Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13-10-2024 17:23
Static task
static1
Behavioral task
behavioral1
Sample
4122828c6646899a0982819b1f78fed4_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4122828c6646899a0982819b1f78fed4_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
4122828c6646899a0982819b1f78fed4_JaffaCakes118.html
-
Size
28KB
-
MD5
4122828c6646899a0982819b1f78fed4
-
SHA1
9b1fd9fff667969dca9e5b51709d4b8114a574d5
-
SHA256
ae2c4d285ecf3a4c80316d50763b6f56e5d2e18e4c039ba759dfc46dca34bbf4
-
SHA512
07665477a53490dba5abeedd01b17f1eb31a94330538afbec7df982f12cec875bfdef88b45b53ba6330608049bd34f927b41fb070292f36cc04f2bc3134c5682
-
SSDEEP
384:SIeGZgarqFQFLjD6XetyePei6ve3e+1goKRPInWQ3A61EAc5S3IY6ibulJhFSWOY:SlGarQBZ44pYJ332Ye4q/4WOfT
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2460 msedge.exe 2460 msedge.exe 4220 msedge.exe 4220 msedge.exe 3688 identity_helper.exe 3688 identity_helper.exe 772 msedge.exe 772 msedge.exe 772 msedge.exe 772 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe 4220 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4220 wrote to memory of 3844 4220 msedge.exe 83 PID 4220 wrote to memory of 3844 4220 msedge.exe 83 PID 4220 wrote to memory of 1288 4220 msedge.exe 85 PID 4220 wrote to memory of 1288 4220 msedge.exe 85 PID 4220 wrote to memory of 1288 4220 msedge.exe 85 PID 4220 wrote to memory of 1288 4220 msedge.exe 85 PID 4220 wrote to memory of 1288 4220 msedge.exe 85 PID 4220 wrote to memory of 1288 4220 msedge.exe 85 PID 4220 wrote to memory of 1288 4220 msedge.exe 85 PID 4220 wrote to memory of 1288 4220 msedge.exe 85 PID 4220 wrote to memory of 1288 4220 msedge.exe 85 PID 4220 wrote to memory of 1288 4220 msedge.exe 85 PID 4220 wrote to memory of 1288 4220 msedge.exe 85 PID 4220 wrote to memory of 1288 4220 msedge.exe 85 PID 4220 wrote to memory of 1288 4220 msedge.exe 85 PID 4220 wrote to memory of 1288 4220 msedge.exe 85 PID 4220 wrote to memory of 1288 4220 msedge.exe 85 PID 4220 wrote to memory of 1288 4220 msedge.exe 85 PID 4220 wrote to memory of 1288 4220 msedge.exe 85 PID 4220 wrote to memory of 1288 4220 msedge.exe 85 PID 4220 wrote to memory of 1288 4220 msedge.exe 85 PID 4220 wrote to memory of 1288 4220 msedge.exe 85 PID 4220 wrote to memory of 1288 4220 msedge.exe 85 PID 4220 wrote to memory of 1288 4220 msedge.exe 85 PID 4220 wrote to memory of 1288 4220 msedge.exe 85 PID 4220 wrote to memory of 1288 4220 msedge.exe 85 PID 4220 wrote to memory of 1288 4220 msedge.exe 85 PID 4220 wrote to memory of 1288 4220 msedge.exe 85 PID 4220 wrote to memory of 1288 4220 msedge.exe 85 PID 4220 wrote to memory of 1288 4220 msedge.exe 85 PID 4220 wrote to memory of 1288 4220 msedge.exe 85 PID 4220 wrote to memory of 1288 4220 msedge.exe 85 PID 4220 wrote to memory of 1288 4220 msedge.exe 85 PID 4220 wrote to memory of 1288 4220 msedge.exe 85 PID 4220 wrote to memory of 1288 4220 msedge.exe 85 PID 4220 wrote to memory of 1288 4220 msedge.exe 85 PID 4220 wrote to memory of 1288 4220 msedge.exe 85 PID 4220 wrote to memory of 1288 4220 msedge.exe 85 PID 4220 wrote to memory of 1288 4220 msedge.exe 85 PID 4220 wrote to memory of 1288 4220 msedge.exe 85 PID 4220 wrote to memory of 1288 4220 msedge.exe 85 PID 4220 wrote to memory of 1288 4220 msedge.exe 85 PID 4220 wrote to memory of 2460 4220 msedge.exe 86 PID 4220 wrote to memory of 2460 4220 msedge.exe 86 PID 4220 wrote to memory of 840 4220 msedge.exe 87 PID 4220 wrote to memory of 840 4220 msedge.exe 87 PID 4220 wrote to memory of 840 4220 msedge.exe 87 PID 4220 wrote to memory of 840 4220 msedge.exe 87 PID 4220 wrote to memory of 840 4220 msedge.exe 87 PID 4220 wrote to memory of 840 4220 msedge.exe 87 PID 4220 wrote to memory of 840 4220 msedge.exe 87 PID 4220 wrote to memory of 840 4220 msedge.exe 87 PID 4220 wrote to memory of 840 4220 msedge.exe 87 PID 4220 wrote to memory of 840 4220 msedge.exe 87 PID 4220 wrote to memory of 840 4220 msedge.exe 87 PID 4220 wrote to memory of 840 4220 msedge.exe 87 PID 4220 wrote to memory of 840 4220 msedge.exe 87 PID 4220 wrote to memory of 840 4220 msedge.exe 87 PID 4220 wrote to memory of 840 4220 msedge.exe 87 PID 4220 wrote to memory of 840 4220 msedge.exe 87 PID 4220 wrote to memory of 840 4220 msedge.exe 87 PID 4220 wrote to memory of 840 4220 msedge.exe 87 PID 4220 wrote to memory of 840 4220 msedge.exe 87 PID 4220 wrote to memory of 840 4220 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\4122828c6646899a0982819b1f78fed4_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4220 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb50fb46f8,0x7ffb50fb4708,0x7ffb50fb47182⤵PID:3844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,12450670092890393128,7038165839303665922,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2184 /prefetch:22⤵PID:1288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2140,12450670092890393128,7038165839303665922,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2276 