Analysis
-
max time kernel
145s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17/10/2024, 21:08
Static task
static1
Behavioral task
behavioral1
Sample
53be00d3b636b07c0596d550ae3bbfa7_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
53be00d3b636b07c0596d550ae3bbfa7_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
53be00d3b636b07c0596d550ae3bbfa7_JaffaCakes118.html
-
Size
20KB
-
MD5
53be00d3b636b07c0596d550ae3bbfa7
-
SHA1
0146c01ba795482c68e920d35de2470eb22c763c
-
SHA256
ca599a60d29c436ab06ea06901c514e4c195526771153c594e0a281c5ef12b5f
-
SHA512
ee17a6d35cdac50b689b51ed9453a9b81819701609ed84b8b6817c9fd849657a210428adf296b4f1367a3051dca82613ca5d955ad7769cadac36447eca82782f
-
SSDEEP
192:bjfAG0+BlAg58nIDizJF1HOmSoH5mJ5qrUf0P/+xvlzpm4FxA7EY1PFarP6:Xf026nRJDOmSoH5mJ5dptzpZA31PFaG
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1384 msedge.exe 1384 msedge.exe 3540 msedge.exe 3540 msedge.exe 4920 identity_helper.exe 4920 identity_helper.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe 4884 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3540 wrote to memory of 2552 3540 msedge.exe 86 PID 3540 wrote to memory of 2552 3540 msedge.exe 86 PID 3540 wrote to memory of 4948 3540 msedge.exe 87 PID 3540 wrote to memory of 4948 3540 msedge.exe 87 PID 3540 wrote to memory of 4948 3540 msedge.exe 87 PID 3540 wrote to memory of 4948 3540 msedge.exe 87 PID 3540 wrote to memory of 4948 3540 msedge.exe 87 PID 3540 wrote to memory of 4948 3540 msedge.exe 87 PID 3540 wrote to memory of 4948 3540 msedge.exe 87 PID 3540 wrote to memory of 4948 3540 msedge.exe 87 PID 3540 wrote to memory of 4948 3540 msedge.exe 87 PID 3540 wrote to memory of 4948 3540 msedge.exe 87 PID 3540 wrote to memory of 4948 3540 msedge.exe 87 PID 3540 wrote to memory of 4948 3540 msedge.exe 87 PID 3540 wrote to memory of 4948 3540 msedge.exe 87 PID 3540 wrote to memory of 4948 3540 msedge.exe 87 PID 3540 wrote to memory of 4948 3540 msedge.exe 87 PID 3540 wrote to memory of 4948 3540 msedge.exe 87 PID 3540 wrote to memory of 4948 3540 msedge.exe 87 PID 3540 wrote to memory of 4948 3540 msedge.exe 87 PID 3540 wrote to memory of 4948 3540 msedge.exe 87 PID 3540 wrote to memory of 4948 3540 msedge.exe 87 PID 3540 wrote to memory of 4948 3540 msedge.exe 87 PID 3540 wrote to memory of 4948 3540 msedge.exe 87 PID 3540 wrote to memory of 4948 3540 msedge.exe 87 PID 3540 wrote to memory of 4948 3540 msedge.exe 87 PID 3540 wrote to memory of 4948 3540 msedge.exe 87 PID 3540 wrote to memory of 4948 3540 msedge.exe 87 PID 3540 wrote to memory of 4948 3540 msedge.exe 87 PID 3540 wrote to memory of 4948 3540 msedge.exe 87 PID 3540 wrote to memory of 4948 3540 msedge.exe 87 PID 3540 wrote to memory of 4948 3540 msedge.exe 87 PID 3540 wrote to memory of 4948 3540 msedge.exe 87 PID 3540 wrote to memory of 4948 3540 msedge.exe 87 PID 3540 wrote to memory of 4948 3540 msedge.exe 87 PID 3540 wrote to memory of 4948 3540 msedge.exe 87 PID 3540 wrote to memory of 4948 3540 msedge.exe 87 PID 3540 wrote to memory of 4948 3540 msedge.exe 87 PID 3540 wrote to memory of 4948 3540 msedge.exe 87 PID 3540 wrote to memory of 4948 3540 msedge.exe 87 PID 3540 wrote to memory of 4948 3540 msedge.exe 87 PID 3540 wrote to memory of 4948 3540 msedge.exe 87 PID 3540 wrote to memory of 1384 3540 msedge.exe 88 PID 3540 wrote to memory of 1384 3540 msedge.exe 88 PID 3540 wrote to memory of 4092 3540 msedge.exe 89 PID 3540 wrote to memory of 4092 3540 msedge.exe 89 PID 3540 wrote to memory of 4092 3540 msedge.exe 89 PID 3540 wrote to memory of 4092 3540 msedge.exe 89 PID 3540 wrote to memory of 4092 3540 msedge.exe 89 PID 3540 wrote to memory of 4092 3540 msedge.exe 89 PID 3540 wrote to memory of 4092 3540 msedge.exe 89 PID 3540 wrote to memory of 4092 3540 msedge.exe 89 PID 3540 wrote to memory of 4092 3540 msedge.exe 89 PID 3540 wrote to memory of 4092 3540 msedge.exe 89 PID 3540 wrote to memory of 4092 3540 msedge.exe 89 PID 3540 wrote to memory of 4092 3540 msedge.exe 89 PID 3540 wrote to memory of 4092 3540 msedge.exe 89 PID 3540 wrote to memory of 4092 3540 msedge.exe 89 PID 3540 wrote to memory of 4092 3540 msedge.exe 89 PID 3540 wrote to memory of 4092 3540 msedge.exe 89 PID 3540 wrote to memory of 4092 3540 msedge.exe 89 PID 3540 wrote to memory of 4092 3540 msedge.exe 89 PID 3540 wrote to memory of 4092 3540 msedge.exe 89 PID 3540 wrote to memory of 4092 3540 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\53be00d3b636b07c0596d550ae3bbfa7_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3540 