Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13-10-2024 13:05
Static task
static1
Behavioral task
behavioral1
Sample
400380c435475c4c9f8eb569f755ebfd_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
400380c435475c4c9f8eb569f755ebfd_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
400380c435475c4c9f8eb569f755ebfd_JaffaCakes118.html
-
Size
57KB
-
MD5
400380c435475c4c9f8eb569f755ebfd
-
SHA1
9eac15dd0f504383ca40d48b4c690c16fc7800b3
-
SHA256
b776c28c88efa32ea49b27811b8827212052dc124f47adf8ac4f0629e10c04bf
-
SHA512
5d7d1aad0f9018e9375d590f4a0e60c831c2a6d88ca389701afc80d908667c9d46374b07e2e071a8b8ef5f3e1728a2a4f425237f711c38f5244aa2437c145b99
-
SSDEEP
1536:ijEQvK8OPHdsA1o2vgyHJv0owbd6zKD6CDK2RVroPjwpDK2RVy:ijnOPHdsR2vgyHJutDK2RVroPjwpDK2m
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2084 msedge.exe 2084 msedge.exe 1928 msedge.exe 1928 msedge.exe 1480 identity_helper.exe 1480 identity_helper.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe 4848 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1928 wrote to memory of 376 1928 msedge.exe 83 PID 1928 wrote to memory of 376 1928 msedge.exe 83 PID 1928 wrote to memory of 5072 1928 msedge.exe 84 PID 1928 wrote to memory of 5072 1928 msedge.exe 84 PID 1928 wrote to memory of 5072 1928 msedge.exe 84 PID 1928 wrote to memory of 5072 1928 msedge.exe 84 PID 1928 wrote to memory of 5072 1928 msedge.exe 84 PID 1928 wrote to memory of 5072 1928 msedge.exe 84 PID 1928 wrote to memory of 5072 1928 msedge.exe 84 PID 1928 wrote to memory of 5072 1928 msedge.exe 84 PID 1928 wrote to memory of 5072 1928 msedge.exe 84 PID 1928 wrote to memory of 5072 1928 msedge.exe 84 PID 1928 wrote to memory of 5072 1928 msedge.exe 84 PID 1928 wrote to memory of 5072 1928 msedge.exe 84 PID 1928 wrote to memory of 5072 1928 msedge.exe 84 PID 1928 wrote to memory of 5072 1928 msedge.exe 84 PID 1928 wrote to memory of 5072 1928 msedge.exe 84 PID 1928 wrote to memory of 5072 1928 msedge.exe 84 PID 1928 wrote to memory of 5072 1928 msedge.exe 84 PID 1928 wrote to memory of 5072 1928 msedge.exe 84 PID 1928 wrote to memory of 5072 1928 msedge.exe 84 PID 1928 wrote to memory of 5072 1928 msedge.exe 84 PID 1928 wrote to memory of 5072 1928 msedge.exe 84 PID 1928 wrote to memory of 5072 1928 msedge.exe 84 PID 1928 wrote to memory of 5072 1928 msedge.exe 84 PID 1928 wrote to memory of 5072 1928 msedge.exe 84 PID 1928 wrote to memory of 5072 1928 msedge.exe 84 PID 1928 wrote to memory of 5072 1928 msedge.exe 84 PID 1928 wrote to memory of 5072 1928 msedge.exe 84 PID 1928 wrote to memory of 5072 1928 msedge.exe 84 PID 1928 wrote to memory of 5072 1928 msedge.exe 84 PID 1928 wrote to memory of 5072 1928 msedge.exe 84 PID 1928 wrote to memory of 5072 1928 msedge.exe 84 PID 1928 wrote to memory of 5072 1928 msedge.exe 84 PID 1928 wrote to memory of 5072 1928 msedge.exe 84 PID 1928 wrote to memory of 5072 1928 msedge.exe 84 PID 1928 wrote to memory of 5072 1928 msedge.exe 84 PID 1928 wrote to memory of 5072 1928 msedge.exe 84 PID 1928 wrote to memory of 5072 1928 msedge.exe 84 PID 1928 wrote to memory of 5072 1928 msedge.exe 84 PID 1928 wrote to memory of 5072 1928 msedge.exe 84 PID 1928 wrote to memory of 5072 1928 msedge.exe 84 PID 1928 wrote to memory of 2084 1928 msedge.exe 85 PID 1928 wrote to memory of 2084 1928 msedge.exe 85 PID 1928 wrote to memory of 2784 1928 msedge.exe 86 PID 1928 wrote to memory of 2784 1928 msedge.exe 86 PID 1928 wrote to memory of 2784 1928 msedge.exe 86 PID 1928 wrote to memory of 2784 1928 msedge.exe 86 PID 1928 wrote to memory of 2784 1928 msedge.exe 86 PID 1928 wrote to memory of 2784 1928 msedge.exe 86 PID 1928 wrote to memory of 2784 1928 msedge.exe 86 PID 1928 wrote to memory of 2784 1928 msedge.exe 86 PID 1928 wrote to memory of 2784 1928 msedge.exe 86 PID 1928 wrote to memory of 2784 1928 msedge.exe 86 PID 1928 wrote to memory of 2784 1928 msedge.exe 86 PID 1928 wrote to memory of 2784 1928 msedge.exe 86 PID 1928 wrote to memory of 2784 1928 msedge.exe 86 PID 1928 wrote to memory of 2784 1928 msedge.exe 86 PID 1928 wrote to memory of 2784 1928 msedge.exe 86 PID 1928 wrote to memory of 2784 1928 msedge.exe 86 PID 1928 wrote to memory of 2784 1928 msedge.exe 86 PID 1928 wrote to memory of 2784 1928 msedge.exe 86 PID 1928 wrote to memory of 2784 1928 msedge.exe 86 PID 1928 wrote to memory of 2784 1928 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\400380c435475c4c9f8eb569f755ebfd_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff84c8a46f8,0x7ff84c8a4708,0x7ff84c8a47182⤵PID:376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,17158135373233652278,14458643031791350081,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:22⤵PID:5072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2132,17158135373233652278,14458643031791350081,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2196 