Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-10-2024 03:45
Static task
static1
Behavioral task
behavioral1
Sample
2a3a85450ecf893142f10ff383469fb0_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2a3a85450ecf893142f10ff383469fb0_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
2a3a85450ecf893142f10ff383469fb0_JaffaCakes118.html
-
Size
15KB
-
MD5
2a3a85450ecf893142f10ff383469fb0
-
SHA1
5ff4bd629e573b6c6db070612a441430f8f89139
-
SHA256
a4f2201e6dfc2df25ac31d5054a165fe29a35f91e45281fc613ef4a92f9869d6
-
SHA512
0ec0e01d7be15c76cde5fe6649879d79cbfcca553f8973c568f44d7dc2c9f834605b8a1391d74a3d57525a51e914726b85649bd089af5f76d3398db5cdcf74f3
-
SSDEEP
384:Eb4rcBDuDEWKdqHOfqwmT0iP9okyYGH62gDnrplfhZRRFU2V:ESclbWM5fqz1ok+TgbfdRFl
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1008 msedge.exe 1008 msedge.exe 3336 msedge.exe 3336 msedge.exe 3664 identity_helper.exe 3664 identity_helper.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe 4144 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3336 wrote to memory of 628 3336 msedge.exe 83 PID 3336 wrote to memory of 628 3336 msedge.exe 83 PID 3336 wrote to memory of 3452 3336 msedge.exe 84 PID 3336 wrote to memory of 3452 3336 msedge.exe 84 PID 3336 wrote to memory of 3452 3336 msedge.exe 84 PID 3336 wrote to memory of 3452 3336 msedge.exe 84 PID 3336 wrote to memory of 3452 3336 msedge.exe 84 PID 3336 wrote to memory of 3452 3336 msedge.exe 84 PID 3336 wrote to memory of 3452 3336 msedge.exe 84 PID 3336 wrote to memory of 3452 3336 msedge.exe 84 PID 3336 wrote to memory of 3452 3336 msedge.exe 84 PID 3336 wrote to memory of 3452 3336 msedge.exe 84 PID 3336 wrote to memory of 3452 3336 msedge.exe 84 PID 3336 wrote to memory of 3452 3336 msedge.exe 84 PID 3336 wrote to memory of 3452 3336 msedge.exe 84 PID 3336 wrote to memory of 3452 3336 msedge.exe 84 PID 3336 wrote to memory of 3452 3336 msedge.exe 84 PID 3336 wrote to memory of 3452 3336 msedge.exe 84 PID 3336 wrote to memory of 3452 3336 msedge.exe 84 PID 3336 wrote to memory of 3452 3336 msedge.exe 84 PID 3336 wrote to memory of 3452 3336 msedge.exe 84 PID 3336 wrote to memory of 3452 3336 msedge.exe 84 PID 3336 wrote to memory of 3452 3336 msedge.exe 84 PID 3336 wrote to memory of 3452 3336 msedge.exe 84 PID 3336 wrote to memory of 3452 3336 msedge.exe 84 PID 3336 wrote to memory of 3452 3336 msedge.exe 84 PID 3336 wrote to memory of 3452 3336 msedge.exe 84 PID 3336 wrote to memory of 3452 3336 msedge.exe 84 PID 3336 wrote to memory of 3452 3336 msedge.exe 84 PID 3336 wrote to memory of 3452 3336 msedge.exe 84 PID 3336 wrote to memory of 3452 3336 msedge.exe 84 PID 3336 wrote to memory of 3452 3336 msedge.exe 84 PID 3336 wrote to memory of 3452 3336 msedge.exe 84 PID 3336 wrote to memory of 3452 3336 msedge.exe 84 PID 3336 wrote to memory of 3452 3336 msedge.exe 84 PID 3336 wrote to memory of 3452 3336 msedge.exe 84 PID 3336 wrote to memory of 3452 3336 msedge.exe 84 PID 3336 wrote to memory of 3452 3336 msedge.exe 84 PID 3336 wrote to memory of 3452 3336 msedge.exe 84 PID 3336 wrote to memory of 3452 3336 msedge.exe 84 PID 3336 wrote to memory of 3452 3336 msedge.exe 84 PID 3336 wrote to memory of 3452 3336 msedge.exe 84 PID 3336 wrote to memory of 1008 3336 msedge.exe 85 PID 3336 wrote to memory of 1008 3336 msedge.exe 85 PID 3336 wrote to memory of 3864 3336 msedge.exe 86 PID 3336 wrote to memory of 3864 3336 msedge.exe 86 PID 3336 wrote to memory of 3864 3336 msedge.exe 86 PID 3336 wrote to memory of 3864 3336 msedge.exe 86 PID 3336 wrote to memory of 3864 3336 msedge.exe 86 PID 3336 wrote to memory of 3864 3336 msedge.exe 86 PID 3336 wrote to memory of 3864 3336 msedge.exe 86 PID 3336 wrote to memory of 3864 3336 msedge.exe 86 PID 3336 wrote to memory of 3864 3336 msedge.exe 86 PID 3336 wrote to memory of 3864 3336 msedge.exe 86 PID 3336 wrote to memory of 3864 3336 msedge.exe 86 PID 3336 wrote to memory of 3864 3336 msedge.exe 86 PID 3336 wrote to memory of 3864 3336 msedge.exe 86 PID 3336 wrote to memory of 3864 3336 msedge.exe 86 PID 3336 wrote to memory of 3864 3336 msedge.exe 86 PID 3336 wrote to memory of 3864 3336 msedge.exe 86 PID 3336 wrote to memory of 3864 3336 msedge.exe 86 PID 3336 wrote to memory of 3864 3336 msedge.exe 86 PID 3336 wrote to memory of 3864 3336 msedge.exe 86 PID 3336 wrote to memory of 3864 3336 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2a3a85450ecf893142f10ff383469fb0_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3336 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd769d46f8,0x7ffd769d4708,0x7ffd769d47182⤵PID:628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2208,18087406876258553449,600639195924231827,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2156 /prefetch:22⤵PID:3452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2208,18087406876258553449,600639195924231827,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2248 