Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14/10/2024, 12:56
Static task
static1
Behavioral task
behavioral1
Sample
42732da01c9511d242cac44bd50f5e5d_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
42732da01c9511d242cac44bd50f5e5d_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
42732da01c9511d242cac44bd50f5e5d_JaffaCakes118.html
-
Size
11KB
-
MD5
42732da01c9511d242cac44bd50f5e5d
-
SHA1
51a38e2b95fa5b7810c448b185ce32a0d3f920fe
-
SHA256
75446e5f273c38a4d7171477e9c4b251e04419b866e5162770146150ffd62208
-
SHA512
64d817c4ab1c89376de04e3e9c37c9cfb6b9a440186e4c3a01748092c7afc9084a0ed3080ea1c7bc71f6f24ab3df0fdbaa13e85625868126506b6adf31da0038
-
SSDEEP
192:2VolIsr03st8k/w1wvqy1BLmnK/xKWN018LOXuBuLbdU8d:solIcusP/gc1BLmnK/xKWN08LOXguLZ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4664 msedge.exe 4664 msedge.exe 1788 msedge.exe 1788 msedge.exe 4616 identity_helper.exe 4616 identity_helper.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe 4192 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe 1788 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1788 wrote to memory of 2112 1788 msedge.exe 83 PID 1788 wrote to memory of 2112 1788 msedge.exe 83 PID 1788 wrote to memory of 3968 1788 msedge.exe 84 PID 1788 wrote to memory of 3968 1788 msedge.exe 84 PID 1788 wrote to memory of 3968 1788 msedge.exe 84 PID 1788 wrote to memory of 3968 1788 msedge.exe 84 PID 1788 wrote to memory of 3968 1788 msedge.exe 84 PID 1788 wrote to memory of 3968 1788 msedge.exe 84 PID 1788 wrote to memory of 3968 1788 msedge.exe 84 PID 1788 wrote to memory of 3968 1788 msedge.exe 84 PID 1788 wrote to memory of 3968 1788 msedge.exe 84 PID 1788 wrote to memory of 3968 1788 msedge.exe 84 PID 1788 wrote to memory of 3968 1788 msedge.exe 84 PID 1788 wrote to memory of 3968 1788 msedge.exe 84 PID 1788 wrote to memory of 3968 1788 msedge.exe 84 PID 1788 wrote to memory of 3968 1788 msedge.exe 84 PID 1788 wrote to memory of 3968 1788 msedge.exe 84 PID 1788 wrote to memory of 3968 1788 msedge.exe 84 PID 1788 wrote to memory of 3968 1788 msedge.exe 84 PID 1788 wrote to memory of 3968 1788 msedge.exe 84 PID 1788 wrote to memory of 3968 1788 msedge.exe 84 PID 1788 wrote to memory of 3968 1788 msedge.exe 84 PID 1788 wrote to memory of 3968 1788 msedge.exe 84 PID 1788 wrote to memory of 3968 1788 msedge.exe 84 PID 1788 wrote to memory of 3968 1788 msedge.exe 84 PID 1788 wrote to memory of 3968 1788 msedge.exe 84 PID 1788 wrote to memory of 3968 1788 msedge.exe 84 PID 1788 wrote to memory of 3968 1788 msedge.exe 84 PID 1788 wrote to memory of 3968 1788 msedge.exe 84 PID 1788 wrote to memory of 3968 1788 msedge.exe 84 PID 1788 wrote to memory of 3968 1788 msedge.exe 84 PID 1788 wrote to memory of 3968 1788 msedge.exe 84 PID 1788 wrote to memory of 3968 1788 msedge.exe 84 PID 1788 wrote to memory of 3968 1788 msedge.exe 84 PID 1788 wrote to memory of 3968 1788 msedge.exe 84 PID 1788 wrote to memory of 3968 1788 msedge.exe 84 PID 1788 wrote to memory of 3968 1788 msedge.exe 84 PID 1788 wrote to memory of 3968 1788 msedge.exe 84 PID 1788 wrote to memory of 3968 1788 msedge.exe 84 PID 1788 wrote to memory of 3968 1788 msedge.exe 84 PID 1788 wrote to memory of 3968 1788 msedge.exe 84 PID 1788 wrote to memory of 3968 1788 msedge.exe 84 PID 1788 wrote to memory of 4664 1788 msedge.exe 85 PID 1788 wrote to memory of 4664 1788 msedge.exe 85 PID 1788 wrote to memory of 2920 1788 msedge.exe 86 PID 1788 wrote to memory of 2920 1788 msedge.exe 86 PID 1788 wrote to memory of 2920 1788 msedge.exe 86 PID 1788 wrote to memory of 2920 1788 msedge.exe 86 PID 1788 wrote to memory of 2920 1788 msedge.exe 86 PID 1788 wrote to memory of 2920 1788 msedge.exe 86 PID 1788 wrote to memory of 2920 1788 msedge.exe 86 PID 1788 wrote to memory of 2920 1788 msedge.exe 86 PID 1788 wrote to memory of 2920 1788 msedge.exe 86 PID 1788 wrote to memory of 2920 1788 msedge.exe 86 PID 1788 wrote to memory of 2920 1788 msedge.exe 86 PID 1788 wrote to memory of 2920 1788 msedge.exe 86 PID 1788 wrote to memory of 2920 1788 msedge.exe 86 PID 1788 wrote to memory of 2920 1788 msedge.exe 86 PID 1788 wrote to memory of 2920 1788 msedge.exe 86 PID 1788 wrote to memory of 2920 1788 msedge.exe 86 PID 1788 wrote to memory of 2920 1788 msedge.exe 86 PID 1788 wrote to memory of 2920 1788 msedge.exe 86 PID 1788 wrote to memory of 2920 1788 msedge.exe 86 PID 1788 wrote