Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18-10-2024 00:04
Static task
static1
Behavioral task
behavioral1
Sample
545e3c6d22e6dc0a3e3f9f4aa0fa017f_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
545e3c6d22e6dc0a3e3f9f4aa0fa017f_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
545e3c6d22e6dc0a3e3f9f4aa0fa017f_JaffaCakes118.html
-
Size
19KB
-
MD5
545e3c6d22e6dc0a3e3f9f4aa0fa017f
-
SHA1
28269c25e8682a5246c11ca242742f48a213a71c
-
SHA256
34a5f6b1bd6cddf3d9faf20ae1bcb6832cc04033a589478de1b4d88ee0a5df5f
-
SHA512
d887e563f9c51b1c4a6a12e37be00ec0f3b5b2918b1aa19f009450c2789924ac2197ecacde9749cd25954ef505261a6f70e13b08bf61f4b72a310eb865e0a86e
-
SSDEEP
384:cdMovo+Sr02J7yW4U8tvzud5InmvvH0kFwxS8LjU0in:orSrV7yWKi56mnNFwx9Ut
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2840 msedge.exe 2840 msedge.exe 396 msedge.exe 396 msedge.exe 1572 identity_helper.exe 1572 identity_helper.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 396 wrote to memory of 3568 396 msedge.exe 84 PID 396 wrote to memory of 3568 396 msedge.exe 84 PID 396 wrote to memory of 2824 396 msedge.exe 85 PID 396 wrote to memory of 2824 396 msedge.exe 85 PID 396 wrote to memory of 2824 396 msedge.exe 85 PID 396 wrote to memory of 2824 396 msedge.exe 85 PID 396 wrote to memory of 2824 396 msedge.exe 85 PID 396 wrote to memory of 2824 396 msedge.exe 85 PID 396 wrote to memory of 2824 396 msedge.exe 85 PID 396 wrote to memory of 2824 396 msedge.exe 85 PID 396 wrote to memory of 2824 396 msedge.exe 85 PID 396 wrote to memory of 2824 396 msedge.exe 85 PID 396 wrote to memory of 2824 396 msedge.exe 85 PID 396 wrote to memory of 2824 396 msedge.exe 85 PID 396 wrote to memory of 2824 396 msedge.exe 85 PID 396 wrote to memory of 2824 396 msedge.exe 85 PID 396 wrote to memory of 2824 396 msedge.exe 85 PID 396 wrote to memory of 2824 396 msedge.exe 85 PID 396 wrote to memory of 2824 396 msedge.exe 85 PID 396 wrote to memory of 2824 396 msedge.exe 85 PID 396 wrote to memory of 2824 396 msedge.exe 85 PID 396 wrote to memory of 2824 396 msedge.exe 85 PID 396 wrote to memory of 2824 396 msedge.exe 85 PID 396 wrote to memory of 2824 396 msedge.exe 85 PID 396 wrote to memory of 2824 396 msedge.exe 85 PID 396 wrote to memory of 2824 396 msedge.exe 85 PID 396 wrote to memory of 2824 396 msedge.exe 85 PID 396 wrote to memory of 2824 396 msedge.exe 85 PID 396 wrote to memory of 2824 396 msedge.exe 85 PID 396 wrote to memory of 2824 396 msedge.exe 85 PID 396 wrote to memory of 2824 396 msedge.exe 85 PID 396 wrote to memory of 2824 396 msedge.exe 85 PID 396 wrote to memory of 2824 396 msedge.exe 85 PID 396 wrote to memory of 2824 396 msedge.exe 85 PID 396 wrote to memory of 2824 396 msedge.exe 85 PID 396 wrote to memory of 2824 396 msedge.exe 85 PID 396 wrote to memory of 2824 396 msedge.exe 85 PID 396 wrote to memory of 2824 396 msedge.exe 85 PID 396 wrote to memory of 2824 396 msedge.exe 85 PID 396 wrote to memory of 2824 396 msedge.exe 85 PID 396 wrote to memory of 2824 396 msedge.exe 85 PID 396 wrote to memory of 2824 396 msedge.exe 85 PID 396 wrote to memory of 2840 396 msedge.exe 86 PID 396 wrote to memory of 2840 396 msedge.exe 86 PID 396 wrote to memory of 3848 396 msedge.exe 87 PID 396 wrote to memory of 3848 396 msedge.exe 87 PID 396 wrote to memory of 3848 396 msedge.exe 87 PID 396 wrote to memory of 3848 396 msedge.exe 87 PID 396 wrote to memory of 3848 396 msedge.exe 87 PID 396 wrote to memory of 3848 396 msedge.exe 87 PID 396 wrote to memory of 3848 396 msedge.exe 87 PID 396 wrote to memory of 3848 396 msedge.exe 87 PID 396 wrote to memory of 3848 396 msedge.exe 87 PID 396 wrote to memory of 3848 396 msedge.exe 87 PID 396 wrote to memory of 3848 396 msedge.exe 87 PID 396 wrote to memory of 3848 396 msedge.exe 87 PID 396 wrote to memory of 3848 396 msedge.exe 87 PID 396 wrote to memory of 3848 396 msedge.exe 87 PID 396 wrote to memory of 3848 396 msedge.exe 87 PID 396 wrote to memory of 3848 396 msedge.exe 87 PID 396 wrote to memory of 3848 396 msedge.exe 87 PID 396 wrote to memory of 3848 396 msedge.exe 87 PID 396 wrote to memory of 3848 396 msedge.exe 87 PID 396 wrote to memory of 3848 396 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\545e3c6d22e6dc0a3e3f9f4aa0fa017f_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:396 