Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-10-2024 21:32
Static task
static1
Behavioral task
behavioral1
Sample
1e0885bc44a9018cb54329b2954af669_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1e0885bc44a9018cb54329b2954af669_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
1e0885bc44a9018cb54329b2954af669_JaffaCakes118.html
-
Size
26KB
-
MD5
1e0885bc44a9018cb54329b2954af669
-
SHA1
8a40cb553940d7962967ba8a360087ea3f5a7588
-
SHA256
b0e07e346761b38030f5719ecb9b5d2d9d958a01c9c22f0c68618676ee41b0c2
-
SHA512
d42a36130acc419fcf03efded27fac97deee9de5b8dcdf6e8f9d72fcd147e23cdc3e65bf34c46886cb5db4b285e5c5e88e6dd2ab7d1fd0407d156e093e22be9c
-
SSDEEP
384:YO9mkvNo0OJww/kvjJPWMoDw+H2AwiW2QZhPZ300xZ8cz2Co67ml5o0MgvBcr:v9mkvNo0Xwg9+WAxX0Phqbl51M2q
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2388 msedge.exe 2388 msedge.exe 1984 msedge.exe 1984 msedge.exe 664 identity_helper.exe 664 identity_helper.exe 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1984 wrote to memory of 4924 1984 msedge.exe 83 PID 1984 wrote to memory of 4924 1984 msedge.exe 83 PID 1984 wrote to memory of 584 1984 msedge.exe 87 PID 1984 wrote to memory of 584 1984 msedge.exe 87 PID 1984 wrote to memory of 584 1984 msedge.exe 87 PID 1984 wrote to memory of 584 1984 msedge.exe 87 PID 1984 wrote to memory of 584 1984 msedge.exe 87 PID 1984 wrote to memory of 584 1984 msedge.exe 87 PID 1984 wrote to memory of 584 1984 msedge.exe 87 PID 1984 wrote to memory of 584 1984 msedge.exe 87 PID 1984 wrote to memory of 584 1984 msedge.exe 87 PID 1984 wrote to memory of 584 1984 msedge.exe 87 PID 1984 wrote to memory of 584 1984 msedge.exe 87 PID 1984 wrote to memory of 584 1984 msedge.exe 87 PID 1984 wrote to memory of 584 1984 msedge.exe 87 PID 1984 wrote to memory of 584 1984 msedge.exe 87 PID 1984 wrote to memory of 584 1984 msedge.exe 87 PID 1984 wrote to memory of 584 1984 msedge.exe 87 PID 1984 wrote to memory of 584 1984 msedge.exe 87 PID 1984 wrote to memory of 584 1984 msedge.exe 87 PID 1984 wrote to memory of 584 1984 msedge.exe 87 PID 1984 wrote to memory of 584 1984 msedge.exe 87 PID 1984 wrote to memory of 584 1984 msedge.exe 87 PID 1984 wrote to memory of 584 1984 msedge.exe 87 PID 1984 wrote to memory of 584 1984 msedge.exe 87 PID 1984 wrote to memory of 584 1984 msedge.exe 87 PID 1984 wrote to memory of 584 1984 msedge.exe 87 PID 1984 wrote to memory of 584 1984 msedge.exe 87 PID 1984 wrote to memory of 584 1984 msedge.exe 87 PID 1984 wrote to memory of 584 1984 msedge.exe 87 PID 1984 wrote to memory of 584 1984 msedge.exe 87 PID 1984 wrote to memory of 584 1984 msedge.exe 87 PID 1984 wrote to memory of 584 1984 msedge.exe 87 PID 1984 wrote to memory of 584 1984 msedge.exe 87 PID 1984 wrote to memory of 584 1984 msedge.exe 87 PID 1984 wrote to memory of 584 1984 msedge.exe 87 PID 1984 wrote to memory of 584 1984 msedge.exe 87 PID 1984 wrote to memory of 584 1984 msedge.exe 87 PID 1984 wrote to memory of 584 1984 msedge.exe 87 PID 1984 wrote to memory of 584 1984 msedge.exe 87 PID 1984 wrote to memory of 584 1984 msedge.exe 87 PID 1984 wrote to memory of 584 1984 msedge.exe 87 PID 1984 wrote to memory of 2388 1984 msedge.exe 88 PID 1984 wrote to memory of 2388 1984 msedge.exe 88 PID 1984 wrote to memory of 628 1984 msedge.exe 89 PID 1984 wrote to memory of 628 1984 msedge.exe 89 PID 1984 wrote to memory of 628 1984 msedge.exe 89 PID 1984 wrote to memory of 628 1984 msedge.exe 89 PID 1984 wrote to memory of 628 1984 msedge.exe 89 PID 1984 wrote to memory of 628 1984 msedge.exe 89 PID 1984 wrote to memory of 628 1984 msedge.exe 89 PID 1984 wrote to memory of 628 1984 msedge.exe 89 PID 1984 wrote to memory of 628 1984 msedge.exe 89 PID 1984 wrote to memory of 628 1984 msedge.exe 89 PID 1984 wrote to memory of 628 1984 msedge.exe 89 PID 1984 wrote to memory of 628 1984 msedge.exe 89 PID 1984 wrote to memory of 628 1984 msedge.exe 89 PID 1984 wrote to memory of 628 1984 msedge.exe 89 PID 1984 wrote to memory of 628 1984 msedge.exe 89 PID 1984 wrote to memory of 628 1984 msedge.exe 89 PID 1984 wrote to memory of 628 1984 msedge.exe 89 PID 1984 wrote to memory of 628 1984 msedge.exe 89 PID 1984 wrote to memory of 628 1984 msedge.exe 89 PID 1984 wrote to memory of 628 1984 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\1e0885bc44a9018cb54329b2954af669_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x108,0x10c,0x110,0xd8,0x114,0x7ffd3e7f46f8,0x7ffd3e7f4708,0x7ffd3e7f47182⤵PID:4924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,11900794266436310249,9013940176051474073,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2184 /prefetch:22⤵PID:584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,11900794266436310249,9013940176051474073,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2404 