Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13-10-2024 10:43
Static task
static1
Behavioral task
behavioral1
Sample
3f65ea7515f203d79c662ea6f69027c9_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3f65ea7515f203d79c662ea6f69027c9_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
3f65ea7515f203d79c662ea6f69027c9_JaffaCakes118.html
-
Size
37KB
-
MD5
3f65ea7515f203d79c662ea6f69027c9
-
SHA1
ef9463c69d8ac847b37d4ec641333e5ace39f704
-
SHA256
505b571fc6b44ce0bbb83823ff571e2e248d022aa714801c33687a2535dc213c
-
SHA512
d024ae3ac59e8debed153f8d7dfd0f4c7b691b5e12c000acc27ea45aeb2e25b44d49abfe712e038cb657205e5abe11b44b45e5fee9c361b23b8c575e83df0432
-
SSDEEP
384:SaCRX87HCOdZ/FYgqZ8O+APgWVavySqO3HpTfV9cVkNr7e:SaC587HCOdxARVezV9c6Nr7e
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2160 msedge.exe 2160 msedge.exe 4708 msedge.exe 4708 msedge.exe 3100 identity_helper.exe 3100 identity_helper.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4708 wrote to memory of 1576 4708 msedge.exe 83 PID 4708 wrote to memory of 1576 4708 msedge.exe 83 PID 4708 wrote to memory of 4104 4708 msedge.exe 84 PID 4708 wrote to memory of 4104 4708 msedge.exe 84 PID 4708 wrote to memory of 4104 4708 msedge.exe 84 PID 4708 wrote to memory of 4104 4708 msedge.exe 84 PID 4708 wrote to memory of 4104 4708 msedge.exe 84 PID 4708 wrote to memory of 4104 4708 msedge.exe 84 PID 4708 wrote to memory of 4104 4708 msedge.exe 84 PID 4708 wrote to memory of 4104 4708 msedge.exe 84 PID 4708 wrote to memory of 4104 4708 msedge.exe 84 PID 4708 wrote to memory of 4104 4708 msedge.exe 84 PID 4708 wrote to memory of 4104 4708 msedge.exe 84 PID 4708 wrote to memory of 4104 4708 msedge.exe 84 PID 4708 wrote to memory of 4104 4708 msedge.exe 84 PID 4708 wrote to memory of 4104 4708 msedge.exe 84 PID 4708 wrote to memory of 4104 4708 msedge.exe 84 PID 4708 wrote to memory of 4104 4708 msedge.exe 84 PID 4708 wrote to memory of 4104 4708 msedge.exe 84 PID 4708 wrote to memory of 4104 4708 msedge.exe 84 PID 4708 wrote to memory of 4104 4708 msedge.exe 84 PID 4708 wrote to memory of 4104 4708 msedge.exe 84 PID 4708 wrote to memory of 4104 4708 msedge.exe 84 PID 4708 wrote to memory of 4104 4708 msedge.exe 84 PID 4708 wrote to memory of 4104 4708 msedge.exe 84 PID 4708 wrote to memory of 4104 4708 msedge.exe 84 PID 4708 wrote to memory of 4104 4708 msedge.exe 84 PID 4708 wrote to memory of 4104 4708 msedge.exe 84 PID 4708 wrote to memory of 4104 4708 msedge.exe 84 PID 4708 wrote to memory of 4104 4708 msedge.exe 84 PID 4708 wrote to memory of 4104 4708 msedge.exe 84 PID 4708 wrote to memory of 4104 4708 msedge.exe 84 PID 4708 wrote to memory of 4104 4708 msedge.exe 84 PID 4708 wrote to memory of 4104 4708 msedge.exe 84 PID 4708 wrote to memory of 4104 4708 msedge.exe 84 PID 4708 wrote to memory of 4104 4708 msedge.exe 84 PID 4708 wrote to memory of 4104 4708 msedge.exe 84 PID 4708 wrote to memory of 4104 4708 msedge.exe 84 PID 4708 wrote to memory of 4104 4708 msedge.exe 84 PID 4708 wrote to memory of 4104 4708 msedge.exe 84 PID 4708 wrote to memory of 4104 4708 msedge.exe 84 PID 4708 wrote to memory of 4104 4708 msedge.exe 84 PID 4708 wrote to memory of 2160 4708 msedge.exe 85 PID 4708 wrote to memory of 2160 4708 msedge.exe 85 PID 4708 wrote to memory of 2688 4708 msedge.exe 86 PID 4708 wrote to memory of 2688 4708 msedge.exe 86 PID 4708 wrote to memory of 2688 4708 msedge.exe 86 PID 4708 wrote to memory of 2688 4708 msedge.exe 86 PID 4708 wrote to memory of 2688 4708 msedge.exe 86 PID 4708 wrote to memory of 2688 4708 msedge.exe 86 PID 4708 wrote to memory of 2688 4708 msedge.exe 86 PID 4708 wrote to memory of 2688 4708 msedge.exe 86 PID 4708 wrote to memory of 2688 4708 msedge.exe 86 PID 4708 wrote to memory of 2688 4708 msedge.exe 86 PID 4708 wrote to memory of 2688 4708 msedge.exe 86 PID 4708 wrote to memory of 2688 4708 msedge.exe 86 PID 4708 wrote to memory of 2688 4708 msedge.exe 86 PID 4708 wrote to memory of 2688 4708 msedge.exe 86 PID 4708 wrote to memory of 2688 4708 msedge.exe 86 PID 4708 wrote to memory of 2688 4708 msedge.exe 86 PID 4708 wrote to memory of 2688 4708 msedge.exe 86 PID 4708 wrote to memory of 2688 4708 msedge.exe 86 PID 4708 wrote to memory of 2688 4708 msedge.exe 86 PID 4708 wrote to memory of 2688 4708 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\3f65ea7515f203d79c662ea6f69027c9_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4708 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdac4046f8,0x7ffdac404708,0x7ffdac4047182⤵PID:1576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,17126308380301415919,4469752454362988896,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵PID:4104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,17126308380301415919,4469752454362988896,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2176 