Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12/10/2024, 20:22
Static task
static1
Behavioral task
behavioral1
Sample
3bdf6d8d467bc64ffd0a66c3132acc31_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3bdf6d8d467bc64ffd0a66c3132acc31_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
3bdf6d8d467bc64ffd0a66c3132acc31_JaffaCakes118.html
-
Size
57KB
-
MD5
3bdf6d8d467bc64ffd0a66c3132acc31
-
SHA1
ffb63bc23521540dcd5c5112104355dc0eca204e
-
SHA256
6e209648ff193ad4bf2c04683c8b8b31c176adce35b289a8914a319353a9d6f0
-
SHA512
0374f3b193758005d9f9590e48521a21aa17d2061e11da6f5100d2f1fba074bd956d8a77de1864a0794e4b65a4aeb74adb5ef54b4819e0d3bca953ca483aafd6
-
SSDEEP
1536:ijEQvK8OPHdsAjo2vgyHJv0owbd6zKD6CDK2RVro7/wpDK2RVy:ijnOPHdsj2vgyHJutDK2RVro7/wpDK2m
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 640 msedge.exe 640 msedge.exe 3980 msedge.exe 3980 msedge.exe 3172 identity_helper.exe 3172 identity_helper.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe 1424 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3980 wrote to memory of 1728 3980 msedge.exe 85 PID 3980 wrote to memory of 1728 3980 msedge.exe 85 PID 3980 wrote to memory of 4788 3980 msedge.exe 86 PID 3980 wrote to memory of 4788 3980 msedge.exe 86 PID 3980 wrote to memory of 4788 3980 msedge.exe 86 PID 3980 wrote to memory of 4788 3980 msedge.exe 86 PID 3980 wrote to memory of 4788 3980 msedge.exe 86 PID 3980 wrote to memory of 4788 3980 msedge.exe 86 PID 3980 wrote to memory of 4788 3980 msedge.exe 86 PID 3980 wrote to memory of 4788 3980 msedge.exe 86 PID 3980 wrote to memory of 4788 3980 msedge.exe 86 PID 3980 wrote to memory of 4788 3980 msedge.exe 86 PID 3980 wrote to memory of 4788 3980 msedge.exe 86 PID 3980 wrote to memory of 4788 3980 msedge.exe 86 PID 3980 wrote to memory of 4788 3980 msedge.exe 86 PID 3980 wrote to memory of 4788 3980 msedge.exe 86 PID 3980 wrote to memory of 4788 3980 msedge.exe 86 PID 3980 wrote to memory of 4788 3980 msedge.exe 86 PID 3980 wrote to memory of 4788 3980 msedge.exe 86 PID 3980 wrote to memory of 4788 3980 msedge.exe 86 PID 3980 wrote to memory of 4788 3980 msedge.exe 86 PID 3980 wrote to memory of 4788 3980 msedge.exe 86 PID 3980 wrote to memory of 4788 3980 msedge.exe 86 PID 3980 wrote to memory of 4788 3980 msedge.exe 86 PID 3980 wrote to memory of 4788 3980 msedge.exe 86 PID 3980 wrote to memory of 4788 3980 msedge.exe 86 PID 3980 wrote to memory of 4788 3980 msedge.exe 86 PID 3980 wrote to memory of 4788 3980 msedge.exe 86 PID 3980 wrote to memory of 4788 3980 msedge.exe 86 PID 3980 wrote to memory of 4788 3980 msedge.exe 86 PID 3980 wrote to memory of 4788 3980 msedge.exe 86 PID 3980 wrote to memory of 4788 3980 msedge.exe 86 PID 3980 wrote to memory of 4788 3980 msedge.exe 86 PID 3980 wrote to memory of 4788 3980 msedge.exe 86 PID 3980 wrote to memory of 4788 3980 msedge.exe 86 PID 3980 wrote to memory of 4788 3980 msedge.exe 86 PID 3980 wrote to memory of 4788 3980 msedge.exe 86 PID 3980 wrote to memory of 4788 3980 msedge.exe 86 PID 3980 wrote to memory of 4788 3980 msedge.exe 86 PID 3980 wrote to memory of 4788 3980 msedge.exe 86 PID 3980 wrote to memory of 4788 3980 msedge.exe 86 PID 3980 wrote to memory of 4788 3980 msedge.exe 86 PID 3980 wrote to memory of 640 3980 msedge.exe 87 PID 3980 wrote to memory of 640 3980 msedge.exe 87 PID 3980 wrote to memory of 1536 3980 msedge.exe 88 PID 3980 wrote to memory of 1536 3980 msedge.exe 88 PID 3980 wrote to memory of 1536 3980 msedge.exe 88 PID 3980 wrote to memory of 1536 3980 msedge.exe 88 PID 3980 wrote to memory of 1536 3980 msedge.exe 88 PID 3980 wrote to memory of 1536 3980 msedge.exe 88 PID 3980 wrote to memory of 1536 3980 msedge.exe 88 PID 3980 wrote to memory of 1536 3980 msedge.exe 88 PID 3980 wrote to memory of 1536 3980 msedge.exe 88 PID 3980 wrote to memory of 1536 3980 msedge.exe 88 PID 3980 wrote to memory of 1536 3980 msedge.exe 88 PID 3980 wrote to memory of 1536 3980 msedge.exe 88 PID 3980 wrote to memory of 1536 3980 msedge.exe 88 PID 3980 wrote to memory of 1536 3980 msedge.exe 88 PID 3980 wrote to memory of 1536 3980 msedge.exe 88 PID 3980 wrote to memory of 1536 3980 msedge.exe 88 PID 3980 wrote to memory of 1536 3980 msedge.exe 88 PID 3980 wrote to memory of 1536 3980 msedge.exe 88 PID 3980 wrote to memory of 1536 3980 msedge.exe 88 PID 3980 wrote to memory of 1536 3980 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\3bdf6d8d467bc64ffd0a66c3132acc31_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3980 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbbcb646f8,0x7ffbbcb64708,0x7ffbbcb647182⤵PID:1728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,11934331409368566925,3167226266169297684,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵PID:4788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2056,11934331409368566925,3167226266169297684,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2268 