Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13-10-2024 12:20
Static task
static1
Behavioral task
behavioral1
Sample
3fd1d763628f81f7c03229e23aa45e13_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3fd1d763628f81f7c03229e23aa45e13_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
3fd1d763628f81f7c03229e23aa45e13_JaffaCakes118.html
-
Size
112KB
-
MD5
3fd1d763628f81f7c03229e23aa45e13
-
SHA1
0fb4ad97346d9f21480bf49c33254dfe7f6e3aab
-
SHA256
67931a690e857192e0af9f9ecf294ca9a9a3046f4b5b05256d6aaee4f789f108
-
SHA512
5c24fa3024978cf784e54ea0972de38d1ed95397f42fef3c41eb0b1be7c806f4240b45541257757ae94a9569200fc3e0526bc35b9955c33f8201e2954f273fcb
-
SSDEEP
3072:Gu3SNcSMNjpYwPz4ZKoa3Hi3Mu6yrRkPYpyzlU/lBuEm3s4GaP:P3SNcSMtN+DaP
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2248 msedge.exe 2248 msedge.exe 888 msedge.exe 888 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe 4940 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe 888 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 888 wrote to memory of 1620 888 msedge.exe 83 PID 888 wrote to memory of 1620 888 msedge.exe 83 PID 888 wrote to memory of 3224 888 msedge.exe 84 PID 888 wrote to memory of 3224 888 msedge.exe 84 PID 888 wrote to memory of 3224 888 msedge.exe 84 PID 888 wrote to memory of 3224 888 msedge.exe 84 PID 888 wrote to memory of 3224 888 msedge.exe 84 PID 888 wrote to memory of 3224 888 msedge.exe 84 PID 888 wrote to memory of 3224 888 msedge.exe 84 PID 888 wrote to memory of 3224 888 msedge.exe 84 PID 888 wrote to memory of 3224 888 msedge.exe 84 PID 888 wrote to memory of 3224 888 msedge.exe 84 PID 888 wrote to memory of 3224 888 msedge.exe 84 PID 888 wrote to memory of 3224 888 msedge.exe 84 PID 888 wrote to memory of 3224 888 msedge.exe 84 PID 888 wrote to memory of 3224 888 msedge.exe 84 PID 888 wrote to memory of 3224 888 msedge.exe 84 PID 888 wrote to memory of 3224 888 msedge.exe 84 PID 888 wrote to memory of 3224 888 msedge.exe 84 PID 888 wrote to memory of 3224 888 msedge.exe 84 PID 888 wrote to memory of 3224 888 msedge.exe 84 PID 888 wrote to memory of 3224 888 msedge.exe 84 PID 888 wrote to memory of 3224 888 msedge.exe 84 PID 888 wrote to memory of 3224 888 msedge.exe 84 PID 888 wrote to memory of 3224 888 msedge.exe 84 PID 888 wrote to memory of 3224 888 msedge.exe 84 PID 888 wrote to memory of 3224 888 msedge.exe 84 PID 888 wrote to memory of 3224 888 msedge.exe 84 PID 888 wrote to memory of 3224 888 msedge.exe 84 PID 888 wrote to memory of 3224 888 msedge.exe 84 PID 888 wrote to memory of 3224 888 msedge.exe 84 PID 888 wrote to memory of 3224 888 msedge.exe 84 PID 888 wrote to memory of 3224 888 msedge.exe 84 PID 888 wrote to memory of 3224 888 msedge.exe 84 PID 888 wrote to memory of 3224 888 msedge.exe 84 PID 888 wrote to memory of 3224 888 msedge.exe 84 PID 888 wrote to memory of 3224 888 msedge.exe 84 PID 888 wrote to memory of 3224 888 msedge.exe 84 PID 888 wrote to memory of 3224 888 msedge.exe 84 PID 888 wrote to memory of 3224 888 msedge.exe 84 PID 888 wrote to memory of 3224 888 msedge.exe 84 PID 888 wrote to memory of 3224 888 msedge.exe 84 PID 888 wrote to memory of 2248 888 msedge.exe 85 PID 888 wrote to memory of 2248 888 msedge.exe 85 PID 888 wrote to memory of 2296 888 msedge.exe 86 PID 888 wrote to memory of 2296 888 msedge.exe 86 PID 888 wrote to memory of 2296 888 msedge.exe 86 PID 888 wrote to memory of 2296 888 msedge.exe 86 PID 888 wrote to memory of 2296 888 msedge.exe 86 PID 888 wrote to memory of 2296 888 msedge.exe 86 PID 888 wrote to memory of 2296 888 msedge.exe 86 PID 888 wrote to memory of 2296 888 msedge.exe 86 PID 888 wrote to memory of 2296 888 msedge.exe 86 PID 888 wrote to memory of 2296 888 msedge.exe 86 PID 888 wrote to memory of 2296 888 msedge.exe 86 PID 888 wrote to memory of 2296 888 msedge.exe 86 PID 888 wrote to memory of 2296 888 msedge.exe 86 PID 888 wrote to memory of 2296 888 msedge.exe 86 PID 888 wrote to memory of 2296 888 msedge.exe 86 PID 888 wrote to memory of 2296 888 msedge.exe 86 PID 888 wrote to memory of 2296 888 msedge.exe 86 PID 888 wrote to memory of 2296 888 