Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09/10/2024, 08:56
Static task
static1
Behavioral task
behavioral1
Sample
2e4bd1cc728a7e5e3ffef39d9345eeb6_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2e4bd1cc728a7e5e3ffef39d9345eeb6_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
2e4bd1cc728a7e5e3ffef39d9345eeb6_JaffaCakes118.html
-
Size
57KB
-
MD5
2e4bd1cc728a7e5e3ffef39d9345eeb6
-
SHA1
6d64f9942fc9fbe3bb58c681b3e87c76dec6c5fc
-
SHA256
b87485d92eac4e05c2840076689e7ebc1f90563290f91b056751c33b55c5cd6c
-
SHA512
5b108184efa432f95a15b677724af5ad4c4334b9fde0ad708d199053400c823f9f822158240b0f44769cc95126b7900d766540e592b9805ab2574698046db67d
-
SSDEEP
1536:ijEQvK8OPHdFARNo2vgyHJv0owbd6zKD6CDK2RVrozYwpDK2RVy:ijnOPHdFwW2vgyHJutDK2RVrozYwpDKn
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4800 msedge.exe 4800 msedge.exe 872 msedge.exe 872 msedge.exe 3632 identity_helper.exe 3632 identity_helper.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe 2508 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 872 wrote to memory of 3552 872 msedge.exe 83 PID 872 wrote to memory of 3552 872 msedge.exe 83 PID 872 wrote to memory of 4464 872 msedge.exe 84 PID 872 wrote to memory of 4464 872 msedge.exe 84 PID 872 wrote to memory of 4464 872 msedge.exe 84 PID 872 wrote to memory of 4464 872 msedge.exe 84 PID 872 wrote to memory of 4464 872 msedge.exe 84 PID 872 wrote to memory of 4464 872 msedge.exe 84 PID 872 wrote to memory of 4464 872 msedge.exe 84 PID 872 wrote to memory of 4464 872 msedge.exe 84 PID 872 wrote to memory of 4464 872 msedge.exe 84 PID 872 wrote to memory of 4464 872 msedge.exe 84 PID 872 wrote to memory of 4464 872 msedge.exe 84 PID 872 wrote to memory of 4464 872 msedge.exe 84 PID 872 wrote to memory of 4464 872 msedge.exe 84 PID 872 wrote to memory of 4464 872 msedge.exe 84 PID 872 wrote to memory of 4464 872 msedge.exe 84 PID 872 wrote to memory of 4464 872 msedge.exe 84 PID 872 wrote to memory of 4464 872 msedge.exe 84 PID 872 wrote to memory of 4464 872 msedge.exe 84 PID 872 wrote to memory of 4464 872 msedge.exe 84 PID 872 wrote to memory of 4464 872 msedge.exe 84 PID 872 wrote to memory of 4464 872 msedge.exe 84 PID 872 wrote to memory of 4464 872 msedge.exe 84 PID 872 wrote to memory of 4464 872 msedge.exe 84 PID 872 wrote to memory of 4464 872 msedge.exe 84 PID 872 wrote to memory of 4464 872 msedge.exe 84 PID 872 wrote to memory of 4464 872 msedge.exe 84 PID 872 wrote to memory of 4464 872 msedge.exe 84 PID 872 wrote to memory of 4464 872 msedge.exe 84 PID 872 wrote to memory of 4464 872 msedge.exe 84 PID 872 wrote to memory of 4464 872 msedge.exe 84 PID 872 wrote to memory of 4464 872 msedge.exe 84 PID 872 wrote to memory of 4464 872 msedge.exe 84 PID 872 wrote to memory of 4464 872 msedge.exe 84 PID 872 wrote to memory of 4464 872 msedge.exe 84 PID 872 wrote to memory of 4464 872 msedge.exe 84 PID 872 wrote to memory of 4464 872 msedge.exe 84 PID 872 wrote to memory of 4464 872 msedge.exe 84 PID 872 wrote to memory of 4464 872 msedge.exe 84 PID 872 wrote to memory of 4464 872 msedge.exe 84 PID 872 wrote to memory of 4464 872 msedge.exe 84 PID 872 wrote to memory of 4800 872 msedge.exe 85 PID 872 wrote to memory of 4800 872 msedge.exe 85 PID 872 wrote to memory of 2140 872 msedge.exe 86 PID 872 wrote to memory of 2140 872 msedge.exe 86 PID 872 wrote to memory of 2140 872 msedge.exe 86 PID 872 wrote to memory of 2140 872 msedge.exe 86 PID 872 wrote to memory of 2140 872 msedge.exe 86 PID 872 wrote to memory of 2140 872 msedge.exe 86 PID 872 wrote to memory of 2140 872 msedge.exe 86 PID 872 wrote to memory of 2140 872 msedge.exe 86 PID 872 wrote to memory of 2140 872 msedge.exe 86 PID 872 wrote to memory of 2140 872 msedge.exe 86 PID 872 wrote to memory of 2140 872 msedge.exe 86 PID 872 wrote to memory of 2140 872 msedge.exe 86 PID 872 wrote to memory of 2140 872 msedge.exe 86 PID 872 wrote to memory of 2140 872 msedge.exe 86 PID 872 wrote to memory of 2140 872 msedge.exe 86 PID 872 wrote to memory of 2140 872 msedge.exe 86 PID 872 wrote to memory of 2140 872 msedge.exe 86 PID 872 wrote to memory of 2140 872 msedge.exe 86 PID 872 wrote to memory of 2140 872 msedge.exe 86 PID 872 wrote to memory of 2140 872 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2e4bd1cc728a7e5e3ffef39d9345eeb6_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:872 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9b00e46f8,0x7ff9b00e4708,0x7ff9b00e47182⤵PID:3552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1996,17250756772801029102,16383313768070389411,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2080 /prefetch:22⤵PID:4464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1996,17250756772801029102,16383313768070389411,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2356 