Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14-10-2024 21:53
Static task
static1
Behavioral task
behavioral1
Sample
445d6275626fe67f15ae13aebcabbc48_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
445d6275626fe67f15ae13aebcabbc48_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
445d6275626fe67f15ae13aebcabbc48_JaffaCakes118.html
-
Size
57KB
-
MD5
445d6275626fe67f15ae13aebcabbc48
-
SHA1
2092ea51e96fc6318cf506a7be3e2600e2af7726
-
SHA256
791c2936aac914ef1836549d96453bea802a7dfe6e41a4a98d2011d2108ff5ca
-
SHA512
16f972516d74f3df4570e1f1304c359dd11951ab98d25d22b3b53de4545c64bedcf3ea4977557848762a266e3a9ffa472167e24929aa8a0fd88fb901df1eae36
-
SSDEEP
1536:ijEQvK8OPHdsA1o2vgyHJv0owbd6zKD6CDK2RVrorGwpDK2RVy:ijnOPHdsR2vgyHJutDK2RVrorGwpDK2m
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4028 msedge.exe 4028 msedge.exe 2332 msedge.exe 2332 msedge.exe 3088 identity_helper.exe 3088 identity_helper.exe 5388 msedge.exe 5388 msedge.exe 5388 msedge.exe 5388 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe 2332 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2332 wrote to memory of 1108 2332 msedge.exe 84 PID 2332 wrote to memory of 1108 2332 msedge.exe 84 PID 2332 wrote to memory of 3284 2332 msedge.exe 85 PID 2332 wrote to memory of 3284 2332 msedge.exe 85 PID 2332 wrote to memory of 3284 2332 msedge.exe 85 PID 2332 wrote to memory of 3284 2332 msedge.exe 85 PID 2332 wrote to memory of 3284 2332 msedge.exe 85 PID 2332 wrote to memory of 3284 2332 msedge.exe 85 PID 2332 wrote to memory of 3284 2332 msedge.exe 85 PID 2332 wrote to memory of 3284 2332 msedge.exe 85 PID 2332 wrote to memory of 3284 2332 msedge.exe 85 PID 2332 wrote to memory of 3284 2332 msedge.exe 85 PID 2332 wrote to memory of 3284 2332 msedge.exe 85 PID 2332 wrote to memory of 3284 2332 msedge.exe 85 PID 2332 wrote to memory of 3284 2332 msedge.exe 85 PID 2332 wrote to memory of 3284 2332 msedge.exe 85 PID 2332 wrote to memory of 3284 2332 msedge.exe 85 PID 2332 wrote to memory of 3284 2332 msedge.exe 85 PID 2332 wrote to memory of 3284 2332 msedge.exe 85 PID 2332 wrote to memory of 3284 2332 msedge.exe 85 PID 2332 wrote to memory of 3284 2332 msedge.exe 85 PID 2332 wrote to memory of 3284 2332 msedge.exe 85 PID 2332 wrote to memory of 3284 2332 msedge.exe 85 PID 2332 wrote to memory of 3284 2332 msedge.exe 85 PID 2332 wrote to memory of 3284 2332 msedge.exe 85 PID 2332 wrote to memory of 3284 2332 msedge.exe 85 PID 2332 wrote to memory of 3284 2332 msedge.exe 85 PID 2332 wrote to memory of 3284 2332 msedge.exe 85 PID 2332 wrote to memory of 3284 2332 msedge.exe 85 PID 2332 wrote to memory of 3284 2332 msedge.exe 85 PID 2332 wrote to memory of 3284 2332 msedge.exe 85 PID 2332 wrote to memory of 3284 2332 msedge.exe 85 PID 2332 wrote to memory of 3284 2332 msedge.exe 85 PID 2332 wrote to memory of 3284 2332 msedge.exe 85 PID 2332 wrote to memory of 3284 2332 msedge.exe 85 PID 2332 wrote to memory of 3284 2332 msedge.exe 85 PID 2332 wrote to memory of 3284 2332 msedge.exe 85 PID 2332 wrote to memory of 3284 2332 msedge.exe 85 PID 2332 wrote to memory of 3284 2332 msedge.exe 85 PID 2332 wrote to memory of 3284 2332 msedge.exe 85 PID 2332 wrote to memory of 3284 2332 msedge.exe 85 PID 2332 wrote to memory of 3284 2332 msedge.exe 85 PID 2332 wrote to memory of 4028 2332 msedge.exe 86 PID 2332 wrote to memory of 4028 2332 msedge.exe 86 PID 2332 wrote to memory of 4104 2332 msedge.exe 87 PID 2332 wrote to memory of 4104 2332 msedge.exe 87 PID 2332 wrote to memory of 4104 2332 msedge.exe 87 PID 2332 wrote to memory of 4104 2332 msedge.exe 87 PID 2332 wrote to memory of 4104 2332 msedge.exe 87 PID 2332 wrote to memory of 4104 2332 msedge.exe 87 PID 2332 wrote to memory of 4104 2332 msedge.exe 87 PID 2332 wrote to memory of 4104 2332 msedge.exe 87 PID 2332 wrote to memory of 4104 2332 msedge.exe 87 PID 2332 wrote to memory of 4104 2332 msedge.exe 87 PID 2332 wrote to memory of 4104 2332 msedge.exe 87 PID 2332 wrote to memory of 4104 2332 msedge.exe 87 PID 2332 wrote to memory of 4104 2332 msedge.exe 87 PID 2332 wrote to memory of 4104 2332 msedge.exe 87 PID 2332 wrote to memory of 4104 2332 msedge.exe 87 PID 2332 wrote to memory of 4104 2332 msedge.exe 87 PID 2332 wrote to memory of 4104 2332 msedge.exe 87 PID 2332 wrote to memory of 4104 2332 msedge.exe 87 PID 2332 wrote to memory of 4104 2332 msedge.exe 87 PID 2332 wrote to memory of 4104 2332 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\445d6275626fe67f15ae13aebcabbc48_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbd1d246f8,0x7ffbd1d24708,0x7ffbd1d247182⤵PID:1108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2228,3649573672099641479,11511765593951152082,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 /prefetch:22⤵PID:3284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2228,3649573672099641479,11511765593951152082,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2328 