Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14-10-2024 22:46
Static task
static1
Behavioral task
behavioral1
Sample
448c8fbc9418f4daff6512c8b8fa723e_JaffaCakes118.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
448c8fbc9418f4daff6512c8b8fa723e_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
448c8fbc9418f4daff6512c8b8fa723e_JaffaCakes118.html
-
Size
6KB
-
MD5
448c8fbc9418f4daff6512c8b8fa723e
-
SHA1
17a7789373eb097417d2f311d152095b7ee11ffc
-
SHA256
7c6cde45fcdf3f6bfcc4ba64d8df7379a092a2ac8a818baacb0246f538a07909
-
SHA512
fe185dcaf657407dcd5d7a96d2f766f18674540a611f6e369c6bff3fafc517f5559ffb0389fae7e3091170f3120e3070c88942de90c31d88a6989cba7926fca5
-
SSDEEP
96:xybu5IEIrp6RAGeCdj39UO81ZkO2QByKbrmSggVkFlPmcCdZFDtBSBFVmh2:UbpiAGeWUT1R2QkCrHVkFlP6QRs2
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3872 msedge.exe 3872 msedge.exe 1128 msedge.exe 1128 msedge.exe 4412 identity_helper.exe 4412 identity_helper.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe 1128 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1128 wrote to memory of 4960 1128 msedge.exe 84 PID 1128 wrote to memory of 4960 1128 msedge.exe 84 PID 1128 wrote to memory of 3460 1128 msedge.exe 85 PID 1128 wrote to memory of 3460 1128 msedge.exe 85 PID 1128 wrote to memory of 3460 1128 msedge.exe 85 PID 1128 wrote to memory of 3460 1128 msedge.exe 85 PID 1128 wrote to memory of 3460 1128 msedge.exe 85 PID 1128 wrote to memory of 3460 1128 msedge.exe 85 PID 1128 wrote to memory of 3460 1128 msedge.exe 85 PID 1128 wrote to memory of 3460 1128 msedge.exe 85 PID 1128 wrote to memory of 3460 1128 msedge.exe 85 PID 1128 wrote to memory of 3460 1128 msedge.exe 85 PID 1128 wrote to memory of 3460 1128 msedge.exe 85 PID 1128 wrote to memory of 3460 1128 msedge.exe 85 PID 1128 wrote to memory of 3460 1128 msedge.exe 85 PID 1128 wrote to memory of 3460 1128 msedge.exe 85 PID 1128 wrote to memory of 3460 1128 msedge.exe 85 PID 1128 wrote to memory of 3460 1128 msedge.exe 85 PID 1128 wrote to memory of 3460 1128 msedge.exe 85 PID 1128 wrote to memory of 3460 1128 msedge.exe 85 PID 1128 wrote to memory of 3460 1128 msedge.exe 85 PID 1128 wrote to memory of 3460 1128 msedge.exe 85 PID 1128 wrote to memory of 3460 1128 msedge.exe 85 PID 1128 wrote to memory of 3460 1128 msedge.exe 85 PID 1128 wrote to memory of 3460 1128 msedge.exe 85 PID 1128 wrote to memory of 3460 1128 msedge.exe 85 PID 1128 wrote to memory of 3460 1128 msedge.exe 85 PID 1128 wrote to memory of 3460 1128 msedge.exe 85 PID 1128 wrote to memory of 3460 1128 msedge.exe 85 PID 1128 wrote to memory of 3460 1128 msedge.exe 85 PID 1128 wrote to memory of 3460 1128 msedge.exe 85 PID 1128 wrote to memory of 3460 1128 msedge.exe 85 PID 1128 wrote to memory of 3460 1128 msedge.exe 85 PID 1128 wrote to memory of 3460 1128 msedge.exe 85 PID 1128 wrote to memory of 3460 1128 msedge.exe 85 PID 1128 wrote to memory of 3460 1128 msedge.exe 85 PID 1128 wrote to memory of 3460 1128 msedge.exe 85 PID 1128 wrote to memory of 3460 1128 msedge.exe 85 PID 1128 wrote to memory of 3460 1128 msedge.exe 85 PID 1128 wrote to memory of 3460 1128 msedge.exe 85 PID 1128 wrote to memory of 3460 1128 msedge.exe 85 PID 1128 wrote to memory of 3460 1128 msedge.exe 85 PID 1128 wrote to memory of 3872 1128 msedge.exe 86 PID 