Analysis
-
max time kernel
145s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13/10/2024, 16:43
Static task
static1
Behavioral task
behavioral1
Sample
40f4a6fb2e681e52d0637ef254f91fa5_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
40f4a6fb2e681e52d0637ef254f91fa5_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
40f4a6fb2e681e52d0637ef254f91fa5_JaffaCakes118.html
-
Size
12KB
-
MD5
40f4a6fb2e681e52d0637ef254f91fa5
-
SHA1
986647555cd59ca435f38f96ae0633cfb7fe32bb
-
SHA256
70f526eb36a4f5417c35127c56892324d52c38ac155a4d6888f03a2303abc02a
-
SHA512
62b6e4dc5cc06a948dd7f3386bb32bbe5522df53819d958bafbf6ab28fbb4e794f58f4a46aa18f4187603eef204e81cdc95828727b86ff30dea86edfd7bfefc1
-
SSDEEP
192:Min7pjC+Cub1+Cmp0lFvAFbZI3vJqhkStOeTKG/q10TvOF7IqMjIduFB/RxqC9Id:Mi7pjpPSehXTyK6OWx/Tjxu
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1016 msedge.exe 1016 msedge.exe 3604 msedge.exe 3604 msedge.exe 4412 identity_helper.exe 4412 identity_helper.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3604 wrote to memory of 436 3604 msedge.exe 83 PID 3604 wrote to memory of 436 3604 msedge.exe 83 PID 3604 wrote to memory of 5068 3604 msedge.exe 84 PID 3604 wrote to memory of 5068 3604 msedge.exe 84 PID 3604 wrote to memory of 5068 3604 msedge.exe 84 PID 3604 wrote to memory of 5068 3604 msedge.exe 84 PID 3604 wrote to memory of 5068 3604 msedge.exe 84 PID 3604 wrote to memory of 5068 3604 msedge.exe 84 PID 3604 wrote to memory of 5068 3604 msedge.exe 84 PID 3604 wrote to memory of 5068 3604 msedge.exe 84 PID 3604 wrote to memory of 5068 3604 msedge.exe 84 PID 3604 wrote to memory of 5068 3604 msedge.exe 84 PID 3604 wrote to memory of 5068 3604 msedge.exe 84 PID 3604 wrote to memory of 5068 3604 msedge.exe 84 PID 3604 wrote to memory of 5068 3604 msedge.exe 84 PID 3604 wrote to memory of 5068 3604 msedge.exe 84 PID 3604 wrote to memory of 5068 3604 msedge.exe 84 PID 3604 wrote to memory of 5068 3604 msedge.exe 84 PID 3604 wrote to memory of 5068 3604 msedge.exe 84 PID 3604 wrote to memory of 5068 3604 msedge.exe 84 PID 3604 wrote to memory of 5068 3604 msedge.exe 84 PID 3604 wrote to memory of 5068 3604 msedge.exe 84 PID 3604 wrote to memory of 5068 3604 msedge.exe 84 PID 3604 wrote to memory of 5068 3604 msedge.exe 84 PID 3604 wrote to memory of 5068 3604 msedge.exe 84 PID 3604 wrote to memory of 5068 3604 msedge.exe 84 PID 3604 wrote to memory of 5068 3604 msedge.exe 84 PID 3604 wrote to memory of 5068 3604 msedge.exe 84 PID 3604 wrote to memory of 5068 3604 msedge.exe 84 PID 3604 wrote to memory of 5068 3604 msedge.exe 84 PID 3604 wrote to memory of 5068 3604 msedge.exe 84 PID 3604 wrote to memory of 5068 3604 msedge.exe 84 PID 3604 wrote to memory of 5068 3604 msedge.exe 84 PID 3604 wrote to memory of 5068 3604 msedge.exe 84 PID 3604 wrote to memory of 5068 3604 msedge.exe 84 PID 3604 wrote to memory of 5068 3604 msedge.exe 84 PID 3604 wrote to memory of 5068 3604 msedge.exe 84 PID 3604 wrote to memory of 5068 3604 msedge.exe 84 PID 3604 wrote to memory of 5068 3604 msedge.exe 84 PID 3604 wrote to memory of 5068 3604 msedge.exe 84 PID 3604 wrote to memory of 5068 3604 msedge.exe 84 PID 3604 wrote to memory of 5068 3604 msedge.exe 84 PID 3604 wrote to memory of 1016 3604 msedge.exe 85 PID 3604 wrote to memory of 1016 3604 msedge.exe 85 PID 3604 wrote to memory of 2924 3604 msedge.exe 86 PID 3604 wrote to memory of 2924 3604 msedge.exe 86 PID 3604 wrote to memory of 2924 3604 msedge.exe 86 PID 3604 wrote to memory of 2924 3604 msedge.exe 86 PID 3604 wrote to memory of 2924 3604 msedge.exe 86 PID 3604 wrote to memory of 2924 3604 msedge.exe 86 PID 3604 wrote to memory of 2924 3604 msedge.exe 86 PID 3604 wrote to memory of 2924 3604 msedge.exe 86 PID 3604 wrote to memory of 2924 3604 msedge.exe 86 PID 3604 wrote to memory of 2924 3604 msedge.exe 86 PID 3604 wrote to memory of 2924 3604 msedge.exe 86 PID 3604 wrote to memory of 2924 3604 msedge.exe 86 PID 3604 wrote to memory of 2924 3604 msedge.exe 86 PID 3604 wrote to memory of 2924 3604 msedge.exe 86 PID 3604 wrote to memory of 2924 3604 msedge.exe 86 PID 3604 wrote to memory of 2924 3604 msedge.exe 86 PID 3604 wrote to memory of 2924 3604 msedge.exe 86 PID 3604 wrote to memory of 2924 3604 msedge.exe 86 PID 3604 wrote to memory of 2924 3604 msedge.exe 86 PID 3604 wrote to memory of 2924 3604 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\40f4a6fb2e681e52d0637ef254f91fa5_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3604 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0x8,0x108,0x7ffd8dfe46f8,0x7ffd8dfe4708,0x7ffd8dfe47182⤵PID:436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2172,10423065832917947576,15648640654152019517,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2196 /prefetch:22⤵PID:5068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2172,10423065832917947576,15648640654152019517,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2276 