Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09/10/2024, 07:42
Static task
static1
Behavioral task
behavioral1
Sample
2d6649b9559da79d998b0957ac0d4713_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2d6649b9559da79d998b0957ac0d4713_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
2d6649b9559da79d998b0957ac0d4713_JaffaCakes118.html
-
Size
28KB
-
MD5
2d6649b9559da79d998b0957ac0d4713
-
SHA1
7822fc0545a349964a44195555b7a174dec7d58e
-
SHA256
63cb6fdb775fd2e325bb6e7bd2a6a0a661a77e54525caeb080379d4991fc09fd
-
SHA512
db7dd0fbc53b964eeb65a52ed09ea6daaa3a5895aa2530053d0d3188ad26fc0ba802343f4751ead74ebf31a9926d3b844b6e99c0f4b9f3a82610f1c4fd5cd078
-
SSDEEP
768:Zcd9QZBC7mOdMYnpC5I9nC4qw0whwKAPd:gQZBCCOdP0IxCFw0whwKAPd
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2172 msedge.exe 2172 msedge.exe 1288 msedge.exe 1288 msedge.exe 3780 identity_helper.exe 3780 identity_helper.exe 4300 msedge.exe 4300 msedge.exe 4300 msedge.exe 4300 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1288 wrote to memory of 3216 1288 msedge.exe 83 PID 1288 wrote to memory of 3216 1288 msedge.exe 83 PID 1288 wrote to memory of 4004 1288 msedge.exe 85 PID 1288 wrote to memory of 4004 1288 msedge.exe 85 PID 1288 wrote to memory of 4004 1288 msedge.exe 85 PID 1288 wrote to memory of 4004 1288 msedge.exe 85 PID 1288 wrote to memory of 4004 1288 msedge.exe 85 PID 1288 wrote to memory of 4004 1288 msedge.exe 85 PID 1288 wrote to memory of 4004 1288 msedge.exe 85 PID 1288 wrote to memory of 4004 1288 msedge.exe 85 PID 1288 wrote to memory of 4004 1288 msedge.exe 85 PID 1288 wrote to memory of 4004 1288 msedge.exe 85 PID 1288 wrote to memory of 4004 1288 msedge.exe 85 PID 1288 wrote to memory of 4004 1288 msedge.exe 85 PID 1288 wrote to memory of 4004 1288 msedge.exe 85 PID 1288 wrote to memory of 4004 1288 msedge.exe 85 PID 1288 wrote to memory of 4004 1288 msedge.exe 85 PID 1288 wrote to memory of 4004 1288 msedge.exe 85 PID 1288 wrote to memory of 4004 1288 msedge.exe 85 PID 1288 wrote to memory of 4004 1288 msedge.exe 85 PID 1288 wrote to memory of 4004 1288 msedge.exe 85 PID 1288 wrote to memory of 4004 1288 msedge.exe 85 PID 1288 wrote to memory of 4004 1288 msedge.exe 85 PID 1288 wrote to memory of 4004 1288 msedge.exe 85 PID 1288 wrote to memory of 4004 1288 msedge.exe 85 PID 1288 wrote to memory of 4004 1288 msedge.exe 85 PID 1288 wrote to memory of 4004 1288 msedge.exe 85 PID 1288 wrote to memory of 4004 1288 msedge.exe 85 PID 1288 wrote to memory of 4004 1288 msedge.exe 85 PID 1288 wrote to memory of 4004 1288 msedge.exe 85 PID 1288 wrote to memory of 4004 1288 msedge.exe 85 PID 1288 wrote to memory of 4004 1288 msedge.exe 85 PID 1288 wrote to memory of 4004 1288 msedge.exe 85 PID 1288 wrote to memory of 4004 1288 msedge.exe 85 PID 1288 wrote to memory of 4004 1288 msedge.exe 85 PID 1288 wrote to memory of 4004 1288 msedge.exe 85 PID 1288 wrote to memory of 4004 1288 msedge.exe 85 PID 1288 wrote to memory of 4004 1288 msedge.exe 85 PID 1288 wrote to memory of 4004 1288 msedge.exe 85 PID 1288 wrote to memory of 4004 1288 msedge.exe 85 PID 1288 wrote to memory of 4004 1288 msedge.exe 85 PID 1288 wrote to memory of 4004 1288 msedge.exe 85 PID 1288 wrote to memory of 2172 1288 msedge.exe 86 PID 1288 wrote to memory of 2172 1288 msedge.exe 86 PID 1288 wrote to memory of 3324 1288 msedge.exe 87 PID 1288 wrote to memory of 3324 1288 msedge.exe 87 PID 1288 wrote to memory of 3324 1288 msedge.exe 87 PID 1288 wrote to memory of 3324 1288 msedge.exe 87 PID 1288 wrote to memory of 3324 1288 msedge.exe 87 PID 1288 wrote to memory of 3324 1288 msedge.exe 87 PID 1288 wrote to memory of 3324 1288 msedge.exe 87 PID 1288 wrote to memory of 3324 1288 msedge.exe 87 PID 1288 wrote to memory of 3324 1288 msedge.exe 87 PID 1288 wrote to memory of 3324 1288 msedge.exe 87 PID 1288 wrote to memory of 3324 1288 msedge.exe 87 PID 1288 wrote to memory of 3324 1288 msedge.exe 87 PID 1288 wrote to memory of 3324 1288 msedge.exe 87 PID 1288 wrote to memory of 3324 1288 msedge.exe 87 PID 1288 wrote to memory of 3324 1288 msedge.exe 87 PID 1288 wrote to memory of 3324 1288 msedge.exe 87 PID 1288 wrote to memory of 3324 1288 msedge.exe 87 PID 1288 wrote to memory of 3324 1288 msedge.exe 87 PID 1288 wrote to memory of 3324 1288 msedge.exe 87 PID 1288 wrote to memory of 3324 1288 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2d6649b9559da79d998b0957ac0d4713_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1288 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff837e746f8,0x7ff837e74708,0x7ff837e747182⤵PID:3216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,5494741790625990395,2361161523638401257,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2144 /prefetch:22⤵PID:4004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,5494741790625990395,2361161523638401257,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2228 