Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13/10/2024, 01:29
Static task
static1
Behavioral task
behavioral1
Sample
3d12807d5191816020bec45889649641_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3d12807d5191816020bec45889649641_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
3d12807d5191816020bec45889649641_JaffaCakes118.html
-
Size
50KB
-
MD5
3d12807d5191816020bec45889649641
-
SHA1
ef00e905fae638179327b6839408bc1c448eeaa6
-
SHA256
b2295a114993a450a7279f49a8e115c124df1a5fce8b1c47b600eb69f85839c0
-
SHA512
aecfb80cdda9ea8eea41a2432e251cd8bdd425768bf03040e3403bd5621d609ed398dbc96d256f355a78d5635468d6d602703715af7062f6ea529f19a49d6d16
-
SSDEEP
1536:d6p2bpCaBqShbGhZMlvQo8JLwDN9Ufg4qZ9ag4BV/aVVDuKJ:3pxiMlvQotq/a1
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3908 msedge.exe 3908 msedge.exe 5068 msedge.exe 5068 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe 4372 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe 5068 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5068 wrote to memory of 2016 5068 msedge.exe 83 PID 5068 wrote to memory of 2016 5068 msedge.exe 83 PID 5068 wrote to memory of 3596 5068 msedge.exe 84 PID 5068 wrote to memory of 3596 5068 msedge.exe 84 PID 5068 wrote to memory of 3596 5068 msedge.exe 84 PID 5068 wrote to memory of 3596 5068 msedge.exe 84 PID 5068 wrote to memory of 3596 5068 msedge.exe 84 PID 5068 wrote to memory of 3596 5068 msedge.exe 84 PID 5068 wrote to memory of 3596 5068 msedge.exe 84 PID 5068 wrote to memory of 3596 5068 msedge.exe 84 PID 5068 wrote to memory of 3596 5068 msedge.exe 84 PID 5068 wrote to memory of 3596 5068 msedge.exe 84 PID 5068 wrote to memory of 3596 5068 msedge.exe 84 PID 5068 wrote to memory of 3596 5068 msedge.exe 84 PID 5068 wrote to memory of 3596 5068 msedge.exe 84 PID 5068 wrote to memory of 3596 5068 msedge.exe 84 PID 5068 wrote to memory of 3596 5068 msedge.exe 84 PID 5068 wrote to memory of 3596 5068 msedge.exe 84 PID 5068 wrote to memory of 3596 5068 msedge.exe 84 PID 5068 wrote to memory of 3596 5068 msedge.exe 84 PID 5068 wrote to memory of 3596 5068 msedge.exe 84 PID 5068 wrote to memory of 3596 5068 msedge.exe 84 PID 5068 wrote to memory of 3596 5068 msedge.exe 84 PID 5068 wrote to memory of 3596 5068 msedge.exe 84 PID 5068 wrote to memory of 3596 5068 msedge.exe 84 PID 5068 wrote to memory of 3596 5068 msedge.exe 84 PID 5068 wrote to memory of 3596 5068 msedge.exe 84 PID 5068 wrote to memory of 3596 5068 msedge.exe 84 PID 5068 wrote to memory of 3596 5068 msedge.exe 84 PID 5068 wrote to memory of 3596 5068 msedge.exe 84 PID 5068 wrote to memory of 3596 5068 msedge.exe 84 PID 5068 wrote to memory of 3596 5068 msedge.exe 84 PID 5068 wrote to memory of 3596 5068 msedge.exe 84 PID 5068 wrote to memory of 3596 5068 msedge.exe 84 PID 5068 wrote to memory of 3596 5068 msedge.exe 84 PID 5068 wrote to memory of 3596 5068 msedge.exe 84 PID 5068 wrote to memory of 3596 5068 msedge.exe 84 PID 5068 wrote to memory of 3596 5068 msedge.exe 84 PID 5068 wrote to memory of 3596 5068 msedge.exe 84 PID 5068 wrote to memory of 3596 5068 msedge.exe 84 PID 5068 wrote to memory of 3596 5068 msedge.exe 84 PID 5068 wrote to memory of 3596 5068 msedge.exe 84 PID 5068 wrote to memory of 3908 5068 msedge.exe 85 PID 5068 wrote to memory of 3908 5068 msedge.exe 85 PID 5068 wrote to memory of 1440 5068 msedge.exe 86 PID 5068 wrote to memory of 1440 5068 msedge.exe 86 PID 5068 wrote to memory of 1440 5068 