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,17126308380301415919,4469752454362988896,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2768 /prefetch:82⤵PID:2688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,17126308380301415919,4469752454362988896,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:2580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,17126308380301415919,4469752454362988896,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:1792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,17126308380301415919,4469752454362988896,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5180 /prefetch:12⤵PID:3732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,17126308380301415919,4469752454362988896,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6180 /prefetch:82⤵PID:2828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,17126308380301415919,4469752454362988896,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6180 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,17126308380301415919,4469752454362988896,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5084 /prefetch:12⤵PID:3948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,17126308380301415919,4469752454362988896,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5112 /prefetch:12⤵PID:2504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,17126308380301415919,4469752454362988896,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4760 /prefetch:12⤵PID:4072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,17126308380301415919,4469752454362988896,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5576 /prefetch:12⤵PID:4240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,17126308380301415919,4469752454362988896,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4864 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1924
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1872
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1376
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e55832d7cd7e868a2c087c4c73678018
SHA1ed7a2f6d6437e907218ffba9128802eaf414a0eb
SHA256a4d7777b980ec53de3a70aca8fb25b77e9b53187e7d2f0fa1a729ee9a35da574
SHA512897fdebf1a9269a1bf1e3a791f6ee9ab7c24c9d75eeff65ac9599764e1c8585784e1837ba5321d90af0b004af121b2206081a6fb1b1ad571a0051ee33d3f5c5f
-
Filesize
152B
MD5c2d9eeb3fdd75834f0ac3f9767de8d6f
SHA14d16a7e82190f8490a00008bd53d85fb92e379b0
SHA2561e5efb5f1d78a4cc269cb116307e9d767fc5ad8a18e6cf95c81c61d7b1da5c66
SHA512d92f995f9e096ecc0a7b8b4aca336aeef0e7b919fe7fe008169f0b87da84d018971ba5728141557d42a0fc562a25191bd85e0d7354c401b09e8b62cdc44b6dcd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD52a4bb7fbd03c211c5bab1513d6f99f77
SHA13dc689573fb1ef0550cab566752091bcfaf3a6a9
SHA2561635ec3c5df4bd5bd74808baacbe631dd7337178d12048a5ec4ab0ece955bfcb
SHA512c9808b244ea107f2b403733e2ca60860c92fc7ba1b7012cea49c92a307d3ace4d8e5fc4a118b3756c537f1d4b98ad8479ee6b83a6abd24ad687e4fb09c4c4e26
-
Filesize
643B
MD5cc86dd2a2044261ddd3ad30a32bab578
SHA1d4fe85583f854b1030bfb662dd1b40ef200c9b7e
SHA256608aab2cee377d6382d2501b2f22a0f1c3f8002d5ccabc1c44ce4b43c6eb8577
SHA512100a16d6168c419fd204654cfd3e2e0271ea6fbf5036ec6ae71bb60027d31e9f8f4d0bc404ccdd69f94db0b7403a511e73d93230f520944834722648bdba2dd1
-
Filesize
6KB
MD5d1f06247de4aa33014bcf52135eb7a59
SHA1ac642bdaf3956674476121cad1618edc00ed1e2d
SHA2561d20de8555b2a4ecd85add612ce853c79e6fc5a550bd2b11fb018c7fb2cad5a0
SHA512c8c7b2c8127fa94029e6e343be66ad0fb34ffa85a1e2e150208d51a4db2c96e9964d28bde47fe4cc540a953ce220945963f3b946e6de6040c32e38db0b55055f
-
Filesize
6KB
MD50205cd0ccaeee4b3a9cdda6f864c6465
SHA1787745d5bf544a8dbcd822365a4c600cbb5faa9d
SHA2561d10b9e3f1cc3251694474c4f07931d3aa6c96f2afdcbaa5c093665c2630d3e9
SHA512a5cf3941faa33ccb0d3e552efea693f996616468c70e4a1d547addc654a4e251a029d69b8764f2c69ae3d8e4a7bfc8c458a2d4243815524b4078207b7d41ed61
-
Filesize
6KB
MD55fe86777e6b1c69a5435b17281d06c5c
SHA1015113ca6df90d8f61822f7e02a56bd299554623
SHA256ef2505b89b275d2b7c766d265491f2cacab2edbf3368162e6c5aabc9bab04861
SHA512341f8063cb06cc60ebb616c22731ae4b72caef8c8086036c1296fe36d52d6468450d0c8c2967d03dd118fa4fed4f003bffbd4ed5f6547eb5dd0983a368be176d
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD55a65ad9d45da063ebcc85a032042cff7
SHA115424e6a659937921c9ecbf062dddb88b24c04f0
SHA2564092909a6c23305bce8982fb0e3f4e07e1249cbec4932e775bb52fd10e5de1b6
SHA5126a4441521e0bfb27f9fb44bcc3fb6e2e9d072e3bc23b98d1440d114cea46e433a6057d5da1550eb310c5fea4be62cbeeab9624e4d5c3a691addde70ba039f6bb