Analysis
-
max time kernel
145s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-10-2024 04:56
Static task
static1
Behavioral task
behavioral1
Sample
2b3c489684bbfec2d8878086d83e577f_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2b3c489684bbfec2d8878086d83e577f_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
2b3c489684bbfec2d8878086d83e577f_JaffaCakes118.html
-
Size
90KB
-
MD5
2b3c489684bbfec2d8878086d83e577f
-
SHA1
002319198d6c345ba5840d435d8f65a3dfa28bbc
-
SHA256
6c5ff8afaba4c3e083fad67d6d5840b1dddb75a42a629d112a907038960be525
-
SHA512
8fd7b66a8ce61bc67548032589b0801cd6e150a887123304a809319ac4d59fed7707a79d079acd233901f64c5651467bbaaf02735c9413e918e9418a0f85d49d
-
SSDEEP
1536:gQZBCCOdg0IxCPzEqQPjWoNDag3Se6Hge2i1Y/xlckBSvGFjT46DrFjQ6bwzuqLD:gk2O0IxaPd
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2268 msedge.exe 2268 msedge.exe 2352 msedge.exe 2352 msedge.exe 5048 identity_helper.exe 5048 identity_helper.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe 3264 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2352 wrote to memory of 2208 2352 msedge.exe 83 PID 2352 wrote to memory of 2208 2352 msedge.exe 83 PID 2352 wrote to memory of 4228 2352 msedge.exe 84 PID 2352 wrote to memory of 4228 2352 msedge.exe 84 PID 2352 wrote to memory of 4228 2352 msedge.exe 84 PID 2352 wrote to memory of 4228 2352 msedge.exe 84 PID 2352 wrote to memory of 4228 2352 msedge.exe 84 PID 2352 wrote to memory of 4228 2352 msedge.exe 84 PID 2352 wrote to memory of 4228 2352 msedge.exe 84 PID 2352 wrote to memory of 4228 2352 msedge.exe 84 PID 2352 wrote to memory of 4228 2352 msedge.exe 84 PID 2352 wrote to memory of 4228 2352 msedge.exe 84 PID 2352 wrote to memory of 4228 2352 msedge.exe 84 PID 2352 wrote to memory of 4228 2352 msedge.exe 84 PID 2352 wrote to memory of 4228 2352 msedge.exe 84 PID 2352 wrote to memory of 4228 2352 msedge.exe 84 PID 2352 wrote to memory of 4228 2352 msedge.exe 84 PID 2352 wrote to memory of 4228 2352 msedge.exe 84 PID 2352 wrote to memory of 4228 2352 msedge.exe 84 PID 2352 wrote to memory of 4228 2352 msedge.exe 84 PID 2352 wrote to memory of 4228 2352 msedge.exe 84 PID 2352 wrote to memory of 4228 2352 msedge.exe 84 PID 2352 wrote to memory of 4228 2352 msedge.exe 84 PID 2352 wrote to memory of 4228 2352 msedge.exe 84 PID 2352 wrote to memory of 4228 2352 msedge.exe 84 PID 2352 wrote to memory of 4228 2352 msedge.exe 84 PID 2352 wrote to memory of 4228 2352 msedge.exe 84 PID 2352 wrote to memory of 4228 2352 msedge.exe 84 PID 2352 wrote to memory of 4228 2352 msedge.exe 84 PID 2352 wrote to memory of 4228 2352 msedge.exe 84 PID 2352 wrote to memory of 4228 2352 msedge.exe 84 PID 2352 wrote to memory of 4228 2352 msedge.exe 84 PID 2352 wrote to memory of 4228 2352 msedge.exe 84 PID 2352 wrote to memory of 4228 2352 msedge.exe 84 PID 2352 wrote to memory of 4228 2352 msedge.exe 84 PID 2352 wrote to memory of 4228 2352 msedge.exe 84 PID 2352 wrote to memory of 4228 2352 msedge.exe 84 PID 2352 wrote to memory of 4228 2352 msedge.exe 84 PID 2352 wrote to memory of 4228 2352 msedge.exe 84 PID 2352 wrote to memory of 4228 2352 msedge.exe 84 PID 2352 wrote to memory of 4228 2352 msedge.exe 84 PID 2352 wrote to memory of 4228 2352 msedge.exe 84 PID 2352 wrote to memory of 2268 2352 msedge.exe 85 PID 2352 wrote to memory of 2268 2352 msedge.exe 85 PID 2352 wrote to memory of 3116 2352 msedge.exe 86 PID 2352 wrote to memory of 3116 2352 msedge.exe 86 PID 2352 wrote to memory of 3116 2352 msedge.exe 86 PID 2352 wrote to memory of 3116 2352 msedge.exe 86 PID 2352 wrote to memory of 3116 2352 msedge.exe 86 PID 2352 wrote to memory of 3116 2352 msedge.exe 86 PID 2352 wrote to memory of 3116 2352 msedge.exe 86 PID 2352 wrote to memory of 3116 2352 msedge.exe 86 PID 2352 wrote to memory of 3116 2352 msedge.exe 86 PID 2352 wrote to memory of 3116 2352 msedge.exe 86 PID 2352 wrote to memory of 3116 2352 msedge.exe 86 PID 2352 wrote to memory of 3116 2352 msedge.exe 86 PID 2352 wrote to memory of 3116 2352 msedge.exe 86 PID 2352 wrote to memory of 3116 2352 msedge.exe 86 PID 2352 wrote to memory of 3116 2352 msedge.exe 86 PID 2352 wrote to memory of 3116 2352 msedge.exe 86 PID 2352 wrote to memory of 3116 2352 msedge.exe 86 PID 2352 wrote to memory of 3116 2352 msedge.exe 86 PID 2352 wrote to memory of 3116 2352 msedge.exe 86 PID 2352 wrote to memory of 3116 2352 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2b3c489684bbfec2d8878086d83e577f_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffda8d446f8,0x7ffda8d44708,0x7ffda8d447182⤵PID:2208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,16571527768509610705,5252858579973541458,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:22⤵PID:4228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,16571527768509610705,5252858579973541458,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,16571527768509610705,5252858579973541458,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2900 /prefetch:82⤵PID:3116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,16571527768509610705,5252858579973541458,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2116 /prefetch:12⤵PID:4040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,16571527768509610705,5252858579973541458,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:4340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,16571527768509610705,5252858579973541458,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4152 /prefetch:12⤵PID:3100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,16571527768509610705,5252858579973541458,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4840 /prefetch:12⤵PID:1944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,16571527768509610705,5252858579973541458,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5748 /prefetch:12⤵PID:2996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,16571527768509610705,5252858579973541458,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6368 /prefetch:82⤵PID:4020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,16571527768509610705,5252858579973541458,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6368 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,16571527768509610705,5252858579973541458,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5724 /prefetch:12⤵PID:1524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,16571527768509610705,5252858579973541458,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5108 /prefetch:12⤵PID:468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,16571527768509610705,5252858579973541458,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6064 /prefetch:12⤵PID:4416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,16571527768509610705,5252858579973541458,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5736 /prefetch:12⤵PID:4992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,16571527768509610705,5252858579973541458,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1820 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3264
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1220
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1104
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5fab8d8d865e33fe195732aa7dcb91c30
SHA12637e832f38acc70af3e511f5eba80fbd7461f2c
SHA2561b034ffe38e534e2b7a21be7c1f207ff84a1d5f3893207d0b4bb1a509b4185ea
SHA51239a3d43ef7e28fea2cb247a5d09576a4904a43680db8c32139f22a03d80f6ede98708a2452f3f82232b868501340f79c0b3f810f597bcaf5267c3ccfb1704b43
-
Filesize
152B
MD536988ca14952e1848e81a959880ea217
SHA1a0482ef725657760502c2d1a5abe0bb37aebaadb
SHA256d7e96088b37cec1bde202ae8ec2d2f3c3aafc368b6ebd91b3e2985846facf2e6
SHA512d04b2f5afec92eb3d9f9cdc148a3eddd1b615e0dfb270566a7969576f50881d1f8572bccb8b9fd7993724bdfe36fc7633a33381d43e0b96c4e9bbd53fc010173
-
Filesize
213KB
MD5f942900ff0a10f251d338c612c456948
SHA14a283d3c8f3dc491e43c430d97c3489ee7a3d320
SHA25638b76a54655aff71271a9ad376ac17f20187abd581bf5aced69ccde0fe6e2fd6
SHA5129b393ce73598ed1997d28ceeddb23491a4d986c337984878ebb0ae06019e30ea77448d375d3d6563c774856d6bc98ee3ca0e0ba88ea5769a451a5e814f6ddb41
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize504B
MD53bb8b985f77ab8d0020917d351803ced
SHA1bccbf0b25799371ab0850b7bb8a9eac778f8b791
SHA25648911eb6c86abcf2ce94a565444c832b8b1c5f6c4f605f07a9e15215407a1b01
SHA512587eaca62a4297642cb333a2068b913814bde7c04cc4ea058a01b35cfbf3a747f060af25f7043423b9781803b259ffe4acdf4ee8dbba3623ca9ed0c0a55ea6df
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
1KB
MD59788b305a443c2a642b83fac2afcc4d0
SHA1a94d427f763cae102948d06d01894538b6f8ccc1
SHA256356d4e423d92b41858bd63b823f8226ff656c8d3f7f3fc6890a4f2e19efe9497
SHA5126b9c75465a4568c23614a66710d096d8a7dc372441d264c205a4262c497a1221e20672edbd29680d13b2681b726e04ea56f50bec08485c1f9c15832711f31c8e
-
Filesize
6KB
MD584cf9197f89f66e2c314a31443b893a9
SHA1d1ee2164c612cc3652e5cbfefd71c255915fd0ca
SHA256e4dc12069e458cc2d36bad925fc787d596c95b6dc2f7210f028d294faba78063
SHA51230b4d049b7cfa85e10ae08abdee2325b419fac23ab7b61dbedbcbc612241b5e466a789b5aa42c3231564ebaecf8fa0da4722c57cffbd08c266c90df3afe01aae
-
Filesize
6KB
MD5ce2d1de38692edc947774edf22f192e5
SHA10df991acc140bc3a2e236f4000b44ee988ed33f2
SHA256faab661d6c8585fd19c37f641c19d63ac4cc5ea1f2c4d97f0eea7b028ed6eadb
SHA5127c7d43f3fdd994b934b3febb71ac7672cfbf0a9dd3c18f496cc27b0b7d3d5d0b3f4d4d44e775659368241575e897360ab49020b9af31885166e0c5c83b84e9af
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5dab3607ac481eebec1a65b81cac5b8f1
SHA153835423970a0a0b838dce4c2e03b693d82f86ed
SHA256e39783a4a0e206a8e94665773eb7281a1f50fd88906e97766abdbc66b1cce44b
SHA512b03ad5f52bcaaa2fd0eb0859585fd586132bff292083b07ee732ff370465becd5227ee43d3fcea9929338e66ddb61485e55e9957766444e27a5410848c7fdbe1