Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09/10/2024, 08:15
Static task
static1
Behavioral task
behavioral1
Sample
2dc03dc51649423b010d2f59d5808d41_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
2dc03dc51649423b010d2f59d5808d41_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
2dc03dc51649423b010d2f59d5808d41_JaffaCakes118.html
-
Size
12KB
-
MD5
2dc03dc51649423b010d2f59d5808d41
-
SHA1
09f0f38ee77d0cbfad612b8dbbb2c11b8eb0248c
-
SHA256
74a35d1c091d114b881dfc275655c34c2124ff6ec4479fc292114aff5cc1e7d3
-
SHA512
705a63d7b29c8028d5d123d03ddb08ec99338cca57bd2bf4a46ddcb3372f93b50f869f8a4e234db7a9bc0f04d6e807d70c361fdb6a8ca282a8f51fa552b2b2ec
-
SSDEEP
192:UhVqp+pzpVNoS9JbV3So0lxsF0JiJJ15JxJYJ4krt3iGWvWVadki:Yu6XKjo0lUsiBL
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2452 msedge.exe 2452 msedge.exe 4716 msedge.exe 4716 msedge.exe 4204 identity_helper.exe 4204 identity_helper.exe 1836 msedge.exe 1836 msedge.exe 1836 msedge.exe 1836 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4716 wrote to memory of 1948 4716 msedge.exe 83 PID 4716 wrote to memory of 1948 4716 msedge.exe 83 PID 4716 wrote to memory of 4220 4716 msedge.exe 84 PID 4716 wrote to memory of 4220 4716 msedge.exe 84 PID 4716 wrote to memory of 4220 4716 msedge.exe 84 PID 4716 wrote to memory of 4220 4716 msedge.exe 84 PID 4716 wrote to memory of 4220 4716 msedge.exe 84 PID 4716 wrote to memory of 4220 4716 msedge.exe 84 PID 4716 wrote to memory of 4220 4716 msedge.exe 84 PID 4716 wrote to memory of 4220 4716 msedge.exe 84 PID 4716 wrote to memory of 4220 4716 msedge.exe 84 PID 4716 wrote to memory of 4220 4716 msedge.exe 84 PID 4716 wrote to memory of 4220 4716 msedge.exe 84 PID 4716 wrote to memory of 4220 4716 msedge.exe 84 PID 4716 wrote to memory of 4220 4716 msedge.exe 84 PID 4716 wrote to memory of 4220 4716 msedge.exe 84 PID 4716 wrote to memory of 4220 4716 msedge.exe 84 PID 4716 wrote to memory of 4220 4716 msedge.exe 84 PID 4716 wrote to memory of 4220 4716 msedge.exe 84 PID 4716 wrote to memory of 4220 4716 msedge.exe 84 PID 4716 wrote to memory of 4220 4716 msedge.exe 84 PID 4716 wrote to memory of 4220 4716 msedge.exe 84 PID 4716 wrote to memory of 4220 4716 msedge.exe 84 PID 4716 wrote to memory of 4220 4716 msedge.exe 84 PID 4716 wrote to memory of 4220 4716 msedge.exe 84 PID 4716 wrote to memory of 4220 4716 msedge.exe 84 PID 4716 wrote to memory of 4220 4716 msedge.exe 84 PID 4716 wrote to memory of 4220 4716 msedge.exe 84 PID 4716 wrote to memory of 4220 4716 msedge.exe 84 PID 4716 wrote to memory of 4220 4716 msedge.exe 84 PID 4716 wrote to memory of 4220 4716 msedge.exe 84 PID 4716 wrote to memory of 4220 4716 msedge.exe 84 PID 4716 wrote to memory of 4220 4716 msedge.exe 84 PID 4716 wrote to memory of 4220 4716 msedge.exe 84 PID 4716 wrote to memory of 4220 4716 msedge.exe 84 PID 4716 wrote to memory of 4220 4716 msedge.exe 84 PID 4716 wrote to memory of 4220 4716 msedge.exe 84 PID 4716 wrote to memory of 4220 4716 msedge.exe 84 PID 4716 wrote to memory of 4220 4716 msedge.exe 84 PID 4716 wrote to memory of 4220 4716 msedge.exe 84 PID 4716 wrote to memory of 4220 4716 msedge.exe 84 PID 4716 wrote to memory of 4220 4716 msedge.exe 84 PID 4716 wrote to memory of 2452 4716 msedge.exe 85 PID 4716 wrote to memory of 2452 4716 msedge.exe 85 PID 4716 wrote to memory of 3684 4716 msedge.exe 86 PID 4716 wrote to memory of 3684 4716 msedge.exe 86 PID 4716 wrote to memory of 3684 4716 msedge.exe 86 PID 4716 wrote to memory of 3684 4716 msedge.exe 86 PID 4716 wrote to memory of 3684 4716 msedge.exe 86 PID 4716 wrote to memory of 3684 4716 msedge.exe 86 PID 4716 wrote to memory of 3684 4716 msedge.exe 86 PID 4716 wrote to memory of 3684 4716 msedge.exe 86 PID 4716 wrote to memory of 3684 4716 msedge.exe 86 PID 4716 wrote to memory of 3684 4716 msedge.exe 86 PID 4716 wrote to memory of 3684 4716 msedge.exe 86 PID 4716 wrote to memory of 3684 4716 msedge.exe 86 PID 4716 wrote to memory of 3684 4716 msedge.exe 86 PID 4716 wrote to memory of 3684 4716 msedge.exe 86 PID 4716 wrote to memory of 3684 4716 msedge.exe 86 PID 4716 wrote to memory of 3684 4716 msedge.exe 86 PID 4716 wrote to memory of 3684 4716 msedge.exe 86 PID 4716 wrote to memory of 3684 4716 msedge.exe 86 PID 4716 wrote to memory of 3684 4716 msedge.exe 86 PID 4716 wrote to memory of 3684 4716 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2dc03dc51649423b010d2f59d5808d41_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4716 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffe1b346f8,0x7fffe1b34708,0x7fffe1b347182⤵PID:1948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2208,16548005156257612514,75262812738809328,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2224 /prefetch:22⤵PID:4220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2208,16548005156257612514,75262812738809328,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2276 