Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17-10-2024 16:44
Static task
static1
Behavioral task
behavioral1
Sample
52acc5efda394c69c4dea88d95a6ab6b_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
52acc5efda394c69c4dea88d95a6ab6b_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
52acc5efda394c69c4dea88d95a6ab6b_JaffaCakes118.html
-
Size
64KB
-
MD5
52acc5efda394c69c4dea88d95a6ab6b
-
SHA1
de24115e5af55b1218d763aef62232152dddaa2d
-
SHA256
544579b016822fbae05a3a873766d6dd7e590fba89d7e0a8abefdaf6b7e33fce
-
SHA512
ff462cf8138cc602de2bf41ccf5401117f3ffd8d059d51919f22bd517081591cdef56b544d5b8428b6465ab9d5100ebe3230611dc32797ac1c8835807790a586
-
SSDEEP
1536:hlBsp0NPWk9bxFeURCFhvoScjt9KIkwwfqeWGEqQ1oJXLGgag41:h3NPWk9fRCFVIB9KIkwwfqeWGEqQ1oJq
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1980 msedge.exe 1980 msedge.exe 4344 msedge.exe 4344 msedge.exe 4752 identity_helper.exe 4752 identity_helper.exe 4224 msedge.exe 4224 msedge.exe 4224 msedge.exe 4224 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4344 wrote to memory of 3532 4344 msedge.exe 86 PID 4344 wrote to memory of 3532 4344 msedge.exe 86 PID 4344 wrote to memory of 1904 4344 msedge.exe 87 PID 4344 wrote to memory of 1904 4344 msedge.exe 87 PID 4344 wrote to memory of 1904 4344 msedge.exe 87 PID 4344 wrote to memory of 1904 4344 msedge.exe 87 PID 4344 wrote to memory of 1904 4344 msedge.exe 87 PID 4344 wrote to memory of 1904 4344 msedge.exe 87 PID 4344 wrote to memory of 1904 4344 msedge.exe 87 PID 4344 wrote to memory of 1904 4344 msedge.exe 87 PID 4344 wrote to memory of 1904 4344 msedge.exe 87 PID 4344 wrote to memory of 1904 4344 msedge.exe 87 PID 4344 wrote to memory of 1904 4344 msedge.exe 87 PID 4344 wrote to memory of 1904 4344 msedge.exe 87 PID 4344 wrote to memory of 1904 4344 msedge.exe 87 PID 4344 wrote to memory of 1904 4344 msedge.exe 87 PID 4344 wrote to memory of 1904 4344 msedge.exe 87 PID 4344 wrote to memory of 1904 4344 msedge.exe 87 PID 4344 wrote to memory of 1904 4344 msedge.exe 87 PID 4344 wrote to memory of 1904 4344 msedge.exe 87 PID 4344 wrote to memory of 1904 4344 msedge.exe 87 PID 4344 wrote to memory of 1904 4344 msedge.exe 87 PID 4344 wrote to memory of 1904 4344 msedge.exe 87 PID 4344 wrote to memory of 1904 4344 msedge.exe 87 PID 4344 wrote to memory of 1904 4344 msedge.exe 87 PID 4344 wrote to memory of 1904 4344 msedge.exe 87 PID 4344 wrote to memory of 1904 4344 msedge.exe 87 PID 4344 wrote to memory of 1904 4344 msedge.exe 87 PID 4344 wrote to memory of 1904 4344 msedge.exe 87 PID 4344 wrote to memory of 1904 4344 msedge.exe 87 PID 4344 wrote to memory of 1904 4344 msedge.exe 87 PID 4344 wrote to memory of 1904 4344 msedge.exe 87 PID 4344 wrote to memory of 1904 4344 msedge.exe 87 PID 4344 wrote to memory of 1904 4344 msedge.exe 87 PID 4344 wrote to memory of 1904 4344 msedge.exe 87 PID 4344 wrote to memory of 1904 4344 msedge.exe 87 PID 4344 wrote to memory of 1904 4344 msedge.exe 87 PID 4344 wrote to memory of 1904 4344 msedge.exe 87 PID 4344 wrote to memory of 1904 4344 msedge.exe 87 PID 4344 wrote to memory of 1904 4344 msedge.exe 87 PID 4344 wrote to memory of 1904 4344 msedge.exe 87 PID 4344 wrote to memory of 1904 4344 msedge.exe 87 PID 4344 wrote to memory of 1980 4344 msedge.exe 88 PID 4344 wrote to memory of 1980 4344 msedge.exe 88 PID 4344 wrote to memory of 2608 4344 msedge.exe 89 PID 4344 wrote to memory of 2608 4344 msedge.exe 89 PID 4344 wrote to memory of 2608 4344 msedge.exe 89 PID 4344 wrote to memory of 2608 4344 msedge.exe 89 PID 4344 wrote to memory of 2608 4344 msedge.exe 89 PID 4344 wrote to memory of 2608 4344 msedge.exe 89 PID 4344 wrote to memory of 2608 4344 msedge.exe 89 PID 4344 wrote to memory of 2608 4344 msedge.exe 89 PID 4344 wrote to memory of 2608 4344 msedge.exe 89 PID 4344 wrote to memory of 2608 4344 msedge.exe 89 PID 4344 wrote to memory of 2608 4344 msedge.exe 89 PID 4344 wrote to memory of 2608 4344 msedge.exe 89 PID 4344 wrote to memory of 2608 4344 msedge.exe 89 PID 4344 wrote to memory of 2608 4344 msedge.exe 89 PID 4344 wrote to memory of 2608 4344 msedge.exe 89 PID 4344 wrote to memory of 2608 4344 msedge.exe 89 PID 4344 wrote to memory of 2608 4344 msedge.exe 89 PID 4344 wrote to memory of 2608 4344 msedge.exe 89 PID 4344 wrote to memory of 2608 4344 msedge.exe 89 PID 4344 wrote to memory of 2608 4344 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\52acc5efda394c69c4dea88d95a6ab6b_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4344 