msedge.exe 86 PID 5068 wrote to memory of 1440 5068 msedge.exe 86 PID 5068 wrote to memory of 1440 5068 msedge.exe 86 PID 5068 wrote to memory of 1440 5068 msedge.exe 86 PID 5068 wrote to memory of 1440 5068 msedge.exe 86 PID 5068 wrote to memory of 1440 5068 msedge.exe 86 PID 5068 wrote to memory of 1440 5068 msedge.exe 86 PID 5068 wrote to memory of 1440 5068 msedge.exe 86 PID 5068 wrote to memory of 1440 5068 msedge.exe 86 PID 5068 wrote to memory of 1440 5068 msedge.exe 86 PID 5068 wrote to memory of 1440 5068 msedge.exe 86 PID 5068 wrote to memory of 1440 5068 msedge.exe 86 PID 5068 wrote to memory of 1440 5068 msedge.exe 86 PID 5068 wrote to memory of 1440 5068 msedge.exe 86 PID 5068 wrote to memory of 1440 5068 msedge.exe 86 PID 5068 wrote to memory of 1440 5068 msedge.exe 86 PID 5068 wrote to memory of 1440 5068 msedge.exe 86 PID 5068 wrote to memory of 1440 5068 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\3d12807d5191816020bec45889649641_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5068 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff94c9746f8,0x7ff94c974708,0x7ff94c9747182⤵PID:2016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,13029052485146560082,18227440089363160320,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2156 /prefetch:22⤵PID:3596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,13029052485146560082,18227440089363160320,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2220 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,13029052485146560082,18227440089363160320,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2716 /prefetch:82⤵PID:1440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,13029052485146560082,18227440089363160320,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:1308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,13029052485146560082,18227440089363160320,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:3812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,13029052485146560082,18227440089363160320,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1752 /prefetch:12⤵PID:748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,13029052485146560082,18227440089363160320,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3364 /prefetch:12⤵PID:2312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,13029052485146560082,18227440089363160320,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5860 /prefetch:12⤵PID:3992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,13029052485146560082,18227440089363160320,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5804 /prefetch:12⤵PID:1844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,13029052485146560082,18227440089363160320,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5720 /prefetch:12⤵PID:1076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,13029052485146560082,18227440089363160320,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1808 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4372
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4420
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1752
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD58749e21d9d0a17dac32d5aa2027f7a75
SHA1a5d555f8b035c7938a4a864e89218c0402ab7cde
SHA256915193bd331ee9ea7c750398a37fbb552b8c5a1d90edec6293688296bda6f304
SHA512c645a41180ed01e854f197868283f9b40620dbbc813a1c122f6870db574ebc1c4917da4d320bdfd1cc67f23303a2c6d74e4f36dd9d3ffcfa92d3dfca3b7ca31a
