Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12/10/2024, 11:04
Static task
static1
Behavioral task
behavioral1
Sample
39aa3a27d5faa02769f17f72d237eefb_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
39aa3a27d5faa02769f17f72d237eefb_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
39aa3a27d5faa02769f17f72d237eefb_JaffaCakes118.html
-
Size
7KB
-
MD5
39aa3a27d5faa02769f17f72d237eefb
-
SHA1
267007ffeae77cc21ab3c34b8e57db369274b82c
-
SHA256
92b3ec4b1116cc80c4fac37dd34da2a8e26d2960cb0bda5ec2313f4e429a7daa
-
SHA512
3b08465e1590e1e1c60adaa5919c7cd42ac9f592b95b66d27c6c34e1a61d1848f3e8fdc94692ee97f770a94c95b9978952500ce66ff06f86c445b7c8ca3d3779
-
SSDEEP
192:OVC5XzZKb1xZDdyUNSG5i3L01KGuEO8Rh:Q5xaL0om
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4856 msedge.exe 4856 msedge.exe 556 msedge.exe 556 msedge.exe 3960 identity_helper.exe 3960 identity_helper.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe 208 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 556 msedge.exe 556 msedge.exe 556 msedge.exe 556 msedge.exe 556 msedge.exe 556 msedge.exe 556 msedge.exe 556 msedge.exe 556 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 556 msedge.exe 556 msedge.exe 556 msedge.exe 556 msedge.exe 556 msedge.exe 556 msedge.exe 556 msedge.exe 556 msedge.exe 556 msedge.exe 556 msedge.exe 556 msedge.exe 556 msedge.exe 556 msedge.exe 556 msedge.exe 556 msedge.exe 556 msedge.exe 556 msedge.exe 556 msedge.exe 556 msedge.exe 556 msedge.exe 556 msedge.exe 556 msedge.exe 556 msedge.exe 556 msedge.exe 556 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 556 msedge.exe 556 msedge.exe 556 msedge.exe 556 msedge.exe 556 msedge.exe 556 msedge.exe 556 msedge.exe 556 msedge.exe 556 msedge.exe 556 msedge.exe 556 msedge.exe 556 msedge.exe 556 msedge.exe 556 msedge.exe 556 msedge.exe 556 msedge.exe 556 msedge.exe 556 msedge.exe 556 msedge.exe 556 msedge.exe 556 msedge.exe 556 msedge.exe 556 msedge.exe 556 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 556 wrote to memory of 4604 556 msedge.exe 83 PID 556 wrote to memory of 4604 556 msedge.exe 83 PID 556 wrote to memory of 868 556 msedge.exe 84 PID 556 wrote to memory of 868 556 msedge.exe 84 PID 556 wrote to memory of 868 556 msedge.exe 84 PID 556 wrote to memory of 868 556 msedge.exe 84 PID 556 wrote to memory of 868 556 msedge.exe 84 PID 556 wrote to memory of 868 556 msedge.exe 84 PID 556 wrote to memory of 868 556 msedge.exe 84 PID 556 wrote to memory of 868 556 msedge.exe 84 PID 556 wrote to memory of 868 556 msedge.exe 84 PID 556 wrote to memory of 868 556 msedge.exe 84 PID 556 wrote to memory of 868 556 msedge.exe 84 PID 556 wrote to memory of 868 556 msedge.exe 84 PID 556 wrote to memory of 868 556 msedge.exe 84 PID 556 wrote to memory of 868 556 msedge.exe 84 PID 556 wrote to memory of 868 556 msedge.exe 84 PID 556 wrote to memory of 868 556 msedge.exe 84 PID 556 wrote to memory of 868 556 msedge.exe 84 PID 556 wrote to memory of 868 556 msedge.exe 84 PID 556 wrote to memory of 868 556 msedge.exe 84 PID 556 wrote to memory of 868 556 msedge.exe 84 PID 556 wrote to memory of 868 556 msedge.exe 84 PID 556 wrote to memory of 868 556 msedge.exe 84 PID 556 wrote to memory of 868 556 msedge.exe 84 PID 556 wrote to memory of 868 556 msedge.exe 84 PID 556 wrote to memory of 868 556 msedge.exe 84 PID 556 wrote to memory of 868 556 msedge.exe 84 PID 556 wrote to memory of 868 556 msedge.exe 84 PID 556 wrote to memory of 868 556 msedge.exe 84 PID 556 wrote to memory of 868 556 msedge.exe 84 PID 556 wrote to memory of 868 556 msedge.exe 84 PID 556 wrote to memory of 868 556 msedge.exe 84 PID 556 wrote to memory of 868 556 msedge.exe 84 PID 556 wrote to memory of 868 556 msedge.exe 84 PID 556 wrote to memory of 868 556 msedge.exe 84 PID 556 wrote to memory of 868 556 msedge.exe 84 PID 556 wrote to memory of 868 556 msedge.exe 84 PID 556 wrote to memory of 868 556 msedge.exe 84 PID 556 wrote to memory of 868 556 msedge.exe 84 PID 556 wrote to memory of 868 556 msedge.exe 84 PID 556 wrote to memory of 868 556 msedge.exe 84 PID 556 wrote to memory of 4856 556 msedge.exe 85 PID 556 wrote to memory of 4856 556 msedge.exe 85 PID 556 wrote to memory of 2040 556 msedge.exe 86 PID 556 wrote to memory of 2040 556 msedge.exe 86 PID 556 wrote to memory of 2040 556 msedge.exe 86 PID 556 wrote to memory of 2040 556 msedge.exe 86 PID 556 wrote to memory of 2040 556 msedge.exe 86 PID 556 wrote to memory of 2040 556 msedge.exe 86 PID 556 wrote to memory of 2040 556 msedge.exe 86 PID 556 wrote to memory of 2040 556 msedge.exe 86 PID 556 wrote to memory of 2040 556 msedge.exe 86 PID 556 wrote to memory of 2040 556 msedge.exe 86 PID 556 wrote to memory of 2040 556 msedge.exe 86 PID 556 wrote to memory of 2040 556 msedge.exe 86 PID 556 wrote to memory of 2040 556 msedge.exe 86 PID 556 wrote to memory of 2040 556 msedge.exe 86 PID 556 wrote to memory of 2040 556 msedge.exe 86 PID 556 wrote to memory of 2040 556 msedge.exe 86 PID 556 wrote to memory of 2040 556 msedge.exe 86 PID 556 wrote to memory of 2040 556 msedge.exe 86 PID 556 wrote to memory of 2040 556 msedge.exe 86 PID 556 wrote to memory of 2040 556 