Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-10-2024 21:34
Static task
static1
Behavioral task
behavioral1
Sample
3c22d8d6ea2bed274033b62271a12c53_JaffaCakes118.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
3c22d8d6ea2bed274033b62271a12c53_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
3c22d8d6ea2bed274033b62271a12c53_JaffaCakes118.html
-
Size
1KB
-
MD5
3c22d8d6ea2bed274033b62271a12c53
-
SHA1
f46314413d3b645d6f486320b329a9cf9c3e21c7
-
SHA256
00e48611b3364936546fa5945f765a6d405ea3ea79bb2b858c52fc905fd59817
-
SHA512
b9786f2f22a1ad23d67f6e87b85591a6014e279fb3847a0fb97a468a92490167a69c3c0310cf1c026419b496a6ac9875abfdf61b4a68f375e3f7b9a67d165964
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1308 msedge.exe 1308 msedge.exe 5100 msedge.exe 5100 msedge.exe 3716 identity_helper.exe 3716 identity_helper.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5100 wrote to memory of 3024 5100 msedge.exe 84 PID 5100 wrote to memory of 3024 5100 msedge.exe 84 PID 5100 wrote to memory of 2204 5100 msedge.exe 85 PID 5100 wrote to memory of 2204 5100 msedge.exe 85 PID 5100 wrote to memory of 2204 5100 msedge.exe 85 PID 5100 wrote to memory of 2204 5100 msedge.exe 85 PID 5100 wrote to memory of 2204 5100 msedge.exe 85 PID 5100 wrote to memory of 2204 5100 msedge.exe 85 PID 5100 wrote to memory of 2204 5100 msedge.exe 85 PID 5100 wrote to memory of 2204 5100 msedge.exe 85 PID 5100 wrote to memory of 2204 5100 msedge.exe 85 PID 5100 wrote to memory of 2204 5100 msedge.exe 85 PID 5100 wrote to memory of 2204 5100 msedge.exe 85 PID 5100 wrote to memory of 2204 5100 msedge.exe 85 PID 5100 wrote to memory of 2204 5100 msedge.exe 85 PID 5100 wrote to memory of 2204 5100 msedge.exe 85 PID 5100 wrote to memory of 2204 5100 msedge.exe 85 PID 5100 wrote to memory of 2204 5100 msedge.exe 85 PID 5100 wrote to memory of 2204 5100 msedge.exe 85 PID 5100 wrote to memory of 2204 5100 msedge.exe 85 PID 5100 wrote to memory of 2204 5100 msedge.exe 85 PID 5100 wrote to memory of 2204 5100 msedge.exe 85 PID 5100 wrote to memory of 2204 5100 msedge.exe 85 PID 5100 wrote to memory of 2204 5100 msedge.exe 85 PID 5100 wrote to memory of 2204 5100 msedge.exe 85 PID 5100 wrote to memory of 2204 5100 msedge.exe 85 PID 5100 wrote to memory of 2204 5100 msedge.exe 85 PID 5100 wrote to memory of 2204 5100 msedge.exe 85 PID 5100 wrote to memory of 2204 5100 msedge.exe 85 PID 5100 wrote to memory of 2204 5100 msedge.exe 85 PID 5100 wrote to memory of 2204 5100 msedge.exe 85 PID 5100 wrote to memory of 2204 5100 msedge.exe 85 PID 5100 wrote to memory of 2204 5100 msedge.exe 85 PID 5100 wrote to memory of 2204 5100 msedge.exe 85 PID 5100 wrote to memory of 2204 5100 msedge.exe 85 PID 5100 wrote to memory of 2204 5100 msedge.exe 85 PID 5100 wrote to memory of 2204 5100 msedge.exe 85 PID 5100 wrote to memory of 2204 5100 msedge.exe 85 PID 5100 wrote to memory of 2204 5100 msedge.exe 85 PID 5100 wrote to memory of 2204 5100 msedge.exe 85 PID 5100 wrote to memory of 2204 5100 msedge.exe 85 PID 5100 wrote to memory of 2204 5100 msedge.exe 85 PID 5100 wrote to memory of 1308 5100 msedge.exe 86 PID 5100 wrote to memory of 1308 5100 msedge.exe 86 PID 5100 wrote to memory of 4856 5100 msedge.exe 87 PID 5100 wrote to memory of 4856 5100 msedge.exe 87 PID 5100 wrote to memory of 4856 5100 msedge.exe 87 PID 5100 wrote to memory of 4856 5100 msedge.exe 87 PID 5100 wrote to memory of 4856 5100 msedge.exe 87 PID 5100 wrote to memory of 4856 5100 msedge.exe 87 PID 5100 wrote to memory of 4856 5100 msedge.exe 87 PID 5100 wrote to memory of 4856 5100 msedge.exe 87 PID 5100 wrote to memory of 4856 5100 msedge.exe 87 PID 5100 wrote to memory of 4856 5100 msedge.exe 87 PID 5100 wrote to memory of 4856 5100 msedge.exe 87 PID 5100 wrote to memory of 4856 5100 msedge.exe 87 PID 5100 wrote to memory of 4856 5100 msedge.exe 87 PID 5100 wrote to memory of 4856 5100 msedge.exe 87 PID 5100 wrote to memory of 4856 5100 msedge.exe 87 PID 5100 wrote to memory of 4856 5100 msedge.exe 87 PID 5100 wrote to memory of 4856 5100 msedge.exe 87 PID 5100 wrote to memory of 4856 5100 msedge.exe 87 PID 5100 wrote to memory of 4856 5100 msedge.exe 87 PID 5100 wrote to memory of 4856 5100 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\3c22d8d6ea2bed274033b62271a12c53_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5100 