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1996,17250756772801029102,16383313768070389411,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2804 /prefetch:82⤵PID:2140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,17250756772801029102,16383313768070389411,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:4964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,17250756772801029102,16383313768070389411,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:12⤵PID:3736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,17250756772801029102,16383313768070389411,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4752 /prefetch:12⤵PID:5056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,17250756772801029102,16383313768070389411,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4968 /prefetch:12⤵PID:2484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,17250756772801029102,16383313768070389411,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3368 /prefetch:12⤵PID:624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,17250756772801029102,16383313768070389411,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5772 /prefetch:12⤵PID:4288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1996,17250756772801029102,16383313768070389411,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6180 /prefetch:82⤵PID:3376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1996,17250756772801029102,16383313768070389411,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6180 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,17250756772801029102,16383313768070389411,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4220 /prefetch:12⤵PID:1796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,17250756772801029102,16383313768070389411,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6076 /prefetch:12⤵PID:5116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,17250756772801029102,16383313768070389411,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5592 /prefetch:12⤵PID:5100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,17250756772801029102,16383313768070389411,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6580 /prefetch:12⤵PID:4512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1996,17250756772801029102,16383313768070389411,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1852 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2508
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2724
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3728
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5b8880802fc2bb880a7a869faa01315b0
SHA151d1a3fa2c272f094515675d82150bfce08ee8d3
SHA256467b8cd4aacac66557712f9843023dcedefcc26efc746f3e44157bc8dac73812
SHA512e1c6dba2579357ba70de58968b167d2c529534d24bff70568144270c48ac18a48ee2af2d58d78ae741e5a36958fa78a57955bd2456f1df00b781fc1002e123d2
-
Filesize
152B
MD5ba6ef346187b40694d493da98d5da979
SHA1643c15bec043f8673943885199bb06cd1652ee37
SHA256d86eec91f295dfda8ed1c5fa99de426f2fe359282c7ebf67e3a40be739475d73
SHA5122e6cc97330be8868d4b9c53be7e12c558f6eb1ac2c4080a611ba6c43561d0c5bb4791b8a11a8c2371599f0ba73ed1d9a7a2ea6dee2ae6a080f1912e0cb1f656c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize792B
MD59e90c9e7d05dfa121c2c22c82aff8857
SHA158c98142ac85e98779c3feb9ed18607c8961e278
SHA2566d7de1ff27e0a0ba22207713fbd416dd3070c21438c969d62022aef1b72201ec
SHA512c9cd9cf67a155c69c2b0f4cf87f74114de594cd8c33f1a354769bbc8168df9ec8be3ef52105ab96c7ae6ffa7854a5c1ba88e9926dc71699ec6897e7c3cca1888
-
Filesize
1KB
MD50d9fefa73126e10e9a6708a4e035c6cb
SHA1a0266b884a4b4de5d8f2c794fad0dceb6bc18219
SHA25623d82c267f1ea8fd0a95a6c9dbba095ab79cb0c6cb6c57f66ec591a9fed3f32d
SHA512a312979bee0f11a6ca032bb412b3040988576e3d00b522c8b52787b5e9015cf4efa223a1d75be8c423a1bef4e0662d2490cf7bbfe25f844a0cc305be0aaedfdf
-
Filesize
6KB
MD5bffa773619df36d6dce976b1dc7c0864
SHA120b086a5946b92cf95efb99d68deb38e91334e22
SHA256d9f4acee35eba44f037fd42dae1ba98a5e41ca504cab702340b34b579a08bf7c
SHA512149b4cb6a00463c8e454ab810994e31bf0e947dc57950bb783fadefd964a9bb0d362fc03a2b355a49637a79175aecdf91873de715de5cb82d22a36fa099275a1
-
Filesize
6KB
MD52a0af78cc219d93599d6713298653878
SHA1d65b9e2c63f023e0188276f5e5bc787125219b3a
SHA2562d7f3bf85d80f9a692929d73fd10720c6cdeec1c014b8cf2c48f41cff9d79109
SHA5126d58e833153d4f81121159acfe98186989963e1b08c50c9a45925d1b3e63892049c8dc8065d98a756418f062f473f682b8933e9cac488f268a85a2e6640c9431
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
10KB
MD562d8a32acc54b19ba6fc297ee50f7ec3
SHA184b5c762e79eaaebba26ed2cca9df5069c643e3b
SHA256e4e7dd8445f5117e402c342e2b883791056c2c6b2673f2491c13cf10f2c03c47
SHA5125f3e7c5225d3d66204853a35e20cb069a708a681d715f3f930d63a76222b20b9739bb4895a078c758709653222ea978d24f77d1e67c480f06d71f2e30ff414e4