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\39aa3a27d5faa02769f17f72d237eefb_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:556 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9e86746f8,0x7ff9e8674708,0x7ff9e86747182⤵PID:4604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,15568207247408183718,1167233307091002796,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2156 /prefetch:22⤵PID:868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2068,15568207247408183718,1167233307091002796,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2204 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2068,15568207247408183718,1167233307091002796,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2856 /prefetch:82⤵PID:2040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,15568207247408183718,1167233307091002796,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:3204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,15568207247408183718,1167233307091002796,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:1964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,15568207247408183718,1167233307091002796,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4708 /prefetch:12⤵PID:2396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,15568207247408183718,1167233307091002796,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4812 /prefetch:12⤵PID:2688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,15568207247408183718,1167233307091002796,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5320 /prefetch:12⤵PID:4384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,15568207247408183718,1167233307091002796,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5852 /prefetch:82⤵PID:4640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,15568207247408183718,1167233307091002796,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5852 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,15568207247408183718,1167233307091002796,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5324 /prefetch:12⤵PID:1668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,15568207247408183718,1167233307091002796,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5332 /prefetch:12⤵PID:4468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,15568207247408183718,1167233307091002796,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5584 /prefetch:12⤵PID:2060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,15568207247408183718,1167233307091002796,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1992 /prefetch:12⤵PID:1440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,15568207247408183718,1167233307091002796,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4988 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:208
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:220
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3176
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD50a9dc42e4013fc47438e96d24beb8eff
SHA1806ab26d7eae031a58484188a7eb1adab06457fc
SHA25658d66151799526b3fa372552cd99b385415d9e9a119302b99aadc34dd51dd151
SHA512868d6b421ae2501a519595d0c34ddef25b2a98b082c5203da8349035f1f6764ddf183197f1054e7e86a752c71eccbc0649e515b63c55bc18cf5f0592397e258f
-
Filesize
152B
MD561cef8e38cd95bf003f5fdd1dc37dae1
SHA111f2f79ecb349344c143eea9a0fed41891a3467f
SHA256ae671613623b4477fbd5daf1fd2d148ae2a09ddcc3804b2b6d4ffcb60b317e3e
SHA5126fb9b333fe0e8fde19fdd0bd01a1990a4e60a87c0a02bc8297da1206e42f8690d06b030308e58c862e9e77714a585eed7cc1627590d99a10aeb77fc0dd3d864d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD59e061ae5167000361e14d43508645a95
SHA11894d9483af94565cfc065cd4b91e9fad525e665
SHA2566b142b1285693498919c4d02ec225406ecaffae1be6bd9b7680c7f8da2578cab
SHA5122b1b451c0894140f6a9131d20c40b0f5a70d44478127b4a2f365d0e847ce83ba864a7fdb80305c32a6a60d2c1fd05e81688e456f5a0470078481694faf3650de
-
Filesize
594B
MD576f514394cbf7a313427c0b92d52e978
SHA18ca4e7e4db50741ffed681635d3f6ab9dc2d8152
SHA2569d7be6e0905d089cfb29023ccbab787d093079220ecb4c49adca457fcd86ffa6
SHA51250744da38db9971d7625c0b4a35d742290b47580e723b9a62d8eff3ca2dc749804b5607345da5aa7679d2ba21a15d21d39fd55834abd9481ad0144f679f2c2fe
-
Filesize
6KB
MD53d1450571990db992fb50d2d4d2dc7ad
SHA1e4ed89362827783081f218c6b3804cdbbfa2ebc5
SHA256a910def96c0552070ef42a816450c5d358c7babd4d25c9bf4047ba43b6885137
SHA512a4c043bb9977a577db980592a016b63f28ee05881c85da7845cf36a8351b42ba8472d52928b23839f1935c5fd5da1021ca7c6becaab93473477897a846f1ebd3
-
Filesize
6KB
MD5c488d848b160380fdbc56fded121fa51
SHA15d19a83bc4a5e64e90c1cf681211268ccf87a5c5
SHA2563372f48b381b502cf1b450f04afc0ad36e3962c5c51d13cd7cb9dde4a0b4b7f8
SHA512d7a11c188bf3206e3b815ca4b170f965f4c6604690d195963d3ad91d523e518d1c1b210b304440c1d942d8a8071c4728699f9a550327b3dfaabfa003cb8efd11
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD58981ff15c8f84abf72107e7bf1923981
SHA16d6ba3f38d0ff6c2ebbcb3344eee5f2ed8228d1d
SHA2569d230d979cebcdbc15a527a7d9ecc45c889e1a0e854db794b8d942140131f832
SHA512542f304cfbc192ab429ff467205e13aaa4e003e8cc5a39bf424b3e9f5da146e0118469d581d9cdf39a565d8baa76b55f29b3f37d7c087bf9142c610d41ce9d97