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffeba1446f8,0x7ffeba144708,0x7ffeba1447182⤵PID:3024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,6450666243431941669,4161525043593120068,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:22⤵PID:2204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,6450666243431941669,4161525043593120068,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2516 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,6450666243431941669,4161525043593120068,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2924 /prefetch:82⤵PID:4856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,6450666243431941669,4161525043593120068,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,6450666243431941669,4161525043593120068,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:4444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,6450666243431941669,4161525043593120068,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4256 /prefetch:12⤵PID:3412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,6450666243431941669,4161525043593120068,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5532 /prefetch:82⤵PID:2320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,6450666243431941669,4161525043593120068,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5532 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,6450666243431941669,4161525043593120068,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5632 /prefetch:12⤵PID:2848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,6450666243431941669,4161525043593120068,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4940 /prefetch:12⤵PID:112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,6450666243431941669,4161525043593120068,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5028 /prefetch:12⤵PID:4016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,6450666243431941669,4161525043593120068,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5168 /prefetch:12⤵PID:4760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,6450666243431941669,4161525043593120068,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2604 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3304
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:468
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4040
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5fab8d8d865e33fe195732aa7dcb91c30
SHA12637e832f38acc70af3e511f5eba80fbd7461f2c
SHA2561b034ffe38e534e2b7a21be7c1f207ff84a1d5f3893207d0b4bb1a509b4185ea
SHA51239a3d43ef7e28fea2cb247a5d09576a4904a43680db8c32139f22a03d80f6ede98708a2452f3f82232b868501340f79c0b3f810f597bcaf5267c3ccfb1704b43
-
Filesize
152B
MD536988ca14952e1848e81a959880ea217
SHA1a0482ef725657760502c2d1a5abe0bb37aebaadb
SHA256d7e96088b37cec1bde202ae8ec2d2f3c3aafc368b6ebd91b3e2985846facf2e6
SHA512d04b2f5afec92eb3d9f9cdc148a3eddd1b615e0dfb270566a7969576f50881d1f8572bccb8b9fd7993724bdfe36fc7633a33381d43e0b96c4e9bbd53fc010173
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD5b06b569334daefb51c9a2bd787820c00
SHA13661869bc754f6b37a7811e09dc6ef5be22118e2
SHA2569e055fb86342286a4bd0f4d3e7ced47eae605f375b6026b248551341a108f489
SHA5120fac60d7d32313dc46a26bf3c9b0740a89895bde653fb7952c05cd2001f8eadfcf964e23fac3b8307372de84f3220c033f87469b4c8205460a1500330a3a81c8
-
Filesize
6KB
MD538348dd6e553c93c635a4da261212d72
SHA1cc72dbabac42b559746e82d7a3a68d3f89836fd0
SHA256e6fb6c432b7bf176437895d9d79334a03ac00a593403760fa925d46e5505b9b9
SHA512e5e54a5fe23bffbd955042ebe5d485409ec65b3bf6e24b5ab3b65eb4d288bc9b92f645d15e4ac9901aff4e98709a2fbe023e35b84d51a8fa785d696f677f8aad
-
Filesize
6KB
MD5475601e2733c1be4023333e5a3ecaa42
SHA1363ae5247d7cf2b5bfeea8fc104aeda4986e4605
SHA256aac34d20e41df89f23b25d73aa194f5869edc58acb5d6d0421a55d34a4826d59
SHA512bb7dd0c5e92dc02518307c52c9d37710d8718c5bd2601ea0963cef43823a57db7113a82b42c412f96d9e90125aee51e4d5f92775fda245d1516115f9d87ecc43
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
10KB
MD53a585275ef5e48794fae93585aaa20c7
SHA147b5812b9c1ca40eaf975d5335c5fbc5fc8c6105
SHA256d54a77cc990693ad97c1377d80127a3927e64828c83bfa6fdbfa3765ddec6a59
SHA5126f64a75806d1e08f245cd6bc9974c1caa62cb8502be9db3c5cb5067177d395d6d67e12eab21c8c1bcc72a5076546cb137d99c6a12f873db0f9893c1df50dd6a9