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2208,16548005156257612514,75262812738809328,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2612 /prefetch:82⤵PID:3684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,16548005156257612514,75262812738809328,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:12⤵PID:876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,16548005156257612514,75262812738809328,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:12⤵PID:2676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,16548005156257612514,75262812738809328,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4244 /prefetch:12⤵PID:1588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,16548005156257612514,75262812738809328,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5256 /prefetch:12⤵PID:3140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2208,16548005156257612514,75262812738809328,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4220 /prefetch:82⤵PID:1148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2208,16548005156257612514,75262812738809328,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4220 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,16548005156257612514,75262812738809328,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6124 /prefetch:12⤵PID:1368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,16548005156257612514,75262812738809328,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5668 /prefetch:12⤵PID:4832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,16548005156257612514,75262812738809328,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5476 /prefetch:12⤵PID:2288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,16548005156257612514,75262812738809328,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5436 /prefetch:12⤵PID:1632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2208,16548005156257612514,75262812738809328,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1860 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1836
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1928
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1920
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD5750fba5ba9e5aaa69110fbeafa3c3c55
SHA16ecdfd19e239292888eee6c823b63fd40b8a8adb
SHA256617244339e3c5206063c6599e0932a3b6fc4824339228054dea4dd47bea8a0b7
SHA512c8cf333f7f9292725d69f40e098d63f9a997161e96f4cb5a56e003cb3dc431691288f4833abf3cb5dd6196417e4e0e7b91155125fa12f2d25c1954efae8b012b
-
Filesize
152B
MD5b8880802fc2bb880a7a869faa01315b0
SHA151d1a3fa2c272f094515675d82150bfce08ee8d3
SHA256467b8cd4aacac66557712f9843023dcedefcc26efc746f3e44157bc8dac73812
SHA512e1c6dba2579357ba70de58968b167d2c529534d24bff70568144270c48ac18a48ee2af2d58d78ae741e5a36958fa78a57955bd2456f1df00b781fc1002e123d2
-
Filesize
152B
MD5ba6ef346187b40694d493da98d5da979
SHA1643c15bec043f8673943885199bb06cd1652ee37
SHA256d86eec91f295dfda8ed1c5fa99de426f2fe359282c7ebf67e3a40be739475d73
SHA5122e6cc97330be8868d4b9c53be7e12c558f6eb1ac2c4080a611ba6c43561d0c5bb4791b8a11a8c2371599f0ba73ed1d9a7a2ea6dee2ae6a080f1912e0cb1f656c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize168B
MD5b11b8643e70b62eba54f666f35726972
SHA195ead9be8a2a72aa31bef2348af795c56fb39357
SHA25646f3dc237380bec5a3a54ecf09bf1562082a3ed8166c224ed68b5d2fdd9551d4
SHA512ae1efeb7a5ec7df1cbde2c69dac8ae588ffee3144819e2101f8655465dfb4a6a66982da8afbfb7b30d4a472ad8032baf21056aa546078b52804be0d181002a80
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize192B
MD5c8ab91286adefda322a3492a76a0b637
SHA11c3dbf427d04606ca3ce47e3bb79a961b8fc9c00
SHA2564b75c97cd33ce28cf41ced57127b3d5a630eb66d0aed63acb18ec28fe577dd8c
SHA512efa210477e27748fc331fa3029d9dbc2df38166786d984b340f4cfb9a30ff0bbc8a1bc54256d2242d0b154310f75dd6cedf1db2beabed91a279898ee49f8286b
-
Filesize
643B
MD58d7e01e2362830113f87a74034370848
SHA18064dd743ec4539a644a5764f2982bed9e60c00c
SHA256aada279d0645d7dfd89823fdfb360c6a2ee754d0499052c37481623f1522190d
SHA5126a4d044421f78f7424cd577581b6df22a3e7cc73dab1084bc0eb6e13e2bf25f9c5b6d73ce5da730f34af766eb596b7b70c48f0d83d73bca3e4821aba59c02581
-
Filesize
6KB
MD5097d308c16dff1c2433c3ac615471c37
SHA1ee63d89a2f558e2558d02f9364d1d5813f3a45da
SHA256b88c6236000a5f0a918968dcb19b69221cefd89dc14eedce95c3882c66f9739d
SHA512b276971f4c36f637443416f38ac553100805eb4be260d91a337826343c52e31dbb5fdac77192556dc67a7b3bb4e2414f0168e601a66f8b809f766dbb2bd62a6a
-
Filesize
6KB
MD5fdc8654a9b4bf68012ddf2b8703b45b4
SHA1ff522a04ab9554a39373c9972114fac6b52864cd
SHA25664876dd50eb2b22427f2f037c2e05a1d7b5134170b2030a552be8d308be4aaee
SHA5128ab8f6269aa5cd7c2d4e204003052766b96bc0098c707783d4c306df6b689ad8c2e0bb8acc5817e83fb979c24f725365860327ae09288dbe1d44a52ff4729c35
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389