Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16-10-2024 05:10
Static task
static1
Behavioral task
behavioral1
Sample
4b88e46adea4fd134c30ebb97ac82ccb_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4b88e46adea4fd134c30ebb97ac82ccb_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
4b88e46adea4fd134c30ebb97ac82ccb_JaffaCakes118.html
-
Size
84KB
-
MD5
4b88e46adea4fd134c30ebb97ac82ccb
-
SHA1
338e032086acb4dbbb75e8046f09e00a344dddcc
-
SHA256
aba90b7ff1f40bde8dc1ceb7f20fc6470afdb876bb133e981f13067147aabb24
-
SHA512
245507de32becc49b95a6291f0b2de5a79d4e5a80217fc94a5cc11db0e33e127b576b8e75911057de9ffa580ea01fd1955d0cf046da0c048c488f4c9972c68d3
-
SSDEEP
1536:Xlu+tmjutx2542O/2/rgbnF+X4P5E4l+627xqXOAu4Stio4xC/DZ8m:XJn0e4gq4P5H+6lButtnZr
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3396 msedge.exe 3396 msedge.exe 4016 msedge.exe 4016 msedge.exe 4816 identity_helper.exe 4816 identity_helper.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4016 wrote to memory of 832 4016 msedge.exe 84 PID 4016 wrote to memory of 832 4016 msedge.exe 84 PID 4016 wrote to memory of 2040 4016 msedge.exe 85 PID 4016 wrote to memory of 2040 4016 msedge.exe 85 PID 4016 wrote to memory of 2040 4016 msedge.exe 85 PID 4016 wrote to memory of 2040 4016 msedge.exe 85 PID 4016 wrote to memory of 2040 4016 msedge.exe 85 PID 4016 wrote to memory of 2040 4016 msedge.exe 85 PID 4016 wrote to memory of 2040 4016 msedge.exe 85 PID 4016 wrote to memory of 2040 4016 msedge.exe 85 PID 4016 wrote to memory of 2040 4016 msedge.exe 85 PID 4016 wrote to memory of 2040 4016 msedge.exe 85 PID 4016 wrote to memory of 2040 4016 msedge.exe 85 PID 4016 wrote to memory of 2040 4016 msedge.exe 85 PID 4016 wrote to memory of 2040 4016 msedge.exe 85 PID 4016 wrote to memory of 2040 4016 msedge.exe 85 PID 4016 wrote to memory of 2040 4016 msedge.exe 85 PID 4016 wrote to memory of 2040 4016 msedge.exe 85 PID 4016 wrote to memory of 2040 4016 msedge.exe 85 PID 4016 wrote to memory of 2040 4016 msedge.exe 85 PID 4016 wrote to memory of 2040 4016 msedge.exe 85 PID 4016 wrote to memory of 2040 4016 msedge.exe 85 PID 4016 wrote to memory of 2040 4016 msedge.exe 85 PID 4016 wrote to memory of 2040 4016 msedge.exe 85 PID 4016 wrote to memory of 2040 4016 msedge.exe 85 PID 4016 wrote to memory of 2040 4016 msedge.exe 85 PID 4016 wrote to memory of 2040 4016 msedge.exe 85 PID 4016 wrote to memory of 2040 4016 msedge.exe 85 PID 4016 wrote to memory of 2040 4016 msedge.exe 85 PID 4016 wrote to memory of 2040 4016 msedge.exe 85 PID 4016 wrote to memory of 2040 4016 msedge.exe 85 PID 4016 wrote to memory of 2040 4016 msedge.exe 85 PID 4016 wrote to memory of 2040 4016 msedge.exe 85 PID 4016 wrote to memory of 2040 4016 msedge.exe 85 PID 4016 wrote to memory of 2040 4016 msedge.exe 85 PID 4016 wrote to memory of 2040 4016 msedge.exe 85 PID 4016 wrote to memory of 2040 4016 msedge.exe 85 PID 4016 wrote to memory of 2040 4016 msedge.exe 85 PID 4016 wrote to memory of 2040 4016 msedge.exe 85 PID 4016 wrote to memory of 2040 4016 msedge.exe 85 PID 4016 wrote to memory of 2040 4016 msedge.exe 85 PID 4016 wrote to memory of 2040 4016 msedge.exe 85 PID 4016 wrote to memory of 3396 4016 msedge.exe 86 PID 4016 wrote to memory of 3396 4016 msedge.exe 86 PID 4016 wrote to memory of 3968 4016 msedge.exe 87 PID 4016 wrote to memory of 3968 4016 msedge.exe 87 PID 4016 wrote to memory of 3968 4016 msedge.exe 87 PID 4016 wrote to memory of 3968 4016 msedge.exe 87 PID 4016 wrote to memory of 3968 4016 msedge.exe 87 PID 4016 wrote to memory of 3968 4016 msedge.exe 87 PID 4016 wrote to memory of 3968 4016 msedge.exe 87 PID 4016 wrote to memory of 3968 4016 msedge.exe 87 PID 4016 wrote to memory of 3968 4016 msedge.exe 87 PID 4016 wrote to memory of 3968 4016 msedge.exe 87 PID 4016 wrote to memory of 3968 4016 msedge.exe 87 PID 4016 wrote to memory of 3968 4016 msedge.exe 87 PID 4016 wrote to memory of 3968 4016 msedge.exe 87 PID 4016 wrote to memory of 3968 4016 msedge.exe 87 PID 4016 wrote to memory of 3968 4016 msedge.exe 87 PID 4016 wrote to memory of 3968 4016 msedge.exe 87 PID 4016 wrote to memory of 3968 4016 msedge.exe 87 PID 4016 wrote to memory of 3968 4016 msedge.exe 87 PID 4016 wrote to memory of 3968 4016 msedge.exe 87 PID 4016 wrote to memory of 3968 4016 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\4b88e46adea4fd134c30ebb97ac82ccb_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4016 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcf63346f8,0x7ffcf6334708,0x7ffcf63347182⤵PID:832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,16639844415922663057,9481716224669053392,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:22⤵PID:2040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,16639844415922663057,9481716224669053392,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2116,16639844415922663057,9481716224669053392,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2964 /prefetch:82⤵PID:3968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,16639844415922663057,9481716224669053392,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2516 /prefetch:12⤵PID:4004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,16639844415922663057,9481716224669053392,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:12⤵PID:2572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,16639844415922663057,9481716224669053392,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2004 /prefetch:12⤵PID:4772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,16639844415922663057,9481716224669053392,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4984 /prefetch:12⤵PID:4524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,16639844415922663057,9481716224669053392,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:12⤵PID:2328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,16639844415922663057,9481716224669053392,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5988 /prefetch:82⤵PID:3340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,16639844415922663057,9481716224669053392,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5988 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,16639844415922663057,9481716224669053392,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5756 /prefetch:12⤵PID:3656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,16639844415922663057,9481716224669053392,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5380 /prefetch:12⤵PID:2288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,16639844415922663057,9481716224669053392,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4184 /prefetch:12⤵PID:776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,16639844415922663057,9481716224669053392,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5372 /prefetch:12⤵PID:1260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,16639844415922663057,9481716224669053392,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5852 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4864
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2272
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2568
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556a4f78e21616a6e19da57228569489b
SHA121bfabbfc294d5f2aa1da825c5590d760483bc76
SHA256d036661e765ee8fd18978a2b5501e8df6b220e4bca531d9860407555294c96fb
SHA512c2c3cd1152bb486028fe75ab3ce0d0bc9d64c4ca7eb8860ddd934b2f6e0140d2c913af4fa082b88e92a6a6d20fd483a1cb9813209f371a0f56374bc97d7f863b
-
Filesize
152B
MD5e443ee4336fcf13c698b8ab5f3c173d0
SHA19bf70b16f03820cbe3158e1f1396b07b8ac9d75a
SHA25679e277da2074f9467e0518f0f26ca2ba74914bee82553f935a0ccf64a0119e8b
SHA512cbf6f6aa0ea69b47f51592296da2b7be1180e7b483c61b4d17ba9ee1a2d3345cbe0987b96f4e25de1438b553db358f330aad8a26e8522601f055c3d5a8313cdd
-
Filesize
1KB
MD5499de89d70aa411dee646b213906eb88
SHA1a25d1047342985b54c9bce18cdb738387ba2b4de
SHA256c3750bfd75574588905175da6bd0614ab94195b65a4497b2e434ea875bc512e2
SHA51211f0f88d8418843377ac782c9a0c97441891bebe4eeb8a925d0a0ba51eaa7835a1362bcb45b419c1e3dfe386372161e8e5e30a8a4924ad754241187db4ad8ebb
-
Filesize
1KB
MD5916c8e9951d9de48a728418331cc9322
SHA15a31ef4607ffa5b8194310ae55a8d74dbf8b1929
SHA256995f8d25f3b842a1310c23ea0ca19a58b4922f1d9a4a0fdf5edb9d54061e0571
SHA51243cddf1f22df25454fae4f7844415746149de911a49e53b44a6593e4fabd4bd067de82808e010b14465343b77c5cdac6f97e39535bf90a1f78ac1ca1f484983c
-
Filesize
6KB
MD54c445d373edb5defcdbfde6eb57d00e3
SHA17675e38bd0f02d46deb90341c700db47522098c5
SHA2560ad7786a009cec72ecccaa3b1a6e2d7a51314cbfaa1537451bdecf8da131467d
SHA5120f2fea70b590b6b17603621e2c4f79103334e2aba935ee949dbdc9e7ac322d50d904b09d7c1f6c006e86ef549c9088664ee47edbf530ee41d1cae46c78496757
-
Filesize
6KB
MD5e796879005101e6a5340c859877169f0
SHA172b0b1a48adf5baa32940891f7014561bd6d6a7b
SHA2569fc83e9a712ab4778c20a9bb7b642e30bdbf49ace59dbe77d4f921b250a30ee9
SHA51295066856671e220ce1acc06501bc27d87842c79ac97283defe93dccaf24e0f1cd74ccb0c30ef4e220f090a73d440834fd2cc121bb452601166cd7309ea2d503b
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\f44b482a-173b-46ed-84c7-4ee5d98d001c.tmp
Filesize6KB
MD5aeb1dac642b7180c6587369238f0e086
SHA1e11f2fd337ed85105820743fe67c37d68675992c
SHA25632c065b6cdc61386ad258c16ddd620f3760add3bb534b7fed413046b3999fc0f
SHA5125b317640a2d68cc88e9d6080336fc56684b9ee5acc2d8290c0de93a037ad2b221f103f09a3d81b33d5e2695b1a39533c51fe92880ab1b8ae5c3968ad50b2e925
-
Filesize
10KB
MD5b60609230bb0539517a9d1efa1eb3799
SHA1ab449ee4e826be8f84cffd3f65c800512124c9fa
SHA256c0ee2efd5b3fbf9f40e9b7e7033e938ec6d6c75f3337505841110ddb0b568bbc
SHA51222b34f75fa06cb3eab8450ddb8ffd2ed984a9cf8ceb5f8f623176511b2f4c57d5d396cd322114b08236966925af843a31e3ba37451e1d06dda5f0191ee8e886b