Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-10-2024 03:16
Static task
static1
Behavioral task
behavioral1
Sample
3831920b33aae23322a56dfb19b08f35_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3831920b33aae23322a56dfb19b08f35_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
3831920b33aae23322a56dfb19b08f35_JaffaCakes118.html
-
Size
57KB
-
MD5
3831920b33aae23322a56dfb19b08f35
-
SHA1
c49d146537ee77e56789457990dbc0ecf142f301
-
SHA256
a3424d59ea15a6bda2642c280959433f0231e01714a9c44f7f947ea20f815c84
-
SHA512
95a5d4fec1c0b3babee80e08f6e3ed2989fa45abd29692609c49e9a60071277808b991215cf35f6101e545869e29bd595221b61b31c9318dab34e2dd2c68e3f8
-
SSDEEP
1536:ijEQvK8OPHdsA3o2vgyHJv0owbd6zKD6CDK2RVroD1wpDK2RVy:ijnOPHdsL2vgyHJutDK2RVroD1wpDK2m
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1188 msedge.exe 1188 msedge.exe 4924 msedge.exe 4924 msedge.exe 4516 identity_helper.exe 4516 identity_helper.exe 2404 msedge.exe 2404 msedge.exe 2404 msedge.exe 2404 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4924 wrote to memory of 5084 4924 msedge.exe 83 PID 4924 wrote to memory of 5084 4924 msedge.exe 83 PID 4924 wrote to memory of 3628 4924 msedge.exe 84 PID 4924 wrote to memory of 3628 4924 msedge.exe 84 PID 4924 wrote to memory of 3628 4924 msedge.exe 84 PID 4924 wrote to memory of 3628 4924 msedge.exe 84 PID 4924 wrote to memory of 3628 4924 msedge.exe 84 PID 4924 wrote to memory of 3628 4924 msedge.exe 84 PID 4924 wrote to memory of 3628 4924 msedge.exe 84 PID 4924 wrote to memory of 3628 4924 msedge.exe 84 PID 4924 wrote to memory of 3628 4924 msedge.exe 84 PID 4924 wrote to memory of 3628 4924 msedge.exe 84 PID 4924 wrote to memory of 3628 4924 msedge.exe 84 PID 4924 wrote to memory of 3628 4924 msedge.exe 84 PID 4924 wrote to memory of 3628 4924 msedge.exe 84 PID 4924 wrote to memory of 3628 4924 msedge.exe 84 PID 4924 wrote to memory of 3628 4924 msedge.exe 84 PID 4924 wrote to memory of 3628 4924 msedge.exe 84 PID 4924 wrote to memory of 3628 4924 msedge.exe 84 PID 4924 wrote to memory of 3628 4924 msedge.exe 84 PID 4924 wrote to memory of 3628 4924 msedge.exe 84 PID 4924 wrote to memory of 3628 4924 msedge.exe 84 PID 4924 wrote to memory of 3628 4924 msedge.exe 84 PID 4924 wrote to memory of 3628 4924 msedge.exe 84 PID 4924 wrote to memory of 3628 4924 msedge.exe 84 PID 4924 wrote to memory of 3628 4924 msedge.exe 84 PID 4924 wrote to memory of 3628 4924 msedge.exe 84 PID 4924 wrote to memory of 3628 4924 msedge.exe 84 PID 4924 wrote to memory of 3628 4924 msedge.exe 84 PID 4924 wrote to memory of 3628 4924 msedge.exe 84 PID 4924 wrote to memory of 3628 4924 msedge.exe 84 PID 4924 wrote to memory of 3628 4924 msedge.exe 84 PID 4924 wrote to memory of 3628 4924 msedge.exe 84 PID 4924 wrote to memory of 3628 4924 msedge.exe 84 PID 4924 wrote to memory of 3628 4924 msedge.exe 84 PID 4924 wrote to memory of 3628 4924 msedge.exe 84 PID 4924 wrote to memory of 3628 4924 msedge.exe 84 PID 4924 wrote to memory of 3628 4924 msedge.exe 84 PID 4924 wrote to memory of 3628 4924 msedge.exe 84 PID 4924 wrote to memory of 3628 4924 msedge.exe 84 PID 4924 wrote to memory of 3628 4924 msedge.exe 84 PID 4924 wrote to memory of 3628 4924 msedge.exe 84 PID 4924 wrote to memory of 1188 4924 msedge.exe 85 PID 4924 wrote to memory of 1188 4924 msedge.exe 85 PID 4924 wrote to memory of 4400 4924 msedge.exe 86 PID 4924 wrote to memory of 4400 4924 msedge.exe 86 PID 4924 wrote to memory of 4400 4924 msedge.exe 86 PID 4924 wrote to memory of 4400 4924 msedge.exe 86 PID 4924 wrote to memory of 4400 4924 msedge.exe 86 PID 4924 wrote to memory of 4400 4924 msedge.exe 86 PID 4924 wrote to memory of 4400 4924 msedge.exe 86 PID 4924 wrote to memory of 4400 4924 msedge.exe 86 PID 4924 wrote to memory of 4400 4924 msedge.exe 86 PID 4924 wrote to memory of 4400 4924 msedge.exe 86 PID 4924 wrote to memory of 4400 4924 msedge.exe 86 PID 4924 wrote to memory of 4400 4924 msedge.exe 86 PID 4924 wrote to memory of 4400 4924 msedge.exe 86 PID 4924 wrote to memory of 4400 4924 msedge.exe 86 PID 4924 wrote to memory of 4400 4924 msedge.exe 86 PID 4924 wrote to memory of 4400 4924 msedge.exe 86 PID 4924 wrote to memory of 4400 4924 msedge.exe 86 PID 4924 wrote to memory of 4400 4924 msedge.exe 86 PID 4924 wrote to memory of 4400 4924 msedge.exe 86 PID 4924 wrote to memory of 4400 4924 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\3831920b33aae23322a56dfb19b08f35_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4924 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffce47c46f8,0x7ffce47c4708,0x7ffce47c47182⤵PID:5084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,1142685794549864731,6247145236576498822,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2168 /prefetch:22⤵PID:3628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,1142685794549864731,6247145236576498822,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2292 