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2056,11934331409368566925,3167226266169297684,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2952 /prefetch:82⤵PID:1536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,11934331409368566925,3167226266169297684,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:4012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,11934331409368566925,3167226266169297684,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:2400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,11934331409368566925,3167226266169297684,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4712 /prefetch:12⤵PID:1672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,11934331409368566925,3167226266169297684,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5256 /prefetch:12⤵PID:3656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,11934331409368566925,3167226266169297684,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5012 /prefetch:12⤵PID:3100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,11934331409368566925,3167226266169297684,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5560 /prefetch:12⤵PID:4408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,11934331409368566925,3167226266169297684,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6232 /prefetch:82⤵PID:3384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,11934331409368566925,3167226266169297684,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6232 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,11934331409368566925,3167226266169297684,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6308 /prefetch:12⤵PID:2312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,11934331409368566925,3167226266169297684,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6324 /prefetch:12⤵PID:624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,11934331409368566925,3167226266169297684,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3960 /prefetch:12⤵PID:3432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,11934331409368566925,3167226266169297684,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4992 /prefetch:12⤵PID:4216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,11934331409368566925,3167226266169297684,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1836 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1424
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1120
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3744
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5dc058ebc0f8181946a312f0be99ed79c
SHA10c6f376ed8f2d4c275336048c7c9ef9edf18bff0
SHA256378701e87dcff90aa092702bc299859d6ae8f7e313f773bf594f81df6f40bf6a
SHA51236e0de64a554762b28045baebf9f71930c59d608f8d05c5faf8906d62eaf83f6d856ef1d1b38110e512fbb1a85d3e2310be11a7f679c6b5b3c62313cc7af52aa
-
Filesize
152B
MD5a0486d6f8406d852dd805b66ff467692
SHA177ba1f63142e86b21c951b808f4bc5d8ed89b571
SHA256c0745fd195f3a51b27e4d35a626378a62935dccebefb94db404166befd68b2be
SHA512065a62032eb799fade5fe75f390e7ab3c9442d74cb8b520d846662d144433f39b9186b3ef3db3480cd1d1d655d8f0630855ed5d6e85cf157a40c38a19375ed8a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize792B
MD5ef422ae15899588aa0aabfb7d377d938
SHA162a9bdce756d4e64f3cf7292b0aa7c1e69bc61a9
SHA2566a39336a8cf1ddad96cc890034093f5ee6b439d96759875faa85ead78b310dd2
SHA5123a1e007013b75526baa2d595626ffe5bbc7b78bdbcb341cafee3de4051dd91f9c2221082f228cbaedd25a9d074d158cc21b8dc42d24074efbf3e71e6fce56758
-
Filesize
1KB
MD5668e50369baaf6c9486b879ea164b1c5
SHA1906116b72667a30eb0277e51d166e5fa8204c908
SHA256af9323a8f7dee93e27f6691feacd19e5caf3595863e3840f69ae091c4ecc5cbe
SHA512ef1cb885636320df91d3565eef59199389cbb1f8e7b40bb618dae8ccc54a43034ab8c69cc1c7be6219faaa06d9057af45d0c84c04738095104a3d386f5de86c6
-
Filesize
6KB
MD529a4af3a41639117d45ae0901a3b97a7
SHA1c95b384b9aca7f3a097e88cbbe26c51b47df0177
SHA2568da1e9e4628e1f23409e2c562b7dd6b0c981afdd9176c08dbf27701806d741b0
SHA512a7b2fc8342c63b814d850cc310932264af7c683b9d32376c8278d72e5ffbfd02761d796c41e6c9c8975305c0d8575c5efda3e79dd837898ebbd8d94269a94184
-
Filesize
6KB
MD5ab81eea5fdd7c2230be276bd8ea83b03
SHA1943414a912fc5195a19ad0e10c1d42c948d195cc
SHA2565f1ff46a7c15abbbe835be3b32350eb08c9ef9a1e4ef304f3b3c2661eb5400c5
SHA512a75983ff08023e7188dabcf77e18374fbbc7241c1eaab986bba79b39733511baca7fe72fbcb30150bd4c9f6821232f639dcf36eb1d7396fe49df49f74008a1ba
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5c76a856e594a4d281bf6346542a3b289
SHA1859907c37dcde46d801d55a352c9336cff0c4abb
SHA256634e8616f629ae11d2a3e6ca2e65ce91f106cefed2f826f956966084aae10eef
SHA5121bcd29d2f5e6395ecab3b695177c4711ff872b124ef59fb8a0c33d24b1642f73ed7633ea927916d5a35fcab85f6481dc7f433f0510e4ce7e55aaea4c1abc2f31