd81b3cb875d255f4f1aa79
SHA16c58dc2f2f46c42c7673c9b3e04fe20f320f589c
SHA2560389d61257c9e4f135f4e1cd77b1412e608a2bca9870d67dc445e1e00f6820a7
SHA51261fbdf1191962716d9faa8ccaad36d0358902aa9078003e487e044f4514f000588fa0e3e407f3896b53b5ba35457cbd117e940aa7226ce6214a4b309e7f524a4
-
Filesize
6KB
MD5208429a7592c397ced3b3d1f46a678c2
SHA181ce83f5471431091f0b346e392b4caccdd78e7b
SHA256b61cf898763ad4810db2f2737ed0e312ba3babe33a547fd454c38d6462e14a2b
SHA5129cdcc7ef29743e8c73803d4ac424b73653c91e9af2df51a27764937ffecfed451fcf56ebf520116b1c3db85d66b689d52222ee51ecc472505154fa1ecfec51fb
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD55e699561a1c153737d52119ed92c30dd
SHA1ca481556be23262e580dcee5be15faac7c209fcc
SHA256e61323e7bfae98e38139714668d477e685994306e8770f7d3dc936f8431e167f
SHA512cc9967f57f9313af5c2b256b078aaa02ac0c4ad94a2d2f148d498d72813fd7ef0c72ef79d04b1b18afd488ee2895b5ecbfaa0109572ecfd70aaf34370a900e9a