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc1efb46f8,0x7ffc1efb4708,0x7ffc1efb47182⤵PID:3532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,18268628710296252388,6710607787047964320,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵PID:1904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2068,18268628710296252388,6710607787047964320,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2156 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2068,18268628710296252388,6710607787047964320,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2908 /prefetch:82⤵PID:2608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,18268628710296252388,6710607787047964320,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:4436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,18268628710296252388,6710607787047964320,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:4148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,18268628710296252388,6710607787047964320,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5008 /prefetch:12⤵PID:232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,18268628710296252388,6710607787047964320,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5848 /prefetch:82⤵PID:3764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,18268628710296252388,6710607787047964320,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5848 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,18268628710296252388,6710607787047964320,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5836 /prefetch:12⤵PID:4556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,18268628710296252388,6710607787047964320,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5636 /prefetch:12⤵PID:4916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,18268628710296252388,6710607787047964320,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5360 /prefetch:12⤵PID:3196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,18268628710296252388,6710607787047964320,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5272 /prefetch:12⤵PID:1476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,18268628710296252388,6710607787047964320,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3080 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4224
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3808
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1728
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d7cb450b1315c63b1d5d89d98ba22da5
SHA1694005cd9e1a4c54e0b83d0598a8a0c089df1556
SHA25638355fd694faf1223518e40bac1996bdceaf44191214b0a23c4334d5fb07d031
SHA512df04d4f4b77bae447a940b28aeac345b21b299d8d26e28ecbb3c1c9e9a0e07c551e412d545c7dbb147a92c12bad7ae49ac35af021c34b88e2c6c5f7a0b65f6a8
-
Filesize
152B
MD537f660dd4b6ddf23bc37f5c823d1c33a
SHA11c35538aa307a3e09d15519df6ace99674ae428b
SHA2564e2510a1d5a50a94fe4ce0f74932ab780758a8cbdc6d176a9ce8ab92309f26f8
SHA512807b8b8dc9109b6f78fc63655450bf12b9a006ff63e8f29ade8899d45fdf4a6c068c5c46a3efbc4232b9e1e35d6494f00ded5cdb3e235c8a25023bfbd823992d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize360B
MD58d4ce7657dbac7f8455ade26109eb962
SHA1f17a3552c640f7324649b84f15dae18a1901564f
SHA2568923e311f71df783c34baa19a4bf430795ed753200293e504841fbb7fa9b5f06
SHA512300d8cc39f3d66a1029864ee4eff7bb964e24bdbcfccf56eac06dace782d787a25aa02388429a6acbfee1ee29df40405a2060dc47cef0246e21c85eb3a0a903f
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
733B
MD53d62a1d4c090aeb291d0020a577eb999
SHA1e722dc2cce36ac849bbcdff89e10f52869ed0e28
SHA2567be3c3925a3113c7aab450c6daf7369f596c8e86943af29e797a09c4f62cbe41
SHA512a69d5d53639fac00ea6792e4ba48297dbfa41b459bc301ce8330a485585e0c385ea7ddae263a5244fdf82925a0bff990aa6cddeaa4735aa15c8babfecbfbda49
-
Filesize
5KB
MD5718253e0060cb4a88de3b9025f6e4ecf
SHA1709ef7c2d1c8114939b88d00b1bb5af5cf08a2d0
SHA25608d812097655cfc410f6c648685b0672877eac6b575368df4b773dd0b40b9f4d
SHA512141c060173caec1a7370c57a0f789670a17189d57a5f32cf0152a5a492dd637be416263013ee2bb2e5144746e3093c8d457bdc32ac6b888180b75e112203a0bf
-
Filesize
6KB
MD544f5c6e02970233d60f678b5e3f98a3a
SHA153f20affa54d57838931a82455ff077131dca445
SHA2566c77228ab3777cff6a65b4d9740160b45f1effc8e0ec0dfa17b4f00a05c0db3c
SHA51254368a9e55e845b7efb56bf81e03d7d8d48e7cee6a3485b2f09ad433068c4dc7034eaa31f3dd4844266faf403c11ca313bcb889369f219178f891f291459657b
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5c4129e354ebc6f6b95f7dd57dd319df0
SHA120dde8da7ee37e9a162a62aebffb45ba5d55ac4e
SHA256afba3ed484b63e433e14e7fd6b8233908993804e7009a6c8f985fa43e37216c4
SHA512aecee3886d9d5e73b3491207b151b01b1f872049f0b95367348d4933dbffa925d2f4342cabab8b5688f3fee9b6530f50223c66bc5734d2f2c2555ba4385bcdc5