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2172,10423065832917947576,15648640654152019517,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2796 /prefetch:82⤵PID:2924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,10423065832917947576,15648640654152019517,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3156 /prefetch:12⤵PID:3680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,10423065832917947576,15648640654152019517,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3168 /prefetch:12⤵PID:2152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,10423065832917947576,15648640654152019517,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4628 /prefetch:12⤵PID:1224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,10423065832917947576,15648640654152019517,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4872 /prefetch:12⤵PID:2900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,10423065832917947576,15648640654152019517,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5600 /prefetch:12⤵PID:2740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,10423065832917947576,15648640654152019517,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6224 /prefetch:12⤵PID:4820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,10423065832917947576,15648640654152019517,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6248 /prefetch:12⤵PID:4252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2172,10423065832917947576,15648640654152019517,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6572 /prefetch:82⤵PID:2620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2172,10423065832917947576,15648640654152019517,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6572 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,10423065832917947576,15648640654152019517,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6584 /prefetch:12⤵PID:3196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,10423065832917947576,15648640654152019517,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5692 /prefetch:12⤵PID:1752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2172,10423065832917947576,15648640654152019517,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4856
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4088
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1412
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD564d59111bf1598b9b8d4a246b9b33a77
SHA1d6cbb97cec6c088b59a7af770250a1faf6a40d45
SHA2566c450ccf617a0797fd5a2da1e9ffccc60e58b462c5f6523f1eed37742a57c773
SHA512290c3f3d622a1a667da6b6f490f42f0aff9695e218c3b987fc48000ce2e6c056b2f81bbe97bb377af2dbedb10ec9b67c55862d036cdf581de3407051a08aba26
-
Filesize
152B
MD5e55832d7cd7e868a2c087c4c73678018
SHA1ed7a2f6d6437e907218ffba9128802eaf414a0eb
SHA256a4d7777b980ec53de3a70aca8fb25b77e9b53187e7d2f0fa1a729ee9a35da574
SHA512897fdebf1a9269a1bf1e3a791f6ee9ab7c24c9d75eeff65ac9599764e1c8585784e1837ba5321d90af0b004af121b2206081a6fb1b1ad571a0051ee33d3f5c5f
-
Filesize
152B
MD5c2d9eeb3fdd75834f0ac3f9767de8d6f
SHA14d16a7e82190f8490a00008bd53d85fb92e379b0
SHA2561e5efb5f1d78a4cc269cb116307e9d767fc5ad8a18e6cf95c81c61d7b1da5c66
SHA512d92f995f9e096ecc0a7b8b4aca336aeef0e7b919fe7fe008169f0b87da84d018971ba5728141557d42a0fc562a25191bd85e0d7354c401b09e8b62cdc44b6dcd
-
Filesize
215KB
MD51585c4c0ffdb55b2a4fdc0b0f5c317be
SHA1aac0e0f12332063c75c690458b2cfe5acb800d0a
SHA25618a1cfc3b339903a71e6a68791cde83fca626a4c1a22be5cb7755c9f2343e2a5
SHA5127021ed87f0c97edc3a8ff838202fa444841eafcbfa4e00e722b723393a1ac679279aa744e8edde237a05be6060527a0c7e64a36148bd2d1316d5589d78d08e23
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize504B
MD5981005c7086623a6eb7cc1f11b2c1a8c
SHA1501d7e15883e814e180263794d13343d161b758e
SHA2561763f1d8df0012de262ec9a1728c6ddfaccbffc4be9bd5634d547f2e0f0321af
SHA512f726532f33eaec833b12df28f7c5ffaec9f00c96a4468b5d347f16f6067668824a3fda0741d636e1afef903b8c16f03aa16285d848a41b1d97c6b0486942910d
-
Filesize
1KB
MD5b47b55848960d647775426470bdccf2c
SHA1df6bd8de1e55b9b6907d6d35b4d5cd8936ccbcd6
SHA2564082e5e35b0770713a6f323f71d169b14f6d8383e0ccd86c51b7bee9de2d4792
SHA51220789f035559b8501e2108a5a2b13b8adacd8c08535e3344146eff707147fa7e8452d5d6e9048d9fef262568b698e1adaf5993410b8a7ba444cb943d62ee794d
-
Filesize
6KB
MD59a2d17779bb1d27a6aee491f667ae619
SHA116602bd8efa38e8ee4660e7146cdb96dcccb897c
SHA2564a2baa16e8cb109fd0db3de4c2ef3f2bcffe337c15197b5c85dae4e50b375b7a
SHA5120f5e3001bcb02a38260dedd5d3ebed82bcd55d0ac052b0f65dad01fb9a45c63d12e781c4a7a7c7e921f84b8a9a3d22476384582a00e8fed768f7e760d627a97e
-
Filesize
6KB
MD5211e795c88b4873f3c35253b89e4fd46
SHA1e3e25e7e9a21068a8d0e98b6ee71d00f89ec06d6
SHA2566a257d033cf9888decef7209c8276db0ab3570207f7358de96db82d6111c3e7c
SHA512134b24c615a6611b7adbb1db0cbe6afd46d61d56fd793f0cc6e85bb554cc16239f27cf6bf0c9e7c0f241c7a1f6153085e4f0ebe06714a024111ff649fcb17e24
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389