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2140,12450670092890393128,7038165839303665922,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2836 /prefetch:82⤵PID:840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,12450670092890393128,7038165839303665922,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:4280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,12450670092890393128,7038165839303665922,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:2924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,12450670092890393128,7038165839303665922,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5264 /prefetch:12⤵PID:2696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,12450670092890393128,7038165839303665922,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5512 /prefetch:12⤵PID:3220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,12450670092890393128,7038165839303665922,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5712 /prefetch:12⤵PID:1968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,12450670092890393128,7038165839303665922,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6104 /prefetch:82⤵PID:5068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,12450670092890393128,7038165839303665922,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6104 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,12450670092890393128,7038165839303665922,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5040 /prefetch:12⤵PID:2020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,12450670092890393128,7038165839303665922,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5048 /prefetch:12⤵PID:2396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,12450670092890393128,7038165839303665922,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4916 /prefetch:12⤵PID:4152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,12450670092890393128,7038165839303665922,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6272 /prefetch:12⤵PID:1284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,12450670092890393128,7038165839303665922,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6236 /prefetch:12⤵PID:1568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,12450670092890393128,7038165839303665922,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1948 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:772
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2804
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4608
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5bffcefacce25cd03f3d5c9446ddb903d
SHA18923f84aa86db316d2f5c122fe3874bbe26f3bab
SHA25623e7cbbf64c81122c3cb30a0933c10a320e254447771737a326ce37a0694d405
SHA512761dae5315b35ec0b2fe68019881397f5d2eadba3963aba79a89f8953a0cd705012d7faf3a204a5f36008926b9f614980e333351596b06ce7058d744345ce2e7
-
Filesize
152B
MD5d22073dea53e79d9b824f27ac5e9813e
SHA16d8a7281241248431a1571e6ddc55798b01fa961
SHA25686713962c3bb287964678b148ee08ea83fb83483dff8be91c8a6085ca560b2a6
SHA51297152091ee24b6e713b8ec8123cb62511f8a7e8a6c6c3f2f6727d0a60497be28814613b476009b853575d4931e5df950e28a41afbf6707cb672206f1219c4413
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize168B
MD5a419e1ff09977f56cd4cba667df5a61d
SHA1a5e13c4cd02b75d0d3ef58c6c89cd6511e6f5873
SHA256f3b908ff2f1c9cd4a57ea58327331eb981c8b2f552379b370e5c14344081cdc2
SHA512bc5aa5f1c24ea4ff610e6f9edd47be5ae7f06c0dbac2d8848fa6f55c1d444743509fd44745c8a3c3a1b4e315d677546173fbc64cb26b5bedba856216e7616cad
-
Filesize
1KB
MD5278201a9f172f00fcc8b5e2723ee7b58
SHA1ca0406cd692c9c1064ac39bc9d7140b9f29bfb10
SHA256a6047de6efaed07841962d71c4f52aaaa92e38608691014f51823cf926e3882d
SHA51275325f3301c11f27676752a7f4bd004b875b0b38c71d44eb3aabae97c5cffd9d0d757dd6acac79495cff94de492df286129661c07b0fef6fe132e68bb1cb2974
-
Filesize
6KB
MD596e39185e2ee129bc39155a1016f6064
SHA172dbaba4658d0d812743b309cc423b4f6bc9bfcd
SHA256de1f07ef182932f908af4867882e5bb3268f9fd798b54e403252cd231aa76248
SHA5123de0a06796877b696d734defe73e3576d78184ff4cda2d9e5d2b9ae619737e2c8a412a4524868bb298da4650ea66e8173af7652b29c6b1bd4aadd5c51100191a
-
Filesize
6KB
MD578d7e085263dbec7e0271f14b8228b33
SHA189dde4944fbb70b8aa59576f9663a445d296bab7
SHA256c12bcf94a904b6b1d50cf3e0af563d09ed36980ccba1a8248493e67cc91c59bb
SHA512316c0de30112a3328eb83bec9417184d2e1f48609942df411a5db42828d5f8a45269c7fcc1a483ea46d7abd24f7603ac81b7857486878d75c7d99502dc329e19
-
Filesize
6KB
MD50ade96f280f04949186ac78fd3bf6b97
SHA1719a597df63169e1d31497c02258b59ad5be1569
SHA25671dcba49bc8e768c7d072b156c5580e50a91a71ff87cfc26f75c844e86747240
SHA512d7cacc86163c03553616b049e47247f9b6aacdb2149ba098e494cad22ac46d07c5bfb357ea04336510c366af057098e2ca637bb9eb033c0ddbe309dd5f8900a3
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD55baa53fe54c95df17dd4104dfd020376
SHA178b5f4a7207a6a8d65a39037ce2246af7218a7e9
SHA25668e404a113701a8a7e46dc7f35229e955f13d04ebd64c2a0d706187854635762
SHA5120d7fa1201bc67b49837ee9c3e3fd5086cd6505c6d0b2e17235900284e20b398882ff8098d838e40277d7369f587781612ecc952a817bb7d9d9be1ff6ac67eb76