Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14/10/2024, 15:19
Static task
static1
Behavioral task
behavioral1
Sample
42d48f870ab8d14b869ce1d6509c034a_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
42d48f870ab8d14b869ce1d6509c034a_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
42d48f870ab8d14b869ce1d6509c034a_JaffaCakes118.html
-
Size
57KB
-
MD5
42d48f870ab8d14b869ce1d6509c034a
-
SHA1
346526855ff407d0ad7e92217bf2045bdcf695a5
-
SHA256
b0ec7157089bc4367c4d9d79acf95de7b5ebfc79ff00d6c9b42d83347c6dca74
-
SHA512
a5d55ec500fbecb687b74e5cbdc3931538767f7ea4512c0f45d6b2c68d40b6bd0fecd0543ce562dafce78ae1d736ddf678a94090b3337f7882f54086d9b3c03e
-
SSDEEP
1536:ijEQvK8OPHdyAto2vgyHJv0owbd6zKD6CDK2RVro/PwpDK2RVy:ijnOPHdyP2vgyHJutDK2RVro/PwpDK2m
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 112 msedge.exe 112 msedge.exe 920 msedge.exe 920 msedge.exe 2012 identity_helper.exe 2012 identity_helper.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 920 wrote to memory of 796 920 msedge.exe 83 PID 920 wrote to memory of 796 920 msedge.exe 83 PID 920 wrote to memory of 3256 920 msedge.exe 84 PID 920 wrote to memory of 3256 920 msedge.exe 84 PID 920 wrote to memory of 3256 920 msedge.exe 84 PID 920 wrote to memory of 3256 920 msedge.exe 84 PID 920 wrote to memory of 3256 920 msedge.exe 84 PID 920 wrote to memory of 3256 920 msedge.exe 84 PID 920 wrote to memory of 3256 920 msedge.exe 84 PID 920 wrote to memory of 3256 920 msedge.exe 84 PID 920 wrote to memory of 3256 920 msedge.exe 84 PID 920 wrote to memory of 3256 920 msedge.exe 84 PID 920 wrote to memory of 3256 920 msedge.exe 84 PID 920 wrote to memory of 3256 920 msedge.exe 84 PID 920 wrote to memory of 3256 920 msedge.exe 84 PID 920 wrote to memory of 3256 920 msedge.exe 84 PID 920 wrote to memory of 3256 920 msedge.exe 84 PID 920 wrote to memory of 3256 920 msedge.exe 84 PID 920 wrote to memory of 3256 920 msedge.exe 84 PID 920 wrote to memory of 3256 920 msedge.exe 84 PID 920 wrote to memory of 3256 920 msedge.exe 84 PID 920 wrote to memory of 3256 920 msedge.exe 84 PID 920 wrote to memory of 3256 920 msedge.exe 84 PID 920 wrote to memory of 3256 920 msedge.exe 84 PID 920 wrote to memory of 3256 920 msedge.exe 84 PID 920 wrote to memory of 3256 920 msedge.exe 84 PID 920 wrote to memory of 3256 920 msedge.exe 84 PID 920 wrote to memory of 3256 920 msedge.exe 84 PID 920 wrote to memory of 3256 920 msedge.exe 84 PID 920 wrote to memory of 3256 920 msedge.exe 84 PID 920 wrote to memory of 3256 920 msedge.exe 84 PID 920 wrote to memory of 3256 920 msedge.exe 84 PID 920 wrote to memory of 3256 920 msedge.exe 84 PID 920 wrote to memory of 3256 920 msedge.exe 84 PID 920 wrote to memory of 3256 920 msedge.exe 84 PID 920 wrote to memory of 3256 920 msedge.exe 84 PID 920 wrote to memory of 3256 920 msedge.exe 84 PID 920 wrote to memory of 3256 920 msedge.exe 84 PID 920 wrote to memory of 3256 920 msedge.exe 84 PID 920 wrote to memory of 3256 920 msedge.exe 84 PID 920 wrote to memory of 3256 920 msedge.exe 84 PID 920 wrote to memory of 3256 920 msedge.exe 84 PID 920 wrote to memory of 112 920 msedge.exe 85 PID 920 wrote to memory of 112 920 msedge.exe 85 PID 920 wrote to memory of 4580 920 msedge.exe 86 PID 920 wrote to memory of 4580 920 msedge.exe 86 PID 920 wrote to memory of 4580 920 msedge.exe 86 PID 920 wrote to memory of 4580 920 msedge.exe 86 PID 920 wrote to memory of 4580 920 msedge.exe 86 PID 920 wrote to memory of 4580 920 msedge.exe 86 PID 920 wrote to memory of 4580 920 msedge.exe 86 PID 920 wrote to memory of 4580 920 msedge.exe 86 PID 920 wrote to memory of 4580 920 msedge.exe 86 PID 920 wrote to memory of 4580 920 msedge.exe 86 PID 920 wrote to memory of 4580 920 msedge.exe 86 PID 920 wrote to memory of 4580 920 msedge.exe 86 PID 920 wrote to memory of 4580 920 msedge.exe 86 PID 920 wrote to memory of 4580 920 msedge.exe 86 PID 920 wrote to memory of 4580 920 msedge.exe 86 PID 920 wrote to memory of 4580 920 msedge.exe 86 PID 920 wrote to memory of 4580 920 msedge.exe 86 PID 920 wrote to memory of 4580 920 msedge.exe 86 PID 920 wrote to memory of 4580 920 msedge.exe 86 PID 920 wrote to memory of 4580 920 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\42d48f870ab8d14b869ce1d6509c034a_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:920 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff869e46f8,0x7fff869e4708,0x7fff869e47182⤵PID:796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,5003950344876022404,1310663354787076081,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:22⤵PID:3256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,5003950344876022404,1310663354787076081,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2184 