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,1142685794549864731,6247145236576498822,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2772 /prefetch:82⤵PID:4400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,1142685794549864731,6247145236576498822,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3152 /prefetch:12⤵PID:1968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,1142685794549864731,6247145236576498822,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3164 /prefetch:12⤵PID:1988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,1142685794549864731,6247145236576498822,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4668 /prefetch:12⤵PID:1424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,1142685794549864731,6247145236576498822,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4132 /prefetch:12⤵PID:2956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,1142685794549864731,6247145236576498822,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5072 /prefetch:12⤵PID:836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,1142685794549864731,6247145236576498822,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3196 /prefetch:12⤵PID:4176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,1142685794549864731,6247145236576498822,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6064 /prefetch:82⤵PID:4500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,1142685794549864731,6247145236576498822,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6064 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,1142685794549864731,6247145236576498822,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5880 /prefetch:12⤵PID:4288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,1142685794549864731,6247145236576498822,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5932 /prefetch:12⤵PID:1596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,1142685794549864731,6247145236576498822,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5212 /prefetch:12⤵PID:2456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,1142685794549864731,6247145236576498822,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5360 /prefetch:12⤵PID:2824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,1142685794549864731,6247145236576498822,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2004 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2404
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3064
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3904
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5bffcefacce25cd03f3d5c9446ddb903d
SHA18923f84aa86db316d2f5c122fe3874bbe26f3bab
SHA25623e7cbbf64c81122c3cb30a0933c10a320e254447771737a326ce37a0694d405
SHA512761dae5315b35ec0b2fe68019881397f5d2eadba3963aba79a89f8953a0cd705012d7faf3a204a5f36008926b9f614980e333351596b06ce7058d744345ce2e7
-
Filesize
152B
MD5d22073dea53e79d9b824f27ac5e9813e
SHA16d8a7281241248431a1571e6ddc55798b01fa961
SHA25686713962c3bb287964678b148ee08ea83fb83483dff8be91c8a6085ca560b2a6
SHA51297152091ee24b6e713b8ec8123cb62511f8a7e8a6c6c3f2f6727d0a60497be28814613b476009b853575d4931e5df950e28a41afbf6707cb672206f1219c4413
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize792B
MD5cfe319472776d4554c7914d6c065b45d
SHA19ddf338d6f6369658de87b85748c8c0f32079231
SHA2568678886281e2b3ff0e1ee0cb0e39a38130c616bf0044bb3eba99bbfeb9752c22
SHA512db5c59a26d60616694d2d7b31cb19135e33cade40dde55755bffc384908aadc23df441f57df9549b22eec9c015fccb11de8d42e490f4c95487a95d3fd176733c
-
Filesize
1KB
MD58e34f7bc7bcc00fba274daa7f74f3790
SHA1b4549785643d1940c3c21440249c0f9fe8ec4b8c
SHA25676888f1b75804eaee01d9dbea51f62e354d4f75146f41946486544789ea8b1e2
SHA5127b1426955d18074308a041c62bad01fdbcaa6dbad14ec6995e0d05586d0d4da021fc56980fb9cbd9a088842f6f528f07565604083c432ae8c4174dbb05ee300d
-
Filesize
6KB
MD59cb258ec233003e0761a7cd3c4dbabc4
SHA189cd48d68c53522a2da9017de3f221837340891f
SHA256664b9f889ddb053c7cacc94b1eb96aaf86ed43239eb6d80870b0c6306f3a2c05
SHA512676f6687b202063b18843028708578f3dff492ae62f028e740918d06b610b07852f6ce8e4c8db8e86e5a8e028c5f5d8f7ac6b1063bf17cc7c1b276f4b9a1cda7
-
Filesize
6KB
MD5f30f47ec2161b930e4c3a112f3504300
SHA11010ad4e230a627ddb0fdcf4e54686eec2e14bb8
SHA25693674cf3e66469419fb221ce6472a60d0334a1443763cb1ffa010782297d67ed
SHA51299c81bc48144bb0d9a4d2052117ca911f9971d6add3d7002286b0d53e60c08b989be8486e2e180997dd6d83fd77058ab16fdbf477be28b26fa1c71dfc23de1ba
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD58acce38ca69e519b2bf1fadcc2d5b72a
SHA17a1b0defb7ef11bf57a4ca5576d097fe1b958c01
SHA2564909eeef36b080147655040589e0bf89ab1e1c5651784f482f2ec424685c0a5b
SHA5129f605d84864a99bd0c62d8c9b3944ebc0e9209d8e204e35e8ec7b47f2323dcd2110880900bb2f928236e65e0056571f7393cc201c7a245a53b8a02fae0f19226