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb42b946f8,0x7ffb42b94708,0x7ffb42b947182⤵PID:3568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,14039028957628822999,17379475923429657996,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:22⤵PID:2824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,14039028957628822999,17379475923429657996,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,14039028957628822999,17379475923429657996,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2872 /prefetch:82⤵PID:3848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,14039028957628822999,17379475923429657996,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:4324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,14039028957628822999,17379475923429657996,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:3364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,14039028957628822999,17379475923429657996,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4952 /prefetch:12⤵PID:5064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,14039028957628822999,17379475923429657996,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5988 /prefetch:82⤵PID:1476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,14039028957628822999,17379475923429657996,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5988 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,14039028957628822999,17379475923429657996,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5172 /prefetch:12⤵PID:3100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,14039028957628822999,17379475923429657996,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4736 /prefetch:12⤵PID:3404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,14039028957628822999,17379475923429657996,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5060 /prefetch:12⤵PID:2156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,14039028957628822999,17379475923429657996,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5000 /prefetch:12⤵PID:2844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,14039028957628822999,17379475923429657996,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5620 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3156
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2808
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1076
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5dc058ebc0f8181946a312f0be99ed79c
SHA10c6f376ed8f2d4c275336048c7c9ef9edf18bff0
SHA256378701e87dcff90aa092702bc299859d6ae8f7e313f773bf594f81df6f40bf6a
SHA51236e0de64a554762b28045baebf9f71930c59d608f8d05c5faf8906d62eaf83f6d856ef1d1b38110e512fbb1a85d3e2310be11a7f679c6b5b3c62313cc7af52aa
-
Filesize
152B
MD5a0486d6f8406d852dd805b66ff467692
SHA177ba1f63142e86b21c951b808f4bc5d8ed89b571
SHA256c0745fd195f3a51b27e4d35a626378a62935dccebefb94db404166befd68b2be
SHA512065a62032eb799fade5fe75f390e7ab3c9442d74cb8b520d846662d144433f39b9186b3ef3db3480cd1d1d655d8f0630855ed5d6e85cf157a40c38a19375ed8a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD591835fd6840bbfdccdbaac7c50f83c98
SHA16cfbaa4e5e95c3c4c04dd445a7cea749fb708de8
SHA256d4732ab7391b8bf3a09e164730c18465eb19050800f322848cff657eafde8250
SHA5120a7e9156aa1e1e925d0b00007090f63b7bd2c5232aaf0f2c5b14640293a050408af208d2098a2442f260c62fefae4243e47751b9e6d1bf4f74fc106b30c2b3dd
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
644B
MD5c3f66325ab05bdc510d4591831620f2f
SHA1926a766fbff196c6382dbf42f184ebc4b67e3bf6
SHA25683df1c194be9f679f9b771d8587cbe10f0993fee00101f94e948f476721d95f2
SHA5124b926a0fc1fea428d3be7428a2886b73428f367404a8edc020af8fa4cde11d1b58dc3161cc95aebe20ee23f9617758afc464a1c852d78885334fc1fc88f22e50
-
Filesize
5KB
MD5c77f8476c263dd0e8cd0638d705a1258
SHA1156868827dcde7c980cd85de820e5a3daffd4d2a
SHA256290f4f07f3e003ed5083b6a7a2fc4b11f564abb44ba9e958eed4358dfd11ad94
SHA512c2af6197968a34fedd467563bde50888b42f5610ab23736da6763b80370a5c4f7474673f717a3cf23efa555cdb5dba87bdbc654bdfac3d672c59dd3ab814dc39
-
Filesize
6KB
MD5cf906836b386511bf5ea2a2a7629bc3a
SHA16223bdb26ce8209bfbc31a7af0b0ae7ea6937489
SHA2565c1f902ffcd559da7b977c5b041beea20fd3c78d66e04f138bc9d16c58ef6e88
SHA512d3d29eb2221166f9b465b664e7d156b7fc02dbb4ffdb43b5f33fcb31ba5a888cf8225defe2ae1aa36addc820440af8081d390a8943e1ff94cb8ea1006876cde3
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5e6cddc660898aaa91a0c1ebc22ddbc64
SHA1568798e7e174b5ad6ece4f18c1abd63396ac4450
SHA256981e2aa8e2001d77e38161eca9e0bf4da0bf54ee54085bbee9e8117084072ccf
SHA512cbb9605b67900ed87bc247599c4d9ebd79d08f4a3c30f861891a2d86d740cbd6840f18671bc699dc5b79a3f76508ab32c2071a2bb278c16c4988f7eaca8c82a8