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2228,3649573672099641479,11511765593951152082,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2808 /prefetch:82⤵PID:4104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,3649573672099641479,11511765593951152082,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3136 /prefetch:12⤵PID:4000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,3649573672099641479,11511765593951152082,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3144 /prefetch:12⤵PID:532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,3649573672099641479,11511765593951152082,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4688 /prefetch:12⤵PID:1128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,3649573672099641479,11511765593951152082,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5208 /prefetch:12⤵PID:1256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,3649573672099641479,11511765593951152082,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4828 /prefetch:12⤵PID:3968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,3649573672099641479,11511765593951152082,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5476 /prefetch:12⤵PID:1544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,3649573672099641479,11511765593951152082,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5788 /prefetch:12⤵PID:2304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,3649573672099641479,11511765593951152082,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5772 /prefetch:12⤵PID:4192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2228,3649573672099641479,11511765593951152082,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6036 /prefetch:82⤵PID:3632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2228,3649573672099641479,11511765593951152082,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6036 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,3649573672099641479,11511765593951152082,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:3612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,3649573672099641479,11511765593951152082,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4952 /prefetch:12⤵PID:4520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2228,3649573672099641479,11511765593951152082,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4184 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5388
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2236
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1292
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e55832d7cd7e868a2c087c4c73678018
SHA1ed7a2f6d6437e907218ffba9128802eaf414a0eb
SHA256a4d7777b980ec53de3a70aca8fb25b77e9b53187e7d2f0fa1a729ee9a35da574
SHA512897fdebf1a9269a1bf1e3a791f6ee9ab7c24c9d75eeff65ac9599764e1c8585784e1837ba5321d90af0b004af121b2206081a6fb1b1ad571a0051ee33d3f5c5f
-
Filesize
152B
MD5c2d9eeb3fdd75834f0ac3f9767de8d6f
SHA14d16a7e82190f8490a00008bd53d85fb92e379b0
SHA2561e5efb5f1d78a4cc269cb116307e9d767fc5ad8a18e6cf95c81c61d7b1da5c66
SHA512d92f995f9e096ecc0a7b8b4aca336aeef0e7b919fe7fe008169f0b87da84d018971ba5728141557d42a0fc562a25191bd85e0d7354c401b09e8b62cdc44b6dcd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize792B
MD5d895ed00d43942ede33c95bc0a623b1a
SHA13cfbb60231d6c9267981578699658726903b7679
SHA256d24596fe790421ea5b0d0fd17e6b170b1d280ff762116364f6c324bd2d421469
SHA512a74bb66b21a46438d11893400723eedbb595f1f259954e47d9643d2ac7b17628d19ef80140927e3501b816e9f230c64dd30d1abed6b7f521790d17defbd10ff8
-
Filesize
1KB
MD5dc35ee4462c698c98fa415d500634731
SHA15e2f0c2695395ea9c8ef757bc2f18e39182e6198
SHA256c1401df17d9494dbcc8ca0051346ca6cc45c2673b46c90e9379e09947b581bed
SHA512a753efb11ecbf43cc3489b5687a720f084d9c2535376fb2e6df491399caa14a406d03c60cfde3fcdd2538a0ec2cac62241423f51f886b19715b68ec4f30b937f
-
Filesize
6KB
MD5de58b5d2732bb8a9978824462f7891c7
SHA1a7537e11aa621daf2ab995c694cd0fd8684ca0f0
SHA256732d156ad6d7b3e90c4bf3fa7c64ddbd660504ab77733ae6a67e1ede8f7c9349
SHA51241bb09c64c236e0a3ca50ad048af65a65313b9bd6b4443986f292badbfc118af8b823907964b92617d77fce4af3f9dd2c78c0d8dfa0823ecbb3a3c887ec6e292
-
Filesize
6KB
MD5d229c218449c74017d3e6c33d8d8ca46
SHA1a3f1e0aecf81fe47f4deb405f878e860b1205258
SHA256609d17eaca20e17c5d2ef6cd0efc6c8320fb25d4a5650da232e15b90236c8055
SHA512b69a3cbed8b88bc5af3193044da2051e7ae19167d8b1d5e0187a0bbd8ba7d1721bb10cc03f4cd5b6360b56040565e880b681b1876d3f04840fc85eeec5efe09e
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD585387f42079fa571ddb1fc455f3558e6
SHA1eba0740d269f51f3898686a95f470f50bf94f516
SHA256454bbfaa9227836964076c33efde29fa3ea68bb47d1dfb2648eb5206796d898b
SHA512d288d7f285a8fc3d5b7fd8f9d7f54db7241cdfee6fd2b7d4f3d6a6956096f883b2e5ad2f3a1940e11eae7109b6c14120c44108eaeabae57391b7c9323d576805