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,5494741790625990395,2361161523638401257,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2884 /prefetch:82⤵PID:3324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,5494741790625990395,2361161523638401257,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:2292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,5494741790625990395,2361161523638401257,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:2184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,5494741790625990395,2361161523638401257,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4212 /prefetch:12⤵PID:2392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,5494741790625990395,2361161523638401257,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4352 /prefetch:12⤵PID:3620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,5494741790625990395,2361161523638401257,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4904 /prefetch:12⤵PID:1308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,5494741790625990395,2361161523638401257,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5600 /prefetch:82⤵PID:1796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,5494741790625990395,2361161523638401257,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5600 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,5494741790625990395,2361161523638401257,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5892 /prefetch:12⤵PID:2108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,5494741790625990395,2361161523638401257,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5908 /prefetch:12⤵PID:3824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,5494741790625990395,2361161523638401257,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6092 /prefetch:12⤵PID:2500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,5494741790625990395,2361161523638401257,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5604 /prefetch:12⤵PID:1228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,5494741790625990395,2361161523638401257,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2088 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4300
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4784
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2720
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5fab8d8d865e33fe195732aa7dcb91c30
SHA12637e832f38acc70af3e511f5eba80fbd7461f2c
SHA2561b034ffe38e534e2b7a21be7c1f207ff84a1d5f3893207d0b4bb1a509b4185ea
SHA51239a3d43ef7e28fea2cb247a5d09576a4904a43680db8c32139f22a03d80f6ede98708a2452f3f82232b868501340f79c0b3f810f597bcaf5267c3ccfb1704b43
-
Filesize
152B
MD536988ca14952e1848e81a959880ea217
SHA1a0482ef725657760502c2d1a5abe0bb37aebaadb
SHA256d7e96088b37cec1bde202ae8ec2d2f3c3aafc368b6ebd91b3e2985846facf2e6
SHA512d04b2f5afec92eb3d9f9cdc148a3eddd1b615e0dfb270566a7969576f50881d1f8572bccb8b9fd7993724bdfe36fc7633a33381d43e0b96c4e9bbd53fc010173
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\5db19c7c-8895-4fab-800f-3e2585735081.tmp
Filesize6KB
MD5df1e24bc67e770e65b21dcc3086c7daf
SHA1bc1e5568f920e7d8cb185d21c8d88be4d70ba07f
SHA25684f4bf8550056dfe8453b1c731c581e4340455c28c35a4412ead07ed18c114ec
SHA5121359bbed6703f963297d28160c06d6cdc150321895d607b99e7407cdeede22523ead10103784013c2ef467469adc0b4e2d7ee904f22d9e7a73565c80e2ca6a76
-
Filesize
213KB
MD5f942900ff0a10f251d338c612c456948
SHA14a283d3c8f3dc491e43c430d97c3489ee7a3d320
SHA25638b76a54655aff71271a9ad376ac17f20187abd581bf5aced69ccde0fe6e2fd6
SHA5129b393ce73598ed1997d28ceeddb23491a4d986c337984878ebb0ae06019e30ea77448d375d3d6563c774856d6bc98ee3ca0e0ba88ea5769a451a5e814f6ddb41
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize504B
MD5a7121ac914683a408be9acaaae35057f
SHA183cbecd352c1c20669b11a5a6d634cf757d1548e
SHA256b248b0ff2b30f9ed3bb24bf045954dc5216c8036f8d32fcafd5dd308e53904dd
SHA512f45cafd9db46bd41d929717e0a9a3fe053a017fe150319c08ed293dbb7b0b7385d7b871de4542d8b3d081eeba9b81cf0afc3531bd90df6d94c2622876ecd9f23
-
Filesize
1KB
MD586cdebec55c16ef665cc6423fcfc1764
SHA10ea51ff7c8a164c4cc5095f1144313b7bff59d4d
SHA25670e3cfea0ef55080c738ca2dd75ddbecf26a1c55c57d100bf63db3d8f391cb1d
SHA5125a76c378e4d75114a8b6675e831e1f7f6081f5ca5bdf6cc19ace27667272bc9535fe7f0ef63575028e72833d815bf175cb08f740a2eb5673accab07d2dd74d3d
-
Filesize
6KB
MD50eb32c9190155d5b9f317a1976879863
SHA13a05075d4f0c4ac84d28604ac3d87aa021a2ea0e
SHA2561612a9b79186b25e019034dc79468c10862858acc8dc66706f06bd31b95bbc78
SHA51218fc3df2e8fca7481f0741fe3d5bf04ad478c81573e5b8ea844e23f403d3377eb850adeb8029aab809869fbfdadcff03381658ccbe135ad45e95d377aceba42c
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5b48750bd972e08766bca4a6e8ca13178
SHA1afc549ab26a3f5c391d8b57eef6e6eec110bcbfa
SHA25617ce95c1aca2b149a2726cbb05a629fc0911972c968ccf702359b112005e0450
SHA512d40985242ba53599a166f4fd9e6bc1ce510f6af769f0c52ac20e912c632e89e7e149ef6983afa3c1b0a3612c7b0d69c156b8e9e125c09a9d29d0d491f54e5402