1128 wrote to memory of 3872 1128 msedge.exe 86 PID 1128 wrote to memory of 3972 1128 msedge.exe 87 PID 1128 wrote to memory of 3972 1128 msedge.exe 87 PID 1128 wrote to memory of 3972 1128 msedge.exe 87 PID 1128 wrote to memory of 3972 1128 msedge.exe 87 PID 1128 wrote to memory of 3972 1128 msedge.exe 87 PID 1128 wrote to memory of 3972 1128 msedge.exe 87 PID 1128 wrote to memory of 3972 1128 msedge.exe 87 PID 1128 wrote to memory of 3972 1128 msedge.exe 87 PID 1128 wrote to memory of 3972 1128 msedge.exe 87 PID 1128 wrote to memory of 3972 1128 msedge.exe 87 PID 1128 wrote to memory of 3972 1128 msedge.exe 87 PID 1128 wrote to memory of 3972 1128 msedge.exe 87 PID 1128 wrote to memory of 3972 1128 msedge.exe 87 PID 1128 wrote to memory of 3972 1128 msedge.exe 87 PID 1128 wrote to memory of 3972 1128 msedge.exe 87 PID 1128 wrote to memory of 3972 1128 msedge.exe 87 PID 1128 wrote to memory of 3972 1128 msedge.exe 87 PID 1128 wrote to memory of 3972 1128 msedge.exe 87 PID 1128 wrote to memory of 3972 1128 msedge.exe 87 PID 1128 wrote to memory of 3972 1128 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\448c8fbc9418f4daff6512c8b8fa723e_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1128 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe7cae46f8,0x7ffe7cae4708,0x7ffe7cae47182⤵PID:4960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2012,8099444214172203842,4581164868937762623,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2004 /prefetch:22⤵PID:3460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2012,8099444214172203842,4581164868937762623,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2012,8099444214172203842,4581164868937762623,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2812 /prefetch:82⤵PID:3972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,8099444214172203842,4581164868937762623,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:2096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,8099444214172203842,4581164868937762623,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:3932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,8099444214172203842,4581164868937762623,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6140 /prefetch:12⤵PID:3280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2012,8099444214172203842,4581164868937762623,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5660 /prefetch:82⤵PID:856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2012,8099444214172203842,4581164868937762623,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5660 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,8099444214172203842,4581164868937762623,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5664 /prefetch:12⤵PID:2820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,8099444214172203842,4581164868937762623,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5156 /prefetch:12⤵PID:2208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,8099444214172203842,4581164868937762623,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4024 /prefetch:12⤵PID:760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,8099444214172203842,4581164868937762623,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6016 /prefetch:12⤵PID:4248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2012,8099444214172203842,4581164868937762623,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5716 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2124