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,5003950344876022404,1310663354787076081,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2820 /prefetch:82⤵PID:4580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,5003950344876022404,1310663354787076081,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:2496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,5003950344876022404,1310663354787076081,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:2344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,5003950344876022404,1310663354787076081,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4700 /prefetch:12⤵PID:1096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,5003950344876022404,1310663354787076081,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5216 /prefetch:12⤵PID:4540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,5003950344876022404,1310663354787076081,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4844 /prefetch:12⤵PID:3696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,5003950344876022404,1310663354787076081,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3396 /prefetch:12⤵PID:2868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,5003950344876022404,1310663354787076081,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5880 /prefetch:82⤵PID:4636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,5003950344876022404,1310663354787076081,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5880 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,5003950344876022404,1310663354787076081,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6300 /prefetch:12⤵PID:5016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,5003950344876022404,1310663354787076081,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6308 /prefetch:12⤵PID:3472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,5003950344876022404,1310663354787076081,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6536 /prefetch:12⤵PID:2372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,5003950344876022404,1310663354787076081,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6484 /prefetch:12⤵PID:3280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,5003950344876022404,1310663354787076081,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1132 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4524
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3248
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4920
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD50a9dc42e4013fc47438e96d24beb8eff
SHA1806ab26d7eae031a58484188a7eb1adab06457fc
SHA25658d66151799526b3fa372552cd99b385415d9e9a119302b99aadc34dd51dd151
SHA512868d6b421ae2501a519595d0c34ddef25b2a98b082c5203da8349035f1f6764ddf183197f1054e7e86a752c71eccbc0649e515b63c55bc18cf5f0592397e258f
-
Filesize
152B
MD561cef8e38cd95bf003f5fdd1dc37dae1
SHA111f2f79ecb349344c143eea9a0fed41891a3467f
SHA256ae671613623b4477fbd5daf1fd2d148ae2a09ddcc3804b2b6d4ffcb60b317e3e
SHA5126fb9b333fe0e8fde19fdd0bd01a1990a4e60a87c0a02bc8297da1206e42f8690d06b030308e58c862e9e77714a585eed7cc1627590d99a10aeb77fc0dd3d864d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize792B
MD59a63d1da3ecd1d2c4302ea865f9404ae
SHA1e09cd642075303a5df80f83256b2e0d5d21c56ea
SHA256ea3e5a5398c7c170c8b634565fdfd1d3f2ff07994ef8ebab4526ac6ac2597554
SHA51287b127e08d15e883ddac4999979fb5f18b3dcd6fa32f42ef84f3cf1af6978c62441914990f56312f16aba76abfcfc753ad2d4d783d2f0185d0b508415922bce7
-
Filesize
1KB
MD557e3c7f2477046c5b6a6c66c8b6f8425
SHA10a7ecf075cf09cd4582e454ff1b5f20c8ba6f3c9
SHA25698343534ff1091f43a0e383a61d8541e6e2920f5c977d31f1c2b1a22c413a31b
SHA512da8fbd79650d0d186a67042762ae77734fcf1b861941cda4b6cf1935363e375f8c49053a367278457ed57a94a6f852a5939f3e36d98e63bbad273fa381e9462c
-
Filesize
6KB
MD5eb5ebbffd532034555173bd43264ba54
SHA1c079ccc778e6af38f655d1aa83037b9ceacde393
SHA256fe3fa5586cb135ce3e13d39318bcee8bab1b2369931f4fc2ad8201a87b6b7879
SHA51229d28dd8f7d6a69000129f563c94d32c7cbb486e03ee210c85ad2e961e28d7946fe0596b1cb6abbe908a73de4182e180bd6ea32308456da8e96c3ca1a20c4b75
-
Filesize
7KB
MD565bcd0df0949771d2043711e027accf4
SHA174a049d2dbcaca510793d23a0bba7e80f99ef674
SHA256f15601996c8776d67d587e92e09bf0189a96bc2b0ab747ea4eda67288705c765
SHA5129ad53d2184a4f8881031d01402d823242727a5bdbe4a8db94e80f5acc676d85b44d4f5de079647c5448bdac5d7013098812d8997ffe3d5d6387c65ded153674a
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5612e62217d80c64d11c58c0109cb6917
SHA12769f145764682d05e85617598ace3ffefc3ea40
SHA256976940b71150b468d18d0b7a4648ef7b4b90b5c1f51aeb2ac06bf81f7c176011
SHA512d2d767e64535db11a667d341d08b89b1519e5f3d92bb3ab9b43592f01c57610b3d5931152c75dfc3da95ec282af05412b18e92b93edd5847bcf58751fe44cbcf