Analysis
-
max time kernel
145s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14/10/2024, 17:45
Static task
static1
Behavioral task
behavioral1
Sample
436b3cc327dbc4d27dbbb4d3cb4325fe_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
436b3cc327dbc4d27dbbb4d3cb4325fe_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
436b3cc327dbc4d27dbbb4d3cb4325fe_JaffaCakes118.html
-
Size
15KB
-
MD5
436b3cc327dbc4d27dbbb4d3cb4325fe
-
SHA1
dac14df79ddb1ee1be70a906ad387448c3204a74
-
SHA256
726b54f221d81f68dede3f26b8627a8861fe1cfc9b1d6a6c121615d6c96a5941
-
SHA512
d03313d65a754bd0e0d8ca44638bf2157a53a636b7c4a30d425c50ebb1de2ca4da88aa0af589d9c54c08a855db23bed998a5f50026448051fe9e1ecaaadee778
-
SSDEEP
192:PjUhf5jcqoXz2zk8R9CA6y1QLGBAiNjhGyLHaiorgahN3HdZW76FLo4lmP3KTALd:PATcB8RFJKL+tdhGkHanhN39Z1J2V
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1812 msedge.exe 1812 msedge.exe 3192 msedge.exe 3192 msedge.exe 2616 identity_helper.exe 2616 identity_helper.exe 5704 msedge.exe 5704 msedge.exe 5704 msedge.exe 5704 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3192 wrote to memory of 1376 3192 msedge.exe 84 PID 3192 wrote to memory of 1376 3192 msedge.exe 84 PID 3192 wrote to memory of 3064 3192 msedge.exe 85 PID 3192 wrote to memory of 3064 3192 msedge.exe 85 PID 3192 wrote to memory of 3064 3192 msedge.exe 85 PID 3192 wrote to memory of 3064 3192 msedge.exe 85 PID 3192 wrote to memory of 3064 3192 msedge.exe 85 PID 3192 wrote to memory of 3064 3192 msedge.exe 85 PID 3192 wrote to memory of 3064 3192 msedge.exe 85 PID 3192 wrote to memory of 3064 3192 msedge.exe 85 PID 3192 wrote to memory of 3064 3192 msedge.exe 85 PID 3192 wrote to memory of 3064 3192 msedge.exe 85 PID 3192 wrote to memory of 3064 3192 msedge.exe 85 PID 3192 wrote to memory of 3064 3192 msedge.exe 85 PID 3192 wrote to memory of 3064 3192 msedge.exe 85 PID 3192 wrote to memory of 3064 3192 msedge.exe 85 PID 3192 wrote to memory of 3064 3192 msedge.exe 85 PID 3192 wrote to memory of 3064 3192 msedge.exe 85 PID 3192 wrote to memory of 3064 3192 msedge.exe 85 PID 3192 wrote to memory of 3064 3192 msedge.exe 85 PID 3192 wrote to memory of 3064 3192 msedge.exe 85 PID 3192 wrote to memory of 3064 3192 msedge.exe 85 PID 3192 wrote to memory of 3064 3192 msedge.exe 85 PID 3192 wrote to memory of 3064 3192 msedge.exe 85 PID 3192 wrote to memory of 3064 3192 msedge.exe 85 PID 3192 wrote to memory of 3064 3192 msedge.exe 85 PID 3192 wrote to memory of 3064 3192 msedge.exe 85 PID 3192 wrote to memory of 3064 3192 msedge.exe 85 PID 3192 wrote to memory of 3064 3192 msedge.exe 85 PID 3192 wrote to memory of 3064 3192 msedge.exe 85 PID 3192 wrote to memory of 3064 3192 msedge.exe 85 PID 3192 wrote to memory of 3064 3192 msedge.exe 85 PID 3192 wrote to memory of 3064 3192 msedge.exe 85 PID 3192 wrote to memory of 3064 3192 msedge.exe 85 PID 3192 wrote to memory of 3064 3192 msedge.exe 85 PID 3192 wrote to memory of 3064 3192 msedge.exe 85 PID 3192 wrote to memory of 3064 3192 msedge.exe 85 PID 3192 wrote to memory of 3064 3192 msedge.exe 85 PID 3192 wrote to memory of 3064 3192 msedge.exe 85 PID 3192 wrote to memory of 3064 3192 msedge.exe 85 PID 3192 wrote to memory of 3064 3192 msedge.exe 85 PID 3192 wrote to memory of 3064 3192 msedge.exe 85 PID 3192 wrote to memory of 1812 3192 msedge.exe 86 PID 3192 wrote to memory of 1812 3192 msedge.exe 86 PID 3192 wrote to memory of 1964 3192 msedge.exe 87 PID 3192 wrote to memory of 1964 3192 msedge.exe 87 PID 3192 wrote to memory of 1964 3192 msedge.exe 87 PID 3192 wrote to memory of 1964 3192 msedge.exe 87 PID 3192 wrote to memory of 1964 3192 msedge.exe 87 PID 3192 wrote to memory of 1964 3192 msedge.exe 87 PID 3192 wrote to memory of 1964 3192 msedge.exe 87 PID 3192 wrote to memory of 1964 3192 msedge.exe 87 PID 3192 wrote to memory of 1964 3192 msedge.exe 87 PID 3192 wrote to memory of 1964 3192 msedge.exe 87 PID 3192 wrote to memory of 1964 3192 msedge.exe 87 PID 3192 wrote to memory of 1964 3192 msedge.exe 87 PID 3192 wrote to memory of 1964 3192 msedge.exe 87 PID 3192 wrote to memory of 1964 3192 msedge.exe 87 PID 3192 wrote to memory of 1964 3192 msedge.exe 87 PID 3192 wrote to memory of 1964 3192 msedge.exe 87 PID 3192 wrote to memory of 1964 3192 msedge.exe 87 PID 3192 wrote to memory of 1964 3192 msedge.exe 87 PID 3192 wrote to memory of 1964 3192 msedge.exe 87 PID 3192 wrote to memory of 1964 3192 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\436b3cc327dbc4d27dbbb4d3cb4325fe_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3192 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe3d8746f8,0x7ffe3d874708,0x7ffe3d8747182⤵PID:1376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2208,210406478226967299,15091236740414188621,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:22⤵PID:3064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2208,210406478226967299,15091236740414188621,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2256 