Analysis
-
max time kernel
145s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13-10-2024 00:07
Static task
static1
Behavioral task
behavioral1
Sample
3cc05e8e9a0676edfa1e557406a2cdf4_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3cc05e8e9a0676edfa1e557406a2cdf4_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
3cc05e8e9a0676edfa1e557406a2cdf4_JaffaCakes118.html
-
Size
77KB
-
MD5
3cc05e8e9a0676edfa1e557406a2cdf4
-
SHA1
d0e0d7688b712bc56cbe3349cd762d1fb030ae80
-
SHA256
a9e1042d34932529e15cac9f02257f2e0b9a84733249e83bf65f676c3ddd0b95
-
SHA512
a6cd8174dbab2ce718523bac4653f68d90c50a30a41c167130f0fc3d9199112b1c29ebd480ae71b5e5f5ef0aa06199e5cfc55a4d64082411d3b7ff4321d6ee3e
-
SSDEEP
1536:MBeyMLnVXkIkIkIkIkIkIkIkIkIkIkIkIkIkwkwkwkwkwkwkwkwkwkwkwkFVklNG:YMLVEklfQ4+r+7OjlP
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1940 msedge.exe 1940 msedge.exe 1028 msedge.exe 1028 msedge.exe 2476 identity_helper.exe 2476 identity_helper.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1028 wrote to memory of 3552 1028 msedge.exe 83 PID 1028 wrote to memory of 3552 1028 msedge.exe 83 PID 1028 wrote to memory of 4856 1028 msedge.exe 85 PID 1028 wrote to memory of 4856 1028 msedge.exe 85 PID 1028 wrote to memory of 4856 1028 msedge.exe 85 PID 1028 wrote to memory of 4856 1028 msedge.exe 85 PID 1028 wrote to memory of 4856 1028 msedge.exe 85 PID 1028 wrote to memory of 4856 1028 msedge.exe 85 PID 1028 wrote to memory of 4856 1028 msedge.exe 85 PID 1028 wrote to memory of 4856 1028 msedge.exe 85 PID 1028 wrote to memory of 4856 1028 msedge.exe 85 PID 1028 wrote to memory of 4856 1028 msedge.exe 85 PID 1028 wrote to memory of 4856 1028 msedge.exe 85 PID 1028 wrote to memory of 4856 1028 msedge.exe 85 PID 1028 wrote to memory of 4856 1028 msedge.exe 85 PID 1028 wrote to memory of 4856 1028 msedge.exe 85 PID 1028 wrote to memory of 4856 1028 msedge.exe 85 PID 1028 wrote to memory of 4856 1028 msedge.exe 85 PID 1028 wrote to memory of 4856 1028 msedge.exe 85 PID 1028 wrote to memory of 4856 1028 msedge.exe 85 PID 1028 wrote to memory of 4856 1028 msedge.exe 85 PID 1028 wrote to memory of 4856 1028 msedge.exe 85 PID 1028 wrote to memory of 4856 1028 msedge.exe 85 PID 1028 wrote to memory of 4856 1028 msedge.exe 85 PID 1028 wrote to memory of 4856 1028 msedge.exe 85 PID 1028 wrote to memory of 4856 1028 msedge.exe 85 PID 1028 wrote to memory of 4856 1028 msedge.exe 85 PID 1028 wrote to memory of 4856 1028 msedge.exe 85 PID 1028 wrote to memory of 4856 1028 msedge.exe 85 PID 1028 wrote to memory of 4856 1028 msedge.exe 85 PID 1028 wrote to memory of 4856 1028 msedge.exe 85 PID 1028 wrote to memory of 4856 1028 msedge.exe 85 PID 1028 wrote to memory of 4856 1028 msedge.exe 85 PID 1028 wrote to memory of 4856 1028 msedge.exe 85 PID 1028 wrote to memory of 4856 1028 msedge.exe 85 PID 1028 wrote to memory of 4856 1028 msedge.exe 85 PID 1028 wrote to memory of 4856 1028 msedge.exe 85 PID 1028 wrote to memory of 4856 1028 msedge.exe 85 PID 1028 wrote to memory of 4856 1028 msedge.exe 85 PID 1028 wrote to memory of 4856 1028 msedge.exe 85 PID 1028 wrote to memory of 4856 1028 msedge.exe 85 PID 1028 wrote to memory of 4856 1028 msedge.exe 85 PID 1028 wrote to memory of 1940 1028 msedge.exe 86 PID 1028 wrote to memory of 1940 1028 msedge.exe 86 PID 1028 wrote to memory of 3660 1028 msedge.exe 87 PID 1028 wrote to memory of 3660 1028 msedge.exe 87 PID 1028 wrote to memory of 3660 1028 msedge.exe 87 PID 1028 wrote to memory of 3660 1028 msedge.exe 87 PID 1028 wrote to memory of 3660 1028 msedge.exe 87 PID 1028 wrote to memory of 3660 1028 msedge.exe 87 PID 1028 wrote to memory of 3660 1028 msedge.exe 87 PID 1028 wrote to memory of 3660 1028 msedge.exe 87 PID 1028 wrote to memory of 3660 1028 msedge.exe 87 PID 1028 wrote to memory of 3660 1028 msedge.exe 87 PID 1028 wrote to memory of 3660 1028 msedge.exe 87 PID 1028 wrote to memory of 3660 1028 msedge.exe 87 PID 1028 wrote to memory of 3660 1028 msedge.exe 87 PID 1028 wrote to memory of 3660 1028 msedge.exe 87 PID 1028 wrote to memory of 3660 1028 msedge.exe 87 PID 1028 wrote to memory of 3660 1028 msedge.exe 87 PID 1028 wrote to memory of 3660 1028 msedge.exe 87 PID 1028 wrote to memory of 3660 1028 msedge.exe 87 PID 1028 wrote to memory of 3660 1028 msedge.exe 87 PID 1028 wrote to memory of 3660 1028 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\3cc05e8e9a0676edfa1e557406a2cdf4_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1028 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff70e846f8,0x7fff70e84708,0x7fff70e847182⤵PID:3552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1988,10988973870852693915,6819465191587314502,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2012 /prefetch:22⤵PID:4856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1988,10988973870852693915,6819465191587314502,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2464 