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2292
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4100
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD599afa4934d1e3c56bbce114b356e8a99
SHA13f0e7a1a28d9d9c06b6663df5d83a65c84d52581
SHA25608e098bb97fd91d815469cdfd5568607a3feca61f18b6b5b9c11b531fde206c8
SHA51276686f30ed68144cf943b80ac10b52c74eee84f197cee3c24ef7845ef44bdb5586b6e530824543deeed59417205ac0e2559808bcb46450504106ac8f4c95b9da
-
Filesize
152B
MD5443a627d539ca4eab732bad0cbe7332b
SHA186b18b906a1acd2a22f4b2c78ac3564c394a9569
SHA2561e1ad9dce141f5f17ea07c7e9c2a65e707c9943f172b9134b0daf9eef25f0dc9
SHA512923b86d75a565c91250110162ce13dd3ef3f6bdde1a83f7af235ed302d4a96b8c9ed722e2152781e699dfcb26bb98afc73f5adb298f8fd673f14c9f28b5f764d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\6b63e586-1012-4caa-8de8-51a70a9914ab.tmp
Filesize539B
MD5307f1a8a57861ac6907b994d6b9e140e
SHA1135981879d2a7dd5360c9296d0b73af61a8dbbdf
SHA2569206ec69b3da81961818599d7388ac34c7cc1298281dc8a98c8d02db3c0f1a2e
SHA512af29a44d4c63551fb5532349a6e6f44c3bff88d4424945b1233680d401e7e47d5b2b49395a2ab98262be7801330fe09ccce8135d0bdbbdc1bfe4249488a87f31
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize360B
MD57173a6662c430320f20589496833a497
SHA16e0b22c8c3c20c1d80636b2dc4b9604d732060bc
SHA256999221d16d3f36ac7276cd19d793e06df7d385ede35549ae861779876ba7bbd8
SHA51217907cf569e8494ca6ad7210e49bfe516b6872441c7501e027e63a01fe34f06c6063b22b8fe22766b3e7e37b3af72e8a6eafe5350e97299c5116b158a157b5e9
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
1KB
MD590e02e532b99f9633abe673e3d324775
SHA1bbd8cefbe7097584d5aa2304a37011f7ea245f8b
SHA2564710d265e9cf25c492c38f8d3f2c5e46f88d85c3f05f983680a1bcdeae12e328
SHA5126ad81a16918177340cc1637cc39eb116546df58b33021e4cc1259c077649b85f406660773cbb71ce6809dae6027fdb83db332a644aac53fc408c63b3b5481871
-
Filesize
6KB
MD5cd081c3fc89441fed5c90b9eda76a1ec
SHA186a06b6b9b17652f3f9ecaa86086cf5ba763da58
SHA2562c4406f13252155c20b15964378c03d8d8745c59349ca33df205212aa20a57a6
SHA512da0c2f8e8b2ab52d9ac7f537e652db57199405a565c62bc18f3d1716b7c986ce644336173150a1632ad0ba5877a0a5448bcfe897a7ebce843905bf5228e96f63
-
Filesize
6KB
MD587239574d77203ab18aa800dc0e8c235
SHA1c962f42fe80e790de24c6dd1d667ed58b00e2bde
SHA256c7d49d63124b75d8b8b0cd674a2e5d64e3b876248bd219013db2c0ae21de3a56
SHA512fd4058a672863a9d446fa2dc7ce25a77610aa49440f63e67581b6b7f5848027ea84f2ec8f88494a5474bb165c382c6ed9714ca56a9aefbaa2cb16a66f9a981af
-
Filesize
371B
MD53f24a6781c244dc28e983a56dba9005b
SHA18c99db59b6625a5b44546bc86fde3ab71c865b0c
SHA2560d44249c4a7b9cbb17c7674dd9dc810ca7c024d0c2fd58e3184bfbffa4b6a26b
SHA512ab2725410562bef2eb3c6f7d99fbad55dc4e8daa349dd0e1f972c6eda900af1aa60e3d6620cde92549fddb80698dea260cbf39bff9f24a917483528e034a9580
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD50d928d9bddafd1eb6a240f5df614b5e8
SHA1ab9dd4235c8348392728bd18cb2f79074a041a2c
SHA2565b64b56b962395f84e37e6f69428847678ba35681aa96f19280c1e2eaf81e929
SHA512f1b1ed76c03a411aaad098faf8834fdd378cef7322ea52e8b1607a9cfd061a5e7c3a4422cf87c9d4bee7581e8a3b0e0bd686d2c4cd9e9636738667d1051a2151