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2208,210406478226967299,15091236740414188621,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2932 /prefetch:82⤵PID:1964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,210406478226967299,15091236740414188621,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:3404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,210406478226967299,15091236740414188621,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:2864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,210406478226967299,15091236740414188621,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4236 /prefetch:12⤵PID:4864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,210406478226967299,15091236740414188621,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5180 /prefetch:12⤵PID:4616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,210406478226967299,15091236740414188621,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5276 /prefetch:12⤵PID:2316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2208,210406478226967299,15091236740414188621,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5508 /prefetch:82⤵PID:1908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2208,210406478226967299,15091236740414188621,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5508 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,210406478226967299,15091236740414188621,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5944 /prefetch:12⤵PID:772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,210406478226967299,15091236740414188621,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5880 /prefetch:12⤵PID:3928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,210406478226967299,15091236740414188621,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4148 /prefetch:12⤵PID:2916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,210406478226967299,15091236740414188621,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4972 /prefetch:12⤵PID:3180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2208,210406478226967299,15091236740414188621,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5084 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5704
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3076
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3312
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5bffcefacce25cd03f3d5c9446ddb903d
SHA18923f84aa86db316d2f5c122fe3874bbe26f3bab
SHA25623e7cbbf64c81122c3cb30a0933c10a320e254447771737a326ce37a0694d405
SHA512761dae5315b35ec0b2fe68019881397f5d2eadba3963aba79a89f8953a0cd705012d7faf3a204a5f36008926b9f614980e333351596b06ce7058d744345ce2e7
-
Filesize
152B
MD5d22073dea53e79d9b824f27ac5e9813e
SHA16d8a7281241248431a1571e6ddc55798b01fa961
SHA25686713962c3bb287964678b148ee08ea83fb83483dff8be91c8a6085ca560b2a6
SHA51297152091ee24b6e713b8ec8123cb62511f8a7e8a6c6c3f2f6727d0a60497be28814613b476009b853575d4931e5df950e28a41afbf6707cb672206f1219c4413
-
Filesize
215KB
MD51585c4c0ffdb55b2a4fdc0b0f5c317be
SHA1aac0e0f12332063c75c690458b2cfe5acb800d0a
SHA25618a1cfc3b339903a71e6a68791cde83fca626a4c1a22be5cb7755c9f2343e2a5
SHA5127021ed87f0c97edc3a8ff838202fa444841eafcbfa4e00e722b723393a1ac679279aa744e8edde237a05be6060527a0c7e64a36148bd2d1316d5589d78d08e23
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize312B
MD559b7d58793cd88b16ebf261ed9a0138c
SHA14800c72cde84e7045bbd2cc74d44131133750d14
SHA2560945c5d1d81a25f4450ebf712902778b5ed38a7641b7c5ac4703d89db8e2821c
SHA51221d655d808bfac163dc7cb59e24717c124c507bffdf2e26f571227cb74bc4b6565885d67de226107d6e29a9187e285a2ba1477764d1fc8ba3ccc9f6a3a785daa
-
Filesize
1KB
MD5c2c14c705f314556db5e978d41eae54a
SHA1d01f50949d71ccbb6f67aa456cf6516117f6df51
SHA2560bcb7451d7c3af83b6796b65f26ff4db36966e44b9e66e51de0f57a280b1210d
SHA512eca4080aba1b5c6a70d703093474a2867334e54ef9a3230fd70d246e287df170eb54763f15d3a80f47c6923455de4673114623fae88b28ba4ab6495e84fc493f
-
Filesize
6KB
MD53f6858bf7558d277388be51cc08a952d
SHA1c91b03b3ff0fcaf0f0e64eb26d4d558a77a0ba7b
SHA256af95d10e9f46df39d9ef168ed285a8f1c1714a677a0e0045037aa41ccf2fd306
SHA5120c88b0f634219c1193dde0e017ff600fecbb9826e49e1691875850d688fc974a5f9e8960be0478adae934fc213a2419ea1f9e3555f64c33990e2b6d0643f55bf
-
Filesize
7KB
MD520f53d1e6db139dac797b7dc1da6399f
SHA1f73a821e18ce489a7a03836c6f9d89d3e216c972
SHA2561d61007e9f8a3d0b538daceffe795b0cf77599018eb2c3bc0924c6b121745504
SHA512a9bf23157e3761e601351ebc5d50e08b2ade7efadccb7bc8445b07b3d7ed6539e746d08a2b14b6025a5a5dfa2ce4b67c3a16feecd101b8dbfdcfb2c51175d1a6
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD513166b68a468ee2cb94195ef0c75df5c
SHA1ceba79525cea03303a801876bf6d73ea9279e4df
SHA256ad85df59f15461ce287b20f014fe10d09d15f3cb54353235c0ca0bef84d8a76d
SHA5126c39dff8e5477c06182929136a910c6374498ec302750ee8a1272bd606819f81034d77d2244d8670549b6a1f6bd43ab936e09cde3024db4e042dc3e6920bc57a