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1988,10988973870852693915,6819465191587314502,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2832 /prefetch:82⤵PID:3660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1988,10988973870852693915,6819465191587314502,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:3624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1988,10988973870852693915,6819465191587314502,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:5024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1988,10988973870852693915,6819465191587314502,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4712 /prefetch:12⤵PID:4504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1988,10988973870852693915,6819465191587314502,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5012 /prefetch:12⤵PID:1108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1988,10988973870852693915,6819465191587314502,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5432 /prefetch:12⤵PID:3232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1988,10988973870852693915,6819465191587314502,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5696 /prefetch:82⤵PID:4324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1988,10988973870852693915,6819465191587314502,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5696 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1988,10988973870852693915,6819465191587314502,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5136 /prefetch:12⤵PID:3772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1988,10988973870852693915,6819465191587314502,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5152 /prefetch:12⤵PID:1236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1988,10988973870852693915,6819465191587314502,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4868 /prefetch:12⤵PID:1148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1988,10988973870852693915,6819465191587314502,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5496 /prefetch:12⤵PID:3992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1988,10988973870852693915,6819465191587314502,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5764 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4632
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2296
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5048
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5b8880802fc2bb880a7a869faa01315b0
SHA151d1a3fa2c272f094515675d82150bfce08ee8d3
SHA256467b8cd4aacac66557712f9843023dcedefcc26efc746f3e44157bc8dac73812
SHA512e1c6dba2579357ba70de58968b167d2c529534d24bff70568144270c48ac18a48ee2af2d58d78ae741e5a36958fa78a57955bd2456f1df00b781fc1002e123d2
-
Filesize
152B
MD5ba6ef346187b40694d493da98d5da979
SHA1643c15bec043f8673943885199bb06cd1652ee37
SHA256d86eec91f295dfda8ed1c5fa99de426f2fe359282c7ebf67e3a40be739475d73
SHA5122e6cc97330be8868d4b9c53be7e12c558f6eb1ac2c4080a611ba6c43561d0c5bb4791b8a11a8c2371599f0ba73ed1d9a7a2ea6dee2ae6a080f1912e0cb1f656c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD59f7986d34f0460cedde65cb31b83a753
SHA1c443a88fcd5678616336f4fe89557dde404f9545
SHA256d18f812edf141fdefd5a20564e67d4547d0afe590473f182fc4d6fd89acb2984
SHA51221ca04855bf8f6f7d06f874429a7f2e73a58e577c3e19c65191019ff3c808df84487010c9748388bc45f0068b90d8972676dc1ce0f8907cb20649ca5db3afc94
-
Filesize
1KB
MD5286c50e709931c23566035add5aaae64
SHA1508655b84a403c7114fca030198d5661ed43f180
SHA25694d8ca3c0ed7d75871ecff3cd4d3877f3314a43d5bedfadc93ea41d835d30c9c
SHA5123bc377f813bd28dfcc97a5b2c200599fd521d6f3a98caab96768cd946dad0095dab208f3927eb0d484477b39e37c8d24836b5648ee15c4c44f155bc844799816
-
Filesize
6KB
MD520421b17b393c9cbae356189adcdfd72
SHA1045d69380e7abc28b35c1545ce3d800695ccc5c5
SHA256a0faad5c411191562a21e46dfc149cd543a9458f67dfcd25b17b62a382e016b6
SHA512f878cd881624b3abdf731d9a11eae844b23a13930dc87813e042086d16d85f92c45dc6676bf411c9e8b654694ecf419118b4b5fb1672a60461092d9d8cc20fd8
-
Filesize
6KB
MD56edd2bbb0a4f0ff184f6ac09d1d5aa7c
SHA1f97b6ad6876931510f333cfbdd23bf4c2a8861f0
SHA256c3d023961bf3f5811c1c082c4b7649e36d30a34fc0a1801f775e31585ac37cd3
SHA5120733c64964a76e2f6856b8b5c54c5a1f7ace3979b7fe997f462ecf2a9da4bf6df7685901abbd61c6f2e01cb216c8bda4c12a3cfabbf0aa404f0e61505a0d33f7
-
Filesize
6KB
MD5e8b960dc7a8dec41d117774f2becc55c
SHA1a6624ce29542417416b69e89ed45c25b5aa61301
SHA2560a9dc8d9f6be0cfffa6fa596e33e37af31fac04371bd6f15196eeebe4034df96
SHA5124f5c2253f4b7eee77a978e73ddc676a345dc05c836489f80e098d57f7bae13adfeb2d9276b2bbff0e8f3ffa212b4ef863106b5391f0e56b6e346a1c0d9c6a592
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD53eb4ac5b83a36f46ab88cc7c28b28eeb
SHA11077b69131e7a51996c48dd066de03fbcb024541
SHA25674d859c73d5c96f5c5ff2cef3b5209a7f62e91830226401fc6b69143cb0635c5
SHA512017fdbbafdcbf8726ed659f739e29cfdff394e0e4bca3479ea27b91c0b819531cbec24ec90752152ca6baeabd814c00866a73fdb5b5de3cef552ae85bac6a8bd