-
Filesize
152B
MD534d2c4f40f47672ecdf6f66fea242f4a
SHA14bcad62542aeb44cae38a907d8b5a8604115ada2
SHA256b214e3affb02a2ea4469a8bbdfa8a179e7cc57cababd83b4bafae9cdbe23fa33
SHA51250fba54ec95d694211a005d0e3e6cf5b5677efa16989cbf854207a1a67e3a139f32b757c6f2ce824a48f621440b93fde60ad1dc790fcec4b76edddd0d92a75d6
-
Filesize
251KB
MD5f7e9ad31452bf6fd78c33ee353a084ee
SHA1c9c8c98c12a8b0f056856855e66477a5c6ca06e9
SHA2567796378a16a7170fd76ea2b36199a19347b586e0cbaf019841c171af4372c17d
SHA5120e12e611995652283bcb44a002665d36c5cb91b1628757ee19237d58614f2314c85edd8773d56c3549340f19e5232d1c40b1ef8abc1c974ce0dad49177b90baf
-
Filesize
16KB
MD549295de6ccd23cf80b6418a2d209868f
SHA142a955b4560bb22cb9b5b39577f7a691ea345018
SHA256d5a29c73c6200af2ed6918a61106e649b92098ecd476830d725ed4d2ea5a8efa
SHA5122954ab185fd84a08933bb6e79d91e301021fce4e632b477e765c172cacf72913561e101ed2f7e66bfbdc5946b35f2b63eb2b6f878e0afc9d26ffe71ee112a1c0
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD5851f5a4077d9c96f9a4ac5ebb3fa9b9f
SHA11740ebf0e73b1a1bb9ec740adf19daad0c9be231
SHA256c874fa4494b016754def66d44344c5ca99fe05472b6931f5c6fca33cdd1ba3bc
SHA5127a86ce2752f24cd1aa625c575ad69bcc7f308b358b66cadce117fe1cbf42a87603b56ad58211d060c16112903551f0c443000631c65d31cf798955da08eeb327
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
3KB
MD5f045d33cb213cb607638f79d15f639b4
SHA1fb18ebbf2895670238ac56bc23df5ba3702b2d2c
SHA256c5fa0728654d0a7b41b25a8023df776bd4a8257c1df421dbb5d037f5f8068834
SHA512c2d801ca89debba0e7a9de2af6e2d1816f2662725d35c09956f2a820451644dae43da3388b061b8ce6afab5f546c39c48d5c8c83797be195859b6ebdde1779a8
-
Filesize
8KB
MD51966ac669b8cc1971df422cbc0f62594
SHA152d0e6b4894c3fe7efe3ae6ea0d2d391bb94dae9
SHA256da09cbf6d3f0bed8b1e0ed38bc6f4ad89a8cb353c08490840d702966ba3d0651
SHA512d03a03b7100364fed4bd6eee06c0cd7989bc5ad8ed8cc914a4faf1df2807d4b061a287d48283ef05b2dc79f6ddebfcea445b21d6eead9466d2d0ed6b470675a4
-
Filesize
6KB
MD52fec7e0ca5935e3c51a5cb5b03a98087
SHA13e68fe8ac401648949a82d16f70fc7db27056615
SHA256c9b180e798572bbc604eab12c6816681f6c1ecf58d8c1c0432587d2177f959d1
SHA512cd66eefce89bab4e502bf9a712bd07921ecc8c4a7ff75e62ecd0fe4648bd782f8ef1cc84035b7a10a96aecd6862ae64e3f4da6025d577d07ea14b86038181930
-
Filesize
6KB
MD50a708c55f3ba4d9c686ed470cf15cace
SHA1a1c32fa7b42df24967ef460d39196de0202a8fb1
SHA256bc50be102543654db47c1708dfae2264baca4230ee791ccb43f7308bd05b4f56
SHA51234fee6d6b64f32777b2b81f5c81a94287cb7f1bdcd2505e68d165034fe1f496f4583f91fd77e57e9d28638d5d52df2b4d365726e2af5f5c380dd99c8ac9389d3
-
Filesize
873B
MD51f15ba5cf27dd07ad85f2b97a30e0bb0
SHA1db36784fc3fcc4026a6840f0347ed400e88187bb
SHA256eeb279d27c3958bcadfb331cbe45f2021fe59bbe661406340e9d811e22c89b2a
SHA512ebe8eada50397b87fc5eaa1a0f34e718e41d9b3a90cf475df6735f40fde4e0707a2ca69895f1baf2c273466d6687d82caecd1daeaeeb173ddd0d753638f1494a
-
Filesize
371B
MD5836aa8fc9db6f8cbb53b5bf5d601c423
SHA15f4beff32a0b53dd0a9a84932fff11c82aa24a74
SHA256accdd4ae070e88490ab591dc0ba77b77bff4723e7f9f39b69fe1f1690b3d5cce
SHA5126510f04e5d423394cc4baf80842d102f5c17533cbb7848a440b01380f8ea49ff9ee6442cbde76f90ac71790ed9ccd673cdafe5ba67c14542fe4cfd28892e4c4e
-
Filesize
10KB
MD5f7a223c8925716f0bfd39c124cc28040
SHA1a90be4e5c1b665196fa25557ee5f2cf36dbe4490
SHA25698bf86d615f455e29e6c787ad7b67e46c0f268263394dad95abec2dedf00d9a1
SHA51255a88b2f0d4870d68c49959c5bcdd47b738a71e254afe13cef4a390455a6615e4c86e7784dc042d3ffdfc9bd275ca6d4419517c508231399bd76a62ef454be53