Analysis
-
max time kernel
145s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08/10/2024, 20:16
Static task
static1
Behavioral task
behavioral1
Sample
24dca3e26f4dc28dbefd33246cae5d7e_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
24dca3e26f4dc28dbefd33246cae5d7e_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
24dca3e26f4dc28dbefd33246cae5d7e_JaffaCakes118.html
-
Size
48KB
-
MD5
24dca3e26f4dc28dbefd33246cae5d7e
-
SHA1
24c5a68c08328d2820e2872c38de1ab7854e6314
-
SHA256
9b36444c36ee7d1adeace0b1c066a612c6f7490dba0f8c702471105d86da4317
-
SHA512
fcc80faec29d472b1963ae07ed91f97c30d1fa14e75b8a74ed558f7ad657d4f166f7e1bed95bfb75f51eaafd2e0f624f68eaeae8fff53ba0c8c09ae24660c479
-
SSDEEP
768:oayHHvPWloscPyoFj7Qz+bxEW/OiCoAzFJaalbin:o3HH2lxcPtFwz+fmiCZaalO
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2712 msedge.exe 2712 msedge.exe 1804 msedge.exe 1804 msedge.exe 3064 identity_helper.exe 3064 identity_helper.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe 2840 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1804 wrote to memory of 4200 1804 msedge.exe 83 PID 1804 wrote to memory of 4200 1804 msedge.exe 83 PID 1804 wrote to memory of 2860 1804 msedge.exe 85 PID 1804 wrote to memory of 2860 1804 msedge.exe 85 PID 1804 wrote to memory of 2860 1804 msedge.exe 85 PID 1804 wrote to memory of 2860 1804 msedge.exe 85 PID 1804 wrote to memory of 2860 1804 msedge.exe 85 PID 1804 wrote to memory of 2860 1804 msedge.exe 85 PID 1804 wrote to memory of 2860 1804 msedge.exe 85 PID 1804 wrote to memory of 2860 1804 msedge.exe 85 PID 1804 wrote to memory of 2860 1804 msedge.exe 85 PID 1804 wrote to memory of 2860 1804 msedge.exe 85 PID 1804 wrote to memory of 2860 1804 msedge.exe 85 PID 1804 wrote to memory of 2860 1804 msedge.exe 85 PID 1804 wrote to memory of 2860 1804 msedge.exe 85 PID 1804 wrote to memory of 2860 1804 msedge.exe 85 PID 1804 wrote to memory of 2860 1804 msedge.exe 85 PID 1804 wrote to memory of 2860 1804 msedge.exe 85 PID 1804 wrote to memory of 2860 1804 msedge.exe 85 PID 1804 wrote to memory of 2860 1804 msedge.exe 85 PID 1804 wrote to memory of 2860 1804 msedge.exe 85 PID 1804 wrote to memory of 2860 1804 msedge.exe 85 PID 1804 wrote to memory of 2860 1804 msedge.exe 85 PID 1804 wrote to memory of 2860 1804 msedge.exe 85 PID 1804 wrote to memory of 2860 1804 msedge.exe 85 PID 1804 wrote to memory of 2860 1804 msedge.exe 85 PID 1804 wrote to memory of 2860 1804 msedge.exe 85 PID 1804 wrote to memory of 2860 1804 msedge.exe 85 PID 1804 wrote to memory of 2860 1804 msedge.exe 85 PID 1804 wrote to memory of 2860 1804 msedge.exe 85 PID 1804 wrote to memory of 2860 1804 msedge.exe 85 PID 1804 wrote to memory of 2860 1804 msedge.exe 85 PID 1804 wrote to memory of 2860 1804 msedge.exe 85 PID 1804 wrote to memory of 2860 1804 msedge.exe 85 PID 1804 wrote to memory of 2860 1804 msedge.exe 85 PID 1804 wrote to memory of 2860 1804 msedge.exe 85 PID 1804 wrote to memory of 2860 1804 msedge.exe 85 PID 1804 wrote to memory of 2860 1804 msedge.exe 85 PID 1804 wrote to memory of 2860 1804 msedge.exe 85 PID 1804 wrote to memory of 2860 1804 msedge.exe 85 PID 1804 wrote to memory of 2860 1804 msedge.exe 85 PID 1804 wrote to memory of 2860 1804 msedge.exe 85 PID 1804 wrote to memory of 2712 1804 msedge.exe 86 PID 1804 wrote to memory of 2712 1804 msedge.exe 86 PID 1804 wrote to memory of 3700 1804 msedge.exe 87 PID 1804 wrote to memory of 3700 1804 msedge.exe 87 PID 1804 wrote to memory of 3700 1804 msedge.exe 87 PID 1804 wrote to memory of 3700 1804 msedge.exe 87 PID 1804 wrote to memory of 3700 1804 msedge.exe 87 PID 1804 wrote to memory of 3700 1804 msedge.exe 87 PID 1804 wrote to memory of 3700 1804 msedge.exe 87 PID 1804 wrote to memory of 3700 1804 msedge.exe 87 PID 1804 wrote to memory of 3700 1804 msedge.exe 87 PID 1804 wrote to memory of 3700 1804 msedge.exe 87 PID 1804 wrote to memory of 3700 1804 msedge.exe 87 PID 1804 wrote to memory of 3700 1804 msedge.exe 87 PID 1804 wrote to memory of 3700 1804 msedge.exe 87 PID 1804 wrote to memory of 3700 1804 msedge.exe 87 PID 1804 wrote to memory of 3700 1804 msedge.exe 87 PID 1804 wrote to memory of 3700 1804 msedge.exe 87 PID 1804 wrote to memory of 3700 1804 msedge.exe 87 PID 1804 wrote to memory of 3700 1804 msedge.exe 87 PID 1804 wrote to memory of 3700 1804 msedge.exe 87 PID 1804 wrote to memory of 3700 1804 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\24dca3e26f4dc28dbefd33246cae5d7e_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd5e5b46f8,0x7ffd5e5b4708,0x7ffd5e5b47182⤵PID:4200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,14177356358124397089,16663972343056814679,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:22⤵PID:2860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,14177356358124397089,16663972343056814679,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,14177356358124397089,16663972343056814679,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2900 /prefetch:82⤵PID:3700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,14177356358124397089,16663972343056814679,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:3644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,14177356358124397089,16663972343056814679,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,14177356358124397089,16663972343056814679,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4620 /prefetch:12⤵PID:4728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,14177356358124397089,16663972343056814679,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3876 /prefetch:12⤵PID:2904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,14177356358124397089,16663972343056814679,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5000 /prefetch:12⤵PID:3288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,14177356358124397089,16663972343056814679,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3876 /prefetch:12⤵PID:3004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,14177356358124397089,16663972343056814679,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4864 /prefetch:12⤵PID:2328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,14177356358124397089,16663972343056814679,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4720 /prefetch:82⤵PID:2152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,14177356358124397089,16663972343056814679,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4720 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,14177356358124397089,16663972343056814679,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5004 /prefetch:12⤵PID:3976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,14177356358124397089,16663972343056814679,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5400 /prefetch:12⤵PID:5104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,14177356358124397089,16663972343056814679,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4668 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2840
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1920
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1208
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD50a9dc42e4013fc47438e96d24beb8eff
SHA1806ab26d7eae031a58484188a7eb1adab06457fc
SHA25658d66151799526b3fa372552cd99b385415d9e9a119302b99aadc34dd51dd151
SHA512868d6b421ae2501a519595d0c34ddef25b2a98b082c5203da8349035f1f6764ddf183197f1054e7e86a752c71eccbc0649e515b63c55bc18cf5f0592397e258f
-
Filesize
152B
MD561cef8e38cd95bf003f5fdd1dc37dae1
SHA111f2f79ecb349344c143eea9a0fed41891a3467f
SHA256ae671613623b4477fbd5daf1fd2d148ae2a09ddcc3804b2b6d4ffcb60b317e3e
SHA5126fb9b333fe0e8fde19fdd0bd01a1990a4e60a87c0a02bc8297da1206e42f8690d06b030308e58c862e9e77714a585eed7cc1627590d99a10aeb77fc0dd3d864d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD51132b5c993f5cbedfc9d042ad88005e7
SHA11a6fa7a0076e960e71970d810d332e35ea43facd
SHA256d6165fc1998d7c97e31587048e63484e989ffe7e841fd3f6bc98b5492d7771db
SHA5128ddedafcb318798b76617418d7459a2ea3b383f1494bda20be03d9f84e3c71527af2825fdb0b88ca34a325d6e8747699ca71a3b3ce080ef3f2330dfdd5824ae7
-
Filesize
1KB
MD5afaddf3118e62e3475e8f5c3214dba26
SHA124dc76d30880b2466cbdc71fdf74c86d7d870491
SHA256aeb1996e7f88b3cf52584e2e6bd181dc8285ddcf196418d45567544d6cabe17d
SHA512b69371f4b828cffb8b0fab18f537ddf8b9826a5a8683095175f6f70ef4086e632046fe1a462710cfa730bf85d822fd2357071a2352c890e374cfc2a844443bd4
-
Filesize
6KB
MD5e5586e90055546fe43da2f70d0aa6b47
SHA180717aa75f65dd96c57e79f12749003c9eeea973
SHA2565c2d8bb83efb3f8b97bb43e9dcc8413795e9375b1009a3886221ddf56bbf9e31
SHA51222c7f0dc16916bfbd520d6cc90db5bbf74f06561b8dfa1edaf739793b4a2bf61ddc5aca23954ca8a82a62a9e0ab01554eed4fdc5cffeaec58fa1f25085dcb2d2
-
Filesize
6KB
MD5a5390f5a6d467bdfa4944f123d212096
SHA127a0c135b36d07cbb611aa082f72f8f284f7ce1e
SHA256387432f30eb6fead789849c3cf844034225872db23605805b24fc6b73d4eca66
SHA512c165fd3dc6c0c22b0ca1d6d1859fd1d73fbb9812a7a2dc63c9f26876753ef3dd59579dcb75933b130e77feaf5fc0d96cee77adf560c34b404a7de086406c3998
-
Filesize
7KB
MD539f03eac7bb43e8e967c926d8f03a4a7
SHA168209fefe256ed351dba129412f70c0e5f988d78
SHA256938ea82d6326efc4b46baf5dcadde5eda2ff0e7f285293d75fccee89d60e3869
SHA512415358fafc039844d635dd38522317e6d63edfab5ddb11e22c1e12602fce1ce94d57edd2bfd1bf344a0d13562f4fc25a59fba533b307ac3ba4a3f73372021b4e
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD57de3e63ac9417608791f69ed260a92b9
SHA1368988b5d9952560263a0e9041b30d10e5616a04
SHA256b6cd3c9107c8281f0d132a424181cdb651275f12d2117ee1d6563e8a0f8a782e
SHA51227ddff8bd4749ae64d7ce0cca7ca99357f0b3a50cf0b7f8105ce4806acc78749c7503fc423fef7a3a3a0c98191c5650a21b94eb2f404a86dec1bc69f0bac5000