Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13/10/2024, 05:34
Static task
static1
Behavioral task
behavioral1
Sample
3e14aa61b1c79f414343f811b57629eb_JaffaCakes118.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
3e14aa61b1c79f414343f811b57629eb_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
3e14aa61b1c79f414343f811b57629eb_JaffaCakes118.html
-
Size
8KB
-
MD5
3e14aa61b1c79f414343f811b57629eb
-
SHA1
c174f5e33c793d8f3a8687449fcc7b93ad8146db
-
SHA256
67f93b441f5faf46fe12f44509499d134b9391b8595574a7023e509dd1833e4b
-
SHA512
803ec6370703226d8f0f384705a92e462e06c7c07418360fcdfdad147dfbb00d4d8eabd37ffc084d00f2085ce4d48b139dc9409a0fa6cf22deae739f79d07c23
-
SSDEEP
192:9pwMtfFl6H1zCx+n5fIaUQJshYYzYEjRRYY+YESfHoBzwZB4L:Btac+nOaUQ6mNbkEoHecBs
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2500 msedge.exe 2500 msedge.exe 1184 msedge.exe 1184 msedge.exe 3416 identity_helper.exe 3416 identity_helper.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe 1456 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe 1184 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1184 wrote to memory of 5112 1184 msedge.exe 83 PID 1184 wrote to memory of 5112 1184 msedge.exe 83 PID 1184 wrote to memory of 944 1184 msedge.exe 85 PID 1184 wrote to memory of 944 1184 msedge.exe 85 PID 1184 wrote to memory of 944 1184 msedge.exe 85 PID 1184 wrote to memory of 944 1184 msedge.exe 85 PID 1184 wrote to memory of 944 1184 msedge.exe 85 PID 1184 wrote to memory of 944 1184 msedge.exe 85 PID 1184 wrote to memory of 944 1184 msedge.exe 85 PID 1184 wrote to memory of 944 1184 msedge.exe 85 PID 1184 wrote to memory of 944 1184 msedge.exe 85 PID 1184 wrote to memory of 944 1184 msedge.exe 85 PID 1184 wrote to memory of 944 1184 msedge.exe 85 PID 1184 wrote to memory of 944 1184 msedge.exe 85 PID 1184 wrote to memory of 944 1184 msedge.exe 85 PID 1184 wrote to memory of 944 1184 msedge.exe 85 PID 1184 wrote to memory of 944 1184 msedge.exe 85 PID 1184 wrote to memory of 944 1184 msedge.exe 85 PID 1184 wrote to memory of 944 1184 msedge.exe 85 PID 1184 wrote to memory of 944 1184 msedge.exe 85 PID 1184 wrote to memory of 944 1184 msedge.exe 85 PID 1184 wrote to memory of 944 1184 msedge.exe 85 PID 1184 wrote to memory of 944 1184 msedge.exe 85 PID 1184 wrote to memory of 944 1184 msedge.exe 85 PID 1184 wrote to memory of 944 1184 msedge.exe 85 PID 1184 wrote to memory of 944 1184 msedge.exe 85 PID 1184 wrote to memory of 944 1184 msedge.exe 85 PID 1184 wrote to memory of 944 1184 msedge.exe 85 PID 1184 wrote to memory of 944 1184 msedge.exe 85 PID 1184 wrote to memory of 944 1184 msedge.exe 85 PID 1184 wrote to memory of 944 1184 msedge.exe 85 PID 1184 wrote to memory of 944 1184 msedge.exe 85 PID 1184 wrote to memory of 944 1184 msedge.exe 85 PID 1184 wrote to memory of 944 1184 msedge.exe 85 PID 1184 wrote to memory of 944 1184 msedge.exe 85 PID 1184 wrote to memory of 944 1184 msedge.exe 85 PID 1184 wrote to memory of 944 1184 msedge.exe 85 PID 1184 wrote to memory of 944 1184 msedge.exe 85 PID 1184 wrote to memory of 944 1184 msedge.exe 85 PID 1184 wrote to memory of 944 1184 msedge.exe 85 PID 1184 wrote to memory of 944 1184 msedge.exe 85 PID 1184 wrote to memory of 944 1184 msedge.exe 85 PID 1184 wrote to memory of 2500 1184 msedge.exe 86 PID 1184 wrote to memory of 2500 1184 msedge.exe 86 PID 1184 wrote to memory of 5000 1184 msedge.exe 87 PID 1184 wrote to memory of 5000 1184 msedge.exe 87 PID 1184 wrote to memory of 5000 1184 msedge.exe 87 PID 1184 wrote to memory of 5000 1184 msedge.exe 87 PID 1184 wrote to memory of 5000 1184 msedge.exe 87 PID 1184 wrote to memory of 5000 1184 msedge.exe 87 PID 1184 wrote to memory of 5000 1184 msedge.exe 87 PID 1184 wrote to memory of 5000 1184 msedge.exe 87 PID 1184 wrote to memory of 5000 1184 msedge.exe 87 PID 1184 wrote to memory of 5000 1184 msedge.exe 87 PID 1184 wrote to memory of 5000 1184 msedge.exe 87 PID 1184 wrote to memory of 5000 1184 msedge.exe 87 PID 1184 wrote to memory of 5000 1184 msedge.exe 87 PID 1184 wrote to memory of 5000 1184 msedge.exe 87 PID 1184 wrote to memory of 5000 1184 msedge.exe 87 PID 1184 wrote to memory of 5000 1184 msedge.exe 87 PID 1184 wrote to memory of 5000 1184 msedge.exe 87 PID 1184 wrote to memory of 5000 1184 msedge.exe 87 PID 1184 wrote to memory of 5000 1184 msedge.exe 87 PID 1184 wrote to memory of 5000 1184 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\3e14aa61b1c79f414343f811b57629eb_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1184 