Analysis
-
max time kernel
145s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17/10/2024, 19:21
Static task
static1
Behavioral task
behavioral1
Sample
534ae3ceae6e5fb43bba10dc2d219977_JaffaCakes118.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
534ae3ceae6e5fb43bba10dc2d219977_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
534ae3ceae6e5fb43bba10dc2d219977_JaffaCakes118.html
-
Size
90KB
-
MD5
534ae3ceae6e5fb43bba10dc2d219977
-
SHA1
c5cccd5ab5a851d82f5b7d90b28e1d31f0cefb29
-
SHA256
7e6f47629571749bfeef714799a6fd3019bcd8503cbd176fc811b5307f3be568
-
SHA512
065a375c5a3e5c3e256b962e086d71cc38becfcb674ea82e64eceb2159c7ca5863aa191c5968bec4a27adcea55c285487fc6bca0067b59f0eecdc2236a76cb37
-
SSDEEP
1536:gQZBCCOdV0IxCqIRfIGkEeY1OwHJGXuFA5+0I1Xw2lgzHuOwDUjDlG6lW0Or1iTo:gk2b0IxIPd
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4348 msedge.exe 4348 msedge.exe 1464 msedge.exe 1464 msedge.exe 1492 identity_helper.exe 1492 identity_helper.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe 1464 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1464 wrote to memory of 184 1464 msedge.exe 84 PID 1464 wrote to memory of 184 1464 msedge.exe 84 PID 1464 wrote to memory of 4564 1464 msedge.exe 85 PID 1464 wrote to memory of 4564 1464 msedge.exe 85 PID 1464 wrote to memory of 4564 1464 msedge.exe 85 PID 1464 wrote to memory of 4564 1464 msedge.exe 85 PID 1464 wrote to memory of 4564 1464 msedge.exe 85 PID 1464 wrote to memory of 4564 1464 msedge.exe 85 PID 1464 wrote to memory of 4564 1464 msedge.exe 85 PID 1464 wrote to memory of 4564 1464 msedge.exe 85 PID 1464 wrote to memory of 4564 1464 msedge.exe 85 PID 1464 wrote to memory of 4564 1464 msedge.exe 85 PID 1464 wrote to memory of 4564 1464 msedge.exe 85 PID 1464 wrote to memory of 4564 1464 msedge.exe 85 PID 1464 wrote to memory of 4564 1464 msedge.exe 85 PID 1464 wrote to memory of 4564 1464 msedge.exe 85 PID 1464 wrote to memory of 4564 1464 msedge.exe 85 PID 1464 wrote to memory of 4564 1464 msedge.exe 85 PID 1464 wrote to memory of 4564 1464 msedge.exe 85 PID 1464 wrote to memory of 4564 1464 msedge.exe 85 PID 1464 wrote to memory of 4564 1464 msedge.exe 85 PID 1464 wrote to memory of 4564 1464 msedge.exe 85 PID 1464 wrote to memory of 4564 1464 msedge.exe 85 PID 1464 wrote to memory of 4564 1464 msedge.exe 85 PID 1464 wrote to memory of 4564 1464 msedge.exe 85 PID 1464 wrote to memory of 4564 1464 msedge.exe 85 PID 1464 wrote to memory of 4564 1464 msedge.exe 85 PID 1464 wrote to memory of 4564 1464 msedge.exe 85 PID 1464 wrote to memory of 4564 1464 msedge.exe 85 PID 1464 wrote to memory of 4564 1464 msedge.exe 85 PID 1464 wrote to memory of 4564 1464 msedge.exe 85 PID 1464 wrote to memory of 4564 1464 msedge.exe 85 PID 1464 wrote to memory of 4564 1464 msedge.exe 85 PID 1464 wrote to memory of 4564 1464 msedge.exe 85 PID 1464 wrote to memory of 4564 1464 msedge.exe 85 PID 1464 wrote to memory of 4564 1464 msedge.exe 85 PID 1464 wrote to memory of 4564 1464 msedge.exe 85 PID 1464 wrote to memory of 4564 1464 msedge.exe 85 PID 1464 wrote to memory of 4564 1464 msedge.exe 85 PID 1464 wrote to memory of 4564 1464 msedge.exe 85 PID 1464 wrote to memory of 4564 1464 msedge.exe 85 PID 1464 wrote to memory of 4564 1464 msedge.exe 85 PID 1464 wrote to memory of 4348 1464 msedge.exe 86 PID 1464 wrote to memory of 4348 1464 msedge.exe 86 PID 1464 wrote to memory of 3948 1464 msedge.exe 87 PID 1464 wrote to memory of 3948 1464 msedge.exe 87 PID 1464 wrote to memory of 3948 1464 msedge.exe 87 PID 1464 wrote to memory of 3948 1464 msedge.exe 87 PID 1464 wrote to memory of 3948 1464 msedge.exe 87 PID 1464 wrote to memory of 3948 1464 msedge.exe 87 PID 1464 wrote to memory of 3948 1464 msedge.exe 87 PID 1464 wrote to memory of 3948 1464 msedge.exe 87 PID 1464 wrote to memory of 3948 1464 msedge.exe 87 PID 1464 wrote to memory of 3948 1464 msedge.exe 87 PID 1464 wrote to memory of 3948 1464 msedge.exe 87 PID 1464 wrote to memory of 3948 1464 msedge.exe 87 PID 1464 wrote to memory of 3948 1464 msedge.exe 87 PID 1464 wrote to memory of 3948 1464 msedge.exe 87 PID 1464 wrote to memory of 3948 1464 msedge.exe 87 PID 1464 wrote to memory of 3948 1464 msedge.exe 87 PID 1464 wrote to memory of 3948 1464 msedge.exe 87 PID 1464 wrote to memory of 3948 1464 msedge.exe 87 PID 1464 wrote to memory of 3948 1464 msedge.exe 87 PID 1464 wrote to memory of 3948 1464 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\534ae3ceae6e5fb43bba10dc2d219977_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbd32946f8,0x7ffbd3294708,0x7ffbd32947182⤵PID:184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,6498377544881235700,17586203421599187184,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2152 /prefetch:22⤵PID:4564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2144,6498377544881235700,17586203421599187184,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2236 