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,11900794266436310249,9013940176051474073,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2692 /prefetch:82⤵PID:628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,11900794266436310249,9013940176051474073,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:4024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,11900794266436310249,9013940176051474073,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:5112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,11900794266436310249,9013940176051474073,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5108 /prefetch:12⤵PID:4212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,11900794266436310249,9013940176051474073,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4252 /prefetch:12⤵PID:4700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,11900794266436310249,9013940176051474073,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5988 /prefetch:82⤵PID:1284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,11900794266436310249,9013940176051474073,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5988 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,11900794266436310249,9013940176051474073,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6352 /prefetch:12⤵PID:4596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,11900794266436310249,9013940176051474073,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5848 /prefetch:12⤵PID:1996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,11900794266436310249,9013940176051474073,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4168 /prefetch:12⤵PID:4344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,11900794266436310249,9013940176051474073,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6200 /prefetch:12⤵PID:4440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,11900794266436310249,9013940176051474073,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4952 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4088
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1432
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4156
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e55832d7cd7e868a2c087c4c73678018
SHA1ed7a2f6d6437e907218ffba9128802eaf414a0eb
SHA256a4d7777b980ec53de3a70aca8fb25b77e9b53187e7d2f0fa1a729ee9a35da574
SHA512897fdebf1a9269a1bf1e3a791f6ee9ab7c24c9d75eeff65ac9599764e1c8585784e1837ba5321d90af0b004af121b2206081a6fb1b1ad571a0051ee33d3f5c5f
-
Filesize
152B
MD5c2d9eeb3fdd75834f0ac3f9767de8d6f
SHA14d16a7e82190f8490a00008bd53d85fb92e379b0
SHA2561e5efb5f1d78a4cc269cb116307e9d767fc5ad8a18e6cf95c81c61d7b1da5c66
SHA512d92f995f9e096ecc0a7b8b4aca336aeef0e7b919fe7fe008169f0b87da84d018971ba5728141557d42a0fc562a25191bd85e0d7354c401b09e8b62cdc44b6dcd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD52095d1def02af1571a78558be70f0010
SHA180293117441abbe6c536f3c153a6b614712c0a15
SHA256427fc2b0f704e1edac98fa52f63f2442d8a35dbc8c6cfc7398c3c050b45b5d69
SHA5120629997e5467ee5b016554dae902b3b5e27c2360dedfbfee51bdd13966a491b28e177700d3c2437bdc8f9dfd5ffa7f49c8d2f2ce3b1177f33631314618c0c1a3
-
Filesize
1KB
MD5ccbe8e602e37b5cd5e4e531177fa1417
SHA1c51f03d6260ec3a24de6ee12e66397a1e02b96dc
SHA25692004c073ac89dca60b97966aad4f7da31d34acc0926eebcd018ca93e037d0c7
SHA5122342b52e24fe6a9d1f1619c909147e32de97f73b7aa9f4487e687753545409d0b368a95400cc813f42c04eacb66d9cb51d44ab10b8a615c3bc0a8f092bca410b
-
Filesize
1KB
MD5bd41cca34674bc78b92cfd26b2e4a7dc
SHA186781dd7f403fedc5bfe74fa5ef23a93f1c7ac9f
SHA256e1291840210bd132a783e13220aed30572273290e30876b591bd244b73a4c3a8
SHA51290916b4124d465ebd88473a0bbdda87d1e72412ac2318957322d3110b8f52a00896c079faafa0720375871442f53fd408d8d76a12c080a4059aa406557bdf6f5
-
Filesize
6KB
MD562196622acdf4afb3bd5b1fa649ed59a
SHA14acbc3de7403bb3481f5340177d9f788178fefd5
SHA256609cbc3dac1573bf01056c269e900b6ba07e4ed3314c5b0b6328ed9db7a8a3df
SHA512a11d3f5767986e71b56b8895066748d44121d99fa373a785a133c845eb2c62d944abe9abb154fb3ebd1c0c212e287e60cf68b06a74ac8d207838e82346352e61
-
Filesize
6KB
MD5f575cebbd1016ef8154d7cafa97b73fd
SHA1b73886e15771bb1d317ad61c18542934193a51da
SHA2566ba9f6b8b1255287270fc3de874f4dcea96378f99efc09f03a8963910ac84aab
SHA5123510a9d3d7af6d18dd51e1359523d3683be1c8ee6eb52d5e311a68bc176a6c5b80e2d56ccdf2f7d08f0e8f0b7be4ac7b8d12ab42df5b17a84a991a604f5db6ad
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5d612699e11b51afa746c80228e0d9182
SHA1ea0da4ffdf5e68f7a07593e6aa69eb6cb7c39404
SHA25643919823c7942d8c6364e50ea65a864ba1629bf1fef0eedf522335a31176aeb3
SHA512fc04a238d918a781ab9ae46bc9cafd008faedc0835c5ea3270fdf6c9b0a9e25acd59ec3e5a468a44925061e21142f11a9c209eda0bd05351b24cf7b23b00edd6