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2132,17158135373233652278,14458643031791350081,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2880 /prefetch:82⤵PID:2784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,17158135373233652278,14458643031791350081,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:3060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,17158135373233652278,14458643031791350081,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:2588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,17158135373233652278,14458643031791350081,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4764 /prefetch:12⤵PID:804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,17158135373233652278,14458643031791350081,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4988 /prefetch:12⤵PID:3812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,17158135373233652278,14458643031791350081,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5552 /prefetch:12⤵PID:4324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,17158135373233652278,14458643031791350081,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4220 /prefetch:12⤵PID:2488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,17158135373233652278,14458643031791350081,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6148 /prefetch:82⤵PID:1080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,17158135373233652278,14458643031791350081,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6148 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,17158135373233652278,14458643031791350081,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6060 /prefetch:12⤵PID:1148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,17158135373233652278,14458643031791350081,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6032 /prefetch:12⤵PID:4252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,17158135373233652278,14458643031791350081,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4088 /prefetch:12⤵PID:1184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,17158135373233652278,14458643031791350081,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3460 /prefetch:12⤵PID:3472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,17158135373233652278,14458643031791350081,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2008 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4848
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2308
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4132
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556a4f78e21616a6e19da57228569489b
SHA121bfabbfc294d5f2aa1da825c5590d760483bc76
SHA256d036661e765ee8fd18978a2b5501e8df6b220e4bca531d9860407555294c96fb
SHA512c2c3cd1152bb486028fe75ab3ce0d0bc9d64c4ca7eb8860ddd934b2f6e0140d2c913af4fa082b88e92a6a6d20fd483a1cb9813209f371a0f56374bc97d7f863b
-
Filesize
152B
MD5e443ee4336fcf13c698b8ab5f3c173d0
SHA19bf70b16f03820cbe3158e1f1396b07b8ac9d75a
SHA25679e277da2074f9467e0518f0f26ca2ba74914bee82553f935a0ccf64a0119e8b
SHA512cbf6f6aa0ea69b47f51592296da2b7be1180e7b483c61b4d17ba9ee1a2d3345cbe0987b96f4e25de1438b553db358f330aad8a26e8522601f055c3d5a8313cdd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize792B
MD5f550a5a05f3a176c3605ca6d49ca326e
SHA1a8b56e0d673924dbad1aab02829c158f41e8b7a8
SHA2568e2769e3e1027f8a123a8128141ae7db5f329b144fac5b3996785ec9b1e51c64
SHA512b79ed92131a5865461a74ca756044d7a55da9eaea235b882fdea4d6b9dc4398dce654a4dd1170afa99eb61b1bb9c8f9fc625b60c79c95738f4d36767fc741fd2
-
Filesize
1KB
MD566dd1a3bcc3c310337c5dcf9d6d54544
SHA1e12279a6527c174f8d2ad69399e26a707ee225bc
SHA2561bd70fbecb827b36a9b35fba9b89137360034790e7d6f1b9ea7f731ca75ebcaf
SHA5123e7364745c43753e70fe0d8bd15bf45dc071cca2f80e905723674d8d217912e016c7e15921a778600e44e8af60cfb7fc6ebf09b10fbaaa72f5ba5251b5c7c4ac
-
Filesize
6KB
MD56e06fc56c961310d2f0a085b17a95ac1
SHA150626ea1a26cd4875947bf7a19fe98d18834595b
SHA256fe444e61309785eb98076e4377570d4e192ab230791b0649d9072e9830bf99b2
SHA512ebbcb0d76b6d2b6e0daf449e714de356348baa17627369ab00699a349e8b333bd004ae5e4c76f8ff48e4cd94acc5891ba9264f63056904aa871de3a3febb0861
-
Filesize
6KB
MD5bb30201e6792c6cc25fae6a42d08fdb8
SHA14f4b1ee436733584a0e18f90360c199d850364ef
SHA2561464cfd656d7fb9e3597961340e14c9b08e4914e555775aa657de599a8d7a0d4
SHA512d35c55fcd72a0bd9346d8f686d9f685d7921bc8d2a8b4fb28714997993aee8c954cafe3c8000c51abe6034c21c5722d53b73bbac26bccd72ee6f49c767250fe3
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD52a4bc9ffc918b14ffbe18cec875ab287
SHA198a371e84c2c0750a48589b8284727dd8117c941
SHA2560d9553033e49933ddd4a4cde79c785be4e717c90075b20c00b8f34ff469c73e6
SHA5127f7dba7d0434e4d3e138deb762fe1e24ca9d41a02974d0a8bb8121f39c39668e216dfdf0b7b94253dbe65e175a2afe034551fe5de8b19e5a69e4ecbcd637d617
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e