msedge.exe 86 PID 888 wrote to memory of 2296 888 msedge.exe 86 PID 888 wrote to memory of 2296 888 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\3fd1d763628f81f7c03229e23aa45e13_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:888 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8f3e046f8,0x7ff8f3e04708,0x7ff8f3e047182⤵PID:1620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,10751290951526921321,13128698248022613469,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵PID:3224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2084,10751290951526921321,13128698248022613469,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2084,10751290951526921321,13128698248022613469,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2852 /prefetch:82⤵PID:2296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,10751290951526921321,13128698248022613469,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:3932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,10751290951526921321,13128698248022613469,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:2768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,10751290951526921321,13128698248022613469,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4200 /prefetch:12⤵PID:1080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,10751290951526921321,13128698248022613469,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4848 /prefetch:12⤵PID:4200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,10751290951526921321,13128698248022613469,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5344 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4940
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1612
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1380
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5dc058ebc0f8181946a312f0be99ed79c
SHA10c6f376ed8f2d4c275336048c7c9ef9edf18bff0
SHA256378701e87dcff90aa092702bc299859d6ae8f7e313f773bf594f81df6f40bf6a
SHA51236e0de64a554762b28045baebf9f71930c59d608f8d05c5faf8906d62eaf83f6d856ef1d1b38110e512fbb1a85d3e2310be11a7f679c6b5b3c62313cc7af52aa
-
Filesize
152B
MD5a0486d6f8406d852dd805b66ff467692
SHA177ba1f63142e86b21c951b808f4bc5d8ed89b571
SHA256c0745fd195f3a51b27e4d35a626378a62935dccebefb94db404166befd68b2be
SHA512065a62032eb799fade5fe75f390e7ab3c9442d74cb8b520d846662d144433f39b9186b3ef3db3480cd1d1d655d8f0630855ed5d6e85cf157a40c38a19375ed8a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize168B
MD5f1275820a8a058a6c7f6a8c515c4131e
SHA1b4f8cf4b94625bbd60ce3955155bd0060568098c
SHA2567f165e62d4edf0cc7d9d8cafcf6fd147b9851bf498a672356c06d14595592f87
SHA5126bfabb77366ceb615ed48483310b7fb07e2719c95166543d67c8d6c8a75ff37299cf24419e357980b4995047b371c9c06e74629b4c0160de95e622f5fc41bf2d
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
409B
MD51abee6b62281c579b340e6b402916ca5
SHA19bd19e597e9154b2aa7ba225194c1c68905b1ee2
SHA25627e6fe26e62e38616c8b3f490277fe42642569c318b4a6441a2cbeed0a9f909c
SHA512c5ff894af48739ed25df37397198bba1791ca043c5d126b6ba6babbc3b40796475b5577c6e352528a33e2ab9f4271f9f90c459884e8b14b7e4a0a25f4b78e541
-
Filesize
6KB
MD5262cfdecc1267e636cbd89a77610a87f
SHA1b5374df2860e54f00b8c5df5d62412325c189055
SHA2565e7031e085158f672efddc9b3107c02479bcb209c720a4505063a53dcc559cc9
SHA51265feb0dfb93763ce7b0b21cf016389cc288dd3429ad5ba42098532a3bbef4b473de29e212844a7b87465b2fb494e69a394c0b093ec8fd33da3971eaf10d0c1b7
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\f9b81183-afa3-4b87-ba97-cc402615ad66.tmp
Filesize6KB
MD53eac93972b8e7fd015eb9ed857c640b9
SHA1b834dd5fd105053159b12141138e970dbd2c80dd
SHA256e138129165ba3f2f583f89badeadd925000247ea25cc975e94ed5d8ac84010a8
SHA512d539cca119cc4b988b104d261562264d71d74af09019516d24351c26223de3aebcf124bcfb6c949f4c56dfb49242454e245a47820f9ae3583c869367f30f2d7f
-
Filesize
10KB
MD5c355b8f2e89bef93292d557b28c7f447
SHA12022c859b6989f37bbd0017a23e25194f0c553cb
SHA25607f7db821ae0b719a06a4cc601354345fe30ef66625b9403b2800a07729460d0
SHA5129a786661abf10a68129bd8631fc49d840f54fc2fd4ac0cac80661d87163ba20a31b4a39692245b0891cb4fab4022b3e1ebf67ab4e92bb2b7e48fc0a877712d23