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc01e846f8,0x7ffc01e84708,0x7ffc01e847182⤵PID:2552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2172,7287305053007101776,6226872719020494616,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2204 /prefetch:22⤵PID:4948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2172,7287305053007101776,6226872719020494616,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2288 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2172,7287305053007101776,6226872719020494616,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2900 /prefetch:82⤵PID:4092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,7287305053007101776,6226872719020494616,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:1208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,7287305053007101776,6226872719020494616,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:12⤵PID:2476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,7287305053007101776,6226872719020494616,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5096 /prefetch:12⤵PID:4600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2172,7287305053007101776,6226872719020494616,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5936 /prefetch:82⤵PID:3312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2172,7287305053007101776,6226872719020494616,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5936 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,7287305053007101776,6226872719020494616,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5264 /prefetch:12⤵PID:1376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,7287305053007101776,6226872719020494616,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5316 /prefetch:12⤵PID:3692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,7287305053007101776,6226872719020494616,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4948 /prefetch:12⤵PID:3628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,7287305053007101776,6226872719020494616,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5980 /prefetch:12⤵PID:1560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2172,7287305053007101776,6226872719020494616,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3156 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4884
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4064
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4016
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d7cb450b1315c63b1d5d89d98ba22da5
SHA1694005cd9e1a4c54e0b83d0598a8a0c089df1556
SHA25638355fd694faf1223518e40bac1996bdceaf44191214b0a23c4334d5fb07d031
SHA512df04d4f4b77bae447a940b28aeac345b21b299d8d26e28ecbb3c1c9e9a0e07c551e412d545c7dbb147a92c12bad7ae49ac35af021c34b88e2c6c5f7a0b65f6a8
-
Filesize
152B
MD537f660dd4b6ddf23bc37f5c823d1c33a
SHA11c35538aa307a3e09d15519df6ace99674ae428b
SHA2564e2510a1d5a50a94fe4ce0f74932ab780758a8cbdc6d176a9ce8ab92309f26f8
SHA512807b8b8dc9109b6f78fc63655450bf12b9a006ff63e8f29ade8899d45fdf4a6c068c5c46a3efbc4232b9e1e35d6494f00ded5cdb3e235c8a25023bfbd823992d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD57ee5f555e79007cdc92422d5583eb30b
SHA1b057e7bc8f804ddce73b52c10346b6f916c0551b
SHA25664a4b3c5d70b4b9465fc6bd8ade5d803129232d2d5ab81d3889f6cec07652000
SHA512c0f62edc0a4459c5205c8ebb68e59ecb1e2e781e0c1c0e956c83e67e8cc044496d1228f3a35990f86e25c84f27fd2d9ea56153914e89223273b151c5c27904e0
-
Filesize
718B
MD57dd6ca21fa635125afbe2197b6f0c26e
SHA161d4e14490f2b6558132e1e23da1bc7f0fa30f18
SHA256b57cbe9a6174654eb360eab61224d8b95373370c738537b6a2694bac7d041e98
SHA51224906a5bf478648bca29e3ac6ac897e282238d57e6546e76b80894fcb31d49d40024d1c406e47c0148974adb10de6e8edc04bd391745d741b2793304ebedb2d3
-
Filesize
5KB
MD5f658575615eb526b9367a5c2b1cc7294
SHA1146b02dd11edeac53f0973484959519aae62dac7
SHA25691f9cb8d498f2d6ddf2d1d98abc02283385e7ee7c812d7213b70bf9ad212c614
SHA512f2aa01ffb2787f8fc6a21138e9afb2f8ae6c88442bdd187f94687657982ca322d13475c5eca86e4754edc5e073b4b8d62468c8f70d747dd0509ed0328d0b1487
-
Filesize
6KB
MD5b66d01146cfe21a01165f94e7b23f2da
SHA1668ea5132c33a4c3cbd2823340803f8b547e5056
SHA256062578233019d1fef6463b70697e563a0c9ec211b64db284699cc28e7d879432
SHA51286d01194bde3f8161432e80b2dca0d61a700209d5f2ddf0174aec7aa873d1681804328acfec77982f0f270cbc1719df66b37ada6ab789470d2adc52d33ee37d8
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD56daa7751040072c859566d5f69f3d693
SHA18baee387e419d5f9b126df3f4c19dae19e041174
SHA25690c6031b0acc7f76fde1fcfe681fb351b1c8afe8809e488555db3f611db90df3
SHA5121474b864833690ca3fbc33f8d86e24d4cd5a3cf91aa58092daa1a822a3066c8023db079f4d14103d02390b10c571175b5f4473dee4d1d8cccaed33b3fc729827