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2208,18087406876258553449,600639195924231827,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2708 /prefetch:82⤵PID:3864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,18087406876258553449,600639195924231827,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2168 /prefetch:12⤵PID:1544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,18087406876258553449,600639195924231827,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:1504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,18087406876258553449,600639195924231827,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4168 /prefetch:12⤵PID:456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,18087406876258553449,600639195924231827,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5276 /prefetch:12⤵PID:4824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,18087406876258553449,600639195924231827,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5416 /prefetch:12⤵PID:4196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2208,18087406876258553449,600639195924231827,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5780 /prefetch:82⤵PID:1956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2208,18087406876258553449,600639195924231827,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5780 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,18087406876258553449,600639195924231827,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5712 /prefetch:12⤵PID:5080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,18087406876258553449,600639195924231827,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5696 /prefetch:12⤵PID:4932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,18087406876258553449,600639195924231827,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6040 /prefetch:12⤵PID:2188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,18087406876258553449,600639195924231827,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5644 /prefetch:12⤵PID:976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2208,18087406876258553449,600639195924231827,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3096 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4144
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1628
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3300
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5bffcefacce25cd03f3d5c9446ddb903d
SHA18923f84aa86db316d2f5c122fe3874bbe26f3bab
SHA25623e7cbbf64c81122c3cb30a0933c10a320e254447771737a326ce37a0694d405
SHA512761dae5315b35ec0b2fe68019881397f5d2eadba3963aba79a89f8953a0cd705012d7faf3a204a5f36008926b9f614980e333351596b06ce7058d744345ce2e7
-
Filesize
152B
MD5d22073dea53e79d9b824f27ac5e9813e
SHA16d8a7281241248431a1571e6ddc55798b01fa961
SHA25686713962c3bb287964678b148ee08ea83fb83483dff8be91c8a6085ca560b2a6
SHA51297152091ee24b6e713b8ec8123cb62511f8a7e8a6c6c3f2f6727d0a60497be28814613b476009b853575d4931e5df950e28a41afbf6707cb672206f1219c4413
-
Filesize
213KB
MD5f942900ff0a10f251d338c612c456948
SHA14a283d3c8f3dc491e43c430d97c3489ee7a3d320
SHA25638b76a54655aff71271a9ad376ac17f20187abd581bf5aced69ccde0fe6e2fd6
SHA5129b393ce73598ed1997d28ceeddb23491a4d986c337984878ebb0ae06019e30ea77448d375d3d6563c774856d6bc98ee3ca0e0ba88ea5769a451a5e814f6ddb41
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize312B
MD50afe28885063d2f90039eec0cd32bd15
SHA1688b2ef3c8ba13aaa8fc55abc84f5112b7939dcf
SHA2568948f0bcdf02ce03043a8b7ec2d71051b66ab42df4ae8cd7eedf4779e20097bb
SHA512ab48f18b5b70d5a84602bb0dc04dc8046e7645d736793e12808de71fed60ebd5e9ca86fc0f3b24f824be808c5c8b8497ef58ae4205364b4e81831f22bf86f59d
-
Filesize
1KB
MD5fc77a0b024d4cf727afa87c0f3005c2b
SHA17346e09c495c5e5f2bd7a6457a3f9733296576cb
SHA256bedc4833e29f21c128fefe9bfe4b25d7afc26a3a7d7b8409de8fe06e75bf7967
SHA5124392ac8503bc2c67a1966f419c7e1cf8219f9cc87a8b5c20bfe3df50ec8e54796132e829147dd382f549155ec93c5a034f2247662abea09f557d62aa86e91e2f
-
Filesize
6KB
MD5f8099ba8c18b83816e43951e548fca57
SHA1287123ec5d6913aa3b73f6b27e5574fe2b28ee7a
SHA2560496b66d56c39b393ecabbfe5542823f57aeb872cdef2f234b27a1d3d6140267
SHA512a974f841b0d43c350b46fd4353d0496aec913f63b2cca6de3d20bd8e717ed4ad74fcff06dbaafdb87dbf3631c0dcddc015263519b99a929085f9a9895433de45
-
Filesize
6KB
MD5bd1fd1ed107ccf064a813ebe2db22c53
SHA12454464a0362a66b68a05f94147a9ea1ef4e527c
SHA2564faf33278509233ffaa10100ebed8a82e3035288976c302d42432b5e7a2c7ad6
SHA51255e27e63de80ed6954dcb4a597bbe134f89a152611558ee6f4c7508e453375ac947c3e092f2ef35b2c61f0d2cf15a19f52093a77ca1c03a6a7bcde625fcd5dd0
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD51ff3ea01e6a8d0e04d7025264af1d336
SHA12fdad67654cfb9502f29180f14bcdb2bc84d11e8
SHA25600c3d626665933d6b25d04fd6e4fd690ffcfa5b093dbbb722ecd40e877713152
SHA5125df083bfb8da4742f837fb69886bd7d0a8a6c64e999507876d79f6b9aab884be0df51f03cbc2c2fff0ffad865b1192a6b6046bfb1db1bace07f97f11f40685e0