Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18-10-2024 02:27
Static task
static1
Behavioral task
behavioral1
Sample
54fa7952497b43ce2633c4bb650327be_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
54fa7952497b43ce2633c4bb650327be_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
54fa7952497b43ce2633c4bb650327be_JaffaCakes118.html
-
Size
54KB
-
MD5
54fa7952497b43ce2633c4bb650327be
-
SHA1
48816a55a9bd64d16564f169b18570d8de64b2fc
-
SHA256
041ff917b633a4900e5a8b4bab35f22fcf45eef57d5684c31790f24faebd8b07
-
SHA512
5cf65bddb071e00855964af4f5b0dd74b2e621f19ff2db4af24d303c07eb460ee9f916626eaaaa0f98c26b73dbceb6399876b7c9abfb4c34296e036ee74716ee
-
SSDEEP
768:KHX5ZuVCTo0FMKgWQXtP+sXs6Y4R/Ayi4CFKaJ/UBX1s2SL7:KHX3To0FMkQXtP+sKNmBX1i
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 748 msedge.exe 748 msedge.exe 2612 msedge.exe 2612 msedge.exe 664 identity_helper.exe 664 identity_helper.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2612 msedge.exe 2612 msedge.exe 2612 msedge.exe 2612 msedge.exe 2612 msedge.exe 2612 msedge.exe 2612 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2612 msedge.exe 2612 msedge.exe 2612 msedge.exe 2612 msedge.exe 2612 msedge.exe 2612 msedge.exe 2612 msedge.exe 2612 msedge.exe 2612 msedge.exe 2612 msedge.exe 2612 msedge.exe 2612 msedge.exe 2612 msedge.exe 2612 msedge.exe 2612 msedge.exe 2612 msedge.exe 2612 msedge.exe 2612 msedge.exe 2612 msedge.exe 2612 msedge.exe 2612 msedge.exe 2612 msedge.exe 2612 msedge.exe 2612 msedge.exe 2612 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2612 msedge.exe 2612 msedge.exe 2612 msedge.exe 2612 msedge.exe 2612 msedge.exe 2612 msedge.exe 2612 msedge.exe 2612 msedge.exe 2612 msedge.exe 2612 msedge.exe 2612 msedge.exe 2612 msedge.exe 2612 msedge.exe 2612 msedge.exe 2612 msedge.exe 2612 msedge.exe 2612 msedge.exe 2612 msedge.exe 2612 msedge.exe 2612 msedge.exe 2612 msedge.exe 2612 msedge.exe 2612 msedge.exe 2612 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2612 wrote to memory of 3288 2612 msedge.exe 84 PID 2612 wrote to memory of 3288 2612 msedge.exe 84 PID 2612 wrote to memory of 2376 2612 msedge.exe 85 PID 2612 wrote to memory of 2376 2612 msedge.exe 85 PID 2612 wrote to memory of 2376 2612 msedge.exe 85 PID 2612 wrote to memory of 2376 2612 msedge.exe 85 PID 2612 wrote to memory of 2376 2612 msedge.exe 85 PID 2612 wrote to memory of 2376 2612 msedge.exe 85 PID 2612 wrote to memory of 2376 2612 msedge.exe 85 PID 2612 wrote to memory of 2376 2612 msedge.exe 85 PID 2612 wrote to memory of 2376 2612 msedge.exe 85 PID 2612 wrote to memory of 2376 2612 msedge.exe 85 PID 2612 wrote to memory of 2376 2612 msedge.exe 85 PID 2612 wrote to memory of 2376 2612 msedge.exe 85 PID 2612 wrote to memory of 2376 2612 msedge.exe 85 PID 2612 wrote to memory of 2376 2612 msedge.exe 85 PID 2612 wrote to memory of 2376 2612 msedge.exe 85 PID 2612 wrote to memory of 2376 2612 msedge.exe 85 PID 2612 wrote to memory of 2376 2612 msedge.exe 85 PID 2612 wrote to memory of 2376 2612 msedge.exe 85 PID 2612 wrote to memory of 2376 2612 msedge.exe 85 PID 2612 wrote to memory of 2376 2612 msedge.exe 85 PID 2612 wrote to memory of 2376 2612 msedge.exe 85 PID 2612 wrote to memory of 2376 2612 msedge.exe 85 PID 2612 wrote to memory of 2376 2612 msedge.exe 85 PID 2612 wrote to memory of 2376 2612 msedge.exe 85 PID 2612 wrote to memory of 2376 2612 msedge.exe 85 PID 2612 wrote to memory of 2376 2612 msedge.exe 85 