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2144,6498377544881235700,17586203421599187184,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2800 /prefetch:82⤵PID:3948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,6498377544881235700,17586203421599187184,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3196 /prefetch:12⤵PID:2400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,6498377544881235700,17586203421599187184,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:1664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,6498377544881235700,17586203421599187184,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4188 /prefetch:12⤵PID:1560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,6498377544881235700,17586203421599187184,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5092 /prefetch:12⤵PID:448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,6498377544881235700,17586203421599187184,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4880 /prefetch:12⤵PID:4872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,6498377544881235700,17586203421599187184,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6128 /prefetch:12⤵PID:3764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,6498377544881235700,17586203421599187184,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6100 /prefetch:12⤵PID:4232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,6498377544881235700,17586203421599187184,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6264 /prefetch:82⤵PID:2900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,6498377544881235700,17586203421599187184,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6264 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,6498377544881235700,17586203421599187184,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4184 /prefetch:12⤵PID:3296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,6498377544881235700,17586203421599187184,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6424 /prefetch:12⤵PID:1608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,6498377544881235700,17586203421599187184,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2584 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4508
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4056
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1392
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD585ba073d7015b6ce7da19235a275f6da
SHA1a23c8c2125e45a0788bac14423ae1f3eab92cf00
SHA2565ad04b8c19bf43b550ad725202f79086168ecccabe791100fba203d9aa27e617
SHA512eb4fd72d7030ea1a25af2b59769b671a5760735fb95d18145f036a8d9e6f42c903b34a7e606046c740c644fab0bb9f5b7335c1869b098f121579e71f10f5a9c3
-
Filesize
152B
MD57de1bbdc1f9cf1a58ae1de4951ce8cb9
SHA1010da169e15457c25bd80ef02d76a940c1210301
SHA2566e390bbc0d03a652516705775e8e9a7b7936312a8a5bea407f9d7d9fa99d957e
SHA512e4a33f2128883e71ab41e803e8b55d0ac17cbc51be3bde42bed157df24f10f34ad264f74ef3254dbe30d253aca03158fde21518c2b78aaa05dae8308b1c5f30c
-
Filesize
215KB
MD51585c4c0ffdb55b2a4fdc0b0f5c317be
SHA1aac0e0f12332063c75c690458b2cfe5acb800d0a
SHA25618a1cfc3b339903a71e6a68791cde83fca626a4c1a22be5cb7755c9f2343e2a5
SHA5127021ed87f0c97edc3a8ff838202fa444841eafcbfa4e00e722b723393a1ac679279aa744e8edde237a05be6060527a0c7e64a36148bd2d1316d5589d78d08e23
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize504B
MD5e4a32fdedc9db21311387883f794812e
SHA12d95f6c303cac208873eee0d9598363d9be008d2
SHA256ea2f9f26f1a9a135f0bacbcd56d439594fce09e582b2111f3c9f8edacf022a11
SHA512c1e33cc20750f7a2e5e7acc91d0f824ff6445cf112c79db022eea6803caef3da03225396b8baaf52bd622096c5438efa7807a878a57550c6315ca45fbd93e987
-
Filesize
1KB
MD510915bba81f75d9a3a9fb189cd8306fe
SHA1c0c585659f01a36ca24afe7a4f70e1c26a301c49
SHA2564ccaa14c79cd381ac50fef1ad78c1a9995fcb5095735941e1159fcf51c35d8e0
SHA512bbf86d223b0782df306a48ed939ae0908aaa44c4101bf876354b862cb393aa30b6e40e668cc592564480d0e56bf304cd4403f7aa9e82b0de01f3b1ccab4410b8
-
Filesize
5KB
MD548443d5cdc92dcffad697393f2a637fc
SHA126b339d0dc1b4a0f62ef31aae41ba3aef1fbdd8c
SHA25663f2572685a9771bff09c2537bed736fe1949364395646b2b83f90963c648edf
SHA512c0ef9802b5a095dc9b9c7b134eca4724d16a62da7895767ed23929ad02bf967d98f1884ae3741ccc02dba2f2b9a791269da645c3cfd40c295ad32d1ce6e9637d
-
Filesize
6KB
MD5233193c5c7ecba2e4bb3723d79cc9729
SHA192dd2091a174cb0a8b401650e65cb9205ac0e398
SHA256c88d4ece4f23bf818bf62de6904c4cf74318b825d0abf58dc78aba99bdce4ed3
SHA512b471d2ebaf08aa284ed00cc72d01bacb42298e1fecd263a5361a670eb12985b94a4e774c1d5324217990b25965d46131df60ae5ba69942b89f46020c0d25e472
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5cc5ea414b5923e0f325b935e022a7d7d
SHA117dfbd2633d309f76ca53a6f8794b0317c55bbc2
SHA25672b2386843af3185286853d972257e06495b761270ede8c0a46be563a56f4c49
SHA512db1ac2c501d3ff2ba5958cb5371eabdfd02d2931cc5a2843f15772f62e746fc629b442881b5aeedd023985aa9d70386e3cdf9d61d1c1d9869773800a28c63a51