to memory of 2920 1788 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\42732da01c9511d242cac44bd50f5e5d_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffddf746f8,0x7fffddf74708,0x7fffddf747182⤵PID:2112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,9166843864509972100,4394257715075022651,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:22⤵PID:3968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,9166843864509972100,4394257715075022651,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,9166843864509972100,4394257715075022651,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2916 /prefetch:82⤵PID:2920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,9166843864509972100,4394257715075022651,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:3308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,9166843864509972100,4394257715075022651,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,9166843864509972100,4394257715075022651,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4720 /prefetch:12⤵PID:1660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,9166843864509972100,4394257715075022651,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5880 /prefetch:82⤵PID:1288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,9166843864509972100,4394257715075022651,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5880 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,9166843864509972100,4394257715075022651,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5884 /prefetch:12⤵PID:2176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,9166843864509972100,4394257715075022651,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5640 /prefetch:12⤵PID:4884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,9166843864509972100,4394257715075022651,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2828 /prefetch:12⤵PID:4436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,9166843864509972100,4394257715075022651,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4992 /prefetch:12⤵PID:3096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,9166843864509972100,4394257715075022651,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4912 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4192
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4964
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3648
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5bffcefacce25cd03f3d5c9446ddb903d
SHA18923f84aa86db316d2f5c122fe3874bbe26f3bab
SHA25623e7cbbf64c81122c3cb30a0933c10a320e254447771737a326ce37a0694d405
SHA512761dae5315b35ec0b2fe68019881397f5d2eadba3963aba79a89f8953a0cd705012d7faf3a204a5f36008926b9f614980e333351596b06ce7058d744345ce2e7
-
Filesize
152B
MD5d22073dea53e79d9b824f27ac5e9813e
SHA16d8a7281241248431a1571e6ddc55798b01fa961
SHA25686713962c3bb287964678b148ee08ea83fb83483dff8be91c8a6085ca560b2a6
SHA51297152091ee24b6e713b8ec8123cb62511f8a7e8a6c6c3f2f6727d0a60497be28814613b476009b853575d4931e5df950e28a41afbf6707cb672206f1219c4413
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize168B
MD547f5230bd1a8a8e9833913a2440e3bb5
SHA16e9bc57e6e2c5fc2831d496a1207519d09c150ca
SHA25614465c9c2cb3c3d49c328fbe9c199326bcf202128975a3c313f63a118ebbc50a
SHA5122cac9026a29ebba7deab912da285d28be6e2180236ae62f5874a1d993ffd42ab22797a123f345dbff24b58803173da6ebf1296b916f1c807f1d7964c5368a7a4
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
6KB
MD56f069f70bdaabcea3d55a6982cf7ef3f
SHA16089ceee9f343727d67f8ac91ef6aa3e8410c01f
SHA256d20ce97ba10fbf04d3e9a5be6a77fc5264b130d6428bd1e1ae8624bb79110f7d
SHA5122966a776cf23667b443920a30f39b384c03d97773a5bf3b2dbf303f5378ad71712cd593d4eea2897bb1118a3a7a2e1a74062109f097293be90581be259719ffa
-
Filesize
6KB
MD50927ce043de0ac2628f0d2e026502fcb
SHA1c3c6032574d7cad6902ddba10cb45b98d8276d58
SHA256f6fd1fd96c15c410997e628e805c3c664cac7e79e9e6a2e7c9f5eab48c7e10b0
SHA51277fffd26768dff3158a492f2835de1267260a4ce855eb60629a0c1ade802d855dd8a88aee86087358df9fd140e29ddb4ae30900ad1ecf47e56944151f31ade8a
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5d3202ba9982ddbc0564d01beec63cc05
SHA1474779b5bed9a888b6834ebce9612185d0dd757e
SHA2562a081e8df1fde81a1147970dcd102c66534d5ba4e1cfb13820e3f1f7e161654f
SHA512da82d20ff25be2273d75f82087f60fd73e6ce5f60a3bcfeaa413e2a5e82595110524e585ee628637ba9074057fc77a5a575cde6e88a538d2ecf8b0ac64dc8568