PID 2612 wrote to memory of 2376 2612 msedge.exe 85 PID 2612 wrote to memory of 2376 2612 msedge.exe 85 PID 2612 wrote to memory of 2376 2612 msedge.exe 85 PID 2612 wrote to memory of 2376 2612 msedge.exe 85 PID 2612 wrote to memory of 2376 2612 msedge.exe 85 PID 2612 wrote to memory of 2376 2612 msedge.exe 85 PID 2612 wrote to memory of 2376 2612 msedge.exe 85 PID 2612 wrote to memory of 2376 2612 msedge.exe 85 PID 2612 wrote to memory of 2376 2612 msedge.exe 85 PID 2612 wrote to memory of 2376 2612 msedge.exe 85 PID 2612 wrote to memory of 2376 2612 msedge.exe 85 PID 2612 wrote to memory of 2376 2612 msedge.exe 85 PID 2612 wrote to memory of 2376 2612 msedge.exe 85 PID 2612 wrote to memory of 2376 2612 msedge.exe 85 PID 2612 wrote to memory of 748 2612 msedge.exe 86 PID 2612 wrote to memory of 748 2612 msedge.exe 86 PID 2612 wrote to memory of 1592 2612 msedge.exe 87 PID 2612 wrote to memory of 1592 2612 msedge.exe 87 PID 2612 wrote to memory of 1592 2612 msedge.exe 87 PID 2612 wrote to memory of 1592 2612 msedge.exe 87 PID 2612 wrote to memory of 1592 2612 msedge.exe 87 PID 2612 wrote to memory of 1592 2612 msedge.exe 87 PID 2612 wrote to memory of 1592 2612 msedge.exe 87 PID 2612 wrote to memory of 1592 2612 msedge.exe 87 PID 2612 wrote to memory of 1592 2612 msedge.exe 87 PID 2612 wrote to memory of 1592 2612 msedge.exe 87 PID 2612 wrote to memory of 1592 2612 msedge.exe 87 PID 2612 wrote to memory of 1592 2612 msedge.exe 87 PID 2612 wrote to memory of 1592 2612 msedge.exe 87 PID 2612 wrote to memory of 1592 2612 msedge.exe 87 PID 2612 wrote to memory of 1592 2612 msedge.exe 87 PID 2612 wrote to memory of 1592 2612 msedge.exe 87 PID 2612 wrote to memory of 1592 2612 msedge.exe 87 PID 2612 wrote to memory of 1592 2612 msedge.exe 87 PID 2612 wrote to memory of 1592 2612 msedge.exe 87 PID 2612 wrote to memory of 1592 2612 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\54fa7952497b43ce2633c4bb650327be_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff99b7b46f8,0x7ff99b7b4708,0x7ff99b7b47182⤵PID:3288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,15359280072998458675,11080405691498512976,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2176 /prefetch:22⤵PID:2376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2132,15359280072998458675,11080405691498512976,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2548 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2132,15359280072998458675,11080405691498512976,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2896 /prefetch:82⤵PID:1592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,15359280072998458675,11080405691498512976,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,15359280072998458675,11080405691498512976,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:2892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,15359280072998458675,11080405691498512976,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4928 /prefetch:12⤵PID:2440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,15359280072998458675,11080405691498512976,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6016 /prefetch:82⤵PID:5044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,15359280072998458675,11080405691498512976,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6016 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,15359280072998458675,11080405691498512976,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5740 /prefetch:12⤵PID:3460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,15359280072998458675,11080405691498512976,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5420 /prefetch:12⤵PID:3720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,15359280072998458675,11080405691498512976,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5560 /prefetch:12⤵PID:2156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,15359280072998458675,11080405691498512976,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5372 /prefetch:12⤵PID:4968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,15359280072998458675,11080405691498512976,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4768 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4728
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3724
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3324
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD58749e21d9d0a17dac32d5aa2027f7a75
SHA1a5d555f8b035c7938a4a864e89218c0402ab7cde
SHA256915193bd331ee9ea7c750398a37fbb552b8c5a1d90edec6293688296bda6f304
SHA512c645a41180ed01e854f197868283f9b40620dbbc813a1c122f6870db574ebc1c4917da4d320bdfd1cc67f23303a2c6d74e4f36dd9d3ffcfa92d3dfca3b7ca31a
-
Filesize
152B
MD534d2c4f40f47672ecdf6f66fea242f4a
SHA14bcad62542aeb44cae38a907d8b5a8604115ada2
SHA256b214e3affb02a2ea4469a8bbdfa8a179e7cc57cababd83b4bafae9cdbe23fa33
SHA51250fba54ec95d694211a005d0e3e6cf5b5677efa16989cbf854207a1a67e3a139f32b757c6f2ce824a48f621440b93fde60ad1dc790fcec4b76edddd0d92a75d6
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD521b9485133727cb7e3d4ff2526e5ecc6
SHA106ebbb658462b79c85c9ef49f267f12adeab075b
SHA256b91935c76cb750370d378075c0373c8311e9336c0bbcf6a0a3b1c272253dfbd2
SHA5128698e2fc6eab7e794270638ca5b18f867dee8081923c2243931f66e57fefb58458ef877b93c5e6b262286bb9c8843f0eceae1f163438c9d460161a875ca63091
-
Filesize
2KB
MD52372e07d164b21a1135b66368d62cbdd
SHA1c83a556b88942cb478d894a11f34689cd4edfd28
SHA25686a44b41817fe58e82feca50aac6a06c5a9774e51dc0d57c7f00eba6afaee224
SHA51272dd6316dcf7a6f9e73506f28fbb78b3514dd36ab5e507f2a03052b5c28e1df0921ae83acd1cda42f75fcdc8ae19fb59576ef6c94d756072f461e18a50819c05
-
Filesize
5KB
MD5c24b58baacbd7b4e9ca21c35b80680d9
SHA1e0c2f90cae944b78021bc2d0916f33d27773dc0e
SHA2563bd1bd1cbac89c1bc9deed544b7118c7eb3613b96e9ea3417d877d1f0d512550
SHA5126258ae32af4f96c52a85eee53da127e1d08c22d01749d842ef1e465f196c3337a9f7eeb4691a0ef1be18118ff1506d0d70380a08a46b010a519680af32ef4d57
-
Filesize
6KB
MD5cf9c47ff04026a83ba55607f08bbab27
SHA1836ef4634284dff14200928456c6d807f9ab5f50
SHA25666f692f29d4605c493287ec36f66e7ab6c627ee6e3d093063f5a0c6888c643f1
SHA512051e2d066f365f67af4598f5933f05a3fd83f2fc48359db0a4ff13346d3a09070f55c787742425ee396eae36f6138edc31680c8e45a3cc1912f157e7754d4750
-
Filesize
6KB
MD5519333e33977c04048176df55d2cce23
SHA15258918ac4754acc01827af95898f0e8464235c6
SHA2560a2bec874637468087ba6afbc37f0b9ac5e38bfddc9f1fb537f065746ece51ab
SHA512a82e1ac06e9c3801b657677efc554e2bed57d7dc19eef500fb3fa1bdc42b7bbe67a28427e561b22dcbb82eaf280c00f00af07a2552d03363d1a02970a1f716d0
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD51f45ca253a6a2b73dce750e881ff0ecd
SHA1da4dae8ac5a408a999e8eafed80b5aee8e54cc16
SHA256bfdadfec527ce21c79d087b8fc5456399561f930e11e036aeb0e929a7df7e781
SHA512a14542c342c72dfe3f10f374003827cd7a89a45433e89613380615973f488fbd32f845134c1a55a09474c54fae5dfb44feb2c69c8a5993bcb3dbd5d0eb4a9d43