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd364b46f8,0x7ffd364b4708,0x7ffd364b47182⤵PID:5112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,13187421421920822769,11806838915153082552,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵PID:944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,13187421421920822769,11806838915153082552,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2252 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2080,13187421421920822769,11806838915153082552,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2404 /prefetch:82⤵PID:5000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,13187421421920822769,11806838915153082552,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2400 /prefetch:12⤵PID:4424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,13187421421920822769,11806838915153082552,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:2020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,13187421421920822769,11806838915153082552,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4232 /prefetch:12⤵PID:3704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,13187421421920822769,11806838915153082552,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5424 /prefetch:82⤵PID:464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,13187421421920822769,11806838915153082552,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5424 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,13187421421920822769,11806838915153082552,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5480 /prefetch:12⤵PID:436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,13187421421920822769,11806838915153082552,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5500 /prefetch:12⤵PID:4680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,13187421421920822769,11806838915153082552,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4884 /prefetch:12⤵PID:2748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,13187421421920822769,11806838915153082552,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5900 /prefetch:12⤵PID:456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,13187421421920822769,11806838915153082552,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1256 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1456
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5096
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4936
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5bffcefacce25cd03f3d5c9446ddb903d
SHA18923f84aa86db316d2f5c122fe3874bbe26f3bab
SHA25623e7cbbf64c81122c3cb30a0933c10a320e254447771737a326ce37a0694d405
SHA512761dae5315b35ec0b2fe68019881397f5d2eadba3963aba79a89f8953a0cd705012d7faf3a204a5f36008926b9f614980e333351596b06ce7058d744345ce2e7
-
Filesize
152B
MD5d22073dea53e79d9b824f27ac5e9813e
SHA16d8a7281241248431a1571e6ddc55798b01fa961
SHA25686713962c3bb287964678b148ee08ea83fb83483dff8be91c8a6085ca560b2a6
SHA51297152091ee24b6e713b8ec8123cb62511f8a7e8a6c6c3f2f6727d0a60497be28814613b476009b853575d4931e5df950e28a41afbf6707cb672206f1219c4413
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize552B
MD58f962671876adadf08261b4909dc0601
SHA1d08fdc5023e629902f82c4be4c2b060f18227f6e
SHA256a38d6934eba9ee0246f6cc2811e8156a476d288d745020f289afd49bb93a5ad6
SHA5129d90f0b80de0f668fe6aba0cc0b920bb52fefdb8fc43b44799678664aa0ea3a981f52cc77693a0951d0b59e6a49fad8be819939cc29dd4317ac54758c4dc66ec
-
Filesize
303B
MD5d8cff71119d98e6ac8e284915985925e
SHA17cfe9835c096d613dbdf3d3c2f72d7fe767f22e6
SHA256bf4e60769a678c5a96eeddc1f22bb4a636b2cf6537b7daa7f0144a39a7049613
SHA5126514ba3bcbacd2020d516194e8d9c2b06f2db3bc13278f0528e2fe66fe667de2f4c7011ff0422282d6f96fc61f0898160f14b343a87e960abaf096269d64f41e
-
Filesize
6KB
MD5934c0047c91591a94cdc39e3bf7df1dc
SHA1791801062e501fd7d7cc3d168659bfc6cec2b625
SHA25649520f5ca0b554f24a3a7c3c8f3b799fa2bf1f38a6a5adc2f98903684188caee
SHA5123a5fdd2e9c535c66f5a5c673089bb1605fd7d91ea1d3d18fd6c01951dd81bf56878e7788bd30f86abc38a702970fab3c2f9362121f4db2369fcec4eba3b6bcf2
-
Filesize
6KB
MD5e0d412e8a85ad95f3aa66632f037a6b0
SHA15f5958c346da90d41e72c681f037c73c9123dcc1
SHA25644d3f9be54737e59a456de46d908c26b74ddf477cc0f915d3b5987d0a231ca58
SHA512d97eb2e8fffad957e046bf35f65dadfe8ab912752e6a1136627fdf6e2eb711374af772af6d8ec167f0e824a2916fac423afb18ec88a428d04f856e025966cb09
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD54dd271e78ec5ddfd0011e3e1d98be396
SHA1ecef7a679e454f1128a274f553849bc268aa53f4
SHA25618115fdb300beac8ef00d93615f381426e75dfc28d62827bcd17a9bb1302e355
SHA512c42961df0c6de821ca2172726741af092823f18de08a37763b31c2990f10092efcd9099a7e08cb0467997e4c73e40e5edc55711f3197b0e7e5d746775ac2e4a0